schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 8 154 | details stringlengths 31 19.1k | severity stringlengths 2 92 | affected stringlengths 75 28.5k | references stringlengths 79 7.48k | database_specific stringlengths 131 196 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-373r-9mg8-3jc4 | 2022-10-27T18:34:41Z | 2022-10-25T19:00:27Z | null | ['CVE-2022-34870'] | Apache Geode vulnerable to Cross-Site Scripting | Apache Geode versions up to 1.15.0 are vulnerable to a Cross-Site Scripting (XSS) via data injection when using Pulse web application to view Region entries. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.geode:geode-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34870'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/geode'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/zltlr7f2ymr2m6jj54k4z0c4foos5fwx'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/10/24/3'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T22:40:48Z', 'nvd_published_at': '2022-10-25T17:15:00Z'} |
1.4.0 | GHSA-99j5-fvg3-54pm | 2022-10-25T20:50:27Z | 2022-10-20T12:00:17Z | null | ['CVE-2022-3327'] | Rdiffweb is missing authentication for critical function | Missing Authentication for Critical Function in GitHub repository ikus060/rdiffweb prior to 2.5.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3327'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/f2a32f2a9f3fb8be1a9432ac3d81d3aacdb13095'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-datab... | {'cwe_ids': ['CWE-306'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-20T18:40:19Z', 'nvd_published_at': '2022-10-20T00:15:00Z'} |
1.4.0 | GHSA-682j-2p53-xp5f | 2022-12-16T19:48:51Z | 2022-10-19T19:00:22Z | null | ['CVE-2022-43423'] | Agent-to-controller security bypass vulnerability in Jenkins BMC Compuware Source Code Download for Endevor, PDS, and ISPW Plugin | BMC Compuware Source Code Download for Endevor, PDS, and ISPW Plugin 2.0.12 and earlier implements an agent/controller message that does not limit where it can be executed.
It allows attackers able to control agent processes to obtain the values of Java system properties from the Jenkins controller process.
This vuln... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.compuware.jenkins:compuware-scm-downloader'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43423'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/compuware-scm-downloader-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2622'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists... | {'cwe_ids': ['CWE-693'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T22:01:36Z', 'nvd_published_at': '2022-10-19T16:15:00Z'} |
1.4.0 | GHSA-633r-r4p8-pw3w | 2022-10-12T20:11:41Z | 2022-10-11T19:00:26Z | null | ['CVE-2022-41376'] | Cross site scripting in Metro UI | Metro UI v4.4.0 to v4.5.1 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the Javascript function. User input is not properly sanitized before rendering in the `textarea` component. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'metro4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'last_affected': '4.5.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41376'}, {'type': 'WEB', 'url': 'https://alicangonullu.org/konu/138'}, {'type': 'PACKAGE', 'url': 'https://github.com/olton/Metro-UI-CSS'}, {'type': 'WEB', 'url': 'https://youtu.be/_wzGVpX54Rc'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-12T20:11:41Z', 'nvd_published_at': '2022-10-11T17:15:00Z'} |
1.4.0 | GHSA-c942-mfmp-p4fh | 2022-10-25T19:58:53Z | 2022-10-19T19:00:17Z | null | ['CVE-2022-41709'] | Markdownify subject to Remote Code Execution via malicious markdown file | Markdownify version 1.4.1 allows an external attacker to execute arbitrary code remotely on any client attempting to view a malicious markdown file through Markdownify. This is possible because the application has the "nodeIntegration" option enabled. There are currently no patched versions and no known workarounds. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'electron-markdownify'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41709'}, {'type': 'WEB', 'url': 'https://fluidattacks.com/advisories/adams/'}, {'type': 'PACKAGE', 'url': 'https://github.com/amitmerchant1990/electron-markdownify'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T19:58:53Z', 'nvd_published_at': '2022-10-19T17:15:00Z'} |
1.4.0 | GHSA-c27j-76xg-6x4f | 2022-10-18T21:16:27Z | 2022-10-18T21:16:27Z | null | ['CVE-2022-39315'] | Kirby CMS vulnerable to user enumeration in the brute force protection | ### TL;DR
This vulnerability affects all Kirby sites with user accounts (unless Kirby's API and Panel are disabled in the config). It can only be exploited for targeted attacks because the attack does not scale to brute force.
----
### Introduction
User enumeration is a type of vulnerability that allows attackers t... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'getkirby/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.8.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'getkirby/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.6.0'}, {'fixed': '3.6.6.2'}]}]}, {'pac... | [{'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/security/advisories/GHSA-c27j-76xg-6x4f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39315'}, {'type': 'PACKAGE', 'url': 'https://github.com/getkirby/kirby'}, {'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/releases/tag/3.... | {'cwe_ids': ['CWE-204', 'CWE-209', 'CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-18T21:16:27Z', 'nvd_published_at': '2022-10-25T17:15:00Z'} |
1.4.0 | GHSA-whpx-q3rq-w8jc | 2022-10-20T18:38:35Z | 2022-10-20T18:38:35Z | null | [] | Hardening of TypedArrays with non-canonical numeric property names in SES | ### Impact
_What kind of vulnerability is it? Who is impacted?_
In Hardened JavaScript, programs can `harden` objects to safely share objects with co-tenant programs without risk of these other programs tampering with their API surface. Hardening does not guarantee that objects are pure or immutable, so a hardened `Ma... | [] | [{'package': {'ecosystem': 'npm', 'name': 'ses'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.16.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/endojs/endo/security/advisories/GHSA-whpx-q3rq-w8jc'}, {'type': 'WEB', 'url': 'https://github.com/endojs/endo/commit/88cab0be4cf816dc578f2ff441fd9bcda0aa5cf5'}, {'type': 'PACKAGE', 'url': 'https://github.com/endojs/endo'}] | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-10-20T18:38:35Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j5v3-363p-g843 | 2022-10-24T18:51:43Z | 2022-10-20T19:00:30Z | null | ['CVE-2022-40084'] | OpenCRX vulnerable to password enumeration via error messages in password reset | OpenCRX before v5.2.2 was discovered to be vulnerable to password enumeration due to the difference in error messages received during a password reset which could enable an attacker to determine if a username, email or ID is valid. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.opencrx:opencrx-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40084'}, {'type': 'WEB', 'url': 'https://cwe.mitre.org/data/definitions/204.html'}, {'type': 'WEB', 'url': 'https://github.com/ciph0x01/OpenCRX-CVE/blob/main/CVE-2022-40084.md'}] | {'cwe_ids': ['CWE-203'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-24T18:51:43Z', 'nvd_published_at': '2022-10-20T14:15:00Z'} |
1.4.0 | GHSA-9w72-2f23-57gm | 2022-10-05T13:59:42Z | 2022-10-01T00:00:25Z | null | ['CVE-2022-2922'] | DNN vulnerable to Relative Path Traversal | DNN (GitHub repository dnnsoftware/dnn.platform) prior to 9.11.0 is vulnerable to Relative Path Traversal. Version 9.11.0 contains a patch for this issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'DotNetNuke.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.11.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'DotNetNuke.Web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.11.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2922'}, {'type': 'WEB', 'url': 'https://github.com/dnnsoftware/Dnn.Platform/commit/3697c5344cef8d49214230f0cc2efcd9e93a00a8'}, {'type': 'WEB', 'url': 'https://github.com/dnnsoftware/dnn.platform/commit/9b17351592fbde376506ba6705dbcc7a74a2a195'}, {'... | {'cwe_ids': ['CWE-22', 'CWE-23'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-03T22:21:19Z', 'nvd_published_at': '2022-09-30T07:15:00Z'} |
1.4.0 | GHSA-7wr6-fj4x-893v | 2022-10-12T18:16:54Z | 2022-10-06T18:52:04Z | null | ['CVE-2022-3376'] | rdiffweb allows a new password to be the same as the previous password | rdiffweb prior to 2.5.0a4 allows users to set their new password to be the same as the old password during a password reset. Version 2.5.0a4 enforces a password policy in which a new password cannot be the same as the old one. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3376'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/2ffc2af65c8f8113b06e0b89929c604bcdf844b9'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a9021e93-6d... | {'cwe_ids': ['CWE-521'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-06T20:10:38Z', 'nvd_published_at': '2022-10-06T18:16:00Z'} |
1.4.0 | GHSA-w596-4wvx-j9j6 | 2023-08-08T12:52:37Z | 2022-10-16T12:00:23Z | null | ['CVE-2022-42969'] | ReDoS in py library when used with subversion | The py library through 1.11.0 for Python allows remote attackers to conduct a ReDoS (Regular expression Denial of Service) attack via a Subversion repository with crafted info data, because the InfoSvnCommand argument is mishandled.
The particular codepath in question is the regular expression at `py._path.svnurl.Info... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'py'}, 'ecosystem_specific': {'affected_functions': ['py._path.svnurl.InfoSvnCommand.lspattern', 'py._path.svnurl.InfoSvnCommand']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.11.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42969'}, {'type': 'WEB', 'url': 'https://github.com/pytest-dev/py/issues/287'}, {'type': 'WEB', 'url': 'https://github.com/pytest-dev/py/issues/288'}, {'type': 'WEB', 'url': 'https://github.com/pytest-dev/pytest/issues/10392'}, {'type': 'PACKAGE', ... | {'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-18T18:03:13Z', 'nvd_published_at': '2022-10-16T06:15:00Z'} |
1.4.0 | GHSA-r8gm-v65f-c973 | 2022-10-31T22:42:57Z | 2022-10-31T22:42:57Z | null | ['CVE-2022-39366'] | acryl-datahub missing JWT signature check | # Missing JWT signature check (`GHSL-2022-078`)
The [`StatelessTokenService`](https://github.com/datahub-project/datahub/blob/aa146db611e3a4ca3aa17bb740783f789d4444d3/metadata-service/auth-impl/src/main/java/com/datahub/authentication/token/StatelessTokenService.java#L30) of the DataHub metadata service (GMS) does not... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'acryl-datahub'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.45'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/datahub-project/datahub/security/advisories/GHSA-r8gm-v65f-c973'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39366'}, {'type': 'WEB', 'url': 'https://codeql.github.com/codeql-query-help/java/java-missing-jwt-signature-check/'}, {'type': 'PACKAGE',... | {'cwe_ids': ['CWE-347'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-31T22:42:57Z', 'nvd_published_at': '2022-10-28T17:15:00Z'} |
1.4.0 | GHSA-m5m3-46gj-wch8 | 2023-01-10T16:09:12Z | 2022-10-06T19:54:55Z | null | ['CVE-2022-39237'] | SIF's Digital Signature Hash Algorithms Not Validated | ### Impact
The `github.com/sylabs/sif/v2/pkg/integrity` package does not verify that the hash algorithm(s) used are cryptographically secure when verifying digital signatures.
### Patches
A patch is available in version >= v2.8.1 of the module. Users are encouraged to upgrade.
The patch is commit https://github.com... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/sylabs/sif/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/sylabs/sif/security/advisories/GHSA-m5m3-46gj-wch8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39237'}, {'type': 'WEB', 'url': 'https://github.com/sylabs/sif/commit/07fb86029a12e3210f6131e065570124605daeaa'}, {'type': 'PACKAGE', 'url': 'https://g... | {'cwe_ids': ['CWE-327', 'CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-06T19:54:55Z', 'nvd_published_at': '2022-10-06T18:16:00Z'} |
1.4.0 | GHSA-47xc-9rr2-q7p4 | 2023-06-27T21:56:04Z | 2022-10-25T19:56:51Z | null | ['CVE-2022-39327'] | Improper Control of Generation of Code ('Code Injection') in Azure CLI | # Description
In versions previous to 2.40.0, Azure CLI contains a vulnerability for potential code injection. Critical scenarios are where a hosting machine runs an Azure CLI command where parameter values have been provided by an external source.
For example: Application X is a web application with a feature that ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'azure-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.40.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Azure/azure-cli/security/advisories/GHSA-47xc-9rr2-q7p4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39327'}, {'type': 'WEB', 'url': 'https://github.com/Azure/azure-cli/pull/23514'}, {'type': 'WEB', 'url': 'https://github.com/Azure/azure-cli/pull/... | {'cwe_ids': ['CWE-78', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T19:56:51Z', 'nvd_published_at': '2022-10-25T17:15:00Z'} |
1.4.0 | GHSA-7rrj-hqv6-fvpp | 2022-12-16T20:01:51Z | 2022-10-19T19:00:18Z | null | ['CVE-2022-43435'] | Content-Security-Policy protection for user content can be disabled in Jenkins 360 FireLine Plugin | Jenkins sets the Content-Security-Policy header to static files served by Jenkins (specifically `DirectoryBrowserSupport`), such as workspaces, `/userContent`, or archived artifacts, unless a Resource Root URL is specified.
360 FireLine Plugin 1.7.2 and earlier globally disables the `Content-Security-Policy` header fo... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.plugin:fireline'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.7.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43435'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/fireline-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2866'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/20... | {'cwe_ids': ['CWE-693'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T20:27:57Z', 'nvd_published_at': '2022-10-19T16:15:00Z'} |
1.4.0 | GHSA-998r-j9rx-qm8m | 2022-10-22T01:05:56Z | 2022-10-19T12:00:18Z | null | ['CVE-2022-42467'] | Apache Isis webconsole module may directly query the database in prototype mode | When running in prototype mode, the h2 webconsole module (accessible from the Prototype menu) is automatically made available with the ability to directly query the database. It was felt that it is safer to require the developer to explicitly enable this capability. As of 2.0.0-M8, this can now be done using the `isis.... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.isis.core:isis-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0-M8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42467'}, {'type': 'WEB', 'url': 'https://github.com/apache/isis/commit/9fcab9816dac37e0f07ffe3f5c4f47df9cec8694'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/isis'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/jbv2ddt00h7ntlb... | {'cwe_ids': ['CWE-1188'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T18:48:29Z', 'nvd_published_at': '2022-10-19T08:15:00Z'} |
1.4.0 | GHSA-rwqr-m72q-v6cm | 2022-10-31T15:41:33Z | 2022-10-25T19:00:29Z | null | ['CVE-2022-42890'] | Untrusted code execution in Apache XML Graphics Batik | A vulnerability in Batik of Apache XML Graphics allows an attacker to run Java code from untrusted SVG via JavaScript. This issue affects Apache XML Graphics prior to 1.16. Users are recommended to upgrade to version 1.16. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.xmlgraphics:batik'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42890'}, {'type': 'WEB', 'url': 'https://github.com/apache/xmlgraphics-batik/commit/401aa8595f52d085d40ff5b6b4ac0dd372423082'}, {'type': 'WEB', 'url': 'https://github.com/apache/xmlgraphics-batik/commit/52f7a1ad6e3110ec295a35ffc94410eef085707a'}, {... | {'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T23:10:03Z', 'nvd_published_at': '2022-10-25T17:15:00Z'} |
1.4.0 | GHSA-455w-c45v-86rg | 2022-10-11T13:45:14Z | 2022-10-11T13:45:14Z | null | ['CVE-2022-39288'] | fastify vulnerable to denial of service via malicious Content-Type | ### Impact
An attacker can send an invalid `Content-Type` header that can cause the application to crash, leading to a possible Denial of Service attack. Only the v4.x line is affected.
(This was updated: upon a close inspection, v3.x is not affected after all).
### Patches
Yes, update to `> v4.8.0`.
### Workarounds... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'fastify'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.8.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/fastify/fastify/security/advisories/GHSA-455w-c45v-86rg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39288'}, {'type': 'WEB', 'url': 'https://github.com/fastify/fastify/commit/fbb07e8dfad74c69cd4cd2211aedab87194618e3'}, {'type': 'PACKAGE', 'url': ... | {'cwe_ids': ['CWE-754'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-11T13:45:14Z', 'nvd_published_at': '2022-10-10T21:15:00Z'} |
1.4.0 | GHSA-f42p-vc8p-7x54 | 2022-10-20T20:11:34Z | 2022-10-18T19:00:33Z | null | ['CVE-2022-41547'] | MobSF allows attackers to read arbitrary files via a crafted HTTP request | Mobile Security Framework (MobSF) v0.9.2 and below was discovered to contain a local file inclusion (LFI) vulnerability in the `StaticAnalyzer/views.py` script. This vulnerability allows attackers to read arbitrary files via a crafted HTTP request. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'mobsf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41547'}, {'type': 'WEB', 'url': 'https://github.com/MobSF/Mobile-Security-Framework-MobSF/pull/166'}, {'type': 'WEB', 'url': 'https://github.com/MobSF/Mobile-Security-Framework-MobSF/commit/b9cdd1f52bdf127cf33bb1be369e374a2855f8e6#diff-69d2e38f6bba... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-18T21:17:22Z', 'nvd_published_at': '2022-10-18T15:15:00Z'} |
1.4.0 | GHSA-vj4m-83m8-xpw5 | 2023-06-27T21:55:53Z | 2022-10-25T20:21:45Z | null | ['CVE-2022-39341'] | OpenFGA Authorization Bypass via tupleset wildcard | ### Overview
During our internal security assessment, it was discovered that OpenFGA versions `v0.2.3` and prior are vulnerable to authorization bypass under certain conditions.
### Am I affected?
You are affected by this vulnerability if you are using `openfga/openfga` version `v0.2.3` and you added a tuple with a wi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/openfga/openfga'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.2.3'}}] | [{'type': 'WEB', 'url': 'https://github.com/openfga/openfga/security/advisories/GHSA-vj4m-83m8-xpw5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39341'}, {'type': 'WEB', 'url': 'https://github.com/openfga/openfga/commit/b466769cc100b2065047786578718d313f52695b'}, {'type': 'PACKAGE', 'url': ... | {'cwe_ids': ['CWE-285', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T20:21:45Z', 'nvd_published_at': '2022-10-25T17:15:00Z'} |
1.4.0 | GHSA-pc6f-259w-w3j6 | 2022-10-05T13:57:07Z | 2022-10-04T00:00:25Z | null | ['CVE-2022-36551'] | Heartex - Label Studio Community Edition vulnerable to SSRF in the Data Import module | A Server Side Request Forgery (SSRF) in the Data Import module in Heartex - Label Studio Community Edition versions 1.5.0 and earlier allows an authenticated user to access arbitrary files on the system. Furthermore, self-registration is enabled by default in these versions of Label Studio enabling a remote attacker to... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'label-studio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36551'}, {'type': 'WEB', 'url': 'https://github.com/heartexlabs/label-studio/pull/2840'}, {'type': 'WEB', 'url': 'https://github.com/heartexlabs/label-studio/commit/501142cb815ac964b0c600c491885b67386870c2'}, {'type': 'PACKAGE', 'url': 'https://git... | {'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-04T21:57:17Z', 'nvd_published_at': '2022-10-03T12:15:00Z'} |
1.4.0 | GHSA-m974-647v-whv7 | 2022-10-18T03:11:22Z | 2022-10-12T22:05:41Z | null | ['CVE-2022-39299'] | Signature bypass via multiple root elements | ### Impact
A remote attacker may be able to bypass SAML authentication on a website using passport-saml. A successful attack requires that the attacker is in possession of an arbitrary IDP signed XML element. Depending on the IDP used, fully unauthenticated attacks (e.g without access to a valid user) might also be fe... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'passport-saml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'node-saml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0-beta.5'}]}]}, {'package': {'ecosys... | [{'type': 'WEB', 'url': 'https://github.com/node-saml/passport-saml/security/advisories/GHSA-m974-647v-whv7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39299'}, {'type': 'WEB', 'url': 'https://github.com/node-saml/passport-saml/commit/8b7e3f5a91c8e5ac7e890a0c90bc7491ce33155e'}, {'type': 'P... | {'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-12T22:05:41Z', 'nvd_published_at': '2022-10-12T21:15:00Z'} |
1.4.0 | GHSA-7fvj-g3wp-29g8 | 2022-10-25T20:34:31Z | 2022-10-19T19:00:22Z | null | ['CVE-2022-43429'] | Jenkins Compuware Topaz for Total Test Plugin vulnerable to Protection Mechanism Failure | Jenkins Compuware Topaz for Total Test Plugin 2.4.8 and earlier implements an agent/controller message that does not limit where it can be executed, allowing attackers able to control agent processes to read arbitrary files on the Jenkins controller file system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.compuware.jenkins:compuware-topaz-for-total-test'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43429'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2624'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/10/19/3'}] | {'cwe_ids': ['CWE-693'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T22:01:59Z', 'nvd_published_at': '2022-10-19T16:15:00Z'} |
1.4.0 | GHSA-5hw4-m7f3-hhx8 | 2022-10-06T19:53:20Z | 2022-10-06T19:53:20Z | null | ['CVE-2018-17057'] | TCPDF vulnerable to attackers triggering deserialization of arbitrary data | An issue was discovered in TCPDF before 6.2.22. Attackers can trigger deserialization of arbitrary data via the `phar://` wrapper. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'tecnickcom/tcpdf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.2.22'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17057'}, {'type': 'WEB', 'url': 'https://github.com/LimeSurvey/LimeSurvey/commit/1cdd78d27697b3150bb44aaa7af1a81062a591a5'}, {'type': 'WEB', 'url': 'https://github.com/tecnickcom/TCPDF/commit/1861e33fe05f653b67d070f7c106463e7a5c26ed'}, {'type': 'WE... | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-06T19:53:20Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8g9m-vv69-7j99 | 2022-10-11T19:39:32Z | 2022-10-10T19:00:18Z | null | ['CVE-2022-3438'] | rdiffweb vulnerable to Open Redirect | A lack of user input validation leads to an open redirect vulnerability in rdiffweb prior to 2.5.0a4. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0a4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3438'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/4d464b467f14b8eb9103d7f5f0774e49995527c7'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/bc5689e4-22... | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-10T21:35:54Z', 'nvd_published_at': '2022-10-10T12:15:00Z'} |
1.4.0 | GHSA-3fhq-72hw-jqwv | 2022-10-05T14:01:18Z | 2022-10-01T00:00:21Z | null | ['CVE-2022-3371'] | rdiffweb's lack of token name length limit can result in DoS or memory corruption | rdiffweb prior to 2.5.0a3 is vulnerable to Allocation of Resources Without Limits or Throttling. A lack of limit in the length of the `Token name` parameter can result in denial of service or memory corruption. Version 2.5.0a3 fixes this issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0a3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3371'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/b62c479ff6979563c7c23e7182942bc4f460a2c7'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-datab... | {'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-03T22:19:03Z', 'nvd_published_at': '2022-09-30T14:15:00Z'} |
1.4.0 | GHSA-95x7-mh78-7w2r | 2022-10-27T18:35:10Z | 2022-10-25T20:13:38Z | null | ['CVE-2022-39340'] | OpenFGA subject to Information Disclosure via streamed-list-objects endpoint | ### Overview
During our internal security assessment, it was discovered that `streamed-list-objects` endpoint was not validating the authorization header resulting in the disclosure of objects in the store.
### Am I Affected?
You are affected by this vulnerability if you are using `openfga/openfga` version `v0.2.3` or... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/openfga/openfga'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.2.3'}}] | [{'type': 'WEB', 'url': 'https://github.com/openfga/openfga/security/advisories/GHSA-95x7-mh78-7w2r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39340'}, {'type': 'WEB', 'url': 'https://github.com/openfga/openfga/commit/779d73d4b6d067ee042ec9b59fec707eed71e42f'}, {'type': 'PACKAGE', 'url': ... | {'cwe_ids': ['CWE-285', 'CWE-862', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T20:13:38Z', 'nvd_published_at': '2022-10-25T17:15:00Z'} |
1.4.0 | GHSA-cpx3-93w7-457x | 2023-08-31T21:28:27Z | 2022-10-28T19:00:38Z | null | ['CVE-2022-3697'] | Ansible leaks password to logs | A flaw was found in Ansible in the amazon.aws collection when using the `tower_callback` parameter from the `amazon.aws.ec2_instance` module. This flaw allows an attacker to take advantage of this issue as the module is handling the parameter insecurely, leading to the password leaking in the logs. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '7.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3697'}, {'type': 'WEB', 'url': 'https://github.com/ansible-collections/amazon.aws/pull/1199'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/35749'}, {'type': 'WEB', 'url': 'https://github.com/ansible-community/ansible-build-data/... | {'cwe_ids': ['CWE-233'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-24T23:11:22Z', 'nvd_published_at': '2022-10-28T16:15:00Z'} |
1.4.0 | GHSA-c6w8-7mp3-34j9 | 2022-10-18T21:46:08Z | 2022-10-18T21:46:08Z | null | ['CVE-2022-24512'] | .NET Remote Code Execution Vulnerability | Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 6.0, .NET 5.0, and .NET Core 3.1. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.
A Remote Code Execution vulnerability exists in .NET 6.0, .NET 5.... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.linux-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.23'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Runtime.linux-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'int... | [{'type': 'WEB', 'url': 'https://github.com/dotnet/runtime/security/advisories/GHSA-c6w8-7mp3-34j9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24512'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/213'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/arch... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-18T21:46:08Z', 'nvd_published_at': '2022-03-09T17:15:00Z'} |
1.4.0 | GHSA-2c6m-6gqh-6qg3 | 2022-10-25T19:54:27Z | 2022-10-25T19:54:27Z | null | ['CVE-2022-39321'] | Docker Command Escaping in the GitHub Actions Runner | ### Impact
The actions runner invokes the docker cli directly in order to run job containers, service containers, or container actions. A bug in the logic for how the environment is encoded into these docker commands was discovered that allows an input to escape the environment variable and modify that docker command ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'GitHub Actions', 'name': 'actions/runner'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.294.0'}, {'fixed': '2.296.2'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.296.1'}}, {'package': {'ecosystem': 'GitHub Actions', 'name': 'actions/runner'}, 'ranges... | [{'type': 'WEB', 'url': 'https://github.com/actions/runner/security/advisories/GHSA-2c6m-6gqh-6qg3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39321'}, {'type': 'WEB', 'url': 'https://github.com/actions/runner/pull/2107'}, {'type': 'WEB', 'url': 'https://github.com/actions/runner/pull/2108... | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T19:54:27Z', 'nvd_published_at': '2022-10-25T17:15:00Z'} |
1.4.0 | GHSA-hhc4-47rh-cr34 | 2022-10-25T22:27:21Z | 2022-10-25T22:27:21Z | null | ['CVE-2022-39354'] | Incorrect is_static parameter for custom stateful precompiles in SputnikVM (evm) | ### Impact
A custom stateful precompile can use the `is_static` parameter to determine if the call is executed in a static context (via `STATICCALL`), and thus decide if stateful operations should be done. Previously, the passed `is_static` parameter was incorrect -- it was only set to `true` if the call comes from a ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'evm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.36.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.35.0'}}] | [{'type': 'WEB', 'url': 'https://github.com/rust-blockchain/evm/security/advisories/GHSA-hhc4-47rh-cr34'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39354'}, {'type': 'WEB', 'url': 'https://github.com/rust-blockchain/evm/pull/133'}, {'type': 'PACKAGE', 'url': 'https://github.com/rust-blockc... | {'cwe_ids': ['CWE-670'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T22:27:21Z', 'nvd_published_at': '2022-10-25T19:15:00Z'} |
1.4.0 | GHSA-5hq7-j5wq-p227 | 2022-10-31T19:24:51Z | 2022-10-26T12:00:28Z | null | ['CVE-2022-29822'] | feathers-sequelize vulnerable to SQL injection due to improper parameter filtering | feathers-sequelize is vulnerable to improper parameter filtering in the Feathers js library, which may ultimately lead to SQL injection. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'feathers-sequelize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.3.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29822'}, {'type': 'WEB', 'url': 'https://github.com/feathersjs-ecosystem/feathers-sequelize/commit/0f2d85f0b2d556f2b6c70423dcebdbd29d95e3dc'}, {'type': 'WEB', 'url': 'https://csirt.divd.nl/CVE-2022-29822/'}, {'type': 'WEB', 'url': 'https://csirt.di... | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-31T19:24:51Z', 'nvd_published_at': '2022-10-26T10:15:00Z'} |
1.4.0 | GHSA-x8j7-vxh9-p67g | 2022-12-16T19:43:43Z | 2022-10-19T19:00:18Z | null | ['CVE-2022-43418'] | CSRF vulnerability in Jenkins Katalon Plugin allows capturing credentials | Katalon Plugin 1.0.33 and earlier does not require POST requests for several HTTP endpoints, resulting in cross-site request forgery (CSRF) vulnerabilities.
This vulnerability allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing cr... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:katalon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.34'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43418'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/katalon-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2845%20(2)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-securi... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T21:23:52Z', 'nvd_published_at': '2022-10-19T16:15:00Z'} |
1.4.0 | GHSA-q4qq-jhjv-7rh2 | 2022-10-25T20:31:45Z | 2022-10-18T18:05:36Z | null | ['CVE-2022-39312'] | MySQL JDBC deserialization vulnerability | ### Impact
In Dataease, the Mysql data source in the data source function can customize the JDBC connection parameters and the Mysql server target to be connected.

In `backend/src... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.dataease:dataease-plugin-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/dataease/dataease/security/advisories/GHSA-q4qq-jhjv-7rh2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39312'}, {'type': 'WEB', 'url': 'https://github.com/dataease/dataease/pull/3328'}, {'type': 'WEB', 'url': 'https://github.com/dataease/dataease/... | {'cwe_ids': ['CWE-20', 'CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-18T18:05:36Z', 'nvd_published_at': '2022-10-25T17:15:00Z'} |
1.4.0 | GHSA-px4x-hjm5-w8x3 | 2022-12-16T19:57:55Z | 2022-10-19T19:00:22Z | null | ['CVE-2022-43432'] | Content-Security-Policy protection for user content disabled by Jenkins XFramium Builder Plugin | Jenkins sets the Content-Security-Policy header to static files served by Jenkins (specifically `DirectoryBrowserSupport`), such as workspaces, `/userContent`, or archived artifacts, unless a Resource Root URL is specified.
XFramium Builder Plugin 1.0.22 and earlier globally disables the `Content-Security-Policy` head... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:xframium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.22'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43432'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/xframium-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2863'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/20... | {'cwe_ids': ['CWE-693'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T22:03:44Z', 'nvd_published_at': '2022-10-19T16:15:00Z'} |
1.4.0 | GHSA-6mhr-52mv-6v6f | 2022-10-18T17:12:46Z | 2022-10-18T17:12:46Z | null | ['CVE-2022-39322'] | Field-level access-control bypass for multiselect field | #### Impact
`@keystone-6/core@2.2.0 || 2.3.0` users who are using the `multiselect` field, and provided field-level access control - are vulnerable to their field-level access control not being used.
List-level access control is **NOT** affected.
Field-level access control for fields other than `multiselect` are **N... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': '@keystone-6/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.3.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/security/advisories/GHSA-6mhr-52mv-6v6f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39322'}, {'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/commit/65c6ee3deef23605fc72b80230908696a7a65e7c'}, {'type': 'PACKAGE',... | {'cwe_ids': ['CWE-285', 'CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-18T17:12:46Z', 'nvd_published_at': '2022-10-25T17:15:00Z'} |
1.4.0 | GHSA-398j-f7m7-795j | 2023-02-15T19:34:00Z | 2022-10-06T21:25:46Z | null | ['CVE-2012-0796'] | PHPMailer vulnerable to email header injection | ### Impact
Arbitrary additional email headers can be injected via crafted From or Sender headers.
### Patches
Fixed in 2.2.1
### Workarounds
Filter user-supplied values prior to using them in From or Sender properties.
### References
https://nvd.nist.gov/vuln/detail/CVE-2012-0796
### For more information
If you hav... | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpmailer/phpmailer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-398j-f7m7-795j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-0796'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=783532'}, {'type': 'PACKAGE', 'url': 'https://github.com/PHPMailer... | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-06T21:25:46Z', 'nvd_published_at': '2012-07-17T10:20:00Z'} |
1.4.0 | GHSA-vqvm-qrwh-69h7 | 2022-11-01T20:37:27Z | 2022-10-31T19:00:34Z | null | ['CVE-2022-3771'] | easyii CMS's File Upload Management vulnerable to unrestricted upload | This issue affects the function file of the file helpers/Upload.php of the component File Upload Management. The manipulation leads to unrestricted upload. The attack may be initiated remotely. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'noumo/easyii'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3771'}, {'type': 'PACKAGE', 'url': 'https://github.com/noumo/easyii'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.212501'}] | {'cwe_ids': ['CWE-284', 'CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-31T22:56:47Z', 'nvd_published_at': '2022-10-31T14:15:00Z'} |
1.4.0 | GHSA-485p-mrj5-8w2v | 2022-10-21T20:50:24Z | 2022-10-21T20:50:24Z | null | ['CVE-2022-23267'] | .NET Denial of Service Vulnerability | Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 6.0, .NET 5.0 and .NET Core 3.1. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.
A vulnerability exists in .NET 6.0, .NET 5.0 and .NET Core 3.1 wh... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.25'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': ... | [{'type': 'WEB', 'url': 'https://github.com/dotnet/runtime/security/advisories/GHSA-485p-mrj5-8w2v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23267'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/221'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/arch... | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-21T20:50:24Z', 'nvd_published_at': '2022-05-10T21:15:00Z'} |
1.4.0 | GHSA-g66m-fqxf-3w35 | 2022-12-16T17:10:18Z | 2022-10-19T19:00:22Z | null | ['CVE-2022-43407'] | CSRF protection for any URL can be bypassed in Jenkins Pipeline: Input Step Plugin | Pipeline: Input Step Plugin 451.vf1a_a_4f405289 and earlier does not restrict or sanitize the optionally specified ID of the `input` step. This ID is used for the URLs that process user interactions for the given `input` step (proceed or abort) and is not correctly encoded.
This allows attackers able to configure Pipe... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:pipeline-input-step'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '456.vd8a_957db_5b_e9'}]}], 'database_specific': {'last_known_affected_version_range': '< 456.vd8a'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43407'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/pipeline-input-step-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2880'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-... | {'cwe_ids': ['CWE-838'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T21:21:29Z', 'nvd_published_at': '2022-10-19T16:15:00Z'} |
1.4.0 | GHSA-3f3w-gmqf-4hj3 | 2022-10-31T15:53:33Z | 2022-10-26T19:00:38Z | null | ['CVE-2022-39944'] | Apache Linkis subject to Remote Code Execution via deserialization | In Apache Linkis <=1.2.0 when used with the MySQL Connector/J, a deserialization vulnerability with possible remote code execution impact exists when an attacker has write access to a database and configures a JDBC EC with a MySQL data source and malicious parameters. Therefore, the parameters in the jdbc url should be... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.linkis:linkis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39944'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/incubator-linkis'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/rxytj48q17304snonjtyt5lnlw64gccc'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-27T18:40:10Z', 'nvd_published_at': '2022-10-26T16:15:00Z'} |
1.4.0 | GHSA-mwwc-3jv2-62j3 | 2022-10-13T18:05:31Z | 2022-10-11T19:00:29Z | null | ['CVE-2022-32175'] | AdGuardHome vulnerable to Cross-Site Request Forgery | In AdGuardHome, versions v0.95 through v0.108.0-b.13 are vulnerable to Cross-Site Request Forgery (CSRF), in the custom filtering rules functionality. An attacker can persuade an authorized user to follow a malicious link, resulting in deleting/modifying the custom filtering rules.
The file that contains the vulnerabl... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/AdguardTeam/AdGuardHome'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.95'}, {'fixed': '0.108.0-b.16'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-32175'}, {'type': 'PACKAGE', 'url': 'https://github.com/AdguardTeam/AdGuardHome'}, {'type': 'WEB', 'url': 'https://github.com/AdguardTeam/AdGuardHome/blob/v0.108.0-b.13/internal/home/controlfiltering.go#L265'}, {'type': 'WEB', 'url': 'https://githu... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-11T21:25:02Z', 'nvd_published_at': '2022-10-11T15:15:00Z'} |
1.4.0 | GHSA-pmw9-567p-68pc | 2022-10-31T19:23:29Z | 2022-10-31T18:45:43Z | null | ['CVE-2022-3616'] | OctoRPKI crashes when max iterations is reached | ### Impact
Attackers can create long chains of CAs that would lead to OctoRPKI exceeding its max iterations parameter that would cause the program to crash and not finish the validation and thus a denial of service.
### Patches
This issue is fixed in v1.4.4
### Workarounds
None.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/cloudflare/cfrpki/cmd/octorpki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.3'}}] | [{'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/security/advisories/GHSA-pmw9-567p-68pc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3616'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/commit/5f64bcd13477b29cd7ddff6fff3c65dfac3423ca'}, {'type': 'PACKAGE', 'url... | {'cwe_ids': ['CWE-754', 'CWE-834'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-31T18:45:43Z', 'nvd_published_at': '2022-10-28T07:15:00Z'} |
1.4.0 | GHSA-7w4x-4h67-pgmv | 2022-10-22T00:56:34Z | 2022-10-20T12:00:17Z | null | ['CVE-2022-31684'] | Invalid HTTP requests in Reactor Netty HTTP Server may reveal access tokens | Reactor Netty HTTP Server, in versions 1.0.11 - 1.0.23, may request log headers in some cases of invalid HTTP requests. The logged headers may reveal valid access tokens to those with access to server logs. This may affect only invalid HTTP requests where logging at WARN level is enabled. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.projectreactor.netty:reactor-netty-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.11'}, {'fixed': '1.0.24'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31684'}, {'type': 'PACKAGE', 'url': 'https://search.maven.org/artifact/io.projectreactor.netty/reactor-netty-http'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2022-31684'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-20T18:40:50Z', 'nvd_published_at': '2022-10-19T22:15:00Z'} |
1.4.0 | GHSA-qv37-mfjf-42h8 | 2022-10-31T16:00:21Z | 2022-10-25T19:00:22Z | null | ['CVE-2022-3644'] | Plaintext storage of tokens in pulp_ansible | The collection remote for pulp_ansible stores tokens in plaintext instead of using pulp's encrypted field and exposes them in read/write mode via the API () instead of marking it as write only. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pulp-ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3644'}, {'type': 'WEB', 'url': 'https://github.com/pulp/pulp_ansible/issues/1221'}, {'type': 'WEB', 'url': 'https://github.com/pulp/pulp_ansible/commit/d13c427b09482a7f598d8ee597d17a8a34888665'}, {'type': 'PACKAGE', 'url': 'https://github.com/pulp/... | {'cwe_ids': ['CWE-256', 'CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T22:28:13Z', 'nvd_published_at': '2022-10-25T18:15:00Z'} |
1.4.0 | GHSA-xqv2-3vvq-qg6r | 2022-10-31T19:22:54Z | 2022-10-27T19:00:38Z | null | ['CVE-2022-36182'] | Hashicorp Boundary vulnerable to clickjacking | Hashicorp Boundary is vulnerable to Clickjacking which allow for the interception of login credentials, re-direction of users to malicious sites, or causing users to perform malicious actions on the site. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/boundary'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.11.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36182'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/boundary'}, {'type': 'WEB', 'url': 'https://owasp.org/www-community/attacks/Clickjacking'}, {'type': 'WEB', 'url': 'https://packetstormsecurity.com/files/168654/Hashicorp-Boundary-Cl... | {'cwe_ids': ['CWE-1021'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-28T19:18:55Z', 'nvd_published_at': '2022-10-27T13:15:00Z'} |
1.4.0 | GHSA-9398-5ghf-7pr6 | 2022-10-31T18:44:47Z | 2022-10-31T18:44:47Z | null | ['CVE-2022-39294'] | conduit-hyper vulnerable to Denial of Service from unchecked request length | Prior to version 0.4.2, `conduit-hyper` did not check any limit on a request's length before calling [`hyper::body::to_bytes`](https://docs.rs/hyper/latest/hyper/body/fn.to_bytes.html). An attacker could send a malicious request with an abnormally large `Content-Length`, which could lead to a panic if memory allocation... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'conduit-hyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.0-alpha.3'}, {'fixed': '0.4.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/conduit-rust/conduit-hyper/security/advisories/GHSA-9398-5ghf-7pr6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39294'}, {'type': 'WEB', 'url': 'https://github.com/conduit-rust/conduit-hyper/commit/4d225a53206505d39438ec6694e15f49c038baff'}, {'typ... | {'cwe_ids': ['CWE-1284', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-31T18:44:47Z', 'nvd_published_at': '2022-10-31T19:15:00Z'} |
1.4.0 | GHSA-mqxp-cjr9-c5jm | 2022-11-16T21:12:51Z | 2022-10-06T18:52:04Z | 2022-11-16T21:12:51Z | ['CVE-2022-40160'] | JXPath Out-of-bounds Write vulnerability | ## Withdrawn
This advisory has been withdrawn because the original report was found to be invalid. This link is maintained to preserve external references.
## Original Description
Those using JXPath to interpret XPath may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied inp... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'commons-jxpath:commons-jxpath'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40160'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47053'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/commons-jxpath'}] | {'cwe_ids': ['CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-10T20:57:22Z', 'nvd_published_at': '2022-10-06T18:16:00Z'} |
1.4.0 | GHSA-8g35-prrr-gxxf | 2022-11-01T21:38:06Z | 2022-10-31T19:00:37Z | null | ['CVE-2022-40487'] | ProcessWire vulnerable to Cross-site Scripting | ProcessWire v3.0.200 was discovered to contain multiple cross-site scripting (XSS) vulnerabilities via the Search Users and Search Pages function. These vulnerabilities allow attackers to execute arbitrary web scripts or HTML via injection of a crafted payload. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'processwire/processwire'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.200'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40487'}, {'type': 'WEB', 'url': 'https://gist.github.com/filipaze/32ab8683af8d82827028164e361b6e86'}, {'type': 'PACKAGE', 'url': 'https://github.com/processwire/processwire'}, {'type': 'WEB', 'url': 'http://processwire.com'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T21:38:06Z', 'nvd_published_at': '2022-10-31T12:15:00Z'} |
1.4.0 | GHSA-599f-7c49-w659 | 2022-10-17T17:34:05Z | 2022-10-13T19:00:17Z | null | ['CVE-2022-42889'] | Arbitrary code execution in Apache Commons Text | Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.commons:commons-text'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5'}, {'fixed': '1.10.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.guicedee.services:commons-text'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42889'}, {'type': 'WEB', 'url': 'https://arxiv.org/pdf/2306.05534'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/commons-text'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/n2bd4vdsgkqh2tm14l1wyc3jyol7s1om'}, {'type': 'WEB', '... | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-13T20:22:17Z', 'nvd_published_at': '2022-10-13T13:15:00Z'} |
1.4.0 | GHSA-j7pg-863g-22p6 | 2022-12-16T17:17:55Z | 2022-10-19T19:00:18Z | null | ['CVE-2022-43410'] | Webhook endpoint discloses job names to unauthorized users in Jenkins Mercurial Plugin | Mercurial Plugin provides a webhook endpoint at `/mercurial/notifyCommit` that can be used to notify Jenkins of changes to an SCM repository. This endpoint receives a repository URL, and Jenkins will schedule polling for all jobs configured with the specified repository. It can be accessed with GET requests and without... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:mercurial'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1260.vdfb_723cdcc81'}]}], 'database_specific': {'last_known_affected_version_range': '< 1260.vdfb'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43410'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/mercurial-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2831'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T20:27:28Z', 'nvd_published_at': '2022-10-19T16:15:00Z'} |
1.4.0 | GHSA-j92c-mmf7-j5x5 | 2022-10-18T17:27:36Z | 2022-10-18T17:27:36Z | null | [] | Potential inter-blockchain communication (IBC) protocol compromise via "Dragonberry" vulnerability in cheqd | ### Impact
This vulnerability affects IBC transfers due to a security vulnerability dubbed "Dragonberry" upstream in [Cosmos SDK](https://github.com/cosmos/cosmos-sdk/releases/tag/v0.45.9). The vulnerability could allow malicious attackers to compromise chain-to-chain IBC transfers.
There is no vulnerability in the DI... | [] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/cheqd/cheqd-node'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.9'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/cheqd/cheqd-node/security/advisories/GHSA-j92c-mmf7-j5x5'}, {'type': 'WEB', 'url': 'https://forum.cosmos.network/t/ibc-security-advisory-dragonberry/7702/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/cheqd/cheqd-node'}, {'type': 'WEB', 'url': 'https://github.com/cosmos/... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-18T17:27:36Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hcw3-6459-pwhc | 2022-10-25T20:34:09Z | 2022-10-19T19:00:22Z | null | ['CVE-2022-43431'] | Jenkins Compuware Strobe Measurement Plugin Missing Authorization vulnerability | Jenkins Compuware Strobe Measurement Plugin 1.0.1 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.compuware.jenkins:compuware-strobe-measurement'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43431'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2631'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/10/19/3'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T22:02:50Z', 'nvd_published_at': '2022-10-19T16:15:00Z'} |
1.4.0 | GHSA-2w6m-q946-399r | 2022-10-06T18:21:11Z | 2022-10-04T00:00:25Z | null | ['CVE-2022-38817'] | Dapr Dashboard vulnerable to Incorrect Access Control | Dapr Dashboard v0.1.0 through v0.10.0 is vulnerable to Incorrect Access Control that allows attackers to obtain sensitive data. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/dapr/dashboard'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.0'}, {'last_affected': '0.10.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38817'}, {'type': 'WEB', 'url': 'https://github.com/dapr/dashboard/issues/222'}, {'type': 'PACKAGE', 'url': 'https://github.com/dapr/dashboard'}] | {'cwe_ids': ['CWE-306'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-04T21:59:06Z', 'nvd_published_at': '2022-10-03T13:15:00Z'} |
1.4.0 | GHSA-7cm4-vmf2-8wf2 | 2022-10-18T03:10:44Z | 2022-10-12T19:00:42Z | null | ['CVE-2022-40871'] | Dolibarr vulnerable to Eval Injection | Dolibarr ERP & CRM <=15.0.3 are vulnerable to Eval injection. By default, any administrator can be added to the installation page of dolibarr, and if successfully added, malicious code can be inserted into the database and then execute it by eval. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '15.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40871'}, {'type': 'PACKAGE', 'url': 'https://github.com/Dolibarr/dolibarr'}, {'type': 'WEB', 'url': 'https://github.com/youncyb/dolibarr-rce'}] | {'cwe_ids': ['CWE-95'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-12T20:16:03Z', 'nvd_published_at': '2022-10-12T12:15:00Z'} |
1.4.0 | GHSA-3fh5-q6fg-w28q | 2022-10-27T18:36:42Z | 2022-10-27T18:36:42Z | null | ['CVE-2022-39357'] | Prototype pollution in Snowboard framework | ### Impact
The Snowboard framework in affected versions is vulnerable to prototype pollution in the main Snowboard class as well as its plugin loader.
### Patches
This issue has been patched in https://github.com/wintercms/winter/commit/2a13faf99972e84c9661258f16c4750fa99d29a1 (for 1.2) and https://github.com/winte... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'wintercms/winter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.8'}, {'fixed': '1.1.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'wintercms/winter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.1'}]}... | [{'type': 'WEB', 'url': 'https://github.com/wintercms/winter/security/advisories/GHSA-3fh5-q6fg-w28q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39357'}, {'type': 'WEB', 'url': 'https://github.com/wintercms/winter/commit/2a13faf99972e84c9661258f16c4750fa99d29a1'}, {'type': 'WEB', 'url': 'h... | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-27T18:36:42Z', 'nvd_published_at': '2022-10-26T15:15:00Z'} |
1.4.0 | GHSA-99jc-v8qm-wjvv | 2022-11-10T22:39:31Z | 2022-10-06T18:52:04Z | 2022-11-10T22:39:31Z | ['CVE-2022-40159'] | JXPath Out-of-bounds Write vulnerability | ## Withdrawn
This advisory has been withdrawn because the original report was found to be invalid. This link is maintained to preserve external references.
## Original Description
Those using JXPath to interpret XPath may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied inp... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'commons-jxpath:commons-jxpath'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40159'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47057'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/commons-jxpath'}] | {'cwe_ids': ['CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-10T20:56:31Z', 'nvd_published_at': '2022-10-06T18:16:00Z'} |
1.4.0 | GHSA-4hjj-9gp7-4frg | 2022-12-16T16:35:55Z | 2022-10-19T19:00:21Z | null | ['CVE-2022-43405'] | Sandbox bypass vulnerability in Jenkins Pipeline: Groovy Libraries Plugin and Pipeline: Deprecated Groovy Libraries Plugin | Pipeline: Groovy Libraries Plugin and older releases of the Pipeline: Deprecated Groovy Libraries Plugin (formerly Pipeline: Shared Groovy Libraries Plugin) define the l`ibrary` Pipeline step, which allows Pipeline authors to dynamically load Pipeline libraries. The return value of this step can be used to instantiate ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:pipeline-groovy-lib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '613.v9c41a_160233f'}]}], 'database_specific': {'last_known_affected_version_range': '< 613.v9c41a'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43405'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(2)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/10/19/3'}] | {'cwe_ids': ['CWE-693'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T22:04:27Z', 'nvd_published_at': '2022-10-19T16:15:00Z'} |
1.4.0 | GHSA-jc69-hjw2-fm86 | 2022-10-12T18:23:36Z | 2022-10-12T18:23:36Z | null | ['CVE-2022-41828'] | com.amazon.redshift:redshift-jdbc42 vulnerable to remote command execution | ### Impact
A potential remote command execution issue exists within `redshift-jdbc42` versions 2.1.0.7 and below. When plugins are used with the driver, it instantiates plugin instances based on Java class names provided via the `sslhostnameverifier`, `socketFactory`, `sslfactory`, and `sslpasswordcallback` connection... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.amazon.redshift:redshift-jdbc42'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0.8'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/aws/amazon-redshift-jdbc-driver/security/advisories/GHSA-jc69-hjw2-fm86'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41828'}, {'type': 'WEB', 'url': 'https://github.com/aws/amazon-redshift-jdbc-driver/commit/40b143b4698faf90c788ffa89f2d4d8d2ad068b... | {'cwe_ids': ['CWE-704'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-12T18:23:36Z', 'nvd_published_at': None} |
1.4.0 | GHSA-33c9-rppf-m7fq | 2023-01-18T06:13:30Z | 2022-10-07T18:15:39Z | null | ['CVE-2022-42092'] | Backdrop CMS Unrestricted File Upload vulnerability | Backdrop CMS 1.22.0 has Unrestricted File Upload vulnerability via `themes` that allows attackers to achieve Remote Code Execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'backdrop/backdrop'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.22.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42092'}, {'type': 'PACKAGE', 'url': 'https://github.com/backdrop-ops/backdrop-composer'}, {'type': 'WEB', 'url': 'https://grimthereaperteam.medium.com/backdrop-cms-1-22-0-unrestricted-file-upload-themes-ad42a599561c'}] | {'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-18T06:13:30Z', 'nvd_published_at': '2022-10-07T18:15:00Z'} |
1.4.0 | GHSA-x5gv-5rqv-654m | 2022-10-25T20:35:04Z | 2022-10-19T19:00:18Z | null | ['CVE-2022-43427'] | Jenkins Compuware Topaz for Total Test Plugin allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins | Jenkins Compuware Topaz for Total Test Plugin 2.4.8 and earlier does not perform permission checks in several HTTP endpoints, allowing attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.compuware.jenkins:compuware-topaz-for-total-test'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43427'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2623'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/10/19/3'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T21:22:17Z', 'nvd_published_at': '2022-10-19T16:15:00Z'} |
1.4.0 | GHSA-hw4q-585g-f92x | 2022-11-10T22:39:08Z | 2022-10-06T18:52:04Z | 2022-11-10T22:39:08Z | ['CVE-2022-40161'] | JXPath Out-of-bounds Write vulnerability | ## Withdrawn
This advisory has been withdrawn because the original report was found to be invalid. This link is maintained to preserve external references.
## Original Description
Those using JXPath to interpret XPath may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied inp... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'commons-jxpath:commons-jxpath'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40161'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47097'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/commons-jxpath'}] | {'cwe_ids': ['CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-10T20:57:48Z', 'nvd_published_at': '2022-10-06T18:16:00Z'} |
1.4.0 | GHSA-jjjh-jjxp-wpff | 2023-03-31T14:46:13Z | 2022-10-03T00:00:31Z | null | ['CVE-2022-42003'] | Uncontrolled Resource Consumption in Jackson-databind | In FasterXML jackson-databind 2.4.0-rc1 until 2.12.7.1 and in 2.13.x before 2.13.4.2 resource exhaustion can occur because of a lack of a check in primitive value deserializers to avoid deep wrapper array nesting, when the UNWRAP_SINGLE_VALUE_ARRAYS feature is enabled. This was patched in 2.12.7.1, 2.13.4.2, and 2.14.0... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0-rc1'}, {'fixed': '2.12.7.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'eve... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42003'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/3590'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/3627'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind... | {'cwe_ids': ['CWE-400', 'CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-04T21:55:46Z', 'nvd_published_at': '2022-10-02T05:15:00Z'} |
1.4.0 | GHSA-vpgf-fgm8-gxr2 | 2022-11-01T13:29:32Z | 2022-10-28T12:00:33Z | null | ['CVE-2022-26884'] | Apache DolphinScheduler vulnerable to Path Traversal | Users can read any files by log server, Apache DolphinScheduler users should upgrade to version 2.0.6 or higher. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dolphinscheduler:dolphinscheduler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26884'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/dolphinscheduler'}, {'type': 'WEB', 'url': 'https://github.com/apache/dolphinscheduler/releases/tag/2.0.6'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/xfdst5y4hnrm2ntmc5jz... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-31T19:37:13Z', 'nvd_published_at': '2022-10-28T08:15:00Z'} |
1.4.0 | GHSA-p5m3-27vh-52j4 | 2022-10-31T19:25:00Z | 2022-10-26T12:00:28Z | null | ['CVE-2022-29823'] | Feather-Sequelize cleanQuery method vulnerable to Prototype Pollution | Feather-Sequelize cleanQuery method uses insecure recursive logic to filter unsupported keys from the query object. This results in a Remote Code Execution (RCE) with privileges of application. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'feathers-sequelize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.3.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29823'}, {'type': 'WEB', 'url': 'https://github.com/feathersjs-ecosystem/feathers-sequelize/commit/0b7beaa773dc313fdb27edd9ee8115064d7cf114'}, {'type': 'WEB', 'url': 'https://csirt.divd.nl/CVE-2022-29823/'}, {'type': 'WEB', 'url': 'https://csirt.di... | {'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-31T19:25:00Z', 'nvd_published_at': '2022-10-26T10:15:00Z'} |
1.4.0 | GHSA-2jxx-2x93-2q2f | 2022-12-16T17:24:07Z | 2022-10-19T19:00:22Z | null | ['CVE-2022-43412'] | Non-constant time webhook token comparison in Jenkins Generic Webhook Trigger Plugin | Generic Webhook Trigger Plugin 1.84.1 and earlier does not use a constant-time comparison when checking whether the provided and expected webhook token are equal.
This could potentially allow attackers to use statistical methods to obtain a valid webhook token.
Generic Webhook Trigger Plugin 1.84.2 uses a constant-ti... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:generic-webhook-trigger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.84.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43412'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/generic-webhook-trigger-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2874'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/... | {'cwe_ids': ['CWE-203', 'CWE-208'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T22:23:54Z', 'nvd_published_at': '2022-10-19T16:15:00Z'} |
1.4.0 | GHSA-9rpw-2h95-666c | 2022-10-01T15:52:23Z | 2022-10-01T15:52:23Z | null | ['CVE-2022-2529'] | Cloudflare GoFlow vulnerable to a Denial of Service in the sflow packet handling package | ### Impact
The sflow decode package prior to version 3.4.4 is vulnerable to a denial of service attack. Attackers can craft malformed packets causing the process to consume huge amounts of memory resulting in a denial of service.
### Patches
Version 3.4.4 contains patches fixing this.
### Workarounds
A possible worka... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/cloudflare/goflow/v3/decoders/sflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/cloudflare/goflow/security/advisories/GHSA-9rpw-2h95-666c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2529'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/goflow/commit/2b94619a6204443e3ca1769f4e459f9f57039c51'}, {'type': 'WEB', 'url': '... | {'cwe_ids': ['CWE-20', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-01T15:52:23Z', 'nvd_published_at': '2022-09-30T11:15:00Z'} |
1.4.0 | GHSA-pj2c-h76w-vv6f | 2022-10-07T21:23:18Z | 2022-10-07T21:23:18Z | null | ['CVE-2022-39287'] | tiny-csrf has openly visible CSRF tokens | ### Impact
Weak encryption on CSRF so tokens can be read by malicious attackers.
### Patches
Problems have been patched as of v1.1.0
### Workarounds
Upgrade to v1.1.0
### References
https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html
### For more information
... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'tiny-csrf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/valexandersaulys/tiny-csrf/security/advisories/GHSA-pj2c-h76w-vv6f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39287'}, {'type': 'WEB', 'url': 'https://github.com/valexandersaulys/tiny-csrf/commit/8eead6da3b56e290512bbe8d20c2c5df3be317ba'}, {'typ... | {'cwe_ids': ['CWE-319'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-07T21:23:18Z', 'nvd_published_at': '2022-10-07T20:15:00Z'} |
1.4.0 | GHSA-cvxj-4745-843x | 2022-12-16T19:59:12Z | 2022-10-19T19:00:22Z | null | ['CVE-2022-43433'] | Content-Security-Policy protection for user content disabled by Jenkins ScreenRecorder Plugin | Jenkins sets the `Content-Security-Policy` header to static files served by Jenkins (specifically `DirectoryBrowserSupport`), such as workspaces, `/userContent`, or archived artifacts, unless a Resource Root URL is specified.
ScreenRecorder Plugin 0.7 and earlier programmatically updates [the Java system property](htt... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:screenrecorder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43433'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/screenrecorder-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2864'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secur... | {'cwe_ids': ['CWE-693'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T22:03:54Z', 'nvd_published_at': '2022-10-19T16:15:00Z'} |
1.4.0 | GHSA-c33w-pm52-mqvf | 2022-10-25T20:22:01Z | 2022-10-25T20:22:01Z | null | ['CVE-2022-39350'] | @dependencytrack/frontend vulnerable to Persistent Cross-Site-Scripting via Vulnerability Details | ### Description
Due to the common practice of providing vulnerability details in markdown format, the Dependency-Track frontend renders them using the JavaScript library [Showdown](https://github.com/showdownjs/showdown). Showdown [does not have any XSS countermeasures built in](https://github.com/showdownjs/showdown/... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': '@dependencytrack/frontend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/DependencyTrack/frontend/security/advisories/GHSA-c33w-pm52-mqvf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39350'}, {'type': 'WEB', 'url': 'https://docs.dependencytrack.org/changelog/'}, {'type': 'PACKAGE', 'url': 'https://github.com/Dependency... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T20:22:01Z', 'nvd_published_at': '2022-10-25T17:15:00Z'} |
1.4.0 | GHSA-5fvg-h778-jjjx | 2022-12-16T17:27:51Z | 2022-10-19T19:00:18Z | null | ['CVE-2022-43417'] | Missing permission checks in Jenkins Katalon Plugin allow capturing credentials | Katalon Plugin 1.0.32 and earlier does not perform permission checks in several HTTP endpoints.
This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Katalon Plugin 1... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:katalon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.33'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43417'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/katalon-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2845%20(1)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-securi... | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T21:24:04Z', 'nvd_published_at': '2022-10-19T16:15:00Z'} |
1.4.0 | GHSA-wmfh-h3vm-rcxm | 2022-12-16T20:00:32Z | 2022-10-19T19:00:18Z | null | ['CVE-2022-43434'] | Content-Security-Policy protection for user content disabled by Jenkins NeuVector Vulnerability Scanner Plugin | Jenkins sets the Content-Security-Policy header to static files served by Jenkins (specifically `DirectoryBrowserSupport`), such as workspaces, `/userContent`, or archived artifacts, unless a Resource Root URL is specified.
NeuVector Vulnerability Scanner Plugin 1.20 and earlier globally disables the `Content-Security... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:neuvector-vulnerability-scanner'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.22'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.20'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43434'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/neuvector-vulnerability-scanner-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2865'}, {'type': 'WEB', 'url': 'http://www.openwall.co... | {'cwe_ids': ['CWE-693'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T21:21:50Z', 'nvd_published_at': '2022-10-19T16:15:00Z'} |
1.4.0 | GHSA-hpqj-7cj6-hfj8 | 2022-10-06T18:20:46Z | 2022-10-04T00:00:22Z | null | ['CVE-2022-40764'] | Snyk CLI affected by Command Injection vulnerability | Snyk CLI before 1.996.0 allows arbitrary command execution, affecting Snyk IDE plugins and the snyk npm package. Exploitation could follow from the common practice of viewing untrusted files in the Visual Studio Code editor, for example. The original demonstration was with shell metacharacters in the vendor.json ignore... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'snyk'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.996.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'snyk-go-plugin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'t... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40764'}, {'type': 'PACKAGE', 'url': 'https://github.com/snyk/cli'}, {'type': 'WEB', 'url': 'https://github.com/snyk/cli/releases/tag/v1.996.0'}, {'type': 'WEB', 'url': 'https://github.com/snyk/snyk-go-plugin/releases/tag/v1.19.1'}, {'type': 'WEB', ... | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-05T21:28:25Z', 'nvd_published_at': '2022-10-03T15:15:00Z'} |
1.4.0 | GHSA-vpwh-qmwc-2phg | 2022-11-01T21:38:30Z | 2022-10-31T19:00:37Z | null | ['CVE-2022-40488'] | ProcessWire vulnerable to Cross-Site Request Forgery | ProcessWire v3.0.200 was discovered to contain a Cross-Site Request Forgery (CSRF). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'processwire/processwire'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.200'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40488'}, {'type': 'WEB', 'url': 'https://gist.github.com/filipaze/76138289ded98aa45dfcd939a8afd331'}, {'type': 'PACKAGE', 'url': 'https://github.com/processwire/processwire'}, {'type': 'WEB', 'url': 'http://processwire.com'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T21:38:30Z', 'nvd_published_at': '2022-10-31T12:15:00Z'} |
1.4.0 | GHSA-rgv9-q543-rqg4 | 2022-11-15T22:14:42Z | 2022-10-03T00:00:31Z | null | ['CVE-2022-42004'] | Uncontrolled Resource Consumption in FasterXML jackson-databind | In FasterXML jackson-databind before 2.12.7.1 and in 2.13.x before 2.13.4, resource exhaustion can occur because of a lack of a check in BeanDeserializer._deserializeFromArray to prevent use of deeply nested arrays. An application is vulnerable only with certain customized choices for deserialization. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.12.7.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42004'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/3582'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/063183589218fec19a9293ed2f17ec53ea80ba88'}, {'type': 'WEB', 'url': 'https://b... | {'cwe_ids': ['CWE-400', 'CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-04T21:56:21Z', 'nvd_published_at': '2022-10-02T05:15:00Z'} |
1.4.0 | GHSA-2j79-8pqc-r7x6 | 2023-04-12T20:46:47Z | 2022-10-01T00:00:24Z | null | ['CVE-2022-24373'] | react-native-reanimated vulnerable to ReDoS | The package react-native-reanimated before 2.10.0 is vulnerable to Regular Expression Denial of Service (ReDoS) due to improper usage of regular expression in the parser of Colors.js. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'react-native-reanimated'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24373'}, {'type': 'WEB', 'url': 'https://github.com/software-mansion/react-native-reanimated/pull/3382'}, {'type': 'WEB', 'url': 'https://github.com/software-mansion/react-native-reanimated/pull/3382/commits/7adf06d0c59382d884a04be86a96eede3d0432fa... | {'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-04T21:16:38Z', 'nvd_published_at': '2022-09-30T05:15:00Z'} |
1.4.0 | GHSA-p28h-cc7q-c4fg | 2022-10-04T21:11:32Z | 2022-10-01T00:00:24Z | null | ['CVE-2022-21222'] | css-what vulnerable to ReDoS due to use of insecure regular expression | The package css-what before 2.1.3 is vulnerable to Regular Expression Denial of Service (ReDoS) due to the use of insecure regular expression in the `re_attr` variable of index.js. The exploitation of this vulnerability could be triggered via the parse function. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'css-what'}, 'ecosystem_specific': {'affected_functions': ['css-what.parse']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21222'}, {'type': 'WEB', 'url': 'https://github.com/fb55/css-what/commit/dc510929790da6617e7aa93a616498b22f6a6b72'}, {'type': 'PACKAGE', 'url': 'https://github.com/fb55/css-what'}, {'type': 'WEB', 'url': 'https://github.com/fb55/css-what/blob/a38ef... | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-04T21:11:32Z', 'nvd_published_at': '2022-09-30T05:15:00Z'} |
1.4.0 | GHSA-5gg9-gwj4-mqmj | 2022-10-04T21:53:28Z | 2022-10-04T00:00:20Z | null | ['CVE-2022-32173'] | OrchardCore vulnerable to HTML injection | OrchardCore versions starting with 1.0.0-rc1-11259 and prior to 1.4.0 are vulnerable to HTML injection. The vulnerability allows an authenticated user with an editor security role to inject a persistent HTML modal dialog component into the dashboard that will affect admin users. Version 1.4.0 contains a patch. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'OrchardCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0-rc1-11259'}, {'fixed': '1.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-32173'}, {'type': 'WEB', 'url': 'https://github.com/OrchardCMS/OrchardCore/pull/11729'}, {'type': 'WEB', 'url': 'https://github.com/OrchardCMS/OrchardCore/commit/0163c88ddeaca39815d7e6e5ea1c8391085cc136'}, {'type': 'PACKAGE', 'url': 'https://github... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-04T21:53:28Z', 'nvd_published_at': '2022-10-03T13:15:00Z'} |
1.4.0 | GHSA-wr74-2v66-57pp | 2022-11-01T20:36:37Z | 2022-10-31T12:00:18Z | null | ['CVE-2022-3765'] | phpMyFAQ vulnerable to stored Cross-site Scripting | phpMyFAQ prior to version 3.1.8 is vulnerable to stored Cross-site Scripting. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3765'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/372428d02a08e90b3a253ba5c506cda84581a5af'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpmyfaq'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/613143a1-... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-31T19:25:22Z', 'nvd_published_at': '2022-10-31T11:15:00Z'} |
1.4.0 | GHSA-f9qj-7gh3-mhj4 | 2022-10-25T20:30:47Z | 2022-10-19T18:54:28Z | null | ['CVE-2022-39326'] | run-terraform allows for RCE via terraform plan | ### Impact
_What kind of vulnerability is it? Who is impacted?_
All users of the `run-terraform` reusable workflow from the kartverket/github-workflows repo are affected. A malicious actor could potentially send a PR with a malicious payload leading to execution of arbitrary JavaScript code in the context of the work... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'GitHub Actions', 'name': 'kartverket/github-workflows'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/kartverket/github-workflows/security/advisories/GHSA-f9qj-7gh3-mhj4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39326'}, {'type': 'WEB', 'url': 'https://github.com/kartverket/github-workflows/pull/19'}, {'type': 'PACKAGE', 'url': 'https://github.... | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T18:54:28Z', 'nvd_published_at': '2022-10-25T17:15:00Z'} |
1.4.0 | GHSA-5qwq-g2hx-r6f7 | 2022-10-20T20:11:26Z | 2022-10-19T12:00:22Z | null | ['CVE-2022-39198'] | Hessian Lite for Apache Dubbo deserialization vulnerability | A deserialization vulnerability existed in dubbo hessian-lite 3.2.12 and its earlier versions, which could lead to malicious code execution. This issue affects Apache Dubbo 2.7.x version 2.7.17 and prior versions; Apache Dubbo 3.0.x version 3.0.11 and prior versions; Apache Dubbo 3.1.x version 3.1.0 and prior versions. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.alibaba:hessian-lite'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.13'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.12'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo'}, 'ranges': [{'t... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39198'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/dubbo-hessian-lite'}, {'type': 'WEB', 'url': 'https://github.com/apache/dubbo-hessian-lite/releases/tag/v3.2.13'}, {'type': 'WEB', 'url': 'https://github.com/apache/dubbo/releases/tag/d... | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T18:53:09Z', 'nvd_published_at': '2022-10-18T19:15:00Z'} |
1.4.0 | GHSA-3r7j-8mqh-6qhx | 2022-10-25T20:37:53Z | 2022-10-20T18:20:28Z | null | ['CVE-2022-39259'] | Jadx-gui vulnerable to swing HTML Denial of Service (DoS) attack | ### Impact
Using jadx-gui to open a special zip file with entry containing HTML sequence like `<html><frame>` will cause interface to get stuck and throw exceptions like:
```
java.lang.RuntimeException: Can't build aframeset, BranchElement(frameset) 1,3
:no ROWS or COLS defined.
at java.desktop/javax.swing.text.html.H... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.github.skylot:jadx-plugins-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.4'}}] | [{'type': 'WEB', 'url': 'https://github.com/skylot/jadx/security/advisories/GHSA-3r7j-8mqh-6qhx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39259'}, {'type': 'PACKAGE', 'url': 'https://github.com/skylot/jadx'}, {'type': 'WEB', 'url': 'https://github.com/skylot/jadx/releases/tag/v1.4.5'}, {... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-20T18:20:28Z', 'nvd_published_at': '2022-10-21T23:15:00Z'} |
1.4.0 | GHSA-67x4-qr35-qvrm | 2023-02-14T21:25:03Z | 2022-10-05T21:26:26Z | null | ['CVE-2022-39273'] | FlyteAdmin's Default OAuth Authorization Server secret must be rotated | ### Impact
Users who enable the default [Flyte’s authorization server](https://docs.flyte.org/en/latest/deployment/cluster_config/auth_setup.html#oauth2-authorization-server) without changing the default clientid hashes will be exposed to the public internet.
In an effort to make enabling authentication easier for Fly... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/flyteorg/flyteadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.44'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/flyteorg/flyteadmin/security/advisories/GHSA-67x4-qr35-qvrm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39273'}, {'type': 'WEB', 'url': 'https://github.com/flyteorg/flyteadmin/pull/478'}, {'type': 'WEB', 'url': 'https://docs.flyte.org/en/latest/d... | {'cwe_ids': ['CWE-798'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-05T21:26:26Z', 'nvd_published_at': '2022-10-06T18:16:00Z'} |
1.4.0 | GHSA-rm2x-hgr8-w343 | 2022-10-06T19:56:22Z | 2022-10-01T00:00:18Z | null | ['CVE-2022-40923'] | LIEF vulnerable to denial of service through segmentation fault | A vulnerability in the LIEF::MachO::SegmentCommand::virtual_address function of LIEF v0.12.1 allows attackers to cause a denial of service (DOS) through a segmentation fault via a crafted MachO file. A [patch](https://github.com/lief-project/LIEF/commit/24935f654f6df700a9a062298258b9485f584502) is available at commit n... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'lief'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.12.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40923'}, {'type': 'WEB', 'url': 'https://github.com/lief-project/LIEF/issues/784'}, {'type': 'WEB', 'url': 'https://github.com/lief-project/LIEF/commit/24935f654f6df700a9a062298258b9485f584502'}, {'type': 'PACKAGE', 'url': 'https://github.com/lief-... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-06T19:56:22Z', 'nvd_published_at': '2022-09-30T19:15:00Z'} |
1.4.0 | GHSA-f6mq-6fx5-w2ch | 2022-10-22T01:13:01Z | 2022-10-19T19:00:21Z | null | ['CVE-2022-43403'] | Jenkins Script Security Plugin sandbox bypass vulnerability | A sandbox bypass vulnerability involving casting an array-like value to an array type in Jenkins Script Security Plugin 1183.v774b_0b_0a_a_451 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:script-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1184.v85d16b_d851b_3'}]}], 'database_specific': {'last_known_affected_version_range': '< 1184.v85d16b'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43403'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(1)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/10/19/3'}] | {'cwe_ids': ['CWE-693'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T22:04:08Z', 'nvd_published_at': '2022-10-19T16:15:00Z'} |
1.4.0 | GHSA-9g3v-v24q-jj5p | 2022-10-10T19:41:07Z | 2022-10-06T18:52:04Z | null | ['CVE-2022-3273'] | rdiffweb does not have a rate limit on incorrect password attempts to prevent brute force attacks | rdiffweb prior to 2.5.0a4 does not have a rate limit to prevent attackers attempting brute force attacks to guess passwords. Version 2.5.0a4 limits the number of incorrect password attempts. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3273'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/b5e3bb0a98268d18ceead36ab9b2b7eaacd659a8'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a6df4bad-33... | {'cwe_ids': ['CWE-326', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-06T20:06:51Z', 'nvd_published_at': '2022-10-06T18:16:00Z'} |
1.4.0 | GHSA-hff2-x2j9-gxgv | 2022-11-28T21:07:03Z | 2022-10-28T19:19:42Z | null | ['CVE-2022-3500'] | Keylime: unhandled exceptions could lead to invalid attestation states | ### Impact
This vulnerability creates a false sense of security for keylime users -- i.e. a user could query keylime and conclude that a parcitular node/agent is correctly attested, while attestations are not in fact taking place.
**Short explanation**: the keylime verifier creates periodic reports on the state of ea... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Keylime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.5.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/keylime/keylime/security/advisories/GHSA-hff2-x2j9-gxgv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3500'}, {'type': 'WEB', 'url': 'https://github.com/keylime/keylime/pull/1128'}, {'type': 'WEB', 'url': 'https://github.com/keylime/keylime/pull/11... | {'cwe_ids': ['CWE-248'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-28T19:19:42Z', 'nvd_published_at': '2022-11-22T19:15:00Z'} |
1.4.0 | GHSA-x8x2-wc2h-wc48 | 2022-10-18T15:46:14Z | 2022-10-14T19:00:44Z | null | ['CVE-2022-3439'] | Missing rate limit on rdiffweb | Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffweb prior to 2.5.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3439'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/b78ec09f4582e363f6f449df6f987127e126c311'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/37b86c45-b2... | {'cwe_ids': ['CWE-770'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-14T21:30:12Z', 'nvd_published_at': '2022-10-14T12:15:00Z'} |
1.4.0 | GHSA-vh7g-p26c-j2cw | 2023-07-12T14:01:57Z | 2022-10-03T19:12:03Z | null | ['CVE-2022-39222'] | Dex vulnerable to Man-in-the-Middle allowing ID token capture via intercepted authorization code | ### Impact
Dex instances with public clients (and by extension, clients accepting tokens issued by those Dex instances) are affected by this vulnerability.
An attacker can exploit this vulnerability by making a victim navigate to a malicious website and guiding them through the OIDC flow, stealing the OAuth authorizat... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/dexidp/dex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.35.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.34.0'}}] | [{'type': 'WEB', 'url': 'https://github.com/dexidp/dex/security/advisories/GHSA-vh7g-p26c-j2cw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39222'}, {'type': 'WEB', 'url': 'https://github.com/dexidp/dex/commit/49471b14c8080ddb034d4855841123d378b7a634'}, {'type': 'PACKAGE', 'url': 'https://g... | {'cwe_ids': ['CWE-200', 'CWE-862'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-03T19:12:03Z', 'nvd_published_at': '2022-10-06T18:16:00Z'} |
1.4.0 | GHSA-8r99-h8j2-rw64 | 2022-10-07T07:31:33Z | 2022-10-07T07:31:33Z | null | [] | Twisted vulnerable to HTTP Request Smuggling Attacks | ### Impact
Twisted Web is vulnerable to request smuggling attacks:
1. "When presented with two content-length headers, Twisted Web ignored the first header. When the second content-length was set to zero this caused Twisted Web to interpret the request body as a pipelined request. According to RFC 7230 Section 3.3.3#4... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'twisted'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20.3.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/twisted/twisted/security/advisories/GHSA-8r99-h8j2-rw64'}, {'type': 'WEB', 'url': 'https://github.com/twisted/twisted/commit/20c787a14a09e7cbd5dfd8df08ceff00d1fcc081'}, {'type': 'WEB', 'url': 'https://github.com/twisted/twisted/commit/4a7d22e490bb8ff836892cc99a1f54b85ccb0281'... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-07T07:31:33Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9w4g-fp9h-3q2v | 2023-07-28T20:30:59Z | 2022-10-26T19:00:38Z | null | ['CVE-2022-42468'] | Apache Flume vulnerable to remote code execution via deserialization of unsafe providerURL | Flume’s JMSSource class can be configured with a providerUrl parameter. A JNDI lookup is performed on this name without performing validation. This could result in untrusted data being deserialized, leading to remote code execution (RCE) attack when a configuration uses a JMS Source with an unsafe providerURL. This iss... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.flume.flume-ng-sources:flume-jms-source'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42468'}, {'type': 'WEB', 'url': 'https://github.com/apache/flume/commit/eee179a09df405c1ab55ae25a53b76ca1050bb97'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/flume'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/FLUME-3... | {'cwe_ids': ['CWE-20', 'CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-27T18:39:05Z', 'nvd_published_at': '2022-10-26T16:15:00Z'} |
1.4.0 | GHSA-2p3c-p3qw-69r4 | 2023-07-31T20:39:03Z | 2022-10-12T14:15:48Z | null | [] | The graphql-upload library included in Apollo Server 2 is vulnerable to CSRF mutations | ### Impact
The [graphql-upload](https://www.npmjs.com/package/graphql-upload) npm package can execute GraphQL operations contained in `content-type: multipart/form-data` POST requests. Because they are POST requests, they can contain GraphQL mutations. Because they use `content-type: multipart/form-data`, they can be "... | [] | [{'package': {'ecosystem': 'npm', 'name': 'apollo-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.25.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/apollographql/apollo-server/security/advisories/GHSA-2p3c-p3qw-69r4'}, {'type': 'WEB', 'url': 'https://github.com/jaydenseric/graphql-multipart-request-spec/pull/64'}, {'type': 'WEB', 'url': 'https://github.com/apollographql/apollo-server/commit/82d44985ddca8e61557957d67f41e9... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-12T14:15:48Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mg5h-rhjq-6v84 | 2022-11-01T20:35:47Z | 2022-10-31T12:00:18Z | null | ['CVE-2022-3766'] | phpMyFAQ vulnerable to reflected Cross-site Scripting | phpMyFAQ prior to version 3.1.8 is vulnerable to reflected cross-site scripting. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3766'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/c7904f2236c6c0dd64c2226b90c30af0f7e5a72d'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpmyfaq'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d9666520-... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-31T19:26:04Z', 'nvd_published_at': '2022-10-31T11:15:00Z'} |
1.4.0 | GHSA-4993-m7g5-r9hh | 2022-10-06T23:14:23Z | 2022-10-06T23:14:23Z | null | ['CVE-2020-15115'] | etcd has no minimum password length | ### Vulnerability type
Access Control
### Workarounds
The etcdctl and etcd API do not enforce a specific password length during user creation or user password update operations. [It is the responsibility of the administrator to enforce these requirements](https://github.com/etcd-io/etcd/blob/master/Documentation/op-gu... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'go.etcd.io/etcd/client/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.4.0'}, {'fixed': '3.4.10'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'go.etcd.io/etcd/client/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.23'}]... | [{'type': 'WEB', 'url': 'https://github.com/etcd-io/etcd/security/advisories/GHSA-4993-m7g5-r9hh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15115'}, {'type': 'PACKAGE', 'url': 'https://github.com/etcd-io/etcd'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package... | {'cwe_ids': ['CWE-521'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-06T23:14:23Z', 'nvd_published_at': '2020-08-06T22:15:00Z'} |
1.4.0 | GHSA-2rr3-rv49-p42f | 2022-11-01T13:29:12Z | 2022-10-29T19:00:27Z | null | ['CVE-2022-3754'] | phpMyFAQ contains Weak Password Requirements | phpMyFAQ prior to version 3.1.8 has Weak Password Requirements. Version 3.1.8 introduces an eight-character minimum password length. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3754'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/d7a87d2646287828c70401ca8976ef531fbc77ea'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpmyfaq'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/f4711d7f-... | {'cwe_ids': ['CWE-521'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-31T19:26:27Z', 'nvd_published_at': '2022-10-29T13:15:00Z'} |
1.4.0 | GHSA-43qq-qw4x-28f8 | 2022-10-18T21:14:04Z | 2022-10-18T21:14:04Z | null | ['CVE-2022-39314'] | Kirby CMS vulnerable to user enumeration in the code-based login and password reset forms | ### TL;DR
This vulnerability only affects you if you are using the `code` or `password-reset` auth method with the `auth.methods` option. It can only be successfully exploited under server configuration conditions outside of the attacker's control.
----
### Introduction
User enumeration is a type of vulnerability t... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'getkirby/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5.0'}, {'fixed': '3.5.8.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'getkirby/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.6.0'}, {'fixed': '3.6.6.2'}]}]}, {... | [{'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/security/advisories/GHSA-43qq-qw4x-28f8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39314'}, {'type': 'PACKAGE', 'url': 'https://github.com/getkirby/kirby'}, {'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/releases/tag/3.... | {'cwe_ids': ['CWE-204', 'CWE-307'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-18T21:14:04Z', 'nvd_published_at': '2022-10-24T14:15:00Z'} |
1.4.0 | GHSA-g975-f26h-93g8 | 2022-10-22T00:56:07Z | 2022-10-19T19:00:18Z | null | ['CVE-2022-43408'] | Jenkins Pipeline: Stage View Plugin allows CSRF protection bypass of any target URL in Jenkins | Jenkins Pipeline: Stage View Plugin 2.26 and earlier does not correctly encode the ID of `input` steps when using it to generate URLs to proceed or abort Pipeline builds, allowing attackers able to configure Pipelines to specify `input` step IDs resulting in URLs that would bypass the CSRF protection of any target URL ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.pipeline-stage-view:pipeline-stage-view'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.25'}, {'fixed': '2.27'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.pipeline-stage-view:pipeline-stage-view'}, 'ranges'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43408'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2828'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/10/19/3'}] | {'cwe_ids': ['CWE-838'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T20:27:47Z', 'nvd_published_at': '2022-10-19T16:15:00Z'} |
1.4.0 | GHSA-cw98-9j8w-wxv9 | 2022-10-21T20:32:34Z | 2022-10-21T20:32:34Z | null | ['CVE-2022-24464'] | .NET Denial of Service Vulnerability | Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 6.0, .NET 5.0, and .NET CORE 3.1. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.
Microsoft is aware of a Denial of Service vulnerability, which e... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.23'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': ... | [{'type': 'WEB', 'url': 'https://github.com/dotnet/aspnetcore/security/advisories/GHSA-cw98-9j8w-wxv9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24464'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/212'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/a... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-21T20:32:34Z', 'nvd_published_at': '2022-03-09T17:15:00Z'} |
1.4.0 | GHSA-2w2m-ccf8-57cq | 2022-12-16T17:26:11Z | 2022-10-19T19:00:18Z | null | ['CVE-2022-43415'] | XXE vulnerability in Jenkins REPO Plugin | REPO Plugin 1.15.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
This allows attackers able to control which `repo` binary is executed on agents to have Jenkins parse a crafted XML document that uses external entities for extraction of secrets from the Jenkins controller o... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:repo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43415'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/repo-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2337'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/1... | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-10-19T20:26:57Z', 'nvd_published_at': '2022-10-19T16:15:00Z'} |
1.4.0 | GHSA-gr7w-x2jp-3xgw | 2022-10-06T22:58:56Z | 2022-10-06T22:58:56Z | null | ['CVE-2018-21246'] | Caddy vulnerable to Authentication Bypass due to mishandling of TLS client authentication | Caddy before 0.10.13 mishandles TLS client authentication, as demonstrated by an authentication bypass caused by the lack of the StrictHostMatching mode. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/caddyserver/caddy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-21246'}, {'type': 'WEB', 'url': 'https://github.com/caddyserver/caddy/pull/2099'}, {'type': 'WEB', 'url': 'https://github.com/caddyserver/caddy/commit/4d9ee000c8d2cbcdd8284007c1e0f2da7bc3c7c3'}, {'type': 'WEB', 'url': 'https://bugs.gentoo.org/71521... | {'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-06T22:58:56Z', 'nvd_published_at': None} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.