schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
8
154
details
stringlengths
31
19.1k
severity
stringlengths
2
92
affected
stringlengths
75
28.5k
references
stringlengths
79
7.48k
database_specific
stringlengths
131
196
1.4.0
GHSA-wq8g-hm94-5rqq
2022-11-22T19:02:55Z
2022-04-23T00:40:48Z
null
['CVE-2012-1094']
JBoss AS may expose root content if excluded-contexts list is mismatched
JBoss AS 7 prior to 7.1.1 and mod_cluster do not handle default hostname in the same way, which can cause the excluded-contexts list to be mismatched and the root context to be exposed.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jboss.as:jboss-as-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0.Alpha1'}, {'fixed': '7.1.1.Final'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-1094'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/cve-2012-1094'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-1094'}]
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T19:02:55Z', 'nvd_published_at': '2020-03-10T17:15:00Z'}
1.4.0
GHSA-frxg-hf44-q765
2022-04-22T20:39:47Z
2022-04-22T20:39:47Z
null
['CVE-2022-24849']
Exposure of Sensitive Information to an Unauthorized Actor in DisCatSharp
### Impact Users of versions 9.8.5, 9.8.6, 9.9.0 and previously published prereleases of 10.0.0 who have used either one of the two `RequireDisCatSharpDeveloperAttribute`s or the `BaseDiscordClient.LibraryDeveloperTeam` have potentially had their bot token sent to a web server not affiliated with Discord. This server i...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'DisCatSharp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.8.5'}, {'fixed': '9.9.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Aiko-IT-Systems/DisCatSharp/security/advisories/GHSA-frxg-hf44-q765'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24849'}, {'type': 'PACKAGE', 'url': 'https://github.com/Aiko-IT-Systems/DisCatSharp'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:39:47Z', 'nvd_published_at': '2022-04-14T22:15:00Z'}
1.4.0
GHSA-mcq2-w56r-5w2w
2022-04-08T22:09:23Z
2022-04-08T22:09:23Z
null
[]
Daemon panics when processing certain blocks
### Impact go-ipfs nodes with versions 0.10.0, 0.11.0, 0.12.0, or 0.12.1 can crash when trying to traverse certain malformed graphs due to an issue in the go-codec-dagpb dependency. Vulnerable nodes that work with these malformed graphs may crash leading to denial-of-service risks. This particularly impacts nodes tha...
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/ipld/go-ipfs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.12.0'}, {'fixed': '0.12.2'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/ipld/go-ipfs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.1'}]}]}...
[{'type': 'WEB', 'url': 'https://github.com/ipfs/go-ipfs/security/advisories/GHSA-mcq2-w56r-5w2w'}, {'type': 'PACKAGE', 'url': 'github.com/ipld/go-ipfs'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-08T22:09:23Z', 'nvd_published_at': None}
1.4.0
GHSA-jv64-2m3x-6v4q
2022-07-26T21:29:36Z
2022-04-30T00:00:36Z
null
['CVE-2021-41948']
Subrion CMS Cross-site Scripting (XSS) vulnerability in the `contact us` plugin
A cross-site scripting (XSS) vulnerability exists in the `contact us` plugin for Subrion CMS <= 4.2.1 version via `List of subjects`. This can be exploited by someone with administrative privileges when they log in to the admin panel.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'intelliants/subrion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41948'}, {'type': 'WEB', 'url': 'https://github.com/intelliants/subrion-plugin-contact_us/issues/8'}, {'type': 'PACKAGE', 'url': 'https://github.com/intelliants/subrion-plugin-contact_us/'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-04T18:10:42Z', 'nvd_published_at': '2022-04-29T14:15:00Z'}
1.4.0
GHSA-6q9g-3vfq-q2qj
2022-05-24T22:20:25Z
2022-04-30T00:00:36Z
null
['CVE-2022-0985']
Improper Authentication in moodle
Insufficient capability checks could allow users with the moodle/site:uploadusers capability to delete users, without having the necessary moodle/user:delete capability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11.0'}, {'fixed': '3.11.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0985'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/addd4f894d8173ec8ff0ae2212d51a1977e7bcad'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2064117'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle...
{'cwe_ids': ['CWE-287', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:20:25Z', 'nvd_published_at': '2022-04-29T16:15:00Z'}
1.4.0
GHSA-fcr6-6cph-vmcm
2022-04-29T04:21:07Z
2022-04-13T00:00:17Z
null
['CVE-2022-29040']
Stored XSS vulnerability in Jenkins Git Parameter Plugin
Jenkins Git Parameter Plugin 0.9.15 and earlier does not escape the name and description of Git parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:git-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.16'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29040'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/git-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-29T04:21:07Z', 'nvd_published_at': '2022-04-12T20:15:00Z'}
1.4.0
GHSA-3v5x-qjrp-q2hq
2022-04-22T21:02:44Z
2022-04-13T00:00:24Z
null
['CVE-2022-27260']
Unrestricted Upload of File with Dangerous Type in ButterCMS
An arbitrary file upload vulnerability in the file upload component of ButterCMS v1.2.8 allows attackers to execute arbitrary code via a crafted SVG file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'buttercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27260'}, {'type': 'PACKAGE', 'url': 'https://github.com/ButterCMS/buttercms-js'}, {'type': 'WEB', 'url': 'https://www.youtube.com/watch?v=Tw8OhtVd-mE'}]
{'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T21:02:44Z', 'nvd_published_at': '2022-04-12T17:15:00Z'}
1.4.0
GHSA-cqxx-66wh-8pjw
2022-04-13T01:15:56Z
2022-04-01T13:59:17Z
null
['CVE-2022-24798']
Improper Removal of Sensitive Information Before Storage or Transfer in irrd
IRRd did not always filter password hashes in query responses relating to `mntner` objects and database exports. This may have allowed adversaries to retrieve some of these hashes, perform a brute-force search for the clear-text passphrase, and use these to make unauthorised changes to affected IRR objects. This issue ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'irrd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/irrdnet/irrd/security/advisories/GHSA-cqxx-66wh-8pjw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24798'}, {'type': 'WEB', 'url': 'https://github.com/irrdnet/irrd/commit/0e41bae8d3d27316381a2fc7b466597230e35ec6'}, {'type': 'WEB', 'url': 'https://g...
{'cwe_ids': ['CWE-212'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T13:59:17Z', 'nvd_published_at': '2022-03-31T23:15:00Z'}
1.4.0
GHSA-vp37-2f9p-3vr3
2022-05-04T03:59:45Z
2022-04-23T00:03:04Z
null
['CVE-2022-29577']
Cross-site Scripting in OWASP AntiSamy
AntiSamy is a library for performing fast, configurable cleansing of HTML coming from untrusted sources. OWASP AntiSamy before 1.6.7 allows XSS via HTML tag smuggling on STYLE content with crafted input. The output serializer does not properly encode the supposed Cascading Style Sheets (CSS) content. NOTE: this issue e...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.owasp.antisamy:antisamy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29577'}, {'type': 'WEB', 'url': 'https://github.com/nahsra/antisamy/commit/32e273507da0e964b58c50fd8a4c94c9d9363af0'}, {'type': 'PACKAGE', 'url': 'https://github.com/nahsra/antisamy'}, {'type': 'WEB', 'url': 'https://github.com/nahsra/antisamy/rele...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-26T17:47:34Z', 'nvd_published_at': '2022-04-21T23:15:00Z'}
1.4.0
GHSA-c5hf-mc85-2hx4
2022-05-24T22:05:22Z
2022-04-30T00:00:35Z
null
['CVE-2022-0984']
Missing authorization in Moodle
Users with the capability to configure badge criteria (teachers and managers by default) were able to configure course badges with profile field criteria, which should only be available for site badges.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11.0'}, {'fixed': '3.11.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10.0'}, {'fixed': '3.10.10'}]}]}...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0984'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/cdc78a16a5da95a17fb10bf1c66689237f5a3f7d'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2064118'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/s...
{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:05:22Z', 'nvd_published_at': '2022-04-29T17:15:00Z'}
1.4.0
GHSA-9qrh-qjmc-5w2p
2022-05-03T02:24:25Z
2022-04-28T20:25:23Z
null
['CVE-2022-21227']
Denial-of-Service when binding invalid parameters in sqlite3
Affected versions of sqlite3 will experience a fatal error when supplying a specific object in the parameter array. This error causes the application to crash and could not be caught. Users of `sqlite3` v5.0.0, v5.0.1 and v5.0.2 are affected by this. This issue is fixed in v5.0.3. All users are recommended to upgrade t...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'sqlite3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/TryGhost/node-sqlite3/security/advisories/GHSA-9qrh-qjmc-5w2p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21227'}, {'type': 'WEB', 'url': 'https://github.com/TryGhost/node-sqlite3/issues/1440'}, {'type': 'WEB', 'url': 'https://github.com/TryGhost...
{'cwe_ids': ['CWE-248'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T20:25:23Z', 'nvd_published_at': '2022-05-01T16:15:00Z'}
1.4.0
GHSA-qpmc-wprv-x746
2022-04-12T21:31:26Z
2022-04-12T21:31:26Z
null
['CVE-2019-15160']
Inline DTD allows XML bomb attack
The SweetXml (aka sweet_xml) package through 0.6.6 for Erlang and Elixir allows attackers to cause a denial of service (resource consumption) via an XML entity expansion attack with an inline DTD.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Hex', 'name': 'sweet_xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15160'}, {'type': 'WEB', 'url': 'https://github.com/kbrw/sweet_xml/issues/71'}, {'type': 'PACKAGE', 'url': 'https://github.com/kbrw/sweet_xml'}, {'type': 'WEB', 'url': 'https://hex.pm/packages/sweet_xml'}]
{'cwe_ids': ['CWE-611', 'CWE-776'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-12T21:31:26Z', 'nvd_published_at': None}
1.4.0
GHSA-xw7v-qrhc-jjg2
2022-04-18T22:21:50Z
2022-04-01T00:00:41Z
null
['CVE-2021-37517']
Access Control vulnerability in Dolibarr
An Access Control vulnerability exists in Dolibarr ERP/CRM 13.0.2, fixed version is 14.0.1, in the forgot-password function becuase the application allows email addresses as usernames, which can cause a Denial of Service.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '14.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37517'}, {'type': 'WEB', 'url': 'https://github.com/Dolibarr/dolibarr/commit/b57eb8284e830e30eefb26e3c5ede076ea24037c'}, {'type': 'PACKAGE', 'url': 'https://github.com/Dolibarr/dolibarr'}, {'type': 'WEB', 'url': 'https://github.com/Dolibarr/dolibar...
{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T19:38:58Z', 'nvd_published_at': '2022-03-31T19:15:00Z'}
1.4.0
GHSA-27rq-4943-qcwp
2022-06-02T17:38:26Z
2022-04-28T00:00:35Z
null
['CVE-2022-29810']
Insertion of Sensitive Information into Log File in Hashicorp go-getter
The Hashicorp go-getter library before 1.5.11 could write SSH credentials into its logfile, exposing sensitive credentials to local users able to read the logfile.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/go-getter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29810'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/go-getter/pull/348'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/go-getter/commit/36b68b2f68a3ed10ee7ecbb0cb9f6b1dc5da49cc'}, {'type': 'PACKAGE', 'url': 'https://github.com/has...
{'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-03T20:19:26Z', 'nvd_published_at': '2022-04-27T06:15:00Z'}
1.4.0
GHSA-86r3-4gq8-xw8q
2022-08-22T16:34:29Z
2022-04-09T00:00:25Z
2022-08-22T16:34:29Z
['CVE-2021-43503']
Remote Code Execution in Laravel
## Withdrawn This advisory has been withdrawn because it is not a security issue and the CVE has been revoked. ## Original Description A Remote Code Execution (RCE) vulnerability exists in h laravel 5.8.38 via an unserialize pop chain in (1) __destruct in \Routing\PendingResourceRegistration.php, (2) __cal in Queue\Ca...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'laravel/laravel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.8.38'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43503'}, {'type': 'WEB', 'url': 'https://github.com/1nhann/vulns/issues/1#issuecomment-1213126338'}, {'type': 'WEB', 'url': 'https://github.com/guoyanan1g/Laravel-vul/issues/2#issue-1045655892'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-12T20:32:12Z', 'nvd_published_at': '2022-04-08T18:15:00Z'}
1.4.0
GHSA-4gr9-99j3-vqxv
2023-09-18T21:59:42Z
2022-04-30T18:15:08Z
null
['CVE-2000-1210']
Apache Tomcat Directory Traversal
Directory traversal vulnerability in source.jsp of Apache Tomcat before 3.1 allows remote attackers to read arbitrary files via a `..` (dot dot) in the argument to source.jsp.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2000-1210'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20020818015647/http://www.iss.net/security_center/static/4205.php'}, {'type': 'WEB', 'url': 'http://marc.info/?l=bugtraq&m=95371672300045&w=2'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T21:59:42Z', 'nvd_published_at': '2002-03-22T05:00:00Z'}
1.4.0
GHSA-xg75-q3q5-cqmv
2022-04-22T20:55:52Z
2022-04-22T20:55:52Z
null
['CVE-2022-24863']
Denial of Service in http-swagger
### Impact Allows an attacker to perform a DOS attack consisting of memory exhaustion on the host system. ### Patches Yes. Please upgrade to v1.2.6. ### Workarounds A workaround is to restrict the path prefix to the "GET" method. As shown below ``` func main() { r := mux.NewRouter() r.PathPrefix("/swagger/").Handl...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/swaggo/http-swagger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/swaggo/http-swagger/security/advisories/GHSA-xg75-q3q5-cqmv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24863'}, {'type': 'WEB', 'url': 'https://github.com/swaggo/http-swagger/pull/62'}, {'type': 'WEB', 'url': 'https://github.com/swaggo/http-swag...
{'cwe_ids': ['CWE-400', 'CWE-755'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:55:52Z', 'nvd_published_at': '2022-04-18T19:15:00Z'}
1.4.0
GHSA-h6xx-pmxh-3wgp
2023-08-30T11:13:45Z
2022-04-12T22:41:32Z
null
['CVE-2018-16886']
go.etcd.io/etcd Authentication Bypass
etcd versions 3.2.x before 3.2.26 and 3.3.x before 3.3.11 are vulnerable to an improper authentication issue when role-based access control (RBAC) is used and client-cert-auth is enabled. If an etcd client server TLS certificate contains a Common Name (CN) which matches a valid RBAC username, a remote attacker may auth...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'go.etcd.io/etcd/v3'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.26'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'go.etcd.io/etcd/v3'}, 'ecosystem_specific': {'affected_functions': ['...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16886'}, {'type': 'WEB', 'url': 'https://github.com/etcd-io/etcd/pull/10366'}, {'type': 'WEB', 'url': 'https://github.com/etcd-io/etcd/commit/0191509637546621d6f2e18e074e955ab8ef374d'}, {'type': 'WEB', 'url': 'https://github.com/etcd-io/etcd/commit...
{'cwe_ids': ['CWE-285', 'CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T21:49:34Z', 'nvd_published_at': None}
1.4.0
GHSA-6w39-qhmq-g8cp
2022-05-04T20:56:35Z
2022-04-13T00:00:16Z
null
['CVE-2022-29050']
CSRF vulnerability in Jenkins Publish Over FTP Plugin
A cross-site request forgery (CSRF) vulnerability in Jenkins Publish Over FTP Plugin 1.16 and earlier allows attackers to connect to an FTP server using attacker-specified credentials.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:publish-over-ftp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.17'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29050'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/publish-over-ftp-plugin/commit/b265201428557ab91304e06199ad38221efc23e7'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/publish-over-ftp-plugin'}, {'type': 'WEB', 'url': 'htt...
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-04T20:56:35Z', 'nvd_published_at': '2022-04-12T20:15:00Z'}
1.4.0
GHSA-vx9g-377x-xwxq
2022-06-01T22:20:04Z
2022-04-26T00:00:41Z
null
['CVE-2022-27311']
Server side request forgery in gibbon
Gibbon v3.4.3 and below allows attackers to execute a Server-Side Request Forgery (SSRF) via a crafted URL. This issue has been resolved in version 3.4.4
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'gibbon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27311'}, {'type': 'WEB', 'url': 'https://github.com/amro/gibbon/pull/321'}, {'type': 'WEB', 'url': 'https://github.com/amro/gibbon/pull/321#issuecomment-1113147155'}, {'type': 'WEB', 'url': 'https://github.com/amro/gibbon/commit/b2eb99ed304d7491a6d...
{'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-27T18:48:09Z', 'nvd_published_at': '2022-04-25T13:15:00Z'}
1.4.0
GHSA-689x-x68p-fph3
2022-04-08T22:08:10Z
2022-04-01T00:00:41Z
null
['CVE-2022-0350']
Cross-site Scripting in vditor
Cross-site Scripting (XSS) - Stored in GitHub repository vanessa219/vditor prior to 3.8.13.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'vditor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0350'}, {'type': 'WEB', 'url': 'https://github.com/vanessa219/vditor/commit/e912e36ea98251d700499b1ac7702708d3398476'}, {'type': 'PACKAGE', 'url': 'https://github.com/vanessa219/vditor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8202aa06-...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-08T22:08:10Z', 'nvd_published_at': '2022-03-31T16:15:00Z'}
1.4.0
GHSA-qf9q-q4hh-qph3
2022-04-29T21:07:16Z
2022-04-22T00:00:36Z
null
['CVE-2022-29498']
SQL injection in blazer
Blazer before 2.6.0 allows SQL Injection. In certain circumstances, an attacker could get a user to run a query they would not have normally run.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'blazer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29498'}, {'type': 'WEB', 'url': 'https://github.com/ankane/blazer/issues/391'}, {'type': 'WEB', 'url': 'https://github.com/ankane/blazer/issues/392'}, {'type': 'WEB', 'url': 'https://github.com/ankane/blazer/commit/f49fbfed7b9e406a69eb78c463c3aa5d3...
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-29T21:07:16Z', 'nvd_published_at': '2022-04-21T05:15:00Z'}
1.4.0
GHSA-g27j-74fp-xfpr
2023-01-10T00:37:19Z
2022-04-05T18:31:22Z
null
['CVE-2022-26969']
Insecure default value for CORS configuration
### Impact The default value for the `CORS_ENABLED` and `CORS_ORIGIN` configuration was set to be very permissive by default. This could lead to unauthorized access in uncontrolled environments when the configuration hasn't been changed. ### Patches The default values for CORS have been changed in https://github.com...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'directus'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.7.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/directus/directus/security/advisories/GHSA-g27j-74fp-xfpr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26969'}, {'type': 'WEB', 'url': 'https://github.com/directus/directus/pull/12022'}, {'type': 'WEB', 'url': 'https://developer.mozilla.org/en-US/...
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-05T18:31:22Z', 'nvd_published_at': '2022-12-26T06:15:00Z'}
1.4.0
GHSA-x752-qjv4-c4hc
2022-04-15T16:49:27Z
2022-04-04T00:00:55Z
null
['CVE-2022-28368']
Remote code injection in dompdf/dompdf
Dompdf is an HTML to PDF converter. Dompdf before 1.2.1 allows remote code execution via a .php file in the src:url field of an @font-face Cascading Style Sheets (CSS) statement (within an HTML input file).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'dompdf/dompdf'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28368'}, {'type': 'WEB', 'url': 'https://github.com/dompdf/dompdf/issues/2598'}, {'type': 'WEB', 'url': 'https://github.com/dompdf/dompdf/pull/2808'}, {'type': 'WEB', 'url': 'https://github.com/dompdf/dompdf/commit/4c70e1025bcd9b7694b95dd552499bd83...
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-05T18:00:16Z', 'nvd_published_at': '2022-04-03T03:15:00Z'}
1.4.0
GHSA-8xpj-9j9g-fc9r
2022-04-18T22:19:44Z
2022-04-08T22:43:17Z
null
['CVE-2022-24827']
SQL Injection in elide-datastore-aggregation
### Impact When leveraging the following together: - Elide Aggregation Data Store for Analytic Queries - Parameterized Columns (A column that requires a client provided parameter) - A parameterized column of type TEXT There is the potential for a hacker to provide a carefully crafted query that would bypass server si...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.yahoo.elide:elide-datastore-aggregation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.3'}, {'fixed': '6.1.4'}]}], 'versions': ['6.1.3']}]
[{'type': 'WEB', 'url': 'https://github.com/yahoo/elide/security/advisories/GHSA-8xpj-9j9g-fc9r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24827'}, {'type': 'WEB', 'url': 'https://github.com/yahoo/elide/pull/2581'}, {'type': 'PACKAGE', 'url': 'https://github.com/yahoo/elide'}, {'type': 'W...
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-08T22:43:17Z', 'nvd_published_at': '2022-04-11T21:15:00Z'}
1.4.0
GHSA-cvx5-m8vg-vxgc
2022-04-28T21:16:40Z
2022-04-28T21:16:40Z
null
['CVE-2022-24897']
Arbitrary filesystem write access from velocity.
### Impact The velocity scripts is not properly sandboxed against using the Java File API to perform read or write operations on the filesystem. Now writing an attacking script in velocity requires the Script rights in XWiki so not all users can use it, and it also requires finding an XWiki API which returns a File. ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.commons:xwiki-commons-velocity'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '12.6.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.commons:xwiki-commons-velocity'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'int...
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-cvx5-m8vg-vxgc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24897'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-commons/pull/127'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-com...
{'cwe_ids': ['CWE-22', 'CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T21:16:40Z', 'nvd_published_at': '2022-05-02T22:15:00Z'}
1.4.0
GHSA-j33m-2537-86jm
2023-08-29T20:04:11Z
2022-04-23T00:40:51Z
null
['CVE-2012-20001']
PrestaShop XSS Vulnerability
PrestaShop before 1.5.2.0 allows XSS via the `<object data='data:text/html` substring in the message field.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-20001'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2012/Nov/1'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20140803034142/http://forge.prestashop.com/browse/PSCFV-5204'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/2016...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T20:04:11Z', 'nvd_published_at': '2021-12-21T16:15:00Z'}
1.4.0
GHSA-w24h-v9qh-8gxj
2023-09-05T19:20:10Z
2022-04-13T00:00:33Z
null
['CVE-2022-28347']
SQL Injection in Django
A SQL injection issue was discovered in `QuerySet.explain()` in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. This occurs by passing a crafted dictionary (with dictionary expansion) as the `**options` argument, and placing the injection payload in an option name.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ecosystem_specific': {'affected_functions': ['django.db.models.QuerySet.explain']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixed': '2.2.28'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ecosystem_specific': {'affected_fun...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28347'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/00b0fc50e1738c7174c495464a5ef069408a4402'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/29a6c98b4c13af82064f993f0acc6e8fafa4d3f5'}, {'type': 'WEB', 'url': ...
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:32:48Z', 'nvd_published_at': '2022-04-12T05:15:00Z'}
1.4.0
GHSA-w8xh-93qh-35vw
2022-04-22T20:28:59Z
2022-04-13T00:00:22Z
null
['CVE-2022-27952']
Unrestricted Upload of File with Dangerous Type in Payload
An arbitrary file upload vulnerability in the file upload module of PayloadCMS v0.15.0 allows attackers to execute arbitrary code via a crafted SVG file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'payload'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.15.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27952'}, {'type': 'PACKAGE', 'url': 'https://github.com/payloadcms/payload'}, {'type': 'WEB', 'url': 'https://www.youtube.com/watch?v=6CfhAxA3xdQ'}]
{'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:28:59Z', 'nvd_published_at': '2022-04-12T17:15:00Z'}
1.4.0
GHSA-j383-35pm-c5h4
2022-04-26T21:51:41Z
2022-04-13T00:00:16Z
null
['CVE-2022-0436']
Path Traversal in Grunt
Grunt prior to version 1.5.2 is vulnerable to path traversal.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'grunt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0436'}, {'type': 'WEB', 'url': 'https://github.com/gruntjs/grunt/pull/1743'}, {'type': 'WEB', 'url': 'https://github.com/gruntjs/grunt/commit/aad3d4521c3098fb255fb2db8f2e1d691a033665'}, {'type': 'WEB', 'url': 'https://github.com/gruntjs/grunt/commi...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-26T21:51:41Z', 'nvd_published_at': '2022-04-12T21:15:00Z'}
1.4.0
GHSA-v98r-gjgc-m9pf
2022-12-01T23:59:34Z
2022-04-13T00:00:16Z
null
['CVE-2022-29045']
Stored Cross-site Scripting vulnerability in Jenkins Promoted Builds Plugin
Jenkins promoted builds Plugin 873.v6149db_d64130 and earlier, except 3.10.1, does not escape the name and description of Promoted Build parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. Exploitation of the...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:promoted-builds'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.10.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:promoted-builds'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29045'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T21:07:38Z', 'nvd_published_at': '2022-04-12T20:15:00Z'}
1.4.0
GHSA-x446-3xhq-5xfp
2022-04-26T13:03:51Z
2022-04-15T00:00:40Z
null
['CVE-2022-27814']
Exposure of Resource to Wrong Sphere in Simple-Wayland-HotKey-Daemon
SWHKD 1.1.5 allows arbitrary file-existence tests via the -c option.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'Simple-Wayland-HotKey-Daemon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27814'}, {'type': 'PACKAGE', 'url': 'https://github.com/waycrate/swhkd'}, {'type': 'WEB', 'url': 'https://github.com/waycrate/swhkd/releases'}, {'type': 'WEB', 'url': 'https://github.com/waycrate/swhkd/releases/tag/1.2.0'}, {'type': 'WEB', 'url': '...
{'cwe_ids': ['CWE-668'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-04-26T13:03:51Z', 'nvd_published_at': '2022-04-14T17:15:00Z'}
1.4.0
GHSA-wcwp-r3fj-mm3p
2023-09-18T22:27:55Z
2022-04-30T18:12:54Z
null
['CVE-2000-0062']
Zope DTML implementation Improper Authentication
The DTML implementation in the Z Object Publishing Environment (Zope) allows remote attackers to conduct unauthorized activities.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'zope'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'last_affected': '2.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2000-0062'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20010218085743/http://www.securityfocus.com/bid/922'}]
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T22:27:55Z', 'nvd_published_at': '2000-01-04T05:00:00Z'}
1.4.0
GHSA-qffw-8wg7-h665
2022-04-29T17:22:43Z
2022-04-23T00:03:01Z
null
['CVE-2022-1440']
Command injection in git-interface
A command injection vulnerability exists in git-interface in the GitHub repository yarkeev/git-interface prior to 2.1.2. If both the git remote and destination directory are provided by user input, then the use of an `--upload-pack` command-line argument feature of git is also supported for `git clone`, which would the...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'git-interface'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1440'}, {'type': 'WEB', 'url': 'https://github.com/yarkeev/git-interface/commit/f828aa790016fee3aa667f7b44cf94bf0aa8c60d'}, {'type': 'PACKAGE', 'url': 'https://github.com/yarkeev/git-interface'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c...
{'cwe_ids': ['CWE-78', 'CWE-88'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-26T13:06:52Z', 'nvd_published_at': '2022-04-22T18:15:00Z'}
1.4.0
GHSA-pv7p-c7cp-vrh3
2022-12-02T21:17:54Z
2022-04-13T00:00:16Z
null
['CVE-2022-29044']
Stored Cross-site Scripting in Jenkins Node and Label parameter Plugin
Jenkins Node and Label parameter Plugin 1.10.3 and earlier does not escape the name and description of Node and Label parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. Exploitation of this vulnerability req...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:nodelabelparameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29044'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/nodelabelparameter-plugin/commit/b8a95cbf678e18dd1f936fd38f23b8cb0695ded7'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/nodelabelparameter-plugin'}, {'type': 'WEB', 'url': ...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T21:17:54Z', 'nvd_published_at': '2022-04-12T20:15:00Z'}
1.4.0
GHSA-q6h7-4qgw-2j9p
2022-12-27T00:58:20Z
2022-04-20T00:00:33Z
null
['CVE-2022-29153']
Hashicorp Consul HTTP health check endpoints returning an HTTP redirect may be abused as SSRF vector
A vulnerability was identified in Consul and Consul Enterprise (“Consul”) such that HTTP health check endpoints returning an HTTP redirect may be abused as a vector for server-side request forgery (SSRF). This vulnerability, CVE-2022-29153, was fixed in Consul 1.9.17, 1.10.10, and 1.11.5.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.17'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed': '1.10...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29153'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2022-10-consul-s-http-health-check-may-allow-server-side-request-forgery/'}, {'type': 'WEB', 'url': 'https://discuss.has...
{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T21:13:56Z', 'nvd_published_at': '2022-04-19T16:17:00Z'}
1.4.0
GHSA-6v6p-g8cg-2hgg
2022-04-01T12:56:28Z
2022-04-01T12:56:28Z
null
[]
Improper Certificate Validation in node-sass affects eZ Platform
Certificate validation in node-sass 2.0.0 to 4.14.1 is disabled when requesting binaries even if the user is not specifying an alternative download path. This affects eZ Platform v2.5 only. The maintainers resolved it by replacing node-sass 4.11 with sass 1.32.13. This issue also affects ezsystems/ezplatform and ezsyst...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezplatform-admin-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.27'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ezsystems/ezplatform-admin-ui/security/advisories/GHSA-6v6p-g8cg-2hgg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24025'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-002-vulnerability-in-node-sass'}, {'t...
{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T12:56:28Z', 'nvd_published_at': None}
1.4.0
GHSA-m87f-39q9-6f55
2022-04-05T17:47:26Z
2022-04-05T17:47:26Z
null
['CVE-2022-24758']
Sensitive Auth & Cookie data stored in Jupyter server logs
Anytime a 5xx error is triggered, the auth cookie and other header values are recorded in Jupyter server logs by default. Considering these logs do not require root access, an attacker can monitor these logs, steal sensitive auth/cookie information, and gain access to the Jupyter server. Upgrade to notebook version 6....
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'notebook'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.10'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/jupyter/notebook/security/advisories/GHSA-m87f-39q9-6f55'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24758'}, {'type': 'PACKAGE', 'url': 'https://github.com/jupyter/notebook'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tre...
{'cwe_ids': ['CWE-532'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-05T17:47:26Z', 'nvd_published_at': '2022-03-31T23:15:00Z'}
1.4.0
GHSA-5x4f-7xgq-r42x
2022-04-29T15:39:18Z
2022-04-29T15:39:18Z
null
[]
Object state limitation has no effect
Object state limitation is a policy you can use in your roles to limit access to content based on specific object state values. Due to a flawed earlier update, these limitations were ineffective in releases made since February 16th 2022. They would grant access to the given content regardless of the object state. Depen...
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezpublish-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.5.0'}, {'fixed': '7.5.28'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ezsystems/ezpublish-kernel/security/advisories/GHSA-5x4f-7xgq-r42x'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-004-ineffective-object-state-limitation-and-unauthenticated-fastly-purge'}, {'type': 'PACKAGE', 'url': 'https://github.c...
{'cwe_ids': ['CWE-281'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-29T15:39:18Z', 'nvd_published_at': None}
1.4.0
GHSA-4hj2-r2pm-3hc6
2022-04-28T18:10:23Z
2022-04-22T20:42:46Z
null
['CVE-2022-27652']
Incorrect Default Permissions in CRI-O
### Impact A bug was found in CRI-O where containers were incorrectly started with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during `execve(2)`. Normally, when exe...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/cri-o/cri-o'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.24.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/cri-o/cri-o/security/advisories/GHSA-4hj2-r2pm-3hc6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27652'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2066839'}, {'type': 'PACKAGE', 'url': 'https://github.com/cri-o/cri-o'}]
{'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:42:46Z', 'nvd_published_at': '2022-04-18T17:15:00Z'}
1.4.0
GHSA-pxpf-v376-7xx5
2022-05-26T19:48:28Z
2022-04-30T00:00:33Z
null
['CVE-2022-25854']
tagify can pass a malicious placeholder to initiate the cross-site scripting (XSS) payload
This affects the package @yaireo/tagify before 4.9.8. The package is used for rendering UI components inside the input or text fields, and an attacker can pass a malicious placeholder value to it to fire the cross-site scripting (XSS) payload.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@yaireo/tagify'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.9.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25854'}, {'type': 'WEB', 'url': 'https://github.com/yairEO/tagify/issues/988'}, {'type': 'WEB', 'url': 'https://github.com/yairEO/tagify/commit/198c0451fad188390390395ccfc84ab371def4c7'}, {'type': 'WEB', 'url': 'https://bsg.tech/blog/cve-2022-25854...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-03T04:55:32Z', 'nvd_published_at': '2022-04-29T20:15:00Z'}
1.4.0
GHSA-74w3-2r77-fw5h
2022-04-18T22:21:17Z
2022-04-03T00:00:58Z
null
['CVE-2022-27177']
Use of Externally-Controlled Format String in consoleme
A Python format string issue leading to information disclosure and potentially remote code execution in ConsoleMe for all versions prior to 1.2.2
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'consoleme'}, 'ecosystem_specific': {'affected_functions': ['consoleme.lib.defaults.SELF_SERVICE_IAM_DEFAULTS', 'consoleme.lib.generic.iterate_and_format_dict']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27177'}, {'type': 'WEB', 'url': 'https://github.com/Netflix/consoleme/commit/2a3c84eee524d77c427b3329a8419cbbce9e1d16'}, {'type': 'PACKAGE', 'url': 'https://github.com/Netflix/ConsoleMe'}, {'type': 'WEB', 'url': 'https://github.com/Netflix/security...
{'cwe_ids': ['CWE-134'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-05T17:54:33Z', 'nvd_published_at': '2022-04-01T23:15:00Z'}
1.4.0
GHSA-5pv7-hx9m-8jh3
2022-05-05T15:29:45Z
2022-04-13T00:00:16Z
null
['CVE-2022-29051']
Missing permission checks in Jenkins Publish Over FTP Plugin
Missing permission checks in Jenkins Publish Over FTP Plugin prior to 1.17 allow attackers with Overall/Read permission to connect to an FTP server using attacker-specified credentials.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:publish-over-ftp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.17'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29051'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/publish-over-ftp-plugin/commit/b265201428557ab91304e06199ad38221efc23e7'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/publish-over-ftp-plugin'}, {'type': 'WEB', 'url': 'htt...
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-05T15:29:45Z', 'nvd_published_at': '2022-04-12T20:15:00Z'}
1.4.0
GHSA-p2vw-f87c-q597
2023-06-30T20:10:46Z
2022-04-29T00:00:23Z
null
['CVE-2022-1511']
Improper Access Control in snipe/snipe-it
Snipe-IT prior to 5.4.4 is vulnerable to Missing Authorization.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.4.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1511'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/pull/10991'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/2e9cf8fa87a025c0eac9f79f4864b3fdd33a950c'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-...
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T21:13:53Z', 'nvd_published_at': '2022-04-28T15:15:00Z'}
1.4.0
GHSA-72cx-5ff9-4hhc
2022-04-26T20:29:02Z
2022-04-21T01:54:03Z
null
['CVE-2009-3724']
Cross-site scripting in markdown2 for python
python-markdown2 before 1.0.1.14 has multiple cross-site scripting (XSS) issues.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'markdown2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1.14'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.1.13'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-3724'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-72cx-5ff9-4hhc'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/markdown2/PYSEC-2020-235.yaml'}, {'type': 'PACKAGE', 'url': 'https://github....
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-26T20:29:02Z', 'nvd_published_at': '2020-01-15T21:15:00Z'}
1.4.0
GHSA-2q6v-32mr-8p8x
2022-04-12T21:20:20Z
2022-04-12T21:20:20Z
null
['CVE-2017-1000052']
Null Byte Injection in Plug.Static
Plug.Static is used for serving static assets, and is vulnerable to null byte injection. If file upload functionality is provided, this can allow users to bypass filetype restrictions. We recommend all applications that provide file upload functionality and serve those uploaded files locally with Plug.Static to...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Hex', 'name': 'plug'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'Hex', 'name': 'plug'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.7'}]}]}, {'package': {'ecosystem': 'Hex', 'nam...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000052'}, {'type': 'WEB', 'url': 'https://elixirforum.com/t/security-releases-for-plug/3913'}, {'type': 'PACKAGE', 'url': 'https://github.com/elixir-plug/plug'}]
{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-12T21:20:20Z', 'nvd_published_at': None}
1.4.0
GHSA-wh73-hpcg-v32j
2023-08-31T15:47:48Z
2022-04-14T00:00:14Z
null
['CVE-2022-27479']
SQL injection in apache-superset
Apache Superset before 1.4.2 is vulnerable to SQL injection in chart data requests. Users should update to 1.4.2 or higher which addresses this issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27479'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wh73-hpcg-v32j'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/superset'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/apache-su...
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T19:34:57Z', 'nvd_published_at': '2022-04-13T19:15:00Z'}
1.4.0
GHSA-7mfr-774f-w5r9
2022-04-12T00:07:34Z
2022-04-12T00:07:34Z
null
['CVE-2017-11770']
Improper Certificate Validation
.NET Core 1.0, 1.1, and 2.0 allow an unauthenticated attacker to remotely cause a denial of service attack against a .NET Core web application by improperly parsing certificate data. A denial of service vulnerability exists when .NET Core improperly handles parsing certificate data, aka ".NET CORE Denial Of Service Vul...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'System.Security.Cryptography.X509Certificates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0....
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-11770'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3248'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11770'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bi...
{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-12T00:07:34Z', 'nvd_published_at': None}
1.4.0
GHSA-6gm7-j668-w6h9
2022-04-22T20:42:11Z
2022-04-09T00:00:30Z
null
['CVE-2022-1219']
SQL Injection in Pimcore
Pimcore prior to version 10.3.5 is vulnerable SQL injection in RecyclebinController.php. This vulnerability affects data confidentiality.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.3.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1219'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/a697830359df06246acca502ee2455614de68017'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/f700bd18-1fd3...
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:42:11Z', 'nvd_published_at': '2022-04-08T09:15:00Z'}
1.4.0
GHSA-9cmq-pj6p-hgwf
2023-09-18T22:28:17Z
2022-04-30T18:14:11Z
null
['CVE-2000-0725']
Zope does not properly restrict access to the getRoles method
Zope before 2.2.1 does not properly restrict access to the getRoles method, which allows users who can edit DTML to add or modify roles by modifying the roles list that is included in a request.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'zope'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2000-0725'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20010219192346/http://archives.neohapsis.com/archives/bugtraq/2000-08/0198.html'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20010219192441/http://archives.neohapsis.com/archives...
{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T22:28:17Z', 'nvd_published_at': '2000-10-20T04:00:00Z'}
1.4.0
GHSA-4822-jvwx-w47h
2022-11-28T16:18:30Z
2022-04-01T18:16:42Z
null
['CVE-2022-41952']
Uncontrolled Resource Consumption in Matrix Synapse
### Impact Synapse before 1.52.0 with URL preview functionality enabled will attempt to generate URL previews for media stream URLs without properly limiting connection time. Connections will only be terminated after `max_spider_size` (default: 10M) bytes have been downloaded, which can in some cases lead to long-live...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'matrix-synapse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.53.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/security/advisories/GHSA-4822-jvwx-w47h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41952'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/pull/11784'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/syna...
{'cwe_ids': ['CWE-400', 'CWE-772'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T18:16:42Z', 'nvd_published_at': '2022-11-22T16:15:00Z'}
1.4.0
GHSA-558x-2xjg-6232
2023-03-28T22:26:10Z
2022-04-03T00:01:00Z
null
['CVE-2022-22950']
Allocation of Resources Without Limits or Throttling in Spring Framework
In Spring Framework versions 5.3.0 - 5.3.16, 5.2.0.RELEASE - 5.2.19.RELEASE, and older unsupported versions, it is possible for a user to provide a specially crafted SpEL expression that may cause a denial of service condition.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-expression'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.3.0'}, {'fixed': '5.3.17'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-expression'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduce...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22950'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-framework/issues/28145'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-framework/issues/28257'}, {'type': 'WEB', 'url': 'https://github.com/spring-proje...
{'cwe_ids': ['CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-05T18:46:34Z', 'nvd_published_at': '2022-04-01T23:15:00Z'}
1.4.0
GHSA-3qrq-r688-vvh4
2022-04-28T21:02:17Z
2022-04-28T21:02:17Z
null
['CVE-2022-24892']
Multiple valid tokens for password reset in Shopware
### Impact Multiple tokens for password reset could be requested. All tokens could be used to change the password. This makes it possible for an attacker to take over the victims account if s/he gains access to the victims email account and finds unused password reset token in the emails within the time frame of two ho...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/shopware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.4'}, {'fixed': '5.7.9'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/shopware/shopware/security/advisories/GHSA-3qrq-r688-vvh4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24892'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-04-2022'}, {'type': 'PACKAGE', 'url...
{'cwe_ids': ['CWE-640'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T21:02:17Z', 'nvd_published_at': '2022-04-28T15:15:00Z'}
1.4.0
GHSA-w8qp-hmh5-4v9v
2022-04-29T16:22:58Z
2022-04-29T16:22:58Z
null
[]
Object state limitation has no effect
Object state limitation is a policy you can use in your roles to limit access to content based on specific object state values. Due to a flawed earlier update, these limitations were ineffective in releases made since February 16th 2022. They would grant access to the given content regardless of the object state. Depen...
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezplatform-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.17'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ezsystems/ezplatform-kernel/security/advisories/GHSA-w8qp-hmh5-4v9v'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-004-ineffective-object-state-limitation-and-unauthenticated-fastly-purge'}, {'type': 'PACKAGE', 'url': 'https://github....
{'cwe_ids': ['CWE-281'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-29T16:22:58Z', 'nvd_published_at': None}
1.4.0
GHSA-vmp5-c5hp-6c65
2022-05-26T19:48:38Z
2022-04-30T00:00:33Z
null
['CVE-2022-29947']
Woodpecker allows cross-site scripting (XSS) via build logs
Woodpecker before 0.15.1 allows XSS via build logs because web/src/components/repo/build/BuildLog.vue lacks escaping.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/woodpecker-ci/woodpecker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29947'}, {'type': 'WEB', 'url': 'https://github.com/woodpecker-ci/woodpecker/pull/879'}, {'type': 'PACKAGE', 'url': 'https://github.com/woodpecker-ci/woodpecker/'}, {'type': 'WEB', 'url': 'https://github.com/woodpecker-ci/woodpecker/releases/tag/v0...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-03T20:18:08Z', 'nvd_published_at': '2022-04-29T21:15:00Z'}
1.4.0
GHSA-3pqg-4rqg-pg9g
2022-05-04T04:00:41Z
2022-04-23T00:03:04Z
null
['CVE-2022-28367']
Cross-site Scripting in OWASP AntiSamy
OWASP AntiSamy is a library for performing fast, configurable cleansing of HTML coming from untrusted sources. AntiSamy before 1.6.6 allows XSS via HTML tag smuggling on STYLE content with crafted input. The output serializer does not properly encode the supposed Cascading Style Sheets (CSS) content.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.owasp.antisamy:antisamy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28367'}, {'type': 'WEB', 'url': 'https://github.com/nahsra/antisamy/commit/0199e7e194dba5e7d7197703f43ebe22401e61ae'}, {'type': 'PACKAGE', 'url': 'https://github.com/nahsra/antisamy'}, {'type': 'WEB', 'url': 'https://github.com/nahsra/antisamy/rele...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-26T19:45:44Z', 'nvd_published_at': '2022-04-21T23:15:00Z'}
1.4.0
GHSA-3r7g-wrpr-j5g4
2022-05-26T20:18:03Z
2022-04-22T20:48:28Z
null
['CVE-2022-24857']
Improper Authentication in django-mfa3
### Impact django-mfa3 is a library that implements multi factor authentication for the django web framework. It achieves this by modifying the regular login view. Django however has a second login view for its admin area. This second login view was not modified, so the multi factor authentication can be bypassed. Yo...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django-mfa3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/xi/django-mfa3/security/advisories/GHSA-3r7g-wrpr-j5g4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24857'}, {'type': 'WEB', 'url': 'https://github.com/xi/django-mfa3/commit/32f656e22df120b84bdf010e014bb19bd97971de'}, {'type': 'WEB', 'url': 'https...
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:48:28Z', 'nvd_published_at': '2022-04-15T19:15:00Z'}
1.4.0
GHSA-7vrm-3jc8-5wwm
2022-04-06T17:39:02Z
2022-04-04T21:40:45Z
null
[]
Incorrect Comparison in Vyper
### Impact bytestrings can have dirty bytes in them, resulting in the word-for-word comparison to give incorrect results, e.g. ```vyper b1: Bytes[32] = b"abcdef" b1 = slice(b1, 0, 1) b2: Bytes[32] = b"abcdef" t: bool = b1 == b2 # incorrectly evaluates to True ``` even without dirty nonzero bytes, because there is no c...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'vyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/security/advisories/GHSA-7vrm-3jc8-5wwm'}, {'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/commit/2c73f8352635c0a433423a5b94740de1a118e508'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/vyper/PYSEC-2022-196.yaml...
{'cwe_ids': ['CWE-697'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-04T21:40:45Z', 'nvd_published_at': None}
1.4.0
GHSA-gvj8-4cj4-h776
2022-04-29T15:40:48Z
2022-04-29T15:40:48Z
null
[]
Object state limitation has no effect
Object state limitation is a policy you can use in your roles to limit access to content based on specific object state values. Due to a flawed earlier update, these limitations were ineffective in releases made since February 16th 2022. They would grant access to the given content regardless of the object state. Depen...
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'ibexa/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'ibexa/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ibexa/core/security/advisories/GHSA-gvj8-4cj4-h776'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-004-ineffective-object-state-limitation-and-unauthenticated-fastly-purge'}, {'type': 'PACKAGE', 'url': 'https://github.com/ibexa/core'}]
{'cwe_ids': ['CWE-281'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-29T15:40:48Z', 'nvd_published_at': None}
1.4.0
GHSA-7r87-cj48-wj45
2022-04-26T21:19:52Z
2022-04-26T21:19:52Z
null
['CVE-2022-24880']
Potential Captcha Validate Bypass in flask-session-captcha
### Impact flask-session-captcha is a package which allows users to extend Flask by adding an image based captcha stored in a server side session. The `captcha.validate()` function would return `None` if passed no value (e.g. by submitting a request with an empty form). If implementing users were checking the return ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'flask-session-captcha'}, 'ecosystem_specific': {'affected_functions': ['flask_session_captcha.FlaskSessionCaptcha.validate']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Tethik/flask-session-captcha/security/advisories/GHSA-7r87-cj48-wj45'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24880'}, {'type': 'WEB', 'url': 'https://github.com/Tethik/flask-session-captcha/pull/27'}, {'type': 'WEB', 'url': 'https://github.co...
{'cwe_ids': ['CWE-253', 'CWE-394', 'CWE-754'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-26T21:19:52Z', 'nvd_published_at': '2022-04-25T22:15:00Z'}
1.4.0
GHSA-97jg-43c9-q6pf
2022-04-19T15:25:47Z
2022-04-08T21:53:38Z
null
['CVE-2022-24819']
Unauthenticated user can retrieve the list of users through uorgsuggest.vm
A guest user without the right to view pages of the wiki can still list documents related to users of the wiki. The problem has been patched in XWiki versions 12.10.11, 13.4.4, and 13.9-rc-1. There is no known workaround for this problem.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web-templates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.10.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web-templates'}, 'ranges': [{'type': 'ECOSYSTEM', 'eve...
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-97jg-43c9-q6pf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24819'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-1...
{'cwe_ids': ['CWE-359'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-08T21:53:38Z', 'nvd_published_at': '2022-04-08T20:15:00Z'}
1.4.0
GHSA-crjr-9rc5-ghw8
2023-07-06T16:02:37Z
2022-04-11T21:18:06Z
null
['CVE-2022-24836']
Nokogiri Inefficient Regular Expression Complexity
## Summary Nokogiri `< v1.13.4` contains an inefficient regular expression that is susceptible to excessive backtracking when attempting to detect encoding in HTML documents. ## Mitigation Upgrade to Nokogiri `>= 1.13.4`. ## Severity The Nokogiri maintainers have evaluated this as [**High Severity** 7.5 (CVSS3.1)...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-crjr-9rc5-ghw8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24836'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/commit/e444525ef1634b675cd1cf52d39f4320ef0aecfd'}, {'type': 'WEB...
{'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-11T21:18:06Z', 'nvd_published_at': '2022-04-11T22:15:00Z'}
1.4.0
GHSA-6xwr-q98w-rvg7
2022-04-22T20:32:05Z
2022-04-13T00:00:30Z
null
['CVE-2022-21803']
Prototype Pollution in nconf
nconf before 0.11.4. When using the memory engine, it is possible to store a nested JSON representation of the configuration. The .set() function, that is responsible for setting the configuration properties, is vulnerable to Prototype Pollution. By providing a crafted property, it is possible to modify the properties ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'nconf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21803'}, {'type': 'WEB', 'url': 'https://github.com/indexzero/nconf/pull/397'}, {'type': 'PACKAGE', 'url': 'https://github.com/indexzero/nconf'}, {'type': 'WEB', 'url': 'https://github.com/indexzero/nconf/releases/tag/v0.11.4'}, {'type': 'WEB', 'ur...
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:31:22Z', 'nvd_published_at': '2022-04-12T16:15:00Z'}
1.4.0
GHSA-34hv-f45p-4qfq
2022-04-19T14:13:44Z
2022-04-06T00:01:29Z
null
['CVE-2022-27463']
Open redirect in wwbn/avideo
Open redirect vulnerability in objects/login.json.php in WWBN AVideo through 11.6, allows attackers to arbitrarily redirect users from a crafted url to the login page. A patch is available on the `master` branch of the repository.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'wwbn/avideo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '11.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27463'}, {'type': 'WEB', 'url': 'https://github.com/WWBN/AVideo/commit/77e9aa6411ff4b97571eb82e587139ec05ff894c'}, {'type': 'WEB', 'url': 'https://avideo.tube/'}, {'type': 'PACKAGE', 'url': 'https://github.com/WWBN/AVideo'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T22:15:39Z', 'nvd_published_at': '2022-04-05T16:15:00Z'}
1.4.0
GHSA-6xvq-2gj8-4276
2022-04-15T03:05:55Z
2022-04-06T00:01:29Z
null
['CVE-2020-28847']
Cross site scripting in valine
valine is a fast, simple & powerful comment system. Cross Site Scripting (XSS) vulnerability in xCss Valine v1.4.14 via the nick parameter to /classes/Comment. A fix was released in version 1.4.15.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'valine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.15'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28847'}, {'type': 'WEB', 'url': 'https://github.com/xCss/Valine/issues/348'}, {'type': 'PACKAGE', 'url': 'https://github.com/xCss/Valine'}, {'type': 'WEB', 'url': 'https://github.com/xCss/Valine/releases/tag/v1.4.15'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T18:16:52Z', 'nvd_published_at': '2022-04-05T16:15:00Z'}
1.4.0
GHSA-9wrv-g75h-8ccc
2022-05-04T03:52:17Z
2022-04-22T21:04:27Z
null
['CVE-2022-24872']
Improper Access Control in Shopware
Shopware 6 is an open commerce platform based on Symfony Framework and Vue and supported by a worldwide community and more than 1.500 community extensions. Permissions set to sales channel context by admin-api are still useable within normal user session. We recommend updating to the current version 6.4.10.1. You can g...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.10.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3.4.0'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type':...
[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-9wrv-g75h-8ccc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24872'}, {'type': 'WEB', 'url': 'https://github.com/shopware/platform/commit/083765e2d64a00315050c4891800c9e98ba0c77c'}, {'type': 'WEB', 'url': ...
{'cwe_ids': ['CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T21:04:27Z', 'nvd_published_at': '2022-04-20T20:15:00Z'}
1.4.0
GHSA-5653-437f-5hmc
2022-04-12T21:29:30Z
2022-04-12T21:29:30Z
null
['CVE-2019-16764']
Denial of service
The use of `String.to_atom/1` in PowAssent is susceptible to denial of service attacks. In `PowAssent.Phoenix.AuthorizationController` a value is fetched from the user provided params, and `String.to_atom/1` is used to convert the binary value to an atom so it can be used to fetch the provider configuration value. This...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Hex', 'name': 'pow_assent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pow-auth/pow_assent/security/advisories/GHSA-368c-xvrv-x986'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16764'}, {'type': 'WEB', 'url': 'https://github.com/pow-auth/pow_assent/commit/026105eeecc0e3c2f807e7109e745ea93c0fd9cf'}, {'type': 'PACKAGE',...
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-12T21:29:30Z', 'nvd_published_at': None}
1.4.0
GHSA-mm33-5vfq-3mm3
2022-06-08T18:05:30Z
2022-04-27T22:28:59Z
null
['CVE-2022-22577']
Cross-site Scripting Vulnerability in Action Pack
There is a possible XSS vulnerability in Rails / Action Pack. This vulnerability has been assigned the CVE identifier CVE-2022-22577. Versions Affected: >= 5.2.0 Not affected: < 5.2.0 Fixed Versions: 7.0.2.4, 6.1.5.1, 6.0.4.8, 5.2.7.1 ## Impact CSP headers were only sent along with responses that Rails co...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.0'}, {'fixed': '5.2.7.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.7.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYST...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22577'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/pull/44635'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/2b820a2a69fa50cffa74b4aedc57bf92ed6910ec'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/52...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-27T22:28:59Z', 'nvd_published_at': '2022-05-26T17:15:00Z'}
1.4.0
GHSA-cf4q-4cqr-7g7w
2022-04-22T20:25:53Z
2022-04-22T20:25:53Z
null
[]
SVG with embedded scripts can lead to cross-site scripting attacks in xml2rfc
xml2rfc allows `script` elements in SVG sources. In HTML output having these script elements can lead to XSS attacks. Sample XML snippet: ``` <artwork type="svg" src="data:image/svg+xml,%3Csvg viewBox='0 0 10 10' xmlns='http://www.w3.org/2000/svg'%3E%3Cscript%3E window.alert('Test Alert'); %3C/script%3E%3C/svg%3E"> </...
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'xml2rfc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.12.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ietf-tools/xml2rfc/security/advisories/GHSA-cf4q-4cqr-7g7w'}, {'type': 'PACKAGE', 'url': 'https://github.com/ietf-tools/xml2rfc'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:25:53Z', 'nvd_published_at': None}
1.4.0
GHSA-v2wf-c3j6-wpvw
2022-04-12T21:27:49Z
2022-04-12T21:27:49Z
null
['CVE-2020-5205']
Session fixation
### Impact The use of `Plug.Session` in `Pow.Plug.Session` is susceptible to session fixation attacks if a persistent session store is used for `Plug.Session`, such as Redis or a database. Cookie store, which is used in most Phoenix apps, doesn't have this vulnerability. ### Workarounds Call `Plug.Conn.configure_ses...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Hex', 'name': 'pow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.16'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/danschultzer/pow/security/advisories/GHSA-v2wf-c3j6-wpvw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5205'}, {'type': 'WEB', 'url': 'https://github.com/danschultzer/pow/commit/578ffd3d8bb8e8a26077b644222186b108da474f'}, {'type': 'PACKAGE', 'url':...
{'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-12T21:27:49Z', 'nvd_published_at': None}
1.4.0
GHSA-6635-c626-vj4r
2022-04-18T21:47:33Z
2022-04-01T14:05:33Z
null
['CVE-2022-21235']
Command Injection Vulnerability with Mercurial in VCS
URLs and local file paths passed to the Mercurial (hg) APIs that are specially crafted can contain commands which are executed by Mercurial if it is installed on the host operating system. The `vcs` package uses the underly version control system, in this case `hg`, to implement the needed functionality. When `hg` is e...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/Masterminds/vcs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Masterminds/vcs/security/advisories/GHSA-6635-c626-vj4r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21235'}, {'type': 'WEB', 'url': 'https://github.com/Masterminds/vcs/pull/105'}, {'type': 'WEB', 'url': 'https://github.com/Masterminds/vcs/commit/...
{'cwe_ids': ['CWE-77', 'CWE-88'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T14:05:33Z', 'nvd_published_at': '2022-04-01T16:15:00Z'}
1.4.0
GHSA-9qgm-w87q-hx89
2022-04-22T21:03:44Z
2022-04-13T00:00:25Z
null
['CVE-2022-27263']
Unrestricted Upload of File with Dangerous Type in Strapi
An arbitrary file upload vulnerability in the file upload module of Strapi v4.1.5 allows attackers to execute arbitrary code via a crafted file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'strapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.1.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27263'}, {'type': 'PACKAGE', 'url': 'https://github.com/strapi/strapi'}, {'type': 'WEB', 'url': 'https://www.youtube.com/watch?v=LEeabouqRrg'}]
{'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T21:03:44Z', 'nvd_published_at': '2022-04-12T17:15:00Z'}
1.4.0
GHSA-vpgw-ffh3-648h
2022-04-22T20:20:55Z
2022-04-12T00:00:38Z
null
['CVE-2022-1295']
Prototype Pollution in fullpage.js
fullPage utils are available to developers using window.fp_utils. They can use these utils for their own use-case (other than fullPage) as well. However, one of the utils deepExtend is vulnerable to Prototype Pollution vulnerability. Javascript is "prototype" language which means when a new "object" is created, it car...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'fullpage.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1295'}, {'type': 'WEB', 'url': 'https://github.com/alvarotrigo/fullpage.js/commit/bf62492a22e5d296e63c3ed918a42fc5645a0d48'}, {'type': 'PACKAGE', 'url': 'https://github.com/alvarotrigo/fullpage.js'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounti...
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:20:05Z', 'nvd_published_at': '2022-04-11T12:15:00Z'}
1.4.0
GHSA-5jfw-35xp-5m42
2022-04-05T17:53:22Z
2022-04-05T17:53:22Z
null
[]
Buffer length underflow in LoginPacket causing unchecked exceptions to be thrown
### Impact `LoginPacket` uses `BinaryStream->getLInt()` to read the lengths of JSON payloads it wants to decode. Unfortunately, `BinaryStream->getLInt()` returns a signed integer, meaning that a malicious client can craft a packet with a large uint32 value for payload buffer size (which would be interpreted as a negati...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pocketmine/bedrock-protocol'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.0.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pmmp/BedrockProtocol/security/advisories/GHSA-5jfw-35xp-5m42'}, {'type': 'WEB', 'url': 'https://github.com/pmmp/BedrockProtocol/commit/e3fce7632b94e83fd6a518a87dcaf6a11681c4ac'}, {'type': 'PACKAGE', 'url': 'https://github.com/pmmp/BedrockProtocol'}]
{'cwe_ids': ['CWE-124'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-05T17:53:22Z', 'nvd_published_at': None}
1.4.0
GHSA-gx7g-wjxg-jwwj
2022-04-18T22:17:42Z
2022-04-04T00:00:55Z
null
['CVE-2022-0088']
Cross-Site Request Forgery in YOURLS
YOURLS versions 1.8.2 and prior are vulnerable to Cross-Site Request Forgery.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'yourls/yourls'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.8.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0088'}, {'type': 'WEB', 'url': 'https://github.com/YOURLS/YOURLS/issues/3170'}, {'type': 'WEB', 'url': 'https://github.com/YOURLS/YOURLS/pull/3264'}, {'type': 'WEB', 'url': 'https://github.com/yourls/yourls/commit/1de256d8694b0ec7d4df2ac1d5976d4055...
{'cwe_ids': ['CWE-352'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-04-05T18:02:00Z', 'nvd_published_at': '2022-04-03T09:15:00Z'}
1.4.0
GHSA-6rw3-3whw-jvjj
2022-04-22T20:13:21Z
2022-04-22T20:13:21Z
null
['CVE-2022-24826']
Git LFS can execute a binary from the current directory on Windows
### Impact On Windows, if Git LFS operates on a malicious repository with a `..exe` file as well as a file named `git.exe`, and `git.exe` is not found in `PATH`, the `..exe` program will be executed, permitting the attacker to execute arbitrary code. This does not affect Unix systems. Similarly, if the malicious repo...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/git-lfs/git-lfs/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/git-lfs/git-lfs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.12.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/git-lfs/git-lfs/security/advisories/GHSA-6rw3-3whw-jvjj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24826'}, {'type': 'PACKAGE', 'url': 'https://github.com/git-lfs/git-lfs'}]
{'cwe_ids': ['CWE-426'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:13:21Z', 'nvd_published_at': '2022-04-20T00:16:00Z'}
1.4.0
GHSA-f3jq-9c79-j65m
2022-12-02T21:23:16Z
2022-04-13T00:00:17Z
null
['CVE-2022-29042']
Stored Cross-site Scripting vulnerability in Jenkins Job Generator Plugin
Jenkins Job Generator Plugin 1.22 and earlier does not escape the name and description of Generator Parameter and Generator Choice parameters on Job Generator jobs' Build With Parameters views, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. Explo...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:jobgenerator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.22'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29042'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jobgenerator-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T21:23:16Z', 'nvd_published_at': '2022-04-12T20:15:00Z'}
1.4.0
GHSA-cjw5-f2x5-r4q5
2022-04-19T14:12:53Z
2022-04-06T00:01:29Z
null
['CVE-2022-0602']
Cross-site Scripting in TastyIgniter
TastyIgniter prior to version 3.3.0 is vulnerable to Document Object Model (DOM) based Cross-site Scripting (XSS).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'tastyigniter/tastyigniter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0602'}, {'type': 'WEB', 'url': 'https://github.com/tastyigniter/tastyigniter/commit/992d4ce6444805c3132e3635a01b6fd222063554'}, {'type': 'PACKAGE', 'url': 'https://github.com/tastyigniter/TastyIgniter'}, {'type': 'WEB', 'url': 'https://huntr.dev/bo...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T15:51:17Z', 'nvd_published_at': '2022-04-05T16:15:00Z'}
1.4.0
GHSA-q77q-vx4q-xx6q
2022-05-10T15:44:45Z
2022-04-27T21:09:46Z
null
['CVE-2022-24891']
Cross-site Scripting in org.owasp.esapi:esapi
### Impact There is a potential for an XSS vulnerability in ESAPI caused by a incorrect regular expression for "onsiteURL" in the **antisamy-esapi.xml** configuration file that can cause URLs with the "javascript:" scheme to NOT be sanitized. See the reference below for full details. ### Patches Patched in ESAPI 2.3.0...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.owasp.esapi:esapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.3.1'}}]
[{'type': 'WEB', 'url': 'https://github.com/ESAPI/esapi-java-legacy/security/advisories/GHSA-q77q-vx4q-xx6q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24891'}, {'type': 'PACKAGE', 'url': 'https://github.com/ESAPI/esapi-java-legacy'}, {'type': 'WEB', 'url': 'https://github.com/ESAPI/esapi-...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-27T21:09:46Z', 'nvd_published_at': '2022-04-27T21:15:00Z'}
1.4.0
GHSA-455j-8hg5-8576
2022-12-02T21:28:46Z
2022-04-13T00:00:19Z
null
['CVE-2022-29039']
Stored Cross-site Scripting vulnerability in Jenkins Gerrit Trigger Plugin
Jenkins Gerrit Trigger Plugin 2.35.2 and earlier does not escape the name and description of parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. Exploitation of these vulnerabilities requires that parameters ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.sonyericsson.hudson.plugins.gerrit:gerrit-trigger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.35.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29039'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/gerrit-trigger-plugin/commit/8b1d59645725e6f01057c1cf87170e321f99f6be'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/gerrit-trigger-plugin'}, {'type': 'WEB', 'url': 'https:/...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T21:28:46Z', 'nvd_published_at': '2022-04-12T20:15:00Z'}
1.4.0
GHSA-vhxq-9mpv-gj87
2022-12-01T23:42:49Z
2022-04-13T00:00:15Z
null
['CVE-2022-29052']
Private key stored in plain text by Jenkins Google Compute Engine Plugin
Jenkins Google Compute Engine Plugin 4.3.8 and earlier stores private keys unencrypted in cloud agent `config.xml` files on the Jenkins controller where they can be viewed by users with Agent/Extended Read permission, or access to the Jenkins controller file system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:google-compute-engine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29052'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/google-compute-engine-plugin/commit/16d2ae71a1b34c81db1d74f83c41577536e5256f'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2045'}]
{'cwe_ids': ['CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-01T23:42:49Z', 'nvd_published_at': '2022-04-12T20:15:00Z'}
1.4.0
GHSA-3hjg-vc7r-rcrw
2022-04-07T15:20:23Z
2022-04-07T15:20:23Z
null
['CVE-2022-24822']
Denial of Service vulnerability in @podium/layout and @podium/proxy
### Impact An attacker using the `Trailer` header as part of the request against proxy endpoints has the ability to take down the server. All Podium layouts that include podlets with proxy endpoints are affected. ### Patches `@podium/layout` which is the main way developers/users are vulnerable to this exploit, has be...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': '@podium/layout'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.110'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@podium/proxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.74'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/podium-lib/proxy/security/advisories/GHSA-3hjg-vc7r-rcrw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24822'}, {'type': 'WEB', 'url': 'https://github.com/podium-lib/layout/commit/fe43e655432b0a5f07b6475f67babcc2588fb039'}, {'type': 'WEB', 'url': '...
{'cwe_ids': ['CWE-248'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T15:20:23Z', 'nvd_published_at': '2022-04-06T18:15:00Z'}
1.4.0
GHSA-82rm-28q9-435p
2023-09-18T22:38:47Z
2022-04-29T01:25:43Z
null
['CVE-2003-0038']
Mailman Cross-site scripting (XSS) vulnerability
Cross-site scripting (XSS) vulnerability in options.py for Mailman 2.1 allows remote attackers to inject script or HTML into web pages via the (1) email or (2) language parameters.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'mailman'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2003-0038'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/11152'}, {'type': 'WEB', 'url': 'http://marc.info/?l=bugtraq&m=104342745916111'}, {'type': 'WEB', 'url': 'http://telia.dl.sourceforge.net/sourceforge/mailman/xss-2...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T22:38:47Z', 'nvd_published_at': '2003-02-07T05:00:00Z'}
1.4.0
GHSA-x445-mmpw-7r4f
2023-09-18T22:36:52Z
2022-04-30T18:16:22Z
null
['CVE-2001-0590']
Apache Tomcat Allows Source Disclosure
Apache Software Foundation Tomcat Servlet prior to 3.2.2 allows a remote attacker to read the source code to arbitrary 'jsp' files via a malformed URL request which does not end with an HTTP protocol specification (i.e. HTTP/1.0).
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat-servlet-api'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2001-0590'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/6971'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20020711002734/http://archives.neohapsis.com/archives/bugtraq/2001-04/0031.html'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T22:36:52Z', 'nvd_published_at': '2001-08-02T04:00:00Z'}
1.4.0
GHSA-rvjg-gxwx-j5gf
2022-04-28T17:13:58Z
2022-04-28T17:13:58Z
null
['CVE-2020-10734']
OIDC Logout redirect in keycloak
A flaw was found in keycloak. The OIDC logout endpoint does not have CSRF protection. The highest threat from this vulnerability is to system availability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-oidc-client-adapter-pom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '18.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/security/advisories/GHSA-rvjg-gxwx-j5gf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10734'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1831662'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/...
{'cwe_ids': ['CWE-601'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T17:13:58Z', 'nvd_published_at': '2021-02-11T18:15:00Z'}
1.4.0
GHSA-4mrx-6fxm-8jpg
2022-04-20T20:31:44Z
2022-04-20T20:31:44Z
null
['CVE-2022-24788']
Buffer Overflow in vyper
### Impact Importing a function from a JSON interface which returns `bytes` generates bytecode which does not clamp bytes length, potentially resulting in a buffer overrun. ### Patches 0.3.2 (as of https://github.com/vyperlang/vyper/commit/049dbdc647b2ce838fae7c188e6bb09cf16e470b) ### Workarounds Use .vy interfaces.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'vyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/security/advisories/GHSA-4mrx-6fxm-8jpg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24788'}, {'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/commit/049dbdc647b2ce838fae7c188e6bb09cf16e470b'}, {'type': 'WEB', 'url': 'htt...
{'cwe_ids': ['CWE-119', 'CWE-120'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-20T20:31:44Z', 'nvd_published_at': '2022-04-13T19:15:00Z'}
1.4.0
GHSA-4qqf-hmv6-r6wh
2022-07-13T17:29:15Z
2022-04-22T00:24:28Z
null
['CVE-2011-2487']
Use of a Broken or Risky Cryptographic Algorithm in Apache WSS4J
The implementations of PKCS#1 v1.5 key transport mechanism for XMLEncryption in JBossWS and Apache WSS4J before 1.6.5 is susceptible to a Bleichenbacher attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ws.security:wss4j'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-2487'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0191'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0192'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0193'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-327'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T17:29:15Z', 'nvd_published_at': '2020-03-11T16:15:00Z'}
1.4.0
GHSA-92j7-34x9-f3jw
2023-09-18T23:29:49Z
2022-04-29T03:01:51Z
null
['CVE-2004-2650']
Apache James Denial of Service
Spooler in Apache Foundation James before 2.2.0 allows local users to cause a denial of service (memory consumption) by triggering various error conditions in the retrieve function, which prevents a lock from being released and causes a memory leak.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.james:james-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2004-2650'}, {'type': 'WEB', 'url': 'http://issues.apache.org/jira/browse/JAMES-268'}, {'type': 'WEB', 'url': 'http://james.apache.org/changelog.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/15765'}]
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T23:29:49Z', 'nvd_published_at': '2004-12-31T05:00:00Z'}
1.4.0
GHSA-fwr7-v2mv-hh25
2023-01-23T18:54:18Z
2022-04-07T00:00:17Z
null
['CVE-2021-43138']
Prototype Pollution in async
A vulnerability exists in Async through 3.2.1 for 3.x and through 2.6.3 for 2.x (fixed in 3.2.2 and 2.6.4), which could let a malicious user obtain privileges via the `mapValues()` method.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'async'}, 'ecosystem_specific': {'affected_functions': ['async.mapValues']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'async'}, 'ecosystem_specific': {'affected_functions': ['async.mapV...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43138'}, {'type': 'WEB', 'url': 'https://github.com/caolan/async/pull/1828'}, {'type': 'WEB', 'url': 'https://github.com/caolan/async/commit/8f7f90342a6571ba1c197d747ebed30c368096d2'}, {'type': 'WEB', 'url': 'https://github.com/caolan/async/commit/...
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T22:13:35Z', 'nvd_published_at': '2022-04-06T17:15:00Z'}
1.4.0
GHSA-hj4h-vqpq-95wg
2023-09-18T22:51:49Z
2022-04-29T02:57:41Z
null
['CVE-2004-0412']
Mailman Sensitive Information Disclosure
Mailman before 2.1.5 allows remote attackers to obtain user passwords via a crafted email request to the Mailman server.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'mailman'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2004-0412'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=123559'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/16256'}, {'type': 'PACKAGE', 'url': 'https://gitlab.com/mailman/'}, {'type':...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T22:51:49Z', 'nvd_published_at': '2004-08-18T04:00:00Z'}
1.4.0
GHSA-qjmq-8hjr-qcv6
2022-04-18T22:20:12Z
2022-04-07T15:18:05Z
null
['CVE-2022-24815']
SQL Injection when creating an application with Reactive SQL backend
### Impact SQL Injection vulnerability in entities for applications generated with the option "reactive with Spring WebFlux" enabled and an SQL database using r2dbc. Applications created without "reactive with Spring WebFlux" and applications with NoSQL databases are not affected. If you have generated a microservice...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'generator-jhipster'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.8.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/jhipster/generator-jhipster/security/advisories/GHSA-qjmq-8hjr-qcv6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24815'}, {'type': 'WEB', 'url': 'https://github.com/jhipster/generator-jhipster/issues/18269'}, {'type': 'WEB', 'url': 'https://github...
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T15:18:05Z', 'nvd_published_at': '2022-04-11T20:15:00Z'}
1.4.0
GHSA-6wj9-77wq-jq7p
2023-03-06T23:31:46Z
2022-04-23T00:40:45Z
null
['CVE-2012-6685']
Nokogiri is vulnerable to XML External Entity (XXE) attack
Nokogiri before 1.5.4 is vulnerable to XXE attacks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-6685'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/issues/693'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1178970'}, {'type': 'PACKAGE', 'url': 'https://github.com/sparklemotion/nokogiri'}, {'type':...
{'cwe_ids': ['CWE-776'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-12T16:55:39Z', 'nvd_published_at': '2020-02-19T15:15:00Z'}
1.4.0
GHSA-6xj3-fhrf-rjgc
2022-04-28T21:11:45Z
2022-04-28T00:00:34Z
null
['CVE-2022-1504']
Cross-site Scripting in microweber
XSS in /demo/module/?module=HERE in GitHub repository microweber/microweber prior to 1.2.15. Typical impact of XSS attacks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.15'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1504'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/1f6a4de416a85e626dc643bb5ceb916e4802223e'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T21:11:45Z', 'nvd_published_at': '2022-04-27T11:15:00Z'}
1.4.0
GHSA-358r-g2xw-7c83
2023-08-29T19:58:59Z
2022-04-23T00:40:10Z
null
['CVE-2012-1156']
Moodle backs up private files
Moodle before 2.2.2, 2.1.5, and 2.0.8 had users' private files included in course backups unnecessarily.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixed': '2.2.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.1'}}, {'package': {'ecosystem': 'Packagist', ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-1156'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/37b6e7a03c77ea99fbe5224a15419e318019c570'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/ac6dc09c261219afa0191e9f2daf030bd071d272'}, {'type': 'WEB', 'url': '...
{'cwe_ids': ['CWE-532'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T19:58:59Z', 'nvd_published_at': '2019-11-14T16:15:00Z'}
1.4.0
GHSA-6v73-fgf6-w5j7
2022-08-11T21:35:54Z
2022-04-03T00:00:59Z
null
['CVE-2022-22963']
Spring Cloud Function Code Injection with a specially crafted SpEL as a routing expression
In Spring Cloud Function versions 3.1.6, 3.2.2 and older unsupported versions, when using routing functionality it is possible for a user to provide a specially crafted SpEL as a routing-expression that may result in remote code execution and access to local resources.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.cloud:spring-cloud-function-context'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.cloud:spring-cloud-function-context'}, 'ranges': [{'type': ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22963'}, {'type': 'PACKAGE', 'url': 'https://github.com/spring-cloud/spring-cloud-function'}, {'type': 'WEB', 'url': 'https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0005'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2...
{'cwe_ids': ['CWE-917', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-05T18:48:10Z', 'nvd_published_at': '2022-04-01T23:15:00Z'}
1.4.0
GHSA-m7xq-8jp8-rj2c
2022-07-18T21:00:59Z
2022-04-13T00:00:33Z
null
['CVE-2022-29080']
Command injection in npm-dependency-versions
The npm-dependency-versions package through 0.3.0 for Node.js allows command injection if an attacker is able to call dependencyVersions with a JSON object in which pkgs is a key, and there are shell metacharacters in a value.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'npm-dependency-versions'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29080'}, {'type': 'WEB', 'url': 'https://github.com/barneycarroll/npm-dependency-versions/issues/6'}, {'type': 'PACKAGE', 'url': 'https://github.com/barneycarroll/npm-dependency-versions'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/npm-...
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-18T21:00:59Z', 'nvd_published_at': '2022-04-12T05:15:00Z'}
1.4.0
GHSA-gx2c-fvhc-ph4j
2022-04-19T15:09:07Z
2022-04-08T00:00:21Z
null
['CVE-2022-26612']
Path traversal in Hadoop
In Apache Hadoop, The unTar function uses unTarUsingJava function on Windows and the built-in tar utility on Unix and other OSes. As a result, a TAR entry may create a symlink under the expected extraction directory which points to an external directory. A subsequent TAR entry may extract an arbitrary file into the ext...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26612'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/hadoop'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/hslo7wzw2449gv1jyjk8g6ttd7935fyz'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220519-0004/'}]
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-08T22:06:47Z', 'nvd_published_at': '2022-04-07T19:15:00Z'}
1.4.0
GHSA-vx8v-g3p3-88vg
2022-04-19T18:01:53Z
2022-04-06T00:01:31Z
null
['CVE-2022-1235']
Weak password hash in LiveHelperChat
The secrethash, which the application relies for multiple security measures, can be brute-forced. The hash is quite small, with only 10 characters of only hexadecimal, making 16^10 possilibities ( 1.099.511.627.776 ). The SHA1 of the secret can be obtained via a captcha string and brute-forced offline with an GPU.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.96'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1235'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/6538d6df3d8a60fee254170b08dd76a161f7bfdc'}, {'type': 'PACKAGE', 'url': 'https://github.com/livehelperchat/livehelperchat'}, {'type': 'WEB', 'url': 'https://hunt...
{'cwe_ids': ['CWE-916'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T15:40:15Z', 'nvd_published_at': '2022-04-05T07:15:00Z'}
1.4.0
GHSA-qg4g-6jcq-rw93
2023-09-18T22:00:28Z
2022-04-30T18:14:15Z
null
['CVE-2000-0759']
Jakarta Apache Tomcat Reveals Physical Paths
Jakarta Tomcat 3.1 under Apache reveals physical path information when a remote attacker requests a URL that does not exist, which generates an error message that includes the physical path.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2000-0759'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T22:00:28Z', 'nvd_published_at': '2000-10-20T04:00:00Z'}
1.4.0
GHSA-xhr8-mpwq-2rr2
2022-04-01T13:39:45Z
2022-04-01T13:39:45Z
null
[]
Automatic named constructor discovery in Valinor
## Design issue - automatic constructor discovery The issue arises when upgrading from `cuyz/valinor:0.3.0` to a newer system on an existing application, which broke due to the wrong constructor being picked. Still, a bigger security concern is problematic, and it is akin to https://github.com/rails/rails/issues/5228...
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'cuyz/valinor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.5.0'}, {'fixed': '0.7.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/CuyZ/Valinor/security/advisories/GHSA-xhr8-mpwq-2rr2'}, {'type': 'WEB', 'url': 'https://github.com/CuyZ/Valinor/commit/718d3c1bc2ea7d28b4b1f6c062addcd1dde8660b'}, {'type': 'PACKAGE', 'url': 'https://github.com/CuyZ/Valinor'}, {'type': 'WEB', 'url': 'https://github.com/CuyZ/Va...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T13:39:45Z', 'nvd_published_at': None}