schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
8
154
details
stringlengths
31
19.1k
severity
stringlengths
2
92
affected
stringlengths
75
28.5k
references
stringlengths
79
7.48k
database_specific
stringlengths
131
196
1.4.0
GHSA-3382-r9q8-4hfg
2022-08-12T12:53:18Z
2022-03-01T00:00:28Z
null
['CVE-2022-24685']
HashiCorp Nomad vulnerable to Allocation of Resources Without Limits or Throttling
HashiCorp Nomad and Nomad Enterprise 1.x before 1.0.17, 1.1.x before 1.1.12, and 1.2.x before 1.2.6 is vulnerable to Allocation of Resources Without Limits or Throttling.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.17'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24685'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2022-03-nomad-malformed-job-parsing-results-in-excessive-cpu-usage/'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp...
{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T22:07:53Z', 'nvd_published_at': '2022-02-28T14:15:00Z'}
1.4.0
GHSA-7x48-7466-3g33
2022-03-24T23:25:23Z
2022-03-18T00:01:11Z
null
['CVE-2021-23556']
Command injection in guake
Guake is a drop-down terminal for GNOME. The package guake before 3.8.5 is vulnerable to Exposed Dangerous Method or Function due to the exposure of execute_command and execute_command_by_uuid methods via the d-bus interface, which makes it possible for a malicious user to run an arbitrary command via the d-bus method....
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'guake'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23556'}, {'type': 'WEB', 'url': 'https://github.com/Guake/guake/issues/1796'}, {'type': 'WEB', 'url': 'https://github.com/Guake/guake/pull/2017'}, {'type': 'WEB', 'url': 'https://github.com/Guake/guake/pull/2017/commits/e3d671120bfe7ba28f50e256cc5e...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T22:40:30Z', 'nvd_published_at': None}
1.4.0
GHSA-8h2f-7jc4-7m3m
2022-03-14T21:10:46Z
2022-03-07T00:00:40Z
null
['CVE-2022-0868']
Open Redirect in urijs
urijs prior to version 1.19.10 is vulnerable to open redirect. This is the result of a bypass for the fix to CVE-2022-0613.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'urijs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.19.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0868'}, {'type': 'WEB', 'url': 'https://github.com/medialize/uri.js/commit/a8166fe02f3af6dc1b2b888dcbb807155aad9509'}, {'type': 'WEB', 'url': 'https://github.com/medialize/URI.js/releases/tag/v1.19.10'}, {'type': 'PACKAGE', 'url': 'https://github.c...
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-07T16:50:02Z', 'nvd_published_at': '2022-03-06T16:15:00Z'}
1.4.0
GHSA-674v-3g2w-84gx
2022-04-05T18:52:09Z
2022-03-29T00:01:15Z
null
['CVE-2021-46433']
Sandbox bypass in fenom
In fenom 2.12.1 and before, there is a way in fenom/src/Fenom/Template.php function getTemplateCode()to bypass sandbox to execute arbitrary PHP code when disable_native_funcs is true.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'fenom/fenom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.12.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46433'}, {'type': 'WEB', 'url': 'https://github.com/fenom-template/fenom/issues/331'}, {'type': 'PACKAGE', 'url': 'https://github.com/fenom-template/fenom'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-30T19:57:38Z', 'nvd_published_at': '2022-03-28T11:15:00Z'}
1.4.0
GHSA-7v5r-r995-q2x2
2022-03-24T23:23:21Z
2022-03-12T00:00:34Z
null
['CVE-2022-0870']
SSRF in repository migration
Gogs is a self-hosted Git service. The malicious user is able to discover services in the internal network through repository migration functionality. All installations accepting public traffic are affected. Internal network CIDRs are prohibited to be used as repository migration targets. Users should upgrade to 0.12.5...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'gogs.io/gogs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0870'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/commit/91f2cde5e95f146bfe4765e837e7282df6c7cabb'}, {'type': 'PACKAGE', 'url': 'https://github.com/gogs/gogs'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/327797d7-ae41-498f-9bff-c...
{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T22:57:02Z', 'nvd_published_at': '2022-03-11T11:15:00Z'}
1.4.0
GHSA-8m2f-74r2-x3f2
2022-03-18T22:41:34Z
2022-03-18T00:01:10Z
null
['CVE-2022-25760']
Code injection in accesslog
All versions of package accesslog are vulnerable to Arbitrary Code Injection due to the usage of the Function constructor without input sanitization. If (attacker-controlled) user input is given to the format option of the package's exported constructor function, it is possible for an attacker to execute arbitrary Java...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'accesslog'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25760'}, {'type': 'PACKAGE', 'url': 'https://github.com/carlos8f/node-accesslog'}, {'type': 'WEB', 'url': 'https://github.com/carlos8f/node-accesslog/blob/master/lib/compile.js%23L6'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ACCESSLOG-...
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T22:41:34Z', 'nvd_published_at': '2022-03-17T12:15:00Z'}
1.4.0
GHSA-2q4g-wfm6-5fpm
2023-08-09T13:16:40Z
2022-03-30T00:00:20Z
null
['CVE-2022-22934']
SaltStack Improper Verification of Cryptographic Signature
An issue was discovered in SaltStack Salt in versions before 3002.8, 3003.4, 3004.1. Salt Masters do not sign pillar data with the minion’s public key, which can result in attackers substituting arbitrary pillar data.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'salt'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3002.8'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'salt'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'EC...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22934'}, {'type': 'WEB', 'url': 'https://blog.cloudflare.com/future-proofing-saltstack/'}, {'type': 'WEB', 'url': 'https://github.com/saltstack/salt/releases'}]
{'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-09T13:16:40Z', 'nvd_published_at': '2022-03-29T17:15:00Z'}
1.4.0
GHSA-f897-875p-23x7
2022-03-28T22:33:35Z
2022-03-12T00:00:37Z
null
['CVE-2022-25510']
Hard coded credentials in FreeTAKServer
FreeTAKServer 1.9.8 contains a hardcoded Flask secret key which allows attackers to create crafted cookies to bypass authentication or escalate privileges.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'FreeTAKServer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.8.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.9.8'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25510'}, {'type': 'WEB', 'url': 'https://github.com/FreeTAKTeam/FreeTakServer/issues/292'}, {'type': 'PACKAGE', 'url': 'https://github.com/FreeTAKTeam/FreeTakServer'}]
{'cwe_ids': ['CWE-798'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T23:16:48Z', 'nvd_published_at': '2022-03-11T00:15:00Z'}
1.4.0
GHSA-2cv6-6437-39p2
2022-03-22T20:03:39Z
2022-03-13T00:00:53Z
null
['CVE-2022-0930']
Cross-site Scripting in microweber
File upload filter bypass leading to stored XSS in GitHub repository microweber/microweber prior to 1.2.12.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0930'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/33eb4cc0f80c1f86388c1862a8aee1061fa5d72e'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T22:54:13Z', 'nvd_published_at': '2022-03-12T14:15:00Z'}
1.4.0
GHSA-9rr6-jpg7-9jg6
2022-03-15T21:32:40Z
2022-03-11T00:02:36Z
null
['CVE-2021-38296']
Authentication Bypass by Capture-replay in Apache Spark
Apache Spark supports end-to-end encryption of RPC connections via "spark.authenticate" and "spark.network.crypto.enabled". In versions 3.1.2 and earlier, it uses a bespoke mutual authentication protocol that allows for full encryption key recovery. After an initial interactive attack, this would allow someone to decry...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38296'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9rr6-jpg7-9jg6'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/pyspark/PYSEC-2022-186.yaml'}, {'type': 'WEB', 'url': 'https://lists.apache...
{'cwe_ids': ['CWE-294'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-11T20:30:09Z', 'nvd_published_at': '2022-03-10T09:15:00Z'}
1.4.0
GHSA-8cxw-wvhc-p4x4
2022-10-21T13:00:27Z
2022-10-19T19:00:22Z
null
['CVE-2022-43414']
Jenkins NUnit Plugin vulnerable to Protection Mechanism Failure
Jenkins NUnit Plugin 0.27 and earlier implements an agent-to-controller message that parses files inside a user-specified directory as test results, allowing attackers able to control agent processes to obtain test results from files in an attacker-specified directory on the Jenkins controller. NUnit Plugin 0.28 change...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:nunit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.28'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.27'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43414'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2551'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/10/19/3'}]
{'cwe_ids': ['CWE-693'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T22:24:14Z', 'nvd_published_at': '2022-10-19T16:15:00Z'}
1.4.0
GHSA-4vf4-955g-vxp2
2022-10-18T19:52:25Z
2022-10-18T19:52:25Z
null
['CVE-2022-31037']
OroCommerce Cross site scripting vulnerability during shipping rule editing for UPS integration
### Impact Shipping rule edit page is vulnerable to cross site scripting (XSS) payload added to UPS Surcharge field. The attacker should have permission to create or edit a shipping rule.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'oro/commerce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '5.0.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/oroinc/orocommerce/security/advisories/GHSA-4vf4-955g-vxp2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31037'}, {'type': 'PACKAGE', 'url': 'https://github.com/oroinc/orocommerce'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-18T19:52:25Z', 'nvd_published_at': '2022-10-18T10:15:00Z'}
1.4.0
GHSA-h423-w6qv-2wj3
2022-10-18T16:08:49Z
2022-10-18T16:08:49Z
null
['CVE-2022-39313']
parse-server crashes when receiving file download request with invalid byte range
### Impact Parse Server crashes when a file download request is received with an invalid byte range. ### Patches Improved parsing of the range parameter to properly handle invalid range requests. ### Workarounds None ### References - [GHSA-h423-w6qv-2wj3](https://github.com/parse-community/parse-server/security/...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.10.17'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges'...
[{'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/security/advisories/GHSA-h423-w6qv-2wj3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39313'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/commit/066f29673ab4030b6b5b90c0c0326f7d3fe7612a'}, {...
{'cwe_ids': ['CWE-1284', 'CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-18T16:08:49Z', 'nvd_published_at': '2022-10-24T14:15:00Z'}
1.4.0
GHSA-3q8r-f3pj-3gc4
2022-10-10T16:54:10Z
2022-10-07T18:16:01Z
null
['CVE-2022-41672']
Apache Airflow may allow authenticated users who have been deactivated to continue using the UI or API
In Apache Airflow, prior to version 2.4.1, deactivating a user wouldn't prevent an already authenticated user from being able to continue using the UI or API.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41672'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/26635'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/ohf3pvd3dftb8zb01yngbn1jtkq5m08y'}]
{'cwe_ids': ['CWE-285', 'CWE-613'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-07T21:57:35Z', 'nvd_published_at': '2022-10-07T07:15:00Z'}
1.4.0
GHSA-4r9g-w48q-8jwm
2022-11-03T19:32:34Z
2022-10-26T12:00:29Z
null
['CVE-2022-25849']
HyperDown vulnerable to Cross-site Scripting
HyperDown is a markdown parser written for the Chinese website SegmentFault. Improper validation of the href attribute allows for Cross-site Scripting. At publication there are no patched versions, and no known workarounds.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'joyqi/hyper-down'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4.27'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25849'}, {'type': 'PACKAGE', 'url': 'https://github.com/SegmentFault/HyperDown'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-PHP-JOYQIHYPERDOWN-2953544'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-26T22:42:45Z', 'nvd_published_at': '2022-10-26T05:15:00Z'}
1.4.0
GHSA-4mjx-2gh5-ph8h
2022-10-10T21:07:47Z
2022-10-10T21:07:47Z
null
['CVE-2022-39292']
Exposure of sensitive Slack webhook URLs in debug logs and traces
### Impact Debug logs expose sensitive URLs for Slack webhooks that contain private information. ### Patches The problem is fixed in v1.3.2 which redacts sensitive URLs for webhooks. ### Workarounds Disabling/filtering debug logs in case you use Slack webhooks using tracing log level and filters. ### References htt...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'slack-morphism'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/abdolence/slack-morphism-rust/security/advisories/GHSA-4mjx-2gh5-ph8h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39292'}, {'type': 'WEB', 'url': 'https://github.com/abdolence/slack-morphism-rust/commit/48a1da2dc2ad3a5ccc60036d43f6f8fbb2c15f1d'},...
{'cwe_ids': ['CWE-1258'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-10T21:07:47Z', 'nvd_published_at': '2022-10-10T15:15:00Z'}
1.4.0
GHSA-38hf-c37x-32hv
2022-10-06T20:00:30Z
2022-10-04T00:00:25Z
null
['CVE-2022-40922']
LIEF vulnerable to denial of service through segmentation fault
A vulnerability in the LIEF::MachO::BinaryParser::init_and_parse function of LIEF v0.12.1 allows attackers to cause a denial of service (DOS) through a segmentation fault via a crafted MachO file. A [patch](https://github.com/lief-project/LIEF/commit/fde2c48986739fabd2cf9b40b9af149a89c57850) for this issue is available...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'lief'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.12.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40922'}, {'type': 'WEB', 'url': 'https://github.com/lief-project/LIEF/issues/781'}, {'type': 'WEB', 'url': 'https://github.com/lief-project/LIEF/commit/ad811916670e83947560b6f3c45df6e71d3885af'}, {'type': 'WEB', 'url': 'https://github.com/lief-proj...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-06T20:00:30Z', 'nvd_published_at': '2022-10-03T13:15:00Z'}
1.4.0
GHSA-hvcr-927w-qcvq
2022-12-16T19:46:12Z
2022-10-19T19:00:18Z
null
['CVE-2022-43420']
Stored XSS vulnerability in Jenkins Contrast Continuous Application Security Plugin
Contrast Continuous Application Security Plugin 3.9 and earlier does not escape data returned from the Contrast service when generating a report. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control or modify Contrast service API responses. Contrast Continuous App...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:contrast-continuous-application-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.9'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43420'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/contrast-continuous-application-security-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2836'}, {'type': 'WEB', 'url': 'http://www.op...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T21:23:37Z', 'nvd_published_at': '2022-10-19T16:15:00Z'}
1.4.0
GHSA-73v5-w6fg-2m44
2022-10-21T13:00:02Z
2022-10-19T19:00:22Z
null
['CVE-2022-43421']
Jenkins Tuleap Git Branch Source Plugin allows unauthenticated attackers to trigger Tuleap projects whose configured repo matches attacker-specified value
A missing permission check in Jenkins Tuleap Git Branch Source Plugin 3.2.4 and earlier allows unauthenticated attackers to trigger Tuleap projects whose configured repository matches the attacker-specified value. Tuleap Git Branch Source Plugin 3.2.5 requires a token to access the webhook endpoint.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:tuleap-git-branch-source'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.4'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43421'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2852'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/10/19/3'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T22:24:25Z', 'nvd_published_at': '2022-10-19T16:15:00Z'}
1.4.0
GHSA-64r9-x74q-wxmh
2022-12-16T17:16:06Z
2022-10-19T19:00:22Z
null
['CVE-2022-43409']
Stored XSS vulnerability in Jenkins Pipeline: Supporting APIs Plugin
Pipeline: Supporting APIs Plugin provides a feature to add hyperlinks, that send POST requests when clicked, to build logs. These links are used by Pipeline: Input Step Plugin to allow users to proceed or abort the build, or by Pipeline: Job Plugin to allow users to forcibly terminate the build after aborting it. Pipe...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.workflow:workflow-support'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '839.v35e2736cfd5c'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43409'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/workflow-support-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2881'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-sec...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T22:22:35Z', 'nvd_published_at': '2022-10-19T16:15:00Z'}
1.4.0
GHSA-r29w-r9ph-vm76
2022-10-31T15:41:18Z
2022-10-25T19:00:29Z
null
['CVE-2022-41704']
Apache XML Graphics Batik vulnerable to code execution via SVG.
A vulnerability in Batik of Apache XML Graphics allows an attacker to run untrusted Java code from an SVG. This issue affects Apache XML Graphics prior to 1.16. It is recommended to update to version 1.16.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.xmlgraphics:batik'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41704'}, {'type': 'WEB', 'url': 'https://github.com/apache/xmlgraphics-batik/commit/905f368b50c2567cf2c4869a0ab596a7b1b5125c'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/BATIK-1338'}, {'type': 'WEB', 'url': 'https://lists.apache...
{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T23:10:27Z', 'nvd_published_at': '2022-10-25T17:15:00Z'}
1.4.0
GHSA-f4mm-2r69-mg5f
2023-06-27T21:55:58Z
2022-10-25T20:21:33Z
null
['CVE-2022-39342']
OpenFGA Authorization Bypass
### Overview During our internal security assessment, it was discovered that OpenFGA versions `v0.2.3` and prior are vulnerable to authorization bypass under certain conditions. ### Am I Affected? You are affected by this vulnerability if you are using `openfga/openfga` version `v0.2.3` or prior, and your model has a ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/openfga/openfga'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.2.3'}}]
[{'type': 'WEB', 'url': 'https://github.com/openfga/openfga/security/advisories/GHSA-f4mm-2r69-mg5f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39342'}, {'type': 'WEB', 'url': 'https://github.com/openfga/openfga/commit/c8db1ee3d2a366f18e585dd33236340e76e784c4'}, {'type': 'PACKAGE', 'url': ...
{'cwe_ids': ['CWE-285', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T20:21:33Z', 'nvd_published_at': '2022-10-25T17:15:00Z'}
1.4.0
GHSA-p75c-5x3h-cxcg
2022-10-07T21:19:01Z
2022-10-07T21:19:01Z
null
['CVE-2022-39281']
Fat Free CRM vulnerable to Remote Denial of Service via Tasks endpoint
### Impact An authenticated user can perform a remote Denial of Service attack against Fat Free CRM. This vulnerability has been assigned the CVE identifier: CVE-2022-39281 Affected versions: All Not affected: None Fixed versions: 0.20.1 All users running an affected release should either upgrade or apply the patch ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'fat_free_crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.20.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/fatfreecrm/fat_free_crm/security/advisories/GHSA-p75c-5x3h-cxcg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39281'}, {'type': 'WEB', 'url': 'https://github.com/fatfreecrm/fat_free_crm/commit/c85a2546348c2692d32f952c753f7f0b43d1ca71'}, {'type': 'P...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-07T21:19:01Z', 'nvd_published_at': '2022-10-08T01:15:00Z'}
1.4.0
GHSA-f8q6-p94x-37v3
2023-01-23T18:54:22Z
2022-10-18T12:00:32Z
null
['CVE-2022-3517']
minimatch ReDoS vulnerability
A vulnerability was found in the minimatch package. This flaw allows a Regular Expression Denial of Service (ReDoS) when calling the braceExpand function with specific arguments, resulting in a Denial of Service.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'minimatch'}, 'ecosystem_specific': {'affected_functions': ['ext', 'minimatch', 'minimatch.Minimatch', 'minimatch.defaults', 'minimatch.Minimatch.defaults', 'minimatch.Minimatch.braceExpand', 'minimatch.Minimatch.parse', 'minimatch.match', 'minimatch.Minimatch.matchOne']}, 'ran...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3517'}, {'type': 'WEB', 'url': 'https://github.com/grafana/grafana-image-renderer/issues/329'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/node/issues/42510'}, {'type': 'WEB', 'url': 'https://github.com/isaacs/minimatch/commit/a8763f4388e519...
{'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-20T18:21:03Z', 'nvd_published_at': '2022-10-17T20:15:00Z'}
1.4.0
GHSA-cm22-88qr-7ffh
2023-07-07T21:10:52Z
2022-10-19T12:00:23Z
null
['CVE-2022-42188']
Lavalite vulnerable to Arbitrary File Read via Directory Traversal
In Lavalite 9.0.0, the XSRF-TOKEN cookie is vulnerable to path traversal attacks, enabling read access to arbitrary files on the server.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'lavalite/cms'}, 'versions': ['9.0.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42188'}, {'type': 'PACKAGE', 'url': 'https://github.com/LavaLite/cms'}, {'type': 'WEB', 'url': 'https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/LavaLite'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T21:10:52Z', 'nvd_published_at': '2022-10-18T19:15:00Z'}
1.4.0
GHSA-mcjj-2fvq-mc3r
2022-10-11T21:20:56Z
2022-10-11T19:00:29Z
null
['CVE-2022-32174']
Gogs vulnerable to Cross-site Scripting
In Gogs, versions v0.6.5 through v0.12.10 are vulnerable to Stored Cross-Site Scripting (XSS) that leads to an account takeover.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'gogs.io/gogs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.6.5'}, {'last_affected': '0.12.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-32174'}, {'type': 'PACKAGE', 'url': 'https://github.com/gogs/gogs'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/blob/v0.12.10/public/js/gogs.js#L263'}, {'type': 'WEB', 'url': 'https://www.mend.io/vulnerability-database/CVE-2022-32174'}]
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-11T21:20:56Z', 'nvd_published_at': '2022-10-11T15:15:00Z'}
1.4.0
GHSA-2x49-wj38-78q9
2022-12-16T19:47:20Z
2022-10-19T19:00:18Z
null
['CVE-2022-43422']
Agent-to-controller security bypass vulnerability in Jenkins Compuware Topaz Utilities Plugin
Compuware Topaz Utilities Plugin 1.0.8 and earlier implements an agent/controller message that does not limit where it can be executed. It allows attackers able to control agent processes to obtain the values of Java system properties from the Jenkins controller process. This vulnerability is only exploitable in Jenk...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.compuware.jenkins:compuware-topaz-utilities'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43422'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/compuware-topaz-utilities-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2620'}, {'type': 'WEB', 'url': 'http://www.openwall.com/list...
{'cwe_ids': ['CWE-693'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T21:23:12Z', 'nvd_published_at': '2022-10-19T16:15:00Z'}
1.4.0
GHSA-x4q7-m6fp-4v9v
2022-10-24T18:35:38Z
2022-10-13T19:11:08Z
null
['CVE-2022-35944']
October CMS Safe Mode bypass leads to authenticated Remote Code Execution
### Impact This vulnerability only affects installations that rely on the safe mode restriction, commonly used when providing public access to the admin panel. Assuming an attacker has access to the admin panel and permission to open the "Editor" section, they can bypass the Safe Mode (`cms.safe_mode`) restriction to ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'october/system'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.34'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'october/system'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.66'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/octobercms/october/security/advisories/GHSA-x4q7-m6fp-4v9v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35944'}, {'type': 'PACKAGE', 'url': 'https://github.com/octobercms/october'}]
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-13T19:11:08Z', 'nvd_published_at': '2022-10-13T22:15:00Z'}
1.4.0
GHSA-x279-68rr-jp4p
2022-10-07T07:25:33Z
2022-10-07T07:25:33Z
null
[]
Blst vulnerable to incorrect results for some inputs in blst_fp_eucl_inverse function
### Impact Blst versions v0.3.0 to v0.3.2 can produce the incorrect outputs for some inputs to the blst_fp_eucl_inverse function. This could theoretically result in the creation of an invalid signature from correct inputs. However, fuzzing of higher level functions such as sign and verify were unable to produce incorre...
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/supranational/blst'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.0'}, {'fixed': '0.3.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/supranational/blst/security/advisories/GHSA-x279-68rr-jp4p'}, {'type': 'WEB', 'url': 'https://github.com/supranational/blst/commit/dd980e7f81397895705c49fcb4f52e485bb45e21'}, {'type': 'PACKAGE', 'url': 'https://github.com/supranational/blst'}, {'type': 'WEB', 'url': 'https://...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-07T07:25:33Z', 'nvd_published_at': None}
1.4.0
GHSA-qm95-pgcg-qqfq
2022-11-14T20:01:32Z
2022-10-26T12:00:28Z
null
['CVE-2022-2421']
Insufficient validation when decoding a Socket.IO packet
Due to improper type validation in the `socket.io-parser` library (which is used by the `socket.io` and `socket.io-client` packages to encode and decode Socket.IO packets), it is possible to overwrite the _placeholder object which allows an attacker to place references to functions at arbitrary places in the resulting ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'socket.io-parser'}, 'ecosystem_specific': {'affected_functions': ['socket.io-parser.Decoder']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.5'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'socket.io-parser'}, 'ecosystem_specific': {'af...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2421'}, {'type': 'WEB', 'url': 'https://github.com/socketio/socket.io-parser/commit/04d23cecafe1b859fb03e0cbf6ba3b74dff56d14'}, {'type': 'WEB', 'url': 'https://github.com/socketio/socket.io-parser/commit/b559f050ee02bd90bd853b9823f8de7fa94a80d4'}, ...
{'cwe_ids': ['CWE-1287', 'CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-28T20:19:04Z', 'nvd_published_at': '2022-10-26T10:15:00Z'}
1.4.0
GHSA-7pfc-cc9x-8p4m
2022-10-22T01:12:05Z
2022-10-19T12:00:18Z
null
['CVE-2022-42466']
Apache Isis Cross-site Scripting vulnerability
Prior to 2.0.0-M9, it was possible for an end-user to set the value of an editable string property of a domain object to a value that would be rendered unchanged when the value was saved. In particular, the end-user could enter javascript or similar and this would be executed. As of this release, the inputted strings a...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.isis.core:isis-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0-M9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42466'}, {'type': 'WEB', 'url': 'https://github.com/apache/isis/commit/30f94df14ea47cea3d10d468a1230fb96a749743'}, {'type': 'WEB', 'url': 'https://github.com/apache/isis/commit/33de85d7e40a01f120d8de2adf04d47687362bdd'}, {'type': 'WEB', 'url': 'htt...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T18:50:59Z', 'nvd_published_at': '2022-10-19T08:15:00Z'}
1.4.0
GHSA-76p3-8jx3-jpfq
2022-11-04T20:29:12Z
2022-10-13T12:00:28Z
null
['CVE-2022-37601']
Prototype pollution in webpack loader-utils
Prototype pollution vulnerability in function parseQuery in parseQuery.js in webpack loader-utils prior to version 2.0.3 via the name variable in parseQuery.js.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'loader-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'loader-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37601'}, {'type': 'WEB', 'url': 'https://github.com/webpack/loader-utils/issues/212'}, {'type': 'WEB', 'url': 'https://github.com/webpack/loader-utils/issues/212#issuecomment-1319192884'}, {'type': 'WEB', 'url': 'https://github.com/xmldom/xmldom/is...
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-04T20:29:12Z', 'nvd_published_at': '2022-10-12T20:15:00Z'}
1.4.0
GHSA-4f63-89w9-3jjv
2022-10-13T20:08:51Z
2022-10-11T19:00:29Z
null
['CVE-2022-3358']
Using a Custom Cipher with `NID_undef` may lead to NULL encryption
OpenSSL supports creating a custom cipher via the legacy EVP_CIPHER_meth_new() function and associated function calls. This function was deprecated in OpenSSL 3.0 and application authors are instead encouraged to use the new provider mechanism in order to implement custom ciphers. OpenSSL versions 3.0.0 to 3.0.5 incorr...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '300.0.0'}, {'fixed': '300.0.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3358'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=5485c56679d7c49b96e8fc8ca708b0b7e7c03c4b'}, {'type': 'PACKAGE', 'url': 'https://github.com/alexcrichton/openssl-src-rs'}, {'type': 'WEB', 'url': 'https://p...
{'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-12T20:00:56Z', 'nvd_published_at': '2022-10-11T15:15:00Z'}
1.4.0
GHSA-jw36-mrvg-j5fx
2022-11-01T20:36:52Z
2022-10-27T12:00:27Z
null
['CVE-2022-3363']
Rdiffweb subject to Business Logic Errors
Business Logic Errors in GitHub repository ikus060/rdiffweb prior to 2.5.0a7.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0a7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3363'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/c27c46bac656b1da74f28eac1b52dfa5df76e6f2'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb/'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-data...
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-27T23:09:22Z', 'nvd_published_at': '2022-10-26T21:15:00Z'}
1.4.0
GHSA-mfcw-83qg-4vw3
2022-12-16T19:50:04Z
2022-10-19T19:00:22Z
null
['CVE-2022-43424']
Agent-to-controller security bypass vulnerability in Jenkins Compuware Xpediter Code Coverage Plugin
Compuware Xpediter Code Coverage Plugin 1.0.7 and earlier implements an agent/controller message that does not limit where it can be executed. It allows attackers able to control agent processes to obtain the values of Java system properties from the Jenkins controller process. This vulnerability is only exploitable ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.compuware.jenkins:compuware-xpediter-code-coverage'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43424'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/compuware-xpediter-code-coverage-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2627'}, {'type': 'WEB', 'url': 'http://www.openwall.c...
{'cwe_ids': ['CWE-693'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T22:20:50Z', 'nvd_published_at': '2022-10-19T16:15:00Z'}
1.4.0
GHSA-45x9-q6vj-cqgq
2022-10-13T20:11:12Z
2022-10-12T12:00:16Z
null
['CVE-2022-40664']
Apache Shiro Authentication Bypass vulnerability
Apache Shiro before 1.10.0, Authentication Bypass Vulnerability in Shiro when forwarding or including via RequestDispatcher.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.shiro:shiro-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40664'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/shiro'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/loc2ktxng32xpy7lfwxto13k4lvnhjwg'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20221118-0005/'}, ...
{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-12T19:43:15Z', 'nvd_published_at': '2022-10-12T07:15:00Z'}
1.4.0
GHSA-g6hg-4v3c-6jq7
2022-10-31T15:43:23Z
2022-10-26T19:00:39Z
null
['CVE-2022-43766']
Apache IoTDB subject to ReDOS with Java 8
Apache IoTDB versions 0.12.2 through 0.12.6, and 0.13.0 through 0.13.2 are vulnerable to a Denial of Service attack when accepting untrusted patterns for REGEXP queries with Java 8. This issue is patched in 0.13.3. Users should upgrade or use a later version of Java to avoid it.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.iotdb:iotdb-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.12.2'}, {'fixed': '0.13.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'apache-iotdb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.13.0'}, {'fixed': '0.14.0r...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43766'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/iotdb'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/apache-iotdb/PYSEC-2022-42972.yaml'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/...
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-27T18:38:35Z', 'nvd_published_at': '2022-10-26T16:15:00Z'}
1.4.0
GHSA-p373-jqfm-j6wr
2022-10-22T01:12:42Z
2022-10-20T12:00:15Z
null
['CVE-2022-37298']
Shinken Solutions Shinken Monitoring vulnerable to Incorrect Access Control
Shinken Solutions Shinken Monitoring Version 2.4.3 affected is vulnerable to Incorrect Access Control. The `SafeUnpickler` class found in `shinken/safepickle.py` implements a weak authentication scheme when unserializing objects passed from monitoring nodes to the Shinken monitoring server.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Shinken'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37298'}, {'type': 'WEB', 'url': 'https://github.com/naparuba/shinken/commit/2dae40fd1e713aec9e1966a0ab7a580b9180cff2'}, {'type': 'WEB', 'url': 'https://github.com/dbyio/cve-2022-37298'}, {'type': 'PACKAGE', 'url': 'https://github.com/naparuba/shink...
{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-20T18:39:15Z', 'nvd_published_at': '2022-10-20T11:15:00Z'}
1.4.0
GHSA-vgwq-hfqc-58wv
2022-10-20T21:34:09Z
2022-10-20T21:34:09Z
null
['CVE-2021-34485']
.NET Core Information Disclosure Vulnerability
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 5.0, .NET Core 3.1 and .NET Core 2.1. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability. An information disclosure vulnerability exists in .NET 5.0, ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.29'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.linux-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, ...
[{'type': 'WEB', 'url': 'https://github.com/dotnet/runtime/security/advisories/GHSA-vgwq-hfqc-58wv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-34485'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/196'}, {'type': 'WEB', 'url': 'https://github.com/github/advisory-d...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-20T21:34:09Z', 'nvd_published_at': '2021-08-12T18:15:00Z'}
1.4.0
GHSA-h4h5-3hr4-j3g2
2022-10-04T22:17:15Z
2022-10-04T22:17:15Z
null
['CVE-2022-3171']
protobuf-java has a potential Denial of Service issue
## Summary A potential Denial of Service issue in `protobuf-java` core and lite was discovered in the parsing procedure for binary and text format data. Input streams containing multiple instances of non-repeated [embedded messages](http://developers.google.com/protocol-buffers/docs/encoding#embedded) with repeated or ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.google.protobuf:protobuf-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.21.0-rc-1'}, {'fixed': '3.21.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.google.protobuf:protobuf-kotlin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduce...
[{'type': 'WEB', 'url': 'https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-h4h5-3hr4-j3g2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3171'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=48771'}, {'type': 'PACKAGE', 'url': 'https://github...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-04T22:17:15Z', 'nvd_published_at': '2022-10-12T23:15:00Z'}
1.4.0
GHSA-rh58-r7jh-xhx3
2022-10-25T17:33:12Z
2022-10-25T17:33:12Z
null
['CVE-2021-26423']
.NET Core Elevation of Privilege Vulnerability
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 5.0 and .NET Core 3.1. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability. A denial of service vulnerability exists in .NET 5.0, .NET Core 3.1 and .NE...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.win-x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.18'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.win-x86'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduce...
[{'type': 'WEB', 'url': 'https://github.com/dotnet/runtime/security/advisories/GHSA-rh58-r7jh-xhx3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26423'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/194'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T17:33:12Z', 'nvd_published_at': '2021-08-12T18:15:00Z'}
1.4.0
GHSA-xp3r-9wx8-q2mm
2022-12-16T19:55:09Z
2022-10-19T19:00:22Z
null
['CVE-2022-43428']
Agent-to-controller security bypass vulnerabilities in Jenkins Compuware Topaz for Total Test Plugin
Jenkins Compuware Topaz for Total Test Plugin 2.4.8 and earlier implements an agent/controller message that does not limit where it can be executed, allowing attackers able to control agent processes to obtain the values of Java system properties from the Jenkins controller process. These vulnerabilities are only expl...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.compuware.jenkins:compuware-topaz-for-total-test'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43428'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/compuware-topaz-for-total-test-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2624'}, {'type': 'WEB', 'url': 'http://www.openwall.com...
{'cwe_ids': ['CWE-693'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T22:02:43Z', 'nvd_published_at': '2022-10-19T16:15:00Z'}
1.4.0
GHSA-9chr-4fjh-5rgw
2023-01-23T20:44:50Z
2022-10-27T12:00:27Z
2023-01-23T20:44:50Z
['CVE-2022-3704']
Cross-site Scripting in actionpack
actionpack from the Ruby on Rails project is vulnerable to Cross-site Scripting in the Route Error Page. This issue has been patched with this [commit](https://github.com/rails/rails/commit/be177e4566747b73ff63fd5f529fab564e475ed4). This vulnerability is disputed by the Rails security team. It requires that the devel...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '7.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3704'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/issues/46244'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/issues/46244#issuecomment-1380875153'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/pull/46269'}, {'typ...
{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-10-28T19:17:53Z', 'nvd_published_at': '2022-10-26T20:15:00Z'}
1.4.0
GHSA-7gc4-r5jr-9hxv
2022-10-27T18:38:32Z
2022-10-25T21:02:23Z
null
['CVE-2022-39345']
Gin-vue-admin subject to Remote Code Execution via file upload vulnerability
### Impact Gin-vue-admin < 2.5.4 has File upload vulnerabilities。 File upload vulnerabilities are when a web server allows users to upload files to its filesystem without sufficiently validating things like their name, type, contents, or size. Failing to properly enforce restrictions on these could mean that even a bas...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/flipped-aurora/gin-vue-admin/server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-7gc4-r5jr-9hxv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39345'}, {'type': 'WEB', 'url': 'https://github.com/flipped-aurora/gin-vue-admin/issues/1263'}, {'type': 'WEB', 'url': 'https://githu...
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T21:02:23Z', 'nvd_published_at': '2022-10-25T17:15:00Z'}
1.4.0
GHSA-mgvv-5mxp-xq67
2022-10-03T22:12:28Z
2022-10-03T22:12:28Z
null
[]
SQLite3 addresses vulnerability in packaged version of libsqlite
### Summary The rubygem sqlite3 v1.5.1 upgrades the packaged version of libsqlite from v3.39.3 to [v3.39.4](https://sqlite.org/releaselog/3_39_4.html). libsqlite v3.39.4 addresses a vulnerability described as follows in the release notification: > Version 3.39.4 is a minimal patch against the prior release that addr...
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'sqlite3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.1'}]}], 'versions': ['1.5.0']}]
[{'type': 'WEB', 'url': 'https://github.com/sparklemotion/sqlite3-ruby/security/advisories/GHSA-mgvv-5mxp-xq67'}, {'type': 'PACKAGE', 'url': 'https://github.com/sparklemotion/sqlite3-ruby'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/sqlite3-ruby/releases/tag/v1.5.1'}]
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-10-03T22:12:28Z', 'nvd_published_at': None}
1.4.0
GHSA-59hj-62f5-fgmc
2022-10-25T19:59:37Z
2022-10-24T19:00:24Z
null
['CVE-2022-43677']
free5GC vulnerable to malformed NGAP message crashing the AMF and NGAP decoders
In free5GC 3.2.1, a malformed NGAP message can crash the AMF and NGAP decoders via an index-out-of-range panic in `aper.GetBitString`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/free5gc/free5gc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43677'}, {'type': 'WEB', 'url': 'https://github.com/free5gc/free5gc/issues/402'}, {'type': 'PACKAGE', 'url': 'https://github.com/free5gc/free5gc'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-1083'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T19:59:37Z', 'nvd_published_at': '2022-10-24T14:15:00Z'}
1.4.0
GHSA-xrx9-gj26-5wx9
2022-10-07T07:33:44Z
2022-10-07T07:33:44Z
null
['CVE-2022-35923']
v8n vulnerable to Inefficient Regular Expression Complexity
### Impact Inefficient regular expression complexity of `lowercase()` and `uppercase()` regex could lead to a denial of service attack. With a formed payload `'a' + 'a'.repeat(i) + 'A'`, only 32 characters payload could take 29443 ms time execution when testing `lowercase()`. The same issue happens with `uppercase()`. ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'v8n'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/imbrn/v8n/security/advisories/GHSA-xrx9-gj26-5wx9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35923'}, {'type': 'WEB', 'url': 'https://github.com/imbrn/v8n/commit/92393862156fad190c05ec3f6e2bc73308dcd2f9'}, {'type': 'PACKAGE', 'url': 'https://git...
{'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-07T07:33:44Z', 'nvd_published_at': '2022-08-02T20:15:00Z'}
1.4.0
GHSA-vw39-2wj9-4q86
2022-10-11T20:49:45Z
2022-10-11T19:00:29Z
null
['CVE-2022-42731']
django-mfa2 vulnerable to MFA Replay attack
mfa/FIDO2.py in django-mfa2 before 2.5.1 and 2.6.x before 2.6.1 allows a replay attack that could be used to register another device for a user. The device registration challenge is not invalidated after usage.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django-mfa2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django-mfa2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42731'}, {'type': 'WEB', 'url': 'https://github.com/mkalioby/django-mfa2/commit/54db5a513bcafa97a36e9f6dfa31d3c61fa8217b'}, {'type': 'WEB', 'url': 'https://github.com/mkalioby/django-mfa2/commit/5fbb505e98ecdd409330a5c336ad5ec49631b0db'}, {'type': ...
{'cwe_ids': ['CWE-294'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-11T20:49:45Z', 'nvd_published_at': '2022-10-11T14:15:00Z'}
1.4.0
GHSA-v9fj-h8g6-4w9q
2022-10-07T13:10:02Z
2022-10-06T18:52:03Z
null
['CVE-2022-3002']
YetiForce CRM vulnerable to stored Cross-site Scripting
YetiForce CRM version 6.4.0 and prior is vulnerable to stored cross-site scripting. A [patch](https://github.com/yetiforcecompany/yetiforcecrm/commit/54728becfdad9b6e686bbe336007cba2ce518248) is available on the `developer` branch.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'yetiforce/yetiforce-crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3002'}, {'type': 'WEB', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm/commit/54728becfdad9b6e686bbe336007cba2ce518248'}, {'type': 'PACKAGE', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm'}, {'type': 'WEB', 'url': 'https://hunt...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-06T20:02:02Z', 'nvd_published_at': '2022-10-06T18:16:00Z'}
1.4.0
GHSA-f9f9-4r63-4qcc
2022-12-16T17:22:29Z
2022-10-19T19:00:22Z
null
['CVE-2022-43411']
Non-constant time webhook token comparison in Jenkins GitLab Plugin
GitLab Plugin 1.5.35 and earlier does not use a constant-time comparison when checking whether the provided and expected webhook token are equal. This could potentially allow attackers to use statistical methods to obtain a valid webhook token. GitLab Plugin 1.5.36 uses a constant-time comparison when validating the ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:gitlab-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.36'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.5.35'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43411'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/gitlab-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2877'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022...
{'cwe_ids': ['CWE-203', 'CWE-208'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T22:22:43Z', 'nvd_published_at': '2022-10-19T16:15:00Z'}
1.4.0
GHSA-j4j9-7hg9-97g6
2022-10-11T20:41:47Z
2022-10-11T20:41:47Z
null
['CVE-2022-36070']
Poetry vulnerable to Untrusted Search Path leading to Local Code Execution on Windows
### Observation To handle dependencies that come from a Git repository, Poetry executes various commands, e.g. `git config`. These commands are being executed using the executable’s name and not its absolute path. This can lead to the execution of untrusted code due to the way Windows resolves executable names to pat...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'poetry'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.9'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/python-poetry/poetry/security/advisories/GHSA-j4j9-7hg9-97g6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36070'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-poetry/poetry'}, {'type': 'WEB', 'url': 'https://github.com/python-poetry/poet...
{'cwe_ids': ['CWE-426'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-11T20:41:47Z', 'nvd_published_at': '2022-09-07T19:15:00Z'}
1.4.0
GHSA-4g29-r7vj-2rpv
2022-10-21T13:00:42Z
2022-10-19T19:00:22Z
null
['CVE-2022-43413']
Jenkins Job Import Plugin allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins
Jenkins Job Import Plugin 3.5 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. An enumeration of credentials IDs in Job Import Plugin 3.6 requires Job Import/Import Jobs permission.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:job-import-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.5'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43413'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2791'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/10/19/3'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T22:24:06Z', 'nvd_published_at': '2022-10-19T16:15:00Z'}
1.4.0
GHSA-7qw2-h9gj-hcvh
2022-12-16T17:08:22Z
2022-10-19T19:00:21Z
null
['CVE-2022-43406']
Sandbox bypass vulnerability in Jenkins Pipeline: Deprecated Groovy Libraries Plugin
Pipeline: Groovy Libraries Plugin and older releases of the Pipeline: Deprecated Groovy Libraries Plugin (formerly Pipeline: Shared Groovy Libraries Plugin) define the l`ibrary` Pipeline step, which allows Pipeline authors to dynamically load Pipeline libraries. The return value of this step can be used to instantiate ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.workflow:workflow-cps-global-lib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '588.v576c103a_ff86'}]}], 'database_specific': {'last_known_affected_version_range': '< 588.v576c103a'}}, {'package': {'ecosystem': 'Maven', ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43406'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(2)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/10/19/3'}]
{'cwe_ids': ['CWE-693'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T21:20:21Z', 'nvd_published_at': '2022-10-19T16:15:00Z'}
1.4.0
GHSA-hhq3-ff78-jv3g
2022-11-22T22:52:15Z
2022-10-12T12:00:27Z
null
['CVE-2022-37599']
loader-utils is vulnerable to Regular Expression Denial of Service (ReDoS)
A regular expression denial of service (ReDoS) flaw was found in Function interpolateName in interpolateName.js in webpack loader-utils via the resourcePath variable in interpolateName.js. A badly or maliciously formed string could be used to send crafted requests that cause a system to crash or take a disproportional ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'loader-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.4.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'loader-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.4'}]}]}, {'package': {'eco...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37599'}, {'type': 'WEB', 'url': 'https://github.com/webpack/loader-utils/issues/211'}, {'type': 'WEB', 'url': 'https://github.com/webpack/loader-utils/issues/216'}, {'type': 'WEB', 'url': 'https://github.com/webpack/loader-utils/commit/17cbf8fa8989...
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-15T21:03:46Z', 'nvd_published_at': '2022-10-11T19:15:00Z'}
1.4.0
GHSA-35rx-7pc8-6963
2022-12-16T19:45:04Z
2022-10-19T19:00:18Z
null
['CVE-2022-43419']
API keys stored in plain text by Jenkins Katalon Plugin
Katalon Plugin 1.0.32 and earlier stores API keys unencrypted in job `config.xml` files on the Jenkins controller as part of its configuration. These API keys can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system. Katalon Plugin 1.0.33 no longer stores the API keys ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:katalon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.33'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43419'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/katalon-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2846'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/202...
{'cwe_ids': ['CWE-256', 'CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T20:27:38Z', 'nvd_published_at': '2022-10-19T16:15:00Z'}
1.4.0
GHSA-4m5p-5w5w-3jcf
2022-10-12T20:13:46Z
2022-10-12T20:13:46Z
null
[]
com.enonic.xp:lib-auth vulnerable to Session Fixation
### Impact All id-providers using lib-auth `login` method. lib-auth should invalidate old session after login and replicate session attributes in a new one, however this is not the behavior in affected versions. ### Workarounds Don't use lib-auth for `login`. Java API uses low-level structures and allows to invalidat...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'com.enonic.xp:lib-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.7.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/enonic/xp/security/advisories/GHSA-4m5p-5w5w-3jcf'}, {'type': 'WEB', 'url': 'https://github.com/enonic/xp/issues/9253'}, {'type': 'WEB', 'url': 'https://github.com/enonic/xp/commit/0189975691e9e6407a9fee87006f730e84f734ff'}, {'type': 'WEB', 'url': 'https://github.com/enonic/x...
{'cwe_ids': ['CWE-384'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-12T20:13:46Z', 'nvd_published_at': None}
1.4.0
GHSA-vhwv-8897-jm7q
2022-12-16T19:56:42Z
2022-10-19T19:00:18Z
null
['CVE-2022-43430']
XXE vulnerability in Jenkins Compuware Topaz for Total Test Plugin
Compuware Topaz for Total Test Plugin 2.4.8 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. This allows attackers able to control the input files for the 'Topaz for Total Test - Execute Total Test scenarios' build step to have Jenkins parse a crafted XML document that uses e...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.compuware.jenkins:compuware-topaz-for-total-test'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43430'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/compuware-topaz-for-total-test-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2625'}, {'type': 'WEB', 'url': 'http://www.openwall.com...
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T21:22:06Z', 'nvd_published_at': '2022-10-19T16:15:00Z'}
1.4.0
GHSA-93m7-c69f-5cfj
2022-10-07T07:20:03Z
2022-10-07T07:20:03Z
null
['CVE-2020-25614']
xmlquery lacks check for whether LoadURL response is in XML format, causing denial of service
xmlquery before 1.3.1 lacks a check for whether a LoadURL response is in the XML format, which allows attackers to cause a denial of service (SIGSEGV) at xmlquery.(*Node).InnerText or possibly have unspecified other impact.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/antchfx/xmlquery'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25614'}, {'type': 'WEB', 'url': 'https://github.com/antchfx/xmlquery/issues/39'}, {'type': 'WEB', 'url': 'https://github.com/antchfx/xmlquery/commit/5648b2f39e8d5d3fc903c45a4f1274829df71821'}, {'type': 'PACKAGE', 'url': 'https://github.com/antchfx/...
{'cwe_ids': ['CWE-119', 'CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-07T07:20:03Z', 'nvd_published_at': '2020-09-16T15:15:00Z'}
1.4.0
GHSA-824x-jcxf-hpfg
2022-10-14T16:15:11Z
2022-10-14T12:00:17Z
null
['CVE-2022-3457']
Origin Validation Error in rdiffweb
ikus060/rdiffweb prior to 2.5.0a5 did not enforce origin validation in web traffic. Users are advised to upgrade to version 2.5.0a5.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0a5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3457'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/afc1bdfab5161c74012ff2590a6ec49cc0d8fde0'}, {'type': 'WEB', 'url': 'https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Origin'}, {'type': 'PACKAGE', 'url': 'https://g...
{'cwe_ids': ['CWE-346'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-14T16:10:12Z', 'nvd_published_at': '2022-10-13T20:15:00Z'}
1.4.0
GHSA-mxrx-fg8p-5p5j
2022-10-21T13:03:47Z
2022-10-18T19:57:50Z
null
['CVE-2022-39267']
Bifrost vulnerable to authentication check flaw that leads to authentication bypass
### Impact The admin and monitor user groups need to be authenticated by username and password. If we delete the X-Requested-With: XMLHttpRequest field in the request header,the authentication will be bypassed. ### Patches https://github.com/brockercap/Bifrost/pull/201 ### Workarounds Upgrade to the latest version
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/brokercap/Bifrost'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.7-release'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/brokercap/Bifrost/security/advisories/GHSA-mxrx-fg8p-5p5j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39267'}, {'type': 'WEB', 'url': 'https://github.com/brockercap/Bifrost/pull/201'}, {'type': 'WEB', 'url': 'https://github.com/brokercap/Bifrost/...
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-18T19:57:50Z', 'nvd_published_at': '2022-10-19T13:15:00Z'}
1.4.0
GHSA-qpv8-4pjq-qqh7
2023-01-10T16:00:54Z
2022-10-26T12:00:28Z
null
['CVE-2022-2422']
feathers-sequelize contains improper input validation leading to SQL injection
Due to improper input validation in the Feathers js library, it is possible to perform a SQL injection attack on the back-end database, in case the feathers-sequelize package is used.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'feathers-sequelize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.3.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2422'}, {'type': 'WEB', 'url': 'https://github.com/feathersjs-ecosystem/feathers-sequelize/commit/0f2d85f0b2d556f2b6c70423dcebdbd29d95e3dc'}, {'type': 'WEB', 'url': 'https://csirt.divd.nl/CVE-2022-2422'}, {'type': 'WEB', 'url': 'https://csirt.divd....
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-31T18:43:12Z', 'nvd_published_at': '2022-10-26T10:15:00Z'}
1.4.0
GHSA-h479-2mv4-5c26
2022-10-13T20:10:05Z
2022-10-11T20:45:42Z
null
['CVE-2022-39298']
melisplatform/melis-front vulnerable to deserialization of untrusted data
### Impact Attackers can deserialize arbitrary data on affected versions of `melisplatform/melis-front`, and ultimately leads to the execution of arbitrary PHP code on the system. Conducting this attack does not require authentication. Users should immediately upgrade to `melisplatform/melis-front` >= 5.0.1. ### Pat...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'melisplatform/melis-front'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/melisplatform/melis-front/security/advisories/GHSA-h479-2mv4-5c26'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39298'}, {'type': 'WEB', 'url': 'https://github.com/melisplatform/melis-front/commit/89ae612d5f1f7aa2fb621ee8de27dffe1feb851e'}, {'type'...
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-11T20:45:42Z', 'nvd_published_at': '2022-10-12T23:15:00Z'}
1.4.0
GHSA-qrw5-5h28-6cmg
2023-09-05T20:17:54Z
2022-10-16T12:00:23Z
null
['CVE-2022-41323']
Django denial-of-service vulnerability in internationalized URLs
In Django 3.2 before 3.2.16, 4.0 before 4.0.8, and 4.1 before 4.1.2, internationalized URLs were subject to a potential denial of service attack via the locale parameter, which is treated as a regular expression.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2'}, {'fixed': '3.2.16'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41323'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/5b6b257fa7ec37ff27965358800c67e2dd11c924'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/4.0/releases/security/'}, {'type': 'PACKAGE', 'url': 'https://github.com/...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-18T17:10:24Z', 'nvd_published_at': '2022-10-16T06:15:00Z'}
1.4.0
GHSA-69ch-w2m2-3vjp
2022-10-28T20:11:26Z
2022-10-14T19:00:40Z
null
['CVE-2022-32149']
Denial of service in golang.org/x/text/language
The BCP 47 tag parser has quadratic time complexity due to inherent aspects of its design. Since the parser is, by design, exposed to untrusted user input, this can be leveraged to force a program to consume significant time parsing Accept-Language headers. The parser cannot be easily rewritten to fix this behavior for...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'golang.org/x/text/language'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.8'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'golang.org/x/text'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-32149'}, {'type': 'WEB', 'url': 'https://github.com/golang/go/issues/56152'}, {'type': 'WEB', 'url': 'https://github.com/golang/text/commit/434eadcdbc3b0256971992e8c70027278364c72c'}, {'type': 'PACKAGE', 'url': 'https://github.com/golang/text'}, {'...
{'cwe_ids': ['CWE-772'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-28T20:11:26Z', 'nvd_published_at': '2022-10-14T15:15:00Z'}
1.4.0
GHSA-m678-f26j-3hrp
2023-07-14T21:55:24Z
2022-10-26T22:07:00Z
null
['CVE-2022-39286']
Execution with Unnecessary Privileges in JupyterApp
### Impact _What kind of vulnerability is it? Who is impacted?_ We’d like to disclose an arbitrary code execution vulnerability in `jupyter_core` that stems from `jupyter_core` executing untrusted files in the current working directory. This vulnerability allows one user to run code as another. ### Patches _Has the p...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'jupyter-core'}, 'ecosystem_specific': {'affected_functions': ['jupyter_core.application.JupyterApp.config_file_paths']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.11.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/jupyter/jupyter_core/security/advisories/GHSA-m678-f26j-3hrp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39286'}, {'type': 'WEB', 'url': 'https://github.com/jupyter/jupyter_core/commit/1118c8ce01800cb689d51f655f5ccef19516e283'}, {'type': 'PACKAGE...
{'cwe_ids': ['CWE-250', 'CWE-269', 'CWE-427'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-26T22:07:00Z', 'nvd_published_at': '2022-10-26T20:15:00Z'}
1.4.0
GHSA-fc4h-xcf3-qj5f
2022-10-25T20:22:19Z
2022-10-25T20:22:19Z
null
[]
matrix-sdk 0.6.0 logs access tokens
When sending Matrix requests using an affected version of `matrix-sdk` in an application that writes logs using `tracing-subscriber` (in a way that includes fields of tracing spans such as `tracing_subscriber`s default text output from the `fmt` module), these logs will contain the user's access token.
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'matrix-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.6.0'}, {'fixed': '0.6.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-rust-sdk/issues/1110'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/matrix-rust-sdk'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0062.html'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T20:22:19Z', 'nvd_published_at': None}
1.4.0
GHSA-x58j-j539-w8mv
2023-08-03T22:54:04Z
2022-10-24T19:00:20Z
2023-08-03T22:53:44Z
['CVE-2021-46849']
Duplicate Advisory: Improper Restriction of XML External Entity Reference in pikepdf
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-29421, GHSA-ccgm-3xw4-h5p8. Reason: This candidate is a duplicate of CVE-2021-29421. Notes: All CVE users should reference CVE-2021-29421 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accident...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pikepdf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '2.10.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46849'}, {'type': 'WEB', 'url': 'https://bugs.gentoo.org/779475'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-ccgm-3xw4-h5p8'}, {'type': 'WEB', 'url': 'https://github.com/pikepdf/pikepdf/blob/v2.10.0/docs/release_notes.rst#v210...
{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T22:53:44Z', 'nvd_published_at': '2022-10-24T14:15:00Z'}
1.4.0
GHSA-3rfm-jhwj-7488
2022-11-15T21:26:42Z
2022-10-14T19:00:38Z
null
['CVE-2022-37603']
loader-utils is vulnerable to Regular Expression Denial of Service (ReDoS) via url variable
A Regular expression denial of service (ReDoS) flaw was found in Function interpolateName in interpolateName.js in webpack loader-utils 2.0.0 via the url variable in interpolateName.js. A badly or maliciously formed string could be used to send crafted requests that cause a system to crash or take a disproportional amo...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'loader-utils'}, 'ecosystem_specific': {'affected_functions': ['loader-utils.interpolateName']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.4.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'loader-utils'}, 'ecosystem_specific': {'affect...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37603'}, {'type': 'WEB', 'url': 'https://github.com/webpack/loader-utils/issues/213'}, {'type': 'WEB', 'url': 'https://github.com/webpack/loader-utils/issues/216'}, {'type': 'WEB', 'url': 'https://github.com/webpack/loader-utils/commit/17cbf8fa8989...
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-15T21:26:09Z', 'nvd_published_at': '2022-10-14T16:15:00Z'}
1.4.0
GHSA-77xx-rxvh-q682
2023-01-11T22:59:28Z
2022-10-06T18:52:05Z
null
['CVE-2022-41853']
HyperSQL DataBase vulnerable to remote code execution when processing untrusted input
Those using `java.sql.Statement` or `java.sql.PreparedStatement` in hsqldb (HyperSQL DataBase) to process untrusted input may be vulnerable to a remote code execution attack. By default it is allowed to call any static method of any Java class in the classpath resulting in code execution. The issue can be prevented by ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.hsqldb:hsqldb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41853'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=50212#c7'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/12/msg00020.html'}, {'type': 'PACKAGE', 'url': 'https://sourceforge.net/pro...
{'cwe_ids': ['CWE-470'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-06T21:16:51Z', 'nvd_published_at': '2022-10-06T18:17:00Z'}
1.4.0
GHSA-vf5v-6wjm-vr7v
2022-12-16T19:52:40Z
2022-10-19T19:00:22Z
null
['CVE-2022-43425']
Stored XSS vulnerability in Jenkins Custom Checkbox Parameter Plugin
Custom Checkbox Parameter Plugin 1.4 and earlier does not escape the name and description of the parameter types it provides. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. Exploitation of this vulnerability requires that parameters are liste...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:custom-checkbox-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43425'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/custom-checkbox-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2797'}, {'type': 'WEB', 'url': 'http://www.openwall.com/list...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T22:01:53Z', 'nvd_published_at': '2022-10-19T16:15:00Z'}
1.4.0
GHSA-w8xw-7crf-h23x
2022-10-21T16:07:23Z
2022-10-16T12:00:23Z
null
['CVE-2022-42968']
Gitea vulnerable to Argument Injection
Gitea before 1.17.3 does not sanitize and escape refs in the git backend. Arguments to git commands are mishandled.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/go-gitea/gitea'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.17.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42968'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/21463'}, {'type': 'PACKAGE', 'url': 'https://github.com/go-gitea/gitea'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/releases/tag/v1.17.3'}, {'type': 'WEB', 'url...
{'cwe_ids': ['CWE-88'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-21T16:07:23Z', 'nvd_published_at': '2022-10-16T04:15:00Z'}
1.4.0
GHSA-h8g9-6gvh-5mrc
2022-10-06T23:12:38Z
2022-10-06T23:12:38Z
null
[]
etcd vulnerable to TOCTOU of gateway endpoint authentication
### Vulnerability type Authentication ### Workarounds Refer to the [gateway documentation](https://github.com/etcd-io/etcd/blob/master/Documentation/op-guide/gateway.md). The vulnerability was spotted due to unclear documentation of how the gateway handles endpoints validation. ### Detail The gateway only authentica...
[]
[{'package': {'ecosystem': 'Go', 'name': 'go.etcd.io/etcd/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.4.0'}, {'fixed': '3.4.10'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'go.etcd.io/etcd/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.23'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/etcd-io/etcd/security/advisories/GHSA-h8g9-6gvh-5mrc'}, {'type': 'PACKAGE', 'url': 'https://github.com/etcd-io/etcd'}]
{'cwe_ids': ['CWE-367'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-10-06T23:12:38Z', 'nvd_published_at': None}
1.4.0
GHSA-rj5f-vm79-5j84
2022-10-19T22:21:33Z
2022-10-19T19:00:24Z
null
['CVE-2022-3607']
OctoPrint vulnerable to Special Element Injection
OctoPrint prior to 1.8.3 is vulnerable to Special Element Injection.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'OctoPrint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3607'}, {'type': 'WEB', 'url': 'https://github.com/octoprint/octoprint/commit/3cca3a43f3d085e9bbe5a5840c8255bb1b5d052e'}, {'type': 'PACKAGE', 'url': 'https://github.com/octoprint/octoprint'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory...
{'cwe_ids': ['CWE-74', 'CWE-75'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T22:21:33Z', 'nvd_published_at': '2022-10-19T13:15:00Z'}
1.4.0
GHSA-5p8w-2mvw-38pv
2022-10-14T19:48:04Z
2022-10-12T22:05:44Z
null
['CVE-2022-39300']
Signature bypass via multiple root elements
### Impact A remote attacker may be able to bypass SAML authentication on a website using passport-saml. A successful attack requires that the attacker is in possession of an arbitrary IDP signed XML element. Depending on the IDP used, fully unauthenticated attacks (e.g without access to a valid user) might also be fe...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'node-saml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0-beta.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/node-saml/node-saml/security/advisories/GHSA-5p8w-2mvw-38pv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39300'}, {'type': 'WEB', 'url': 'https://github.com/node-saml/node-saml/commit/c1f275c289c01921e58f5c70ce0fdbc5287e5fbe'}, {'type': 'PACKAGE',...
{'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-12T22:05:44Z', 'nvd_published_at': '2022-10-13T22:15:00Z'}
1.4.0
GHSA-cr84-xvw4-qx3c
2022-10-31T16:02:55Z
2022-10-25T22:27:32Z
null
['CVE-2022-25918']
Inefficient Regular Expression Complexity in shescape
### Impact This impacts users that use shescape to escape arguments: - for the Unix shell Bash, or any not-officially-supported Unix shell; - using the `escape` or `escapeAll` functions with the `interpolation` option set to `true`. An attacker can cause polynomial backtracking in terms of the input string length du...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'shescape'}, 'ecosystem_specific': {'affected_functions': ['shescape.escapeAll']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.10'}, {'fixed': '1.6.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ericcornelissen/shescape/security/advisories/GHSA-cr84-xvw4-qx3c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25918'}, {'type': 'WEB', 'url': 'https://github.com/ericcornelissen/shescape/commit/552e8eab56861720b1d4e5474fb65741643358f9'}, {'type': ...
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T22:27:32Z', 'nvd_published_at': '2022-10-27T10:15:00Z'}
1.4.0
GHSA-mf2h-6mg2-px9x
2022-11-10T22:39:38Z
2022-10-06T18:52:04Z
2022-11-10T22:39:38Z
['CVE-2022-40158']
JXPath Out-of-bounds Write vulnerability
## Withdrawn This advisory has been withdrawn because the original report was found to be invalid. This link is maintained to preserve external references. ## Original Description Those using JXPath to interpret XPath may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied inp...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'commons-jxpath:commons-jxpath'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40158'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47058'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/commons-jxpath'}]
{'cwe_ids': ['CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-10T20:56:49Z', 'nvd_published_at': '2022-10-06T18:16:00Z'}
1.4.0
GHSA-9jjw-hf72-3mxw
2022-10-07T07:22:33Z
2022-10-07T07:22:33Z
null
['CVE-2020-26269']
TensorFlow vulnerable to heap out of bounds read in filesystem glob matching
### Impact The general implementation for matching filesystem paths to globbing pattern is vulnerable to an access out of bounds of [the array holding the directories](https://github.com/tensorflow/tensorflow/blob/458c6260265c46ebaf18052d6c61aea4b6b40926/tensorflow/core/platform/file_system_helper.cc#L127): ```cc if (...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0rc0'}, {'fixed': '2.4.0'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0rc0'}, {'fixed': '2.4.0'}]}]}, {'package...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9jjw-hf72-3mxw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26269'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/pull/40861'}, {'type': 'WEB', 'url': 'https://github.com/tensorflo...
{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-07T07:22:33Z', 'nvd_published_at': '2020-12-10T23:15:00Z'}
1.4.0
GHSA-7fj2-rrq6-rphq
2022-10-14T19:45:43Z
2022-10-11T20:46:33Z
null
['CVE-2022-39296']
melisplatform/melis-asset-manager vulnerable to Path Traversal
### Impact Attackers can read arbitrary files on affected versions of `melisplatform/melis-asset-manager`, leading to the disclosure of sensitive information. Conducting this attack does not require authentication. Users should immediately upgrade to `melisplatform/melis-asset-manager` >= 5.0.1. ### Patches This is...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'melisplatform/melis-asset-manager'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/melisplatform/melis-asset-manager/security/advisories/GHSA-7fj2-rrq6-rphq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39296'}, {'type': 'WEB', 'url': 'https://github.com/melisplatform/melis-asset-manager/commit/a0f75918c049aff78953a0bc91c58515359...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-11T20:46:33Z', 'nvd_published_at': '2022-10-11T18:15:00Z'}
1.4.0
GHSA-mf4p-wjrm-cmjp
2022-12-16T19:53:45Z
2022-10-19T19:00:18Z
null
['CVE-2022-43426']
AWS secrets displayed without masking by Jenkins S3 Explorer Plugin
S3 Explorer Plugin stores AWS_SECRET_ACCESS_KEY in its global configuration file `s3explorer.xml` on the Jenkins controller as part of its configuration. While this secret is stored encrypted on disk, in S3 Explorer Plugin 1.0.8 and earlier the global configuration form does not mask the AWS_SECRET_ACCESS_KEY form fie...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:s3explorer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43426'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/s3explorer-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2480'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/...
{'cwe_ids': ['CWE-549'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T21:22:54Z', 'nvd_published_at': '2022-10-19T16:15:00Z'}
1.4.0
GHSA-9gp7-6833-wv89
2022-10-06T23:18:35Z
2022-10-06T23:18:35Z
null
[]
etcd having a negative value for cluster node size results in an index out-of-bound panic during service discovery
### Vulnerability type Data Validation ### Detail When an etcd instance attempts to perform service discovery, if a cluster size is provided as a negative value, the etcd instance will panic without recovery. ### References Find out more on this vulnerability in the [security audit report](https://github.com/etcd-io/...
[]
[{'package': {'ecosystem': 'Go', 'name': 'go.etcd.io/etcd/client/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.4.0'}, {'fixed': '3.4.10'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'go.etcd.io/etcd/client/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.23'}]...
[{'type': 'WEB', 'url': 'https://github.com/etcd-io/etcd/security/advisories/GHSA-9gp7-6833-wv89'}, {'type': 'PACKAGE', 'url': 'https://github.com/etcd-io/etcd'}]
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-10-06T23:18:35Z', 'nvd_published_at': None}
1.4.0
GHSA-c6hx-pjc3-7fqr
2022-10-13T20:08:57Z
2022-10-10T21:23:30Z
null
['CVE-2022-39271']
Traefik HTTP/2 connections management could cause a denial of service
### Impact There is a potential vulnerability in Traefik managing HTTP/2 connections. A closing HTTP/2 server connection could hang forever because of a subsequent fatal error. This failure mode could be exploited to cause a denial of service. ### Patches Traefik v2.8.x: https://github.com/traefik/traefik/releases/t...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/traefik/traefik/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.8'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/traefik/traefik/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0-rc1'}, {'fixed':...
[{'type': 'WEB', 'url': 'https://github.com/traefik/traefik/security/advisories/GHSA-c6hx-pjc3-7fqr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39271'}, {'type': 'PACKAGE', 'url': 'https://github.com/traefik/traefik'}, {'type': 'WEB', 'url': 'https://github.com/traefik/traefik/releases/tag...
{'cwe_ids': ['CWE-400', 'CWE-755'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-10T21:23:30Z', 'nvd_published_at': '2022-10-11T14:15:00Z'}
1.4.0
GHSA-c7mc-q43h-5672
2022-11-10T22:39:44Z
2022-10-06T18:52:04Z
2022-11-10T22:39:44Z
['CVE-2022-40157']
JXPath Out-of-bounds Write vulnerability
## Withdrawn This advisory has been withdrawn because the original report was found to be invalid. This link is maintained to preserve external references. ## Original Description Those using JXPath to interpret XPath may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied inp...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'commons-jxpath:commons-jxpath'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40157'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47061'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/commons-jxpath'}]
{'cwe_ids': ['CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-10T20:57:35Z', 'nvd_published_at': '2022-10-06T18:16:00Z'}
1.4.0
GHSA-mqc2-w9r8-mmxm
2022-10-22T01:13:25Z
2022-10-19T19:00:21Z
null
['CVE-2022-43402']
Jenkins Pipeline: Groovy Plugin allows sandbox protection bypass and arbitrary code execution
A sandbox bypass vulnerability involving various casts performed implicitly by the Groovy language runtime in Jenkins Pipeline: Groovy Plugin 2802.v5ea_628154b_c2 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.workflow:workflow-cps'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2803.v1a_f77ffcc773'}]}], 'database_specific': {'last_known_affected_version_range': '< 2803.v1a'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43402'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(1)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/10/19/3'}]
{'cwe_ids': ['CWE-693'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T22:04:22Z', 'nvd_published_at': '2022-10-19T16:15:00Z'}
1.4.0
GHSA-9pgh-qqpf-7wqj
2022-11-08T19:35:06Z
2022-10-11T20:42:57Z
2022-11-08T19:35:06Z
['CVE-2022-37616']
Withdrawn: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in @xmldom/xmldom and xmldom
## Withdrawn This advisory has been withdrawn because the maintainers of `@xmldom/xmldom` and multiple third parties disputed the validity of the issue. Attempts to create or replicate a proof of concept have been unsuccessful. ## Original Description ### Impact A prototype pollution vulnerability exists in the func...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': '@xmldom/xmldom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8.0'}, {'fixed': '0.8.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'xmldom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.6.0'}]}]}, {'package': {'eco...
[{'type': 'WEB', 'url': 'https://github.com/xmldom/xmldom/security/advisories/GHSA-9pgh-qqpf-7wqj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37616'}, {'type': 'WEB', 'url': 'https://github.com/xmldom/xmldom/issues/436'}, {'type': 'WEB', 'url': 'https://github.com/xmldom/xmldom/issues/436#...
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-11T20:42:57Z', 'nvd_published_at': '2022-10-11T05:15:00Z'}
1.4.0
GHSA-jjmg-x456-w976
2022-10-10T20:59:02Z
2022-10-10T20:59:02Z
null
[]
Incorrect default cookie name and recommendation
### Impact _What kind of vulnerability is it? Who is impacted?_ The default cookie name (and documentation recommendation) was prefixed with `Host__` instead of `__Host-`. The point of this prefix is for additional security, to ensure that, when no domain option is provided in the cookie options, we can guarantee the ...
[]
[{'package': {'ecosystem': 'npm', 'name': 'csrf-csrf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Psifi-Solutions/csrf-csrf/security/advisories/GHSA-jjmg-x456-w976'}, {'type': 'WEB', 'url': 'https://github.com/Psifi-Solutions/csrf-csrf/commit/8f1ce8db97d945a4bb7f39f0b43c6041fa83d675'}, {'type': 'PACKAGE', 'url': 'https://github.com/Psifi-Solutions/csrf-csrf'}]
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-10-10T20:59:02Z', 'nvd_published_at': None}
1.4.0
GHSA-f2rj-m42r-6jm2
2023-08-30T09:52:10Z
2022-10-25T20:22:29Z
null
['CVE-2022-38580']
Skipper vulnerable to SSRF via X-Skipper-Proxy
### Impact Skipper prior to version v0.13.236 is vulnerable to server-side request forgery (SSRF). An attacker can exploit a vulnerable version of proxy to access the internal metadata server or other unauthenticated URLs by adding an specific header (X-Skipper-Proxy) to the http request. ### Patches The problem was ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/zalando/skipper'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.237'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/zalando/skipper/security/advisories/GHSA-f2rj-m42r-6jm2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38580'}, {'type': 'WEB', 'url': 'https://github.com/zalando/skipper/pull/2058'}, {'type': 'WEB', 'url': 'https://github.com/zalando/skipper/commit...
{'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T20:22:29Z', 'nvd_published_at': '2022-10-25T17:15:00Z'}
1.4.0
GHSA-4xqx-pqpj-9fqw
2022-10-07T07:20:57Z
2022-10-07T07:20:57Z
null
['CVE-2020-14188']
gajira-create GitHub action vulnerable to arbitrary code execution
### Impact An attacker can execute arbitrary code in the context of a GitHub runner by creating a specially crafted GitHub issue. ### Patches This issue is patched in gajira-create version 2.0.1. ### Workarounds There are no known workarounds. ### References [GitHub Security Lab advisory GHSL-2020-172](https://secur...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'GitHub Actions', 'name': 'atlassian/gajira-create'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/atlassian/gajira-create/security/advisories/GHSA-4xqx-pqpj-9fqw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14188'}, {'type': 'PACKAGE', 'url': 'https://github.com/atlassian/gajira-create'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-07T07:20:57Z', 'nvd_published_at': '2020-11-09T22:15:00Z'}
1.4.0
GHSA-wrx5-rp7m-mm49
2023-03-06T22:41:22Z
2022-10-06T18:52:05Z
2023-03-06T22:41:22Z
['CVE-2022-41852']
Withdrawn: CVE Rejected: JXPath vulnerable to remote code execution when interpreting untrusted XPath expressions
## This advisory has been withdrawn due to the CVE being rejected. ## Original advisory text Those using JXPath to interpret untrusted XPath expressions may be vulnerable to a remote code execution attack. All JXPathContext class functions processing a XPath string are vulnerable except `compile()` and `compilePath()`...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'commons-jxpath:commons-jxpath'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41852'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47133'}, {'type': 'WEB', 'url': 'https://commons.apache.org/proper/commons-jxpath/users-guide.html#Standard_Extension_Functions'}, {'type': 'PACKAGE', 'url': 'ht...
{'cwe_ids': ['CWE-470'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-06T20:35:33Z', 'nvd_published_at': '2022-10-06T18:17:00Z'}
1.4.0
GHSA-w67g-6gjv-c599
2023-01-20T22:03:09Z
2022-10-13T12:00:26Z
null
['CVE-2022-42906']
Powerline Gitstatus vulnerable to arbitrary code execution
powerline-gitstatus (aka Powerline Gitstatus) before 1.3.2 allows arbitrary code execution. git repositories can contain per-repository configuration that changes the behavior of git, including running arbitrary commands. When using powerline-gitstatus, changing to a directory automatically runs git commands in order t...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'powerline-gitstatus'}, 'ecosystem_specific': {'affected_functions': ['powerline_gitstatus.segments.GitStatusSegment.get_base_command']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42906'}, {'type': 'WEB', 'url': 'https://github.com/jaspernbrouwer/powerline-gitstatus/issues/45'}, {'type': 'WEB', 'url': 'https://github.com/jaspernbrouwer/powerline-gitstatus/commit/fe8e963b3489e4cceaa2c1f26f2bcc2ef405364c'}, {'type': 'PACKAGE',...
{'cwe_ids': ['CWE-77', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-13T19:13:14Z', 'nvd_published_at': '2022-10-13T03:15:00Z'}
1.4.0
GHSA-7v3g-4878-5qrf
2022-10-13T20:09:08Z
2022-10-12T12:00:21Z
null
['CVE-2022-41606']
Nomad Panics On Job Submission With Bad Artifact Stanza Source URL
HashiCorp Nomad and Nomad Enterprise 1.0.2 up to 1.2.12, and 1.3.5 jobs submitted with an artifact stanza using invalid S3 or GCS URLs can be used to crash client agents. Fixed in 1.2.13, 1.3.6, and 1.4.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.13'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.6'}...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41606'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2022-22-nomad-panics-on-job-submission-with-bad-artifact-stanza-source-url/45420'}, {'type': 'PACKAGE', 'url': 'https://...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-12T20:03:06Z', 'nvd_published_at': '2022-10-12T00:15:00Z'}
1.4.0
GHSA-g3q9-xf95-8hp5
2022-10-14T19:47:48Z
2022-10-11T20:48:52Z
null
['CVE-2022-41032']
NuGet Elevation of Privilege Vulnerability
## Description Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 7.0.0-rc, .NET 6.0, .NET Core 3.1, and NuGet (NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.Protocol). This advisory also provides guidance on what developers can do to update their applications to r...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'NuGet.Commands'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.6.0'}, {'fixed': '4.9.6'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.Commands'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.7.3'}]}]}, {'package...
[{'type': 'WEB', 'url': 'https://github.com/NuGet/NuGet.Client/security/advisories/GHSA-g3q9-xf95-8hp5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41032'}, {'type': 'WEB', 'url': 'https://github.com/NuGet/Announcements/issues/65'}, {'type': 'PACKAGE', 'url': 'https://github.com/NuGet/NuGet...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-11T20:48:52Z', 'nvd_published_at': '2022-10-11T19:15:00Z'}
1.4.0
GHSA-grv6-m753-3w2g
2022-10-10T16:52:21Z
2022-10-07T18:16:01Z
null
['CVE-2022-3423']
NocoDB vulnerable to Denial of Service
NocoDB prior to 0.92.0 allows actors to insert large characters into the input field `New Project` on the create field, which can cause a Denial of Service (DoS) via a crafted HTTP request. Version 0.92.0 fixes this issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'nocodb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.92.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3423'}, {'type': 'WEB', 'url': 'https://github.com/nocodb/nocodb/commit/000ecd886738b965b5997cd905825e3244f48b95'}, {'type': 'PACKAGE', 'url': 'https://github.com/nocodb/nocodb'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/94639d8e-8301-443...
{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-07T21:55:42Z', 'nvd_published_at': '2022-10-07T11:15:00Z'}
1.4.0
GHSA-95w5-q9vp-5vrm
2022-10-25T20:22:49Z
2022-10-24T19:00:16Z
null
['CVE-2021-42010']
Heron allows CRLF log injection
Heron versions <= 0.20.4-incubating allows CRLF log injection because of the lack of escaping in the log statements. Please update to version 0.20.5-incubating which addresses this issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.heron:heron-api'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.20.5-incubating'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42010'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/j65nwr8n7jchngwqptzh100drcr4ry2q'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/10/23/2'}]
{'cwe_ids': ['CWE-116'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T20:22:49Z', 'nvd_published_at': '2022-10-24T14:15:00Z'}
1.4.0
GHSA-p658-8693-mhvg
2023-02-15T19:32:29Z
2022-10-07T07:23:51Z
null
['CVE-2021-21271']
Tendermint Core vulnerable to Uncontrolled Resource Consumption
### Description Tendermint Core v0.34.0 introduced a new way of handling evidence of misbehavior. As part of this, [we added a new `Timestamp` field to `Evidence` structs](https://github.com/tendermint/tendermint/pull/5219). This timestamp would be calculated using the same algorithm that is used when a block is crea...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/tendermint/tendermint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.34.0'}, {'fixed': '0.34.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/tendermint/tendermint/security/advisories/GHSA-p658-8693-mhvg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21271'}, {'type': 'WEB', 'url': 'https://github.com/tendermint/tendermint/commit/a2a6852ab99e4a0f9e79f0ea8c1726e262e25c76'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-07T07:23:51Z', 'nvd_published_at': None}
1.4.0
GHSA-hrrm-895h-xh34
2022-10-07T13:07:05Z
2022-10-06T18:52:04Z
null
['CVE-2022-3389']
rdiffweb Path Traversal vulnerability
rdiffweb prior to 2.4.10 is vulnerable to Path Traversal. Version 2.4.10 contains a patch.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3389'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/323383d1db656f1b1291be529947bd943a6b0e99'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-datab...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-06T20:10:47Z', 'nvd_published_at': '2022-10-06T18:16:00Z'}
1.4.0
GHSA-27rf-8mjp-r363
2022-12-16T16:31:10Z
2022-10-19T19:00:21Z
null
['CVE-2022-43404']
Sandbox bypass vulnerabilities in Jenkins Script Security Plugin and in Pipeline: Groovy Plugin
Script Security Plugin provides a sandbox feature that allows low privileged users to define scripts, including Pipelines, that are generally safe to execute. Calls to code defined inside a sandboxed script are intercepted, and various allowlists are checked to determine whether the call is to be allowed. Multiple san...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:script-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1184.v85d16b_d851b_3'}]}], 'database_specific': {'last_known_affected_version_range': '< 1184.v85d16b'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jen...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43404'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(1)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/10/19/3'}]
{'cwe_ids': ['CWE-693'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T22:04:13Z', 'nvd_published_at': '2022-10-19T16:15:00Z'}
1.4.0
GHSA-92gf-p376-6r9r
2022-10-14T21:30:20Z
2022-10-14T12:00:17Z
null
['CVE-2022-3456']
Missing rate limit on rdiffweb
Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffweb prior to 2.5.0.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3456'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/b78ec09f4582e363f6f449df6f987127e126c311'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b34412ca-50...
{'cwe_ids': ['CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-14T21:30:20Z', 'nvd_published_at': '2022-10-13T20:15:00Z'}
1.4.0
GHSA-m3m3-6gww-7gj9
2022-10-13T20:09:39Z
2022-10-11T20:45:54Z
null
['CVE-2022-39297']
melisplatform/melis-cms vulnerable to deserialization of untrusted data
### Impact Attackers can deserialize arbitrary data on affected versions of `melisplatform/melis-cms`, and ultimately leads to the execution of arbitrary PHP code on the system. Conducting this attack does not require authentication. Users should immediately upgrade to `melisplatform/melis-cms` >= 5.0.1. ### Patches...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'melisplatform/melis-cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/melisplatform/melis-cms/security/advisories/GHSA-m3m3-6gww-7gj9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39297'}, {'type': 'WEB', 'url': 'https://github.com/melisplatform/melis-cms/commit/d124b2474699a679a24ec52620cadceb3d4cec11'}, {'type': 'P...
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-11T20:45:54Z', 'nvd_published_at': '2022-10-12T23:15:00Z'}
1.4.0
GHSA-p8f7-22gq-m7j9
2022-10-20T20:12:38Z
2022-10-17T12:00:27Z
null
['CVE-2022-42975']
Phoenix before 1.6.14 mishandles check_origin wildcarding
socket/transport.ex in Phoenix before 1.6.14 mishandles check_origin wildcarding. NOTE: LiveView applications are unaffected by default because of the presence of a LiveView CSRF token.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Hex', 'name': 'phoenix'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.14'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42975'}, {'type': 'WEB', 'url': 'https://github.com/phoenixframework/phoenix/commit/6e7185b33a59e0b1d1c0b4223adf340a73e963ae'}, {'type': 'PACKAGE', 'url': 'https://github.com/phoenixframework/phoenix'}, {'type': 'WEB', 'url': 'https://hexdocs.pm/ph...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-18T18:01:44Z', 'nvd_published_at': '2022-10-17T06:15:00Z'}
1.4.0
GHSA-5jp2-vwrj-99rf
2022-12-27T22:03:26Z
2022-10-19T20:26:05Z
null
['CVE-2022-31683']
Team scope authorization bypass when Post/Put request with :team_name in body, allows HTTP parameter pollution
### Impact For some Post/Put Concourse endpoint containing `:team_name` in the URL, a Concourse user can send a request with body including `:team_name=team2` to bypass team scope check to gain access to certain resources belong to any other team. The user only needs a valid user session and belongs to team2. Exploita...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/concourse/concourse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.7.9'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/concourse/concourse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '...
[{'type': 'WEB', 'url': 'https://github.com/concourse/concourse/security/advisories/GHSA-5jp2-vwrj-99rf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31683'}, {'type': 'WEB', 'url': 'https://github.com/concourse/concourse/pull/8566'}, {'type': 'WEB', 'url': 'https://github.com/concourse/conc...
{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T20:26:05Z', 'nvd_published_at': '2022-12-19T16:15:00Z'}