schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 8 154 | details stringlengths 31 19.1k | severity stringlengths 2 92 | affected stringlengths 75 28.5k | references stringlengths 79 7.48k | database_specific stringlengths 131 196 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-fjpm-hf7c-xgc2 | 2022-11-29T21:20:25Z | 2022-01-13T00:00:54Z | null | ['CVE-2022-23110'] | Stored XSS vulnerability in Jenkins Publish Over SSH Plugin | Jenkins Publish Over SSH Plugin 1.22 and earlier does not escape the SSH server name, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Overall/Administer permission. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:publish-over-ssh'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.23'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23110'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/publish-over-ssh-plugin'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/publish-over-ssh-plugin/releases/tag/publish-over-ssh-1.23'}, {'type': 'WEB', 'url': 'https://www.jenk... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T21:20:25Z', 'nvd_published_at': '2022-01-12T20:15:00Z'} |
1.4.0 | GHSA-8w54-22w9-3g8f | 2022-01-31T20:25:54Z | 2022-01-28T23:10:40Z | null | [] | Cross-site Scripting and Open Redirect in Products.CMFPlone | ### Impact
Plone is vulnerable to reflected cross site scripting and open redirect when an attacker can get a compromised version of the image_view_fullscreen page in a cache, for example in Varnish.
The technique is known as cache poisoning.
Any later visitor can get redirected when clicking on a link on this page.
Us... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Products.CMFPlone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/plone/Products.CMFPlone/security/advisories/GHSA-8w54-22w9-3g8f'}, {'type': 'PACKAGE', 'url': 'https://github.com/plone/Products.CMFPlone'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-28T21:56:53Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gh88-3pxp-6fm8 | 2022-01-21T21:04:45Z | 2022-01-21T23:39:50Z | null | ['CVE-2021-23567'] | Infinite Loop in colors.js | The package colors after 1.4.0 are vulnerable to Denial of Service (DoS) that was introduced through an infinite loop in the americanFlag module. Unfortunately this appears to have been a purposeful attempt by a maintainer of colors to make the package unusable, other maintainers' controls over this package appear to h... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'colors'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23567'}, {'type': 'WEB', 'url': 'https://github.com/Marak/colors.js/issues/285'}, {'type': 'WEB', 'url': 'https://github.com/Marak/colors.js/issues/285%23issuecomment-1008212640'}, {'type': 'WEB', 'url': 'https://github.com/Marak/colors.js/commit/0... | {'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-21T21:04:45Z', 'nvd_published_at': '2022-01-14T20:15:00Z'} |
1.4.0 | GHSA-x3g3-jh26-76cf | 2022-02-02T16:05:32Z | 2022-01-28T23:06:00Z | null | ['CVE-2022-0375'] | Cross-site Scripting in livehelperchat | LiveHelperChat is vulnerable to Stored XSS at the Name field in the Admin themes of System configuration. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.93'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0375'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/bbfaa26ce54a2a86ce1a42a16496038f5bdfc102'}, {'type': 'PACKAGE', 'url': 'https://github.com/livehelperchat/livehelperchat/'}, {'type': 'WEB', 'url': 'https://hun... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-27T23:20:44Z', 'nvd_published_at': '2022-01-26T10:15:00Z'} |
1.4.0 | GHSA-4hpf-3wq7-5rpr | 2021-04-23T20:09:28Z | 2022-01-06T20:44:07Z | null | ['CVE-2018-1107'] | Regular expression deinal of service (ReDoS) in is-my-json-valid | It was discovered that the is-my-json-valid JavaScript library used an inefficient regular expression to validate JSON fields defined to have email format. A specially crafted JSON file could cause it to consume an excessive amount of CPU time when validated. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'is-my-json-valid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.17.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'is-my-json-valid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1107'}, {'type': 'WEB', 'url': 'https://github.com/mafintosh/is-my-json-valid/pull/159'}, {'type': 'WEB', 'url': 'https://github.com/mafintosh/is-my-json-valid/commit/b3051b277f7caa08cd2edc6f74f50aeda65d2976'}, {'type': 'WEB', 'url': 'https://bugzi... | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T21:45:17Z', 'nvd_published_at': '2021-03-30T02:15:00Z'} |
1.4.0 | GHSA-rvh4-g2rj-hr9c | 2023-05-24T18:12:32Z | 2022-01-21T23:38:05Z | null | ['CVE-2022-23107'] | Path Traversal in Jenkins Warnings Next Generation Plugin | Jenkins Warnings Next Generation Plugin prior to 9.10.3, 9.7.1, 9.5.2, and 9.0.2 does not restrict the name of a file when configuring a custom ID.
This allows attackers with Item/Configure permission to write and read specific files with a hard-coded suffix on the Jenkins controller file system.
Warnings Next Genera... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:warnings-ng'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.8.0'}, {'fixed': '9.10.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:warnings-ng'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.6.0'}, ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23107'}, {'type': 'WEB', 'url': 'https://github.com/CVEProject/cvelist/blob/36f932156733baab1b13868be4338de406a1dec7/2022/23xxx/CVE-2022-23107.json'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/warnings-ng-plugin'}, {'type': 'WEB', 'u... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-20T14:51:23Z', 'nvd_published_at': '2022-01-12T20:15:00Z'} |
1.4.0 | GHSA-8wq7-hhjj-fpqv | 2023-07-11T00:21:57Z | 2022-01-22T00:00:50Z | null | ['CVE-2022-22930'] | RCE in Mingsoft MCMS | A remote code execution (RCE) vulnerability in the Template Management function of MCMS allows attackers to execute arbitrary code via a crafted payload. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22930'}, {'type': 'WEB', 'url': 'https://github.com/ming-soft/MCMS/issues/98'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220201022121/https://gitee.com/mingSoft/MCMS/issues/I4Q4M6'}] | {'cwe_ids': ['CWE-1336'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-11T00:21:57Z', 'nvd_published_at': '2022-01-21T00:15:00Z'} |
1.4.0 | GHSA-mgpf-hhgf-cxg4 | 2022-07-13T18:50:38Z | 2022-01-08T00:43:16Z | null | ['CVE-2021-45457'] | In Apache Kylin, Cross-origin requests with credentials are allowed to be sent from any origin. | In Apache Kylin, Cross-origin requests with credentials are allowed to be sent from any origin. This issue affects Apache Kylin 2 version 2.6.6 and prior versions; Apache Kylin 3 version 3.1.2 and prior versions; Apache Kylin 4 version 4.0.0 and prior versions. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.kylin:kylin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.kylin:kylin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.1'}]}]... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45457'}, {'type': 'WEB', 'url': 'https://github.com/apache/kylin/pull/1781'}, {'type': 'WEB', 'url': 'https://github.com/apache/kylin/pull/1782'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/kylin'}, {'type': 'WEB', 'url': 'https://lists.... | {'cwe_ids': ['CWE-522'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T23:13:40Z', 'nvd_published_at': '2022-01-06T13:15:00Z'} |
1.4.0 | GHSA-728c-42pc-fwxg | 2022-01-19T14:08:43Z | 2022-01-21T23:54:50Z | null | ['CVE-2022-0242'] | Unrestricted Upload of File with Dangerous Type in Crater | Unrestricted Upload of File with Dangerous Type in GitHub repository crater-invoice/crater prior to 6.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'bytefury/crater'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0242'}, {'type': 'WEB', 'url': 'https://github.com/crater-invoice/crater/commit/dcb3ddecb9f4cde622cc42c51a2760747797624f'}, {'type': 'PACKAGE', 'url': 'https://github.com/crater-invoice/crater'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1... | {'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T14:08:43Z', 'nvd_published_at': '2022-01-17T19:15:00Z'} |
1.4.0 | GHSA-g87r-23vw-7f87 | 2022-01-06T20:20:42Z | 2022-01-06T22:00:21Z | null | ['CVE-2021-45719'] | Use After Free in rusqlite | An issue was discovered in the rusqlite crate 0.25.x before 0.25.4 and 0.26.x before 0.26.2 for Rust. update_hook has a use-after-free. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'rusqlite'}, 'ecosystem_specific': {'affected_functions': ['rusqlite::Connection::update_hook']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.25.0'}, {'fixed': '0.25.4'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'rusqlite'}, 'ecosystem_specific... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45719'}, {'type': 'WEB', 'url': 'https://github.com/rusqlite/rusqlite/issues/1048'}, {'type': 'PACKAGE', 'url': 'https://github.com/rusqlite/rusqlite/'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/rusq... | {'cwe_ids': ['CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T21:01:21Z', 'nvd_published_at': '2021-12-26T22:15:00Z'} |
1.4.0 | GHSA-wppj-3pjr-9w79 | 2022-01-20T15:08:18Z | 2022-01-21T23:55:11Z | null | ['CVE-2021-4080'] | crater is vulnerable to Unrestricted Upload of File with Dangerous Type | crater is vulnerable to Unrestricted Upload of File with Dangerous Type | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'bytefury/crater'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4080'}, {'type': 'WEB', 'url': 'https://github.com/crater-invoice/crater/commit/cdc913d16cf624aee852bc9163a7c6ffc8d1da9d'}, {'type': 'PACKAGE', 'url': 'https://github.com/crater-invoice/crater'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d... | {'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-20T15:08:18Z', 'nvd_published_at': '2022-01-12T14:15:00Z'} |
1.4.0 | GHSA-73q9-7pwj-gm46 | 2022-01-19T14:28:08Z | 2022-01-21T23:46:12Z | null | ['CVE-2021-3862'] | icecoder is vulnerable to Cross-site Scripting | icecoder is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'icecoder/icecoder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '8.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3862'}, {'type': 'WEB', 'url': 'https://github.com/icecoder/icecoder/commit/51cf24b2a39138e6a7b5739ef59eb38cd7c39763'}, {'type': 'PACKAGE', 'url': 'https://github.com/icecoder/icecoder'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/5c9c228e-... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T14:28:08Z', 'nvd_published_at': '2022-01-17T14:15:00Z'} |
1.4.0 | GHSA-g4g4-3pqw-8m7f | 2022-01-06T20:20:29Z | 2022-01-06T22:02:01Z | null | ['CVE-2021-45718'] | Use After Free in rusqlite | An issue was discovered in the rusqlite crate 0.25.x before 0.25.4 and 0.26.x before 0.26.2 for Rust. rollback_hook has a use-after-free. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'rusqlite'}, 'ecosystem_specific': {'affected_functions': ['rusqlite::Connection::rollback_hook']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.25.0'}, {'fixed': '0.25.4'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'rusqlite'}, 'ecosystem_specif... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45718'}, {'type': 'WEB', 'url': 'https://github.com/rusqlite/rusqlite/issues/1048'}, {'type': 'PACKAGE', 'url': 'https://github.com/rusqlite/rusqlite/'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/rusq... | {'cwe_ids': ['CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T20:59:28Z', 'nvd_published_at': '2021-12-26T22:15:00Z'} |
1.4.0 | GHSA-7wq4-89xx-g62j | 2022-02-02T16:15:02Z | 2022-01-28T22:13:57Z | null | ['CVE-2022-23223'] | Password exposure in ShenYu | The HTTP response will disclose the user password. This issue affected Apache ShenYu 2.4.0 and 2.4.1. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.shenyu:shenyu-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23223'}, {'type': 'WEB', 'url': 'https://github.com/apache/shenyu/pull/2357'}, {'type': 'WEB', 'url': 'https://github.com/apache/shenyu/commit/0e826ceae97a1258cb15c73a3072118c920e8654'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/incubat... | {'cwe_ids': ['CWE-319', 'CWE-522'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-26T22:42:18Z', 'nvd_published_at': '2022-01-25T13:15:00Z'} |
1.4.0 | GHSA-cw68-xmm4-c83r | 2022-11-29T21:35:52Z | 2022-01-13T00:00:53Z | null | ['CVE-2022-23117'] | Agent-to-controller security bypass in Jenkins Conjur Secrets Plugin allows retrieving all credentials | Jenkins Conjur Secrets Plugin 1.0.9 and earlier implements functionality that allows attackers able to control agent processes to retrieve all username/password credentials stored on the Jenkins controller. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.conjur.jenkins:conjur-credentials'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23117'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/conjur-credentials-plugin/pull/19'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/conjur-credentials-plugin'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/conjur-cre... | {'cwe_ids': ['CWE-269'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T21:35:52Z', 'nvd_published_at': '2022-01-12T20:15:00Z'} |
1.4.0 | GHSA-q4j7-v27r-fgcx | 2022-01-11T18:13:17Z | 2022-01-13T15:00:36Z | null | ['CVE-2021-23543'] | Prototype Pollution in realms-shim | All versions of package realms-shim are vulnerable to Sandbox Bypass via a Prototype Pollution attack vector. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'realms-shim'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23543'}, {'type': 'PACKAGE', 'url': 'https://github.com/Agoric/realms-shim'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-REALMSSHIM-2309908'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/realms-shim'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-11T18:13:17Z', 'nvd_published_at': '2022-01-10T14:10:00Z'} |
1.4.0 | GHSA-8vj2-vxx3-667w | 2023-09-04T16:45:05Z | 2022-01-12T20:07:33Z | null | ['CVE-2022-22817'] | Arbitrary expression injection in Pillow | `PIL.ImageMath.eval` in Pillow before 9.0.0 allows evaluation of arbitrary expressions, such as ones that use the Python exec method `ImageMath.eval("exec(exit())")`.
While Pillow 9.0.0 restricted top-level builtins available to PIL.ImageMath.eval(), it did not prevent builtins available to lambda expressions. These a... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22817'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/8531b01d6cdf0b70f256f93092caa2a5d91afc11'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debi... | {'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-11T18:03:44Z', 'nvd_published_at': '2022-01-10T14:12:00Z'} |
1.4.0 | GHSA-2969-8hh9-57jc | 2022-01-07T17:53:54Z | 2022-01-06T22:09:49Z | null | ['CVE-2021-45699'] | Allocation of Resources Without Limits or Throttling in ckb | An issue was discovered in the ckb crate before 0.40.0 for Rust. Remote attackers may be able to conduct a 51% attack against the Nervos CKB blockchain by triggering an inability to allocate memory for the misbehavior HashMap. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'ckb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.40.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/nervosnetwork/ckb/security/advisories/GHSA-48vq-8jqv-gm6f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45699'}, {'type': 'PACKAGE', 'url': 'https://github.com/nervosnetwork/ckb'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/a... | {'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T23:46:28Z', 'nvd_published_at': '2021-12-27T00:15:00Z'} |
1.4.0 | GHSA-qqc2-pv68-q72h | 2023-07-12T00:33:34Z | 2022-01-27T00:01:02Z | null | ['CVE-2021-46383'] | Mingsoft MCMS SQL injection vulnerability | Mingsoft MCMS contains a SQL injection vulnerability relating to the component `net.mingsoft.mdiy.action.web.DictAction#list`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.5'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46383'}, {'type': 'WEB', 'url': 'https://gitee.com/mingSoft/MCMS/issues/I4QZ1I'}] | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T00:33:34Z', 'nvd_published_at': '2022-01-26T17:15:00Z'} |
1.4.0 | GHSA-6p3c-v8vc-c244 | 2023-06-13T18:33:17Z | 2022-01-06T22:10:34Z | null | ['CVE-2021-45697'] | The `total_size` function for partial read the length of any `FixVec` is incorrect in molecule. | Anyone who uses total_size(..) function to partial read the length of any FixVec will get an incorrect result, due to an incorrect implementation. This has been resolved in the 0.7.2 release. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'molecule'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/nervosnetwork/molecule/security/advisories/GHSA-82hm-vh7g-hrh9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45697'}, {'type': 'WEB', 'url': 'https://github.com/nervosnetwork/molecule/pull/49'}, {'type': 'PACKAGE', 'url': 'https://github.com/nervos... | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T14:29:54Z', 'nvd_published_at': '2021-12-27T00:15:00Z'} |
1.4.0 | GHSA-5rqg-jm4f-cqx7 | 2022-01-10T19:56:36Z | 2022-01-10T17:29:53Z | null | [] | Infinite loop causing Denial of Service in colors | colors is a library for including colored text in node.js consoles. Between 07 and 09 January 2022, colors versions 1.4.1, 1.4.2, and 1.4.44-liberty-2 were published including malicious code that caused a Denial of Service due to an infinite loop. Software dependent on these versions experienced the printing of randomi... | [] | [{'package': {'ecosystem': 'npm', 'name': 'colors'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.1'}, {'last_affected': '1.4.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'colors'}, 'versions': ['1.4.44-liberty-2']}] | [{'type': 'WEB', 'url': 'https://github.com/Marak/colors.js/commit/137c6dae3339e97f4bbc838c221803c363b0a9fd'}, {'type': 'WEB', 'url': 'https://github.com/Marak/colors.js/commit/5d2d242f656103ac38086d6b26433a09f1c38c75'}, {'type': 'WEB', 'url': 'https://github.com/Marak/colors.js/commit/6bc50e79eeaa1d87369bb3e7e608ebed1... | {'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-10T17:29:22Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mh83-jcw5-rjh8 | 2022-01-20T15:33:35Z | 2022-01-14T21:07:23Z | null | ['CVE-2022-0198'] | XML External Entity Reference in edu.stanford.nlp:stanford-corenlp | The TransformXML() function makes use of SAXParser generated from a SAXParserFactory with no FEATURE_SECURE_PROCESSING set, allowing for XXE attacks. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'edu.stanford.nlp:stanford-corenlp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0198'}, {'type': 'WEB', 'url': 'https://github.com/stanfordnlp/corenlp/commit/1f52136321cfca68b991bd7870563d06cf96624d'}, {'type': 'PACKAGE', 'url': 'https://github.com/stanfordnlp/corenlp/'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3d7e... | {'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-14T20:54:24Z', 'nvd_published_at': '2022-01-13T07:15:00Z'} |
1.4.0 | GHSA-v567-q267-phpg | 2022-01-25T20:49:25Z | 2022-01-21T23:50:11Z | null | ['CVE-2022-0257'] | pimcore is vulnerable to Cross-site Scripting | pimcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.2.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0257'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/dfaf78b26fb77990267c0cc05b9fcb9f8de7b66d'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/bad2073c-bbd5... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T14:22:39Z', 'nvd_published_at': '2022-01-17T16:15:00Z'} |
1.4.0 | GHSA-w428-f65r-h4q2 | 2022-01-07T17:23:21Z | 2022-01-06T22:13:12Z | null | ['CVE-2021-45687'] | Deserialization of Untrusted Data in rust-cpuid | An issue was discovered in the raw-cpuid crate before 9.1.1 for Rust. If the serialize feature is used (which is not the the default), a Deserialize operation may lack sufficient validation, leading to memory corruption or a panic. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'raw-cpuid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '9.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45687'}, {'type': 'WEB', 'url': 'https://github.com/gz/rust-cpuid/issues/43'}, {'type': 'PACKAGE', 'url': 'https://github.com/gz/rust-cpuid'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/raw-cpuid/RUSTS... | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T16:40:56Z', 'nvd_published_at': '2021-12-27T00:15:00Z'} |
1.4.0 | GHSA-mw25-f5r2-hpc6 | 2022-01-13T18:33:06Z | 2022-01-06T22:23:25Z | null | ['CVE-2021-34797'] | Insertion of Sensitive Information into Log File in Apache Geode | Apache Geode versions up to 1.12.4 and 1.13.4 are vulnerable to a log file redaction of sensitive information flaw when using values that begin with characters other than letters or numbers for passwords and security properties with the prefix "sysprop-", "javax.net.ssl", or "security-". This issue is fixed by overhaul... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.geode:geode-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.geode:geode-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.0'}, {'fixed':... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-34797'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/geode'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/nq2w9gjzm1cjx1rh6zw41ty39qw7qpx4'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/p4l0g49rzzzpn8yt9q9p0xp52h3z... | {'cwe_ids': ['CWE-532'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T19:57:18Z', 'nvd_published_at': '2022-01-04T09:15:00Z'} |
1.4.0 | GHSA-9wxh-jjj5-67cv | 2023-05-24T17:47:11Z | 2022-01-13T00:00:58Z | null | ['CVE-2022-20620'] | Missing permission checks in SSH Agent Plugin allow enumerating credentials IDs | Jenkins SSH Agent Plugin prior to 1.23.2 and 1.22.1 does not perform permission checks in several HTTP endpoints.
This allows attackers with Overall/Read access to enumerate credentials IDs of credentials stored in Jenkins. Those can be used as part of an attack to capture the credentials using another vulnerability.
... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ssh-agent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.23'}, {'fixed': '1.23.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ssh-agent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-20620'}, {'type': 'WEB', 'url': 'https://github.com/CVEProject/cvelist/blob/2d78eb36f4d084db7fb35f1535d8d84fdcb7d859/2022/20xxx/CVE-2022-20620.jsonhttps://github.com/CVEProject/cvelist/blob/2d78eb36f4d084db7fb35f1535d8d84fdcb7d859/2022/20xxx/CVE-20... | {'cwe_ids': ['CWE-668', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-27T21:24:04Z', 'nvd_published_at': '2022-01-12T20:15:00Z'} |
1.4.0 | GHSA-cqr2-xhg6-p268 | 2021-07-28T22:40:26Z | 2022-01-07T00:20:27Z | null | ['CVE-2020-7632'] | OS Command Injection in node-mpv | node-mpv through 1.4.3 is vulnerable to Command Injection. It allows execution of arbitrary commands via the options argument. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'node-mpv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7632'}, {'type': 'WEB', 'url': 'https://github.com/j-holub/Node-MPV/blob/master/lib/util.js#L34'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NODEMPV-564426'}] | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T22:42:30Z', 'nvd_published_at': '2020-04-06T13:15:00Z'} |
1.4.0 | GHSA-6jhm-4vmx-mr76 | 2022-02-02T16:11:16Z | 2022-01-28T22:08:14Z | null | ['CVE-2022-0332'] | SQL injection in Moodle | A flaw was found in Moodle in versions 3.11 to 3.11.4. An SQL injection risk was identified in the h5p activity web service responsible for fetching user attempt data. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11'}, {'fixed': '3.11.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0332'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/c7a62a8c82219b50589257f79021da1df1a76808'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2043661'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle... | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-26T22:49:44Z', 'nvd_published_at': '2022-01-25T20:15:00Z'} |
1.4.0 | GHSA-5r9v-8w62-r26j | 2022-01-25T19:13:21Z | 2022-01-21T23:48:25Z | null | ['CVE-2022-0253'] | livehelperchat is vulnerable to Cross-site Scripting | livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.91'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0253'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/407d0b1a1fa56fa6f824a19092774f10f4880437'}, {'type': 'PACKAGE', 'url': 'https://github.com/livehelperchat/livehelperchat'}, {'type': 'WEB', 'url': 'https://hunt... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T14:15:02Z', 'nvd_published_at': '2022-01-17T14:15:00Z'} |
1.4.0 | GHSA-qrpm-p2h7-hrv2 | 2022-03-18T13:15:55Z | 2022-01-21T23:57:06Z | null | ['CVE-2021-23566'] | Exposure of Sensitive Information to an Unauthorized Actor in nanoid | The package nanoid from 3.0.0, before 3.1.31, are vulnerable to Information Exposure via the valueOf() function which allows to reproduce the last id generated. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'nanoid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.31'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23566'}, {'type': 'WEB', 'url': 'https://github.com/ai/nanoid/pull/328'}, {'type': 'WEB', 'url': 'https://github.com/ai/nanoid/commit/2b7bd9332bc49b6330c7ddb08e5c661833db2575'}, {'type': 'WEB', 'url': 'https://gist.github.com/artalar/bc6d1eb9a3477d... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-18T21:54:04Z', 'nvd_published_at': '2022-01-14T20:15:00Z'} |
1.4.0 | GHSA-84wg-rgp8-2hg4 | 2022-09-21T19:38:47Z | 2022-01-08T00:40:33Z | null | ['CVE-2021-38542'] | Command Injection in Apache James | Apache James prior to release 3.6.1 is vulnerable to a buffering attack relying on the use of the STARTTLS command. This can result in Man-in -the-middle command injection attacks, leading potentially to leakage of sensible information. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.james:james-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-38542'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2022/01/04/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/01/04/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/... | {'cwe_ids': ['CWE-327', 'CWE-77'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T18:35:11Z', 'nvd_published_at': '2022-01-04T09:15:00Z'} |
1.4.0 | GHSA-frxp-xxx8-hrg6 | 2022-01-07T20:43:46Z | 2022-01-08T00:31:52Z | null | ['CVE-2022-22108'] | Missing Authorization in DayByDay CRM | In Daybyday CRM, versions 2.0.0 through 2.2.0 are vulnerable to Missing Authorization. An attacker that has the lowest privileges account (employee type user), can view the absences of all users in the system including administrators. This type of user is not authorized to view this kind of information. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'bottelet/flarepoint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22108'}, {'type': 'WEB', 'url': 'https://github.com/Bottelet/DaybydayCRM/commit/fe842ea5ede237443f1f45a99aeb839133115d8b'}, {'type': 'PACKAGE', 'url': 'https://github.com/Bottelet/DaybydayCRM/'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftw... | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T20:43:46Z', 'nvd_published_at': '2022-01-05T15:15:00Z'} |
1.4.0 | GHSA-gcv9-6737-pjqw | 2022-02-02T16:14:01Z | 2022-01-27T16:24:26Z | null | ['CVE-2022-21697'] | SSRF vulnerability in jupyter-server-proxy | ### Impact
**What kind of vulnerability is it?** Server-Side Request Forgery ( SSRF )
**Who is impacted?** Any user deploying Jupyter Server or Notebook with jupyter-proxy-server extension enabled.
A lack of input validation allowed authenticated clients to proxy requests to other hosts, bypassing the `allowed_hos... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'jupyter-server-proxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.0'}}] | [{'type': 'WEB', 'url': 'https://github.com/jupyterhub/jupyter-server-proxy/security/advisories/GHSA-gcv9-6737-pjqw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21697'}, {'type': 'WEB', 'url': 'https://github.com/jupyterhub/jupyter-server-proxy/commit/fd31930bacd12188c448c886e0783529436b99e... | {'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-25T20:57:43Z', 'nvd_published_at': '2022-01-25T14:15:00Z'} |
1.4.0 | GHSA-wpg7-2c88-r8xv | 2022-02-03T16:08:56Z | 2022-01-28T22:54:16Z | null | ['CVE-2022-0355'] | Exposure of Sensitive Information in simple-get | In versions of simple-get prior to 4.0.1, 3.1.1, and 2.8.2, when fetching a remote url with a cookie location response, headers will be followed, potentially resulting in an exposure of the session cookie to a third party. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'simple-get'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.1'}]}], 'versions': ['4.0.0']}, {'package': {'ecosystem': 'npm', 'name': 'simple-get'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.1'}]}]}... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0355'}, {'type': 'WEB', 'url': 'https://github.com/feross/simple-get/pull/75#issuecomment-1027755026'}, {'type': 'WEB', 'url': 'https://github.com/feross/simple-get/pull/76#issuecomment-1027754710'}, {'type': 'WEB', 'url': 'https://github.com/feros... | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-27T23:17:09Z', 'nvd_published_at': '2022-01-26T04:15:00Z'} |
1.4.0 | GHSA-h29c-wcm8-883h | 2022-01-19T19:32:41Z | 2022-01-21T23:20:17Z | null | ['CVE-2022-21694'] | Incorrect Permission Assignment for Critical Resource in OnionShare | Between September 26, 2021 and October 8, 2021, [Radically Open Security](https://www.radicallyopensecurity.com/) conducted a penetration test of OnionShare 2.4, funded by the Open Technology Fund's [Red Team lab](https://www.opentech.fund/labs/red-team-lab/). This is an issue from that penetration test.
- Vulnerabili... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'onionshare-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixed': '2.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/onionshare/onionshare/security/advisories/GHSA-h29c-wcm8-883h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21694'}, {'type': 'WEB', 'url': 'https://github.com/onionshare/onionshare/issues/1389'}, {'type': 'PACKAGE', 'url': 'https://github.com/onio... | {'cwe_ids': ['CWE-732'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T19:32:41Z', 'nvd_published_at': '2022-01-18T23:15:00Z'} |
1.4.0 | GHSA-9fj5-jg6f-qg5r | 2023-07-21T19:24:02Z | 2022-01-08T00:43:09Z | null | ['CVE-2021-45458'] | Use of Hard-coded Credentials in Apache Kylin | Apache Kylin provides encryption classes PasswordPlaceholderConfigurer to help users encrypt their passwords. In the encryption algorithm used by this encryption class, the cipher is initialized with a hardcoded key and IV. If users use class PasswordPlaceholderConfigurer to encrypt their password and configure it into... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.kylin:kylin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.kylin:kylin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.1'}]}]... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45458'}, {'type': 'WEB', 'url': 'https://github.com/apache/kylin/pull/1781'}, {'type': 'WEB', 'url': 'https://github.com/apache/kylin/pull/1782'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/kylin'}, {'type': 'WEB', 'url': 'https://lists.... | {'cwe_ids': ['CWE-326', 'CWE-330', 'CWE-798'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T22:53:35Z', 'nvd_published_at': '2022-01-06T13:15:00Z'} |
1.4.0 | GHSA-5mj6-3cmq-fh34 | 2022-01-06T19:38:50Z | 2022-01-06T22:22:46Z | null | ['CVE-2022-0079'] | showdoc is vulnerable to Generation of Error Message Containing Sensitive Information | showdoc is vulnerable to Generation of Error Message Containing Sensitive Information | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0079'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/e43df0a190f68aefa272507d3bd54475f566c1db'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b37f0e26-355a... | {'cwe_ids': ['CWE-209'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T19:38:50Z', 'nvd_published_at': '2022-01-03T03:15:00Z'} |
1.4.0 | GHSA-6pj2-5fqq-xvjc | 2022-01-06T18:54:41Z | 2022-01-06T20:56:27Z | null | ['CVE-2021-23803'] | Incorrect Authorization in latte/latte | This affects the package latte/latte before 2.10.6. There is a way to bypass allowFunctions that will affect the security of the application. When the template is set to allow/disallow the use of certain functions, adding control characters (x00-x08) after the function will bypass these restrictions. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'latte/latte'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23803'}, {'type': 'WEB', 'url': 'https://github.com/nette/latte/issues/279'}, {'type': 'WEB', 'url': 'https://github.com/nette/latte/commit/227c86eda9a8a6d060ea8501923e768b6d992210'}, {'type': 'PACKAGE', 'url': 'https://github.com/nette/latte'}, {'... | {'cwe_ids': ['CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T18:54:41Z', 'nvd_published_at': '2021-12-17T20:15:00Z'} |
1.4.0 | GHSA-7v3x-h7r2-34jv | 2022-01-20T16:18:28Z | 2022-01-21T18:43:05Z | null | [] | Insufficient Session Expiration in Pterodactyl API | ### Impact
A vulnerability exists in Pterodactyl Panel `<= 1.6.6` that could allow a malicious attacker that compromises an API key to generate an authenticated user session that is not revoked when the API key is deleted, thus allowing the malicious user to remain logged in as the user the key belonged to.
It is impo... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pterodactyl/panel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/pterodactyl/panel/security/advisories/GHSA-7v3x-h7r2-34jv'}, {'type': 'WEB', 'url': 'https://github.com/pterodactyl/panel/commit/dfa329ddf242908b60e22e3340ea36359eab1ef4'}, {'type': 'PACKAGE', 'url': 'https://github.com/pterodactyl/panel'}, {'type': 'WEB', 'url': 'https://git... | {'cwe_ids': ['CWE-613'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-20T16:18:28Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8qvx-f5gf-g43v | 2022-01-20T15:34:33Z | 2022-01-12T22:54:50Z | null | ['CVE-2022-0174'] | Logic error in dolibarr | The application does not check the input of price number lead to Business Logic error through negative price amount. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '15.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0174'}, {'type': 'WEB', 'url': 'https://github.com/dolibarr/dolibarr/commit/d892160f4f130385a3ce520f66cb8cf2eb8c5c32'}, {'type': 'PACKAGE', 'url': 'https://github.com/dolibarr/dolibarr'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ed3ed4ce-... | {'cwe_ids': ['CWE-1284', 'CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-11T18:42:50Z', 'nvd_published_at': '2022-01-10T18:15:00Z'} |
1.4.0 | GHSA-p3rp-vmj9-gv6v | 2022-01-06T19:02:22Z | 2022-01-06T19:45:59Z | null | ['CVE-2021-43861'] | Incorrect sanitisation function leads to `XSS` in mermaid | ### Impact
Malicious diagrams can contain javascript code that can be run at diagram readers machines.
### Patches
The users should upgrade to version 8.13.8
### Workarounds
You need to upgrade in order to avoid this issue.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'mermaid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.13.8'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/mermaid-js/mermaid/security/advisories/GHSA-p3rp-vmj9-gv6v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43861'}, {'type': 'WEB', 'url': 'https://github.com/mermaid-js/mermaid/commit/066b7a0d0bda274d94a2f2d21e4323dab5776d83'}, {'type': 'PACKAGE', '... | {'cwe_ids': ['CWE-20', 'CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T19:02:22Z', 'nvd_published_at': '2021-12-30T14:15:00Z'} |
1.4.0 | GHSA-c5hx-w945-j4pq | 2022-01-07T18:29:04Z | 2022-01-06T22:08:33Z | null | ['CVE-2021-45706'] | Memory flaw in zeroize_derive | An issue was discovered in the zeroize_derive crate before 1.1.1 for Rust. Dropped memory is not zeroed out for an enum. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'zeroize_derive'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45706'}, {'type': 'WEB', 'url': 'https://github.com/iqlusioninc/crates/issues/876'}, {'type': 'PACKAGE', 'url': 'https://github.com/RustCrypto/utils/tree/master/zeroize/derive'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/adv... | {'cwe_ids': ['CWE-459'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T23:01:59Z', 'nvd_published_at': '2021-12-27T00:15:00Z'} |
1.4.0 | GHSA-jgm9-xpfj-4fq6 | 2022-01-19T19:28:05Z | 2022-01-21T23:20:19Z | null | ['CVE-2022-21693'] | Path traversal in Onionshare | Between September 26, 2021 and October 8, 2021, [Radically Open Security](https://www.radicallyopensecurity.com/) conducted a penetration test of OnionShare 2.4, funded by the Open Technology Fund's [Red Team lab](https://www.opentech.fund/labs/red-team-lab/). This is an issue from that penetration test.
- Vulnerabili... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'onionshare-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3'}, {'fixed': '2.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/onionshare/onionshare/security/advisories/GHSA-jgm9-xpfj-4fq6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21693'}, {'type': 'PACKAGE', 'url': 'https://github.com/onionshare/onionshare'}, {'type': 'WEB', 'url': 'https://github.com/onionshare/onion... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T19:28:05Z', 'nvd_published_at': '2022-01-18T22:15:00Z'} |
1.4.0 | GHSA-8wf2-3ggj-78q9 | 2022-01-28T22:31:16Z | 2022-01-28T22:44:40Z | null | ['CVE-2022-23807'] | Improper Authentication in phpmyadmin | An issue was discovered in phpMyAdmin 4.9 before 4.9.8 and 5.1 before 5.1.2. A valid user who is already authenticated to phpMyAdmin can manipulate their account to bypass two-factor authentication for future login instances. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.9.0'}, {'fixed': '4.9.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}, {'fixed': '... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23807'}, {'type': 'WEB', 'url': 'https://github.com/phpmyadmin/phpmyadmin/commit/ca54f1db050859eb8555875c6aa5d7796fdf4b32'}, {'type': 'PACKAGE', 'url': 'https://github.com/phpmyadmin/phpmyadmin'}, {'type': 'WEB', 'url': 'https://www.phpmyadmin.net/... | {'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-28T22:31:16Z', 'nvd_published_at': '2022-01-22T02:15:00Z'} |
1.4.0 | GHSA-7vxc-chqj-h83g | 2022-01-07T16:11:21Z | 2022-01-06T22:02:18Z | null | ['CVE-2021-4168'] | showdoc is vulnerable to Cross-Site Request Forgery (CSRF) | showdoc is vulnerable to Cross-Site Request Forgery (CSRF). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.15'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4168'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/3ff0c85d439ccbdfadeb96b5a52acf6318041109'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/f14431e2-f1f6... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T21:30:44Z', 'nvd_published_at': '2021-12-26T14:15:00Z'} |
1.4.0 | GHSA-r8j4-96mx-rjcc | 2022-02-24T18:37:30Z | 2022-01-21T18:13:42Z | null | ['CVE-2022-0219'] | Improper Restriction of XML External Entity Reference in skylot/jadx | skylot/jadx prior to 1.3.2 is vulnerable to Improper Restriction of XML External Entities when a user is tricked into exporting a malicious APK file (via the -e option) containing a crafted AndroidManifest.xml / strings.xml to gradle, leading to possible local file disclosure. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.github.skylot:jadx-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0219'}, {'type': 'WEB', 'url': 'https://github.com/skylot/jadx/commit/d22db30166e7cb369d72be41382bb63ac8b81c52'}, {'type': 'PACKAGE', 'url': 'https://github.com/skylot/jadx'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0d093863-29e8-4dd7-a8... | {'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-21T16:54:58Z', 'nvd_published_at': '2022-01-20T17:15:00Z'} |
1.4.0 | GHSA-fgfm-hqjw-3265 | 2022-01-06T18:35:59Z | 2022-01-06T22:18:46Z | null | ['CVE-2018-25025'] | Out-of-bounds Write in actix-web | An issue was discovered in the actix-web crate before 0.7.15 for Rust. It can unsoundly extend the lifetime of a string, leading to memory corruption. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'actix-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.15'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25025'}, {'type': 'WEB', 'url': 'https://github.com/actix/actix-web/issues/289'}, {'type': 'PACKAGE', 'url': 'https://github.com/actix/actix-web.git'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/actix-... | {'cwe_ids': ['CWE-787'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T18:35:59Z', 'nvd_published_at': '2021-12-27T00:15:00Z'} |
1.4.0 | GHSA-gc67-crq6-hgh5 | 2022-01-06T23:39:35Z | 2022-01-06T23:59:25Z | null | ['CVE-2021-41561'] | Improper Input Validation in Parquet-MR | Improper Input Validation vulnerability in Parquet-MR of Apache Parquet allows an attacker to DoS by malicious Parquet files. This issue affects Apache Parquet-MR version 1.9.0 and later versions. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.parquet:parquet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.0'}, {'fixed': '1.12.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.parquet:parquet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41561'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/parquet-mr'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/1bjlscbqtfzl160hrm9lnpjpppp5z3zr'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/12/20/1... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T23:39:35Z', 'nvd_published_at': '2021-12-20T12:15:00Z'} |
1.4.0 | GHSA-v938-qcc9-rwv8 | 2023-06-13T17:06:30Z | 2022-01-06T22:17:09Z | null | ['CVE-2020-36512'] | Use of Uninitialized Resource in buffoon. | Affected versions of this crate passes an uninitialized buffer to a user-provided Read implementation.
Arbitrary Read implementations can read from the uninitialized buffer (memory exposure) and also can return incorrect number of bytes written to the buffer. Reading from uninitialized memory produces undefined values ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'buffoon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36512'}, {'type': 'WEB', 'url': 'https://github.com/carllerche/buffoon/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/carllerche/buffoon'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/buffoo... | {'cwe_ids': ['CWE-908'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T18:26:25Z', 'nvd_published_at': '2021-12-27T00:15:00Z'} |
1.4.0 | GHSA-8c5j-9r9f-c6w8 | 2022-02-14T22:16:33Z | 2022-01-12T19:21:10Z | null | ['CVE-2021-45116'] | Information disclosure in Django | An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1. Due to leveraging the Django Template Language's variable resolution logic, the dictsort template filter was potentially vulnerable to information disclosure, or an unintended method call, if passed a suitably crafted key. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ecosystem_specific': {'affected_functions': ['django.template.defaultfilters.dictsort', 'django.template.defaultfilters.dictsortreversed']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.26'}]}]}, {'package': {'ecosystem': 'PyP... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45116'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/2a8ec7f546d6d5806e221ec948c5146b55bd7489'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/c7fe895bca06daf12cc1670b56eaf72a1ef27a16'}, {'type': 'WEB', 'url': ... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-12T19:18:36Z', 'nvd_published_at': '2022-01-05T00:15:00Z'} |
1.4.0 | GHSA-v2ch-fc8f-qm33 | 2022-01-07T16:24:37Z | 2022-01-06T22:16:57Z | null | ['CVE-2020-36511'] | Use of Uninitialized Resource in bite. | An issue was discovered in the bite crate through 2020-12-31 for Rust. read::BiteReadExpandedExt::read_framed_max may read from uninitialized memory locations. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'bite'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36511'}, {'type': 'WEB', 'url': 'https://github.com/hinaria/bite/issues/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/hinaria/bite'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/bite/RUSTSEC-2020-... | {'cwe_ids': ['CWE-908'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T18:21:51Z', 'nvd_published_at': '2021-12-27T00:15:00Z'} |
1.4.0 | GHSA-fg7r-2g4j-5cgr | 2023-06-13T22:01:00Z | 2022-01-06T22:04:37Z | null | ['CVE-2021-45710'] | Race Condition in tokio | If a tokio::sync::oneshot channel is closed (via the oneshot::Receiver::close method), a data race may occur if the oneshot::Sender::send method is called while the corresponding oneshot::Receiver is awaited or calling try_recv.
When these methods are called concurrently on a closed channel, the two halves of the chan... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'tokio'}, 'ecosystem_specific': {'affected_functions': ['tokio::sync::oneshot::Receiver::close']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.14'}, {'fixed': '1.8.4'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'tokio'}, 'ecosystem_specific': ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45710'}, {'type': 'WEB', 'url': 'https://github.com/tokio-rs/tokio/issues/4225'}, {'type': 'PACKAGE', 'url': 'https://github.com/tokio-rs/tokio'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/tokio/RUSTS... | {'cwe_ids': ['CWE-362'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T22:43:36Z', 'nvd_published_at': '2021-12-27T00:15:00Z'} |
1.4.0 | GHSA-h3vq-wv8j-36gw | 2022-01-07T23:45:14Z | 2022-01-08T00:44:33Z | null | ['CVE-2020-27428'] | Cross-site Scripting in Scratch-Svg-Renderer | A DOM-based cross-site scripting (XSS) vulnerability in Scratch-Svg-Renderer v0.2.0 allows attackers to execute arbitrary web scripts or HTML via a crafted sb3 file. | [] | [{'package': {'ecosystem': 'npm', 'name': 'scratch-svg-renderer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-27428'}, {'type': 'WEB', 'url': 'https://github.com/LLK/scratch-svg-renderer/commit/7c74ec7de3254143ec3c557677f5355a90a3d07f'}, {'type': 'PACKAGE', 'url': 'https://github.com/LLK/scratch-svg-renderer'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T23:45:14Z', 'nvd_published_at': '2022-01-06T00:15:00Z'} |
1.4.0 | GHSA-c697-r227-pq6h | 2022-01-25T20:47:39Z | 2022-01-21T23:33:58Z | null | ['CVE-2022-0263'] | Unrestricted Upload of File with Dangerous Type in pimcore | Unrestricted Upload of File with Dangerous Type in Packagist pimcore/pimcore | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.2.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0263'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/35d1853baf64d6a1d90fd8803e52439da53a3911'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/96506857-06bc... | {'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T22:27:34Z', 'nvd_published_at': '2022-01-18T16:15:00Z'} |
1.4.0 | GHSA-w2mh-6xj5-f77f | 2023-05-24T17:10:39Z | 2022-01-13T00:01:02Z | null | ['CVE-2022-20618'] | Incorrect Permission Assignment for Critical Resource in Jenkins Bitbucket Branch Source Plugin | Jenkins Bitbucket Branch Source Plugin prior to 746.v350d2781c184, 725.vd9f8be0fa250, 2.9.11.2, and 2.9.7.2 does not perform permission checks in several HTTP endpoints.
This allows attackers with Overall/Read access to enumerate credentials IDs of credentials stored in Jenkins. Those can be used as part of an attack ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:cloudbees-bitbucket-branch-source'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '726.v7e6f53de133c'}, {'fixed': '746.v350d2781c184'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:cloudbees-bitbucket-branch-sour... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-20618'}, {'type': 'WEB', 'url': 'https://github.com/CVEProject/cvelist/blob/2d78eb36f4d084db7fb35f1535d8d84fdcb7d859/2022/20xxx/CVE-2022-20618.json'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/bitbucket-branch-source-plugin'}, {'type... | {'cwe_ids': ['CWE-732', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:49:18Z', 'nvd_published_at': '2022-01-12T20:15:00Z'} |
1.4.0 | GHSA-f8m6-h2c7-8h9x | 2022-01-05T17:40:20Z | 2022-01-06T17:38:45Z | null | ['CVE-2021-43854'] | Inefficient Regular Expression Complexity in nltk (word_tokenize, sent_tokenize) | ### Impact
The vulnerability is present in [`PunktSentenceTokenizer`](https://www.nltk.org/api/nltk.tokenize.punkt.html#nltk.tokenize.punkt.PunktSentenceTokenizer), [`sent_tokenize`](https://www.nltk.org/api/nltk.tokenize.html#nltk.tokenize.sent_tokenize) and [`word_tokenize`](https://www.nltk.org/api/nltk.tokenize.ht... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'nltk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/nltk/nltk/security/advisories/GHSA-f8m6-h2c7-8h9x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43854'}, {'type': 'WEB', 'url': 'https://github.com/nltk/nltk/issues/2866'}, {'type': 'WEB', 'url': 'https://github.com/nltk/nltk/pull/2869'}, {'type': ... | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T17:40:20Z', 'nvd_published_at': '2021-12-23T18:15:00Z'} |
1.4.0 | GHSA-jv2r-jx6q-89jg | 2022-01-07T16:16:57Z | 2022-01-06T22:16:32Z | null | ['CVE-2021-45682'] | Use of Uninitialized Resource in bronzedb-protocol. | An issue was discovered in the bronzedb-protocol crate through 2021-01-03 for Rust. ReadKVExt may read from uninitialized memory locations. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'bronzedb-protocol'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45682'}, {'type': 'WEB', 'url': 'https://github.com/Hexilee/BronzeDB/issues/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/Hexilee/BronzeDB'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/bronzedb-p... | {'cwe_ids': ['CWE-908'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T17:49:03Z', 'nvd_published_at': '2021-12-27T00:15:00Z'} |
1.4.0 | GHSA-mvff-h3cj-wj9c | 2022-04-04T20:40:33Z | 2022-01-06T17:36:59Z | null | ['CVE-2021-43816'] | Unprivileged pod using `hostPath` can side-step active LSM when it is SELinux | ### Impact
Containers launched through containerd’s CRI implementation on Linux systems which use the SELinux security module and containerd versions since v1.5.0 can cause arbitrary files and directories on the host to be relabeled to match the container process label through the use of specially-configured bind moun... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/containerd/containerd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.9'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/containerd/containerd/security/advisories/GHSA-mvff-h3cj-wj9c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43816'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/issues/6194'}, {'type': 'WEB', 'url': 'https://github.com/containe... | {'cwe_ids': ['CWE-281'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T21:09:16Z', 'nvd_published_at': '2022-01-05T19:15:00Z'} |
1.4.0 | GHSA-j8rg-4hjm-8r95 | 2022-11-29T21:23:36Z | 2022-01-13T00:00:53Z | null | ['CVE-2022-23113'] | Path traversal vulnerability in Jenkins Publish Over SSH Plugin | Jenkins Publish Over SSH Plugin 1.22 and earlier performs a validation of the file name specifying whether it is present or not, resulting in a path traversal vulnerability allowing attackers with Item/Configure permission to discover the name of the Jenkins controller files. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:publish-over-ssh'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.23'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23113'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/publish-over-ssh-plugin'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/publish-over-ssh-plugin/releases/tag/publish-over-ssh-1.23'}, {'type': 'WEB', 'url': 'https://www.jenk... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T21:23:36Z', 'nvd_published_at': '2022-01-12T20:15:00Z'} |
1.4.0 | GHSA-558x-h7rg-997v | 2023-05-23T19:36:39Z | 2022-01-13T00:01:04Z | null | ['CVE-2022-20614'] | Incorrect Permission Assignment for Critical Resource in Jenkins Mailer Plugin | Jenkins Mailer Plugin prior to 408.vd726a_1130320 and 1.34.2 does not perform a permission check in a method implementing form validation.
This allows attackers with Overall/Read access to use the DNS used by the Jenkins instance to resolve an attacker-specified hostname.
Additionally, this form validation method doe... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:mailer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '391.ve4a38c1bcf4b'}, {'fixed': '408.vd726a'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:mailer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduce... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-20614'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2163'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secur... | {'cwe_ids': ['CWE-732', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:50:04Z', 'nvd_published_at': '2022-01-12T20:15:00Z'} |
1.4.0 | GHSA-8xjp-rp29-v5j8 | 2023-06-27T22:18:19Z | 2022-01-13T00:00:52Z | null | ['CVE-2022-23118'] | Agent-to-controller security bypass in Jenkins Debian Package Builder Plugin | Jenkins Debian Package Builder Plugin 1.6.11 and earlier implements functionality that allows agent processes to invoke command-line git at an attacker-specified path on the controller.
This allows attackers able to control agent processes to invoke arbitrary OS commands on the controller. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'ru.yandex.jenkins.plugins.debuilder:debian-package-builder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.6.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23118'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/debian-package-builder-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2546'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/o... | {'cwe_ids': ['CWE-269', 'CWE-668', 'CWE-693'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-01T20:10:51Z', 'nvd_published_at': '2022-01-12T20:15:00Z'} |
1.4.0 | GHSA-6gf2-pvqw-37ph | 2022-01-18T22:38:44Z | 2022-01-12T23:04:06Z | null | ['CVE-2021-22060'] | Log entry injection in Spring Framework | In Spring Framework versions 5.3.0 - 5.3.13, 5.2.0 - 5.2.18, and older unsupported versions, it is possible for a user to provide malicious input to cause the insertion of additional log entries. This is a follow-up to CVE-2021-22096 that protects against additional types of input and in more places of the Spring Frame... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.3.0'}, {'fixed': '5.3.14'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.0'}... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22060'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2021-22060'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-11T18:50:39Z', 'nvd_published_at': '2022-01-10T14:10:00Z'} |
1.4.0 | GHSA-7x36-h62w-vw65 | 2022-01-06T18:34:36Z | 2022-01-06T22:18:58Z | null | ['CVE-2018-25026'] | Out-of-bounds Write in actix-web | An issue was discovered in the actix-web crate before 0.7.15 for Rust. It can add the Send marker trait to an object that cannot be sent between threads safely, leading to memory corruption. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'actix-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.15'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25026'}, {'type': 'WEB', 'url': 'https://github.com/actix/actix-web/issues/289'}, {'type': 'PACKAGE', 'url': 'https://github.com/actix/actix-web.git'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/actix-... | {'cwe_ids': ['CWE-787'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T18:34:36Z', 'nvd_published_at': '2021-12-27T00:15:00Z'} |
1.4.0 | GHSA-f7xw-46vh-5jw2 | 2022-01-04T20:12:09Z | 2022-01-05T20:33:47Z | null | ['CVE-2021-4132'] | livehelperchat is vulnerable to Cross-site Scripting | livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.91'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4132'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/55b1e3bf62c564db7c919f5293ec1e755c2958d6'}, {'type': 'PACKAGE', 'url': 'https://github.com/livehelperchat/livehelperchat'}, {'type': 'WEB', 'url': 'https://hunt... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-04T20:12:09Z', 'nvd_published_at': '2021-12-17T13:15:00Z'} |
1.4.0 | GHSA-h376-j262-vhq6 | 2022-01-20T15:36:58Z | 2022-01-06T23:55:09Z | null | ['CVE-2021-42392'] | RCE in H2 Console | ### Impact
H2 Console in versions since 1.1.100 (2008-10-14) to 2.0.204 (2021-12-21) inclusive allows loading of custom classes from remote servers through JNDI.
H2 Console doesn't accept remote connections by default. If remote access was enabled explicitly and some protection method (such as security constraint) was... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.h2database:h2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.100'}, {'fixed': '2.0.206'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/h2database/h2database/security/advisories/GHSA-h376-j262-vhq6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42392'}, {'type': 'PACKAGE', 'url': 'https://github.com/h2database/h2database'}, {'type': 'WEB', 'url': 'https://github.com/h2database/h2dat... | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T20:14:33Z', 'nvd_published_at': '2022-01-10T14:10:00Z'} |
1.4.0 | GHSA-46c4-8wrp-j99v | 2021-03-22T21:07:36Z | 2022-01-06T20:30:34Z | null | ['CVE-2020-8124'] | Improper Validation and Sanitization in url-parse | Insufficient validation and sanitization of user input exists in url-parse npm package version 1.4.4 and earlier may allow attacker to bypass security checks. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'url-parse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8124'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/496293'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T21:07:36Z', 'nvd_published_at': '2020-02-04T20:15:00Z'} |
1.4.0 | GHSA-q4xf-3pmq-3hw8 | 2021-03-29T16:20:14Z | 2022-01-06T20:41:00Z | null | ['CVE-2020-13940'] | Improper Restriction of XML External Entity Reference in Apache NiFi | In Apache NiFi 1.0.0 to 1.11.4, the notification service manager and various policy authorizer and user group provider objects allowed trusted administrators to inadvertently configure a potentially malicious XML file. The XML file has the ability to make external calls to services (via XXE). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.12.0-RC1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.11.4'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13940'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi/commit/7f0416ee8bdcee95e28409cc6fae9c1394c2a798'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security#CVE-2020-13940'}] | {'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T16:20:14Z', 'nvd_published_at': '2020-10-01T20:15:00Z'} |
1.4.0 | GHSA-54qq-9chj-rxhv | 2022-02-04T16:53:54Z | 2022-01-29T00:00:33Z | null | ['CVE-2022-0395'] | Cross-site Scripting in LiveHelperChat | LiveHelperChat prior to version 3.93 contains a cross-site scripting vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.93'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0395'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/8fdb4f67ac1a095331aa0fb4630ef9dfe8e75dcb'}, {'type': 'PACKAGE', 'url': 'https://github.com/livehelperchat/livehelperchat'}, {'type': 'WEB', 'url': 'https://hunt... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T16:53:54Z', 'nvd_published_at': '2022-01-28T22:15:00Z'} |
1.4.0 | GHSA-7wv8-g97r-432h | 2022-01-27T18:32:04Z | 2022-01-21T18:06:47Z | null | ['CVE-2022-0281'] | Exposure of Sensitive Information to an Unauthorized Actor in microweber | Exposure of Sensitive Information to an Unauthorized Actor in Packagist microweber/microweber prior to 1.2.11. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0281'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/e680e134a4215c979bfd2eaf58336be34c8fc6e6'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3... | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-21T16:59:24Z', 'nvd_published_at': '2022-01-20T11:15:00Z'} |
1.4.0 | GHSA-vw5m-qw2r-m923 | 2022-01-07T17:13:28Z | 2022-01-06T22:11:46Z | null | ['CVE-2021-45690'] | Use of Uninitialized Resource in messagepack-rs. | An issue was discovered in the messagepack-rs crate through 2021-01-26 for Rust. deserialize_binary may read from uninitialized memory locations. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'messagepack-rs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.8.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45690'}, {'type': 'WEB', 'url': 'https://github.com/otake84/messagepack-rs/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/otake84/messagepack-rs'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crate... | {'cwe_ids': ['CWE-908'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T16:39:25Z', 'nvd_published_at': '2021-12-27T00:15:00Z'} |
1.4.0 | GHSA-g76j-4cxx-23h9 | 2022-06-20T22:48:44Z | 2022-01-20T00:00:48Z | null | ['CVE-2022-21363'] | Improper Handling of Insufficient Permissions or Privileges in MySQL Connectors Java | Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vuln... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'mysql:mysql-connector-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.0.28'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.0.27'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21363'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}] | {'cwe_ids': ['CWE-280'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:48:44Z', 'nvd_published_at': '2022-01-19T12:15:00Z'} |
1.4.0 | GHSA-x7wr-283h-5h2v | 2022-01-19T18:47:05Z | 2022-01-21T23:20:29Z | null | ['CVE-2022-21688'] | Out-of-bounds Read in Onionshare | Between September 26, 2021 and October 8, 2021, [Radically Open Security](https://www.radicallyopensecurity.com/) conducted a penetration test of OnionShare 2.4, funded by the Open Technology Fund's [Red Team lab](https://www.opentech.fund/labs/red-team-lab/). This is an issue from that penetration test.
- Vulnerabili... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'onionshare-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/onionshare/onionshare/security/advisories/GHSA-x7wr-283h-5h2v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21688'}, {'type': 'PACKAGE', 'url': 'https://github.com/onionshare/onionshare'}, {'type': 'WEB', 'url': 'https://github.com/onionshare/onion... | {'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T18:27:26Z', 'nvd_published_at': '2022-01-18T22:15:00Z'} |
1.4.0 | GHSA-5r5w-h76p-m726 | 2022-01-13T18:32:43Z | 2022-01-06T22:20:53Z | null | ['CVE-2021-42583'] | Use of a Broken or Risky Cryptographic Algorithm in Max Mazurov Maddy | A Broken or Risky Cryptographic Algorithm exists in Max Mazurov Maddy before 0.5.2, which is an unnecessary risk that may result in the exposure of sensitive information. | [] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/foxcpp/maddy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42583'}, {'type': 'PACKAGE', 'url': 'https://github.com/foxcpp/maddy'}, {'type': 'WEB', 'url': 'https://github.com/foxcpp/maddy/blob/df40dce1284cd0fd0a9e8e7894029553d653d0a5/internal/auth/shadow/verify.go'}, {'type': 'WEB', 'url': 'https://github.c... | {'cwe_ids': ['CWE-327'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T18:56:46Z', 'nvd_published_at': '2021-12-28T19:15:00Z'} |
1.4.0 | GHSA-99p8-9p2c-49j4 | 2022-01-19T19:40:50Z | 2022-01-21T23:20:16Z | null | ['CVE-2022-21695'] | Improper Access Control in Onionshare | Between September 26, 2021 and October 8, 2021, [Radically Open Security](https://www.radicallyopensecurity.com/) conducted a penetration test of OnionShare 2.4, funded by the Open Technology Fund's [Red Team lab](https://www.opentech.fund/labs/red-team-lab/). This is an issue from that penetration test.
- Vulnerabili... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'onionshare-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3'}, {'fixed': '2.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/onionshare/onionshare/security/advisories/GHSA-99p8-9p2c-49j4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21695'}, {'type': 'PACKAGE', 'url': 'https://github.com/onionshare/onionshare'}, {'type': 'WEB', 'url': 'https://github.com/onionshare/onion... | {'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T19:40:50Z', 'nvd_published_at': '2022-01-18T22:15:00Z'} |
1.4.0 | GHSA-v57x-gxfj-484q | 2022-01-19T16:11:28Z | 2022-01-21T23:25:04Z | null | [] | Security Advisory for "Log4Shell" | ### Impact
A highly critical 0-day exploit (CVE-2021-44228) is found in Apache log4j 2 library on December 9, 2021.
This affects Apache log4j versions from 2.0-beta9 to 2.14.1 (inclusive).
This vulnerability allows a remote attacker to execute code on the server if the system logs an attacker-controlled string value... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.hazelcast.jet:hazelcast-jet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1'}, {'fixed': '4.5.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.hazelcast:hazelcast'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0'}, {'fixed': '... | [{'type': 'WEB', 'url': 'https://github.com/hazelcast/hazelcast/security/advisories/GHSA-v57x-gxfj-484q'}, {'type': 'PACKAGE', 'url': 'https://github.com/hazelcast/hazelcast/'}] | {'cwe_ids': ['CWE-20', 'CWE-400', 'CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T16:11:28Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xpfv-89vg-r562 | 2022-02-02T16:06:32Z | 2022-01-28T22:07:23Z | null | ['CVE-2022-0335'] | Cross Site Request Forgery in Moodle | A flaw was found in Moodle in versions 3.11 to 3.11.4, 3.10 to 3.10.8, 3.9 to 3.9.11 and earlier unsupported versions. The "delete badge alignment" functionality did not include the necessary token check to prevent a CSRF risk. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11'}, {'fixed': '3.11.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions':... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0335'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/d40cc61eba229c6d1f47b9a525022fbc9136b9f6'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2043666'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-26T22:45:37Z', 'nvd_published_at': '2022-01-25T20:15:00Z'} |
1.4.0 | GHSA-55m5-whcv-c49c | 2023-06-13T20:53:48Z | 2022-01-06T22:20:28Z | null | ['CVE-2018-25023'] | Use of Uninitialized Resource in smallvec | Affected versions of this crate called mem::uninitialized() to create values of a user-supplied type T. This is unsound e.g. if T is a reference type (which must be non-null and thus may not remain uninitialized). The flaw was corrected by avoiding the use of mem::uninitialized(), using MaybeUninit instead. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'smallvec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25023'}, {'type': 'WEB', 'url': 'https://github.com/servo/rust-smallvec/issues/126'}, {'type': 'PACKAGE', 'url': 'https://github.com/servo/rust-smallvec'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/sm... | {'cwe_ids': ['CWE-908'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T18:40:05Z', 'nvd_published_at': '2021-12-27T00:15:00Z'} |
1.4.0 | GHSA-q7q9-w24q-cpgh | 2021-03-26T22:27:13Z | 2022-01-06T20:35:22Z | null | ['CVE-2020-1936'] | Cross-site Scripting (XSS) in Apache Ambari Views | A cross-site scripting issue was found in Apache Ambari Views. This was addressed in Apache Ambari 2.7.4. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ambari:ambari'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1936'}, {'type': 'WEB', 'url': 'https://github.com/apache/ambari/pull/3040'}, {'type': 'WEB', 'url': 'https://github.com/apache/ambari/pull/3040/commits/a9cfdb9dcce63a3494c07c81ebb2cf8da218a210'}, {'type': 'WEB', 'url': 'https://issues.apache.org/j... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-26T22:27:13Z', 'nvd_published_at': '2021-03-02T09:15:00Z'} |
1.4.0 | GHSA-hxjf-h2mh-r6hj | 2023-06-13T18:03:25Z | 2022-01-06T22:20:12Z | null | ['CVE-2018-25027'] | Use After Free in libpulse-binding | Affected versions contained a pair of use-after-free issues with the objects returned by the get_format_info and get_context methods of Stream objects. These objects were mistakenly being constructed without setting an important flag to prevent destruction of the underlying C objects they reference upon their own destr... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'libpulse-binding'}, 'ecosystem_specific': {'affected_functions': ['libpulse_binding::stream::Stream::get_context', 'libpulse_binding::stream::Stream::get_format_info']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/jnqnfe/pulse-binding-rust/security/advisories/GHSA-ghpq-vjxw-ch5w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25027'}, {'type': 'PACKAGE', 'url': 'https://github.com/jnqnfe/pulse-binding-rust'}, {'type': 'WEB', 'url': 'https://raw.githubuserconte... | {'cwe_ids': ['CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T18:32:15Z', 'nvd_published_at': '2021-12-27T00:15:00Z'} |
1.4.0 | GHSA-fr5w-98mc-jjvg | 2023-07-07T21:39:49Z | 2022-01-22T00:00:48Z | null | ['CVE-2022-23315'] | Arbitrary file upload in Mingsoft MCMS | MCMS v5.2.4 was discovered to contain an arbitrary file upload vulnerability via the component `/ms/template/writeFileContent.do`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23315'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220125060457/https://gitee.com/mingSoft/MCMS/issues/I4Q4PX'}] | {'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T21:39:49Z', 'nvd_published_at': '2022-01-21T00:15:00Z'} |
1.4.0 | GHSA-vcgf-vmpc-ph79 | 2023-06-30T20:05:11Z | 2022-01-21T18:06:16Z | null | ['CVE-2022-0277'] | Microweber Incorrect Permission Assignment for Critical Resource vulnerability | In Microweber prior to 1.2.11, a non-admin user is able to access other users' sensitive information. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0277'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/e680e134a4215c979bfd2eaf58336be34c8fc6e6'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0... | {'cwe_ids': ['CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-21T17:00:33Z', 'nvd_published_at': '2022-01-20T10:15:00Z'} |
1.4.0 | GHSA-4rq4-32rv-6wp6 | 2022-01-21T21:05:51Z | 2022-01-21T23:37:28Z | null | ['CVE-2022-0144'] | Improper Privilege Management in shelljs | shelljs is vulnerable to Improper Privilege Management | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'shelljs'}, 'ecosystem_specific': {'affected_functions': ['shelljs.exec']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0144'}, {'type': 'WEB', 'url': 'https://github.com/shelljs/shelljs/commit/d919d22dd6de385edaa9d90313075a77f74b338c'}, {'type': 'PACKAGE', 'url': 'https://github.com/shelljs/shelljs'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/50996581-c08e... | {'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-21T21:05:51Z', 'nvd_published_at': '2022-01-11T07:15:00Z'} |
1.4.0 | GHSA-h6x7-jq46-fp33 | 2022-11-29T21:17:59Z | 2022-01-13T00:00:54Z | null | ['CVE-2022-23109'] | Improper credentials masking in Jenkins HashiCorp Vault Plugin | Jenkins HashiCorp Vault Plugin 3.7.0 and earlier does not mask Vault credentials in Pipeline build logs or in Pipeline step descriptions when Pipeline: Groovy Plugin 2.85 or later is installed. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.datapipe.jenkins.plugins:hashicorp-vault-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23109'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/hashicorp-vault-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2213'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secu... | {'cwe_ids': ['CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T21:17:59Z', 'nvd_published_at': '2022-01-12T20:15:00Z'} |
1.4.0 | GHSA-rqjh-jp2r-59cj | 2023-08-31T00:47:27Z | 2022-01-06T22:24:14Z | null | ['CVE-2021-3842'] | NLTK Vulnerable to REDoS | NLTK is vulnerable to REDoS in some RegexpTaggers used in the functions `get_pos_tagger` and `malt_regex_tagger`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'nltk'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3842'}, {'type': 'WEB', 'url': 'https://github.com/nltk/nltk/pull/2906'}, {'type': 'WEB', 'url': 'https://github.com/nltk/nltk/commit/2a50a3edc9d35f57ae42a921c621edc160877f4d'}, {'type': 'PACKAGE', 'url': 'https://github.com/nltk/nltk'}, {'type': '... | {'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T19:53:00Z', 'nvd_published_at': '2022-01-04T15:15:00Z'} |
1.4.0 | GHSA-rhq2-3vr9-6mcr | 2022-01-18T21:15:21Z | 2022-01-21T23:43:33Z | null | ['CVE-2021-43831'] | Files on the host computer can be accessed from the Gradio interface | ### Impact
This is a vulnerability that affects anyone who creates and publicly shares Gradio interfaces using `gradio<2.4.8`. Because of the way that static files were being served, someone who generated a public Gradio link and shared it with others would potentially be exposing the files on the computer that generat... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'gradio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/gradio-app/gradio/security/advisories/GHSA-rhq2-3vr9-6mcr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43831'}, {'type': 'WEB', 'url': 'https://github.com/gradio-app/gradio/commit/41bd3645bdb616e1248b2167ca83636a2653f781'}, {'type': 'PACKAGE', 'ur... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-18T21:15:21Z', 'nvd_published_at': '2021-12-15T20:15:00Z'} |
1.4.0 | GHSA-xg6r-5gx4-qxjm | 2022-01-05T20:32:32Z | 2022-01-06T21:58:34Z | null | ['CVE-2021-3977'] | invoiceninja is vulnerable to Cross-site Scripting | invoiceninja is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'hillelcoren/invoice-ninja'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.35'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3977'}, {'type': 'WEB', 'url': 'https://github.com/invoiceninja/invoiceninja/commit/1186eaa82375692d01d5ef3369c5b7bc7315b55f'}, {'type': 'PACKAGE', 'url': 'https://github.com/invoiceninja/invoiceninja'}, {'type': 'WEB', 'url': 'https://github.com/i... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T20:32:32Z', 'nvd_published_at': '2021-12-24T20:15:00Z'} |
1.4.0 | GHSA-xh9g-cp3v-p8q4 | 2022-02-03T21:01:13Z | 2022-01-27T00:01:17Z | null | ['CVE-2022-0203'] | Missing Authorization in Crater Invoice | Crater Invoice prior to version 6.0.2 has a missing authorization vulnerability.. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'bytefury/crater'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0203'}, {'type': 'WEB', 'url': 'https://github.com/crater-invoice/crater/commit/dd324c8bb6b17009f82afe8bc830caec7241e992'}, {'type': 'PACKAGE', 'url': 'https://github.com/crater-invoice/crater'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3... | {'cwe_ids': ['CWE-284', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T21:01:13Z', 'nvd_published_at': '2022-01-26T13:15:00Z'} |
1.4.0 | GHSA-53xv-c2hx-5w6q | 2022-03-30T21:13:48Z | 2022-01-05T20:39:21Z | null | ['CVE-2021-45459'] | Command Injection in node-windows | lib/cmd.js in the node-windows package before 1.0.0-beta.6 for Node.js allows command injection via the PID parameter. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'node-windows'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0-beta.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.0-beta.5'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45459'}, {'type': 'WEB', 'url': 'https://github.com/dwisiswant0/advisory/issues/4'}, {'type': 'WEB', 'url': 'https://github.com/coreybutler/node-windows/commit/a379d31366edbd7a672a981e6c09e185ab448dd3'}, {'type': 'WEB', 'url': 'https://advisory.dw1... | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T17:15:27Z', 'nvd_published_at': '2021-12-22T06:15:00Z'} |
1.4.0 | GHSA-cwfw-4gq5-mrqx | 2021-03-31T21:35:00Z | 2022-01-06T20:42:03Z | null | ['CVE-2018-1109'] | Regular Expression Denial of Service (ReDoS) in braces | A vulnerability was found in Braces versions prior to 2.3.1. Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) attacks. | [] | [{'package': {'ecosystem': 'npm', 'name': 'braces'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1109'}, {'type': 'WEB', 'url': 'https://github.com/micromatch/braces/commit/abdafb0cae1e0c00f184abbadc692f4eaa98f451'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1547272'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:... | {'cwe_ids': ['CWE-400'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T21:35:00Z', 'nvd_published_at': '2021-03-30T02:15:00Z'} |
1.4.0 | GHSA-cw98-cx2m-9qqg | 2022-01-07T17:53:19Z | 2022-01-06T22:10:08Z | null | ['CVE-2021-45700'] | Denial of Service in ckb | An issue was discovered in the ckb crate before 0.40.0 for Rust. Attackers can cause a denial of service (Nervos CKB blockchain node crash) via a dead call that is used as a DepGroup. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'ckb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.40.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/nervosnetwork/ckb/security/advisories/GHSA-45p7-c959-rgcm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45700'}, {'type': 'PACKAGE', 'url': 'https://github.com/nervosnetwork/ckb'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/a... | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T23:44:51Z', 'nvd_published_at': '2021-12-27T00:15:00Z'} |
1.4.0 | GHSA-phwq-9gc4-q5c8 | 2023-07-13T17:03:18Z | 2022-01-27T00:00:52Z | null | ['CVE-2021-46385'] | Mingsoft MCMS SQL injection vulnerability | Mingsoft MCMS contains a SQL injection vulnerability in the `/querydata` endpoint | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46385'}, {'type': 'WEB', 'url': 'https://github.com/ming-soft/MCMS/issues/99'}, {'type': 'WEB', 'url': 'https://gitee.com/mingSoft/MCMS/issues/I4QZ1K'}] | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T17:03:18Z', 'nvd_published_at': '2022-01-26T19:15:00Z'} |
1.4.0 | GHSA-cv25-3gmg-c6m8 | 2022-01-14T19:42:47Z | 2022-01-06T22:22:32Z | null | ['CVE-2021-25994'] | Injection in UserFrosting | In Userfrosting, versions v0.3.1 to v4.6.2 are vulnerable to Host Header Injection. By luring a victim application user to click on a link, an unauthenticated attacker can use the “forgot password” functionality to reset the victim’s password and successfully take over their account. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'userfrosting/userfrosting'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.1'}, {'fixed': '4.6.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25994'}, {'type': 'WEB', 'url': 'https://github.com/userfrosting/UserFrosting/commit/796dd78757902435d1bd286415feea78098e45ba'}, {'type': 'PACKAGE', 'url': 'https://github.com/userfrosting/UserFrosting'}, {'type': 'WEB', 'url': 'https://www.whiteso... | {'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T19:40:35Z', 'nvd_published_at': '2022-01-03T07:15:00Z'} |
1.4.0 | GHSA-wr66-vrwm-5g5x | 2022-02-07T21:17:29Z | 2022-01-28T23:09:22Z | null | ['CVE-2022-21721'] | Denial of Service Vulnerability in next.js | ### Impact
Vulnerable code could allow a bad actor to trigger a denial of service attack for anyone running a Next.js app at version >= 12.0.0, and using i18n functionality.
- **Affected:** All of the following must be true to be affected by this CVE
- Next.js versions above v12.0.0
- Using next start or a custom... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'next'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.0.0'}, {'fixed': '12.0.9'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/vercel/next.js/security/advisories/GHSA-wr66-vrwm-5g5x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21721'}, {'type': 'WEB', 'url': 'https://github.com/vercel/next.js/pull/33503'}, {'type': 'PACKAGE', 'url': 'https://github.com/vercel/next.js'}, {... | {'cwe_ids': ['CWE-20', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-28T18:52:54Z', 'nvd_published_at': '2022-01-28T22:15:00Z'} |
1.4.0 | GHSA-8wcc-f2vq-h4gx | 2022-02-03T20:34:04Z | 2022-01-28T23:06:22Z | null | ['CVE-2022-0370'] | Cross-site Scripting in livehelperchat | Stored XSS is found in Settings>Live help configuration>Personal Theme>static content. Under the NAME field put a payload {{constructor.constructor('alert(1)')()}} while creating content, and you will see that the input gets stored, and every time the user visits, the payload gets executed. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.93'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0370'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/9f5bc33c943349bd765b991db0b7f6b6ef05cfdb'}, {'type': 'PACKAGE', 'url': 'https://github.com/livehelperchat/livehelperchat'}, {'type': 'WEB', 'url': 'https://hunt... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-28T20:00:43Z', 'nvd_published_at': '2022-01-27T06:15:00Z'} |
1.4.0 | GHSA-fm93-fhh2-cg2c | 2022-01-27T14:11:41Z | 2022-01-27T14:21:53Z | null | ['CVE-2021-23460'] | Prototype Pollution in min-dash | The package min-dash before 3.8.1 are vulnerable to Prototype Pollution via the set method due to missing enforcement of key types. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'min-dash'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23460'}, {'type': 'WEB', 'url': 'https://github.com/bpmn-io/min-dash/pull/21'}, {'type': 'WEB', 'url': 'https://github.com/bpmn-io/min-dash/pull/21/commits/5ab05cbc4fd8d5eafb7db540c491ed0906b9d320'}, {'type': 'PACKAGE', 'url': 'https://github.com/b... | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-24T22:51:52Z', 'nvd_published_at': '2022-01-21T20:15:00Z'} |
1.4.0 | GHSA-5vwc-r48g-wj6c | 2023-06-13T16:03:48Z | 2022-01-06T22:08:22Z | null | ['CVE-2021-45708'] | Abomonation transmutes &T to and from &[u8] without sufficient constraints | An issue was discovered in the abomonation crate through version 0.7.3 for Rust. Because transmute operations are insufficiently constrained, there can be an information leak or ASLR bypass. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'abomonation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.7.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45708'}, {'type': 'WEB', 'url': 'https://github.com/TimelyDataflow/abomonation/issues/23'}, {'type': 'PACKAGE', 'url': 'https://github.com/TimelyDataflow/abomonation'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/m... | {'cwe_ids': ['CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T21:50:24Z', 'nvd_published_at': '2021-12-27T00:15:00Z'} |
1.4.0 | GHSA-26hm-r6mg-963c | 2022-02-03T20:49:15Z | 2022-01-26T00:01:25Z | null | ['CVE-2021-46089'] | SQL Injection in JeecgBoot | In JeecgBoot 3.0, there is a SQL injection vulnerability that can operate the database with root privileges. A patch has been released on the repository's `master` branch. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg-boot-base'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg-boot-base-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46089'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/issues/3331'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/commit/baefc1338dd03de36384ce7d5846b08041b488d0'}, {'type': 'PACKAGE', 'url': 'https://github.co... | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T20:49:15Z', 'nvd_published_at': '2022-01-25T15:15:00Z'} |
1.4.0 | GHSA-9qvw-46gf-4fv8 | 2022-01-07T17:41:11Z | 2022-01-06T22:09:07Z | null | ['CVE-2021-45702'] | Use After Free in tremor-script | An issue was discovered in the tremor-script crate before 0.11.6 for Rust. A merge operation may result in a use-after-free. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'tremor-script'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7.2'}, {'fixed': '0.11.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45702'}, {'type': 'WEB', 'url': 'https://github.com/tremor-rs/tremor-runtime/pull/1217'}, {'type': 'WEB', 'url': 'https://github.com/tremor-rs/tremor-runtime/commit/1a2efcdbe68e5e7fd0a05836ac32d2cde78a0b2e'}, {'type': 'WEB', 'url': 'https://raw.git... | {'cwe_ids': ['CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T13:28:58Z', 'nvd_published_at': '2021-12-27T00:15:00Z'} |
1.4.0 | GHSA-8489-44mv-ggj8 | 2022-02-25T18:37:34Z | 2022-01-04T16:14:20Z | null | ['CVE-2021-44832'] | Improper Input Validation and Injection in Apache Log4j2 | Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) are vulnerable to an attack where an attacker with permission to modify the logging configuration file can construct a malicious configuration using a JDBC Appender with a data source referencing a JNDI URI which can exec... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.logging.log4j:log4j-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0-beta7'}, {'fixed': '2.3.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.logging.log4j:log4j-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44832'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-784507.pdf'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/logging-log4j2'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/LOG4J2-3293'}, ... | {'cwe_ids': ['CWE-20', 'CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-12-28T21:14:19Z', 'nvd_published_at': '2021-12-28T20:15:00Z'} |
1.4.0 | GHSA-8fr3-hfg3-gpgp | 2023-09-11T22:42:40Z | 2022-01-21T23:36:19Z | null | ['CVE-2022-0122'] | Open Redirect in node-forge | parseUrl functionality in node-forge mishandles certain uses of backslash such as `https:/\/\/\` and interprets the URI as a relative path. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'node-forge'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0122'}, {'type': 'WEB', 'url': 'https://github.com/digitalbazaar/forge/commit/db8016c805371e72b06d8e2edfe0ace0df934a5e'}, {'type': 'PACKAGE', 'url': 'https://github.com/digitalbazaar/forge'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/41852... | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-13T18:49:59Z', 'nvd_published_at': '2022-01-06T05:15:00Z'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.