schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
8
154
details
stringlengths
31
19.1k
severity
stringlengths
2
92
affected
stringlengths
75
28.5k
references
stringlengths
79
7.48k
database_specific
stringlengths
131
196
1.4.0
GHSA-fjpm-hf7c-xgc2
2022-11-29T21:20:25Z
2022-01-13T00:00:54Z
null
['CVE-2022-23110']
Stored XSS vulnerability in Jenkins Publish Over SSH Plugin
Jenkins Publish Over SSH Plugin 1.22 and earlier does not escape the SSH server name, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Overall/Administer permission.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:publish-over-ssh'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.23'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23110'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/publish-over-ssh-plugin'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/publish-over-ssh-plugin/releases/tag/publish-over-ssh-1.23'}, {'type': 'WEB', 'url': 'https://www.jenk...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T21:20:25Z', 'nvd_published_at': '2022-01-12T20:15:00Z'}
1.4.0
GHSA-8w54-22w9-3g8f
2022-01-31T20:25:54Z
2022-01-28T23:10:40Z
null
[]
Cross-site Scripting and Open Redirect in Products.CMFPlone
### Impact Plone is vulnerable to reflected cross site scripting and open redirect when an attacker can get a compromised version of the image_view_fullscreen page in a cache, for example in Varnish. The technique is known as cache poisoning. Any later visitor can get redirected when clicking on a link on this page. Us...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Products.CMFPlone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/plone/Products.CMFPlone/security/advisories/GHSA-8w54-22w9-3g8f'}, {'type': 'PACKAGE', 'url': 'https://github.com/plone/Products.CMFPlone'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-28T21:56:53Z', 'nvd_published_at': None}
1.4.0
GHSA-gh88-3pxp-6fm8
2022-01-21T21:04:45Z
2022-01-21T23:39:50Z
null
['CVE-2021-23567']
Infinite Loop in colors.js
The package colors after 1.4.0 are vulnerable to Denial of Service (DoS) that was introduced through an infinite loop in the americanFlag module. Unfortunately this appears to have been a purposeful attempt by a maintainer of colors to make the package unusable, other maintainers' controls over this package appear to h...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'colors'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23567'}, {'type': 'WEB', 'url': 'https://github.com/Marak/colors.js/issues/285'}, {'type': 'WEB', 'url': 'https://github.com/Marak/colors.js/issues/285%23issuecomment-1008212640'}, {'type': 'WEB', 'url': 'https://github.com/Marak/colors.js/commit/0...
{'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-21T21:04:45Z', 'nvd_published_at': '2022-01-14T20:15:00Z'}
1.4.0
GHSA-x3g3-jh26-76cf
2022-02-02T16:05:32Z
2022-01-28T23:06:00Z
null
['CVE-2022-0375']
Cross-site Scripting in livehelperchat
LiveHelperChat is vulnerable to Stored XSS at the Name field in the Admin themes of System configuration.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.93'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0375'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/bbfaa26ce54a2a86ce1a42a16496038f5bdfc102'}, {'type': 'PACKAGE', 'url': 'https://github.com/livehelperchat/livehelperchat/'}, {'type': 'WEB', 'url': 'https://hun...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-27T23:20:44Z', 'nvd_published_at': '2022-01-26T10:15:00Z'}
1.4.0
GHSA-4hpf-3wq7-5rpr
2021-04-23T20:09:28Z
2022-01-06T20:44:07Z
null
['CVE-2018-1107']
Regular expression deinal of service (ReDoS) in is-my-json-valid
It was discovered that the is-my-json-valid JavaScript library used an inefficient regular expression to validate JSON fields defined to have email format. A specially crafted JSON file could cause it to consume an excessive amount of CPU time when validated.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'is-my-json-valid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.17.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'is-my-json-valid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1107'}, {'type': 'WEB', 'url': 'https://github.com/mafintosh/is-my-json-valid/pull/159'}, {'type': 'WEB', 'url': 'https://github.com/mafintosh/is-my-json-valid/commit/b3051b277f7caa08cd2edc6f74f50aeda65d2976'}, {'type': 'WEB', 'url': 'https://bugzi...
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T21:45:17Z', 'nvd_published_at': '2021-03-30T02:15:00Z'}
1.4.0
GHSA-rvh4-g2rj-hr9c
2023-05-24T18:12:32Z
2022-01-21T23:38:05Z
null
['CVE-2022-23107']
Path Traversal in Jenkins Warnings Next Generation Plugin
Jenkins Warnings Next Generation Plugin prior to 9.10.3, 9.7.1, 9.5.2, and 9.0.2 does not restrict the name of a file when configuring a custom ID. This allows attackers with Item/Configure permission to write and read specific files with a hard-coded suffix on the Jenkins controller file system. Warnings Next Genera...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:warnings-ng'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.8.0'}, {'fixed': '9.10.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:warnings-ng'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.6.0'}, ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23107'}, {'type': 'WEB', 'url': 'https://github.com/CVEProject/cvelist/blob/36f932156733baab1b13868be4338de406a1dec7/2022/23xxx/CVE-2022-23107.json'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/warnings-ng-plugin'}, {'type': 'WEB', 'u...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-20T14:51:23Z', 'nvd_published_at': '2022-01-12T20:15:00Z'}
1.4.0
GHSA-8wq7-hhjj-fpqv
2023-07-11T00:21:57Z
2022-01-22T00:00:50Z
null
['CVE-2022-22930']
RCE in Mingsoft MCMS
A remote code execution (RCE) vulnerability in the Template Management function of MCMS allows attackers to execute arbitrary code via a crafted payload.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22930'}, {'type': 'WEB', 'url': 'https://github.com/ming-soft/MCMS/issues/98'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220201022121/https://gitee.com/mingSoft/MCMS/issues/I4Q4M6'}]
{'cwe_ids': ['CWE-1336'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-11T00:21:57Z', 'nvd_published_at': '2022-01-21T00:15:00Z'}
1.4.0
GHSA-mgpf-hhgf-cxg4
2022-07-13T18:50:38Z
2022-01-08T00:43:16Z
null
['CVE-2021-45457']
In Apache Kylin, Cross-origin requests with credentials are allowed to be sent from any origin.
In Apache Kylin, Cross-origin requests with credentials are allowed to be sent from any origin. This issue affects Apache Kylin 2 version 2.6.6 and prior versions; Apache Kylin 3 version 3.1.2 and prior versions; Apache Kylin 4 version 4.0.0 and prior versions.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.kylin:kylin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.kylin:kylin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.1'}]}]...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45457'}, {'type': 'WEB', 'url': 'https://github.com/apache/kylin/pull/1781'}, {'type': 'WEB', 'url': 'https://github.com/apache/kylin/pull/1782'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/kylin'}, {'type': 'WEB', 'url': 'https://lists....
{'cwe_ids': ['CWE-522'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T23:13:40Z', 'nvd_published_at': '2022-01-06T13:15:00Z'}
1.4.0
GHSA-728c-42pc-fwxg
2022-01-19T14:08:43Z
2022-01-21T23:54:50Z
null
['CVE-2022-0242']
Unrestricted Upload of File with Dangerous Type in Crater
Unrestricted Upload of File with Dangerous Type in GitHub repository crater-invoice/crater prior to 6.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'bytefury/crater'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0242'}, {'type': 'WEB', 'url': 'https://github.com/crater-invoice/crater/commit/dcb3ddecb9f4cde622cc42c51a2760747797624f'}, {'type': 'PACKAGE', 'url': 'https://github.com/crater-invoice/crater'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1...
{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T14:08:43Z', 'nvd_published_at': '2022-01-17T19:15:00Z'}
1.4.0
GHSA-g87r-23vw-7f87
2022-01-06T20:20:42Z
2022-01-06T22:00:21Z
null
['CVE-2021-45719']
Use After Free in rusqlite
An issue was discovered in the rusqlite crate 0.25.x before 0.25.4 and 0.26.x before 0.26.2 for Rust. update_hook has a use-after-free.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'rusqlite'}, 'ecosystem_specific': {'affected_functions': ['rusqlite::Connection::update_hook']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.25.0'}, {'fixed': '0.25.4'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'rusqlite'}, 'ecosystem_specific...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45719'}, {'type': 'WEB', 'url': 'https://github.com/rusqlite/rusqlite/issues/1048'}, {'type': 'PACKAGE', 'url': 'https://github.com/rusqlite/rusqlite/'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/rusq...
{'cwe_ids': ['CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T21:01:21Z', 'nvd_published_at': '2021-12-26T22:15:00Z'}
1.4.0
GHSA-wppj-3pjr-9w79
2022-01-20T15:08:18Z
2022-01-21T23:55:11Z
null
['CVE-2021-4080']
crater is vulnerable to Unrestricted Upload of File with Dangerous Type
crater is vulnerable to Unrestricted Upload of File with Dangerous Type
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'bytefury/crater'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4080'}, {'type': 'WEB', 'url': 'https://github.com/crater-invoice/crater/commit/cdc913d16cf624aee852bc9163a7c6ffc8d1da9d'}, {'type': 'PACKAGE', 'url': 'https://github.com/crater-invoice/crater'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d...
{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-20T15:08:18Z', 'nvd_published_at': '2022-01-12T14:15:00Z'}
1.4.0
GHSA-73q9-7pwj-gm46
2022-01-19T14:28:08Z
2022-01-21T23:46:12Z
null
['CVE-2021-3862']
icecoder is vulnerable to Cross-site Scripting
icecoder is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'icecoder/icecoder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '8.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3862'}, {'type': 'WEB', 'url': 'https://github.com/icecoder/icecoder/commit/51cf24b2a39138e6a7b5739ef59eb38cd7c39763'}, {'type': 'PACKAGE', 'url': 'https://github.com/icecoder/icecoder'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/5c9c228e-...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T14:28:08Z', 'nvd_published_at': '2022-01-17T14:15:00Z'}
1.4.0
GHSA-g4g4-3pqw-8m7f
2022-01-06T20:20:29Z
2022-01-06T22:02:01Z
null
['CVE-2021-45718']
Use After Free in rusqlite
An issue was discovered in the rusqlite crate 0.25.x before 0.25.4 and 0.26.x before 0.26.2 for Rust. rollback_hook has a use-after-free.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'rusqlite'}, 'ecosystem_specific': {'affected_functions': ['rusqlite::Connection::rollback_hook']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.25.0'}, {'fixed': '0.25.4'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'rusqlite'}, 'ecosystem_specif...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45718'}, {'type': 'WEB', 'url': 'https://github.com/rusqlite/rusqlite/issues/1048'}, {'type': 'PACKAGE', 'url': 'https://github.com/rusqlite/rusqlite/'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/rusq...
{'cwe_ids': ['CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T20:59:28Z', 'nvd_published_at': '2021-12-26T22:15:00Z'}
1.4.0
GHSA-7wq4-89xx-g62j
2022-02-02T16:15:02Z
2022-01-28T22:13:57Z
null
['CVE-2022-23223']
Password exposure in ShenYu
The HTTP response will disclose the user password. This issue affected Apache ShenYu 2.4.0 and 2.4.1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.shenyu:shenyu-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23223'}, {'type': 'WEB', 'url': 'https://github.com/apache/shenyu/pull/2357'}, {'type': 'WEB', 'url': 'https://github.com/apache/shenyu/commit/0e826ceae97a1258cb15c73a3072118c920e8654'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/incubat...
{'cwe_ids': ['CWE-319', 'CWE-522'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-26T22:42:18Z', 'nvd_published_at': '2022-01-25T13:15:00Z'}
1.4.0
GHSA-cw68-xmm4-c83r
2022-11-29T21:35:52Z
2022-01-13T00:00:53Z
null
['CVE-2022-23117']
Agent-to-controller security bypass in Jenkins Conjur Secrets Plugin allows retrieving all credentials
Jenkins Conjur Secrets Plugin 1.0.9 and earlier implements functionality that allows attackers able to control agent processes to retrieve all username/password credentials stored on the Jenkins controller.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.conjur.jenkins:conjur-credentials'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23117'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/conjur-credentials-plugin/pull/19'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/conjur-credentials-plugin'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/conjur-cre...
{'cwe_ids': ['CWE-269'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T21:35:52Z', 'nvd_published_at': '2022-01-12T20:15:00Z'}
1.4.0
GHSA-q4j7-v27r-fgcx
2022-01-11T18:13:17Z
2022-01-13T15:00:36Z
null
['CVE-2021-23543']
Prototype Pollution in realms-shim
All versions of package realms-shim are vulnerable to Sandbox Bypass via a Prototype Pollution attack vector.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'realms-shim'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23543'}, {'type': 'PACKAGE', 'url': 'https://github.com/Agoric/realms-shim'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-REALMSSHIM-2309908'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/realms-shim'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-11T18:13:17Z', 'nvd_published_at': '2022-01-10T14:10:00Z'}
1.4.0
GHSA-8vj2-vxx3-667w
2023-09-04T16:45:05Z
2022-01-12T20:07:33Z
null
['CVE-2022-22817']
Arbitrary expression injection in Pillow
`PIL.ImageMath.eval` in Pillow before 9.0.0 allows evaluation of arbitrary expressions, such as ones that use the Python exec method `ImageMath.eval("exec(exit())")`. While Pillow 9.0.0 restricted top-level builtins available to PIL.ImageMath.eval(), it did not prevent builtins available to lambda expressions. These a...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22817'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/8531b01d6cdf0b70f256f93092caa2a5d91afc11'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debi...
{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-11T18:03:44Z', 'nvd_published_at': '2022-01-10T14:12:00Z'}
1.4.0
GHSA-2969-8hh9-57jc
2022-01-07T17:53:54Z
2022-01-06T22:09:49Z
null
['CVE-2021-45699']
Allocation of Resources Without Limits or Throttling in ckb
An issue was discovered in the ckb crate before 0.40.0 for Rust. Remote attackers may be able to conduct a 51% attack against the Nervos CKB blockchain by triggering an inability to allocate memory for the misbehavior HashMap.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'ckb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.40.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/nervosnetwork/ckb/security/advisories/GHSA-48vq-8jqv-gm6f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45699'}, {'type': 'PACKAGE', 'url': 'https://github.com/nervosnetwork/ckb'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/a...
{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T23:46:28Z', 'nvd_published_at': '2021-12-27T00:15:00Z'}
1.4.0
GHSA-qqc2-pv68-q72h
2023-07-12T00:33:34Z
2022-01-27T00:01:02Z
null
['CVE-2021-46383']
Mingsoft MCMS SQL injection vulnerability
Mingsoft MCMS contains a SQL injection vulnerability relating to the component `net.mingsoft.mdiy.action.web.DictAction#list`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.5'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46383'}, {'type': 'WEB', 'url': 'https://gitee.com/mingSoft/MCMS/issues/I4QZ1I'}]
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T00:33:34Z', 'nvd_published_at': '2022-01-26T17:15:00Z'}
1.4.0
GHSA-6p3c-v8vc-c244
2023-06-13T18:33:17Z
2022-01-06T22:10:34Z
null
['CVE-2021-45697']
The `total_size` function for partial read the length of any `FixVec` is incorrect in molecule.
Anyone who uses total_size(..) function to partial read the length of any FixVec will get an incorrect result, due to an incorrect implementation. This has been resolved in the 0.7.2 release.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'molecule'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/nervosnetwork/molecule/security/advisories/GHSA-82hm-vh7g-hrh9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45697'}, {'type': 'WEB', 'url': 'https://github.com/nervosnetwork/molecule/pull/49'}, {'type': 'PACKAGE', 'url': 'https://github.com/nervos...
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T14:29:54Z', 'nvd_published_at': '2021-12-27T00:15:00Z'}
1.4.0
GHSA-5rqg-jm4f-cqx7
2022-01-10T19:56:36Z
2022-01-10T17:29:53Z
null
[]
Infinite loop causing Denial of Service in colors
colors is a library for including colored text in node.js consoles. Between 07 and 09 January 2022, colors versions 1.4.1, 1.4.2, and 1.4.44-liberty-2 were published including malicious code that caused a Denial of Service due to an infinite loop. Software dependent on these versions experienced the printing of randomi...
[]
[{'package': {'ecosystem': 'npm', 'name': 'colors'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.1'}, {'last_affected': '1.4.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'colors'}, 'versions': ['1.4.44-liberty-2']}]
[{'type': 'WEB', 'url': 'https://github.com/Marak/colors.js/commit/137c6dae3339e97f4bbc838c221803c363b0a9fd'}, {'type': 'WEB', 'url': 'https://github.com/Marak/colors.js/commit/5d2d242f656103ac38086d6b26433a09f1c38c75'}, {'type': 'WEB', 'url': 'https://github.com/Marak/colors.js/commit/6bc50e79eeaa1d87369bb3e7e608ebed1...
{'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-10T17:29:22Z', 'nvd_published_at': None}
1.4.0
GHSA-mh83-jcw5-rjh8
2022-01-20T15:33:35Z
2022-01-14T21:07:23Z
null
['CVE-2022-0198']
XML External Entity Reference in edu.stanford.nlp:stanford-corenlp
The TransformXML() function makes use of SAXParser generated from a SAXParserFactory with no FEATURE_SECURE_PROCESSING set, allowing for XXE attacks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'edu.stanford.nlp:stanford-corenlp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0198'}, {'type': 'WEB', 'url': 'https://github.com/stanfordnlp/corenlp/commit/1f52136321cfca68b991bd7870563d06cf96624d'}, {'type': 'PACKAGE', 'url': 'https://github.com/stanfordnlp/corenlp/'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3d7e...
{'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-14T20:54:24Z', 'nvd_published_at': '2022-01-13T07:15:00Z'}
1.4.0
GHSA-v567-q267-phpg
2022-01-25T20:49:25Z
2022-01-21T23:50:11Z
null
['CVE-2022-0257']
pimcore is vulnerable to Cross-site Scripting
pimcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.2.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0257'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/dfaf78b26fb77990267c0cc05b9fcb9f8de7b66d'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/bad2073c-bbd5...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T14:22:39Z', 'nvd_published_at': '2022-01-17T16:15:00Z'}
1.4.0
GHSA-w428-f65r-h4q2
2022-01-07T17:23:21Z
2022-01-06T22:13:12Z
null
['CVE-2021-45687']
Deserialization of Untrusted Data in rust-cpuid
An issue was discovered in the raw-cpuid crate before 9.1.1 for Rust. If the serialize feature is used (which is not the the default), a Deserialize operation may lack sufficient validation, leading to memory corruption or a panic.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'raw-cpuid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '9.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45687'}, {'type': 'WEB', 'url': 'https://github.com/gz/rust-cpuid/issues/43'}, {'type': 'PACKAGE', 'url': 'https://github.com/gz/rust-cpuid'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/raw-cpuid/RUSTS...
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T16:40:56Z', 'nvd_published_at': '2021-12-27T00:15:00Z'}
1.4.0
GHSA-mw25-f5r2-hpc6
2022-01-13T18:33:06Z
2022-01-06T22:23:25Z
null
['CVE-2021-34797']
Insertion of Sensitive Information into Log File in Apache Geode
Apache Geode versions up to 1.12.4 and 1.13.4 are vulnerable to a log file redaction of sensitive information flaw when using values that begin with characters other than letters or numbers for passwords and security properties with the prefix "sysprop-", "javax.net.ssl", or "security-". This issue is fixed by overhaul...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.geode:geode-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.geode:geode-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.0'}, {'fixed':...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-34797'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/geode'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/nq2w9gjzm1cjx1rh6zw41ty39qw7qpx4'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/p4l0g49rzzzpn8yt9q9p0xp52h3z...
{'cwe_ids': ['CWE-532'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T19:57:18Z', 'nvd_published_at': '2022-01-04T09:15:00Z'}
1.4.0
GHSA-9wxh-jjj5-67cv
2023-05-24T17:47:11Z
2022-01-13T00:00:58Z
null
['CVE-2022-20620']
Missing permission checks in SSH Agent Plugin allow enumerating credentials IDs
Jenkins SSH Agent Plugin prior to 1.23.2 and 1.22.1 does not perform permission checks in several HTTP endpoints. This allows attackers with Overall/Read access to enumerate credentials IDs of credentials stored in Jenkins. Those can be used as part of an attack to capture the credentials using another vulnerability. ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ssh-agent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.23'}, {'fixed': '1.23.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ssh-agent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-20620'}, {'type': 'WEB', 'url': 'https://github.com/CVEProject/cvelist/blob/2d78eb36f4d084db7fb35f1535d8d84fdcb7d859/2022/20xxx/CVE-2022-20620.jsonhttps://github.com/CVEProject/cvelist/blob/2d78eb36f4d084db7fb35f1535d8d84fdcb7d859/2022/20xxx/CVE-20...
{'cwe_ids': ['CWE-668', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-27T21:24:04Z', 'nvd_published_at': '2022-01-12T20:15:00Z'}
1.4.0
GHSA-cqr2-xhg6-p268
2021-07-28T22:40:26Z
2022-01-07T00:20:27Z
null
['CVE-2020-7632']
OS Command Injection in node-mpv
node-mpv through 1.4.3 is vulnerable to Command Injection. It allows execution of arbitrary commands via the options argument.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'node-mpv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7632'}, {'type': 'WEB', 'url': 'https://github.com/j-holub/Node-MPV/blob/master/lib/util.js#L34'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NODEMPV-564426'}]
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T22:42:30Z', 'nvd_published_at': '2020-04-06T13:15:00Z'}
1.4.0
GHSA-6jhm-4vmx-mr76
2022-02-02T16:11:16Z
2022-01-28T22:08:14Z
null
['CVE-2022-0332']
SQL injection in Moodle
A flaw was found in Moodle in versions 3.11 to 3.11.4. An SQL injection risk was identified in the h5p activity web service responsible for fetching user attempt data.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11'}, {'fixed': '3.11.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0332'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/c7a62a8c82219b50589257f79021da1df1a76808'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2043661'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle...
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-26T22:49:44Z', 'nvd_published_at': '2022-01-25T20:15:00Z'}
1.4.0
GHSA-5r9v-8w62-r26j
2022-01-25T19:13:21Z
2022-01-21T23:48:25Z
null
['CVE-2022-0253']
livehelperchat is vulnerable to Cross-site Scripting
livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.91'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0253'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/407d0b1a1fa56fa6f824a19092774f10f4880437'}, {'type': 'PACKAGE', 'url': 'https://github.com/livehelperchat/livehelperchat'}, {'type': 'WEB', 'url': 'https://hunt...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T14:15:02Z', 'nvd_published_at': '2022-01-17T14:15:00Z'}
1.4.0
GHSA-qrpm-p2h7-hrv2
2022-03-18T13:15:55Z
2022-01-21T23:57:06Z
null
['CVE-2021-23566']
Exposure of Sensitive Information to an Unauthorized Actor in nanoid
The package nanoid from 3.0.0, before 3.1.31, are vulnerable to Information Exposure via the valueOf() function which allows to reproduce the last id generated.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'nanoid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.31'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23566'}, {'type': 'WEB', 'url': 'https://github.com/ai/nanoid/pull/328'}, {'type': 'WEB', 'url': 'https://github.com/ai/nanoid/commit/2b7bd9332bc49b6330c7ddb08e5c661833db2575'}, {'type': 'WEB', 'url': 'https://gist.github.com/artalar/bc6d1eb9a3477d...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-18T21:54:04Z', 'nvd_published_at': '2022-01-14T20:15:00Z'}
1.4.0
GHSA-84wg-rgp8-2hg4
2022-09-21T19:38:47Z
2022-01-08T00:40:33Z
null
['CVE-2021-38542']
Command Injection in Apache James
Apache James prior to release 3.6.1 is vulnerable to a buffering attack relying on the use of the STARTTLS command. This can result in Man-in -the-middle command injection attacks, leading potentially to leakage of sensible information.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.james:james-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38542'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2022/01/04/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/01/04/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/...
{'cwe_ids': ['CWE-327', 'CWE-77'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T18:35:11Z', 'nvd_published_at': '2022-01-04T09:15:00Z'}
1.4.0
GHSA-frxp-xxx8-hrg6
2022-01-07T20:43:46Z
2022-01-08T00:31:52Z
null
['CVE-2022-22108']
Missing Authorization in DayByDay CRM
In Daybyday CRM, versions 2.0.0 through 2.2.0 are vulnerable to Missing Authorization. An attacker that has the lowest privileges account (employee type user), can view the absences of all users in the system including administrators. This type of user is not authorized to view this kind of information.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'bottelet/flarepoint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22108'}, {'type': 'WEB', 'url': 'https://github.com/Bottelet/DaybydayCRM/commit/fe842ea5ede237443f1f45a99aeb839133115d8b'}, {'type': 'PACKAGE', 'url': 'https://github.com/Bottelet/DaybydayCRM/'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftw...
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T20:43:46Z', 'nvd_published_at': '2022-01-05T15:15:00Z'}
1.4.0
GHSA-gcv9-6737-pjqw
2022-02-02T16:14:01Z
2022-01-27T16:24:26Z
null
['CVE-2022-21697']
SSRF vulnerability in jupyter-server-proxy
### Impact **What kind of vulnerability is it?** Server-Side Request Forgery ( SSRF ) **Who is impacted?** Any user deploying Jupyter Server or Notebook with jupyter-proxy-server extension enabled. A lack of input validation allowed authenticated clients to proxy requests to other hosts, bypassing the `allowed_hos...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'jupyter-server-proxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/jupyterhub/jupyter-server-proxy/security/advisories/GHSA-gcv9-6737-pjqw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21697'}, {'type': 'WEB', 'url': 'https://github.com/jupyterhub/jupyter-server-proxy/commit/fd31930bacd12188c448c886e0783529436b99e...
{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-25T20:57:43Z', 'nvd_published_at': '2022-01-25T14:15:00Z'}
1.4.0
GHSA-wpg7-2c88-r8xv
2022-02-03T16:08:56Z
2022-01-28T22:54:16Z
null
['CVE-2022-0355']
Exposure of Sensitive Information in simple-get
In versions of simple-get prior to 4.0.1, 3.1.1, and 2.8.2, when fetching a remote url with a cookie location response, headers will be followed, potentially resulting in an exposure of the session cookie to a third party.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'simple-get'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.1'}]}], 'versions': ['4.0.0']}, {'package': {'ecosystem': 'npm', 'name': 'simple-get'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.1'}]}]}...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0355'}, {'type': 'WEB', 'url': 'https://github.com/feross/simple-get/pull/75#issuecomment-1027755026'}, {'type': 'WEB', 'url': 'https://github.com/feross/simple-get/pull/76#issuecomment-1027754710'}, {'type': 'WEB', 'url': 'https://github.com/feros...
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-27T23:17:09Z', 'nvd_published_at': '2022-01-26T04:15:00Z'}
1.4.0
GHSA-h29c-wcm8-883h
2022-01-19T19:32:41Z
2022-01-21T23:20:17Z
null
['CVE-2022-21694']
Incorrect Permission Assignment for Critical Resource in OnionShare
Between September 26, 2021 and October 8, 2021, [Radically Open Security](https://www.radicallyopensecurity.com/) conducted a penetration test of OnionShare 2.4, funded by the Open Technology Fund's [Red Team lab](https://www.opentech.fund/labs/red-team-lab/). This is an issue from that penetration test. - Vulnerabili...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'onionshare-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixed': '2.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/onionshare/onionshare/security/advisories/GHSA-h29c-wcm8-883h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21694'}, {'type': 'WEB', 'url': 'https://github.com/onionshare/onionshare/issues/1389'}, {'type': 'PACKAGE', 'url': 'https://github.com/onio...
{'cwe_ids': ['CWE-732'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T19:32:41Z', 'nvd_published_at': '2022-01-18T23:15:00Z'}
1.4.0
GHSA-9fj5-jg6f-qg5r
2023-07-21T19:24:02Z
2022-01-08T00:43:09Z
null
['CVE-2021-45458']
Use of Hard-coded Credentials in Apache Kylin
Apache Kylin provides encryption classes PasswordPlaceholderConfigurer to help users encrypt their passwords. In the encryption algorithm used by this encryption class, the cipher is initialized with a hardcoded key and IV. If users use class PasswordPlaceholderConfigurer to encrypt their password and configure it into...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.kylin:kylin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.kylin:kylin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.1'}]}]...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45458'}, {'type': 'WEB', 'url': 'https://github.com/apache/kylin/pull/1781'}, {'type': 'WEB', 'url': 'https://github.com/apache/kylin/pull/1782'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/kylin'}, {'type': 'WEB', 'url': 'https://lists....
{'cwe_ids': ['CWE-326', 'CWE-330', 'CWE-798'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T22:53:35Z', 'nvd_published_at': '2022-01-06T13:15:00Z'}
1.4.0
GHSA-5mj6-3cmq-fh34
2022-01-06T19:38:50Z
2022-01-06T22:22:46Z
null
['CVE-2022-0079']
showdoc is vulnerable to Generation of Error Message Containing Sensitive Information
showdoc is vulnerable to Generation of Error Message Containing Sensitive Information
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0079'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/e43df0a190f68aefa272507d3bd54475f566c1db'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b37f0e26-355a...
{'cwe_ids': ['CWE-209'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T19:38:50Z', 'nvd_published_at': '2022-01-03T03:15:00Z'}
1.4.0
GHSA-6pj2-5fqq-xvjc
2022-01-06T18:54:41Z
2022-01-06T20:56:27Z
null
['CVE-2021-23803']
Incorrect Authorization in latte/latte
This affects the package latte/latte before 2.10.6. There is a way to bypass allowFunctions that will affect the security of the application. When the template is set to allow/disallow the use of certain functions, adding control characters (x00-x08) after the function will bypass these restrictions.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'latte/latte'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23803'}, {'type': 'WEB', 'url': 'https://github.com/nette/latte/issues/279'}, {'type': 'WEB', 'url': 'https://github.com/nette/latte/commit/227c86eda9a8a6d060ea8501923e768b6d992210'}, {'type': 'PACKAGE', 'url': 'https://github.com/nette/latte'}, {'...
{'cwe_ids': ['CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T18:54:41Z', 'nvd_published_at': '2021-12-17T20:15:00Z'}
1.4.0
GHSA-7v3x-h7r2-34jv
2022-01-20T16:18:28Z
2022-01-21T18:43:05Z
null
[]
Insufficient Session Expiration in Pterodactyl API
### Impact A vulnerability exists in Pterodactyl Panel `<= 1.6.6` that could allow a malicious attacker that compromises an API key to generate an authenticated user session that is not revoked when the API key is deleted, thus allowing the malicious user to remain logged in as the user the key belonged to. It is impo...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pterodactyl/panel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pterodactyl/panel/security/advisories/GHSA-7v3x-h7r2-34jv'}, {'type': 'WEB', 'url': 'https://github.com/pterodactyl/panel/commit/dfa329ddf242908b60e22e3340ea36359eab1ef4'}, {'type': 'PACKAGE', 'url': 'https://github.com/pterodactyl/panel'}, {'type': 'WEB', 'url': 'https://git...
{'cwe_ids': ['CWE-613'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-20T16:18:28Z', 'nvd_published_at': None}
1.4.0
GHSA-8qvx-f5gf-g43v
2022-01-20T15:34:33Z
2022-01-12T22:54:50Z
null
['CVE-2022-0174']
Logic error in dolibarr
The application does not check the input of price number lead to Business Logic error through negative price amount.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '15.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0174'}, {'type': 'WEB', 'url': 'https://github.com/dolibarr/dolibarr/commit/d892160f4f130385a3ce520f66cb8cf2eb8c5c32'}, {'type': 'PACKAGE', 'url': 'https://github.com/dolibarr/dolibarr'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ed3ed4ce-...
{'cwe_ids': ['CWE-1284', 'CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-11T18:42:50Z', 'nvd_published_at': '2022-01-10T18:15:00Z'}
1.4.0
GHSA-p3rp-vmj9-gv6v
2022-01-06T19:02:22Z
2022-01-06T19:45:59Z
null
['CVE-2021-43861']
Incorrect sanitisation function leads to `XSS` in mermaid
### Impact Malicious diagrams can contain javascript code that can be run at diagram readers machines. ### Patches The users should upgrade to version 8.13.8 ### Workarounds You need to upgrade in order to avoid this issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'mermaid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.13.8'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/mermaid-js/mermaid/security/advisories/GHSA-p3rp-vmj9-gv6v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43861'}, {'type': 'WEB', 'url': 'https://github.com/mermaid-js/mermaid/commit/066b7a0d0bda274d94a2f2d21e4323dab5776d83'}, {'type': 'PACKAGE', '...
{'cwe_ids': ['CWE-20', 'CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T19:02:22Z', 'nvd_published_at': '2021-12-30T14:15:00Z'}
1.4.0
GHSA-c5hx-w945-j4pq
2022-01-07T18:29:04Z
2022-01-06T22:08:33Z
null
['CVE-2021-45706']
Memory flaw in zeroize_derive
An issue was discovered in the zeroize_derive crate before 1.1.1 for Rust. Dropped memory is not zeroed out for an enum.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'zeroize_derive'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45706'}, {'type': 'WEB', 'url': 'https://github.com/iqlusioninc/crates/issues/876'}, {'type': 'PACKAGE', 'url': 'https://github.com/RustCrypto/utils/tree/master/zeroize/derive'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/adv...
{'cwe_ids': ['CWE-459'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T23:01:59Z', 'nvd_published_at': '2021-12-27T00:15:00Z'}
1.4.0
GHSA-jgm9-xpfj-4fq6
2022-01-19T19:28:05Z
2022-01-21T23:20:19Z
null
['CVE-2022-21693']
Path traversal in Onionshare
Between September 26, 2021 and October 8, 2021, [Radically Open Security](https://www.radicallyopensecurity.com/) conducted a penetration test of OnionShare 2.4, funded by the Open Technology Fund's [Red Team lab](https://www.opentech.fund/labs/red-team-lab/). This is an issue from that penetration test. - Vulnerabili...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'onionshare-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3'}, {'fixed': '2.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/onionshare/onionshare/security/advisories/GHSA-jgm9-xpfj-4fq6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21693'}, {'type': 'PACKAGE', 'url': 'https://github.com/onionshare/onionshare'}, {'type': 'WEB', 'url': 'https://github.com/onionshare/onion...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T19:28:05Z', 'nvd_published_at': '2022-01-18T22:15:00Z'}
1.4.0
GHSA-8wf2-3ggj-78q9
2022-01-28T22:31:16Z
2022-01-28T22:44:40Z
null
['CVE-2022-23807']
Improper Authentication in phpmyadmin
An issue was discovered in phpMyAdmin 4.9 before 4.9.8 and 5.1 before 5.1.2. A valid user who is already authenticated to phpMyAdmin can manipulate their account to bypass two-factor authentication for future login instances.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.9.0'}, {'fixed': '4.9.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}, {'fixed': '...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23807'}, {'type': 'WEB', 'url': 'https://github.com/phpmyadmin/phpmyadmin/commit/ca54f1db050859eb8555875c6aa5d7796fdf4b32'}, {'type': 'PACKAGE', 'url': 'https://github.com/phpmyadmin/phpmyadmin'}, {'type': 'WEB', 'url': 'https://www.phpmyadmin.net/...
{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-28T22:31:16Z', 'nvd_published_at': '2022-01-22T02:15:00Z'}
1.4.0
GHSA-7vxc-chqj-h83g
2022-01-07T16:11:21Z
2022-01-06T22:02:18Z
null
['CVE-2021-4168']
showdoc is vulnerable to Cross-Site Request Forgery (CSRF)
showdoc is vulnerable to Cross-Site Request Forgery (CSRF).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.15'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4168'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/3ff0c85d439ccbdfadeb96b5a52acf6318041109'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/f14431e2-f1f6...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T21:30:44Z', 'nvd_published_at': '2021-12-26T14:15:00Z'}
1.4.0
GHSA-r8j4-96mx-rjcc
2022-02-24T18:37:30Z
2022-01-21T18:13:42Z
null
['CVE-2022-0219']
Improper Restriction of XML External Entity Reference in skylot/jadx
skylot/jadx prior to 1.3.2 is vulnerable to Improper Restriction of XML External Entities when a user is tricked into exporting a malicious APK file (via the -e option) containing a crafted AndroidManifest.xml / strings.xml to gradle, leading to possible local file disclosure.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.github.skylot:jadx-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0219'}, {'type': 'WEB', 'url': 'https://github.com/skylot/jadx/commit/d22db30166e7cb369d72be41382bb63ac8b81c52'}, {'type': 'PACKAGE', 'url': 'https://github.com/skylot/jadx'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0d093863-29e8-4dd7-a8...
{'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-21T16:54:58Z', 'nvd_published_at': '2022-01-20T17:15:00Z'}
1.4.0
GHSA-fgfm-hqjw-3265
2022-01-06T18:35:59Z
2022-01-06T22:18:46Z
null
['CVE-2018-25025']
Out-of-bounds Write in actix-web
An issue was discovered in the actix-web crate before 0.7.15 for Rust. It can unsoundly extend the lifetime of a string, leading to memory corruption.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'actix-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.15'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25025'}, {'type': 'WEB', 'url': 'https://github.com/actix/actix-web/issues/289'}, {'type': 'PACKAGE', 'url': 'https://github.com/actix/actix-web.git'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/actix-...
{'cwe_ids': ['CWE-787'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T18:35:59Z', 'nvd_published_at': '2021-12-27T00:15:00Z'}
1.4.0
GHSA-gc67-crq6-hgh5
2022-01-06T23:39:35Z
2022-01-06T23:59:25Z
null
['CVE-2021-41561']
Improper Input Validation in Parquet-MR
Improper Input Validation vulnerability in Parquet-MR of Apache Parquet allows an attacker to DoS by malicious Parquet files. This issue affects Apache Parquet-MR version 1.9.0 and later versions.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.parquet:parquet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.0'}, {'fixed': '1.12.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.parquet:parquet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41561'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/parquet-mr'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/1bjlscbqtfzl160hrm9lnpjpppp5z3zr'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/12/20/1...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T23:39:35Z', 'nvd_published_at': '2021-12-20T12:15:00Z'}
1.4.0
GHSA-v938-qcc9-rwv8
2023-06-13T17:06:30Z
2022-01-06T22:17:09Z
null
['CVE-2020-36512']
Use of Uninitialized Resource in buffoon.
Affected versions of this crate passes an uninitialized buffer to a user-provided Read implementation. Arbitrary Read implementations can read from the uninitialized buffer (memory exposure) and also can return incorrect number of bytes written to the buffer. Reading from uninitialized memory produces undefined values ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'buffoon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36512'}, {'type': 'WEB', 'url': 'https://github.com/carllerche/buffoon/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/carllerche/buffoon'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/buffoo...
{'cwe_ids': ['CWE-908'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T18:26:25Z', 'nvd_published_at': '2021-12-27T00:15:00Z'}
1.4.0
GHSA-8c5j-9r9f-c6w8
2022-02-14T22:16:33Z
2022-01-12T19:21:10Z
null
['CVE-2021-45116']
Information disclosure in Django
An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1. Due to leveraging the Django Template Language's variable resolution logic, the dictsort template filter was potentially vulnerable to information disclosure, or an unintended method call, if passed a suitably crafted key.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ecosystem_specific': {'affected_functions': ['django.template.defaultfilters.dictsort', 'django.template.defaultfilters.dictsortreversed']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.26'}]}]}, {'package': {'ecosystem': 'PyP...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45116'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/2a8ec7f546d6d5806e221ec948c5146b55bd7489'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/c7fe895bca06daf12cc1670b56eaf72a1ef27a16'}, {'type': 'WEB', 'url': ...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-12T19:18:36Z', 'nvd_published_at': '2022-01-05T00:15:00Z'}
1.4.0
GHSA-v2ch-fc8f-qm33
2022-01-07T16:24:37Z
2022-01-06T22:16:57Z
null
['CVE-2020-36511']
Use of Uninitialized Resource in bite.
An issue was discovered in the bite crate through 2020-12-31 for Rust. read::BiteReadExpandedExt::read_framed_max may read from uninitialized memory locations.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'bite'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36511'}, {'type': 'WEB', 'url': 'https://github.com/hinaria/bite/issues/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/hinaria/bite'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/bite/RUSTSEC-2020-...
{'cwe_ids': ['CWE-908'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T18:21:51Z', 'nvd_published_at': '2021-12-27T00:15:00Z'}
1.4.0
GHSA-fg7r-2g4j-5cgr
2023-06-13T22:01:00Z
2022-01-06T22:04:37Z
null
['CVE-2021-45710']
Race Condition in tokio
If a tokio::sync::oneshot channel is closed (via the oneshot::Receiver::close method), a data race may occur if the oneshot::Sender::send method is called while the corresponding oneshot::Receiver is awaited or calling try_recv. When these methods are called concurrently on a closed channel, the two halves of the chan...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'tokio'}, 'ecosystem_specific': {'affected_functions': ['tokio::sync::oneshot::Receiver::close']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.14'}, {'fixed': '1.8.4'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'tokio'}, 'ecosystem_specific': ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45710'}, {'type': 'WEB', 'url': 'https://github.com/tokio-rs/tokio/issues/4225'}, {'type': 'PACKAGE', 'url': 'https://github.com/tokio-rs/tokio'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/tokio/RUSTS...
{'cwe_ids': ['CWE-362'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T22:43:36Z', 'nvd_published_at': '2021-12-27T00:15:00Z'}
1.4.0
GHSA-h3vq-wv8j-36gw
2022-01-07T23:45:14Z
2022-01-08T00:44:33Z
null
['CVE-2020-27428']
Cross-site Scripting in Scratch-Svg-Renderer
A DOM-based cross-site scripting (XSS) vulnerability in Scratch-Svg-Renderer v0.2.0 allows attackers to execute arbitrary web scripts or HTML via a crafted sb3 file.
[]
[{'package': {'ecosystem': 'npm', 'name': 'scratch-svg-renderer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-27428'}, {'type': 'WEB', 'url': 'https://github.com/LLK/scratch-svg-renderer/commit/7c74ec7de3254143ec3c557677f5355a90a3d07f'}, {'type': 'PACKAGE', 'url': 'https://github.com/LLK/scratch-svg-renderer'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T23:45:14Z', 'nvd_published_at': '2022-01-06T00:15:00Z'}
1.4.0
GHSA-c697-r227-pq6h
2022-01-25T20:47:39Z
2022-01-21T23:33:58Z
null
['CVE-2022-0263']
Unrestricted Upload of File with Dangerous Type in pimcore
Unrestricted Upload of File with Dangerous Type in Packagist pimcore/pimcore
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.2.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0263'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/35d1853baf64d6a1d90fd8803e52439da53a3911'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/96506857-06bc...
{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T22:27:34Z', 'nvd_published_at': '2022-01-18T16:15:00Z'}
1.4.0
GHSA-w2mh-6xj5-f77f
2023-05-24T17:10:39Z
2022-01-13T00:01:02Z
null
['CVE-2022-20618']
Incorrect Permission Assignment for Critical Resource in Jenkins Bitbucket Branch Source Plugin
Jenkins Bitbucket Branch Source Plugin prior to 746.v350d2781c184, 725.vd9f8be0fa250, 2.9.11.2, and 2.9.7.2 does not perform permission checks in several HTTP endpoints. This allows attackers with Overall/Read access to enumerate credentials IDs of credentials stored in Jenkins. Those can be used as part of an attack ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:cloudbees-bitbucket-branch-source'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '726.v7e6f53de133c'}, {'fixed': '746.v350d2781c184'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:cloudbees-bitbucket-branch-sour...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-20618'}, {'type': 'WEB', 'url': 'https://github.com/CVEProject/cvelist/blob/2d78eb36f4d084db7fb35f1535d8d84fdcb7d859/2022/20xxx/CVE-2022-20618.json'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/bitbucket-branch-source-plugin'}, {'type...
{'cwe_ids': ['CWE-732', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:49:18Z', 'nvd_published_at': '2022-01-12T20:15:00Z'}
1.4.0
GHSA-f8m6-h2c7-8h9x
2022-01-05T17:40:20Z
2022-01-06T17:38:45Z
null
['CVE-2021-43854']
Inefficient Regular Expression Complexity in nltk (word_tokenize, sent_tokenize)
### Impact The vulnerability is present in [`PunktSentenceTokenizer`](https://www.nltk.org/api/nltk.tokenize.punkt.html#nltk.tokenize.punkt.PunktSentenceTokenizer), [`sent_tokenize`](https://www.nltk.org/api/nltk.tokenize.html#nltk.tokenize.sent_tokenize) and [`word_tokenize`](https://www.nltk.org/api/nltk.tokenize.ht...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'nltk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/nltk/nltk/security/advisories/GHSA-f8m6-h2c7-8h9x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43854'}, {'type': 'WEB', 'url': 'https://github.com/nltk/nltk/issues/2866'}, {'type': 'WEB', 'url': 'https://github.com/nltk/nltk/pull/2869'}, {'type': ...
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T17:40:20Z', 'nvd_published_at': '2021-12-23T18:15:00Z'}
1.4.0
GHSA-jv2r-jx6q-89jg
2022-01-07T16:16:57Z
2022-01-06T22:16:32Z
null
['CVE-2021-45682']
Use of Uninitialized Resource in bronzedb-protocol.
An issue was discovered in the bronzedb-protocol crate through 2021-01-03 for Rust. ReadKVExt may read from uninitialized memory locations.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'bronzedb-protocol'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45682'}, {'type': 'WEB', 'url': 'https://github.com/Hexilee/BronzeDB/issues/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/Hexilee/BronzeDB'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/bronzedb-p...
{'cwe_ids': ['CWE-908'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T17:49:03Z', 'nvd_published_at': '2021-12-27T00:15:00Z'}
1.4.0
GHSA-mvff-h3cj-wj9c
2022-04-04T20:40:33Z
2022-01-06T17:36:59Z
null
['CVE-2021-43816']
Unprivileged pod using `hostPath` can side-step active LSM when it is SELinux
### Impact Containers launched through containerd’s CRI implementation on Linux systems which use the SELinux security module and containerd versions since v1.5.0 can cause arbitrary files and directories on the host to be relabeled to match the container process label through the use of specially-configured bind moun...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/containerd/containerd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.9'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/containerd/containerd/security/advisories/GHSA-mvff-h3cj-wj9c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43816'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/issues/6194'}, {'type': 'WEB', 'url': 'https://github.com/containe...
{'cwe_ids': ['CWE-281'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T21:09:16Z', 'nvd_published_at': '2022-01-05T19:15:00Z'}
1.4.0
GHSA-j8rg-4hjm-8r95
2022-11-29T21:23:36Z
2022-01-13T00:00:53Z
null
['CVE-2022-23113']
Path traversal vulnerability in Jenkins Publish Over SSH Plugin
Jenkins Publish Over SSH Plugin 1.22 and earlier performs a validation of the file name specifying whether it is present or not, resulting in a path traversal vulnerability allowing attackers with Item/Configure permission to discover the name of the Jenkins controller files.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:publish-over-ssh'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.23'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23113'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/publish-over-ssh-plugin'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/publish-over-ssh-plugin/releases/tag/publish-over-ssh-1.23'}, {'type': 'WEB', 'url': 'https://www.jenk...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T21:23:36Z', 'nvd_published_at': '2022-01-12T20:15:00Z'}
1.4.0
GHSA-558x-h7rg-997v
2023-05-23T19:36:39Z
2022-01-13T00:01:04Z
null
['CVE-2022-20614']
Incorrect Permission Assignment for Critical Resource in Jenkins Mailer Plugin
Jenkins Mailer Plugin prior to 408.vd726a_1130320 and 1.34.2 does not perform a permission check in a method implementing form validation. This allows attackers with Overall/Read access to use the DNS used by the Jenkins instance to resolve an attacker-specified hostname. Additionally, this form validation method doe...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:mailer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '391.ve4a38c1bcf4b'}, {'fixed': '408.vd726a'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:mailer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduce...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-20614'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2163'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secur...
{'cwe_ids': ['CWE-732', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:50:04Z', 'nvd_published_at': '2022-01-12T20:15:00Z'}
1.4.0
GHSA-8xjp-rp29-v5j8
2023-06-27T22:18:19Z
2022-01-13T00:00:52Z
null
['CVE-2022-23118']
Agent-to-controller security bypass in Jenkins Debian Package Builder Plugin
Jenkins Debian Package Builder Plugin 1.6.11 and earlier implements functionality that allows agent processes to invoke command-line git at an attacker-specified path on the controller. This allows attackers able to control agent processes to invoke arbitrary OS commands on the controller.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'ru.yandex.jenkins.plugins.debuilder:debian-package-builder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.6.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23118'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/debian-package-builder-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2546'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/o...
{'cwe_ids': ['CWE-269', 'CWE-668', 'CWE-693'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-01T20:10:51Z', 'nvd_published_at': '2022-01-12T20:15:00Z'}
1.4.0
GHSA-6gf2-pvqw-37ph
2022-01-18T22:38:44Z
2022-01-12T23:04:06Z
null
['CVE-2021-22060']
Log entry injection in Spring Framework
In Spring Framework versions 5.3.0 - 5.3.13, 5.2.0 - 5.2.18, and older unsupported versions, it is possible for a user to provide malicious input to cause the insertion of additional log entries. This is a follow-up to CVE-2021-22096 that protects against additional types of input and in more places of the Spring Frame...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.3.0'}, {'fixed': '5.3.14'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.0'}...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22060'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2021-22060'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-11T18:50:39Z', 'nvd_published_at': '2022-01-10T14:10:00Z'}
1.4.0
GHSA-7x36-h62w-vw65
2022-01-06T18:34:36Z
2022-01-06T22:18:58Z
null
['CVE-2018-25026']
Out-of-bounds Write in actix-web
An issue was discovered in the actix-web crate before 0.7.15 for Rust. It can add the Send marker trait to an object that cannot be sent between threads safely, leading to memory corruption.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'actix-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.15'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25026'}, {'type': 'WEB', 'url': 'https://github.com/actix/actix-web/issues/289'}, {'type': 'PACKAGE', 'url': 'https://github.com/actix/actix-web.git'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/actix-...
{'cwe_ids': ['CWE-787'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T18:34:36Z', 'nvd_published_at': '2021-12-27T00:15:00Z'}
1.4.0
GHSA-f7xw-46vh-5jw2
2022-01-04T20:12:09Z
2022-01-05T20:33:47Z
null
['CVE-2021-4132']
livehelperchat is vulnerable to Cross-site Scripting
livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.91'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4132'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/55b1e3bf62c564db7c919f5293ec1e755c2958d6'}, {'type': 'PACKAGE', 'url': 'https://github.com/livehelperchat/livehelperchat'}, {'type': 'WEB', 'url': 'https://hunt...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-04T20:12:09Z', 'nvd_published_at': '2021-12-17T13:15:00Z'}
1.4.0
GHSA-h376-j262-vhq6
2022-01-20T15:36:58Z
2022-01-06T23:55:09Z
null
['CVE-2021-42392']
RCE in H2 Console
### Impact H2 Console in versions since 1.1.100 (2008-10-14) to 2.0.204 (2021-12-21) inclusive allows loading of custom classes from remote servers through JNDI. H2 Console doesn't accept remote connections by default. If remote access was enabled explicitly and some protection method (such as security constraint) was...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.h2database:h2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.100'}, {'fixed': '2.0.206'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/h2database/h2database/security/advisories/GHSA-h376-j262-vhq6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42392'}, {'type': 'PACKAGE', 'url': 'https://github.com/h2database/h2database'}, {'type': 'WEB', 'url': 'https://github.com/h2database/h2dat...
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T20:14:33Z', 'nvd_published_at': '2022-01-10T14:10:00Z'}
1.4.0
GHSA-46c4-8wrp-j99v
2021-03-22T21:07:36Z
2022-01-06T20:30:34Z
null
['CVE-2020-8124']
Improper Validation and Sanitization in url-parse
Insufficient validation and sanitization of user input exists in url-parse npm package version 1.4.4 and earlier may allow attacker to bypass security checks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'url-parse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8124'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/496293'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T21:07:36Z', 'nvd_published_at': '2020-02-04T20:15:00Z'}
1.4.0
GHSA-q4xf-3pmq-3hw8
2021-03-29T16:20:14Z
2022-01-06T20:41:00Z
null
['CVE-2020-13940']
Improper Restriction of XML External Entity Reference in Apache NiFi
In Apache NiFi 1.0.0 to 1.11.4, the notification service manager and various policy authorizer and user group provider objects allowed trusted administrators to inadvertently configure a potentially malicious XML file. The XML file has the ability to make external calls to services (via XXE).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.12.0-RC1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.11.4'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13940'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi/commit/7f0416ee8bdcee95e28409cc6fae9c1394c2a798'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security#CVE-2020-13940'}]
{'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T16:20:14Z', 'nvd_published_at': '2020-10-01T20:15:00Z'}
1.4.0
GHSA-54qq-9chj-rxhv
2022-02-04T16:53:54Z
2022-01-29T00:00:33Z
null
['CVE-2022-0395']
Cross-site Scripting in LiveHelperChat
LiveHelperChat prior to version 3.93 contains a cross-site scripting vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.93'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0395'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/8fdb4f67ac1a095331aa0fb4630ef9dfe8e75dcb'}, {'type': 'PACKAGE', 'url': 'https://github.com/livehelperchat/livehelperchat'}, {'type': 'WEB', 'url': 'https://hunt...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T16:53:54Z', 'nvd_published_at': '2022-01-28T22:15:00Z'}
1.4.0
GHSA-7wv8-g97r-432h
2022-01-27T18:32:04Z
2022-01-21T18:06:47Z
null
['CVE-2022-0281']
Exposure of Sensitive Information to an Unauthorized Actor in microweber
Exposure of Sensitive Information to an Unauthorized Actor in Packagist microweber/microweber prior to 1.2.11.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0281'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/e680e134a4215c979bfd2eaf58336be34c8fc6e6'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3...
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-21T16:59:24Z', 'nvd_published_at': '2022-01-20T11:15:00Z'}
1.4.0
GHSA-vw5m-qw2r-m923
2022-01-07T17:13:28Z
2022-01-06T22:11:46Z
null
['CVE-2021-45690']
Use of Uninitialized Resource in messagepack-rs.
An issue was discovered in the messagepack-rs crate through 2021-01-26 for Rust. deserialize_binary may read from uninitialized memory locations.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'messagepack-rs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.8.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45690'}, {'type': 'WEB', 'url': 'https://github.com/otake84/messagepack-rs/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/otake84/messagepack-rs'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crate...
{'cwe_ids': ['CWE-908'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T16:39:25Z', 'nvd_published_at': '2021-12-27T00:15:00Z'}
1.4.0
GHSA-g76j-4cxx-23h9
2022-06-20T22:48:44Z
2022-01-20T00:00:48Z
null
['CVE-2022-21363']
Improper Handling of Insufficient Permissions or Privileges in MySQL Connectors Java
Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vuln...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'mysql:mysql-connector-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.0.28'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.0.27'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21363'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}]
{'cwe_ids': ['CWE-280'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:48:44Z', 'nvd_published_at': '2022-01-19T12:15:00Z'}
1.4.0
GHSA-x7wr-283h-5h2v
2022-01-19T18:47:05Z
2022-01-21T23:20:29Z
null
['CVE-2022-21688']
Out-of-bounds Read in Onionshare
Between September 26, 2021 and October 8, 2021, [Radically Open Security](https://www.radicallyopensecurity.com/) conducted a penetration test of OnionShare 2.4, funded by the Open Technology Fund's [Red Team lab](https://www.opentech.fund/labs/red-team-lab/). This is an issue from that penetration test. - Vulnerabili...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'onionshare-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/onionshare/onionshare/security/advisories/GHSA-x7wr-283h-5h2v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21688'}, {'type': 'PACKAGE', 'url': 'https://github.com/onionshare/onionshare'}, {'type': 'WEB', 'url': 'https://github.com/onionshare/onion...
{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T18:27:26Z', 'nvd_published_at': '2022-01-18T22:15:00Z'}
1.4.0
GHSA-5r5w-h76p-m726
2022-01-13T18:32:43Z
2022-01-06T22:20:53Z
null
['CVE-2021-42583']
Use of a Broken or Risky Cryptographic Algorithm in Max Mazurov Maddy
A Broken or Risky Cryptographic Algorithm exists in Max Mazurov Maddy before 0.5.2, which is an unnecessary risk that may result in the exposure of sensitive information.
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/foxcpp/maddy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42583'}, {'type': 'PACKAGE', 'url': 'https://github.com/foxcpp/maddy'}, {'type': 'WEB', 'url': 'https://github.com/foxcpp/maddy/blob/df40dce1284cd0fd0a9e8e7894029553d653d0a5/internal/auth/shadow/verify.go'}, {'type': 'WEB', 'url': 'https://github.c...
{'cwe_ids': ['CWE-327'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T18:56:46Z', 'nvd_published_at': '2021-12-28T19:15:00Z'}
1.4.0
GHSA-99p8-9p2c-49j4
2022-01-19T19:40:50Z
2022-01-21T23:20:16Z
null
['CVE-2022-21695']
Improper Access Control in Onionshare
Between September 26, 2021 and October 8, 2021, [Radically Open Security](https://www.radicallyopensecurity.com/) conducted a penetration test of OnionShare 2.4, funded by the Open Technology Fund's [Red Team lab](https://www.opentech.fund/labs/red-team-lab/). This is an issue from that penetration test. - Vulnerabili...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'onionshare-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3'}, {'fixed': '2.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/onionshare/onionshare/security/advisories/GHSA-99p8-9p2c-49j4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21695'}, {'type': 'PACKAGE', 'url': 'https://github.com/onionshare/onionshare'}, {'type': 'WEB', 'url': 'https://github.com/onionshare/onion...
{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T19:40:50Z', 'nvd_published_at': '2022-01-18T22:15:00Z'}
1.4.0
GHSA-v57x-gxfj-484q
2022-01-19T16:11:28Z
2022-01-21T23:25:04Z
null
[]
Security Advisory for "Log4Shell"
### Impact A highly critical 0-day exploit (CVE-2021-44228) is found in Apache log4j 2 library on December 9, 2021. This affects Apache log4j versions from 2.0-beta9 to 2.14.1 (inclusive). This vulnerability allows a remote attacker to execute code on the server if the system logs an attacker-controlled string value...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.hazelcast.jet:hazelcast-jet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1'}, {'fixed': '4.5.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.hazelcast:hazelcast'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0'}, {'fixed': '...
[{'type': 'WEB', 'url': 'https://github.com/hazelcast/hazelcast/security/advisories/GHSA-v57x-gxfj-484q'}, {'type': 'PACKAGE', 'url': 'https://github.com/hazelcast/hazelcast/'}]
{'cwe_ids': ['CWE-20', 'CWE-400', 'CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T16:11:28Z', 'nvd_published_at': None}
1.4.0
GHSA-xpfv-89vg-r562
2022-02-02T16:06:32Z
2022-01-28T22:07:23Z
null
['CVE-2022-0335']
Cross Site Request Forgery in Moodle
A flaw was found in Moodle in versions 3.11 to 3.11.4, 3.10 to 3.10.8, 3.9 to 3.9.11 and earlier unsupported versions. The "delete badge alignment" functionality did not include the necessary token check to prevent a CSRF risk.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11'}, {'fixed': '3.11.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions':...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0335'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/d40cc61eba229c6d1f47b9a525022fbc9136b9f6'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2043666'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle...
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-26T22:45:37Z', 'nvd_published_at': '2022-01-25T20:15:00Z'}
1.4.0
GHSA-55m5-whcv-c49c
2023-06-13T20:53:48Z
2022-01-06T22:20:28Z
null
['CVE-2018-25023']
Use of Uninitialized Resource in smallvec
Affected versions of this crate called mem::uninitialized() to create values of a user-supplied type T. This is unsound e.g. if T is a reference type (which must be non-null and thus may not remain uninitialized). The flaw was corrected by avoiding the use of mem::uninitialized(), using MaybeUninit instead.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'smallvec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25023'}, {'type': 'WEB', 'url': 'https://github.com/servo/rust-smallvec/issues/126'}, {'type': 'PACKAGE', 'url': 'https://github.com/servo/rust-smallvec'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/sm...
{'cwe_ids': ['CWE-908'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T18:40:05Z', 'nvd_published_at': '2021-12-27T00:15:00Z'}
1.4.0
GHSA-q7q9-w24q-cpgh
2021-03-26T22:27:13Z
2022-01-06T20:35:22Z
null
['CVE-2020-1936']
Cross-site Scripting (XSS) in Apache Ambari Views
A cross-site scripting issue was found in Apache Ambari Views. This was addressed in Apache Ambari 2.7.4.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ambari:ambari'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1936'}, {'type': 'WEB', 'url': 'https://github.com/apache/ambari/pull/3040'}, {'type': 'WEB', 'url': 'https://github.com/apache/ambari/pull/3040/commits/a9cfdb9dcce63a3494c07c81ebb2cf8da218a210'}, {'type': 'WEB', 'url': 'https://issues.apache.org/j...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-26T22:27:13Z', 'nvd_published_at': '2021-03-02T09:15:00Z'}
1.4.0
GHSA-hxjf-h2mh-r6hj
2023-06-13T18:03:25Z
2022-01-06T22:20:12Z
null
['CVE-2018-25027']
Use After Free in libpulse-binding
Affected versions contained a pair of use-after-free issues with the objects returned by the get_format_info and get_context methods of Stream objects. These objects were mistakenly being constructed without setting an important flag to prevent destruction of the underlying C objects they reference upon their own destr...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'libpulse-binding'}, 'ecosystem_specific': {'affected_functions': ['libpulse_binding::stream::Stream::get_context', 'libpulse_binding::stream::Stream::get_format_info']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/jnqnfe/pulse-binding-rust/security/advisories/GHSA-ghpq-vjxw-ch5w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25027'}, {'type': 'PACKAGE', 'url': 'https://github.com/jnqnfe/pulse-binding-rust'}, {'type': 'WEB', 'url': 'https://raw.githubuserconte...
{'cwe_ids': ['CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T18:32:15Z', 'nvd_published_at': '2021-12-27T00:15:00Z'}
1.4.0
GHSA-fr5w-98mc-jjvg
2023-07-07T21:39:49Z
2022-01-22T00:00:48Z
null
['CVE-2022-23315']
Arbitrary file upload in Mingsoft MCMS
MCMS v5.2.4 was discovered to contain an arbitrary file upload vulnerability via the component `/ms/template/writeFileContent.do`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23315'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220125060457/https://gitee.com/mingSoft/MCMS/issues/I4Q4PX'}]
{'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T21:39:49Z', 'nvd_published_at': '2022-01-21T00:15:00Z'}
1.4.0
GHSA-vcgf-vmpc-ph79
2023-06-30T20:05:11Z
2022-01-21T18:06:16Z
null
['CVE-2022-0277']
Microweber Incorrect Permission Assignment for Critical Resource vulnerability
In Microweber prior to 1.2.11, a non-admin user is able to access other users' sensitive information.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0277'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/e680e134a4215c979bfd2eaf58336be34c8fc6e6'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0...
{'cwe_ids': ['CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-21T17:00:33Z', 'nvd_published_at': '2022-01-20T10:15:00Z'}
1.4.0
GHSA-4rq4-32rv-6wp6
2022-01-21T21:05:51Z
2022-01-21T23:37:28Z
null
['CVE-2022-0144']
Improper Privilege Management in shelljs
shelljs is vulnerable to Improper Privilege Management
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'shelljs'}, 'ecosystem_specific': {'affected_functions': ['shelljs.exec']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0144'}, {'type': 'WEB', 'url': 'https://github.com/shelljs/shelljs/commit/d919d22dd6de385edaa9d90313075a77f74b338c'}, {'type': 'PACKAGE', 'url': 'https://github.com/shelljs/shelljs'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/50996581-c08e...
{'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-21T21:05:51Z', 'nvd_published_at': '2022-01-11T07:15:00Z'}
1.4.0
GHSA-h6x7-jq46-fp33
2022-11-29T21:17:59Z
2022-01-13T00:00:54Z
null
['CVE-2022-23109']
Improper credentials masking in Jenkins HashiCorp Vault Plugin
Jenkins HashiCorp Vault Plugin 3.7.0 and earlier does not mask Vault credentials in Pipeline build logs or in Pipeline step descriptions when Pipeline: Groovy Plugin 2.85 or later is installed.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.datapipe.jenkins.plugins:hashicorp-vault-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23109'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/hashicorp-vault-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2213'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secu...
{'cwe_ids': ['CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T21:17:59Z', 'nvd_published_at': '2022-01-12T20:15:00Z'}
1.4.0
GHSA-rqjh-jp2r-59cj
2023-08-31T00:47:27Z
2022-01-06T22:24:14Z
null
['CVE-2021-3842']
NLTK Vulnerable to REDoS
NLTK is vulnerable to REDoS in some RegexpTaggers used in the functions `get_pos_tagger` and `malt_regex_tagger`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'nltk'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3842'}, {'type': 'WEB', 'url': 'https://github.com/nltk/nltk/pull/2906'}, {'type': 'WEB', 'url': 'https://github.com/nltk/nltk/commit/2a50a3edc9d35f57ae42a921c621edc160877f4d'}, {'type': 'PACKAGE', 'url': 'https://github.com/nltk/nltk'}, {'type': '...
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T19:53:00Z', 'nvd_published_at': '2022-01-04T15:15:00Z'}
1.4.0
GHSA-rhq2-3vr9-6mcr
2022-01-18T21:15:21Z
2022-01-21T23:43:33Z
null
['CVE-2021-43831']
Files on the host computer can be accessed from the Gradio interface
### Impact This is a vulnerability that affects anyone who creates and publicly shares Gradio interfaces using `gradio<2.4.8`. Because of the way that static files were being served, someone who generated a public Gradio link and shared it with others would potentially be exposing the files on the computer that generat...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'gradio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/gradio-app/gradio/security/advisories/GHSA-rhq2-3vr9-6mcr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43831'}, {'type': 'WEB', 'url': 'https://github.com/gradio-app/gradio/commit/41bd3645bdb616e1248b2167ca83636a2653f781'}, {'type': 'PACKAGE', 'ur...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-18T21:15:21Z', 'nvd_published_at': '2021-12-15T20:15:00Z'}
1.4.0
GHSA-xg6r-5gx4-qxjm
2022-01-05T20:32:32Z
2022-01-06T21:58:34Z
null
['CVE-2021-3977']
invoiceninja is vulnerable to Cross-site Scripting
invoiceninja is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'hillelcoren/invoice-ninja'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.35'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3977'}, {'type': 'WEB', 'url': 'https://github.com/invoiceninja/invoiceninja/commit/1186eaa82375692d01d5ef3369c5b7bc7315b55f'}, {'type': 'PACKAGE', 'url': 'https://github.com/invoiceninja/invoiceninja'}, {'type': 'WEB', 'url': 'https://github.com/i...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T20:32:32Z', 'nvd_published_at': '2021-12-24T20:15:00Z'}
1.4.0
GHSA-xh9g-cp3v-p8q4
2022-02-03T21:01:13Z
2022-01-27T00:01:17Z
null
['CVE-2022-0203']
Missing Authorization in Crater Invoice
Crater Invoice prior to version 6.0.2 has a missing authorization vulnerability..
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'bytefury/crater'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0203'}, {'type': 'WEB', 'url': 'https://github.com/crater-invoice/crater/commit/dd324c8bb6b17009f82afe8bc830caec7241e992'}, {'type': 'PACKAGE', 'url': 'https://github.com/crater-invoice/crater'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3...
{'cwe_ids': ['CWE-284', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T21:01:13Z', 'nvd_published_at': '2022-01-26T13:15:00Z'}
1.4.0
GHSA-53xv-c2hx-5w6q
2022-03-30T21:13:48Z
2022-01-05T20:39:21Z
null
['CVE-2021-45459']
Command Injection in node-windows
lib/cmd.js in the node-windows package before 1.0.0-beta.6 for Node.js allows command injection via the PID parameter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'node-windows'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0-beta.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.0-beta.5'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45459'}, {'type': 'WEB', 'url': 'https://github.com/dwisiswant0/advisory/issues/4'}, {'type': 'WEB', 'url': 'https://github.com/coreybutler/node-windows/commit/a379d31366edbd7a672a981e6c09e185ab448dd3'}, {'type': 'WEB', 'url': 'https://advisory.dw1...
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T17:15:27Z', 'nvd_published_at': '2021-12-22T06:15:00Z'}
1.4.0
GHSA-cwfw-4gq5-mrqx
2021-03-31T21:35:00Z
2022-01-06T20:42:03Z
null
['CVE-2018-1109']
Regular Expression Denial of Service (ReDoS) in braces
A vulnerability was found in Braces versions prior to 2.3.1. Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) attacks.
[]
[{'package': {'ecosystem': 'npm', 'name': 'braces'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1109'}, {'type': 'WEB', 'url': 'https://github.com/micromatch/braces/commit/abdafb0cae1e0c00f184abbadc692f4eaa98f451'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1547272'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:...
{'cwe_ids': ['CWE-400'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T21:35:00Z', 'nvd_published_at': '2021-03-30T02:15:00Z'}
1.4.0
GHSA-cw98-cx2m-9qqg
2022-01-07T17:53:19Z
2022-01-06T22:10:08Z
null
['CVE-2021-45700']
Denial of Service in ckb
An issue was discovered in the ckb crate before 0.40.0 for Rust. Attackers can cause a denial of service (Nervos CKB blockchain node crash) via a dead call that is used as a DepGroup.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'ckb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.40.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/nervosnetwork/ckb/security/advisories/GHSA-45p7-c959-rgcm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45700'}, {'type': 'PACKAGE', 'url': 'https://github.com/nervosnetwork/ckb'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/a...
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T23:44:51Z', 'nvd_published_at': '2021-12-27T00:15:00Z'}
1.4.0
GHSA-phwq-9gc4-q5c8
2023-07-13T17:03:18Z
2022-01-27T00:00:52Z
null
['CVE-2021-46385']
Mingsoft MCMS SQL injection vulnerability
Mingsoft MCMS contains a SQL injection vulnerability in the `/querydata` endpoint
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46385'}, {'type': 'WEB', 'url': 'https://github.com/ming-soft/MCMS/issues/99'}, {'type': 'WEB', 'url': 'https://gitee.com/mingSoft/MCMS/issues/I4QZ1K'}]
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T17:03:18Z', 'nvd_published_at': '2022-01-26T19:15:00Z'}
1.4.0
GHSA-cv25-3gmg-c6m8
2022-01-14T19:42:47Z
2022-01-06T22:22:32Z
null
['CVE-2021-25994']
Injection in UserFrosting
In Userfrosting, versions v0.3.1 to v4.6.2 are vulnerable to Host Header Injection. By luring a victim application user to click on a link, an unauthenticated attacker can use the “forgot password” functionality to reset the victim’s password and successfully take over their account.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'userfrosting/userfrosting'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.1'}, {'fixed': '4.6.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25994'}, {'type': 'WEB', 'url': 'https://github.com/userfrosting/UserFrosting/commit/796dd78757902435d1bd286415feea78098e45ba'}, {'type': 'PACKAGE', 'url': 'https://github.com/userfrosting/UserFrosting'}, {'type': 'WEB', 'url': 'https://www.whiteso...
{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T19:40:35Z', 'nvd_published_at': '2022-01-03T07:15:00Z'}
1.4.0
GHSA-wr66-vrwm-5g5x
2022-02-07T21:17:29Z
2022-01-28T23:09:22Z
null
['CVE-2022-21721']
Denial of Service Vulnerability in next.js
### Impact Vulnerable code could allow a bad actor to trigger a denial of service attack for anyone running a Next.js app at version >= 12.0.0, and using i18n functionality. - **Affected:** All of the following must be true to be affected by this CVE - Next.js versions above v12.0.0 - Using next start or a custom...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'next'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.0.0'}, {'fixed': '12.0.9'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/vercel/next.js/security/advisories/GHSA-wr66-vrwm-5g5x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21721'}, {'type': 'WEB', 'url': 'https://github.com/vercel/next.js/pull/33503'}, {'type': 'PACKAGE', 'url': 'https://github.com/vercel/next.js'}, {...
{'cwe_ids': ['CWE-20', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-28T18:52:54Z', 'nvd_published_at': '2022-01-28T22:15:00Z'}
1.4.0
GHSA-8wcc-f2vq-h4gx
2022-02-03T20:34:04Z
2022-01-28T23:06:22Z
null
['CVE-2022-0370']
Cross-site Scripting in livehelperchat
Stored XSS is found in Settings>Live help configuration>Personal Theme>static content. Under the NAME field put a payload {{constructor.constructor('alert(1)')()}} while creating content, and you will see that the input gets stored, and every time the user visits, the payload gets executed.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.93'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0370'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/9f5bc33c943349bd765b991db0b7f6b6ef05cfdb'}, {'type': 'PACKAGE', 'url': 'https://github.com/livehelperchat/livehelperchat'}, {'type': 'WEB', 'url': 'https://hunt...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-28T20:00:43Z', 'nvd_published_at': '2022-01-27T06:15:00Z'}
1.4.0
GHSA-fm93-fhh2-cg2c
2022-01-27T14:11:41Z
2022-01-27T14:21:53Z
null
['CVE-2021-23460']
Prototype Pollution in min-dash
The package min-dash before 3.8.1 are vulnerable to Prototype Pollution via the set method due to missing enforcement of key types.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'min-dash'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23460'}, {'type': 'WEB', 'url': 'https://github.com/bpmn-io/min-dash/pull/21'}, {'type': 'WEB', 'url': 'https://github.com/bpmn-io/min-dash/pull/21/commits/5ab05cbc4fd8d5eafb7db540c491ed0906b9d320'}, {'type': 'PACKAGE', 'url': 'https://github.com/b...
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-24T22:51:52Z', 'nvd_published_at': '2022-01-21T20:15:00Z'}
1.4.0
GHSA-5vwc-r48g-wj6c
2023-06-13T16:03:48Z
2022-01-06T22:08:22Z
null
['CVE-2021-45708']
Abomonation transmutes &T to and from &[u8] without sufficient constraints
An issue was discovered in the abomonation crate through version 0.7.3 for Rust. Because transmute operations are insufficiently constrained, there can be an information leak or ASLR bypass.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'abomonation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.7.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45708'}, {'type': 'WEB', 'url': 'https://github.com/TimelyDataflow/abomonation/issues/23'}, {'type': 'PACKAGE', 'url': 'https://github.com/TimelyDataflow/abomonation'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/m...
{'cwe_ids': ['CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T21:50:24Z', 'nvd_published_at': '2021-12-27T00:15:00Z'}
1.4.0
GHSA-26hm-r6mg-963c
2022-02-03T20:49:15Z
2022-01-26T00:01:25Z
null
['CVE-2021-46089']
SQL Injection in JeecgBoot
In JeecgBoot 3.0, there is a SQL injection vulnerability that can operate the database with root privileges. A patch has been released on the repository's `master` branch.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg-boot-base'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg-boot-base-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46089'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/issues/3331'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/commit/baefc1338dd03de36384ce7d5846b08041b488d0'}, {'type': 'PACKAGE', 'url': 'https://github.co...
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T20:49:15Z', 'nvd_published_at': '2022-01-25T15:15:00Z'}
1.4.0
GHSA-9qvw-46gf-4fv8
2022-01-07T17:41:11Z
2022-01-06T22:09:07Z
null
['CVE-2021-45702']
Use After Free in tremor-script
An issue was discovered in the tremor-script crate before 0.11.6 for Rust. A merge operation may result in a use-after-free.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'tremor-script'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7.2'}, {'fixed': '0.11.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45702'}, {'type': 'WEB', 'url': 'https://github.com/tremor-rs/tremor-runtime/pull/1217'}, {'type': 'WEB', 'url': 'https://github.com/tremor-rs/tremor-runtime/commit/1a2efcdbe68e5e7fd0a05836ac32d2cde78a0b2e'}, {'type': 'WEB', 'url': 'https://raw.git...
{'cwe_ids': ['CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T13:28:58Z', 'nvd_published_at': '2021-12-27T00:15:00Z'}
1.4.0
GHSA-8489-44mv-ggj8
2022-02-25T18:37:34Z
2022-01-04T16:14:20Z
null
['CVE-2021-44832']
Improper Input Validation and Injection in Apache Log4j2
Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) are vulnerable to an attack where an attacker with permission to modify the logging configuration file can construct a malicious configuration using a JDBC Appender with a data source referencing a JNDI URI which can exec...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.logging.log4j:log4j-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0-beta7'}, {'fixed': '2.3.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.logging.log4j:log4j-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44832'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-784507.pdf'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/logging-log4j2'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/LOG4J2-3293'}, ...
{'cwe_ids': ['CWE-20', 'CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-28T21:14:19Z', 'nvd_published_at': '2021-12-28T20:15:00Z'}
1.4.0
GHSA-8fr3-hfg3-gpgp
2023-09-11T22:42:40Z
2022-01-21T23:36:19Z
null
['CVE-2022-0122']
Open Redirect in node-forge
parseUrl functionality in node-forge mishandles certain uses of backslash such as `https:/\/\/\` and interprets the URI as a relative path.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'node-forge'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0122'}, {'type': 'WEB', 'url': 'https://github.com/digitalbazaar/forge/commit/db8016c805371e72b06d8e2edfe0ace0df934a5e'}, {'type': 'PACKAGE', 'url': 'https://github.com/digitalbazaar/forge'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/41852...
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-13T18:49:59Z', 'nvd_published_at': '2022-01-06T05:15:00Z'}