schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 8 154 | details stringlengths 31 19.1k | severity stringlengths 2 92 | affected stringlengths 75 28.5k | references stringlengths 79 7.48k | database_specific stringlengths 131 196 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-3382-r9q8-4hfg | 2022-08-12T12:53:18Z | 2022-03-01T00:00:28Z | null | ['CVE-2022-24685'] | HashiCorp Nomad vulnerable to Allocation of Resources Without Limits or Throttling | HashiCorp Nomad and Nomad Enterprise 1.x before 1.0.17, 1.1.x before 1.1.12, and 1.2.x before 1.2.6 is vulnerable to Allocation of Resources Without Limits or Throttling. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.17'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24685'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2022-03-nomad-malformed-job-parsing-results-in-excessive-cpu-usage/'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp... | {'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T22:07:53Z', 'nvd_published_at': '2022-02-28T14:15:00Z'} |
1.4.0 | GHSA-7x48-7466-3g33 | 2022-03-24T23:25:23Z | 2022-03-18T00:01:11Z | null | ['CVE-2021-23556'] | Command injection in guake | Guake is a drop-down terminal for GNOME. The package guake before 3.8.5 is vulnerable to Exposed Dangerous Method or Function due to the exposure of execute_command and execute_command_by_uuid methods via the d-bus interface, which makes it possible for a malicious user to run an arbitrary command via the d-bus method.... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'guake'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23556'}, {'type': 'WEB', 'url': 'https://github.com/Guake/guake/issues/1796'}, {'type': 'WEB', 'url': 'https://github.com/Guake/guake/pull/2017'}, {'type': 'WEB', 'url': 'https://github.com/Guake/guake/pull/2017/commits/e3d671120bfe7ba28f50e256cc5e... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T22:40:30Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8h2f-7jc4-7m3m | 2022-03-14T21:10:46Z | 2022-03-07T00:00:40Z | null | ['CVE-2022-0868'] | Open Redirect in urijs | urijs prior to version 1.19.10 is vulnerable to open redirect. This is the result of a bypass for the fix to CVE-2022-0613. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'urijs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.19.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0868'}, {'type': 'WEB', 'url': 'https://github.com/medialize/uri.js/commit/a8166fe02f3af6dc1b2b888dcbb807155aad9509'}, {'type': 'WEB', 'url': 'https://github.com/medialize/URI.js/releases/tag/v1.19.10'}, {'type': 'PACKAGE', 'url': 'https://github.c... | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-07T16:50:02Z', 'nvd_published_at': '2022-03-06T16:15:00Z'} |
1.4.0 | GHSA-674v-3g2w-84gx | 2022-04-05T18:52:09Z | 2022-03-29T00:01:15Z | null | ['CVE-2021-46433'] | Sandbox bypass in fenom | In fenom 2.12.1 and before, there is a way in fenom/src/Fenom/Template.php function getTemplateCode()to bypass sandbox to execute arbitrary PHP code when disable_native_funcs is true. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'fenom/fenom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.12.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46433'}, {'type': 'WEB', 'url': 'https://github.com/fenom-template/fenom/issues/331'}, {'type': 'PACKAGE', 'url': 'https://github.com/fenom-template/fenom'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-30T19:57:38Z', 'nvd_published_at': '2022-03-28T11:15:00Z'} |
1.4.0 | GHSA-7v5r-r995-q2x2 | 2022-03-24T23:23:21Z | 2022-03-12T00:00:34Z | null | ['CVE-2022-0870'] | SSRF in repository migration | Gogs is a self-hosted Git service. The malicious user is able to discover services in the internal network through repository migration functionality. All installations accepting public traffic are affected. Internal network CIDRs are prohibited to be used as repository migration targets. Users should upgrade to 0.12.5... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'gogs.io/gogs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0870'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/commit/91f2cde5e95f146bfe4765e837e7282df6c7cabb'}, {'type': 'PACKAGE', 'url': 'https://github.com/gogs/gogs'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/327797d7-ae41-498f-9bff-c... | {'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T22:57:02Z', 'nvd_published_at': '2022-03-11T11:15:00Z'} |
1.4.0 | GHSA-8m2f-74r2-x3f2 | 2022-03-18T22:41:34Z | 2022-03-18T00:01:10Z | null | ['CVE-2022-25760'] | Code injection in accesslog | All versions of package accesslog are vulnerable to Arbitrary Code Injection due to the usage of the Function constructor without input sanitization. If (attacker-controlled) user input is given to the format option of the package's exported constructor function, it is possible for an attacker to execute arbitrary Java... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'accesslog'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25760'}, {'type': 'PACKAGE', 'url': 'https://github.com/carlos8f/node-accesslog'}, {'type': 'WEB', 'url': 'https://github.com/carlos8f/node-accesslog/blob/master/lib/compile.js%23L6'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ACCESSLOG-... | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T22:41:34Z', 'nvd_published_at': '2022-03-17T12:15:00Z'} |
1.4.0 | GHSA-2q4g-wfm6-5fpm | 2023-08-09T13:16:40Z | 2022-03-30T00:00:20Z | null | ['CVE-2022-22934'] | SaltStack Improper Verification of Cryptographic Signature | An issue was discovered in SaltStack Salt in versions before 3002.8, 3003.4, 3004.1. Salt Masters do not sign pillar data with the minion’s public key, which can result in attackers substituting arbitrary pillar data. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'salt'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3002.8'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'salt'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'EC... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22934'}, {'type': 'WEB', 'url': 'https://blog.cloudflare.com/future-proofing-saltstack/'}, {'type': 'WEB', 'url': 'https://github.com/saltstack/salt/releases'}] | {'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T13:16:40Z', 'nvd_published_at': '2022-03-29T17:15:00Z'} |
1.4.0 | GHSA-f897-875p-23x7 | 2022-03-28T22:33:35Z | 2022-03-12T00:00:37Z | null | ['CVE-2022-25510'] | Hard coded credentials in FreeTAKServer | FreeTAKServer 1.9.8 contains a hardcoded Flask secret key which allows attackers to create crafted cookies to bypass authentication or escalate privileges. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'FreeTAKServer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.8.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.9.8'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25510'}, {'type': 'WEB', 'url': 'https://github.com/FreeTAKTeam/FreeTakServer/issues/292'}, {'type': 'PACKAGE', 'url': 'https://github.com/FreeTAKTeam/FreeTakServer'}] | {'cwe_ids': ['CWE-798'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T23:16:48Z', 'nvd_published_at': '2022-03-11T00:15:00Z'} |
1.4.0 | GHSA-2cv6-6437-39p2 | 2022-03-22T20:03:39Z | 2022-03-13T00:00:53Z | null | ['CVE-2022-0930'] | Cross-site Scripting in microweber | File upload filter bypass leading to stored XSS in GitHub repository microweber/microweber prior to 1.2.12. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.12'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0930'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/33eb4cc0f80c1f86388c1862a8aee1061fa5d72e'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T22:54:13Z', 'nvd_published_at': '2022-03-12T14:15:00Z'} |
1.4.0 | GHSA-9rr6-jpg7-9jg6 | 2022-03-15T21:32:40Z | 2022-03-11T00:02:36Z | null | ['CVE-2021-38296'] | Authentication Bypass by Capture-replay in Apache Spark | Apache Spark supports end-to-end encryption of RPC connections via "spark.authenticate" and "spark.network.crypto.enabled". In versions 3.1.2 and earlier, it uses a bespoke mutual authentication protocol that allows for full encryption key recovery. After an initial interactive attack, this would allow someone to decry... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38296'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9rr6-jpg7-9jg6'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/pyspark/PYSEC-2022-186.yaml'}, {'type': 'WEB', 'url': 'https://lists.apache... | {'cwe_ids': ['CWE-294'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-11T20:30:09Z', 'nvd_published_at': '2022-03-10T09:15:00Z'} |
1.4.0 | GHSA-8cxw-wvhc-p4x4 | 2022-10-21T13:00:27Z | 2022-10-19T19:00:22Z | null | ['CVE-2022-43414'] | Jenkins NUnit Plugin vulnerable to Protection Mechanism Failure | Jenkins NUnit Plugin 0.27 and earlier implements an agent-to-controller message that parses files inside a user-specified directory as test results, allowing attackers able to control agent processes to obtain test results from files in an attacker-specified directory on the Jenkins controller. NUnit Plugin 0.28 change... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:nunit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.28'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.27'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43414'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2551'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/10/19/3'}] | {'cwe_ids': ['CWE-693'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T22:24:14Z', 'nvd_published_at': '2022-10-19T16:15:00Z'} |
1.4.0 | GHSA-4vf4-955g-vxp2 | 2022-10-18T19:52:25Z | 2022-10-18T19:52:25Z | null | ['CVE-2022-31037'] | OroCommerce Cross site scripting vulnerability during shipping rule editing for UPS integration | ### Impact
Shipping rule edit page is vulnerable to cross site scripting (XSS) payload added to UPS Surcharge field. The attacker should have permission to create or edit a shipping rule. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'oro/commerce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '5.0.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/oroinc/orocommerce/security/advisories/GHSA-4vf4-955g-vxp2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31037'}, {'type': 'PACKAGE', 'url': 'https://github.com/oroinc/orocommerce'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-18T19:52:25Z', 'nvd_published_at': '2022-10-18T10:15:00Z'} |
1.4.0 | GHSA-h423-w6qv-2wj3 | 2022-10-18T16:08:49Z | 2022-10-18T16:08:49Z | null | ['CVE-2022-39313'] | parse-server crashes when receiving file download request with invalid byte range | ### Impact
Parse Server crashes when a file download request is received with an invalid byte range.
### Patches
Improved parsing of the range parameter to properly handle invalid range requests.
### Workarounds
None
### References
- [GHSA-h423-w6qv-2wj3](https://github.com/parse-community/parse-server/security/... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.10.17'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges'... | [{'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/security/advisories/GHSA-h423-w6qv-2wj3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39313'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/commit/066f29673ab4030b6b5b90c0c0326f7d3fe7612a'}, {... | {'cwe_ids': ['CWE-1284', 'CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-18T16:08:49Z', 'nvd_published_at': '2022-10-24T14:15:00Z'} |
1.4.0 | GHSA-3q8r-f3pj-3gc4 | 2022-10-10T16:54:10Z | 2022-10-07T18:16:01Z | null | ['CVE-2022-41672'] | Apache Airflow may allow authenticated users who have been deactivated to continue using the UI or API | In Apache Airflow, prior to version 2.4.1, deactivating a user wouldn't prevent an already authenticated user from being able to continue using the UI or API. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41672'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/26635'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/ohf3pvd3dftb8zb01yngbn1jtkq5m08y'}] | {'cwe_ids': ['CWE-285', 'CWE-613'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-07T21:57:35Z', 'nvd_published_at': '2022-10-07T07:15:00Z'} |
1.4.0 | GHSA-4r9g-w48q-8jwm | 2022-11-03T19:32:34Z | 2022-10-26T12:00:29Z | null | ['CVE-2022-25849'] | HyperDown vulnerable to Cross-site Scripting | HyperDown is a markdown parser written for the Chinese website SegmentFault. Improper validation of the href attribute allows for Cross-site Scripting. At publication there are no patched versions, and no known workarounds. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'joyqi/hyper-down'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4.27'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25849'}, {'type': 'PACKAGE', 'url': 'https://github.com/SegmentFault/HyperDown'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-PHP-JOYQIHYPERDOWN-2953544'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-26T22:42:45Z', 'nvd_published_at': '2022-10-26T05:15:00Z'} |
1.4.0 | GHSA-4mjx-2gh5-ph8h | 2022-10-10T21:07:47Z | 2022-10-10T21:07:47Z | null | ['CVE-2022-39292'] | Exposure of sensitive Slack webhook URLs in debug logs and traces | ### Impact
Debug logs expose sensitive URLs for Slack webhooks that contain private information.
### Patches
The problem is fixed in v1.3.2 which redacts sensitive URLs for webhooks.
### Workarounds
Disabling/filtering debug logs in case you use Slack webhooks using tracing log level and filters.
### References
htt... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'slack-morphism'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/abdolence/slack-morphism-rust/security/advisories/GHSA-4mjx-2gh5-ph8h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39292'}, {'type': 'WEB', 'url': 'https://github.com/abdolence/slack-morphism-rust/commit/48a1da2dc2ad3a5ccc60036d43f6f8fbb2c15f1d'},... | {'cwe_ids': ['CWE-1258'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-10T21:07:47Z', 'nvd_published_at': '2022-10-10T15:15:00Z'} |
1.4.0 | GHSA-38hf-c37x-32hv | 2022-10-06T20:00:30Z | 2022-10-04T00:00:25Z | null | ['CVE-2022-40922'] | LIEF vulnerable to denial of service through segmentation fault | A vulnerability in the LIEF::MachO::BinaryParser::init_and_parse function of LIEF v0.12.1 allows attackers to cause a denial of service (DOS) through a segmentation fault via a crafted MachO file. A [patch](https://github.com/lief-project/LIEF/commit/fde2c48986739fabd2cf9b40b9af149a89c57850) for this issue is available... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'lief'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.12.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40922'}, {'type': 'WEB', 'url': 'https://github.com/lief-project/LIEF/issues/781'}, {'type': 'WEB', 'url': 'https://github.com/lief-project/LIEF/commit/ad811916670e83947560b6f3c45df6e71d3885af'}, {'type': 'WEB', 'url': 'https://github.com/lief-proj... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-06T20:00:30Z', 'nvd_published_at': '2022-10-03T13:15:00Z'} |
1.4.0 | GHSA-hvcr-927w-qcvq | 2022-12-16T19:46:12Z | 2022-10-19T19:00:18Z | null | ['CVE-2022-43420'] | Stored XSS vulnerability in Jenkins Contrast Continuous Application Security Plugin | Contrast Continuous Application Security Plugin 3.9 and earlier does not escape data returned from the Contrast service when generating a report.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control or modify Contrast service API responses.
Contrast Continuous App... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:contrast-continuous-application-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.9'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43420'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/contrast-continuous-application-security-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2836'}, {'type': 'WEB', 'url': 'http://www.op... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T21:23:37Z', 'nvd_published_at': '2022-10-19T16:15:00Z'} |
1.4.0 | GHSA-73v5-w6fg-2m44 | 2022-10-21T13:00:02Z | 2022-10-19T19:00:22Z | null | ['CVE-2022-43421'] | Jenkins Tuleap Git Branch Source Plugin allows unauthenticated attackers to trigger Tuleap projects whose configured repo matches attacker-specified value | A missing permission check in Jenkins Tuleap Git Branch Source Plugin 3.2.4 and earlier allows unauthenticated attackers to trigger Tuleap projects whose configured repository matches the attacker-specified value. Tuleap Git Branch Source Plugin 3.2.5 requires a token to access the webhook endpoint.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:tuleap-git-branch-source'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.4'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43421'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2852'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/10/19/3'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T22:24:25Z', 'nvd_published_at': '2022-10-19T16:15:00Z'} |
1.4.0 | GHSA-64r9-x74q-wxmh | 2022-12-16T17:16:06Z | 2022-10-19T19:00:22Z | null | ['CVE-2022-43409'] | Stored XSS vulnerability in Jenkins Pipeline: Supporting APIs Plugin | Pipeline: Supporting APIs Plugin provides a feature to add hyperlinks, that send POST requests when clicked, to build logs. These links are used by Pipeline: Input Step Plugin to allow users to proceed or abort the build, or by Pipeline: Job Plugin to allow users to forcibly terminate the build after aborting it.
Pipe... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.workflow:workflow-support'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '839.v35e2736cfd5c'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43409'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/workflow-support-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2881'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-sec... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T22:22:35Z', 'nvd_published_at': '2022-10-19T16:15:00Z'} |
1.4.0 | GHSA-r29w-r9ph-vm76 | 2022-10-31T15:41:18Z | 2022-10-25T19:00:29Z | null | ['CVE-2022-41704'] | Apache XML Graphics Batik vulnerable to code execution via SVG. | A vulnerability in Batik of Apache XML Graphics allows an attacker to run untrusted Java code from an SVG. This issue affects Apache XML Graphics prior to 1.16. It is recommended to update to version 1.16. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.xmlgraphics:batik'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41704'}, {'type': 'WEB', 'url': 'https://github.com/apache/xmlgraphics-batik/commit/905f368b50c2567cf2c4869a0ab596a7b1b5125c'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/BATIK-1338'}, {'type': 'WEB', 'url': 'https://lists.apache... | {'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T23:10:27Z', 'nvd_published_at': '2022-10-25T17:15:00Z'} |
1.4.0 | GHSA-f4mm-2r69-mg5f | 2023-06-27T21:55:58Z | 2022-10-25T20:21:33Z | null | ['CVE-2022-39342'] | OpenFGA Authorization Bypass | ### Overview
During our internal security assessment, it was discovered that OpenFGA versions `v0.2.3` and prior are vulnerable to authorization bypass under certain conditions.
### Am I Affected?
You are affected by this vulnerability if you are using `openfga/openfga` version `v0.2.3` or prior, and your model has a ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/openfga/openfga'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.2.3'}}] | [{'type': 'WEB', 'url': 'https://github.com/openfga/openfga/security/advisories/GHSA-f4mm-2r69-mg5f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39342'}, {'type': 'WEB', 'url': 'https://github.com/openfga/openfga/commit/c8db1ee3d2a366f18e585dd33236340e76e784c4'}, {'type': 'PACKAGE', 'url': ... | {'cwe_ids': ['CWE-285', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T20:21:33Z', 'nvd_published_at': '2022-10-25T17:15:00Z'} |
1.4.0 | GHSA-p75c-5x3h-cxcg | 2022-10-07T21:19:01Z | 2022-10-07T21:19:01Z | null | ['CVE-2022-39281'] | Fat Free CRM vulnerable to Remote Denial of Service via Tasks endpoint | ### Impact
An authenticated user can perform a remote Denial of Service attack against Fat Free CRM.
This vulnerability has been assigned the CVE identifier: CVE-2022-39281
Affected versions: All
Not affected: None
Fixed versions: 0.20.1
All users running an affected release should either upgrade or apply the patch ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'fat_free_crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.20.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/fatfreecrm/fat_free_crm/security/advisories/GHSA-p75c-5x3h-cxcg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39281'}, {'type': 'WEB', 'url': 'https://github.com/fatfreecrm/fat_free_crm/commit/c85a2546348c2692d32f952c753f7f0b43d1ca71'}, {'type': 'P... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-07T21:19:01Z', 'nvd_published_at': '2022-10-08T01:15:00Z'} |
1.4.0 | GHSA-f8q6-p94x-37v3 | 2023-01-23T18:54:22Z | 2022-10-18T12:00:32Z | null | ['CVE-2022-3517'] | minimatch ReDoS vulnerability | A vulnerability was found in the minimatch package. This flaw allows a Regular Expression Denial of Service (ReDoS) when calling the braceExpand function with specific arguments, resulting in a Denial of Service. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'minimatch'}, 'ecosystem_specific': {'affected_functions': ['ext', 'minimatch', 'minimatch.Minimatch', 'minimatch.defaults', 'minimatch.Minimatch.defaults', 'minimatch.Minimatch.braceExpand', 'minimatch.Minimatch.parse', 'minimatch.match', 'minimatch.Minimatch.matchOne']}, 'ran... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3517'}, {'type': 'WEB', 'url': 'https://github.com/grafana/grafana-image-renderer/issues/329'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/node/issues/42510'}, {'type': 'WEB', 'url': 'https://github.com/isaacs/minimatch/commit/a8763f4388e519... | {'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-20T18:21:03Z', 'nvd_published_at': '2022-10-17T20:15:00Z'} |
1.4.0 | GHSA-cm22-88qr-7ffh | 2023-07-07T21:10:52Z | 2022-10-19T12:00:23Z | null | ['CVE-2022-42188'] | Lavalite vulnerable to Arbitrary File Read via Directory Traversal | In Lavalite 9.0.0, the XSRF-TOKEN cookie is vulnerable to path traversal attacks, enabling read access to arbitrary files on the server. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'lavalite/cms'}, 'versions': ['9.0.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42188'}, {'type': 'PACKAGE', 'url': 'https://github.com/LavaLite/cms'}, {'type': 'WEB', 'url': 'https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/LavaLite'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T21:10:52Z', 'nvd_published_at': '2022-10-18T19:15:00Z'} |
1.4.0 | GHSA-mcjj-2fvq-mc3r | 2022-10-11T21:20:56Z | 2022-10-11T19:00:29Z | null | ['CVE-2022-32174'] | Gogs vulnerable to Cross-site Scripting | In Gogs, versions v0.6.5 through v0.12.10 are vulnerable to Stored Cross-Site Scripting (XSS) that leads to an account takeover. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'gogs.io/gogs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.6.5'}, {'last_affected': '0.12.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-32174'}, {'type': 'PACKAGE', 'url': 'https://github.com/gogs/gogs'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/blob/v0.12.10/public/js/gogs.js#L263'}, {'type': 'WEB', 'url': 'https://www.mend.io/vulnerability-database/CVE-2022-32174'}] | {'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-11T21:20:56Z', 'nvd_published_at': '2022-10-11T15:15:00Z'} |
1.4.0 | GHSA-2x49-wj38-78q9 | 2022-12-16T19:47:20Z | 2022-10-19T19:00:18Z | null | ['CVE-2022-43422'] | Agent-to-controller security bypass vulnerability in Jenkins Compuware Topaz Utilities Plugin | Compuware Topaz Utilities Plugin 1.0.8 and earlier implements an agent/controller message that does not limit where it can be executed.
It allows attackers able to control agent processes to obtain the values of Java system properties from the Jenkins controller process.
This vulnerability is only exploitable in Jenk... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.compuware.jenkins:compuware-topaz-utilities'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43422'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/compuware-topaz-utilities-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2620'}, {'type': 'WEB', 'url': 'http://www.openwall.com/list... | {'cwe_ids': ['CWE-693'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T21:23:12Z', 'nvd_published_at': '2022-10-19T16:15:00Z'} |
1.4.0 | GHSA-x4q7-m6fp-4v9v | 2022-10-24T18:35:38Z | 2022-10-13T19:11:08Z | null | ['CVE-2022-35944'] | October CMS Safe Mode bypass leads to authenticated Remote Code Execution | ### Impact
This vulnerability only affects installations that rely on the safe mode restriction, commonly used when providing public access to the admin panel. Assuming an attacker has access to the admin panel and permission to open the "Editor" section, they can bypass the Safe Mode (`cms.safe_mode`) restriction to ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'october/system'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.34'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'october/system'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.66'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/octobercms/october/security/advisories/GHSA-x4q7-m6fp-4v9v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35944'}, {'type': 'PACKAGE', 'url': 'https://github.com/octobercms/october'}] | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-13T19:11:08Z', 'nvd_published_at': '2022-10-13T22:15:00Z'} |
1.4.0 | GHSA-x279-68rr-jp4p | 2022-10-07T07:25:33Z | 2022-10-07T07:25:33Z | null | [] | Blst vulnerable to incorrect results for some inputs in blst_fp_eucl_inverse function | ### Impact
Blst versions v0.3.0 to v0.3.2 can produce the incorrect outputs for some inputs to the blst_fp_eucl_inverse function. This could theoretically result in the creation of an invalid signature from correct inputs. However, fuzzing of higher level functions such as sign and verify were unable to produce incorre... | [] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/supranational/blst'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.0'}, {'fixed': '0.3.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/supranational/blst/security/advisories/GHSA-x279-68rr-jp4p'}, {'type': 'WEB', 'url': 'https://github.com/supranational/blst/commit/dd980e7f81397895705c49fcb4f52e485bb45e21'}, {'type': 'PACKAGE', 'url': 'https://github.com/supranational/blst'}, {'type': 'WEB', 'url': 'https://... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-07T07:25:33Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qm95-pgcg-qqfq | 2022-11-14T20:01:32Z | 2022-10-26T12:00:28Z | null | ['CVE-2022-2421'] | Insufficient validation when decoding a Socket.IO packet | Due to improper type validation in the `socket.io-parser` library (which is used by the `socket.io` and `socket.io-client` packages to encode and decode Socket.IO packets), it is possible to overwrite the _placeholder object which allows an attacker to place references to functions at arbitrary places in the resulting ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'socket.io-parser'}, 'ecosystem_specific': {'affected_functions': ['socket.io-parser.Decoder']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.5'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'socket.io-parser'}, 'ecosystem_specific': {'af... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2421'}, {'type': 'WEB', 'url': 'https://github.com/socketio/socket.io-parser/commit/04d23cecafe1b859fb03e0cbf6ba3b74dff56d14'}, {'type': 'WEB', 'url': 'https://github.com/socketio/socket.io-parser/commit/b559f050ee02bd90bd853b9823f8de7fa94a80d4'}, ... | {'cwe_ids': ['CWE-1287', 'CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-28T20:19:04Z', 'nvd_published_at': '2022-10-26T10:15:00Z'} |
1.4.0 | GHSA-7pfc-cc9x-8p4m | 2022-10-22T01:12:05Z | 2022-10-19T12:00:18Z | null | ['CVE-2022-42466'] | Apache Isis Cross-site Scripting vulnerability | Prior to 2.0.0-M9, it was possible for an end-user to set the value of an editable string property of a domain object to a value that would be rendered unchanged when the value was saved. In particular, the end-user could enter javascript or similar and this would be executed. As of this release, the inputted strings a... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.isis.core:isis-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0-M9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42466'}, {'type': 'WEB', 'url': 'https://github.com/apache/isis/commit/30f94df14ea47cea3d10d468a1230fb96a749743'}, {'type': 'WEB', 'url': 'https://github.com/apache/isis/commit/33de85d7e40a01f120d8de2adf04d47687362bdd'}, {'type': 'WEB', 'url': 'htt... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T18:50:59Z', 'nvd_published_at': '2022-10-19T08:15:00Z'} |
1.4.0 | GHSA-76p3-8jx3-jpfq | 2022-11-04T20:29:12Z | 2022-10-13T12:00:28Z | null | ['CVE-2022-37601'] | Prototype pollution in webpack loader-utils | Prototype pollution vulnerability in function parseQuery in parseQuery.js in webpack loader-utils prior to version 2.0.3 via the name variable in parseQuery.js. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'loader-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'loader-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37601'}, {'type': 'WEB', 'url': 'https://github.com/webpack/loader-utils/issues/212'}, {'type': 'WEB', 'url': 'https://github.com/webpack/loader-utils/issues/212#issuecomment-1319192884'}, {'type': 'WEB', 'url': 'https://github.com/xmldom/xmldom/is... | {'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-04T20:29:12Z', 'nvd_published_at': '2022-10-12T20:15:00Z'} |
1.4.0 | GHSA-4f63-89w9-3jjv | 2022-10-13T20:08:51Z | 2022-10-11T19:00:29Z | null | ['CVE-2022-3358'] | Using a Custom Cipher with `NID_undef` may lead to NULL encryption | OpenSSL supports creating a custom cipher via the legacy EVP_CIPHER_meth_new() function and associated function calls. This function was deprecated in OpenSSL 3.0 and application authors are instead encouraged to use the new provider mechanism in order to implement custom ciphers. OpenSSL versions 3.0.0 to 3.0.5 incorr... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '300.0.0'}, {'fixed': '300.0.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3358'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=5485c56679d7c49b96e8fc8ca708b0b7e7c03c4b'}, {'type': 'PACKAGE', 'url': 'https://github.com/alexcrichton/openssl-src-rs'}, {'type': 'WEB', 'url': 'https://p... | {'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-12T20:00:56Z', 'nvd_published_at': '2022-10-11T15:15:00Z'} |
1.4.0 | GHSA-jw36-mrvg-j5fx | 2022-11-01T20:36:52Z | 2022-10-27T12:00:27Z | null | ['CVE-2022-3363'] | Rdiffweb subject to Business Logic Errors | Business Logic Errors in GitHub repository ikus060/rdiffweb prior to 2.5.0a7. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0a7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3363'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/c27c46bac656b1da74f28eac1b52dfa5df76e6f2'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb/'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-data... | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-27T23:09:22Z', 'nvd_published_at': '2022-10-26T21:15:00Z'} |
1.4.0 | GHSA-mfcw-83qg-4vw3 | 2022-12-16T19:50:04Z | 2022-10-19T19:00:22Z | null | ['CVE-2022-43424'] | Agent-to-controller security bypass vulnerability in Jenkins Compuware Xpediter Code Coverage Plugin | Compuware Xpediter Code Coverage Plugin 1.0.7 and earlier implements an agent/controller message that does not limit where it can be executed.
It allows attackers able to control agent processes to obtain the values of Java system properties from the Jenkins controller process.
This vulnerability is only exploitable ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.compuware.jenkins:compuware-xpediter-code-coverage'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43424'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/compuware-xpediter-code-coverage-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2627'}, {'type': 'WEB', 'url': 'http://www.openwall.c... | {'cwe_ids': ['CWE-693'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T22:20:50Z', 'nvd_published_at': '2022-10-19T16:15:00Z'} |
1.4.0 | GHSA-45x9-q6vj-cqgq | 2022-10-13T20:11:12Z | 2022-10-12T12:00:16Z | null | ['CVE-2022-40664'] | Apache Shiro Authentication Bypass vulnerability | Apache Shiro before 1.10.0, Authentication Bypass Vulnerability in Shiro when forwarding or including via RequestDispatcher. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.shiro:shiro-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40664'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/shiro'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/loc2ktxng32xpy7lfwxto13k4lvnhjwg'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20221118-0005/'}, ... | {'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-12T19:43:15Z', 'nvd_published_at': '2022-10-12T07:15:00Z'} |
1.4.0 | GHSA-g6hg-4v3c-6jq7 | 2022-10-31T15:43:23Z | 2022-10-26T19:00:39Z | null | ['CVE-2022-43766'] | Apache IoTDB subject to ReDOS with Java 8 | Apache IoTDB versions 0.12.2 through 0.12.6, and 0.13.0 through 0.13.2 are vulnerable to a Denial of Service attack when accepting untrusted patterns for REGEXP queries with Java 8. This issue is patched in 0.13.3. Users should upgrade or use a later version of Java to avoid it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.iotdb:iotdb-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.12.2'}, {'fixed': '0.13.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'apache-iotdb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.13.0'}, {'fixed': '0.14.0r... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43766'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/iotdb'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/apache-iotdb/PYSEC-2022-42972.yaml'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/... | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-27T18:38:35Z', 'nvd_published_at': '2022-10-26T16:15:00Z'} |
1.4.0 | GHSA-p373-jqfm-j6wr | 2022-10-22T01:12:42Z | 2022-10-20T12:00:15Z | null | ['CVE-2022-37298'] | Shinken Solutions Shinken Monitoring vulnerable to Incorrect Access Control | Shinken Solutions Shinken Monitoring Version 2.4.3 affected is vulnerable to Incorrect Access Control. The `SafeUnpickler` class found in `shinken/safepickle.py` implements a weak authentication scheme when unserializing objects passed from monitoring nodes to the Shinken monitoring server. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Shinken'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37298'}, {'type': 'WEB', 'url': 'https://github.com/naparuba/shinken/commit/2dae40fd1e713aec9e1966a0ab7a580b9180cff2'}, {'type': 'WEB', 'url': 'https://github.com/dbyio/cve-2022-37298'}, {'type': 'PACKAGE', 'url': 'https://github.com/naparuba/shink... | {'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-20T18:39:15Z', 'nvd_published_at': '2022-10-20T11:15:00Z'} |
1.4.0 | GHSA-vgwq-hfqc-58wv | 2022-10-20T21:34:09Z | 2022-10-20T21:34:09Z | null | ['CVE-2021-34485'] | .NET Core Information Disclosure Vulnerability | Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 5.0, .NET Core 3.1 and .NET Core 2.1. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.
An information disclosure vulnerability exists in .NET 5.0, ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.29'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.linux-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, ... | [{'type': 'WEB', 'url': 'https://github.com/dotnet/runtime/security/advisories/GHSA-vgwq-hfqc-58wv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-34485'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/196'}, {'type': 'WEB', 'url': 'https://github.com/github/advisory-d... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-20T21:34:09Z', 'nvd_published_at': '2021-08-12T18:15:00Z'} |
1.4.0 | GHSA-h4h5-3hr4-j3g2 | 2022-10-04T22:17:15Z | 2022-10-04T22:17:15Z | null | ['CVE-2022-3171'] | protobuf-java has a potential Denial of Service issue | ## Summary
A potential Denial of Service issue in `protobuf-java` core and lite was discovered in the parsing procedure for binary and text format data. Input streams containing multiple instances of non-repeated [embedded messages](http://developers.google.com/protocol-buffers/docs/encoding#embedded) with repeated or ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.google.protobuf:protobuf-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.21.0-rc-1'}, {'fixed': '3.21.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.google.protobuf:protobuf-kotlin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduce... | [{'type': 'WEB', 'url': 'https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-h4h5-3hr4-j3g2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3171'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=48771'}, {'type': 'PACKAGE', 'url': 'https://github... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-04T22:17:15Z', 'nvd_published_at': '2022-10-12T23:15:00Z'} |
1.4.0 | GHSA-rh58-r7jh-xhx3 | 2022-10-25T17:33:12Z | 2022-10-25T17:33:12Z | null | ['CVE-2021-26423'] | .NET Core Elevation of Privilege Vulnerability | Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 5.0 and .NET Core 3.1. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.
A denial of service vulnerability exists in .NET 5.0, .NET Core 3.1 and .NE... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.win-x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.18'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.win-x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduce... | [{'type': 'WEB', 'url': 'https://github.com/dotnet/runtime/security/advisories/GHSA-rh58-r7jh-xhx3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26423'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/194'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T17:33:12Z', 'nvd_published_at': '2021-08-12T18:15:00Z'} |
1.4.0 | GHSA-xp3r-9wx8-q2mm | 2022-12-16T19:55:09Z | 2022-10-19T19:00:22Z | null | ['CVE-2022-43428'] | Agent-to-controller security bypass vulnerabilities in Jenkins Compuware Topaz for Total Test Plugin | Jenkins Compuware Topaz for Total Test Plugin 2.4.8 and earlier implements an agent/controller message that does not limit where it can be executed, allowing attackers able to control agent processes to obtain the values of Java system properties from the Jenkins controller process.
These vulnerabilities are only expl... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.compuware.jenkins:compuware-topaz-for-total-test'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43428'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/compuware-topaz-for-total-test-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2624'}, {'type': 'WEB', 'url': 'http://www.openwall.com... | {'cwe_ids': ['CWE-693'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T22:02:43Z', 'nvd_published_at': '2022-10-19T16:15:00Z'} |
1.4.0 | GHSA-9chr-4fjh-5rgw | 2023-01-23T20:44:50Z | 2022-10-27T12:00:27Z | 2023-01-23T20:44:50Z | ['CVE-2022-3704'] | Cross-site Scripting in actionpack | actionpack from the Ruby on Rails project is vulnerable to Cross-site Scripting in the Route Error Page. This issue has been patched with this [commit](https://github.com/rails/rails/commit/be177e4566747b73ff63fd5f529fab564e475ed4).
This vulnerability is disputed by the Rails security team. It requires that the devel... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '7.0.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3704'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/issues/46244'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/issues/46244#issuecomment-1380875153'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/pull/46269'}, {'typ... | {'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-10-28T19:17:53Z', 'nvd_published_at': '2022-10-26T20:15:00Z'} |
1.4.0 | GHSA-7gc4-r5jr-9hxv | 2022-10-27T18:38:32Z | 2022-10-25T21:02:23Z | null | ['CVE-2022-39345'] | Gin-vue-admin subject to Remote Code Execution via file upload vulnerability | ### Impact
Gin-vue-admin < 2.5.4 has File upload vulnerabilities。
File upload vulnerabilities are when a web server allows users to upload files to its filesystem without sufficiently validating things like their name, type, contents, or size. Failing to properly enforce restrictions on these could mean that even a bas... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/flipped-aurora/gin-vue-admin/server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-7gc4-r5jr-9hxv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39345'}, {'type': 'WEB', 'url': 'https://github.com/flipped-aurora/gin-vue-admin/issues/1263'}, {'type': 'WEB', 'url': 'https://githu... | {'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T21:02:23Z', 'nvd_published_at': '2022-10-25T17:15:00Z'} |
1.4.0 | GHSA-mgvv-5mxp-xq67 | 2022-10-03T22:12:28Z | 2022-10-03T22:12:28Z | null | [] | SQLite3 addresses vulnerability in packaged version of libsqlite | ### Summary
The rubygem sqlite3 v1.5.1 upgrades the packaged version of libsqlite from v3.39.3 to [v3.39.4](https://sqlite.org/releaselog/3_39_4.html).
libsqlite v3.39.4 addresses a vulnerability described as follows in the release notification:
> Version 3.39.4 is a minimal patch against the prior release that addr... | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'sqlite3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.1'}]}], 'versions': ['1.5.0']}] | [{'type': 'WEB', 'url': 'https://github.com/sparklemotion/sqlite3-ruby/security/advisories/GHSA-mgvv-5mxp-xq67'}, {'type': 'PACKAGE', 'url': 'https://github.com/sparklemotion/sqlite3-ruby'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/sqlite3-ruby/releases/tag/v1.5.1'}] | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-10-03T22:12:28Z', 'nvd_published_at': None} |
1.4.0 | GHSA-59hj-62f5-fgmc | 2022-10-25T19:59:37Z | 2022-10-24T19:00:24Z | null | ['CVE-2022-43677'] | free5GC vulnerable to malformed NGAP message crashing the AMF and NGAP decoders | In free5GC 3.2.1, a malformed NGAP message can crash the AMF and NGAP decoders via an index-out-of-range panic in `aper.GetBitString`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/free5gc/free5gc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43677'}, {'type': 'WEB', 'url': 'https://github.com/free5gc/free5gc/issues/402'}, {'type': 'PACKAGE', 'url': 'https://github.com/free5gc/free5gc'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-1083'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T19:59:37Z', 'nvd_published_at': '2022-10-24T14:15:00Z'} |
1.4.0 | GHSA-xrx9-gj26-5wx9 | 2022-10-07T07:33:44Z | 2022-10-07T07:33:44Z | null | ['CVE-2022-35923'] | v8n vulnerable to Inefficient Regular Expression Complexity | ### Impact
Inefficient regular expression complexity of `lowercase()` and `uppercase()` regex could lead to a denial of service attack. With a formed payload `'a' + 'a'.repeat(i) + 'A'`, only 32 characters payload could take 29443 ms time execution when testing `lowercase()`. The same issue happens with `uppercase()`.
... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'v8n'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/imbrn/v8n/security/advisories/GHSA-xrx9-gj26-5wx9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35923'}, {'type': 'WEB', 'url': 'https://github.com/imbrn/v8n/commit/92393862156fad190c05ec3f6e2bc73308dcd2f9'}, {'type': 'PACKAGE', 'url': 'https://git... | {'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-07T07:33:44Z', 'nvd_published_at': '2022-08-02T20:15:00Z'} |
1.4.0 | GHSA-vw39-2wj9-4q86 | 2022-10-11T20:49:45Z | 2022-10-11T19:00:29Z | null | ['CVE-2022-42731'] | django-mfa2 vulnerable to MFA Replay attack | mfa/FIDO2.py in django-mfa2 before 2.5.1 and 2.6.x before 2.6.1 allows a replay attack that could be used to register another device for a user. The device registration challenge is not invalidated after usage. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django-mfa2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django-mfa2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42731'}, {'type': 'WEB', 'url': 'https://github.com/mkalioby/django-mfa2/commit/54db5a513bcafa97a36e9f6dfa31d3c61fa8217b'}, {'type': 'WEB', 'url': 'https://github.com/mkalioby/django-mfa2/commit/5fbb505e98ecdd409330a5c336ad5ec49631b0db'}, {'type': ... | {'cwe_ids': ['CWE-294'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-11T20:49:45Z', 'nvd_published_at': '2022-10-11T14:15:00Z'} |
1.4.0 | GHSA-v9fj-h8g6-4w9q | 2022-10-07T13:10:02Z | 2022-10-06T18:52:03Z | null | ['CVE-2022-3002'] | YetiForce CRM vulnerable to stored Cross-site Scripting | YetiForce CRM version 6.4.0 and prior is vulnerable to stored cross-site scripting. A [patch](https://github.com/yetiforcecompany/yetiforcecrm/commit/54728becfdad9b6e686bbe336007cba2ce518248) is available on the `developer` branch. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'yetiforce/yetiforce-crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3002'}, {'type': 'WEB', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm/commit/54728becfdad9b6e686bbe336007cba2ce518248'}, {'type': 'PACKAGE', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm'}, {'type': 'WEB', 'url': 'https://hunt... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-06T20:02:02Z', 'nvd_published_at': '2022-10-06T18:16:00Z'} |
1.4.0 | GHSA-f9f9-4r63-4qcc | 2022-12-16T17:22:29Z | 2022-10-19T19:00:22Z | null | ['CVE-2022-43411'] | Non-constant time webhook token comparison in Jenkins GitLab Plugin | GitLab Plugin 1.5.35 and earlier does not use a constant-time comparison when checking whether the provided and expected webhook token are equal.
This could potentially allow attackers to use statistical methods to obtain a valid webhook token.
GitLab Plugin 1.5.36 uses a constant-time comparison when validating the ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:gitlab-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.36'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.5.35'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43411'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/gitlab-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2877'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022... | {'cwe_ids': ['CWE-203', 'CWE-208'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T22:22:43Z', 'nvd_published_at': '2022-10-19T16:15:00Z'} |
1.4.0 | GHSA-j4j9-7hg9-97g6 | 2022-10-11T20:41:47Z | 2022-10-11T20:41:47Z | null | ['CVE-2022-36070'] | Poetry vulnerable to Untrusted Search Path leading to Local Code Execution on Windows | ### Observation
To handle dependencies that come from a Git repository, Poetry executes various commands, e.g. `git config`. These commands are being executed using the executable’s name and not its absolute path.
This can lead to the execution of untrusted code due to the way Windows resolves executable names to pat... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'poetry'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.9'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/python-poetry/poetry/security/advisories/GHSA-j4j9-7hg9-97g6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36070'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-poetry/poetry'}, {'type': 'WEB', 'url': 'https://github.com/python-poetry/poet... | {'cwe_ids': ['CWE-426'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-11T20:41:47Z', 'nvd_published_at': '2022-09-07T19:15:00Z'} |
1.4.0 | GHSA-4g29-r7vj-2rpv | 2022-10-21T13:00:42Z | 2022-10-19T19:00:22Z | null | ['CVE-2022-43413'] | Jenkins Job Import Plugin allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins | Jenkins Job Import Plugin 3.5 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. An enumeration of credentials IDs in Job Import Plugin 3.6 requires Job Import/Import Jobs permission. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:job-import-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.5'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43413'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2791'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/10/19/3'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T22:24:06Z', 'nvd_published_at': '2022-10-19T16:15:00Z'} |
1.4.0 | GHSA-7qw2-h9gj-hcvh | 2022-12-16T17:08:22Z | 2022-10-19T19:00:21Z | null | ['CVE-2022-43406'] | Sandbox bypass vulnerability in Jenkins Pipeline: Deprecated Groovy Libraries Plugin | Pipeline: Groovy Libraries Plugin and older releases of the Pipeline: Deprecated Groovy Libraries Plugin (formerly Pipeline: Shared Groovy Libraries Plugin) define the l`ibrary` Pipeline step, which allows Pipeline authors to dynamically load Pipeline libraries. The return value of this step can be used to instantiate ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.workflow:workflow-cps-global-lib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '588.v576c103a_ff86'}]}], 'database_specific': {'last_known_affected_version_range': '< 588.v576c103a'}}, {'package': {'ecosystem': 'Maven', ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43406'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(2)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/10/19/3'}] | {'cwe_ids': ['CWE-693'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T21:20:21Z', 'nvd_published_at': '2022-10-19T16:15:00Z'} |
1.4.0 | GHSA-hhq3-ff78-jv3g | 2022-11-22T22:52:15Z | 2022-10-12T12:00:27Z | null | ['CVE-2022-37599'] | loader-utils is vulnerable to Regular Expression Denial of Service (ReDoS) | A regular expression denial of service (ReDoS) flaw was found in Function interpolateName in interpolateName.js in webpack loader-utils via the resourcePath variable in interpolateName.js. A badly or maliciously formed string could be used to send crafted requests that cause a system to crash or take a disproportional ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'loader-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.4.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'loader-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.4'}]}]}, {'package': {'eco... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37599'}, {'type': 'WEB', 'url': 'https://github.com/webpack/loader-utils/issues/211'}, {'type': 'WEB', 'url': 'https://github.com/webpack/loader-utils/issues/216'}, {'type': 'WEB', 'url': 'https://github.com/webpack/loader-utils/commit/17cbf8fa8989... | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-15T21:03:46Z', 'nvd_published_at': '2022-10-11T19:15:00Z'} |
1.4.0 | GHSA-35rx-7pc8-6963 | 2022-12-16T19:45:04Z | 2022-10-19T19:00:18Z | null | ['CVE-2022-43419'] | API keys stored in plain text by Jenkins Katalon Plugin | Katalon Plugin 1.0.32 and earlier stores API keys unencrypted in job `config.xml` files on the Jenkins controller as part of its configuration.
These API keys can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
Katalon Plugin 1.0.33 no longer stores the API keys ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:katalon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.33'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43419'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/katalon-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2846'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/202... | {'cwe_ids': ['CWE-256', 'CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T20:27:38Z', 'nvd_published_at': '2022-10-19T16:15:00Z'} |
1.4.0 | GHSA-4m5p-5w5w-3jcf | 2022-10-12T20:13:46Z | 2022-10-12T20:13:46Z | null | [] | com.enonic.xp:lib-auth vulnerable to Session Fixation | ### Impact
All id-providers using lib-auth `login` method. lib-auth should invalidate old session after login and replicate session attributes in a new one, however this is not the behavior in affected versions.
### Workarounds
Don't use lib-auth for `login`.
Java API uses low-level structures and allows to invalidat... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'com.enonic.xp:lib-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.7.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/enonic/xp/security/advisories/GHSA-4m5p-5w5w-3jcf'}, {'type': 'WEB', 'url': 'https://github.com/enonic/xp/issues/9253'}, {'type': 'WEB', 'url': 'https://github.com/enonic/xp/commit/0189975691e9e6407a9fee87006f730e84f734ff'}, {'type': 'WEB', 'url': 'https://github.com/enonic/x... | {'cwe_ids': ['CWE-384'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-12T20:13:46Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vhwv-8897-jm7q | 2022-12-16T19:56:42Z | 2022-10-19T19:00:18Z | null | ['CVE-2022-43430'] | XXE vulnerability in Jenkins Compuware Topaz for Total Test Plugin | Compuware Topaz for Total Test Plugin 2.4.8 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
This allows attackers able to control the input files for the 'Topaz for Total Test - Execute Total Test scenarios' build step to have Jenkins parse a crafted XML document that uses e... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.compuware.jenkins:compuware-topaz-for-total-test'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43430'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/compuware-topaz-for-total-test-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2625'}, {'type': 'WEB', 'url': 'http://www.openwall.com... | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T21:22:06Z', 'nvd_published_at': '2022-10-19T16:15:00Z'} |
1.4.0 | GHSA-93m7-c69f-5cfj | 2022-10-07T07:20:03Z | 2022-10-07T07:20:03Z | null | ['CVE-2020-25614'] | xmlquery lacks check for whether LoadURL response is in XML format, causing denial of service | xmlquery before 1.3.1 lacks a check for whether a LoadURL response is in the XML format, which allows attackers to cause a denial of service (SIGSEGV) at xmlquery.(*Node).InnerText or possibly have unspecified other impact. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/antchfx/xmlquery'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25614'}, {'type': 'WEB', 'url': 'https://github.com/antchfx/xmlquery/issues/39'}, {'type': 'WEB', 'url': 'https://github.com/antchfx/xmlquery/commit/5648b2f39e8d5d3fc903c45a4f1274829df71821'}, {'type': 'PACKAGE', 'url': 'https://github.com/antchfx/... | {'cwe_ids': ['CWE-119', 'CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-07T07:20:03Z', 'nvd_published_at': '2020-09-16T15:15:00Z'} |
1.4.0 | GHSA-824x-jcxf-hpfg | 2022-10-14T16:15:11Z | 2022-10-14T12:00:17Z | null | ['CVE-2022-3457'] | Origin Validation Error in rdiffweb | ikus060/rdiffweb prior to 2.5.0a5 did not enforce origin validation in web traffic. Users are advised to upgrade to version 2.5.0a5. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0a5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3457'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/afc1bdfab5161c74012ff2590a6ec49cc0d8fde0'}, {'type': 'WEB', 'url': 'https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Origin'}, {'type': 'PACKAGE', 'url': 'https://g... | {'cwe_ids': ['CWE-346'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-14T16:10:12Z', 'nvd_published_at': '2022-10-13T20:15:00Z'} |
1.4.0 | GHSA-mxrx-fg8p-5p5j | 2022-10-21T13:03:47Z | 2022-10-18T19:57:50Z | null | ['CVE-2022-39267'] | Bifrost vulnerable to authentication check flaw that leads to authentication bypass | ### Impact
The admin and monitor user groups need to be authenticated by username and password. If we delete the X-Requested-With: XMLHttpRequest field in the request header,the authentication will be bypassed.
### Patches
https://github.com/brockercap/Bifrost/pull/201
### Workarounds
Upgrade to the latest version | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/brokercap/Bifrost'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.7-release'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/brokercap/Bifrost/security/advisories/GHSA-mxrx-fg8p-5p5j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39267'}, {'type': 'WEB', 'url': 'https://github.com/brockercap/Bifrost/pull/201'}, {'type': 'WEB', 'url': 'https://github.com/brokercap/Bifrost/... | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-18T19:57:50Z', 'nvd_published_at': '2022-10-19T13:15:00Z'} |
1.4.0 | GHSA-qpv8-4pjq-qqh7 | 2023-01-10T16:00:54Z | 2022-10-26T12:00:28Z | null | ['CVE-2022-2422'] | feathers-sequelize contains improper input validation leading to SQL injection | Due to improper input validation in the Feathers js library, it is possible to perform a SQL injection attack on the back-end database, in case the feathers-sequelize package is used. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'feathers-sequelize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.3.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2422'}, {'type': 'WEB', 'url': 'https://github.com/feathersjs-ecosystem/feathers-sequelize/commit/0f2d85f0b2d556f2b6c70423dcebdbd29d95e3dc'}, {'type': 'WEB', 'url': 'https://csirt.divd.nl/CVE-2022-2422'}, {'type': 'WEB', 'url': 'https://csirt.divd.... | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-31T18:43:12Z', 'nvd_published_at': '2022-10-26T10:15:00Z'} |
1.4.0 | GHSA-h479-2mv4-5c26 | 2022-10-13T20:10:05Z | 2022-10-11T20:45:42Z | null | ['CVE-2022-39298'] | melisplatform/melis-front vulnerable to deserialization of untrusted data | ### Impact
Attackers can deserialize arbitrary data on affected versions of `melisplatform/melis-front`, and ultimately leads to the execution of arbitrary PHP code on the system. Conducting this attack does not require authentication.
Users should immediately upgrade to `melisplatform/melis-front` >= 5.0.1.
### Pat... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'melisplatform/melis-front'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/melisplatform/melis-front/security/advisories/GHSA-h479-2mv4-5c26'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39298'}, {'type': 'WEB', 'url': 'https://github.com/melisplatform/melis-front/commit/89ae612d5f1f7aa2fb621ee8de27dffe1feb851e'}, {'type'... | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-11T20:45:42Z', 'nvd_published_at': '2022-10-12T23:15:00Z'} |
1.4.0 | GHSA-qrw5-5h28-6cmg | 2023-09-05T20:17:54Z | 2022-10-16T12:00:23Z | null | ['CVE-2022-41323'] | Django denial-of-service vulnerability in internationalized URLs | In Django 3.2 before 3.2.16, 4.0 before 4.0.8, and 4.1 before 4.1.2, internationalized URLs were subject to a potential denial of service attack via the locale parameter, which is treated as a regular expression. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2'}, {'fixed': '3.2.16'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41323'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/5b6b257fa7ec37ff27965358800c67e2dd11c924'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/4.0/releases/security/'}, {'type': 'PACKAGE', 'url': 'https://github.com/... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-18T17:10:24Z', 'nvd_published_at': '2022-10-16T06:15:00Z'} |
1.4.0 | GHSA-69ch-w2m2-3vjp | 2022-10-28T20:11:26Z | 2022-10-14T19:00:40Z | null | ['CVE-2022-32149'] | Denial of service in golang.org/x/text/language | The BCP 47 tag parser has quadratic time complexity due to inherent aspects of its design. Since the parser is, by design, exposed to untrusted user input, this can be leveraged to force a program to consume significant time parsing Accept-Language headers. The parser cannot be easily rewritten to fix this behavior for... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'golang.org/x/text/language'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.8'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'golang.org/x/text'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-32149'}, {'type': 'WEB', 'url': 'https://github.com/golang/go/issues/56152'}, {'type': 'WEB', 'url': 'https://github.com/golang/text/commit/434eadcdbc3b0256971992e8c70027278364c72c'}, {'type': 'PACKAGE', 'url': 'https://github.com/golang/text'}, {'... | {'cwe_ids': ['CWE-772'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-28T20:11:26Z', 'nvd_published_at': '2022-10-14T15:15:00Z'} |
1.4.0 | GHSA-m678-f26j-3hrp | 2023-07-14T21:55:24Z | 2022-10-26T22:07:00Z | null | ['CVE-2022-39286'] | Execution with Unnecessary Privileges in JupyterApp | ### Impact
_What kind of vulnerability is it? Who is impacted?_
We’d like to disclose an arbitrary code execution vulnerability in `jupyter_core` that stems from `jupyter_core` executing untrusted files in the current working directory. This vulnerability allows one user to run code as another.
### Patches
_Has the p... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'jupyter-core'}, 'ecosystem_specific': {'affected_functions': ['jupyter_core.application.JupyterApp.config_file_paths']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.11.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/jupyter/jupyter_core/security/advisories/GHSA-m678-f26j-3hrp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39286'}, {'type': 'WEB', 'url': 'https://github.com/jupyter/jupyter_core/commit/1118c8ce01800cb689d51f655f5ccef19516e283'}, {'type': 'PACKAGE... | {'cwe_ids': ['CWE-250', 'CWE-269', 'CWE-427'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-26T22:07:00Z', 'nvd_published_at': '2022-10-26T20:15:00Z'} |
1.4.0 | GHSA-fc4h-xcf3-qj5f | 2022-10-25T20:22:19Z | 2022-10-25T20:22:19Z | null | [] | matrix-sdk 0.6.0 logs access tokens | When sending Matrix requests using an affected version of `matrix-sdk` in an application that writes logs using `tracing-subscriber` (in a way that includes fields of tracing spans such as `tracing_subscriber`s default text output from the `fmt` module), these logs will contain the user's access token.
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'matrix-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.6.0'}, {'fixed': '0.6.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-rust-sdk/issues/1110'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/matrix-rust-sdk'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0062.html'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T20:22:19Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x58j-j539-w8mv | 2023-08-03T22:54:04Z | 2022-10-24T19:00:20Z | 2023-08-03T22:53:44Z | ['CVE-2021-46849'] | Duplicate Advisory: Improper Restriction of XML External Entity Reference in pikepdf | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-29421, GHSA-ccgm-3xw4-h5p8. Reason: This candidate is a duplicate of CVE-2021-29421. Notes: All CVE users should reference CVE-2021-29421 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accident... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pikepdf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '2.10.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46849'}, {'type': 'WEB', 'url': 'https://bugs.gentoo.org/779475'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-ccgm-3xw4-h5p8'}, {'type': 'WEB', 'url': 'https://github.com/pikepdf/pikepdf/blob/v2.10.0/docs/release_notes.rst#v210... | {'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T22:53:44Z', 'nvd_published_at': '2022-10-24T14:15:00Z'} |
1.4.0 | GHSA-3rfm-jhwj-7488 | 2022-11-15T21:26:42Z | 2022-10-14T19:00:38Z | null | ['CVE-2022-37603'] | loader-utils is vulnerable to Regular Expression Denial of Service (ReDoS) via url variable | A Regular expression denial of service (ReDoS) flaw was found in Function interpolateName in interpolateName.js in webpack loader-utils 2.0.0 via the url variable in interpolateName.js. A badly or maliciously formed string could be used to send crafted requests that cause a system to crash or take a disproportional amo... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'loader-utils'}, 'ecosystem_specific': {'affected_functions': ['loader-utils.interpolateName']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.4.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'loader-utils'}, 'ecosystem_specific': {'affect... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37603'}, {'type': 'WEB', 'url': 'https://github.com/webpack/loader-utils/issues/213'}, {'type': 'WEB', 'url': 'https://github.com/webpack/loader-utils/issues/216'}, {'type': 'WEB', 'url': 'https://github.com/webpack/loader-utils/commit/17cbf8fa8989... | {'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-15T21:26:09Z', 'nvd_published_at': '2022-10-14T16:15:00Z'} |
1.4.0 | GHSA-77xx-rxvh-q682 | 2023-01-11T22:59:28Z | 2022-10-06T18:52:05Z | null | ['CVE-2022-41853'] | HyperSQL DataBase vulnerable to remote code execution when processing untrusted input | Those using `java.sql.Statement` or `java.sql.PreparedStatement` in hsqldb (HyperSQL DataBase) to process untrusted input may be vulnerable to a remote code execution attack. By default it is allowed to call any static method of any Java class in the classpath resulting in code execution. The issue can be prevented by ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.hsqldb:hsqldb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41853'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50212#c7'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/12/msg00020.html'}, {'type': 'PACKAGE', 'url': 'https://sourceforge.net/pro... | {'cwe_ids': ['CWE-470'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-06T21:16:51Z', 'nvd_published_at': '2022-10-06T18:17:00Z'} |
1.4.0 | GHSA-vf5v-6wjm-vr7v | 2022-12-16T19:52:40Z | 2022-10-19T19:00:22Z | null | ['CVE-2022-43425'] | Stored XSS vulnerability in Jenkins Custom Checkbox Parameter Plugin | Custom Checkbox Parameter Plugin 1.4 and earlier does not escape the name and description of the parameter types it provides.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Exploitation of this vulnerability requires that parameters are liste... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:custom-checkbox-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43425'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/custom-checkbox-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2797'}, {'type': 'WEB', 'url': 'http://www.openwall.com/list... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T22:01:53Z', 'nvd_published_at': '2022-10-19T16:15:00Z'} |
1.4.0 | GHSA-w8xw-7crf-h23x | 2022-10-21T16:07:23Z | 2022-10-16T12:00:23Z | null | ['CVE-2022-42968'] | Gitea vulnerable to Argument Injection | Gitea before 1.17.3 does not sanitize and escape refs in the git backend. Arguments to git commands are mishandled. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/go-gitea/gitea'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.17.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42968'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/21463'}, {'type': 'PACKAGE', 'url': 'https://github.com/go-gitea/gitea'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/releases/tag/v1.17.3'}, {'type': 'WEB', 'url... | {'cwe_ids': ['CWE-88'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-21T16:07:23Z', 'nvd_published_at': '2022-10-16T04:15:00Z'} |
1.4.0 | GHSA-h8g9-6gvh-5mrc | 2022-10-06T23:12:38Z | 2022-10-06T23:12:38Z | null | [] | etcd vulnerable to TOCTOU of gateway endpoint authentication | ### Vulnerability type
Authentication
### Workarounds
Refer to the [gateway documentation](https://github.com/etcd-io/etcd/blob/master/Documentation/op-guide/gateway.md). The vulnerability was spotted due to unclear documentation of how the gateway handles endpoints validation.
### Detail
The gateway only authentica... | [] | [{'package': {'ecosystem': 'Go', 'name': 'go.etcd.io/etcd/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.4.0'}, {'fixed': '3.4.10'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'go.etcd.io/etcd/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.23'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/etcd-io/etcd/security/advisories/GHSA-h8g9-6gvh-5mrc'}, {'type': 'PACKAGE', 'url': 'https://github.com/etcd-io/etcd'}] | {'cwe_ids': ['CWE-367'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-10-06T23:12:38Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rj5f-vm79-5j84 | 2022-10-19T22:21:33Z | 2022-10-19T19:00:24Z | null | ['CVE-2022-3607'] | OctoPrint vulnerable to Special Element Injection | OctoPrint prior to 1.8.3 is vulnerable to Special Element Injection. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'OctoPrint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3607'}, {'type': 'WEB', 'url': 'https://github.com/octoprint/octoprint/commit/3cca3a43f3d085e9bbe5a5840c8255bb1b5d052e'}, {'type': 'PACKAGE', 'url': 'https://github.com/octoprint/octoprint'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory... | {'cwe_ids': ['CWE-74', 'CWE-75'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T22:21:33Z', 'nvd_published_at': '2022-10-19T13:15:00Z'} |
1.4.0 | GHSA-5p8w-2mvw-38pv | 2022-10-14T19:48:04Z | 2022-10-12T22:05:44Z | null | ['CVE-2022-39300'] | Signature bypass via multiple root elements | ### Impact
A remote attacker may be able to bypass SAML authentication on a website using passport-saml. A successful attack requires that the attacker is in possession of an arbitrary IDP signed XML element. Depending on the IDP used, fully unauthenticated attacks (e.g without access to a valid user) might also be fe... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'node-saml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0-beta.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/node-saml/node-saml/security/advisories/GHSA-5p8w-2mvw-38pv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39300'}, {'type': 'WEB', 'url': 'https://github.com/node-saml/node-saml/commit/c1f275c289c01921e58f5c70ce0fdbc5287e5fbe'}, {'type': 'PACKAGE',... | {'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-12T22:05:44Z', 'nvd_published_at': '2022-10-13T22:15:00Z'} |
1.4.0 | GHSA-cr84-xvw4-qx3c | 2022-10-31T16:02:55Z | 2022-10-25T22:27:32Z | null | ['CVE-2022-25918'] | Inefficient Regular Expression Complexity in shescape | ### Impact
This impacts users that use shescape to escape arguments:
- for the Unix shell Bash, or any not-officially-supported Unix shell;
- using the `escape` or `escapeAll` functions with the `interpolation` option set to `true`.
An attacker can cause polynomial backtracking in terms of the input string length du... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'shescape'}, 'ecosystem_specific': {'affected_functions': ['shescape.escapeAll']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.10'}, {'fixed': '1.6.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ericcornelissen/shescape/security/advisories/GHSA-cr84-xvw4-qx3c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25918'}, {'type': 'WEB', 'url': 'https://github.com/ericcornelissen/shescape/commit/552e8eab56861720b1d4e5474fb65741643358f9'}, {'type': ... | {'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T22:27:32Z', 'nvd_published_at': '2022-10-27T10:15:00Z'} |
1.4.0 | GHSA-mf2h-6mg2-px9x | 2022-11-10T22:39:38Z | 2022-10-06T18:52:04Z | 2022-11-10T22:39:38Z | ['CVE-2022-40158'] | JXPath Out-of-bounds Write vulnerability | ## Withdrawn
This advisory has been withdrawn because the original report was found to be invalid. This link is maintained to preserve external references.
## Original Description
Those using JXPath to interpret XPath may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied inp... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'commons-jxpath:commons-jxpath'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40158'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47058'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/commons-jxpath'}] | {'cwe_ids': ['CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-10T20:56:49Z', 'nvd_published_at': '2022-10-06T18:16:00Z'} |
1.4.0 | GHSA-9jjw-hf72-3mxw | 2022-10-07T07:22:33Z | 2022-10-07T07:22:33Z | null | ['CVE-2020-26269'] | TensorFlow vulnerable to heap out of bounds read in filesystem glob matching | ### Impact
The general implementation for matching filesystem paths to globbing pattern is vulnerable to an access out of bounds of [the array holding the directories](https://github.com/tensorflow/tensorflow/blob/458c6260265c46ebaf18052d6c61aea4b6b40926/tensorflow/core/platform/file_system_helper.cc#L127):
```cc
if (... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0rc0'}, {'fixed': '2.4.0'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0rc0'}, {'fixed': '2.4.0'}]}]}, {'package... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9jjw-hf72-3mxw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26269'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/pull/40861'}, {'type': 'WEB', 'url': 'https://github.com/tensorflo... | {'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-07T07:22:33Z', 'nvd_published_at': '2020-12-10T23:15:00Z'} |
1.4.0 | GHSA-7fj2-rrq6-rphq | 2022-10-14T19:45:43Z | 2022-10-11T20:46:33Z | null | ['CVE-2022-39296'] | melisplatform/melis-asset-manager vulnerable to Path Traversal | ### Impact
Attackers can read arbitrary files on affected versions of `melisplatform/melis-asset-manager`, leading to the disclosure of sensitive information. Conducting this attack does not require authentication.
Users should immediately upgrade to `melisplatform/melis-asset-manager` >= 5.0.1.
### Patches
This is... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'melisplatform/melis-asset-manager'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/melisplatform/melis-asset-manager/security/advisories/GHSA-7fj2-rrq6-rphq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39296'}, {'type': 'WEB', 'url': 'https://github.com/melisplatform/melis-asset-manager/commit/a0f75918c049aff78953a0bc91c58515359... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-11T20:46:33Z', 'nvd_published_at': '2022-10-11T18:15:00Z'} |
1.4.0 | GHSA-mf4p-wjrm-cmjp | 2022-12-16T19:53:45Z | 2022-10-19T19:00:18Z | null | ['CVE-2022-43426'] | AWS secrets displayed without masking by Jenkins S3 Explorer Plugin | S3 Explorer Plugin stores AWS_SECRET_ACCESS_KEY in its global configuration file `s3explorer.xml` on the Jenkins controller as part of its configuration.
While this secret is stored encrypted on disk, in S3 Explorer Plugin 1.0.8 and earlier the global configuration form does not mask the AWS_SECRET_ACCESS_KEY form fie... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:s3explorer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43426'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/s3explorer-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2480'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/... | {'cwe_ids': ['CWE-549'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T21:22:54Z', 'nvd_published_at': '2022-10-19T16:15:00Z'} |
1.4.0 | GHSA-9gp7-6833-wv89 | 2022-10-06T23:18:35Z | 2022-10-06T23:18:35Z | null | [] | etcd having a negative value for cluster node size results in an index out-of-bound panic during service discovery | ### Vulnerability type
Data Validation
### Detail
When an etcd instance attempts to perform service discovery, if a cluster size is provided as a negative value, the etcd instance will panic without recovery.
### References
Find out more on this vulnerability in the [security audit report](https://github.com/etcd-io/... | [] | [{'package': {'ecosystem': 'Go', 'name': 'go.etcd.io/etcd/client/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.4.0'}, {'fixed': '3.4.10'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'go.etcd.io/etcd/client/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.23'}]... | [{'type': 'WEB', 'url': 'https://github.com/etcd-io/etcd/security/advisories/GHSA-9gp7-6833-wv89'}, {'type': 'PACKAGE', 'url': 'https://github.com/etcd-io/etcd'}] | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-10-06T23:18:35Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c6hx-pjc3-7fqr | 2022-10-13T20:08:57Z | 2022-10-10T21:23:30Z | null | ['CVE-2022-39271'] | Traefik HTTP/2 connections management could cause a denial of service | ### Impact
There is a potential vulnerability in Traefik managing HTTP/2 connections.
A closing HTTP/2 server connection could hang forever because of a subsequent fatal error. This failure mode could be exploited to cause a denial of service.
### Patches
Traefik v2.8.x: https://github.com/traefik/traefik/releases/t... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/traefik/traefik/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.8'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/traefik/traefik/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0-rc1'}, {'fixed':... | [{'type': 'WEB', 'url': 'https://github.com/traefik/traefik/security/advisories/GHSA-c6hx-pjc3-7fqr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39271'}, {'type': 'PACKAGE', 'url': 'https://github.com/traefik/traefik'}, {'type': 'WEB', 'url': 'https://github.com/traefik/traefik/releases/tag... | {'cwe_ids': ['CWE-400', 'CWE-755'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-10T21:23:30Z', 'nvd_published_at': '2022-10-11T14:15:00Z'} |
1.4.0 | GHSA-c7mc-q43h-5672 | 2022-11-10T22:39:44Z | 2022-10-06T18:52:04Z | 2022-11-10T22:39:44Z | ['CVE-2022-40157'] | JXPath Out-of-bounds Write vulnerability | ## Withdrawn
This advisory has been withdrawn because the original report was found to be invalid. This link is maintained to preserve external references.
## Original Description
Those using JXPath to interpret XPath may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied inp... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'commons-jxpath:commons-jxpath'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40157'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47061'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/commons-jxpath'}] | {'cwe_ids': ['CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-10T20:57:35Z', 'nvd_published_at': '2022-10-06T18:16:00Z'} |
1.4.0 | GHSA-mqc2-w9r8-mmxm | 2022-10-22T01:13:25Z | 2022-10-19T19:00:21Z | null | ['CVE-2022-43402'] | Jenkins Pipeline: Groovy Plugin allows sandbox protection bypass and arbitrary code execution | A sandbox bypass vulnerability involving various casts performed implicitly by the Groovy language runtime in Jenkins Pipeline: Groovy Plugin 2802.v5ea_628154b_c2 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.workflow:workflow-cps'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2803.v1a_f77ffcc773'}]}], 'database_specific': {'last_known_affected_version_range': '< 2803.v1a'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43402'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(1)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/10/19/3'}] | {'cwe_ids': ['CWE-693'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T22:04:22Z', 'nvd_published_at': '2022-10-19T16:15:00Z'} |
1.4.0 | GHSA-9pgh-qqpf-7wqj | 2022-11-08T19:35:06Z | 2022-10-11T20:42:57Z | 2022-11-08T19:35:06Z | ['CVE-2022-37616'] | Withdrawn: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in @xmldom/xmldom and xmldom | ## Withdrawn
This advisory has been withdrawn because the maintainers of `@xmldom/xmldom` and multiple third parties disputed the validity of the issue. Attempts to create or replicate a proof of concept have been unsuccessful.
## Original Description
### Impact
A prototype pollution vulnerability exists in the func... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': '@xmldom/xmldom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8.0'}, {'fixed': '0.8.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'xmldom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.6.0'}]}]}, {'package': {'eco... | [{'type': 'WEB', 'url': 'https://github.com/xmldom/xmldom/security/advisories/GHSA-9pgh-qqpf-7wqj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37616'}, {'type': 'WEB', 'url': 'https://github.com/xmldom/xmldom/issues/436'}, {'type': 'WEB', 'url': 'https://github.com/xmldom/xmldom/issues/436#... | {'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-11T20:42:57Z', 'nvd_published_at': '2022-10-11T05:15:00Z'} |
1.4.0 | GHSA-jjmg-x456-w976 | 2022-10-10T20:59:02Z | 2022-10-10T20:59:02Z | null | [] | Incorrect default cookie name and recommendation | ### Impact
_What kind of vulnerability is it? Who is impacted?_
The default cookie name (and documentation recommendation) was prefixed with `Host__` instead of `__Host-`. The point of this prefix is for additional security, to ensure that, when no domain option is provided in the cookie options, we can guarantee the ... | [] | [{'package': {'ecosystem': 'npm', 'name': 'csrf-csrf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Psifi-Solutions/csrf-csrf/security/advisories/GHSA-jjmg-x456-w976'}, {'type': 'WEB', 'url': 'https://github.com/Psifi-Solutions/csrf-csrf/commit/8f1ce8db97d945a4bb7f39f0b43c6041fa83d675'}, {'type': 'PACKAGE', 'url': 'https://github.com/Psifi-Solutions/csrf-csrf'}] | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-10-10T20:59:02Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f2rj-m42r-6jm2 | 2023-08-30T09:52:10Z | 2022-10-25T20:22:29Z | null | ['CVE-2022-38580'] | Skipper vulnerable to SSRF via X-Skipper-Proxy | ### Impact
Skipper prior to version v0.13.236 is vulnerable to server-side request forgery (SSRF). An attacker can exploit a vulnerable version of proxy to access the internal metadata server or other unauthenticated URLs by adding an specific header (X-Skipper-Proxy) to the http request.
### Patches
The problem was ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/zalando/skipper'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.237'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/zalando/skipper/security/advisories/GHSA-f2rj-m42r-6jm2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38580'}, {'type': 'WEB', 'url': 'https://github.com/zalando/skipper/pull/2058'}, {'type': 'WEB', 'url': 'https://github.com/zalando/skipper/commit... | {'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T20:22:29Z', 'nvd_published_at': '2022-10-25T17:15:00Z'} |
1.4.0 | GHSA-4xqx-pqpj-9fqw | 2022-10-07T07:20:57Z | 2022-10-07T07:20:57Z | null | ['CVE-2020-14188'] | gajira-create GitHub action vulnerable to arbitrary code execution | ### Impact
An attacker can execute arbitrary code in the context of a GitHub runner by creating a specially crafted GitHub issue.
### Patches
This issue is patched in gajira-create version 2.0.1.
### Workarounds
There are no known workarounds.
### References
[GitHub Security Lab advisory GHSL-2020-172](https://secur... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'GitHub Actions', 'name': 'atlassian/gajira-create'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/atlassian/gajira-create/security/advisories/GHSA-4xqx-pqpj-9fqw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14188'}, {'type': 'PACKAGE', 'url': 'https://github.com/atlassian/gajira-create'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-07T07:20:57Z', 'nvd_published_at': '2020-11-09T22:15:00Z'} |
1.4.0 | GHSA-wrx5-rp7m-mm49 | 2023-03-06T22:41:22Z | 2022-10-06T18:52:05Z | 2023-03-06T22:41:22Z | ['CVE-2022-41852'] | Withdrawn: CVE Rejected: JXPath vulnerable to remote code execution when interpreting untrusted XPath expressions | ## This advisory has been withdrawn due to the CVE being rejected.
## Original advisory text
Those using JXPath to interpret untrusted XPath expressions may be vulnerable to a remote code execution attack. All JXPathContext class functions processing a XPath string are vulnerable except `compile()` and `compilePath()`... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'commons-jxpath:commons-jxpath'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41852'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47133'}, {'type': 'WEB', 'url': 'https://commons.apache.org/proper/commons-jxpath/users-guide.html#Standard_Extension_Functions'}, {'type': 'PACKAGE', 'url': 'ht... | {'cwe_ids': ['CWE-470'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-06T20:35:33Z', 'nvd_published_at': '2022-10-06T18:17:00Z'} |
1.4.0 | GHSA-w67g-6gjv-c599 | 2023-01-20T22:03:09Z | 2022-10-13T12:00:26Z | null | ['CVE-2022-42906'] | Powerline Gitstatus vulnerable to arbitrary code execution | powerline-gitstatus (aka Powerline Gitstatus) before 1.3.2 allows arbitrary code execution. git repositories can contain per-repository configuration that changes the behavior of git, including running arbitrary commands. When using powerline-gitstatus, changing to a directory automatically runs git commands in order t... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'powerline-gitstatus'}, 'ecosystem_specific': {'affected_functions': ['powerline_gitstatus.segments.GitStatusSegment.get_base_command']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42906'}, {'type': 'WEB', 'url': 'https://github.com/jaspernbrouwer/powerline-gitstatus/issues/45'}, {'type': 'WEB', 'url': 'https://github.com/jaspernbrouwer/powerline-gitstatus/commit/fe8e963b3489e4cceaa2c1f26f2bcc2ef405364c'}, {'type': 'PACKAGE',... | {'cwe_ids': ['CWE-77', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-13T19:13:14Z', 'nvd_published_at': '2022-10-13T03:15:00Z'} |
1.4.0 | GHSA-7v3g-4878-5qrf | 2022-10-13T20:09:08Z | 2022-10-12T12:00:21Z | null | ['CVE-2022-41606'] | Nomad Panics On Job Submission With Bad Artifact Stanza Source URL | HashiCorp Nomad and Nomad Enterprise 1.0.2 up to 1.2.12, and 1.3.5 jobs submitted with an artifact stanza using invalid S3 or GCS URLs can be used to crash client agents. Fixed in 1.2.13, 1.3.6, and 1.4.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.13'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.6'}... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41606'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2022-22-nomad-panics-on-job-submission-with-bad-artifact-stanza-source-url/45420'}, {'type': 'PACKAGE', 'url': 'https://... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-12T20:03:06Z', 'nvd_published_at': '2022-10-12T00:15:00Z'} |
1.4.0 | GHSA-g3q9-xf95-8hp5 | 2022-10-14T19:47:48Z | 2022-10-11T20:48:52Z | null | ['CVE-2022-41032'] | NuGet Elevation of Privilege Vulnerability | ## Description
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 7.0.0-rc, .NET 6.0, .NET Core 3.1, and NuGet (NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.Protocol). This advisory also provides guidance on what developers can do to update their applications to r... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'NuGet.Commands'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.6.0'}, {'fixed': '4.9.6'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.Commands'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.7.3'}]}]}, {'package... | [{'type': 'WEB', 'url': 'https://github.com/NuGet/NuGet.Client/security/advisories/GHSA-g3q9-xf95-8hp5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41032'}, {'type': 'WEB', 'url': 'https://github.com/NuGet/Announcements/issues/65'}, {'type': 'PACKAGE', 'url': 'https://github.com/NuGet/NuGet... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-11T20:48:52Z', 'nvd_published_at': '2022-10-11T19:15:00Z'} |
1.4.0 | GHSA-grv6-m753-3w2g | 2022-10-10T16:52:21Z | 2022-10-07T18:16:01Z | null | ['CVE-2022-3423'] | NocoDB vulnerable to Denial of Service | NocoDB prior to 0.92.0 allows actors to insert large characters into the input field `New Project` on the create field, which can cause a Denial of Service (DoS) via a crafted HTTP request. Version 0.92.0 fixes this issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'nocodb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.92.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3423'}, {'type': 'WEB', 'url': 'https://github.com/nocodb/nocodb/commit/000ecd886738b965b5997cd905825e3244f48b95'}, {'type': 'PACKAGE', 'url': 'https://github.com/nocodb/nocodb'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/94639d8e-8301-443... | {'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-07T21:55:42Z', 'nvd_published_at': '2022-10-07T11:15:00Z'} |
1.4.0 | GHSA-95w5-q9vp-5vrm | 2022-10-25T20:22:49Z | 2022-10-24T19:00:16Z | null | ['CVE-2021-42010'] | Heron allows CRLF log injection | Heron versions <= 0.20.4-incubating allows CRLF log injection because of the lack of escaping in the log statements. Please update to version 0.20.5-incubating which addresses this issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.heron:heron-api'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.20.5-incubating'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42010'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/j65nwr8n7jchngwqptzh100drcr4ry2q'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/10/23/2'}] | {'cwe_ids': ['CWE-116'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T20:22:49Z', 'nvd_published_at': '2022-10-24T14:15:00Z'} |
1.4.0 | GHSA-p658-8693-mhvg | 2023-02-15T19:32:29Z | 2022-10-07T07:23:51Z | null | ['CVE-2021-21271'] | Tendermint Core vulnerable to Uncontrolled Resource Consumption | ### Description
Tendermint Core v0.34.0 introduced a new way of handling evidence of misbehavior. As part of this, [we added a new `Timestamp` field to `Evidence` structs](https://github.com/tendermint/tendermint/pull/5219). This timestamp would be calculated using the same algorithm that is used when a block is crea... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/tendermint/tendermint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.34.0'}, {'fixed': '0.34.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/tendermint/tendermint/security/advisories/GHSA-p658-8693-mhvg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21271'}, {'type': 'WEB', 'url': 'https://github.com/tendermint/tendermint/commit/a2a6852ab99e4a0f9e79f0ea8c1726e262e25c76'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-07T07:23:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hrrm-895h-xh34 | 2022-10-07T13:07:05Z | 2022-10-06T18:52:04Z | null | ['CVE-2022-3389'] | rdiffweb Path Traversal vulnerability | rdiffweb prior to 2.4.10 is vulnerable to Path Traversal. Version 2.4.10 contains a patch. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3389'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/323383d1db656f1b1291be529947bd943a6b0e99'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-datab... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-06T20:10:47Z', 'nvd_published_at': '2022-10-06T18:16:00Z'} |
1.4.0 | GHSA-27rf-8mjp-r363 | 2022-12-16T16:31:10Z | 2022-10-19T19:00:21Z | null | ['CVE-2022-43404'] | Sandbox bypass vulnerabilities in Jenkins Script Security Plugin and in Pipeline: Groovy Plugin | Script Security Plugin provides a sandbox feature that allows low privileged users to define scripts, including Pipelines, that are generally safe to execute. Calls to code defined inside a sandboxed script are intercepted, and various allowlists are checked to determine whether the call is to be allowed.
Multiple san... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:script-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1184.v85d16b_d851b_3'}]}], 'database_specific': {'last_known_affected_version_range': '< 1184.v85d16b'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jen... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43404'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(1)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/10/19/3'}] | {'cwe_ids': ['CWE-693'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T22:04:13Z', 'nvd_published_at': '2022-10-19T16:15:00Z'} |
1.4.0 | GHSA-92gf-p376-6r9r | 2022-10-14T21:30:20Z | 2022-10-14T12:00:17Z | null | ['CVE-2022-3456'] | Missing rate limit on rdiffweb | Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffweb prior to 2.5.0. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3456'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/b78ec09f4582e363f6f449df6f987127e126c311'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b34412ca-50... | {'cwe_ids': ['CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-14T21:30:20Z', 'nvd_published_at': '2022-10-13T20:15:00Z'} |
1.4.0 | GHSA-m3m3-6gww-7gj9 | 2022-10-13T20:09:39Z | 2022-10-11T20:45:54Z | null | ['CVE-2022-39297'] | melisplatform/melis-cms vulnerable to deserialization of untrusted data | ### Impact
Attackers can deserialize arbitrary data on affected versions of `melisplatform/melis-cms`, and ultimately leads to the execution of arbitrary PHP code on the system. Conducting this attack does not require authentication.
Users should immediately upgrade to `melisplatform/melis-cms` >= 5.0.1.
### Patches... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'melisplatform/melis-cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/melisplatform/melis-cms/security/advisories/GHSA-m3m3-6gww-7gj9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39297'}, {'type': 'WEB', 'url': 'https://github.com/melisplatform/melis-cms/commit/d124b2474699a679a24ec52620cadceb3d4cec11'}, {'type': 'P... | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-11T20:45:54Z', 'nvd_published_at': '2022-10-12T23:15:00Z'} |
1.4.0 | GHSA-p8f7-22gq-m7j9 | 2022-10-20T20:12:38Z | 2022-10-17T12:00:27Z | null | ['CVE-2022-42975'] | Phoenix before 1.6.14 mishandles check_origin wildcarding | socket/transport.ex in Phoenix before 1.6.14 mishandles check_origin wildcarding. NOTE: LiveView applications are unaffected by default because of the presence of a LiveView CSRF token. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Hex', 'name': 'phoenix'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.14'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42975'}, {'type': 'WEB', 'url': 'https://github.com/phoenixframework/phoenix/commit/6e7185b33a59e0b1d1c0b4223adf340a73e963ae'}, {'type': 'PACKAGE', 'url': 'https://github.com/phoenixframework/phoenix'}, {'type': 'WEB', 'url': 'https://hexdocs.pm/ph... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-18T18:01:44Z', 'nvd_published_at': '2022-10-17T06:15:00Z'} |
1.4.0 | GHSA-5jp2-vwrj-99rf | 2022-12-27T22:03:26Z | 2022-10-19T20:26:05Z | null | ['CVE-2022-31683'] | Team scope authorization bypass when Post/Put request with :team_name in body, allows HTTP parameter pollution | ### Impact
For some Post/Put Concourse endpoint containing `:team_name` in the URL, a Concourse user can send a request with body including `:team_name=team2` to bypass team scope check to gain access to certain resources belong to any other team. The user only needs a valid user session and belongs to team2.
Exploita... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/concourse/concourse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.7.9'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/concourse/concourse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '... | [{'type': 'WEB', 'url': 'https://github.com/concourse/concourse/security/advisories/GHSA-5jp2-vwrj-99rf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31683'}, {'type': 'WEB', 'url': 'https://github.com/concourse/concourse/pull/8566'}, {'type': 'WEB', 'url': 'https://github.com/concourse/conc... | {'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T20:26:05Z', 'nvd_published_at': '2022-12-19T16:15:00Z'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.