schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
8
154
details
stringlengths
31
19.1k
severity
stringlengths
2
92
affected
stringlengths
75
28.5k
references
stringlengths
79
7.48k
database_specific
stringlengths
131
196
1.4.0
GHSA-373r-9mg8-3jc4
2022-10-27T18:34:41Z
2022-10-25T19:00:27Z
null
['CVE-2022-34870']
Apache Geode vulnerable to Cross-Site Scripting
Apache Geode versions up to 1.15.0 are vulnerable to a Cross-Site Scripting (XSS) via data injection when using Pulse web application to view Region entries.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.geode:geode-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34870'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/geode'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/zltlr7f2ymr2m6jj54k4z0c4foos5fwx'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/10/24/3'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T22:40:48Z', 'nvd_published_at': '2022-10-25T17:15:00Z'}
1.4.0
GHSA-99j5-fvg3-54pm
2022-10-25T20:50:27Z
2022-10-20T12:00:17Z
null
['CVE-2022-3327']
Rdiffweb is missing authentication for critical function
Missing Authentication for Critical Function in GitHub repository ikus060/rdiffweb prior to 2.5.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3327'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/f2a32f2a9f3fb8be1a9432ac3d81d3aacdb13095'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-datab...
{'cwe_ids': ['CWE-306'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-20T18:40:19Z', 'nvd_published_at': '2022-10-20T00:15:00Z'}
1.4.0
GHSA-682j-2p53-xp5f
2022-12-16T19:48:51Z
2022-10-19T19:00:22Z
null
['CVE-2022-43423']
Agent-to-controller security bypass vulnerability in Jenkins BMC Compuware Source Code Download for Endevor, PDS, and ISPW Plugin
BMC Compuware Source Code Download for Endevor, PDS, and ISPW Plugin 2.0.12 and earlier implements an agent/controller message that does not limit where it can be executed. It allows attackers able to control agent processes to obtain the values of Java system properties from the Jenkins controller process. This vuln...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.compuware.jenkins:compuware-scm-downloader'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43423'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/compuware-scm-downloader-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2622'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists...
{'cwe_ids': ['CWE-693'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T22:01:36Z', 'nvd_published_at': '2022-10-19T16:15:00Z'}
1.4.0
GHSA-633r-r4p8-pw3w
2022-10-12T20:11:41Z
2022-10-11T19:00:26Z
null
['CVE-2022-41376']
Cross site scripting in Metro UI
Metro UI v4.4.0 to v4.5.1 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the Javascript function. User input is not properly sanitized before rendering in the `textarea` component.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'metro4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'last_affected': '4.5.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41376'}, {'type': 'WEB', 'url': 'https://alicangonullu.org/konu/138'}, {'type': 'PACKAGE', 'url': 'https://github.com/olton/Metro-UI-CSS'}, {'type': 'WEB', 'url': 'https://youtu.be/_wzGVpX54Rc'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-12T20:11:41Z', 'nvd_published_at': '2022-10-11T17:15:00Z'}
1.4.0
GHSA-c942-mfmp-p4fh
2022-10-25T19:58:53Z
2022-10-19T19:00:17Z
null
['CVE-2022-41709']
Markdownify subject to Remote Code Execution via malicious markdown file
Markdownify version 1.4.1 allows an external attacker to execute arbitrary code remotely on any client attempting to view a malicious markdown file through Markdownify. This is possible because the application has the "nodeIntegration" option enabled. There are currently no patched versions and no known workarounds.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'electron-markdownify'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41709'}, {'type': 'WEB', 'url': 'https://fluidattacks.com/advisories/adams/'}, {'type': 'PACKAGE', 'url': 'https://github.com/amitmerchant1990/electron-markdownify'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T19:58:53Z', 'nvd_published_at': '2022-10-19T17:15:00Z'}
1.4.0
GHSA-c27j-76xg-6x4f
2022-10-18T21:16:27Z
2022-10-18T21:16:27Z
null
['CVE-2022-39315']
Kirby CMS vulnerable to user enumeration in the brute force protection
### TL;DR This vulnerability affects all Kirby sites with user accounts (unless Kirby's API and Panel are disabled in the config). It can only be exploited for targeted attacks because the attack does not scale to brute force. ---- ### Introduction User enumeration is a type of vulnerability that allows attackers t...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'getkirby/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.8.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'getkirby/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.6.0'}, {'fixed': '3.6.6.2'}]}]}, {'pac...
[{'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/security/advisories/GHSA-c27j-76xg-6x4f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39315'}, {'type': 'PACKAGE', 'url': 'https://github.com/getkirby/kirby'}, {'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/releases/tag/3....
{'cwe_ids': ['CWE-204', 'CWE-209', 'CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-18T21:16:27Z', 'nvd_published_at': '2022-10-25T17:15:00Z'}
1.4.0
GHSA-whpx-q3rq-w8jc
2022-10-20T18:38:35Z
2022-10-20T18:38:35Z
null
[]
Hardening of TypedArrays with non-canonical numeric property names in SES
### Impact _What kind of vulnerability is it? Who is impacted?_ In Hardened JavaScript, programs can `harden` objects to safely share objects with co-tenant programs without risk of these other programs tampering with their API surface. Hardening does not guarantee that objects are pure or immutable, so a hardened `Ma...
[]
[{'package': {'ecosystem': 'npm', 'name': 'ses'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.16.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/endojs/endo/security/advisories/GHSA-whpx-q3rq-w8jc'}, {'type': 'WEB', 'url': 'https://github.com/endojs/endo/commit/88cab0be4cf816dc578f2ff441fd9bcda0aa5cf5'}, {'type': 'PACKAGE', 'url': 'https://github.com/endojs/endo'}]
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-10-20T18:38:35Z', 'nvd_published_at': None}
1.4.0
GHSA-j5v3-363p-g843
2022-10-24T18:51:43Z
2022-10-20T19:00:30Z
null
['CVE-2022-40084']
OpenCRX vulnerable to password enumeration via error messages in password reset
OpenCRX before v5.2.2 was discovered to be vulnerable to password enumeration due to the difference in error messages received during a password reset which could enable an attacker to determine if a username, email or ID is valid.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.opencrx:opencrx-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40084'}, {'type': 'WEB', 'url': 'https://cwe.mitre.org/data/definitions/204.html'}, {'type': 'WEB', 'url': 'https://github.com/ciph0x01/OpenCRX-CVE/blob/main/CVE-2022-40084.md'}]
{'cwe_ids': ['CWE-203'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-24T18:51:43Z', 'nvd_published_at': '2022-10-20T14:15:00Z'}
1.4.0
GHSA-9w72-2f23-57gm
2022-10-05T13:59:42Z
2022-10-01T00:00:25Z
null
['CVE-2022-2922']
DNN vulnerable to Relative Path Traversal
DNN (GitHub repository dnnsoftware/dnn.platform) prior to 9.11.0 is vulnerable to Relative Path Traversal. Version 9.11.0 contains a patch for this issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'DotNetNuke.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.11.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'DotNetNuke.Web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.11.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2922'}, {'type': 'WEB', 'url': 'https://github.com/dnnsoftware/Dnn.Platform/commit/3697c5344cef8d49214230f0cc2efcd9e93a00a8'}, {'type': 'WEB', 'url': 'https://github.com/dnnsoftware/dnn.platform/commit/9b17351592fbde376506ba6705dbcc7a74a2a195'}, {'...
{'cwe_ids': ['CWE-22', 'CWE-23'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-03T22:21:19Z', 'nvd_published_at': '2022-09-30T07:15:00Z'}
1.4.0
GHSA-7wr6-fj4x-893v
2022-10-12T18:16:54Z
2022-10-06T18:52:04Z
null
['CVE-2022-3376']
rdiffweb allows a new password to be the same as the previous password
rdiffweb prior to 2.5.0a4 allows users to set their new password to be the same as the old password during a password reset. Version 2.5.0a4 enforces a password policy in which a new password cannot be the same as the old one.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3376'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/2ffc2af65c8f8113b06e0b89929c604bcdf844b9'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a9021e93-6d...
{'cwe_ids': ['CWE-521'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-06T20:10:38Z', 'nvd_published_at': '2022-10-06T18:16:00Z'}
1.4.0
GHSA-w596-4wvx-j9j6
2023-08-08T12:52:37Z
2022-10-16T12:00:23Z
null
['CVE-2022-42969']
ReDoS in py library when used with subversion
The py library through 1.11.0 for Python allows remote attackers to conduct a ReDoS (Regular expression Denial of Service) attack via a Subversion repository with crafted info data, because the InfoSvnCommand argument is mishandled. The particular codepath in question is the regular expression at `py._path.svnurl.Info...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'py'}, 'ecosystem_specific': {'affected_functions': ['py._path.svnurl.InfoSvnCommand.lspattern', 'py._path.svnurl.InfoSvnCommand']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.11.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42969'}, {'type': 'WEB', 'url': 'https://github.com/pytest-dev/py/issues/287'}, {'type': 'WEB', 'url': 'https://github.com/pytest-dev/py/issues/288'}, {'type': 'WEB', 'url': 'https://github.com/pytest-dev/pytest/issues/10392'}, {'type': 'PACKAGE', ...
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-18T18:03:13Z', 'nvd_published_at': '2022-10-16T06:15:00Z'}
1.4.0
GHSA-r8gm-v65f-c973
2022-10-31T22:42:57Z
2022-10-31T22:42:57Z
null
['CVE-2022-39366']
acryl-datahub missing JWT signature check
# Missing JWT signature check (`GHSL-2022-078`) The [`StatelessTokenService`](https://github.com/datahub-project/datahub/blob/aa146db611e3a4ca3aa17bb740783f789d4444d3/metadata-service/auth-impl/src/main/java/com/datahub/authentication/token/StatelessTokenService.java#L30) of the DataHub metadata service (GMS) does not...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'acryl-datahub'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.45'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/datahub-project/datahub/security/advisories/GHSA-r8gm-v65f-c973'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39366'}, {'type': 'WEB', 'url': 'https://codeql.github.com/codeql-query-help/java/java-missing-jwt-signature-check/'}, {'type': 'PACKAGE',...
{'cwe_ids': ['CWE-347'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-31T22:42:57Z', 'nvd_published_at': '2022-10-28T17:15:00Z'}
1.4.0
GHSA-m5m3-46gj-wch8
2023-01-10T16:09:12Z
2022-10-06T19:54:55Z
null
['CVE-2022-39237']
SIF's Digital Signature Hash Algorithms Not Validated
### Impact The `github.com/sylabs/sif/v2/pkg/integrity` package does not verify that the hash algorithm(s) used are cryptographically secure when verifying digital signatures. ### Patches A patch is available in version >= v2.8.1 of the module. Users are encouraged to upgrade. The patch is commit https://github.com...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/sylabs/sif/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/sylabs/sif/security/advisories/GHSA-m5m3-46gj-wch8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39237'}, {'type': 'WEB', 'url': 'https://github.com/sylabs/sif/commit/07fb86029a12e3210f6131e065570124605daeaa'}, {'type': 'PACKAGE', 'url': 'https://g...
{'cwe_ids': ['CWE-327', 'CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-06T19:54:55Z', 'nvd_published_at': '2022-10-06T18:16:00Z'}
1.4.0
GHSA-47xc-9rr2-q7p4
2023-06-27T21:56:04Z
2022-10-25T19:56:51Z
null
['CVE-2022-39327']
Improper Control of Generation of Code ('Code Injection') in Azure CLI
# Description In versions previous to 2.40.0, Azure CLI contains a vulnerability for potential code injection. Critical scenarios are where a hosting machine runs an Azure CLI command where parameter values have been provided by an external source. For example: Application X is a web application with a feature that ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'azure-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.40.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Azure/azure-cli/security/advisories/GHSA-47xc-9rr2-q7p4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39327'}, {'type': 'WEB', 'url': 'https://github.com/Azure/azure-cli/pull/23514'}, {'type': 'WEB', 'url': 'https://github.com/Azure/azure-cli/pull/...
{'cwe_ids': ['CWE-78', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T19:56:51Z', 'nvd_published_at': '2022-10-25T17:15:00Z'}
1.4.0
GHSA-7rrj-hqv6-fvpp
2022-12-16T20:01:51Z
2022-10-19T19:00:18Z
null
['CVE-2022-43435']
Content-Security-Policy protection for user content can be disabled in Jenkins 360 FireLine Plugin
Jenkins sets the Content-Security-Policy header to static files served by Jenkins (specifically `DirectoryBrowserSupport`), such as workspaces, `/userContent`, or archived artifacts, unless a Resource Root URL is specified. 360 FireLine Plugin 1.7.2 and earlier globally disables the `Content-Security-Policy` header fo...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.plugin:fireline'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.7.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43435'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/fireline-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2866'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/20...
{'cwe_ids': ['CWE-693'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T20:27:57Z', 'nvd_published_at': '2022-10-19T16:15:00Z'}
1.4.0
GHSA-998r-j9rx-qm8m
2022-10-22T01:05:56Z
2022-10-19T12:00:18Z
null
['CVE-2022-42467']
Apache Isis webconsole module may directly query the database in prototype mode
When running in prototype mode, the h2 webconsole module (accessible from the Prototype menu) is automatically made available with the ability to directly query the database. It was felt that it is safer to require the developer to explicitly enable this capability. As of 2.0.0-M8, this can now be done using the `isis....
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.isis.core:isis-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0-M8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42467'}, {'type': 'WEB', 'url': 'https://github.com/apache/isis/commit/9fcab9816dac37e0f07ffe3f5c4f47df9cec8694'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/isis'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/jbv2ddt00h7ntlb...
{'cwe_ids': ['CWE-1188'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T18:48:29Z', 'nvd_published_at': '2022-10-19T08:15:00Z'}
1.4.0
GHSA-rwqr-m72q-v6cm
2022-10-31T15:41:33Z
2022-10-25T19:00:29Z
null
['CVE-2022-42890']
Untrusted code execution in Apache XML Graphics Batik
A vulnerability in Batik of Apache XML Graphics allows an attacker to run Java code from untrusted SVG via JavaScript. This issue affects Apache XML Graphics prior to 1.16. Users are recommended to upgrade to version 1.16.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.xmlgraphics:batik'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42890'}, {'type': 'WEB', 'url': 'https://github.com/apache/xmlgraphics-batik/commit/401aa8595f52d085d40ff5b6b4ac0dd372423082'}, {'type': 'WEB', 'url': 'https://github.com/apache/xmlgraphics-batik/commit/52f7a1ad6e3110ec295a35ffc94410eef085707a'}, {...
{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T23:10:03Z', 'nvd_published_at': '2022-10-25T17:15:00Z'}
1.4.0
GHSA-455w-c45v-86rg
2022-10-11T13:45:14Z
2022-10-11T13:45:14Z
null
['CVE-2022-39288']
fastify vulnerable to denial of service via malicious Content-Type
### Impact An attacker can send an invalid `Content-Type` header that can cause the application to crash, leading to a possible Denial of Service attack. Only the v4.x line is affected. (This was updated: upon a close inspection, v3.x is not affected after all). ### Patches Yes, update to `> v4.8.0`. ### Workarounds...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'fastify'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.8.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/fastify/fastify/security/advisories/GHSA-455w-c45v-86rg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39288'}, {'type': 'WEB', 'url': 'https://github.com/fastify/fastify/commit/fbb07e8dfad74c69cd4cd2211aedab87194618e3'}, {'type': 'PACKAGE', 'url': ...
{'cwe_ids': ['CWE-754'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-11T13:45:14Z', 'nvd_published_at': '2022-10-10T21:15:00Z'}
1.4.0
GHSA-f42p-vc8p-7x54
2022-10-20T20:11:34Z
2022-10-18T19:00:33Z
null
['CVE-2022-41547']
MobSF allows attackers to read arbitrary files via a crafted HTTP request
Mobile Security Framework (MobSF) v0.9.2 and below was discovered to contain a local file inclusion (LFI) vulnerability in the `StaticAnalyzer/views.py` script. This vulnerability allows attackers to read arbitrary files via a crafted HTTP request.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'mobsf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41547'}, {'type': 'WEB', 'url': 'https://github.com/MobSF/Mobile-Security-Framework-MobSF/pull/166'}, {'type': 'WEB', 'url': 'https://github.com/MobSF/Mobile-Security-Framework-MobSF/commit/b9cdd1f52bdf127cf33bb1be369e374a2855f8e6#diff-69d2e38f6bba...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-18T21:17:22Z', 'nvd_published_at': '2022-10-18T15:15:00Z'}
1.4.0
GHSA-vj4m-83m8-xpw5
2023-06-27T21:55:53Z
2022-10-25T20:21:45Z
null
['CVE-2022-39341']
OpenFGA Authorization Bypass via tupleset wildcard
### Overview During our internal security assessment, it was discovered that OpenFGA versions `v0.2.3` and prior are vulnerable to authorization bypass under certain conditions. ### Am I affected? You are affected by this vulnerability if you are using `openfga/openfga` version `v0.2.3` and you added a tuple with a wi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/openfga/openfga'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.2.3'}}]
[{'type': 'WEB', 'url': 'https://github.com/openfga/openfga/security/advisories/GHSA-vj4m-83m8-xpw5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39341'}, {'type': 'WEB', 'url': 'https://github.com/openfga/openfga/commit/b466769cc100b2065047786578718d313f52695b'}, {'type': 'PACKAGE', 'url': ...
{'cwe_ids': ['CWE-285', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T20:21:45Z', 'nvd_published_at': '2022-10-25T17:15:00Z'}
1.4.0
GHSA-pc6f-259w-w3j6
2022-10-05T13:57:07Z
2022-10-04T00:00:25Z
null
['CVE-2022-36551']
Heartex - Label Studio Community Edition vulnerable to SSRF in the Data Import module
A Server Side Request Forgery (SSRF) in the Data Import module in Heartex - Label Studio Community Edition versions 1.5.0 and earlier allows an authenticated user to access arbitrary files on the system. Furthermore, self-registration is enabled by default in these versions of Label Studio enabling a remote attacker to...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'label-studio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36551'}, {'type': 'WEB', 'url': 'https://github.com/heartexlabs/label-studio/pull/2840'}, {'type': 'WEB', 'url': 'https://github.com/heartexlabs/label-studio/commit/501142cb815ac964b0c600c491885b67386870c2'}, {'type': 'PACKAGE', 'url': 'https://git...
{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-04T21:57:17Z', 'nvd_published_at': '2022-10-03T12:15:00Z'}
1.4.0
GHSA-m974-647v-whv7
2022-10-18T03:11:22Z
2022-10-12T22:05:41Z
null
['CVE-2022-39299']
Signature bypass via multiple root elements
### Impact A remote attacker may be able to bypass SAML authentication on a website using passport-saml. A successful attack requires that the attacker is in possession of an arbitrary IDP signed XML element. Depending on the IDP used, fully unauthenticated attacks (e.g without access to a valid user) might also be fe...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'passport-saml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'node-saml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0-beta.5'}]}]}, {'package': {'ecosys...
[{'type': 'WEB', 'url': 'https://github.com/node-saml/passport-saml/security/advisories/GHSA-m974-647v-whv7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39299'}, {'type': 'WEB', 'url': 'https://github.com/node-saml/passport-saml/commit/8b7e3f5a91c8e5ac7e890a0c90bc7491ce33155e'}, {'type': 'P...
{'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-12T22:05:41Z', 'nvd_published_at': '2022-10-12T21:15:00Z'}
1.4.0
GHSA-7fvj-g3wp-29g8
2022-10-25T20:34:31Z
2022-10-19T19:00:22Z
null
['CVE-2022-43429']
Jenkins Compuware Topaz for Total Test Plugin vulnerable to Protection Mechanism Failure
Jenkins Compuware Topaz for Total Test Plugin 2.4.8 and earlier implements an agent/controller message that does not limit where it can be executed, allowing attackers able to control agent processes to read arbitrary files on the Jenkins controller file system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.compuware.jenkins:compuware-topaz-for-total-test'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43429'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2624'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/10/19/3'}]
{'cwe_ids': ['CWE-693'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T22:01:59Z', 'nvd_published_at': '2022-10-19T16:15:00Z'}
1.4.0
GHSA-5hw4-m7f3-hhx8
2022-10-06T19:53:20Z
2022-10-06T19:53:20Z
null
['CVE-2018-17057']
TCPDF vulnerable to attackers triggering deserialization of arbitrary data
An issue was discovered in TCPDF before 6.2.22. Attackers can trigger deserialization of arbitrary data via the `phar://` wrapper.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'tecnickcom/tcpdf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.2.22'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17057'}, {'type': 'WEB', 'url': 'https://github.com/LimeSurvey/LimeSurvey/commit/1cdd78d27697b3150bb44aaa7af1a81062a591a5'}, {'type': 'WEB', 'url': 'https://github.com/tecnickcom/TCPDF/commit/1861e33fe05f653b67d070f7c106463e7a5c26ed'}, {'type': 'WE...
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-06T19:53:20Z', 'nvd_published_at': None}
1.4.0
GHSA-8g9m-vv69-7j99
2022-10-11T19:39:32Z
2022-10-10T19:00:18Z
null
['CVE-2022-3438']
rdiffweb vulnerable to Open Redirect
A lack of user input validation leads to an open redirect vulnerability in rdiffweb prior to 2.5.0a4.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0a4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3438'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/4d464b467f14b8eb9103d7f5f0774e49995527c7'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/bc5689e4-22...
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-10T21:35:54Z', 'nvd_published_at': '2022-10-10T12:15:00Z'}
1.4.0
GHSA-3fhq-72hw-jqwv
2022-10-05T14:01:18Z
2022-10-01T00:00:21Z
null
['CVE-2022-3371']
rdiffweb's lack of token name length limit can result in DoS or memory corruption
rdiffweb prior to 2.5.0a3 is vulnerable to Allocation of Resources Without Limits or Throttling. A lack of limit in the length of the `Token name` parameter can result in denial of service or memory corruption. Version 2.5.0a3 fixes this issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0a3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3371'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/b62c479ff6979563c7c23e7182942bc4f460a2c7'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-datab...
{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-03T22:19:03Z', 'nvd_published_at': '2022-09-30T14:15:00Z'}
1.4.0
GHSA-95x7-mh78-7w2r
2022-10-27T18:35:10Z
2022-10-25T20:13:38Z
null
['CVE-2022-39340']
OpenFGA subject to Information Disclosure via streamed-list-objects endpoint
### Overview During our internal security assessment, it was discovered that `streamed-list-objects` endpoint was not validating the authorization header resulting in the disclosure of objects in the store. ### Am I Affected? You are affected by this vulnerability if you are using `openfga/openfga` version `v0.2.3` or...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/openfga/openfga'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.2.3'}}]
[{'type': 'WEB', 'url': 'https://github.com/openfga/openfga/security/advisories/GHSA-95x7-mh78-7w2r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39340'}, {'type': 'WEB', 'url': 'https://github.com/openfga/openfga/commit/779d73d4b6d067ee042ec9b59fec707eed71e42f'}, {'type': 'PACKAGE', 'url': ...
{'cwe_ids': ['CWE-285', 'CWE-862', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T20:13:38Z', 'nvd_published_at': '2022-10-25T17:15:00Z'}
1.4.0
GHSA-cpx3-93w7-457x
2023-08-31T21:28:27Z
2022-10-28T19:00:38Z
null
['CVE-2022-3697']
Ansible leaks password to logs
A flaw was found in Ansible in the amazon.aws collection when using the `tower_callback` parameter from the `amazon.aws.ec2_instance` module. This flaw allows an attacker to take advantage of this issue as the module is handling the parameter insecurely, leading to the password leaking in the logs.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '7.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3697'}, {'type': 'WEB', 'url': 'https://github.com/ansible-collections/amazon.aws/pull/1199'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/35749'}, {'type': 'WEB', 'url': 'https://github.com/ansible-community/ansible-build-data/...
{'cwe_ids': ['CWE-233'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-24T23:11:22Z', 'nvd_published_at': '2022-10-28T16:15:00Z'}
1.4.0
GHSA-c6w8-7mp3-34j9
2022-10-18T21:46:08Z
2022-10-18T21:46:08Z
null
['CVE-2022-24512']
.NET Remote Code Execution Vulnerability
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 6.0, .NET 5.0, and .NET Core 3.1. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability. A Remote Code Execution vulnerability exists in .NET 6.0, .NET 5....
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.linux-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.23'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.linux-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'int...
[{'type': 'WEB', 'url': 'https://github.com/dotnet/runtime/security/advisories/GHSA-c6w8-7mp3-34j9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24512'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/213'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/arch...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-18T21:46:08Z', 'nvd_published_at': '2022-03-09T17:15:00Z'}
1.4.0
GHSA-2c6m-6gqh-6qg3
2022-10-25T19:54:27Z
2022-10-25T19:54:27Z
null
['CVE-2022-39321']
Docker Command Escaping in the GitHub Actions Runner
### Impact The actions runner invokes the docker cli directly in order to run job containers, service containers, or container actions. A bug in the logic for how the environment is encoded into these docker commands was discovered that allows an input to escape the environment variable and modify that docker command ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'GitHub Actions', 'name': 'actions/runner'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.294.0'}, {'fixed': '2.296.2'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.296.1'}}, {'package': {'ecosystem': 'GitHub Actions', 'name': 'actions/runner'}, 'ranges...
[{'type': 'WEB', 'url': 'https://github.com/actions/runner/security/advisories/GHSA-2c6m-6gqh-6qg3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39321'}, {'type': 'WEB', 'url': 'https://github.com/actions/runner/pull/2107'}, {'type': 'WEB', 'url': 'https://github.com/actions/runner/pull/2108...
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T19:54:27Z', 'nvd_published_at': '2022-10-25T17:15:00Z'}
1.4.0
GHSA-hhc4-47rh-cr34
2022-10-25T22:27:21Z
2022-10-25T22:27:21Z
null
['CVE-2022-39354']
Incorrect is_static parameter for custom stateful precompiles in SputnikVM (evm)
### Impact A custom stateful precompile can use the `is_static` parameter to determine if the call is executed in a static context (via `STATICCALL`), and thus decide if stateful operations should be done. Previously, the passed `is_static` parameter was incorrect -- it was only set to `true` if the call comes from a ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'evm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.36.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.35.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/rust-blockchain/evm/security/advisories/GHSA-hhc4-47rh-cr34'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39354'}, {'type': 'WEB', 'url': 'https://github.com/rust-blockchain/evm/pull/133'}, {'type': 'PACKAGE', 'url': 'https://github.com/rust-blockc...
{'cwe_ids': ['CWE-670'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T22:27:21Z', 'nvd_published_at': '2022-10-25T19:15:00Z'}
1.4.0
GHSA-5hq7-j5wq-p227
2022-10-31T19:24:51Z
2022-10-26T12:00:28Z
null
['CVE-2022-29822']
feathers-sequelize vulnerable to SQL injection due to improper parameter filtering
feathers-sequelize is vulnerable to improper parameter filtering in the Feathers js library, which may ultimately lead to SQL injection.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'feathers-sequelize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.3.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29822'}, {'type': 'WEB', 'url': 'https://github.com/feathersjs-ecosystem/feathers-sequelize/commit/0f2d85f0b2d556f2b6c70423dcebdbd29d95e3dc'}, {'type': 'WEB', 'url': 'https://csirt.divd.nl/CVE-2022-29822/'}, {'type': 'WEB', 'url': 'https://csirt.di...
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-31T19:24:51Z', 'nvd_published_at': '2022-10-26T10:15:00Z'}
1.4.0
GHSA-x8j7-vxh9-p67g
2022-12-16T19:43:43Z
2022-10-19T19:00:18Z
null
['CVE-2022-43418']
CSRF vulnerability in Jenkins Katalon Plugin allows capturing credentials
Katalon Plugin 1.0.33 and earlier does not require POST requests for several HTTP endpoints, resulting in cross-site request forgery (CSRF) vulnerabilities. This vulnerability allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing cr...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:katalon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.34'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43418'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/katalon-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2845%20(2)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-securi...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T21:23:52Z', 'nvd_published_at': '2022-10-19T16:15:00Z'}
1.4.0
GHSA-q4qq-jhjv-7rh2
2022-10-25T20:31:45Z
2022-10-18T18:05:36Z
null
['CVE-2022-39312']
MySQL JDBC deserialization vulnerability
### Impact In Dataease, the Mysql data source in the data source function can customize the JDBC connection parameters and the Mysql server target to be connected. ![6fc8d5c539807157ee471464b184ab66](https://user-images.githubusercontent.com/13026505/195741851-19f32efb-4391-428a-949f-3d11849f417a.png) In `backend/src...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.dataease:dataease-plugin-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/dataease/dataease/security/advisories/GHSA-q4qq-jhjv-7rh2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39312'}, {'type': 'WEB', 'url': 'https://github.com/dataease/dataease/pull/3328'}, {'type': 'WEB', 'url': 'https://github.com/dataease/dataease/...
{'cwe_ids': ['CWE-20', 'CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-18T18:05:36Z', 'nvd_published_at': '2022-10-25T17:15:00Z'}
1.4.0
GHSA-px4x-hjm5-w8x3
2022-12-16T19:57:55Z
2022-10-19T19:00:22Z
null
['CVE-2022-43432']
Content-Security-Policy protection for user content disabled by Jenkins XFramium Builder Plugin
Jenkins sets the Content-Security-Policy header to static files served by Jenkins (specifically `DirectoryBrowserSupport`), such as workspaces, `/userContent`, or archived artifacts, unless a Resource Root URL is specified. XFramium Builder Plugin 1.0.22 and earlier globally disables the `Content-Security-Policy` head...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:xframium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.22'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43432'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/xframium-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2863'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/20...
{'cwe_ids': ['CWE-693'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T22:03:44Z', 'nvd_published_at': '2022-10-19T16:15:00Z'}
1.4.0
GHSA-6mhr-52mv-6v6f
2022-10-18T17:12:46Z
2022-10-18T17:12:46Z
null
['CVE-2022-39322']
Field-level access-control bypass for multiselect field
#### Impact `@keystone-6/core@2.2.0 || 2.3.0` users who are using the `multiselect` field, and provided field-level access control - are vulnerable to their field-level access control not being used. List-level access control is **NOT** affected. Field-level access control for fields other than `multiselect` are **N...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@keystone-6/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.3.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/security/advisories/GHSA-6mhr-52mv-6v6f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39322'}, {'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/commit/65c6ee3deef23605fc72b80230908696a7a65e7c'}, {'type': 'PACKAGE',...
{'cwe_ids': ['CWE-285', 'CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-18T17:12:46Z', 'nvd_published_at': '2022-10-25T17:15:00Z'}
1.4.0
GHSA-398j-f7m7-795j
2023-02-15T19:34:00Z
2022-10-06T21:25:46Z
null
['CVE-2012-0796']
PHPMailer vulnerable to email header injection
### Impact Arbitrary additional email headers can be injected via crafted From or Sender headers. ### Patches Fixed in 2.2.1 ### Workarounds Filter user-supplied values prior to using them in From or Sender properties. ### References https://nvd.nist.gov/vuln/detail/CVE-2012-0796 ### For more information If you hav...
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpmailer/phpmailer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-398j-f7m7-795j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-0796'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=783532'}, {'type': 'PACKAGE', 'url': 'https://github.com/PHPMailer...
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-06T21:25:46Z', 'nvd_published_at': '2012-07-17T10:20:00Z'}
1.4.0
GHSA-vqvm-qrwh-69h7
2022-11-01T20:37:27Z
2022-10-31T19:00:34Z
null
['CVE-2022-3771']
easyii CMS's File Upload Management vulnerable to unrestricted upload
This issue affects the function file of the file helpers/Upload.php of the component File Upload Management. The manipulation leads to unrestricted upload. The attack may be initiated remotely.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'noumo/easyii'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3771'}, {'type': 'PACKAGE', 'url': 'https://github.com/noumo/easyii'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.212501'}]
{'cwe_ids': ['CWE-284', 'CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-31T22:56:47Z', 'nvd_published_at': '2022-10-31T14:15:00Z'}
1.4.0
GHSA-485p-mrj5-8w2v
2022-10-21T20:50:24Z
2022-10-21T20:50:24Z
null
['CVE-2022-23267']
.NET Denial of Service Vulnerability
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 6.0, .NET 5.0 and .NET Core 3.1. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability. A vulnerability exists in .NET 6.0, .NET 5.0 and .NET Core 3.1 wh...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.25'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': ...
[{'type': 'WEB', 'url': 'https://github.com/dotnet/runtime/security/advisories/GHSA-485p-mrj5-8w2v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23267'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/221'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/arch...
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-21T20:50:24Z', 'nvd_published_at': '2022-05-10T21:15:00Z'}
1.4.0
GHSA-g66m-fqxf-3w35
2022-12-16T17:10:18Z
2022-10-19T19:00:22Z
null
['CVE-2022-43407']
CSRF protection for any URL can be bypassed in Jenkins Pipeline: Input Step Plugin
Pipeline: Input Step Plugin 451.vf1a_a_4f405289 and earlier does not restrict or sanitize the optionally specified ID of the `input` step. This ID is used for the URLs that process user interactions for the given `input` step (proceed or abort) and is not correctly encoded. This allows attackers able to configure Pipe...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:pipeline-input-step'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '456.vd8a_957db_5b_e9'}]}], 'database_specific': {'last_known_affected_version_range': '< 456.vd8a'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43407'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/pipeline-input-step-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2880'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-...
{'cwe_ids': ['CWE-838'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T21:21:29Z', 'nvd_published_at': '2022-10-19T16:15:00Z'}
1.4.0
GHSA-3f3w-gmqf-4hj3
2022-10-31T15:53:33Z
2022-10-26T19:00:38Z
null
['CVE-2022-39944']
Apache Linkis subject to Remote Code Execution via deserialization
In Apache Linkis <=1.2.0 when used with the MySQL Connector/J, a deserialization vulnerability with possible remote code execution impact exists when an attacker has write access to a database and configures a JDBC EC with a MySQL data source and malicious parameters. Therefore, the parameters in the jdbc url should be...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.linkis:linkis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39944'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/incubator-linkis'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/rxytj48q17304snonjtyt5lnlw64gccc'}]
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-27T18:40:10Z', 'nvd_published_at': '2022-10-26T16:15:00Z'}
1.4.0
GHSA-mwwc-3jv2-62j3
2022-10-13T18:05:31Z
2022-10-11T19:00:29Z
null
['CVE-2022-32175']
AdGuardHome vulnerable to Cross-Site Request Forgery
In AdGuardHome, versions v0.95 through v0.108.0-b.13 are vulnerable to Cross-Site Request Forgery (CSRF), in the custom filtering rules functionality. An attacker can persuade an authorized user to follow a malicious link, resulting in deleting/modifying the custom filtering rules. The file that contains the vulnerabl...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/AdguardTeam/AdGuardHome'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.95'}, {'fixed': '0.108.0-b.16'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-32175'}, {'type': 'PACKAGE', 'url': 'https://github.com/AdguardTeam/AdGuardHome'}, {'type': 'WEB', 'url': 'https://github.com/AdguardTeam/AdGuardHome/blob/v0.108.0-b.13/internal/home/controlfiltering.go#L265'}, {'type': 'WEB', 'url': 'https://githu...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-11T21:25:02Z', 'nvd_published_at': '2022-10-11T15:15:00Z'}
1.4.0
GHSA-pmw9-567p-68pc
2022-10-31T19:23:29Z
2022-10-31T18:45:43Z
null
['CVE-2022-3616']
OctoRPKI crashes when max iterations is reached
### Impact Attackers can create long chains of CAs that would lead to OctoRPKI exceeding its max iterations parameter that would cause the program to crash and not finish the validation and thus a denial of service. ### Patches This issue is fixed in v1.4.4 ### Workarounds None.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/cloudflare/cfrpki/cmd/octorpki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.3'}}]
[{'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/security/advisories/GHSA-pmw9-567p-68pc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3616'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/commit/5f64bcd13477b29cd7ddff6fff3c65dfac3423ca'}, {'type': 'PACKAGE', 'url...
{'cwe_ids': ['CWE-754', 'CWE-834'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-31T18:45:43Z', 'nvd_published_at': '2022-10-28T07:15:00Z'}
1.4.0
GHSA-7w4x-4h67-pgmv
2022-10-22T00:56:34Z
2022-10-20T12:00:17Z
null
['CVE-2022-31684']
Invalid HTTP requests in Reactor Netty HTTP Server may reveal access tokens
Reactor Netty HTTP Server, in versions 1.0.11 - 1.0.23, may request log headers in some cases of invalid HTTP requests. The logged headers may reveal valid access tokens to those with access to server logs. This may affect only invalid HTTP requests where logging at WARN level is enabled.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.projectreactor.netty:reactor-netty-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.11'}, {'fixed': '1.0.24'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31684'}, {'type': 'PACKAGE', 'url': 'https://search.maven.org/artifact/io.projectreactor.netty/reactor-netty-http'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2022-31684'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-20T18:40:50Z', 'nvd_published_at': '2022-10-19T22:15:00Z'}
1.4.0
GHSA-qv37-mfjf-42h8
2022-10-31T16:00:21Z
2022-10-25T19:00:22Z
null
['CVE-2022-3644']
Plaintext storage of tokens in pulp_ansible
The collection remote for pulp_ansible stores tokens in plaintext instead of using pulp's encrypted field and exposes them in read/write mode via the API () instead of marking it as write only.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pulp-ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3644'}, {'type': 'WEB', 'url': 'https://github.com/pulp/pulp_ansible/issues/1221'}, {'type': 'WEB', 'url': 'https://github.com/pulp/pulp_ansible/commit/d13c427b09482a7f598d8ee597d17a8a34888665'}, {'type': 'PACKAGE', 'url': 'https://github.com/pulp/...
{'cwe_ids': ['CWE-256', 'CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T22:28:13Z', 'nvd_published_at': '2022-10-25T18:15:00Z'}
1.4.0
GHSA-xqv2-3vvq-qg6r
2022-10-31T19:22:54Z
2022-10-27T19:00:38Z
null
['CVE-2022-36182']
Hashicorp Boundary vulnerable to clickjacking
Hashicorp Boundary is vulnerable to Clickjacking which allow for the interception of login credentials, re-direction of users to malicious sites, or causing users to perform malicious actions on the site.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/boundary'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.11.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36182'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/boundary'}, {'type': 'WEB', 'url': 'https://owasp.org/www-community/attacks/Clickjacking'}, {'type': 'WEB', 'url': 'https://packetstormsecurity.com/files/168654/Hashicorp-Boundary-Cl...
{'cwe_ids': ['CWE-1021'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-28T19:18:55Z', 'nvd_published_at': '2022-10-27T13:15:00Z'}
1.4.0
GHSA-9398-5ghf-7pr6
2022-10-31T18:44:47Z
2022-10-31T18:44:47Z
null
['CVE-2022-39294']
conduit-hyper vulnerable to Denial of Service from unchecked request length
Prior to version 0.4.2, `conduit-hyper` did not check any limit on a request's length before calling [`hyper::body::to_bytes`](https://docs.rs/hyper/latest/hyper/body/fn.to_bytes.html). An attacker could send a malicious request with an abnormally large `Content-Length`, which could lead to a panic if memory allocation...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'conduit-hyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.0-alpha.3'}, {'fixed': '0.4.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/conduit-rust/conduit-hyper/security/advisories/GHSA-9398-5ghf-7pr6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39294'}, {'type': 'WEB', 'url': 'https://github.com/conduit-rust/conduit-hyper/commit/4d225a53206505d39438ec6694e15f49c038baff'}, {'typ...
{'cwe_ids': ['CWE-1284', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-31T18:44:47Z', 'nvd_published_at': '2022-10-31T19:15:00Z'}
1.4.0
GHSA-mqxp-cjr9-c5jm
2022-11-16T21:12:51Z
2022-10-06T18:52:04Z
2022-11-16T21:12:51Z
['CVE-2022-40160']
JXPath Out-of-bounds Write vulnerability
## Withdrawn This advisory has been withdrawn because the original report was found to be invalid. This link is maintained to preserve external references. ## Original Description Those using JXPath to interpret XPath may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied inp...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'commons-jxpath:commons-jxpath'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40160'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47053'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/commons-jxpath'}]
{'cwe_ids': ['CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-10T20:57:22Z', 'nvd_published_at': '2022-10-06T18:16:00Z'}
1.4.0
GHSA-8g35-prrr-gxxf
2022-11-01T21:38:06Z
2022-10-31T19:00:37Z
null
['CVE-2022-40487']
ProcessWire vulnerable to Cross-site Scripting
ProcessWire v3.0.200 was discovered to contain multiple cross-site scripting (XSS) vulnerabilities via the Search Users and Search Pages function. These vulnerabilities allow attackers to execute arbitrary web scripts or HTML via injection of a crafted payload.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'processwire/processwire'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.200'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40487'}, {'type': 'WEB', 'url': 'https://gist.github.com/filipaze/32ab8683af8d82827028164e361b6e86'}, {'type': 'PACKAGE', 'url': 'https://github.com/processwire/processwire'}, {'type': 'WEB', 'url': 'http://processwire.com'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T21:38:06Z', 'nvd_published_at': '2022-10-31T12:15:00Z'}
1.4.0
GHSA-599f-7c49-w659
2022-10-17T17:34:05Z
2022-10-13T19:00:17Z
null
['CVE-2022-42889']
Arbitrary code execution in Apache Commons Text
Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.commons:commons-text'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5'}, {'fixed': '1.10.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.guicedee.services:commons-text'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42889'}, {'type': 'WEB', 'url': 'https://arxiv.org/pdf/2306.05534'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/commons-text'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/n2bd4vdsgkqh2tm14l1wyc3jyol7s1om'}, {'type': 'WEB', '...
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-13T20:22:17Z', 'nvd_published_at': '2022-10-13T13:15:00Z'}
1.4.0
GHSA-j7pg-863g-22p6
2022-12-16T17:17:55Z
2022-10-19T19:00:18Z
null
['CVE-2022-43410']
Webhook endpoint discloses job names to unauthorized users in Jenkins Mercurial Plugin
Mercurial Plugin provides a webhook endpoint at `/mercurial/notifyCommit` that can be used to notify Jenkins of changes to an SCM repository. This endpoint receives a repository URL, and Jenkins will schedule polling for all jobs configured with the specified repository. It can be accessed with GET requests and without...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:mercurial'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1260.vdfb_723cdcc81'}]}], 'database_specific': {'last_known_affected_version_range': '< 1260.vdfb'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43410'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/mercurial-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2831'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T20:27:28Z', 'nvd_published_at': '2022-10-19T16:15:00Z'}
1.4.0
GHSA-j92c-mmf7-j5x5
2022-10-18T17:27:36Z
2022-10-18T17:27:36Z
null
[]
Potential inter-blockchain communication (IBC) protocol compromise via "Dragonberry" vulnerability in cheqd
### Impact This vulnerability affects IBC transfers due to a security vulnerability dubbed "Dragonberry" upstream in [Cosmos SDK](https://github.com/cosmos/cosmos-sdk/releases/tag/v0.45.9). The vulnerability could allow malicious attackers to compromise chain-to-chain IBC transfers. There is no vulnerability in the DI...
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/cheqd/cheqd-node'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.9'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/cheqd/cheqd-node/security/advisories/GHSA-j92c-mmf7-j5x5'}, {'type': 'WEB', 'url': 'https://forum.cosmos.network/t/ibc-security-advisory-dragonberry/7702/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/cheqd/cheqd-node'}, {'type': 'WEB', 'url': 'https://github.com/cosmos/...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-18T17:27:36Z', 'nvd_published_at': None}
1.4.0
GHSA-hcw3-6459-pwhc
2022-10-25T20:34:09Z
2022-10-19T19:00:22Z
null
['CVE-2022-43431']
Jenkins Compuware Strobe Measurement Plugin Missing Authorization vulnerability
Jenkins Compuware Strobe Measurement Plugin 1.0.1 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.compuware.jenkins:compuware-strobe-measurement'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43431'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2631'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/10/19/3'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T22:02:50Z', 'nvd_published_at': '2022-10-19T16:15:00Z'}
1.4.0
GHSA-2w6m-q946-399r
2022-10-06T18:21:11Z
2022-10-04T00:00:25Z
null
['CVE-2022-38817']
Dapr Dashboard vulnerable to Incorrect Access Control
Dapr Dashboard v0.1.0 through v0.10.0 is vulnerable to Incorrect Access Control that allows attackers to obtain sensitive data.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/dapr/dashboard'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.0'}, {'last_affected': '0.10.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38817'}, {'type': 'WEB', 'url': 'https://github.com/dapr/dashboard/issues/222'}, {'type': 'PACKAGE', 'url': 'https://github.com/dapr/dashboard'}]
{'cwe_ids': ['CWE-306'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-04T21:59:06Z', 'nvd_published_at': '2022-10-03T13:15:00Z'}
1.4.0
GHSA-7cm4-vmf2-8wf2
2022-10-18T03:10:44Z
2022-10-12T19:00:42Z
null
['CVE-2022-40871']
Dolibarr vulnerable to Eval Injection
Dolibarr ERP & CRM <=15.0.3 are vulnerable to Eval injection. By default, any administrator can be added to the installation page of dolibarr, and if successfully added, malicious code can be inserted into the database and then execute it by eval.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '15.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40871'}, {'type': 'PACKAGE', 'url': 'https://github.com/Dolibarr/dolibarr'}, {'type': 'WEB', 'url': 'https://github.com/youncyb/dolibarr-rce'}]
{'cwe_ids': ['CWE-95'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-12T20:16:03Z', 'nvd_published_at': '2022-10-12T12:15:00Z'}
1.4.0
GHSA-3fh5-q6fg-w28q
2022-10-27T18:36:42Z
2022-10-27T18:36:42Z
null
['CVE-2022-39357']
Prototype pollution in Snowboard framework
### Impact The Snowboard framework in affected versions is vulnerable to prototype pollution in the main Snowboard class as well as its plugin loader. ### Patches This issue has been patched in https://github.com/wintercms/winter/commit/2a13faf99972e84c9661258f16c4750fa99d29a1 (for 1.2) and https://github.com/winte...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'wintercms/winter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.8'}, {'fixed': '1.1.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'wintercms/winter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.1'}]}...
[{'type': 'WEB', 'url': 'https://github.com/wintercms/winter/security/advisories/GHSA-3fh5-q6fg-w28q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39357'}, {'type': 'WEB', 'url': 'https://github.com/wintercms/winter/commit/2a13faf99972e84c9661258f16c4750fa99d29a1'}, {'type': 'WEB', 'url': 'h...
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-27T18:36:42Z', 'nvd_published_at': '2022-10-26T15:15:00Z'}
1.4.0
GHSA-99jc-v8qm-wjvv
2022-11-10T22:39:31Z
2022-10-06T18:52:04Z
2022-11-10T22:39:31Z
['CVE-2022-40159']
JXPath Out-of-bounds Write vulnerability
## Withdrawn This advisory has been withdrawn because the original report was found to be invalid. This link is maintained to preserve external references. ## Original Description Those using JXPath to interpret XPath may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied inp...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'commons-jxpath:commons-jxpath'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40159'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47057'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/commons-jxpath'}]
{'cwe_ids': ['CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-10T20:56:31Z', 'nvd_published_at': '2022-10-06T18:16:00Z'}
1.4.0
GHSA-4hjj-9gp7-4frg
2022-12-16T16:35:55Z
2022-10-19T19:00:21Z
null
['CVE-2022-43405']
Sandbox bypass vulnerability in Jenkins Pipeline: Groovy Libraries Plugin and Pipeline: Deprecated Groovy Libraries Plugin
Pipeline: Groovy Libraries Plugin and older releases of the Pipeline: Deprecated Groovy Libraries Plugin (formerly Pipeline: Shared Groovy Libraries Plugin) define the l`ibrary` Pipeline step, which allows Pipeline authors to dynamically load Pipeline libraries. The return value of this step can be used to instantiate ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:pipeline-groovy-lib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '613.v9c41a_160233f'}]}], 'database_specific': {'last_known_affected_version_range': '< 613.v9c41a'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43405'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(2)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/10/19/3'}]
{'cwe_ids': ['CWE-693'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T22:04:27Z', 'nvd_published_at': '2022-10-19T16:15:00Z'}
1.4.0
GHSA-jc69-hjw2-fm86
2022-10-12T18:23:36Z
2022-10-12T18:23:36Z
null
['CVE-2022-41828']
com.amazon.redshift:redshift-jdbc42 vulnerable to remote command execution
### Impact A potential remote command execution issue exists within `redshift-jdbc42` versions 2.1.0.7 and below. When plugins are used with the driver, it instantiates plugin instances based on Java class names provided via the `sslhostnameverifier`, `socketFactory`, `sslfactory`, and `sslpasswordcallback` connection...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.amazon.redshift:redshift-jdbc42'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0.8'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/aws/amazon-redshift-jdbc-driver/security/advisories/GHSA-jc69-hjw2-fm86'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41828'}, {'type': 'WEB', 'url': 'https://github.com/aws/amazon-redshift-jdbc-driver/commit/40b143b4698faf90c788ffa89f2d4d8d2ad068b...
{'cwe_ids': ['CWE-704'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-12T18:23:36Z', 'nvd_published_at': None}
1.4.0
GHSA-33c9-rppf-m7fq
2023-01-18T06:13:30Z
2022-10-07T18:15:39Z
null
['CVE-2022-42092']
Backdrop CMS Unrestricted File Upload vulnerability
Backdrop CMS 1.22.0 has Unrestricted File Upload vulnerability via `themes` that allows attackers to achieve Remote Code Execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'backdrop/backdrop'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.22.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42092'}, {'type': 'PACKAGE', 'url': 'https://github.com/backdrop-ops/backdrop-composer'}, {'type': 'WEB', 'url': 'https://grimthereaperteam.medium.com/backdrop-cms-1-22-0-unrestricted-file-upload-themes-ad42a599561c'}]
{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-18T06:13:30Z', 'nvd_published_at': '2022-10-07T18:15:00Z'}
1.4.0
GHSA-x5gv-5rqv-654m
2022-10-25T20:35:04Z
2022-10-19T19:00:18Z
null
['CVE-2022-43427']
Jenkins Compuware Topaz for Total Test Plugin allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins
Jenkins Compuware Topaz for Total Test Plugin 2.4.8 and earlier does not perform permission checks in several HTTP endpoints, allowing attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.compuware.jenkins:compuware-topaz-for-total-test'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43427'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2623'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/10/19/3'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T21:22:17Z', 'nvd_published_at': '2022-10-19T16:15:00Z'}
1.4.0
GHSA-hw4q-585g-f92x
2022-11-10T22:39:08Z
2022-10-06T18:52:04Z
2022-11-10T22:39:08Z
['CVE-2022-40161']
JXPath Out-of-bounds Write vulnerability
## Withdrawn This advisory has been withdrawn because the original report was found to be invalid. This link is maintained to preserve external references. ## Original Description Those using JXPath to interpret XPath may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied inp...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'commons-jxpath:commons-jxpath'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40161'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47097'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/commons-jxpath'}]
{'cwe_ids': ['CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-10T20:57:48Z', 'nvd_published_at': '2022-10-06T18:16:00Z'}
1.4.0
GHSA-jjjh-jjxp-wpff
2023-03-31T14:46:13Z
2022-10-03T00:00:31Z
null
['CVE-2022-42003']
Uncontrolled Resource Consumption in Jackson-databind
In FasterXML jackson-databind 2.4.0-rc1 until 2.12.7.1 and in 2.13.x before 2.13.4.2 resource exhaustion can occur because of a lack of a check in primitive value deserializers to avoid deep wrapper array nesting, when the UNWRAP_SINGLE_VALUE_ARRAYS feature is enabled. This was patched in 2.12.7.1, 2.13.4.2, and 2.14.0...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0-rc1'}, {'fixed': '2.12.7.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'eve...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42003'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/3590'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/3627'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind...
{'cwe_ids': ['CWE-400', 'CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-04T21:55:46Z', 'nvd_published_at': '2022-10-02T05:15:00Z'}
1.4.0
GHSA-vpgf-fgm8-gxr2
2022-11-01T13:29:32Z
2022-10-28T12:00:33Z
null
['CVE-2022-26884']
Apache DolphinScheduler vulnerable to Path Traversal
Users can read any files by log server, Apache DolphinScheduler users should upgrade to version 2.0.6 or higher.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dolphinscheduler:dolphinscheduler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26884'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/dolphinscheduler'}, {'type': 'WEB', 'url': 'https://github.com/apache/dolphinscheduler/releases/tag/2.0.6'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/xfdst5y4hnrm2ntmc5jz...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-31T19:37:13Z', 'nvd_published_at': '2022-10-28T08:15:00Z'}
1.4.0
GHSA-p5m3-27vh-52j4
2022-10-31T19:25:00Z
2022-10-26T12:00:28Z
null
['CVE-2022-29823']
Feather-Sequelize cleanQuery method vulnerable to Prototype Pollution
Feather-Sequelize cleanQuery method uses insecure recursive logic to filter unsupported keys from the query object. This results in a Remote Code Execution (RCE) with privileges of application.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'feathers-sequelize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.3.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29823'}, {'type': 'WEB', 'url': 'https://github.com/feathersjs-ecosystem/feathers-sequelize/commit/0b7beaa773dc313fdb27edd9ee8115064d7cf114'}, {'type': 'WEB', 'url': 'https://csirt.divd.nl/CVE-2022-29823/'}, {'type': 'WEB', 'url': 'https://csirt.di...
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-31T19:25:00Z', 'nvd_published_at': '2022-10-26T10:15:00Z'}
1.4.0
GHSA-2jxx-2x93-2q2f
2022-12-16T17:24:07Z
2022-10-19T19:00:22Z
null
['CVE-2022-43412']
Non-constant time webhook token comparison in Jenkins Generic Webhook Trigger Plugin
Generic Webhook Trigger Plugin 1.84.1 and earlier does not use a constant-time comparison when checking whether the provided and expected webhook token are equal. This could potentially allow attackers to use statistical methods to obtain a valid webhook token. Generic Webhook Trigger Plugin 1.84.2 uses a constant-ti...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:generic-webhook-trigger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.84.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43412'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/generic-webhook-trigger-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2874'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/...
{'cwe_ids': ['CWE-203', 'CWE-208'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T22:23:54Z', 'nvd_published_at': '2022-10-19T16:15:00Z'}
1.4.0
GHSA-9rpw-2h95-666c
2022-10-01T15:52:23Z
2022-10-01T15:52:23Z
null
['CVE-2022-2529']
Cloudflare GoFlow vulnerable to a Denial of Service in the sflow packet handling package
### Impact The sflow decode package prior to version 3.4.4 is vulnerable to a denial of service attack. Attackers can craft malformed packets causing the process to consume huge amounts of memory resulting in a denial of service. ### Patches Version 3.4.4 contains patches fixing this. ### Workarounds A possible worka...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/cloudflare/goflow/v3/decoders/sflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/cloudflare/goflow/security/advisories/GHSA-9rpw-2h95-666c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2529'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/goflow/commit/2b94619a6204443e3ca1769f4e459f9f57039c51'}, {'type': 'WEB', 'url': '...
{'cwe_ids': ['CWE-20', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-01T15:52:23Z', 'nvd_published_at': '2022-09-30T11:15:00Z'}
1.4.0
GHSA-pj2c-h76w-vv6f
2022-10-07T21:23:18Z
2022-10-07T21:23:18Z
null
['CVE-2022-39287']
tiny-csrf has openly visible CSRF tokens
### Impact Weak encryption on CSRF so tokens can be read by malicious attackers. ### Patches Problems have been patched as of v1.1.0 ### Workarounds Upgrade to v1.1.0 ### References https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html ### For more information ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'tiny-csrf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/valexandersaulys/tiny-csrf/security/advisories/GHSA-pj2c-h76w-vv6f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39287'}, {'type': 'WEB', 'url': 'https://github.com/valexandersaulys/tiny-csrf/commit/8eead6da3b56e290512bbe8d20c2c5df3be317ba'}, {'typ...
{'cwe_ids': ['CWE-319'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-07T21:23:18Z', 'nvd_published_at': '2022-10-07T20:15:00Z'}
1.4.0
GHSA-cvxj-4745-843x
2022-12-16T19:59:12Z
2022-10-19T19:00:22Z
null
['CVE-2022-43433']
Content-Security-Policy protection for user content disabled by Jenkins ScreenRecorder Plugin
Jenkins sets the `Content-Security-Policy` header to static files served by Jenkins (specifically `DirectoryBrowserSupport`), such as workspaces, `/userContent`, or archived artifacts, unless a Resource Root URL is specified. ScreenRecorder Plugin 0.7 and earlier programmatically updates [the Java system property](htt...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:screenrecorder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43433'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/screenrecorder-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2864'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secur...
{'cwe_ids': ['CWE-693'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T22:03:54Z', 'nvd_published_at': '2022-10-19T16:15:00Z'}
1.4.0
GHSA-c33w-pm52-mqvf
2022-10-25T20:22:01Z
2022-10-25T20:22:01Z
null
['CVE-2022-39350']
@dependencytrack/frontend vulnerable to Persistent Cross-Site-Scripting via Vulnerability Details
### Description Due to the common practice of providing vulnerability details in markdown format, the Dependency-Track frontend renders them using the JavaScript library [Showdown](https://github.com/showdownjs/showdown). Showdown [does not have any XSS countermeasures built in](https://github.com/showdownjs/showdown/...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@dependencytrack/frontend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/DependencyTrack/frontend/security/advisories/GHSA-c33w-pm52-mqvf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39350'}, {'type': 'WEB', 'url': 'https://docs.dependencytrack.org/changelog/'}, {'type': 'PACKAGE', 'url': 'https://github.com/Dependency...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T20:22:01Z', 'nvd_published_at': '2022-10-25T17:15:00Z'}
1.4.0
GHSA-5fvg-h778-jjjx
2022-12-16T17:27:51Z
2022-10-19T19:00:18Z
null
['CVE-2022-43417']
Missing permission checks in Jenkins Katalon Plugin allow capturing credentials
Katalon Plugin 1.0.32 and earlier does not perform permission checks in several HTTP endpoints. This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. Katalon Plugin 1...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:katalon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.33'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43417'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/katalon-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2845%20(1)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-securi...
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T21:24:04Z', 'nvd_published_at': '2022-10-19T16:15:00Z'}
1.4.0
GHSA-wmfh-h3vm-rcxm
2022-12-16T20:00:32Z
2022-10-19T19:00:18Z
null
['CVE-2022-43434']
Content-Security-Policy protection for user content disabled by Jenkins NeuVector Vulnerability Scanner Plugin
Jenkins sets the Content-Security-Policy header to static files served by Jenkins (specifically `DirectoryBrowserSupport`), such as workspaces, `/userContent`, or archived artifacts, unless a Resource Root URL is specified. NeuVector Vulnerability Scanner Plugin 1.20 and earlier globally disables the `Content-Security...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:neuvector-vulnerability-scanner'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.22'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.20'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43434'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/neuvector-vulnerability-scanner-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2865'}, {'type': 'WEB', 'url': 'http://www.openwall.co...
{'cwe_ids': ['CWE-693'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T21:21:50Z', 'nvd_published_at': '2022-10-19T16:15:00Z'}
1.4.0
GHSA-hpqj-7cj6-hfj8
2022-10-06T18:20:46Z
2022-10-04T00:00:22Z
null
['CVE-2022-40764']
Snyk CLI affected by Command Injection vulnerability
Snyk CLI before 1.996.0 allows arbitrary command execution, affecting Snyk IDE plugins and the snyk npm package. Exploitation could follow from the common practice of viewing untrusted files in the Visual Studio Code editor, for example. The original demonstration was with shell metacharacters in the vendor.json ignore...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'snyk'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.996.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'snyk-go-plugin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'t...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40764'}, {'type': 'PACKAGE', 'url': 'https://github.com/snyk/cli'}, {'type': 'WEB', 'url': 'https://github.com/snyk/cli/releases/tag/v1.996.0'}, {'type': 'WEB', 'url': 'https://github.com/snyk/snyk-go-plugin/releases/tag/v1.19.1'}, {'type': 'WEB', ...
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-05T21:28:25Z', 'nvd_published_at': '2022-10-03T15:15:00Z'}
1.4.0
GHSA-vpwh-qmwc-2phg
2022-11-01T21:38:30Z
2022-10-31T19:00:37Z
null
['CVE-2022-40488']
ProcessWire vulnerable to Cross-Site Request Forgery
ProcessWire v3.0.200 was discovered to contain a Cross-Site Request Forgery (CSRF).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'processwire/processwire'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.200'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40488'}, {'type': 'WEB', 'url': 'https://gist.github.com/filipaze/76138289ded98aa45dfcd939a8afd331'}, {'type': 'PACKAGE', 'url': 'https://github.com/processwire/processwire'}, {'type': 'WEB', 'url': 'http://processwire.com'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T21:38:30Z', 'nvd_published_at': '2022-10-31T12:15:00Z'}
1.4.0
GHSA-rgv9-q543-rqg4
2022-11-15T22:14:42Z
2022-10-03T00:00:31Z
null
['CVE-2022-42004']
Uncontrolled Resource Consumption in FasterXML jackson-databind
In FasterXML jackson-databind before 2.12.7.1 and in 2.13.x before 2.13.4, resource exhaustion can occur because of a lack of a check in BeanDeserializer._deserializeFromArray to prevent use of deeply nested arrays. An application is vulnerable only with certain customized choices for deserialization.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.12.7.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42004'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/3582'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/063183589218fec19a9293ed2f17ec53ea80ba88'}, {'type': 'WEB', 'url': 'https://b...
{'cwe_ids': ['CWE-400', 'CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-04T21:56:21Z', 'nvd_published_at': '2022-10-02T05:15:00Z'}
1.4.0
GHSA-2j79-8pqc-r7x6
2023-04-12T20:46:47Z
2022-10-01T00:00:24Z
null
['CVE-2022-24373']
react-native-reanimated vulnerable to ReDoS
The package react-native-reanimated before 2.10.0 is vulnerable to Regular Expression Denial of Service (ReDoS) due to improper usage of regular expression in the parser of Colors.js.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'react-native-reanimated'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24373'}, {'type': 'WEB', 'url': 'https://github.com/software-mansion/react-native-reanimated/pull/3382'}, {'type': 'WEB', 'url': 'https://github.com/software-mansion/react-native-reanimated/pull/3382/commits/7adf06d0c59382d884a04be86a96eede3d0432fa...
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-04T21:16:38Z', 'nvd_published_at': '2022-09-30T05:15:00Z'}
1.4.0
GHSA-p28h-cc7q-c4fg
2022-10-04T21:11:32Z
2022-10-01T00:00:24Z
null
['CVE-2022-21222']
css-what vulnerable to ReDoS due to use of insecure regular expression
The package css-what before 2.1.3 is vulnerable to Regular Expression Denial of Service (ReDoS) due to the use of insecure regular expression in the `re_attr` variable of index.js. The exploitation of this vulnerability could be triggered via the parse function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'css-what'}, 'ecosystem_specific': {'affected_functions': ['css-what.parse']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21222'}, {'type': 'WEB', 'url': 'https://github.com/fb55/css-what/commit/dc510929790da6617e7aa93a616498b22f6a6b72'}, {'type': 'PACKAGE', 'url': 'https://github.com/fb55/css-what'}, {'type': 'WEB', 'url': 'https://github.com/fb55/css-what/blob/a38ef...
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-04T21:11:32Z', 'nvd_published_at': '2022-09-30T05:15:00Z'}
1.4.0
GHSA-5gg9-gwj4-mqmj
2022-10-04T21:53:28Z
2022-10-04T00:00:20Z
null
['CVE-2022-32173']
OrchardCore vulnerable to HTML injection
OrchardCore versions starting with 1.0.0-rc1-11259 and prior to 1.4.0 are vulnerable to HTML injection. The vulnerability allows an authenticated user with an editor security role to inject a persistent HTML modal dialog component into the dashboard that will affect admin users. Version 1.4.0 contains a patch.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'OrchardCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0-rc1-11259'}, {'fixed': '1.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-32173'}, {'type': 'WEB', 'url': 'https://github.com/OrchardCMS/OrchardCore/pull/11729'}, {'type': 'WEB', 'url': 'https://github.com/OrchardCMS/OrchardCore/commit/0163c88ddeaca39815d7e6e5ea1c8391085cc136'}, {'type': 'PACKAGE', 'url': 'https://github...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-04T21:53:28Z', 'nvd_published_at': '2022-10-03T13:15:00Z'}
1.4.0
GHSA-wr74-2v66-57pp
2022-11-01T20:36:37Z
2022-10-31T12:00:18Z
null
['CVE-2022-3765']
phpMyFAQ vulnerable to stored Cross-site Scripting
phpMyFAQ prior to version 3.1.8 is vulnerable to stored Cross-site Scripting.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3765'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/372428d02a08e90b3a253ba5c506cda84581a5af'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpmyfaq'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/613143a1-...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-31T19:25:22Z', 'nvd_published_at': '2022-10-31T11:15:00Z'}
1.4.0
GHSA-f9qj-7gh3-mhj4
2022-10-25T20:30:47Z
2022-10-19T18:54:28Z
null
['CVE-2022-39326']
run-terraform allows for RCE via terraform plan
### Impact _What kind of vulnerability is it? Who is impacted?_ All users of the `run-terraform` reusable workflow from the kartverket/github-workflows repo are affected. A malicious actor could potentially send a PR with a malicious payload leading to execution of arbitrary JavaScript code in the context of the work...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'GitHub Actions', 'name': 'kartverket/github-workflows'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/kartverket/github-workflows/security/advisories/GHSA-f9qj-7gh3-mhj4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39326'}, {'type': 'WEB', 'url': 'https://github.com/kartverket/github-workflows/pull/19'}, {'type': 'PACKAGE', 'url': 'https://github....
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T18:54:28Z', 'nvd_published_at': '2022-10-25T17:15:00Z'}
1.4.0
GHSA-5qwq-g2hx-r6f7
2022-10-20T20:11:26Z
2022-10-19T12:00:22Z
null
['CVE-2022-39198']
Hessian Lite for Apache Dubbo deserialization vulnerability
A deserialization vulnerability existed in dubbo hessian-lite 3.2.12 and its earlier versions, which could lead to malicious code execution. This issue affects Apache Dubbo 2.7.x version 2.7.17 and prior versions; Apache Dubbo 3.0.x version 3.0.11 and prior versions; Apache Dubbo 3.1.x version 3.1.0 and prior versions.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.alibaba:hessian-lite'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.13'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.12'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo'}, 'ranges': [{'t...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39198'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/dubbo-hessian-lite'}, {'type': 'WEB', 'url': 'https://github.com/apache/dubbo-hessian-lite/releases/tag/v3.2.13'}, {'type': 'WEB', 'url': 'https://github.com/apache/dubbo/releases/tag/d...
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T18:53:09Z', 'nvd_published_at': '2022-10-18T19:15:00Z'}
1.4.0
GHSA-3r7j-8mqh-6qhx
2022-10-25T20:37:53Z
2022-10-20T18:20:28Z
null
['CVE-2022-39259']
Jadx-gui vulnerable to swing HTML Denial of Service (DoS) attack
### Impact Using jadx-gui to open a special zip file with entry containing HTML sequence like `<html><frame>` will cause interface to get stuck and throw exceptions like: ``` java.lang.RuntimeException: Can't build aframeset, BranchElement(frameset) 1,3 :no ROWS or COLS defined. at java.desktop/javax.swing.text.html.H...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.github.skylot:jadx-plugins-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.4'}}]
[{'type': 'WEB', 'url': 'https://github.com/skylot/jadx/security/advisories/GHSA-3r7j-8mqh-6qhx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39259'}, {'type': 'PACKAGE', 'url': 'https://github.com/skylot/jadx'}, {'type': 'WEB', 'url': 'https://github.com/skylot/jadx/releases/tag/v1.4.5'}, {...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-20T18:20:28Z', 'nvd_published_at': '2022-10-21T23:15:00Z'}
1.4.0
GHSA-67x4-qr35-qvrm
2023-02-14T21:25:03Z
2022-10-05T21:26:26Z
null
['CVE-2022-39273']
FlyteAdmin's Default OAuth Authorization Server secret must be rotated
### Impact Users who enable the default [Flyte’s authorization server](https://docs.flyte.org/en/latest/deployment/cluster_config/auth_setup.html#oauth2-authorization-server) without changing the default clientid hashes will be exposed to the public internet. In an effort to make enabling authentication easier for Fly...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/flyteorg/flyteadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.44'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/flyteorg/flyteadmin/security/advisories/GHSA-67x4-qr35-qvrm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39273'}, {'type': 'WEB', 'url': 'https://github.com/flyteorg/flyteadmin/pull/478'}, {'type': 'WEB', 'url': 'https://docs.flyte.org/en/latest/d...
{'cwe_ids': ['CWE-798'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-05T21:26:26Z', 'nvd_published_at': '2022-10-06T18:16:00Z'}
1.4.0
GHSA-rm2x-hgr8-w343
2022-10-06T19:56:22Z
2022-10-01T00:00:18Z
null
['CVE-2022-40923']
LIEF vulnerable to denial of service through segmentation fault
A vulnerability in the LIEF::MachO::SegmentCommand::virtual_address function of LIEF v0.12.1 allows attackers to cause a denial of service (DOS) through a segmentation fault via a crafted MachO file. A [patch](https://github.com/lief-project/LIEF/commit/24935f654f6df700a9a062298258b9485f584502) is available at commit n...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'lief'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.12.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40923'}, {'type': 'WEB', 'url': 'https://github.com/lief-project/LIEF/issues/784'}, {'type': 'WEB', 'url': 'https://github.com/lief-project/LIEF/commit/24935f654f6df700a9a062298258b9485f584502'}, {'type': 'PACKAGE', 'url': 'https://github.com/lief-...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-06T19:56:22Z', 'nvd_published_at': '2022-09-30T19:15:00Z'}
1.4.0
GHSA-f6mq-6fx5-w2ch
2022-10-22T01:13:01Z
2022-10-19T19:00:21Z
null
['CVE-2022-43403']
Jenkins Script Security Plugin sandbox bypass vulnerability
A sandbox bypass vulnerability involving casting an array-like value to an array type in Jenkins Script Security Plugin 1183.v774b_0b_0a_a_451 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:script-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1184.v85d16b_d851b_3'}]}], 'database_specific': {'last_known_affected_version_range': '< 1184.v85d16b'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43403'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(1)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/10/19/3'}]
{'cwe_ids': ['CWE-693'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T22:04:08Z', 'nvd_published_at': '2022-10-19T16:15:00Z'}
1.4.0
GHSA-9g3v-v24q-jj5p
2022-10-10T19:41:07Z
2022-10-06T18:52:04Z
null
['CVE-2022-3273']
rdiffweb does not have a rate limit on incorrect password attempts to prevent brute force attacks
rdiffweb prior to 2.5.0a4 does not have a rate limit to prevent attackers attempting brute force attacks to guess passwords. Version 2.5.0a4 limits the number of incorrect password attempts.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3273'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/b5e3bb0a98268d18ceead36ab9b2b7eaacd659a8'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a6df4bad-33...
{'cwe_ids': ['CWE-326', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-06T20:06:51Z', 'nvd_published_at': '2022-10-06T18:16:00Z'}
1.4.0
GHSA-hff2-x2j9-gxgv
2022-11-28T21:07:03Z
2022-10-28T19:19:42Z
null
['CVE-2022-3500']
Keylime: unhandled exceptions could lead to invalid attestation states
### Impact This vulnerability creates a false sense of security for keylime users -- i.e. a user could query keylime and conclude that a parcitular node/agent is correctly attested, while attestations are not in fact taking place. **Short explanation**: the keylime verifier creates periodic reports on the state of ea...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Keylime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.5.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/keylime/keylime/security/advisories/GHSA-hff2-x2j9-gxgv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3500'}, {'type': 'WEB', 'url': 'https://github.com/keylime/keylime/pull/1128'}, {'type': 'WEB', 'url': 'https://github.com/keylime/keylime/pull/11...
{'cwe_ids': ['CWE-248'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-28T19:19:42Z', 'nvd_published_at': '2022-11-22T19:15:00Z'}
1.4.0
GHSA-x8x2-wc2h-wc48
2022-10-18T15:46:14Z
2022-10-14T19:00:44Z
null
['CVE-2022-3439']
Missing rate limit on rdiffweb
Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffweb prior to 2.5.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3439'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/b78ec09f4582e363f6f449df6f987127e126c311'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/37b86c45-b2...
{'cwe_ids': ['CWE-770'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-14T21:30:12Z', 'nvd_published_at': '2022-10-14T12:15:00Z'}
1.4.0
GHSA-vh7g-p26c-j2cw
2023-07-12T14:01:57Z
2022-10-03T19:12:03Z
null
['CVE-2022-39222']
Dex vulnerable to Man-in-the-Middle allowing ID token capture via intercepted authorization code
### Impact Dex instances with public clients (and by extension, clients accepting tokens issued by those Dex instances) are affected by this vulnerability. An attacker can exploit this vulnerability by making a victim navigate to a malicious website and guiding them through the OIDC flow, stealing the OAuth authorizat...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/dexidp/dex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.35.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.34.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/dexidp/dex/security/advisories/GHSA-vh7g-p26c-j2cw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39222'}, {'type': 'WEB', 'url': 'https://github.com/dexidp/dex/commit/49471b14c8080ddb034d4855841123d378b7a634'}, {'type': 'PACKAGE', 'url': 'https://g...
{'cwe_ids': ['CWE-200', 'CWE-862'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-03T19:12:03Z', 'nvd_published_at': '2022-10-06T18:16:00Z'}
1.4.0
GHSA-8r99-h8j2-rw64
2022-10-07T07:31:33Z
2022-10-07T07:31:33Z
null
[]
Twisted vulnerable to HTTP Request Smuggling Attacks
### Impact Twisted Web is vulnerable to request smuggling attacks: 1. "When presented with two content-length headers, Twisted Web ignored the first header. When the second content-length was set to zero this caused Twisted Web to interpret the request body as a pipelined request. According to RFC 7230 Section 3.3.3#4...
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'twisted'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20.3.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/twisted/twisted/security/advisories/GHSA-8r99-h8j2-rw64'}, {'type': 'WEB', 'url': 'https://github.com/twisted/twisted/commit/20c787a14a09e7cbd5dfd8df08ceff00d1fcc081'}, {'type': 'WEB', 'url': 'https://github.com/twisted/twisted/commit/4a7d22e490bb8ff836892cc99a1f54b85ccb0281'...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-07T07:31:33Z', 'nvd_published_at': None}
1.4.0
GHSA-9w4g-fp9h-3q2v
2023-07-28T20:30:59Z
2022-10-26T19:00:38Z
null
['CVE-2022-42468']
Apache Flume vulnerable to remote code execution via deserialization of unsafe providerURL
Flume’s JMSSource class can be configured with a providerUrl parameter. A JNDI lookup is performed on this name without performing validation. This could result in untrusted data being deserialized, leading to remote code execution (RCE) attack when a configuration uses a JMS Source with an unsafe providerURL. This iss...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.flume.flume-ng-sources:flume-jms-source'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42468'}, {'type': 'WEB', 'url': 'https://github.com/apache/flume/commit/eee179a09df405c1ab55ae25a53b76ca1050bb97'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/flume'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/FLUME-3...
{'cwe_ids': ['CWE-20', 'CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-27T18:39:05Z', 'nvd_published_at': '2022-10-26T16:15:00Z'}
1.4.0
GHSA-2p3c-p3qw-69r4
2023-07-31T20:39:03Z
2022-10-12T14:15:48Z
null
[]
The graphql-upload library included in Apollo Server 2 is vulnerable to CSRF mutations
### Impact The [graphql-upload](https://www.npmjs.com/package/graphql-upload) npm package can execute GraphQL operations contained in `content-type: multipart/form-data` POST requests. Because they are POST requests, they can contain GraphQL mutations. Because they use `content-type: multipart/form-data`, they can be "...
[]
[{'package': {'ecosystem': 'npm', 'name': 'apollo-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.25.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/apollographql/apollo-server/security/advisories/GHSA-2p3c-p3qw-69r4'}, {'type': 'WEB', 'url': 'https://github.com/jaydenseric/graphql-multipart-request-spec/pull/64'}, {'type': 'WEB', 'url': 'https://github.com/apollographql/apollo-server/commit/82d44985ddca8e61557957d67f41e9...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-12T14:15:48Z', 'nvd_published_at': None}
1.4.0
GHSA-mg5h-rhjq-6v84
2022-11-01T20:35:47Z
2022-10-31T12:00:18Z
null
['CVE-2022-3766']
phpMyFAQ vulnerable to reflected Cross-site Scripting
phpMyFAQ prior to version 3.1.8 is vulnerable to reflected cross-site scripting.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3766'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/c7904f2236c6c0dd64c2226b90c30af0f7e5a72d'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpmyfaq'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d9666520-...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-31T19:26:04Z', 'nvd_published_at': '2022-10-31T11:15:00Z'}
1.4.0
GHSA-4993-m7g5-r9hh
2022-10-06T23:14:23Z
2022-10-06T23:14:23Z
null
['CVE-2020-15115']
etcd has no minimum password length
### Vulnerability type Access Control ### Workarounds The etcdctl and etcd API do not enforce a specific password length during user creation or user password update operations. [It is the responsibility of the administrator to enforce these requirements](https://github.com/etcd-io/etcd/blob/master/Documentation/op-gu...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'go.etcd.io/etcd/client/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.4.0'}, {'fixed': '3.4.10'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'go.etcd.io/etcd/client/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.23'}]...
[{'type': 'WEB', 'url': 'https://github.com/etcd-io/etcd/security/advisories/GHSA-4993-m7g5-r9hh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15115'}, {'type': 'PACKAGE', 'url': 'https://github.com/etcd-io/etcd'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package...
{'cwe_ids': ['CWE-521'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-06T23:14:23Z', 'nvd_published_at': '2020-08-06T22:15:00Z'}
1.4.0
GHSA-2rr3-rv49-p42f
2022-11-01T13:29:12Z
2022-10-29T19:00:27Z
null
['CVE-2022-3754']
phpMyFAQ contains Weak Password Requirements
phpMyFAQ prior to version 3.1.8 has Weak Password Requirements. Version 3.1.8 introduces an eight-character minimum password length.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3754'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/d7a87d2646287828c70401ca8976ef531fbc77ea'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpmyfaq'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/f4711d7f-...
{'cwe_ids': ['CWE-521'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-31T19:26:27Z', 'nvd_published_at': '2022-10-29T13:15:00Z'}
1.4.0
GHSA-43qq-qw4x-28f8
2022-10-18T21:14:04Z
2022-10-18T21:14:04Z
null
['CVE-2022-39314']
Kirby CMS vulnerable to user enumeration in the code-based login and password reset forms
### TL;DR This vulnerability only affects you if you are using the `code` or `password-reset` auth method with the `auth.methods` option. It can only be successfully exploited under server configuration conditions outside of the attacker's control. ---- ### Introduction User enumeration is a type of vulnerability t...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'getkirby/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5.0'}, {'fixed': '3.5.8.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'getkirby/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.6.0'}, {'fixed': '3.6.6.2'}]}]}, {...
[{'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/security/advisories/GHSA-43qq-qw4x-28f8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39314'}, {'type': 'PACKAGE', 'url': 'https://github.com/getkirby/kirby'}, {'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/releases/tag/3....
{'cwe_ids': ['CWE-204', 'CWE-307'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-18T21:14:04Z', 'nvd_published_at': '2022-10-24T14:15:00Z'}
1.4.0
GHSA-g975-f26h-93g8
2022-10-22T00:56:07Z
2022-10-19T19:00:18Z
null
['CVE-2022-43408']
Jenkins Pipeline: Stage View Plugin allows CSRF protection bypass of any target URL in Jenkins
Jenkins Pipeline: Stage View Plugin 2.26 and earlier does not correctly encode the ID of `input` steps when using it to generate URLs to proceed or abort Pipeline builds, allowing attackers able to configure Pipelines to specify `input` step IDs resulting in URLs that would bypass the CSRF protection of any target URL ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.pipeline-stage-view:pipeline-stage-view'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.25'}, {'fixed': '2.27'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.pipeline-stage-view:pipeline-stage-view'}, 'ranges'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43408'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2828'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/10/19/3'}]
{'cwe_ids': ['CWE-838'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T20:27:47Z', 'nvd_published_at': '2022-10-19T16:15:00Z'}
1.4.0
GHSA-cw98-9j8w-wxv9
2022-10-21T20:32:34Z
2022-10-21T20:32:34Z
null
['CVE-2022-24464']
.NET Denial of Service Vulnerability
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 6.0, .NET 5.0, and .NET CORE 3.1. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability. Microsoft is aware of a Denial of Service vulnerability, which e...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.23'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': ...
[{'type': 'WEB', 'url': 'https://github.com/dotnet/aspnetcore/security/advisories/GHSA-cw98-9j8w-wxv9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24464'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/212'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/a...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-21T20:32:34Z', 'nvd_published_at': '2022-03-09T17:15:00Z'}
1.4.0
GHSA-2w2m-ccf8-57cq
2022-12-16T17:26:11Z
2022-10-19T19:00:18Z
null
['CVE-2022-43415']
XXE vulnerability in Jenkins REPO Plugin
REPO Plugin 1.15.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. This allows attackers able to control which `repo` binary is executed on agents to have Jenkins parse a crafted XML document that uses external entities for extraction of secrets from the Jenkins controller o...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:repo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43415'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/repo-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2337'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/1...
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T20:26:57Z', 'nvd_published_at': '2022-10-19T16:15:00Z'}
1.4.0
GHSA-gr7w-x2jp-3xgw
2022-10-06T22:58:56Z
2022-10-06T22:58:56Z
null
['CVE-2018-21246']
Caddy vulnerable to Authentication Bypass due to mishandling of TLS client authentication
Caddy before 0.10.13 mishandles TLS client authentication, as demonstrated by an authentication bypass caused by the lack of the StrictHostMatching mode.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/caddyserver/caddy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-21246'}, {'type': 'WEB', 'url': 'https://github.com/caddyserver/caddy/pull/2099'}, {'type': 'WEB', 'url': 'https://github.com/caddyserver/caddy/commit/4d9ee000c8d2cbcdd8284007c1e0f2da7bc3c7c3'}, {'type': 'WEB', 'url': 'https://bugs.gentoo.org/71521...
{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-06T22:58:56Z', 'nvd_published_at': None}