schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 8 154 | details stringlengths 31 19.1k | severity stringlengths 2 92 | affected stringlengths 75 28.5k | references stringlengths 79 7.48k | database_specific stringlengths 131 196 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-wq8g-hm94-5rqq | 2022-11-22T19:02:55Z | 2022-04-23T00:40:48Z | null | ['CVE-2012-1094'] | JBoss AS may expose root content if excluded-contexts list is mismatched | JBoss AS 7 prior to 7.1.1 and mod_cluster do not handle default hostname in the same way, which can cause the excluded-contexts list to be mismatched and the root context to be exposed. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jboss.as:jboss-as-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0.Alpha1'}, {'fixed': '7.1.1.Final'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-1094'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/cve-2012-1094'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-1094'}] | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T19:02:55Z', 'nvd_published_at': '2020-03-10T17:15:00Z'} |
1.4.0 | GHSA-frxg-hf44-q765 | 2022-04-22T20:39:47Z | 2022-04-22T20:39:47Z | null | ['CVE-2022-24849'] | Exposure of Sensitive Information to an Unauthorized Actor in DisCatSharp | ### Impact
Users of versions 9.8.5, 9.8.6, 9.9.0 and previously published prereleases of 10.0.0 who have used either one of the two `RequireDisCatSharpDeveloperAttribute`s or the `BaseDiscordClient.LibraryDeveloperTeam` have potentially had their bot token sent to a web server not affiliated with Discord. This server i... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'DisCatSharp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.8.5'}, {'fixed': '9.9.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Aiko-IT-Systems/DisCatSharp/security/advisories/GHSA-frxg-hf44-q765'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24849'}, {'type': 'PACKAGE', 'url': 'https://github.com/Aiko-IT-Systems/DisCatSharp'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:39:47Z', 'nvd_published_at': '2022-04-14T22:15:00Z'} |
1.4.0 | GHSA-mcq2-w56r-5w2w | 2022-04-08T22:09:23Z | 2022-04-08T22:09:23Z | null | [] | Daemon panics when processing certain blocks | ### Impact
go-ipfs nodes with versions 0.10.0, 0.11.0, 0.12.0, or 0.12.1 can crash when trying to traverse certain malformed graphs due to an issue in the go-codec-dagpb dependency. Vulnerable nodes that work with these malformed graphs may crash leading to denial-of-service risks.
This particularly impacts nodes tha... | [] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/ipld/go-ipfs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.12.0'}, {'fixed': '0.12.2'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/ipld/go-ipfs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.1'}]}]}... | [{'type': 'WEB', 'url': 'https://github.com/ipfs/go-ipfs/security/advisories/GHSA-mcq2-w56r-5w2w'}, {'type': 'PACKAGE', 'url': 'github.com/ipld/go-ipfs'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-08T22:09:23Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jv64-2m3x-6v4q | 2022-07-26T21:29:36Z | 2022-04-30T00:00:36Z | null | ['CVE-2021-41948'] | Subrion CMS Cross-site Scripting (XSS) vulnerability in the `contact us` plugin | A cross-site scripting (XSS) vulnerability exists in the `contact us` plugin for Subrion CMS <= 4.2.1 version via `List of subjects`. This can be exploited by someone with administrative privileges when they log in to the admin panel. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'intelliants/subrion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41948'}, {'type': 'WEB', 'url': 'https://github.com/intelliants/subrion-plugin-contact_us/issues/8'}, {'type': 'PACKAGE', 'url': 'https://github.com/intelliants/subrion-plugin-contact_us/'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-04T18:10:42Z', 'nvd_published_at': '2022-04-29T14:15:00Z'} |
1.4.0 | GHSA-6q9g-3vfq-q2qj | 2022-05-24T22:20:25Z | 2022-04-30T00:00:36Z | null | ['CVE-2022-0985'] | Improper Authentication in moodle | Insufficient capability checks could allow users with the moodle/site:uploadusers capability to delete users, without having the necessary moodle/user:delete capability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11.0'}, {'fixed': '3.11.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0985'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/addd4f894d8173ec8ff0ae2212d51a1977e7bcad'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2064117'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle... | {'cwe_ids': ['CWE-287', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:20:25Z', 'nvd_published_at': '2022-04-29T16:15:00Z'} |
1.4.0 | GHSA-fcr6-6cph-vmcm | 2022-04-29T04:21:07Z | 2022-04-13T00:00:17Z | null | ['CVE-2022-29040'] | Stored XSS vulnerability in Jenkins Git Parameter Plugin | Jenkins Git Parameter Plugin 0.9.15 and earlier does not escape the name and description of Git parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:git-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.16'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29040'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/git-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-29T04:21:07Z', 'nvd_published_at': '2022-04-12T20:15:00Z'} |
1.4.0 | GHSA-3v5x-qjrp-q2hq | 2022-04-22T21:02:44Z | 2022-04-13T00:00:24Z | null | ['CVE-2022-27260'] | Unrestricted Upload of File with Dangerous Type in ButterCMS | An arbitrary file upload vulnerability in the file upload component of ButterCMS v1.2.8 allows attackers to execute arbitrary code via a crafted SVG file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'buttercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27260'}, {'type': 'PACKAGE', 'url': 'https://github.com/ButterCMS/buttercms-js'}, {'type': 'WEB', 'url': 'https://www.youtube.com/watch?v=Tw8OhtVd-mE'}] | {'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T21:02:44Z', 'nvd_published_at': '2022-04-12T17:15:00Z'} |
1.4.0 | GHSA-cqxx-66wh-8pjw | 2022-04-13T01:15:56Z | 2022-04-01T13:59:17Z | null | ['CVE-2022-24798'] | Improper Removal of Sensitive Information Before Storage or Transfer in irrd | IRRd did not always filter password hashes in query responses relating to `mntner` objects and database exports. This may have allowed adversaries to retrieve some of these hashes, perform a brute-force search for the clear-text passphrase, and use these to make unauthorised changes to affected IRR objects. This issue ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'irrd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/irrdnet/irrd/security/advisories/GHSA-cqxx-66wh-8pjw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24798'}, {'type': 'WEB', 'url': 'https://github.com/irrdnet/irrd/commit/0e41bae8d3d27316381a2fc7b466597230e35ec6'}, {'type': 'WEB', 'url': 'https://g... | {'cwe_ids': ['CWE-212'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T13:59:17Z', 'nvd_published_at': '2022-03-31T23:15:00Z'} |
1.4.0 | GHSA-vp37-2f9p-3vr3 | 2022-05-04T03:59:45Z | 2022-04-23T00:03:04Z | null | ['CVE-2022-29577'] | Cross-site Scripting in OWASP AntiSamy | AntiSamy is a library for performing fast, configurable cleansing of HTML coming from untrusted sources. OWASP AntiSamy before 1.6.7 allows XSS via HTML tag smuggling on STYLE content with crafted input. The output serializer does not properly encode the supposed Cascading Style Sheets (CSS) content. NOTE: this issue e... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.owasp.antisamy:antisamy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29577'}, {'type': 'WEB', 'url': 'https://github.com/nahsra/antisamy/commit/32e273507da0e964b58c50fd8a4c94c9d9363af0'}, {'type': 'PACKAGE', 'url': 'https://github.com/nahsra/antisamy'}, {'type': 'WEB', 'url': 'https://github.com/nahsra/antisamy/rele... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-26T17:47:34Z', 'nvd_published_at': '2022-04-21T23:15:00Z'} |
1.4.0 | GHSA-c5hf-mc85-2hx4 | 2022-05-24T22:05:22Z | 2022-04-30T00:00:35Z | null | ['CVE-2022-0984'] | Missing authorization in Moodle | Users with the capability to configure badge criteria (teachers and managers by default) were able to configure course badges with profile field criteria, which should only be available for site badges. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11.0'}, {'fixed': '3.11.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10.0'}, {'fixed': '3.10.10'}]}]}... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0984'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/cdc78a16a5da95a17fb10bf1c66689237f5a3f7d'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2064118'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/s... | {'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:05:22Z', 'nvd_published_at': '2022-04-29T17:15:00Z'} |
1.4.0 | GHSA-9qrh-qjmc-5w2p | 2022-05-03T02:24:25Z | 2022-04-28T20:25:23Z | null | ['CVE-2022-21227'] | Denial-of-Service when binding invalid parameters in sqlite3 | Affected versions of sqlite3 will experience a fatal error when supplying a specific object in the parameter array. This error causes the application to crash and could not be caught. Users of `sqlite3` v5.0.0, v5.0.1 and v5.0.2 are affected by this. This issue is fixed in v5.0.3. All users are recommended to upgrade t... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'sqlite3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/TryGhost/node-sqlite3/security/advisories/GHSA-9qrh-qjmc-5w2p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21227'}, {'type': 'WEB', 'url': 'https://github.com/TryGhost/node-sqlite3/issues/1440'}, {'type': 'WEB', 'url': 'https://github.com/TryGhost... | {'cwe_ids': ['CWE-248'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T20:25:23Z', 'nvd_published_at': '2022-05-01T16:15:00Z'} |
1.4.0 | GHSA-qpmc-wprv-x746 | 2022-04-12T21:31:26Z | 2022-04-12T21:31:26Z | null | ['CVE-2019-15160'] | Inline DTD allows XML bomb attack | The SweetXml (aka sweet_xml) package through 0.6.6 for Erlang and Elixir allows attackers to cause a denial of service (resource consumption) via an XML entity expansion attack with an inline DTD. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Hex', 'name': 'sweet_xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15160'}, {'type': 'WEB', 'url': 'https://github.com/kbrw/sweet_xml/issues/71'}, {'type': 'PACKAGE', 'url': 'https://github.com/kbrw/sweet_xml'}, {'type': 'WEB', 'url': 'https://hex.pm/packages/sweet_xml'}] | {'cwe_ids': ['CWE-611', 'CWE-776'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-12T21:31:26Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xw7v-qrhc-jjg2 | 2022-04-18T22:21:50Z | 2022-04-01T00:00:41Z | null | ['CVE-2021-37517'] | Access Control vulnerability in Dolibarr | An Access Control vulnerability exists in Dolibarr ERP/CRM 13.0.2, fixed version is 14.0.1, in the forgot-password function becuase the application allows email addresses as usernames, which can cause a Denial of Service. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '14.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37517'}, {'type': 'WEB', 'url': 'https://github.com/Dolibarr/dolibarr/commit/b57eb8284e830e30eefb26e3c5ede076ea24037c'}, {'type': 'PACKAGE', 'url': 'https://github.com/Dolibarr/dolibarr'}, {'type': 'WEB', 'url': 'https://github.com/Dolibarr/dolibar... | {'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T19:38:58Z', 'nvd_published_at': '2022-03-31T19:15:00Z'} |
1.4.0 | GHSA-27rq-4943-qcwp | 2022-06-02T17:38:26Z | 2022-04-28T00:00:35Z | null | ['CVE-2022-29810'] | Insertion of Sensitive Information into Log File in Hashicorp go-getter | The Hashicorp go-getter library before 1.5.11 could write SSH credentials into its logfile, exposing sensitive credentials to local users able to read the logfile. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/go-getter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29810'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/go-getter/pull/348'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/go-getter/commit/36b68b2f68a3ed10ee7ecbb0cb9f6b1dc5da49cc'}, {'type': 'PACKAGE', 'url': 'https://github.com/has... | {'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-03T20:19:26Z', 'nvd_published_at': '2022-04-27T06:15:00Z'} |
1.4.0 | GHSA-86r3-4gq8-xw8q | 2022-08-22T16:34:29Z | 2022-04-09T00:00:25Z | 2022-08-22T16:34:29Z | ['CVE-2021-43503'] | Remote Code Execution in Laravel | ## Withdrawn
This advisory has been withdrawn because it is not a security issue and the CVE has been revoked.
## Original Description
A Remote Code Execution (RCE) vulnerability exists in h laravel 5.8.38 via an unserialize pop chain in (1) __destruct in \Routing\PendingResourceRegistration.php, (2) __cal in Queue\Ca... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'laravel/laravel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.8.38'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43503'}, {'type': 'WEB', 'url': 'https://github.com/1nhann/vulns/issues/1#issuecomment-1213126338'}, {'type': 'WEB', 'url': 'https://github.com/guoyanan1g/Laravel-vul/issues/2#issue-1045655892'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-12T20:32:12Z', 'nvd_published_at': '2022-04-08T18:15:00Z'} |
1.4.0 | GHSA-4gr9-99j3-vqxv | 2023-09-18T21:59:42Z | 2022-04-30T18:15:08Z | null | ['CVE-2000-1210'] | Apache Tomcat Directory Traversal | Directory traversal vulnerability in source.jsp of Apache Tomcat before 3.1 allows remote attackers to read arbitrary files via a `..` (dot dot) in the argument to source.jsp. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2000-1210'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20020818015647/http://www.iss.net/security_center/static/4205.php'}, {'type': 'WEB', 'url': 'http://marc.info/?l=bugtraq&m=95371672300045&w=2'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T21:59:42Z', 'nvd_published_at': '2002-03-22T05:00:00Z'} |
1.4.0 | GHSA-xg75-q3q5-cqmv | 2022-04-22T20:55:52Z | 2022-04-22T20:55:52Z | null | ['CVE-2022-24863'] | Denial of Service in http-swagger | ### Impact
Allows an attacker to perform a DOS attack consisting of memory exhaustion on the host system.
### Patches
Yes. Please upgrade to v1.2.6.
### Workarounds
A workaround is to restrict the path prefix to the "GET" method. As shown below
```
func main() {
r := mux.NewRouter()
r.PathPrefix("/swagger/").Handl... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/swaggo/http-swagger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/swaggo/http-swagger/security/advisories/GHSA-xg75-q3q5-cqmv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24863'}, {'type': 'WEB', 'url': 'https://github.com/swaggo/http-swagger/pull/62'}, {'type': 'WEB', 'url': 'https://github.com/swaggo/http-swag... | {'cwe_ids': ['CWE-400', 'CWE-755'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:55:52Z', 'nvd_published_at': '2022-04-18T19:15:00Z'} |
1.4.0 | GHSA-h6xx-pmxh-3wgp | 2023-08-30T11:13:45Z | 2022-04-12T22:41:32Z | null | ['CVE-2018-16886'] | go.etcd.io/etcd Authentication Bypass | etcd versions 3.2.x before 3.2.26 and 3.3.x before 3.3.11 are vulnerable to an improper authentication issue when role-based access control (RBAC) is used and client-cert-auth is enabled. If an etcd client server TLS certificate contains a Common Name (CN) which matches a valid RBAC username, a remote attacker may auth... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'go.etcd.io/etcd/v3'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.26'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'go.etcd.io/etcd/v3'}, 'ecosystem_specific': {'affected_functions': ['... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16886'}, {'type': 'WEB', 'url': 'https://github.com/etcd-io/etcd/pull/10366'}, {'type': 'WEB', 'url': 'https://github.com/etcd-io/etcd/commit/0191509637546621d6f2e18e074e955ab8ef374d'}, {'type': 'WEB', 'url': 'https://github.com/etcd-io/etcd/commit... | {'cwe_ids': ['CWE-285', 'CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T21:49:34Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6w39-qhmq-g8cp | 2022-05-04T20:56:35Z | 2022-04-13T00:00:16Z | null | ['CVE-2022-29050'] | CSRF vulnerability in Jenkins Publish Over FTP Plugin | A cross-site request forgery (CSRF) vulnerability in Jenkins Publish Over FTP Plugin 1.16 and earlier allows attackers to connect to an FTP server using attacker-specified credentials. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:publish-over-ftp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.17'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29050'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/publish-over-ftp-plugin/commit/b265201428557ab91304e06199ad38221efc23e7'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/publish-over-ftp-plugin'}, {'type': 'WEB', 'url': 'htt... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-04T20:56:35Z', 'nvd_published_at': '2022-04-12T20:15:00Z'} |
1.4.0 | GHSA-vx9g-377x-xwxq | 2022-06-01T22:20:04Z | 2022-04-26T00:00:41Z | null | ['CVE-2022-27311'] | Server side request forgery in gibbon | Gibbon v3.4.3 and below allows attackers to execute a Server-Side Request Forgery (SSRF) via a crafted URL. This issue has been resolved in version 3.4.4 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'gibbon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27311'}, {'type': 'WEB', 'url': 'https://github.com/amro/gibbon/pull/321'}, {'type': 'WEB', 'url': 'https://github.com/amro/gibbon/pull/321#issuecomment-1113147155'}, {'type': 'WEB', 'url': 'https://github.com/amro/gibbon/commit/b2eb99ed304d7491a6d... | {'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-27T18:48:09Z', 'nvd_published_at': '2022-04-25T13:15:00Z'} |
1.4.0 | GHSA-689x-x68p-fph3 | 2022-04-08T22:08:10Z | 2022-04-01T00:00:41Z | null | ['CVE-2022-0350'] | Cross-site Scripting in vditor | Cross-site Scripting (XSS) - Stored in GitHub repository vanessa219/vditor prior to 3.8.13. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'vditor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0350'}, {'type': 'WEB', 'url': 'https://github.com/vanessa219/vditor/commit/e912e36ea98251d700499b1ac7702708d3398476'}, {'type': 'PACKAGE', 'url': 'https://github.com/vanessa219/vditor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8202aa06-... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-08T22:08:10Z', 'nvd_published_at': '2022-03-31T16:15:00Z'} |
1.4.0 | GHSA-qf9q-q4hh-qph3 | 2022-04-29T21:07:16Z | 2022-04-22T00:00:36Z | null | ['CVE-2022-29498'] | SQL injection in blazer | Blazer before 2.6.0 allows SQL Injection. In certain circumstances, an attacker could get a user to run a query they would not have normally run. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'blazer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29498'}, {'type': 'WEB', 'url': 'https://github.com/ankane/blazer/issues/391'}, {'type': 'WEB', 'url': 'https://github.com/ankane/blazer/issues/392'}, {'type': 'WEB', 'url': 'https://github.com/ankane/blazer/commit/f49fbfed7b9e406a69eb78c463c3aa5d3... | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-29T21:07:16Z', 'nvd_published_at': '2022-04-21T05:15:00Z'} |
1.4.0 | GHSA-g27j-74fp-xfpr | 2023-01-10T00:37:19Z | 2022-04-05T18:31:22Z | null | ['CVE-2022-26969'] | Insecure default value for CORS configuration | ### Impact
The default value for the `CORS_ENABLED` and `CORS_ORIGIN` configuration was set to be very permissive by default. This could lead to unauthorized access in uncontrolled environments when the configuration hasn't been changed.
### Patches
The default values for CORS have been changed in https://github.com... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'directus'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.7.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/directus/directus/security/advisories/GHSA-g27j-74fp-xfpr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26969'}, {'type': 'WEB', 'url': 'https://github.com/directus/directus/pull/12022'}, {'type': 'WEB', 'url': 'https://developer.mozilla.org/en-US/... | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-05T18:31:22Z', 'nvd_published_at': '2022-12-26T06:15:00Z'} |
1.4.0 | GHSA-x752-qjv4-c4hc | 2022-04-15T16:49:27Z | 2022-04-04T00:00:55Z | null | ['CVE-2022-28368'] | Remote code injection in dompdf/dompdf | Dompdf is an HTML to PDF converter. Dompdf before 1.2.1 allows remote code execution via a .php file in the src:url field of an @font-face Cascading Style Sheets (CSS) statement (within an HTML input file). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'dompdf/dompdf'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28368'}, {'type': 'WEB', 'url': 'https://github.com/dompdf/dompdf/issues/2598'}, {'type': 'WEB', 'url': 'https://github.com/dompdf/dompdf/pull/2808'}, {'type': 'WEB', 'url': 'https://github.com/dompdf/dompdf/commit/4c70e1025bcd9b7694b95dd552499bd83... | {'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-05T18:00:16Z', 'nvd_published_at': '2022-04-03T03:15:00Z'} |
1.4.0 | GHSA-8xpj-9j9g-fc9r | 2022-04-18T22:19:44Z | 2022-04-08T22:43:17Z | null | ['CVE-2022-24827'] | SQL Injection in elide-datastore-aggregation | ### Impact
When leveraging the following together:
- Elide Aggregation Data Store for Analytic Queries
- Parameterized Columns (A column that requires a client provided parameter)
- A parameterized column of type TEXT
There is the potential for a hacker to provide a carefully crafted query that would bypass server si... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.yahoo.elide:elide-datastore-aggregation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.3'}, {'fixed': '6.1.4'}]}], 'versions': ['6.1.3']}] | [{'type': 'WEB', 'url': 'https://github.com/yahoo/elide/security/advisories/GHSA-8xpj-9j9g-fc9r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24827'}, {'type': 'WEB', 'url': 'https://github.com/yahoo/elide/pull/2581'}, {'type': 'PACKAGE', 'url': 'https://github.com/yahoo/elide'}, {'type': 'W... | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-08T22:43:17Z', 'nvd_published_at': '2022-04-11T21:15:00Z'} |
1.4.0 | GHSA-cvx5-m8vg-vxgc | 2022-04-28T21:16:40Z | 2022-04-28T21:16:40Z | null | ['CVE-2022-24897'] | Arbitrary filesystem write access from velocity. | ### Impact
The velocity scripts is not properly sandboxed against using the Java File API to perform read or write operations on the filesystem. Now writing an attacking script in velocity requires the Script rights in XWiki so not all users can use it, and it also requires finding an XWiki API which returns a File.
... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.commons:xwiki-commons-velocity'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '12.6.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.commons:xwiki-commons-velocity'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'int... | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-cvx5-m8vg-vxgc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24897'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-commons/pull/127'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-com... | {'cwe_ids': ['CWE-22', 'CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T21:16:40Z', 'nvd_published_at': '2022-05-02T22:15:00Z'} |
1.4.0 | GHSA-j33m-2537-86jm | 2023-08-29T20:04:11Z | 2022-04-23T00:40:51Z | null | ['CVE-2012-20001'] | PrestaShop XSS Vulnerability | PrestaShop before 1.5.2.0 allows XSS via the `<object data='data:text/html` substring in the message field. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-20001'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2012/Nov/1'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20140803034142/http://forge.prestashop.com/browse/PSCFV-5204'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/2016... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T20:04:11Z', 'nvd_published_at': '2021-12-21T16:15:00Z'} |
1.4.0 | GHSA-w24h-v9qh-8gxj | 2023-09-05T19:20:10Z | 2022-04-13T00:00:33Z | null | ['CVE-2022-28347'] | SQL Injection in Django | A SQL injection issue was discovered in `QuerySet.explain()` in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. This occurs by passing a crafted dictionary (with dictionary expansion) as the `**options` argument, and placing the injection payload in an option name. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ecosystem_specific': {'affected_functions': ['django.db.models.QuerySet.explain']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixed': '2.2.28'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ecosystem_specific': {'affected_fun... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28347'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/00b0fc50e1738c7174c495464a5ef069408a4402'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/29a6c98b4c13af82064f993f0acc6e8fafa4d3f5'}, {'type': 'WEB', 'url': ... | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:32:48Z', 'nvd_published_at': '2022-04-12T05:15:00Z'} |
1.4.0 | GHSA-w8xh-93qh-35vw | 2022-04-22T20:28:59Z | 2022-04-13T00:00:22Z | null | ['CVE-2022-27952'] | Unrestricted Upload of File with Dangerous Type in Payload | An arbitrary file upload vulnerability in the file upload module of PayloadCMS v0.15.0 allows attackers to execute arbitrary code via a crafted SVG file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'payload'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.15.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27952'}, {'type': 'PACKAGE', 'url': 'https://github.com/payloadcms/payload'}, {'type': 'WEB', 'url': 'https://www.youtube.com/watch?v=6CfhAxA3xdQ'}] | {'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:28:59Z', 'nvd_published_at': '2022-04-12T17:15:00Z'} |
1.4.0 | GHSA-j383-35pm-c5h4 | 2022-04-26T21:51:41Z | 2022-04-13T00:00:16Z | null | ['CVE-2022-0436'] | Path Traversal in Grunt | Grunt prior to version 1.5.2 is vulnerable to path traversal. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'grunt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0436'}, {'type': 'WEB', 'url': 'https://github.com/gruntjs/grunt/pull/1743'}, {'type': 'WEB', 'url': 'https://github.com/gruntjs/grunt/commit/aad3d4521c3098fb255fb2db8f2e1d691a033665'}, {'type': 'WEB', 'url': 'https://github.com/gruntjs/grunt/commi... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-26T21:51:41Z', 'nvd_published_at': '2022-04-12T21:15:00Z'} |
1.4.0 | GHSA-v98r-gjgc-m9pf | 2022-12-01T23:59:34Z | 2022-04-13T00:00:16Z | null | ['CVE-2022-29045'] | Stored Cross-site Scripting vulnerability in Jenkins Promoted Builds Plugin | Jenkins promoted builds Plugin 873.v6149db_d64130 and earlier, except 3.10.1, does not escape the name and description of Promoted Build parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Exploitation of the... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:promoted-builds'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.10.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:promoted-builds'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29045'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T21:07:38Z', 'nvd_published_at': '2022-04-12T20:15:00Z'} |
1.4.0 | GHSA-x446-3xhq-5xfp | 2022-04-26T13:03:51Z | 2022-04-15T00:00:40Z | null | ['CVE-2022-27814'] | Exposure of Resource to Wrong Sphere in Simple-Wayland-HotKey-Daemon | SWHKD 1.1.5 allows arbitrary file-existence tests via the -c option. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'Simple-Wayland-HotKey-Daemon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27814'}, {'type': 'PACKAGE', 'url': 'https://github.com/waycrate/swhkd'}, {'type': 'WEB', 'url': 'https://github.com/waycrate/swhkd/releases'}, {'type': 'WEB', 'url': 'https://github.com/waycrate/swhkd/releases/tag/1.2.0'}, {'type': 'WEB', 'url': '... | {'cwe_ids': ['CWE-668'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-04-26T13:03:51Z', 'nvd_published_at': '2022-04-14T17:15:00Z'} |
1.4.0 | GHSA-wcwp-r3fj-mm3p | 2023-09-18T22:27:55Z | 2022-04-30T18:12:54Z | null | ['CVE-2000-0062'] | Zope DTML implementation Improper Authentication | The DTML implementation in the Z Object Publishing Environment (Zope) allows remote attackers to conduct unauthorized activities. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'zope'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'last_affected': '2.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2000-0062'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20010218085743/http://www.securityfocus.com/bid/922'}] | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T22:27:55Z', 'nvd_published_at': '2000-01-04T05:00:00Z'} |
1.4.0 | GHSA-qffw-8wg7-h665 | 2022-04-29T17:22:43Z | 2022-04-23T00:03:01Z | null | ['CVE-2022-1440'] | Command injection in git-interface | A command injection vulnerability exists in git-interface in the GitHub repository yarkeev/git-interface prior to 2.1.2. If both the git remote and destination directory are provided by user input, then the use of an `--upload-pack` command-line argument feature of git is also supported for `git clone`, which would the... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'git-interface'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1440'}, {'type': 'WEB', 'url': 'https://github.com/yarkeev/git-interface/commit/f828aa790016fee3aa667f7b44cf94bf0aa8c60d'}, {'type': 'PACKAGE', 'url': 'https://github.com/yarkeev/git-interface'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c... | {'cwe_ids': ['CWE-78', 'CWE-88'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-26T13:06:52Z', 'nvd_published_at': '2022-04-22T18:15:00Z'} |
1.4.0 | GHSA-pv7p-c7cp-vrh3 | 2022-12-02T21:17:54Z | 2022-04-13T00:00:16Z | null | ['CVE-2022-29044'] | Stored Cross-site Scripting in Jenkins Node and Label parameter Plugin | Jenkins Node and Label parameter Plugin 1.10.3 and earlier does not escape the name and description of Node and Label parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Exploitation of this vulnerability req... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:nodelabelparameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29044'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/nodelabelparameter-plugin/commit/b8a95cbf678e18dd1f936fd38f23b8cb0695ded7'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/nodelabelparameter-plugin'}, {'type': 'WEB', 'url': ... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T21:17:54Z', 'nvd_published_at': '2022-04-12T20:15:00Z'} |
1.4.0 | GHSA-q6h7-4qgw-2j9p | 2022-12-27T00:58:20Z | 2022-04-20T00:00:33Z | null | ['CVE-2022-29153'] | Hashicorp Consul HTTP health check endpoints returning an HTTP redirect may be abused as SSRF vector | A vulnerability was identified in Consul and Consul Enterprise (“Consul”) such that HTTP health check endpoints returning an HTTP redirect may be abused as a vector for server-side request forgery (SSRF). This vulnerability, CVE-2022-29153, was fixed in Consul 1.9.17, 1.10.10, and 1.11.5. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.17'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed': '1.10... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29153'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2022-10-consul-s-http-health-check-may-allow-server-side-request-forgery/'}, {'type': 'WEB', 'url': 'https://discuss.has... | {'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T21:13:56Z', 'nvd_published_at': '2022-04-19T16:17:00Z'} |
1.4.0 | GHSA-6v6p-g8cg-2hgg | 2022-04-01T12:56:28Z | 2022-04-01T12:56:28Z | null | [] | Improper Certificate Validation in node-sass affects eZ Platform | Certificate validation in node-sass 2.0.0 to 4.14.1 is disabled when requesting binaries even if the user is not specifying an alternative download path. This affects eZ Platform v2.5 only. The maintainers resolved it by replacing node-sass 4.11 with sass 1.32.13. This issue also affects ezsystems/ezplatform and ezsyst... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezplatform-admin-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.27'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ezsystems/ezplatform-admin-ui/security/advisories/GHSA-6v6p-g8cg-2hgg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24025'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-002-vulnerability-in-node-sass'}, {'t... | {'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T12:56:28Z', 'nvd_published_at': None} |
1.4.0 | GHSA-m87f-39q9-6f55 | 2022-04-05T17:47:26Z | 2022-04-05T17:47:26Z | null | ['CVE-2022-24758'] | Sensitive Auth & Cookie data stored in Jupyter server logs | Anytime a 5xx error is triggered, the auth cookie and other header values are recorded in Jupyter server logs by default. Considering these logs do not require root access, an attacker can monitor these logs, steal sensitive auth/cookie information, and gain access to the Jupyter server.
Upgrade to notebook version 6.... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'notebook'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.10'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/jupyter/notebook/security/advisories/GHSA-m87f-39q9-6f55'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24758'}, {'type': 'PACKAGE', 'url': 'https://github.com/jupyter/notebook'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tre... | {'cwe_ids': ['CWE-532'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-05T17:47:26Z', 'nvd_published_at': '2022-03-31T23:15:00Z'} |
1.4.0 | GHSA-5x4f-7xgq-r42x | 2022-04-29T15:39:18Z | 2022-04-29T15:39:18Z | null | [] | Object state limitation has no effect | Object state limitation is a policy you can use in your roles to limit access to content based on specific object state values. Due to a flawed earlier update, these limitations were ineffective in releases made since February 16th 2022. They would grant access to the given content regardless of the object state. Depen... | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezpublish-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.5.0'}, {'fixed': '7.5.28'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ezsystems/ezpublish-kernel/security/advisories/GHSA-5x4f-7xgq-r42x'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-004-ineffective-object-state-limitation-and-unauthenticated-fastly-purge'}, {'type': 'PACKAGE', 'url': 'https://github.c... | {'cwe_ids': ['CWE-281'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-29T15:39:18Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4hj2-r2pm-3hc6 | 2022-04-28T18:10:23Z | 2022-04-22T20:42:46Z | null | ['CVE-2022-27652'] | Incorrect Default Permissions in CRI-O | ### Impact
A bug was found in CRI-O where containers were incorrectly started with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during `execve(2)`. Normally, when exe... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/cri-o/cri-o'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.24.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/cri-o/cri-o/security/advisories/GHSA-4hj2-r2pm-3hc6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27652'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2066839'}, {'type': 'PACKAGE', 'url': 'https://github.com/cri-o/cri-o'}] | {'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:42:46Z', 'nvd_published_at': '2022-04-18T17:15:00Z'} |
1.4.0 | GHSA-pxpf-v376-7xx5 | 2022-05-26T19:48:28Z | 2022-04-30T00:00:33Z | null | ['CVE-2022-25854'] | tagify can pass a malicious placeholder to initiate the cross-site scripting (XSS) payload | This affects the package @yaireo/tagify before 4.9.8. The package is used for rendering UI components inside the input or text fields, and an attacker can pass a malicious placeholder value to it to fire the cross-site scripting (XSS) payload. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': '@yaireo/tagify'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.9.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25854'}, {'type': 'WEB', 'url': 'https://github.com/yairEO/tagify/issues/988'}, {'type': 'WEB', 'url': 'https://github.com/yairEO/tagify/commit/198c0451fad188390390395ccfc84ab371def4c7'}, {'type': 'WEB', 'url': 'https://bsg.tech/blog/cve-2022-25854... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-03T04:55:32Z', 'nvd_published_at': '2022-04-29T20:15:00Z'} |
1.4.0 | GHSA-74w3-2r77-fw5h | 2022-04-18T22:21:17Z | 2022-04-03T00:00:58Z | null | ['CVE-2022-27177'] | Use of Externally-Controlled Format String in consoleme | A Python format string issue leading to information disclosure and potentially remote code execution in ConsoleMe for all versions prior to 1.2.2 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'consoleme'}, 'ecosystem_specific': {'affected_functions': ['consoleme.lib.defaults.SELF_SERVICE_IAM_DEFAULTS', 'consoleme.lib.generic.iterate_and_format_dict']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27177'}, {'type': 'WEB', 'url': 'https://github.com/Netflix/consoleme/commit/2a3c84eee524d77c427b3329a8419cbbce9e1d16'}, {'type': 'PACKAGE', 'url': 'https://github.com/Netflix/ConsoleMe'}, {'type': 'WEB', 'url': 'https://github.com/Netflix/security... | {'cwe_ids': ['CWE-134'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-05T17:54:33Z', 'nvd_published_at': '2022-04-01T23:15:00Z'} |
1.4.0 | GHSA-5pv7-hx9m-8jh3 | 2022-05-05T15:29:45Z | 2022-04-13T00:00:16Z | null | ['CVE-2022-29051'] | Missing permission checks in Jenkins Publish Over FTP Plugin | Missing permission checks in Jenkins Publish Over FTP Plugin prior to 1.17 allow attackers with Overall/Read permission to connect to an FTP server using attacker-specified credentials. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:publish-over-ftp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.17'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29051'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/publish-over-ftp-plugin/commit/b265201428557ab91304e06199ad38221efc23e7'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/publish-over-ftp-plugin'}, {'type': 'WEB', 'url': 'htt... | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-05T15:29:45Z', 'nvd_published_at': '2022-04-12T20:15:00Z'} |
1.4.0 | GHSA-p2vw-f87c-q597 | 2023-06-30T20:10:46Z | 2022-04-29T00:00:23Z | null | ['CVE-2022-1511'] | Improper Access Control in snipe/snipe-it | Snipe-IT prior to 5.4.4 is vulnerable to Missing Authorization. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.4.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1511'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/pull/10991'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/2e9cf8fa87a025c0eac9f79f4864b3fdd33a950c'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-... | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T21:13:53Z', 'nvd_published_at': '2022-04-28T15:15:00Z'} |
1.4.0 | GHSA-72cx-5ff9-4hhc | 2022-04-26T20:29:02Z | 2022-04-21T01:54:03Z | null | ['CVE-2009-3724'] | Cross-site scripting in markdown2 for python | python-markdown2 before 1.0.1.14 has multiple cross-site scripting (XSS) issues. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'markdown2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1.14'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.1.13'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-3724'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-72cx-5ff9-4hhc'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/markdown2/PYSEC-2020-235.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-26T20:29:02Z', 'nvd_published_at': '2020-01-15T21:15:00Z'} |
1.4.0 | GHSA-2q6v-32mr-8p8x | 2022-04-12T21:20:20Z | 2022-04-12T21:20:20Z | null | ['CVE-2017-1000052'] | Null Byte Injection in Plug.Static | Plug.Static is used for serving static assets, and is vulnerable to null
byte injection. If file upload functionality is provided, this can allow
users to bypass filetype restrictions.
We recommend all applications that provide file upload functionality and
serve those uploaded files locally with Plug.Static to... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Hex', 'name': 'plug'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'Hex', 'name': 'plug'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.7'}]}]}, {'package': {'ecosystem': 'Hex', 'nam... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000052'}, {'type': 'WEB', 'url': 'https://elixirforum.com/t/security-releases-for-plug/3913'}, {'type': 'PACKAGE', 'url': 'https://github.com/elixir-plug/plug'}] | {'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-12T21:20:20Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wh73-hpcg-v32j | 2023-08-31T15:47:48Z | 2022-04-14T00:00:14Z | null | ['CVE-2022-27479'] | SQL injection in apache-superset | Apache Superset before 1.4.2 is vulnerable to SQL injection in chart data requests. Users should update to 1.4.2 or higher which addresses this issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27479'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wh73-hpcg-v32j'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/superset'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/apache-su... | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T19:34:57Z', 'nvd_published_at': '2022-04-13T19:15:00Z'} |
1.4.0 | GHSA-7mfr-774f-w5r9 | 2022-04-12T00:07:34Z | 2022-04-12T00:07:34Z | null | ['CVE-2017-11770'] | Improper Certificate Validation | .NET Core 1.0, 1.1, and 2.0 allow an unauthenticated attacker to remotely cause a denial of service attack against a .NET Core web application by improperly parsing certificate data. A denial of service vulnerability exists when .NET Core improperly handles parsing certificate data, aka ".NET CORE Denial Of Service Vul... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'System.Security.Cryptography.X509Certificates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-11770'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3248'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11770'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bi... | {'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-12T00:07:34Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6gm7-j668-w6h9 | 2022-04-22T20:42:11Z | 2022-04-09T00:00:30Z | null | ['CVE-2022-1219'] | SQL Injection in Pimcore | Pimcore prior to version 10.3.5 is vulnerable SQL injection in RecyclebinController.php. This vulnerability affects data confidentiality. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.3.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1219'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/a697830359df06246acca502ee2455614de68017'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/f700bd18-1fd3... | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:42:11Z', 'nvd_published_at': '2022-04-08T09:15:00Z'} |
1.4.0 | GHSA-9cmq-pj6p-hgwf | 2023-09-18T22:28:17Z | 2022-04-30T18:14:11Z | null | ['CVE-2000-0725'] | Zope does not properly restrict access to the getRoles method | Zope before 2.2.1 does not properly restrict access to the getRoles method, which allows users who can edit DTML to add or modify roles by modifying the roles list that is included in a request. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'zope'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2000-0725'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20010219192346/http://archives.neohapsis.com/archives/bugtraq/2000-08/0198.html'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20010219192441/http://archives.neohapsis.com/archives... | {'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T22:28:17Z', 'nvd_published_at': '2000-10-20T04:00:00Z'} |
1.4.0 | GHSA-4822-jvwx-w47h | 2022-11-28T16:18:30Z | 2022-04-01T18:16:42Z | null | ['CVE-2022-41952'] | Uncontrolled Resource Consumption in Matrix Synapse | ### Impact
Synapse before 1.52.0 with URL preview functionality enabled will attempt to generate URL previews for media stream URLs without properly limiting connection time. Connections will only be terminated after `max_spider_size` (default: 10M) bytes have been downloaded, which can in some cases lead to long-live... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'matrix-synapse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.53.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/security/advisories/GHSA-4822-jvwx-w47h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41952'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/pull/11784'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/syna... | {'cwe_ids': ['CWE-400', 'CWE-772'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T18:16:42Z', 'nvd_published_at': '2022-11-22T16:15:00Z'} |
1.4.0 | GHSA-558x-2xjg-6232 | 2023-03-28T22:26:10Z | 2022-04-03T00:01:00Z | null | ['CVE-2022-22950'] | Allocation of Resources Without Limits or Throttling in Spring Framework | In Spring Framework versions 5.3.0 - 5.3.16, 5.2.0.RELEASE - 5.2.19.RELEASE, and older unsupported versions, it is possible for a user to provide a specially crafted SpEL expression that may cause a denial of service condition. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-expression'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.3.0'}, {'fixed': '5.3.17'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-expression'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduce... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22950'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-framework/issues/28145'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-framework/issues/28257'}, {'type': 'WEB', 'url': 'https://github.com/spring-proje... | {'cwe_ids': ['CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-05T18:46:34Z', 'nvd_published_at': '2022-04-01T23:15:00Z'} |
1.4.0 | GHSA-3qrq-r688-vvh4 | 2022-04-28T21:02:17Z | 2022-04-28T21:02:17Z | null | ['CVE-2022-24892'] | Multiple valid tokens for password reset in Shopware | ### Impact
Multiple tokens for password reset could be requested. All tokens could be used to change the password.
This makes it possible for an attacker to take over the victims account if s/he gains access to the victims email account and finds unused password reset token in the emails within the time frame of two ho... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'shopware/shopware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.4'}, {'fixed': '5.7.9'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/shopware/shopware/security/advisories/GHSA-3qrq-r688-vvh4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24892'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-04-2022'}, {'type': 'PACKAGE', 'url... | {'cwe_ids': ['CWE-640'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T21:02:17Z', 'nvd_published_at': '2022-04-28T15:15:00Z'} |
1.4.0 | GHSA-w8qp-hmh5-4v9v | 2022-04-29T16:22:58Z | 2022-04-29T16:22:58Z | null | [] | Object state limitation has no effect | Object state limitation is a policy you can use in your roles to limit access to content based on specific object state values. Due to a flawed earlier update, these limitations were ineffective in releases made since February 16th 2022. They would grant access to the given content regardless of the object state. Depen... | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezplatform-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.17'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ezsystems/ezplatform-kernel/security/advisories/GHSA-w8qp-hmh5-4v9v'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-004-ineffective-object-state-limitation-and-unauthenticated-fastly-purge'}, {'type': 'PACKAGE', 'url': 'https://github.... | {'cwe_ids': ['CWE-281'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-29T16:22:58Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vmp5-c5hp-6c65 | 2022-05-26T19:48:38Z | 2022-04-30T00:00:33Z | null | ['CVE-2022-29947'] | Woodpecker allows cross-site scripting (XSS) via build logs | Woodpecker before 0.15.1 allows XSS via build logs because web/src/components/repo/build/BuildLog.vue lacks escaping. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/woodpecker-ci/woodpecker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29947'}, {'type': 'WEB', 'url': 'https://github.com/woodpecker-ci/woodpecker/pull/879'}, {'type': 'PACKAGE', 'url': 'https://github.com/woodpecker-ci/woodpecker/'}, {'type': 'WEB', 'url': 'https://github.com/woodpecker-ci/woodpecker/releases/tag/v0... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-03T20:18:08Z', 'nvd_published_at': '2022-04-29T21:15:00Z'} |
1.4.0 | GHSA-3pqg-4rqg-pg9g | 2022-05-04T04:00:41Z | 2022-04-23T00:03:04Z | null | ['CVE-2022-28367'] | Cross-site Scripting in OWASP AntiSamy | OWASP AntiSamy is a library for performing fast, configurable cleansing of HTML coming from untrusted sources. AntiSamy before 1.6.6 allows XSS via HTML tag smuggling on STYLE content with crafted input. The output serializer does not properly encode the supposed Cascading Style Sheets (CSS) content. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.owasp.antisamy:antisamy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28367'}, {'type': 'WEB', 'url': 'https://github.com/nahsra/antisamy/commit/0199e7e194dba5e7d7197703f43ebe22401e61ae'}, {'type': 'PACKAGE', 'url': 'https://github.com/nahsra/antisamy'}, {'type': 'WEB', 'url': 'https://github.com/nahsra/antisamy/rele... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-26T19:45:44Z', 'nvd_published_at': '2022-04-21T23:15:00Z'} |
1.4.0 | GHSA-3r7g-wrpr-j5g4 | 2022-05-26T20:18:03Z | 2022-04-22T20:48:28Z | null | ['CVE-2022-24857'] | Improper Authentication in django-mfa3 | ### Impact
django-mfa3 is a library that implements multi factor authentication for the django web framework. It achieves this by modifying the regular login view. Django however has a second login view for its admin area. This second login view was not modified, so the multi factor authentication can be bypassed.
Yo... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django-mfa3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/xi/django-mfa3/security/advisories/GHSA-3r7g-wrpr-j5g4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24857'}, {'type': 'WEB', 'url': 'https://github.com/xi/django-mfa3/commit/32f656e22df120b84bdf010e014bb19bd97971de'}, {'type': 'WEB', 'url': 'https... | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:48:28Z', 'nvd_published_at': '2022-04-15T19:15:00Z'} |
1.4.0 | GHSA-7vrm-3jc8-5wwm | 2022-04-06T17:39:02Z | 2022-04-04T21:40:45Z | null | [] | Incorrect Comparison in Vyper | ### Impact
bytestrings can have dirty bytes in them, resulting in the word-for-word comparison to give incorrect results, e.g.
```vyper
b1: Bytes[32] = b"abcdef"
b1 = slice(b1, 0, 1)
b2: Bytes[32] = b"abcdef"
t: bool = b1 == b2 # incorrectly evaluates to True
```
even without dirty nonzero bytes, because there is no c... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'vyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/security/advisories/GHSA-7vrm-3jc8-5wwm'}, {'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/commit/2c73f8352635c0a433423a5b94740de1a118e508'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/vyper/PYSEC-2022-196.yaml... | {'cwe_ids': ['CWE-697'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-04T21:40:45Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gvj8-4cj4-h776 | 2022-04-29T15:40:48Z | 2022-04-29T15:40:48Z | null | [] | Object state limitation has no effect | Object state limitation is a policy you can use in your roles to limit access to content based on specific object state values. Due to a flawed earlier update, these limitations were ineffective in releases made since February 16th 2022. They would grant access to the given content regardless of the object state. Depen... | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'ibexa/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'ibexa/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ibexa/core/security/advisories/GHSA-gvj8-4cj4-h776'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-004-ineffective-object-state-limitation-and-unauthenticated-fastly-purge'}, {'type': 'PACKAGE', 'url': 'https://github.com/ibexa/core'}] | {'cwe_ids': ['CWE-281'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-29T15:40:48Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7r87-cj48-wj45 | 2022-04-26T21:19:52Z | 2022-04-26T21:19:52Z | null | ['CVE-2022-24880'] | Potential Captcha Validate Bypass in flask-session-captcha | ### Impact
flask-session-captcha is a package which allows users to extend Flask by adding an image based captcha stored in a server side session.
The `captcha.validate()` function would return `None` if passed no value (e.g. by submitting a request with an empty form).
If implementing users were checking the return ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'flask-session-captcha'}, 'ecosystem_specific': {'affected_functions': ['flask_session_captcha.FlaskSessionCaptcha.validate']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Tethik/flask-session-captcha/security/advisories/GHSA-7r87-cj48-wj45'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24880'}, {'type': 'WEB', 'url': 'https://github.com/Tethik/flask-session-captcha/pull/27'}, {'type': 'WEB', 'url': 'https://github.co... | {'cwe_ids': ['CWE-253', 'CWE-394', 'CWE-754'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-26T21:19:52Z', 'nvd_published_at': '2022-04-25T22:15:00Z'} |
1.4.0 | GHSA-97jg-43c9-q6pf | 2022-04-19T15:25:47Z | 2022-04-08T21:53:38Z | null | ['CVE-2022-24819'] | Unauthenticated user can retrieve the list of users through uorgsuggest.vm | A guest user without the right to view pages of the wiki can still list documents related to users of the wiki. The problem has been patched in XWiki versions 12.10.11, 13.4.4, and 13.9-rc-1. There is no known workaround for this problem. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web-templates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.10.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web-templates'}, 'ranges': [{'type': 'ECOSYSTEM', 'eve... | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-97jg-43c9-q6pf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24819'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-1... | {'cwe_ids': ['CWE-359'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-08T21:53:38Z', 'nvd_published_at': '2022-04-08T20:15:00Z'} |
1.4.0 | GHSA-crjr-9rc5-ghw8 | 2023-07-06T16:02:37Z | 2022-04-11T21:18:06Z | null | ['CVE-2022-24836'] | Nokogiri Inefficient Regular Expression Complexity | ## Summary
Nokogiri `< v1.13.4` contains an inefficient regular expression that is susceptible to excessive backtracking when attempting to detect encoding in HTML documents.
## Mitigation
Upgrade to Nokogiri `>= 1.13.4`.
## Severity
The Nokogiri maintainers have evaluated this as [**High Severity** 7.5 (CVSS3.1)... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-crjr-9rc5-ghw8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24836'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/commit/e444525ef1634b675cd1cf52d39f4320ef0aecfd'}, {'type': 'WEB... | {'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-11T21:18:06Z', 'nvd_published_at': '2022-04-11T22:15:00Z'} |
1.4.0 | GHSA-6xwr-q98w-rvg7 | 2022-04-22T20:32:05Z | 2022-04-13T00:00:30Z | null | ['CVE-2022-21803'] | Prototype Pollution in nconf | nconf before 0.11.4. When using the memory engine, it is possible to store a nested JSON representation of the configuration. The .set() function, that is responsible for setting the configuration properties, is vulnerable to Prototype Pollution. By providing a crafted property, it is possible to modify the properties ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'nconf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21803'}, {'type': 'WEB', 'url': 'https://github.com/indexzero/nconf/pull/397'}, {'type': 'PACKAGE', 'url': 'https://github.com/indexzero/nconf'}, {'type': 'WEB', 'url': 'https://github.com/indexzero/nconf/releases/tag/v0.11.4'}, {'type': 'WEB', 'ur... | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:31:22Z', 'nvd_published_at': '2022-04-12T16:15:00Z'} |
1.4.0 | GHSA-34hv-f45p-4qfq | 2022-04-19T14:13:44Z | 2022-04-06T00:01:29Z | null | ['CVE-2022-27463'] | Open redirect in wwbn/avideo | Open redirect vulnerability in objects/login.json.php in WWBN AVideo through 11.6, allows attackers to arbitrarily redirect users from a crafted url to the login page. A patch is available on the `master` branch of the repository. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'wwbn/avideo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '11.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27463'}, {'type': 'WEB', 'url': 'https://github.com/WWBN/AVideo/commit/77e9aa6411ff4b97571eb82e587139ec05ff894c'}, {'type': 'WEB', 'url': 'https://avideo.tube/'}, {'type': 'PACKAGE', 'url': 'https://github.com/WWBN/AVideo'}] | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T22:15:39Z', 'nvd_published_at': '2022-04-05T16:15:00Z'} |
1.4.0 | GHSA-6xvq-2gj8-4276 | 2022-04-15T03:05:55Z | 2022-04-06T00:01:29Z | null | ['CVE-2020-28847'] | Cross site scripting in valine | valine is a fast, simple & powerful comment system. Cross Site Scripting (XSS) vulnerability in xCss Valine v1.4.14 via the nick parameter to /classes/Comment. A fix was released in version 1.4.15. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'valine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.15'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28847'}, {'type': 'WEB', 'url': 'https://github.com/xCss/Valine/issues/348'}, {'type': 'PACKAGE', 'url': 'https://github.com/xCss/Valine'}, {'type': 'WEB', 'url': 'https://github.com/xCss/Valine/releases/tag/v1.4.15'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T18:16:52Z', 'nvd_published_at': '2022-04-05T16:15:00Z'} |
1.4.0 | GHSA-9wrv-g75h-8ccc | 2022-05-04T03:52:17Z | 2022-04-22T21:04:27Z | null | ['CVE-2022-24872'] | Improper Access Control in Shopware | Shopware 6 is an open commerce platform based on Symfony Framework and Vue and supported by a worldwide community and more than 1.500 community extensions. Permissions set to sales channel context by admin-api are still useable within normal user session. We recommend updating to the current version 6.4.10.1. You can g... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.10.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.4.0'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type':... | [{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-9wrv-g75h-8ccc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24872'}, {'type': 'WEB', 'url': 'https://github.com/shopware/platform/commit/083765e2d64a00315050c4891800c9e98ba0c77c'}, {'type': 'WEB', 'url': ... | {'cwe_ids': ['CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T21:04:27Z', 'nvd_published_at': '2022-04-20T20:15:00Z'} |
1.4.0 | GHSA-5653-437f-5hmc | 2022-04-12T21:29:30Z | 2022-04-12T21:29:30Z | null | ['CVE-2019-16764'] | Denial of service | The use of `String.to_atom/1` in PowAssent is susceptible to denial of service attacks. In `PowAssent.Phoenix.AuthorizationController` a value is fetched from the user provided params, and `String.to_atom/1` is used to convert the binary value to an atom so it can be used to fetch the provider configuration value. This... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Hex', 'name': 'pow_assent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/pow-auth/pow_assent/security/advisories/GHSA-368c-xvrv-x986'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16764'}, {'type': 'WEB', 'url': 'https://github.com/pow-auth/pow_assent/commit/026105eeecc0e3c2f807e7109e745ea93c0fd9cf'}, {'type': 'PACKAGE',... | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-12T21:29:30Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mm33-5vfq-3mm3 | 2022-06-08T18:05:30Z | 2022-04-27T22:28:59Z | null | ['CVE-2022-22577'] | Cross-site Scripting Vulnerability in Action Pack | There is a possible XSS vulnerability in Rails / Action Pack. This vulnerability has been
assigned the CVE identifier CVE-2022-22577.
Versions Affected: >= 5.2.0
Not affected: < 5.2.0
Fixed Versions: 7.0.2.4, 6.1.5.1, 6.0.4.8, 5.2.7.1
## Impact
CSP headers were only sent along with responses that Rails co... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.0'}, {'fixed': '5.2.7.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.7.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYST... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22577'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/pull/44635'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/2b820a2a69fa50cffa74b4aedc57bf92ed6910ec'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/52... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-27T22:28:59Z', 'nvd_published_at': '2022-05-26T17:15:00Z'} |
1.4.0 | GHSA-cf4q-4cqr-7g7w | 2022-04-22T20:25:53Z | 2022-04-22T20:25:53Z | null | [] | SVG with embedded scripts can lead to cross-site scripting attacks in xml2rfc | xml2rfc allows `script` elements in SVG sources.
In HTML output having these script elements can lead to XSS attacks.
Sample XML snippet:
```
<artwork type="svg" src="data:image/svg+xml,%3Csvg viewBox='0 0 10 10' xmlns='http://www.w3.org/2000/svg'%3E%3Cscript%3E window.alert('Test Alert'); %3C/script%3E%3C/svg%3E">
</... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'xml2rfc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.12.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ietf-tools/xml2rfc/security/advisories/GHSA-cf4q-4cqr-7g7w'}, {'type': 'PACKAGE', 'url': 'https://github.com/ietf-tools/xml2rfc'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:25:53Z', 'nvd_published_at': None} |
1.4.0 | GHSA-v2wf-c3j6-wpvw | 2022-04-12T21:27:49Z | 2022-04-12T21:27:49Z | null | ['CVE-2020-5205'] | Session fixation | ### Impact
The use of `Plug.Session` in `Pow.Plug.Session` is susceptible to session fixation attacks if a persistent session store is used for `Plug.Session`, such as Redis or a database. Cookie store, which is used in most Phoenix apps, doesn't have this vulnerability.
### Workarounds
Call `Plug.Conn.configure_ses... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Hex', 'name': 'pow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.16'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/danschultzer/pow/security/advisories/GHSA-v2wf-c3j6-wpvw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5205'}, {'type': 'WEB', 'url': 'https://github.com/danschultzer/pow/commit/578ffd3d8bb8e8a26077b644222186b108da474f'}, {'type': 'PACKAGE', 'url':... | {'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-12T21:27:49Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6635-c626-vj4r | 2022-04-18T21:47:33Z | 2022-04-01T14:05:33Z | null | ['CVE-2022-21235'] | Command Injection Vulnerability with Mercurial in VCS | URLs and local file paths passed to the Mercurial (hg) APIs that are specially crafted can contain commands which are executed by Mercurial if it is installed on the host operating system. The `vcs` package uses the underly version control system, in this case `hg`, to implement the needed functionality. When `hg` is e... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/Masterminds/vcs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Masterminds/vcs/security/advisories/GHSA-6635-c626-vj4r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21235'}, {'type': 'WEB', 'url': 'https://github.com/Masterminds/vcs/pull/105'}, {'type': 'WEB', 'url': 'https://github.com/Masterminds/vcs/commit/... | {'cwe_ids': ['CWE-77', 'CWE-88'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T14:05:33Z', 'nvd_published_at': '2022-04-01T16:15:00Z'} |
1.4.0 | GHSA-9qgm-w87q-hx89 | 2022-04-22T21:03:44Z | 2022-04-13T00:00:25Z | null | ['CVE-2022-27263'] | Unrestricted Upload of File with Dangerous Type in Strapi | An arbitrary file upload vulnerability in the file upload module of Strapi v4.1.5 allows attackers to execute arbitrary code via a crafted file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'strapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.1.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27263'}, {'type': 'PACKAGE', 'url': 'https://github.com/strapi/strapi'}, {'type': 'WEB', 'url': 'https://www.youtube.com/watch?v=LEeabouqRrg'}] | {'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T21:03:44Z', 'nvd_published_at': '2022-04-12T17:15:00Z'} |
1.4.0 | GHSA-vpgw-ffh3-648h | 2022-04-22T20:20:55Z | 2022-04-12T00:00:38Z | null | ['CVE-2022-1295'] | Prototype Pollution in fullpage.js | fullPage utils are available to developers using window.fp_utils. They can use these utils for their own use-case (other than fullPage) as well. However, one of the utils deepExtend is vulnerable to Prototype Pollution vulnerability.
Javascript is "prototype" language which means when a new "object" is created, it car... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'fullpage.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1295'}, {'type': 'WEB', 'url': 'https://github.com/alvarotrigo/fullpage.js/commit/bf62492a22e5d296e63c3ed918a42fc5645a0d48'}, {'type': 'PACKAGE', 'url': 'https://github.com/alvarotrigo/fullpage.js'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounti... | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:20:05Z', 'nvd_published_at': '2022-04-11T12:15:00Z'} |
1.4.0 | GHSA-5jfw-35xp-5m42 | 2022-04-05T17:53:22Z | 2022-04-05T17:53:22Z | null | [] | Buffer length underflow in LoginPacket causing unchecked exceptions to be thrown | ### Impact
`LoginPacket` uses `BinaryStream->getLInt()` to read the lengths of JSON payloads it wants to decode. Unfortunately, `BinaryStream->getLInt()` returns a signed integer, meaning that a malicious client can craft a packet with a large uint32 value for payload buffer size (which would be interpreted as a negati... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pocketmine/bedrock-protocol'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.0.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/pmmp/BedrockProtocol/security/advisories/GHSA-5jfw-35xp-5m42'}, {'type': 'WEB', 'url': 'https://github.com/pmmp/BedrockProtocol/commit/e3fce7632b94e83fd6a518a87dcaf6a11681c4ac'}, {'type': 'PACKAGE', 'url': 'https://github.com/pmmp/BedrockProtocol'}] | {'cwe_ids': ['CWE-124'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-05T17:53:22Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gx7g-wjxg-jwwj | 2022-04-18T22:17:42Z | 2022-04-04T00:00:55Z | null | ['CVE-2022-0088'] | Cross-Site Request Forgery in YOURLS | YOURLS versions 1.8.2 and prior are vulnerable to Cross-Site Request Forgery. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'yourls/yourls'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.8.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0088'}, {'type': 'WEB', 'url': 'https://github.com/YOURLS/YOURLS/issues/3170'}, {'type': 'WEB', 'url': 'https://github.com/YOURLS/YOURLS/pull/3264'}, {'type': 'WEB', 'url': 'https://github.com/yourls/yourls/commit/1de256d8694b0ec7d4df2ac1d5976d4055... | {'cwe_ids': ['CWE-352'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-04-05T18:02:00Z', 'nvd_published_at': '2022-04-03T09:15:00Z'} |
1.4.0 | GHSA-6rw3-3whw-jvjj | 2022-04-22T20:13:21Z | 2022-04-22T20:13:21Z | null | ['CVE-2022-24826'] | Git LFS can execute a binary from the current directory on Windows | ### Impact
On Windows, if Git LFS operates on a malicious repository with a `..exe` file as well as a file named `git.exe`, and `git.exe` is not found in `PATH`, the `..exe` program will be executed, permitting the attacker to execute arbitrary code. This does not affect Unix systems.
Similarly, if the malicious repo... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/git-lfs/git-lfs/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/git-lfs/git-lfs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.12.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/git-lfs/git-lfs/security/advisories/GHSA-6rw3-3whw-jvjj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24826'}, {'type': 'PACKAGE', 'url': 'https://github.com/git-lfs/git-lfs'}] | {'cwe_ids': ['CWE-426'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:13:21Z', 'nvd_published_at': '2022-04-20T00:16:00Z'} |
1.4.0 | GHSA-f3jq-9c79-j65m | 2022-12-02T21:23:16Z | 2022-04-13T00:00:17Z | null | ['CVE-2022-29042'] | Stored Cross-site Scripting vulnerability in Jenkins Job Generator Plugin | Jenkins Job Generator Plugin 1.22 and earlier does not escape the name and description of Generator Parameter and Generator Choice parameters on Job Generator jobs' Build With Parameters views, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Explo... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:jobgenerator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.22'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29042'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jobgenerator-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T21:23:16Z', 'nvd_published_at': '2022-04-12T20:15:00Z'} |
1.4.0 | GHSA-cjw5-f2x5-r4q5 | 2022-04-19T14:12:53Z | 2022-04-06T00:01:29Z | null | ['CVE-2022-0602'] | Cross-site Scripting in TastyIgniter | TastyIgniter prior to version 3.3.0 is vulnerable to Document Object Model (DOM) based Cross-site Scripting (XSS). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'tastyigniter/tastyigniter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0602'}, {'type': 'WEB', 'url': 'https://github.com/tastyigniter/tastyigniter/commit/992d4ce6444805c3132e3635a01b6fd222063554'}, {'type': 'PACKAGE', 'url': 'https://github.com/tastyigniter/TastyIgniter'}, {'type': 'WEB', 'url': 'https://huntr.dev/bo... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T15:51:17Z', 'nvd_published_at': '2022-04-05T16:15:00Z'} |
1.4.0 | GHSA-q77q-vx4q-xx6q | 2022-05-10T15:44:45Z | 2022-04-27T21:09:46Z | null | ['CVE-2022-24891'] | Cross-site Scripting in org.owasp.esapi:esapi | ### Impact
There is a potential for an XSS vulnerability in ESAPI caused by a incorrect regular expression for "onsiteURL" in the **antisamy-esapi.xml** configuration file that can cause URLs with the "javascript:" scheme to NOT be sanitized. See the reference below for full details.
### Patches
Patched in ESAPI 2.3.0... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.owasp.esapi:esapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.3.1'}}] | [{'type': 'WEB', 'url': 'https://github.com/ESAPI/esapi-java-legacy/security/advisories/GHSA-q77q-vx4q-xx6q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24891'}, {'type': 'PACKAGE', 'url': 'https://github.com/ESAPI/esapi-java-legacy'}, {'type': 'WEB', 'url': 'https://github.com/ESAPI/esapi-... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-27T21:09:46Z', 'nvd_published_at': '2022-04-27T21:15:00Z'} |
1.4.0 | GHSA-455j-8hg5-8576 | 2022-12-02T21:28:46Z | 2022-04-13T00:00:19Z | null | ['CVE-2022-29039'] | Stored Cross-site Scripting vulnerability in Jenkins Gerrit Trigger Plugin | Jenkins Gerrit Trigger Plugin 2.35.2 and earlier does not escape the name and description of parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Exploitation of these vulnerabilities requires that parameters ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.sonyericsson.hudson.plugins.gerrit:gerrit-trigger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.35.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29039'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/gerrit-trigger-plugin/commit/8b1d59645725e6f01057c1cf87170e321f99f6be'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/gerrit-trigger-plugin'}, {'type': 'WEB', 'url': 'https:/... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T21:28:46Z', 'nvd_published_at': '2022-04-12T20:15:00Z'} |
1.4.0 | GHSA-vhxq-9mpv-gj87 | 2022-12-01T23:42:49Z | 2022-04-13T00:00:15Z | null | ['CVE-2022-29052'] | Private key stored in plain text by Jenkins Google Compute Engine Plugin | Jenkins Google Compute Engine Plugin 4.3.8 and earlier stores private keys unencrypted in cloud agent `config.xml` files on the Jenkins controller where they can be viewed by users with Agent/Extended Read permission, or access to the Jenkins controller file system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:google-compute-engine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29052'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/google-compute-engine-plugin/commit/16d2ae71a1b34c81db1d74f83c41577536e5256f'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2045'}] | {'cwe_ids': ['CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-01T23:42:49Z', 'nvd_published_at': '2022-04-12T20:15:00Z'} |
1.4.0 | GHSA-3hjg-vc7r-rcrw | 2022-04-07T15:20:23Z | 2022-04-07T15:20:23Z | null | ['CVE-2022-24822'] | Denial of Service vulnerability in @podium/layout and @podium/proxy | ### Impact
An attacker using the `Trailer` header as part of the request against proxy endpoints has the ability to take down the server.
All Podium layouts that include podlets with proxy endpoints are affected.
### Patches
`@podium/layout` which is the main way developers/users are vulnerable to this exploit, has be... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': '@podium/layout'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.110'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@podium/proxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.74'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/podium-lib/proxy/security/advisories/GHSA-3hjg-vc7r-rcrw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24822'}, {'type': 'WEB', 'url': 'https://github.com/podium-lib/layout/commit/fe43e655432b0a5f07b6475f67babcc2588fb039'}, {'type': 'WEB', 'url': '... | {'cwe_ids': ['CWE-248'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T15:20:23Z', 'nvd_published_at': '2022-04-06T18:15:00Z'} |
1.4.0 | GHSA-82rm-28q9-435p | 2023-09-18T22:38:47Z | 2022-04-29T01:25:43Z | null | ['CVE-2003-0038'] | Mailman Cross-site scripting (XSS) vulnerability | Cross-site scripting (XSS) vulnerability in options.py for Mailman 2.1 allows remote attackers to inject script or HTML into web pages via the (1) email or (2) language parameters. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'mailman'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2003-0038'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/11152'}, {'type': 'WEB', 'url': 'http://marc.info/?l=bugtraq&m=104342745916111'}, {'type': 'WEB', 'url': 'http://telia.dl.sourceforge.net/sourceforge/mailman/xss-2... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T22:38:47Z', 'nvd_published_at': '2003-02-07T05:00:00Z'} |
1.4.0 | GHSA-x445-mmpw-7r4f | 2023-09-18T22:36:52Z | 2022-04-30T18:16:22Z | null | ['CVE-2001-0590'] | Apache Tomcat Allows Source Disclosure | Apache Software Foundation Tomcat Servlet prior to 3.2.2 allows a remote attacker to read the source code to arbitrary 'jsp' files via a malformed URL request which does not end with an HTTP protocol specification (i.e. HTTP/1.0). | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat-servlet-api'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2001-0590'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/6971'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20020711002734/http://archives.neohapsis.com/archives/bugtraq/2001-04/0031.html'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T22:36:52Z', 'nvd_published_at': '2001-08-02T04:00:00Z'} |
1.4.0 | GHSA-rvjg-gxwx-j5gf | 2022-04-28T17:13:58Z | 2022-04-28T17:13:58Z | null | ['CVE-2020-10734'] | OIDC Logout redirect in keycloak | A flaw was found in keycloak. The OIDC logout endpoint does not have CSRF protection. The highest threat from this vulnerability is to system availability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-oidc-client-adapter-pom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '18.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/security/advisories/GHSA-rvjg-gxwx-j5gf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10734'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1831662'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/... | {'cwe_ids': ['CWE-601'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T17:13:58Z', 'nvd_published_at': '2021-02-11T18:15:00Z'} |
1.4.0 | GHSA-4mrx-6fxm-8jpg | 2022-04-20T20:31:44Z | 2022-04-20T20:31:44Z | null | ['CVE-2022-24788'] | Buffer Overflow in vyper | ### Impact
Importing a function from a JSON interface which returns `bytes` generates bytecode which does not clamp bytes length, potentially resulting in a buffer overrun.
### Patches
0.3.2 (as of https://github.com/vyperlang/vyper/commit/049dbdc647b2ce838fae7c188e6bb09cf16e470b)
### Workarounds
Use .vy interfaces. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'vyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/security/advisories/GHSA-4mrx-6fxm-8jpg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24788'}, {'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/commit/049dbdc647b2ce838fae7c188e6bb09cf16e470b'}, {'type': 'WEB', 'url': 'htt... | {'cwe_ids': ['CWE-119', 'CWE-120'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-20T20:31:44Z', 'nvd_published_at': '2022-04-13T19:15:00Z'} |
1.4.0 | GHSA-4qqf-hmv6-r6wh | 2022-07-13T17:29:15Z | 2022-04-22T00:24:28Z | null | ['CVE-2011-2487'] | Use of a Broken or Risky Cryptographic Algorithm in Apache WSS4J | The implementations of PKCS#1 v1.5 key transport mechanism for XMLEncryption in JBossWS and Apache WSS4J before 1.6.5 is susceptible to a Bleichenbacher attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ws.security:wss4j'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-2487'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0191'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0192'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0193'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-327'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T17:29:15Z', 'nvd_published_at': '2020-03-11T16:15:00Z'} |
1.4.0 | GHSA-92j7-34x9-f3jw | 2023-09-18T23:29:49Z | 2022-04-29T03:01:51Z | null | ['CVE-2004-2650'] | Apache James Denial of Service | Spooler in Apache Foundation James before 2.2.0 allows local users to cause a denial of service (memory consumption) by triggering various error conditions in the retrieve function, which prevents a lock from being released and causes a memory leak. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.james:james-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2004-2650'}, {'type': 'WEB', 'url': 'http://issues.apache.org/jira/browse/JAMES-268'}, {'type': 'WEB', 'url': 'http://james.apache.org/changelog.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/15765'}] | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T23:29:49Z', 'nvd_published_at': '2004-12-31T05:00:00Z'} |
1.4.0 | GHSA-fwr7-v2mv-hh25 | 2023-01-23T18:54:18Z | 2022-04-07T00:00:17Z | null | ['CVE-2021-43138'] | Prototype Pollution in async | A vulnerability exists in Async through 3.2.1 for 3.x and through 2.6.3 for 2.x (fixed in 3.2.2 and 2.6.4), which could let a malicious user obtain privileges via the `mapValues()` method. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'async'}, 'ecosystem_specific': {'affected_functions': ['async.mapValues']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'async'}, 'ecosystem_specific': {'affected_functions': ['async.mapV... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43138'}, {'type': 'WEB', 'url': 'https://github.com/caolan/async/pull/1828'}, {'type': 'WEB', 'url': 'https://github.com/caolan/async/commit/8f7f90342a6571ba1c197d747ebed30c368096d2'}, {'type': 'WEB', 'url': 'https://github.com/caolan/async/commit/... | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T22:13:35Z', 'nvd_published_at': '2022-04-06T17:15:00Z'} |
1.4.0 | GHSA-hj4h-vqpq-95wg | 2023-09-18T22:51:49Z | 2022-04-29T02:57:41Z | null | ['CVE-2004-0412'] | Mailman Sensitive Information Disclosure | Mailman before 2.1.5 allows remote attackers to obtain user passwords via a crafted email request to the Mailman server. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'mailman'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2004-0412'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=123559'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/16256'}, {'type': 'PACKAGE', 'url': 'https://gitlab.com/mailman/'}, {'type':... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T22:51:49Z', 'nvd_published_at': '2004-08-18T04:00:00Z'} |
1.4.0 | GHSA-qjmq-8hjr-qcv6 | 2022-04-18T22:20:12Z | 2022-04-07T15:18:05Z | null | ['CVE-2022-24815'] | SQL Injection when creating an application with Reactive SQL backend | ### Impact
SQL Injection vulnerability in entities for applications generated with the option "reactive with Spring WebFlux" enabled and an SQL database using r2dbc. Applications created without "reactive with Spring WebFlux" and applications with NoSQL databases are not affected.
If you have generated a microservice... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'generator-jhipster'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.8.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/jhipster/generator-jhipster/security/advisories/GHSA-qjmq-8hjr-qcv6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24815'}, {'type': 'WEB', 'url': 'https://github.com/jhipster/generator-jhipster/issues/18269'}, {'type': 'WEB', 'url': 'https://github... | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T15:18:05Z', 'nvd_published_at': '2022-04-11T20:15:00Z'} |
1.4.0 | GHSA-6wj9-77wq-jq7p | 2023-03-06T23:31:46Z | 2022-04-23T00:40:45Z | null | ['CVE-2012-6685'] | Nokogiri is vulnerable to XML External Entity (XXE) attack | Nokogiri before 1.5.4 is vulnerable to XXE attacks. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-6685'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/issues/693'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1178970'}, {'type': 'PACKAGE', 'url': 'https://github.com/sparklemotion/nokogiri'}, {'type':... | {'cwe_ids': ['CWE-776'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-12T16:55:39Z', 'nvd_published_at': '2020-02-19T15:15:00Z'} |
1.4.0 | GHSA-6xj3-fhrf-rjgc | 2022-04-28T21:11:45Z | 2022-04-28T00:00:34Z | null | ['CVE-2022-1504'] | Cross-site Scripting in microweber | XSS in /demo/module/?module=HERE in GitHub repository microweber/microweber prior to 1.2.15. Typical impact of XSS attacks. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.15'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1504'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/1f6a4de416a85e626dc643bb5ceb916e4802223e'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T21:11:45Z', 'nvd_published_at': '2022-04-27T11:15:00Z'} |
1.4.0 | GHSA-358r-g2xw-7c83 | 2023-08-29T19:58:59Z | 2022-04-23T00:40:10Z | null | ['CVE-2012-1156'] | Moodle backs up private files | Moodle before 2.2.2, 2.1.5, and 2.0.8 had users' private files included in course backups unnecessarily. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixed': '2.2.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.1'}}, {'package': {'ecosystem': 'Packagist', ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-1156'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/37b6e7a03c77ea99fbe5224a15419e318019c570'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/ac6dc09c261219afa0191e9f2daf030bd071d272'}, {'type': 'WEB', 'url': '... | {'cwe_ids': ['CWE-532'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T19:58:59Z', 'nvd_published_at': '2019-11-14T16:15:00Z'} |
1.4.0 | GHSA-6v73-fgf6-w5j7 | 2022-08-11T21:35:54Z | 2022-04-03T00:00:59Z | null | ['CVE-2022-22963'] | Spring Cloud Function Code Injection with a specially crafted SpEL as a routing expression | In Spring Cloud Function versions 3.1.6, 3.2.2 and older unsupported versions, when using routing functionality it is possible for a user to provide a specially crafted SpEL as a routing-expression that may result in remote code execution and access to local resources. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.cloud:spring-cloud-function-context'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.cloud:spring-cloud-function-context'}, 'ranges': [{'type': ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22963'}, {'type': 'PACKAGE', 'url': 'https://github.com/spring-cloud/spring-cloud-function'}, {'type': 'WEB', 'url': 'https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0005'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2... | {'cwe_ids': ['CWE-917', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-05T18:48:10Z', 'nvd_published_at': '2022-04-01T23:15:00Z'} |
1.4.0 | GHSA-m7xq-8jp8-rj2c | 2022-07-18T21:00:59Z | 2022-04-13T00:00:33Z | null | ['CVE-2022-29080'] | Command injection in npm-dependency-versions | The npm-dependency-versions package through 0.3.0 for Node.js allows command injection if an attacker is able to call dependencyVersions with a JSON object in which pkgs is a key, and there are shell metacharacters in a value. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'npm-dependency-versions'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29080'}, {'type': 'WEB', 'url': 'https://github.com/barneycarroll/npm-dependency-versions/issues/6'}, {'type': 'PACKAGE', 'url': 'https://github.com/barneycarroll/npm-dependency-versions'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/npm-... | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-18T21:00:59Z', 'nvd_published_at': '2022-04-12T05:15:00Z'} |
1.4.0 | GHSA-gx2c-fvhc-ph4j | 2022-04-19T15:09:07Z | 2022-04-08T00:00:21Z | null | ['CVE-2022-26612'] | Path traversal in Hadoop | In Apache Hadoop, The unTar function uses unTarUsingJava function on Windows and the built-in tar utility on Unix and other OSes. As a result, a TAR entry may create a symlink under the expected extraction directory which points to an external directory. A subsequent TAR entry may extract an arbitrary file into the ext... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26612'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/hadoop'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/hslo7wzw2449gv1jyjk8g6ttd7935fyz'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220519-0004/'}] | {'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-08T22:06:47Z', 'nvd_published_at': '2022-04-07T19:15:00Z'} |
1.4.0 | GHSA-vx8v-g3p3-88vg | 2022-04-19T18:01:53Z | 2022-04-06T00:01:31Z | null | ['CVE-2022-1235'] | Weak password hash in LiveHelperChat | The secrethash, which the application relies for multiple security measures, can be brute-forced. The hash is quite small, with only 10 characters of only hexadecimal, making 16^10 possilibities ( 1.099.511.627.776 ). The SHA1 of the secret can be obtained via a captcha string and brute-forced offline with an GPU. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.96'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1235'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/6538d6df3d8a60fee254170b08dd76a161f7bfdc'}, {'type': 'PACKAGE', 'url': 'https://github.com/livehelperchat/livehelperchat'}, {'type': 'WEB', 'url': 'https://hunt... | {'cwe_ids': ['CWE-916'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T15:40:15Z', 'nvd_published_at': '2022-04-05T07:15:00Z'} |
1.4.0 | GHSA-qg4g-6jcq-rw93 | 2023-09-18T22:00:28Z | 2022-04-30T18:14:15Z | null | ['CVE-2000-0759'] | Jakarta Apache Tomcat Reveals Physical Paths | Jakarta Tomcat 3.1 under Apache reveals physical path information when a remote attacker requests a URL that does not exist, which generates an error message that includes the physical path. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2000-0759'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T22:00:28Z', 'nvd_published_at': '2000-10-20T04:00:00Z'} |
1.4.0 | GHSA-xhr8-mpwq-2rr2 | 2022-04-01T13:39:45Z | 2022-04-01T13:39:45Z | null | [] | Automatic named constructor discovery in Valinor | ## Design issue - automatic constructor discovery
The issue arises when upgrading from `cuyz/valinor:0.3.0` to a newer system on an existing application, which broke due to the wrong constructor being picked.
Still, a bigger security concern is problematic, and it is akin to https://github.com/rails/rails/issues/5228... | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'cuyz/valinor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.5.0'}, {'fixed': '0.7.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/CuyZ/Valinor/security/advisories/GHSA-xhr8-mpwq-2rr2'}, {'type': 'WEB', 'url': 'https://github.com/CuyZ/Valinor/commit/718d3c1bc2ea7d28b4b1f6c062addcd1dde8660b'}, {'type': 'PACKAGE', 'url': 'https://github.com/CuyZ/Valinor'}, {'type': 'WEB', 'url': 'https://github.com/CuyZ/Va... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T13:39:45Z', 'nvd_published_at': None} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.