schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 8 154 | details stringlengths 31 19.1k | severity stringlengths 2 92 | affected stringlengths 75 28.5k | references stringlengths 79 7.48k | database_specific stringlengths 131 196 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-vgmw-9cww-qq99 | 2022-02-07T21:14:46Z | 2022-01-31T00:00:29Z | null | ['CVE-2022-0273'] | Incorrect Authorization in calibreweb | calibreweb prior to version 0.6.16 contains an Incorrect Authorization vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'calibreweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.16'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0273'}, {'type': 'WEB', 'url': 'https://github.com/janeczku/calibre-web/commit/0c0313f375bed7b035c8c0482bbb09599e16bfcf'}, {'type': 'PACKAGE', 'url': 'https://github.com/janeczku/calibre-web'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8f2... | {'cwe_ids': ['CWE-284', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-07T21:14:46Z', 'nvd_published_at': '2022-01-30T14:15:00Z'} |
1.4.0 | GHSA-5v2h-r2cx-5xgj | 2022-01-14T19:57:17Z | 2022-01-14T21:04:46Z | null | ['CVE-2022-21681'] | Inefficient Regular Expression Complexity in marked | ### Impact
_What kind of vulnerability is it?_
Denial of service.
The regular expression `inline.reflinkSearch` may cause catastrophic backtracking against some strings.
PoC is the following.
```javascript
import * as marked from 'marked';
console.log(marked.parse(`[x]: x
\\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\]... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'marked'}, 'ecosystem_specific': {'affected_functions': ['marked.parse']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.10'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/markedjs/marked/security/advisories/GHSA-5v2h-r2cx-5xgj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21681'}, {'type': 'WEB', 'url': 'https://github.com/markedjs/marked/commit/8f806573a3f6c6b7a39b8cdb66ab5ebb8d55a5f5'}, {'type': 'PACKAGE', 'url': ... | {'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-14T19:57:17Z', 'nvd_published_at': '2022-01-14T17:15:00Z'} |
1.4.0 | GHSA-r8hp-5m7c-jhv4 | 2022-01-21T21:09:59Z | 2022-01-21T23:08:50Z | null | ['CVE-2022-0274'] | Cross-site Scripting OrchardCore.Application.Cms.Targets | Cross-site Scripting (XSS) - Stored in NuGet OrchardCore.Application.Cms.Targets prior to 1.2.2. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'OrchardCore.Application.Cms.Targets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0274'}, {'type': 'WEB', 'url': 'https://github.com/orchardcms/orchardcore/commit/218f25ddfadb66a54de7a82dffe3ab2e4ab7c4b4'}, {'type': 'PACKAGE', 'url': 'https://github.com/orchardcms/orchardcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-21T21:09:59Z', 'nvd_published_at': '2022-01-19T18:15:00Z'} |
1.4.0 | GHSA-p92q-7fhh-mq35 | 2022-01-20T14:46:50Z | 2022-01-21T23:37:57Z | null | ['CVE-2022-20612'] | Cross-Site Request Forgery in Jenkins | A cross-site request forgery (CSRF) vulnerability in Jenkins 2.329 and earlier, LTS 2.319.1 and earlier allows attackers to trigger build of job without parameters when no security realm is set. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.320'}, {'fixed': '2.330'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-20612'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/changelog-stable/#v2.319.2'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/changelog/#v2.330'}, {'type': 'WEB', 'url': 'ht... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-20T14:46:50Z', 'nvd_published_at': '2022-01-12T20:15:00Z'} |
1.4.0 | GHSA-pmcr-2rhp-36hr | 2022-01-25T21:03:46Z | 2022-01-27T16:23:02Z | null | ['CVE-2022-23857'] | SQL injection in github.com/navidrome/navidrome | model/criteria/criteria.go in Navidrome before 0.47.5 is vulnerable to SQL injection attacks when processing crafted Smart Playlists. An authenticated user could abuse this to extract arbitrary data from the database, including the user table (which contains sensitive information such as the users' encrypted passwords)... | [] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/navidrome/navidrome'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.47.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23857'}, {'type': 'WEB', 'url': 'https://github.com/navidrome/navidrome/commit/9e79b5cbf2a48c1e4344df00fea4ed3844ea965d'}, {'type': 'PACKAGE', 'url': 'https://github.com/navidrome/navidrome'}, {'type': 'WEB', 'url': 'https://github.com/navidrome/na... | {'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-25T21:03:46Z', 'nvd_published_at': '2022-01-24T02:15:00Z'} |
1.4.0 | GHSA-g4c2-ghfg-g5rh | 2022-02-07T21:16:57Z | 2022-01-28T23:10:37Z | null | ['CVE-2022-23599'] | Cross-site Scripting and Open Redirect in Products.ATContentTypes | ### Impact
Plone is vulnerable to reflected cross site scripting and open redirect when an attacker can get a compromised version of the image_view_fullscreen page in a cache, for example in Varnish.
The technique is known as cache poisoning.
Any later visitor can get redirected when clicking on a link on this page.
Us... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Products.ATContentTypes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/plone/Products.ATContentTypes/security/advisories/GHSA-g4c2-ghfg-g5rh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23599'}, {'type': 'WEB', 'url': 'https://github.com/plone/Products.ATContentTypes/commit/fc793f88f35a15a68b52e4abed77af0da5fdbab8'},... | {'cwe_ids': ['CWE-601', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-28T22:15:57Z', 'nvd_published_at': '2022-01-28T22:15:00Z'} |
1.4.0 | GHSA-wrp6-9w7f-3wxg | 2022-01-18T22:52:28Z | 2022-01-21T23:55:34Z | null | ['CVE-2021-4170'] | calibre-web is vulnerable to Cross-site Scripting | calibre-web is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'calibreweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.15'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4170'}, {'type': 'WEB', 'url': 'https://github.com/janeczku/calibre-web/commit/7ad419dc8c12180e842a82118f4866ac3d074bc5'}, {'type': 'PACKAGE', 'url': 'https://github.com/janeczku/calibre-web/'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ff... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-18T22:52:28Z', 'nvd_published_at': '2022-01-16T21:15:00Z'} |
1.4.0 | GHSA-5c6c-w4c4-vgvx | 2022-12-13T18:00:58Z | 2022-01-06T18:45:09Z | null | ['CVE-2021-21668'] | Stored XSS vulnerability in Jenkins Scriptler Plugin | Scriptler Plugin 3.1 and earlier does not escape script content.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Scriptler/Configure permission.
Scriptler Plugin 3.2 escapes script content. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:scriptler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21668'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/scriptler-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-06-16/#SECURITY-2390'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-17T17:44:14Z', 'nvd_published_at': '2021-06-16T14:15:00Z'} |
1.4.0 | GHSA-8x44-pwr2-rgc6 | 2022-02-03T19:56:45Z | 2022-01-28T23:05:03Z | null | ['CVE-2022-0348'] | Cross-site Scripting in pimcore | Pimcore settings module is vulnerable to stored cross site scripting | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.2.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.2.9'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0348'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/832c34aeb9f21f213295a0c28377132df996352a'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/250e79be-7e5d... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-28T19:12:11Z', 'nvd_published_at': '2022-01-27T14:15:00Z'} |
1.4.0 | GHSA-4rmr-c2jx-vx27 | 2022-08-11T17:05:16Z | 2022-01-27T14:51:00Z | null | ['CVE-2022-0323'] | Mustache remote code injection vulnerability | In Mustache.php v2.0.0 through v2.14.0, Sections tag can lead to arbitrary php code execution even if strict_callables is true when section value is controllable.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'mustache/mustache'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.14.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0323'}, {'type': 'WEB', 'url': 'https://github.com/bobthecow/mustache.php/commit/579ffa5c96e1d292c060b3dd62811ff01ad8c24e'}, {'type': 'PACKAGE', 'url': 'https://github.com/bobthecow/mustache.php'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties... | {'cwe_ids': ['CWE-1336', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-24T23:01:39Z', 'nvd_published_at': '2022-01-21T18:15:00Z'} |
1.4.0 | GHSA-64wv-8vwp-xgw2 | 2022-01-07T17:19:25Z | 2022-01-06T22:13:02Z | null | ['CVE-2021-45688'] | Use of Uninitialized Resource in ash. | An issue was discovered in the ash crate before 0.33.1 for Rust. util::read_spv may read from uninitialized memory locations. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'ash'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.33.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45688'}, {'type': 'WEB', 'url': 'https://github.com/MaikKlein/ash/issues/354'}, {'type': 'WEB', 'url': 'https://github.com/ash-rs/ash/issues/354'}, {'type': 'WEB', 'url': 'https://github.com/ash-rs/ash/pull/470'}, {'type': 'WEB', 'url': 'https://gi... | {'cwe_ids': ['CWE-908'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T16:49:36Z', 'nvd_published_at': '2021-12-27T00:15:00Z'} |
1.4.0 | GHSA-455w-gv5p-wgg3 | 2022-01-26T22:10:34Z | 2022-01-26T22:10:48Z | null | ['CVE-2022-0260'] | Cross-site Scripting in pimcore | pimcore is vulnerable to Stored XSS at Name field in the setting tab of the Global Targeting Rules. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.2.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0260'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/11205'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/665976327ad3c2c87efa2a5a64d696032c0a8109'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pi... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-25T21:15:55Z', 'nvd_published_at': '2022-01-18T15:15:00Z'} |
1.4.0 | GHSA-jx5q-g37m-h5hj | 2022-01-04T22:46:13Z | 2022-01-06T18:29:51Z | null | ['CVE-2021-43852'] | Client-Side JavaScript Prototype Pollution in oro/platform | ### Summary
By sending a specially crafted request, an attacker could inject properties into existing JavaScript language construct prototypes, such as objects. Later this injection may lead to JS code execution by libraries that are vulnerable to Prototype Pollution.
### Workarounds
Configure WAF to drop requests c... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'oro/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.14'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'oro/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.8'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/oroinc/platform/security/advisories/GHSA-jx5q-g37m-h5hj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43852'}, {'type': 'WEB', 'url': 'https://github.com/oroinc/platform/commit/62c26936b3adee9c20255dcd9f8ee5c299b464a9'}, {'type': 'PACKAGE', 'url': ... | {'cwe_ids': ['CWE-1321', 'CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-04T22:46:13Z', 'nvd_published_at': '2022-01-04T20:15:00Z'} |
1.4.0 | GHSA-wjfq-88q2-r34j | 2022-01-21T21:16:09Z | 2022-01-21T23:02:14Z | null | [] | Unhandled exception when decoding form response JSON | ### Impact
When handling form responses from the client (`ModalFormResponsePacket`), the Minecraft Windows client may send weird JSON that `json_decode()` can't understand. A workaround for this is implemented in `InGamePacketHandler::stupid_json_decode()`.
An `InvalidArgumentException` is thrown by this function when... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pocketmine/pocketmine-mp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.7'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-wjfq-88q2-r34j'}, {'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/commit/56fe71d939c38fe14e18a31a673a9331bcc0e4ca'}, {'type': 'PACKAGE', 'url': 'https://github.com/pmmp/PocketMine-MP'}, {'type': 'WEB', 'url': 'https://... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-21T21:16:09Z', 'nvd_published_at': None} |
1.4.0 | GHSA-735v-wx75-xmmm | 2022-01-31T21:45:04Z | 2022-01-27T18:27:56Z | null | ['CVE-2022-0268'] | Cross-site Scripting in grav | In grav prior to version 1.7.28, a low privilege user can create a page with arbitrary javascript by bypassing insufficent XSS filtering. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:H/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'getgrav/grav'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.28'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0268'}, {'type': 'WEB', 'url': 'https://github.com/getgrav/grav/commit/6f2fa9311afb9ecd34030dec2aff7b39e9e7e735'}, {'type': 'PACKAGE', 'url': 'https://github.com/getgrav/grav'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/67085545-331e-4469-... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-26T22:38:10Z', 'nvd_published_at': '2022-01-25T11:15:00Z'} |
1.4.0 | GHSA-7mq6-cp5m-f4j5 | 2022-01-04T20:59:44Z | 2022-01-05T14:54:36Z | null | ['CVE-2021-44116'] | Cross-site Scripting in Anchor CMS | Cross Site Scripting (XSS) vulnerability exits in Anchor CMS <=0.12.7 in posts.php. Attackers can use the posts column to upload the title and content containing malicious code to achieve the purpose of obtaining the administrator cookie, thereby achieving other malicious operations. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'anchorcms/anchor-cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.12.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44116'}, {'type': 'PACKAGE', 'url': 'https://github.com/anchorcms/anchor-cms'}, {'type': 'WEB', 'url': 'https://www.cnblogs.com/unrealnumb/p/15573449.html'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-04T20:59:44Z', 'nvd_published_at': '2021-12-15T22:15:00Z'} |
1.4.0 | GHSA-wxr6-29pv-ch68 | 2022-01-19T14:24:33Z | 2022-01-21T23:44:17Z | null | ['CVE-2021-4164'] | calibre-web is vulnerable to Cross-Site Request Forgery (CSRF) | calibre-web is vulnerable to Cross-Site Request Forgery (CSRF) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'calibreweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.15'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4164'}, {'type': 'WEB', 'url': 'https://github.com/janeczku/calibre-web/commit/785726deee13b4d56f6c3503dd57c1e3eb7d6f30'}, {'type': 'PACKAGE', 'url': 'https://github.com/janeczku/calibre-web'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/2de... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T14:24:33Z', 'nvd_published_at': '2022-01-17T13:15:00Z'} |
1.4.0 | GHSA-rrgw-3hg3-9x8c | 2022-01-10T21:39:18Z | 2022-01-12T21:49:49Z | null | [] | XSS vulnerability in translations | ### Summary
An attacker with admin privileges and access to Translations management functionality may add JS payload to translation values via:
- Translation management UI.
- Translations downloaded via the Crowdin service may also contain JS strings used for XSS attacks, for a successful attack poisoned translatio... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'oro/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.29'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'oro/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.17'}]}]}, {'p... | [{'type': 'WEB', 'url': 'https://github.com/oroinc/platform-er/security/advisories/GHSA-rrgw-3hg3-9x8c'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-10T21:39:18Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wxgw-qj99-44c2 | 2022-01-07T22:20:50Z | 2022-01-08T00:22:40Z | null | [] | Prototype Pollution in node-forge util.setPath API | ### Impact
`forge.util.setPath` had a potential prototype pollution issue if called with untrusted keys. This API was not used by forge itself.
### Patches
The `forge.util.setPath` API and related functions were removed in 0.10.0.
### Workarounds
Don't call `forge.util.setPath` directly or indirectly with untrusted k... | [] | [{'package': {'ecosystem': 'npm', 'name': 'node-forge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/digitalbazaar/forge/security/advisories/GHSA-wxgw-qj99-44c2'}] | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T22:20:50Z', 'nvd_published_at': None} |
1.4.0 | GHSA-77rm-9x9h-xj3g | 2022-02-03T22:48:51Z | 2022-01-27T00:01:15Z | null | ['CVE-2021-22570'] | NULL Pointer Dereference in Protocol Buffers | Nullptr dereference when a null char is present in a proto symbol. The symbol is parsed incorrectly, leading to an unchecked call into the proto file's name during generation of the resulting error message. Since the symbol is incorrectly parsed, the file is nullptr. We recommend upgrading to version 3.15.0 or greater. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Google.Protobuf'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.15.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'google/protobuf'}, 'ecosystem_specific': {'affected_functions': ['... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22570'}, {'type': 'PACKAGE', 'url': 'https://github.com/protocolbuffers/protobuf'}, {'type': 'WEB', 'url': 'https://github.com/protocolbuffers/protobuf/releases/tag/v3.15.0'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/202... | {'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T22:48:51Z', 'nvd_published_at': '2022-01-26T14:15:00Z'} |
1.4.0 | GHSA-cwx9-rp4w-4545 | 2022-10-25T19:59:06Z | 2022-01-27T00:01:00Z | null | ['CVE-2021-46386'] | Mingsoft MCMS vulnerable to Remote Code Execution via file upload. | Mingsoft MCMS is a Java CMS. Versions prior to and including 5.2.5 contain a file upload vulnerability allowing for a jspx webshell to be uploaded via net.mingsoft.basic.action.web.FileAction#upload, resulting in remote code execution. It is unclear if this issue has been patched. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46386'}, {'type': 'PACKAGE', 'url': 'https://gitee.com/mingSoft/MCMS'}, {'type': 'WEB', 'url': 'https://gitee.com/mingSoft/MCMS/issues/I4R0GW'}, {'type': 'WEB', 'url': 'https://github.com/ming-soft/MCMS'}] | {'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T19:59:06Z', 'nvd_published_at': '2022-01-26T17:15:00Z'} |
1.4.0 | GHSA-64g7-mvw6-v9qj | 2022-01-14T20:50:57Z | 2022-01-14T21:09:50Z | null | [] | Improper Privilege Management in shelljs | ### Impact
Output from the synchronous version of `shell.exec()` may be visible to other users on the same system. You may be affected if you execute `shell.exec()` in multi-user Mac, Linux, or WSL environments, or if you execute `shell.exec()` as the root user.
Other shelljs functions (including the asynchronous vers... | [] | [{'package': {'ecosystem': 'npm', 'name': 'shelljs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/shelljs/shelljs/security/advisories/GHSA-64g7-mvw6-v9qj'}, {'type': 'PACKAGE', 'url': 'https://github.com/shelljs/shelljs'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/50996581-c08e-4eed-a90e-c0bac082679c/'}] | {'cwe_ids': ['CWE-269'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-14T20:50:57Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8xx9-rxrj-2m2w | 2022-01-04T21:18:40Z | 2022-01-05T20:35:12Z | null | ['CVE-2021-4139'] | Cross-site Scripting in pimcore | pimcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.2.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4139'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/d5c3e876d910784000335061c3bd24d301351245'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/6ec59e43-095f... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-04T21:18:40Z', 'nvd_published_at': '2021-12-21T13:15:00Z'} |
1.4.0 | GHSA-r683-j2x4-v87g | 2023-09-07T18:38:41Z | 2022-01-21T23:55:52Z | null | ['CVE-2022-0235'] | node-fetch forwards secure headers to untrusted sites | node-fetch forwards secure headers such as `authorization`, `www-authenticate`, `cookie`, & `cookie2` when redirecting to a untrusted site. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'node-fetch'}, 'ecosystem_specific': {'affected_functions': ['node-fetch.fetch']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'node-fetch'}, 'ecosystem_specific': {'affected_functions': [... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0235'}, {'type': 'WEB', 'url': 'https://github.com/node-fetch/node-fetch/pull/1449/commits/5c32f002fdd65b1c6a8f1e3620210813d45c7e60'}, {'type': 'WEB', 'url': 'https://github.com/node-fetch/node-fetch/pull/1453'}, {'type': 'WEB', 'url': 'https://git... | {'cwe_ids': ['CWE-173', 'CWE-200', 'CWE-601'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-18T22:51:22Z', 'nvd_published_at': '2022-01-16T17:15:00Z'} |
1.4.0 | GHSA-r57r-j98g-587f | 2022-01-07T18:29:44Z | 2022-01-06T22:08:56Z | null | ['CVE-2021-45705'] | Pointer dereference in nanorand | An issue was discovered in the nanorand crate before 0.6.1 for Rust. There can be multiple mutable references to the same object because the TlsWyRand Deref implementation dereferences a raw pointer. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'nanorand'}, 'ecosystem_specific': {'affected_functions': ['nanorand::tls::tls_rand']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.5.0'}, {'fixed': '0.6.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45705'}, {'type': 'WEB', 'url': 'https://github.com/Absolucy/nanorand-rs/issues/28'}, {'type': 'PACKAGE', 'url': 'https://github.com/Absolucy/nanorand-rs'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/n... | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T23:20:00Z', 'nvd_published_at': '2021-12-27T00:15:00Z'} |
1.4.0 | GHSA-h79x-98r2-g6qc | 2022-01-24T22:08:04Z | 2022-01-21T23:02:15Z | null | [] | Impersonation of other users (passing XBOX Live authentication) by theft of logins in PocketMine-MP | # Impact
Minecraft Bedrock authentication and its protocol encryption are inseparably linked. One is not complete without the other.
This vulnerability affects servers which are able to be directly connected to via the internet (i.e. not behind a proxy).
If you are using a proxy, please check that it supports protoco... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pocketmine/pocketmine-mp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '4.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-h79x-98r2-g6qc'}, {'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/issues/4580'}, {'type': 'PACKAGE', 'url': 'https://github.com/pmmp/PocketMine-MP'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-21T21:16:04Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vxh4-x6gv-mphf | 2022-01-25T20:48:52Z | 2022-01-21T23:25:45Z | null | ['CVE-2022-0245'] | Cross-Site Request Forgery (CSRF) in livehelperchat/livehelperchat | Cross-Site Request Forgery (CSRF) in GitHub repository livehelperchat/livehelperchat. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'livehelperchat/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.91'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0245'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/c2fa19afeb8b1ea927fea3fd452515c95f289fb9'}, {'type': 'PACKAGE', 'url': 'https://github.com/livehelperchat/livehelperchat'}, {'type': 'WEB', 'url': 'https://hunt... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T22:45:24Z', 'nvd_published_at': '2022-01-18T06:15:00Z'} |
1.4.0 | GHSA-7p8f-8hjm-wm92 | 2022-01-13T15:02:31Z | 2022-01-13T15:05:41Z | null | ['CVE-2022-21646'] | Lookup operations do not take into account wildcards in SpiceDB | ### Impact
Any user making use of a wildcard relationship under the right hand branch of an `exclusion` or within an `intersection` operation will see `Lookup`/`LookupResources` return a resource as "accessible" if it is *not* accessible by virtue of the inclusion of the wildcard in the intersection or the right side o... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/authzed/spicedb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.4.0'}]}], 'versions': ['1.3.0']}] | [{'type': 'WEB', 'url': 'https://github.com/authzed/spicedb/security/advisories/GHSA-7p8f-8hjm-wm92'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21646'}, {'type': 'WEB', 'url': 'https://github.com/authzed/spicedb/issues/358'}, {'type': 'WEB', 'url': 'https://github.com/authzed/spicedb/commi... | {'cwe_ids': ['CWE-155', 'CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-11T21:06:45Z', 'nvd_published_at': '2022-01-11T22:15:00Z'} |
1.4.0 | GHSA-jg6j-jrxv-2hh9 | 2022-01-07T23:38:31Z | 2022-01-08T00:46:17Z | null | ['CVE-2021-36738'] | Cross-site Scripting in Apache Pluto | The input fields in the JSP version of the Apache Pluto Applicant MVCBean CDI portlet are vulnerable to Cross-Site Scripting (XSS) attacks. Users should migrate to version 3.1.1 of the applicant-mvcbean-cdi-jsp-portlet.war artifact | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.portals.pluto:pluto-portal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36738'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/portals-pluto'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/11j19v1gjsk7o6o8nch1xrydow9b8lll'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T23:38:31Z', 'nvd_published_at': '2022-01-06T09:15:00Z'} |
1.4.0 | GHSA-53qw-q765-4fww | 2023-09-05T19:51:28Z | 2022-01-12T19:20:53Z | null | ['CVE-2021-45115'] | Denial-of-service in Django | An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1. `UserAttributeSimilarityValidator` incurred significant overhead in evaluating a submitted password that was artificially large in relation to the comparison values. In a situation where access to user registration was unrestr... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.26'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'ty... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45115'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/4.0/releases/security/'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!forum/django-announce'}, {'type':... | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-12T19:18:33Z', 'nvd_published_at': '2022-01-05T00:15:00Z'} |
1.4.0 | GHSA-9hfg-pxr6-q4vp | 2023-06-13T17:23:04Z | 2022-01-06T22:04:51Z | null | ['CVE-2021-45709'] | Use of a Broken or Risky Cryptographic Algorithm in crypto2 | The implementation does not enforce alignment requirements on input slices while incorrectly assuming 4-byte alignment through an unsafe call to std::slice::from_raw_parts_mut, which breaks the contract and introduces undefined behavior.
This affects Chacha20 encryption and decryption in crypto2. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'crypto2'}, 'ecosystem_specific': {'affected_functions': ['crypto2::streamcipher::Chacha20::decrypt_slice', 'crypto2::streamcipher::Chacha20::encrypt_slice', 'crypto2::streamcipher::xor_si512_inplace']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'l... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45709'}, {'type': 'WEB', 'url': 'https://github.com/shadowsocks/crypto2/issues/27'}, {'type': 'PACKAGE', 'url': 'https://github.com/shadowsocks/crypto2'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/cry... | {'cwe_ids': ['CWE-119'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T22:55:41Z', 'nvd_published_at': '2021-12-27T00:15:00Z'} |
1.4.0 | GHSA-799f-r78p-gq9c | 2022-01-07T16:22:24Z | 2022-01-06T22:17:38Z | null | ['CVE-2020-36513'] | Use of Uninitialized Resource in acc_reader. | An issue was discovered in the acc_reader crate through 2020-12-27 for Rust. read_up_to may read from uninitialized memory locations. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'acc_reader'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36513'}, {'type': 'WEB', 'url': 'https://github.com/netvl/acc_reader/issues/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/netvl/acc_reader'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/acc_reader... | {'cwe_ids': ['CWE-908'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T18:13:55Z', 'nvd_published_at': '2021-12-27T00:15:00Z'} |
1.4.0 | GHSA-82v2-mx6x-wq7q | 2022-10-03T19:49:13Z | 2022-01-21T18:53:27Z | null | ['CVE-2022-21704'] | Incorrect Default Permissions in log4js | ### Impact
Default file permissions for log files created by the file, fileSync and dateFile appenders are world-readable (in unix). This could cause problems if log files contain sensitive information. This would affect any users that have not supplied their own permissions for the files via the mode parameter in the ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'log4js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/log4js-node/log4js-node/security/advisories/GHSA-82v2-mx6x-wq7q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21704'}, {'type': 'WEB', 'url': 'https://github.com/log4js-node/log4js-node/pull/1141/commits/8042252861a1b65adb66931fdf702ead34fa9b76'}, ... | {'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T22:47:14Z', 'nvd_published_at': '2022-01-19T23:15:00Z'} |
1.4.0 | GHSA-39ph-wr67-j4xq | 2023-08-03T16:37:17Z | 2022-01-26T00:01:50Z | null | ['CVE-2022-0338'] | loguru vulnerable to improper privilege management | Improper Privilege Management in Conda loguru prior to 0.5.3. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'loguru'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0338'}, {'type': 'WEB', 'url': 'https://github.com/delgan/loguru/commit/ea39375e62f9b8f18e2ca798a5c0fb8c972b7eaa'}, {'type': 'PACKAGE', 'url': 'https://github.com/Delgan/loguru'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/359bea50-2bc6-426... | {'cwe_ids': ['CWE-269', 'CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T16:37:17Z', 'nvd_published_at': '2022-01-25T09:15:00Z'} |
1.4.0 | GHSA-756h-r2c9-qp5j | 2022-02-03T20:20:13Z | 2022-01-06T23:48:50Z | null | ['CVE-2021-32849'] | An authenticated user can execute arbitrary command in Gerapy | ### Impact
An authenticated user can execute arbitrary command, see more in https://github.com/Gerapy/Gerapy/issues/211.
### Patches
Fixed in 0.9.9 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'gerapy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.9'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Gerapy/Gerapy/security/advisories/GHSA-756h-r2c9-qp5j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32849'}, {'type': 'WEB', 'url': 'https://github.com/Gerapy/Gerapy/issues/197'}, {'type': 'WEB', 'url': 'https://github.com/Gerapy/Gerapy/issues/217'... | {'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T23:30:47Z', 'nvd_published_at': '2022-01-26T22:15:00Z'} |
1.4.0 | GHSA-gjj5-998g-v36v | 2022-01-19T19:20:26Z | 2022-01-21T23:20:21Z | null | ['CVE-2022-21692'] | Improper Access Control in Onionshare | Between September 26, 2021 and October 8, 2021, [Radically Open Security](https://www.radicallyopensecurity.com/) conducted a penetration test of OnionShare 2.4, funded by the Open Technology Fund's [Red Team lab](https://www.opentech.fund/labs/red-team-lab/). This is an issue from that penetration test.
- Vulnerabili... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'onionshare-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3'}, {'fixed': '2.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/onionshare/onionshare/security/advisories/GHSA-gjj5-998g-v36v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21692'}, {'type': 'PACKAGE', 'url': 'https://github.com/onionshare/onionshare'}, {'type': 'WEB', 'url': 'https://github.com/onionshare/onion... | {'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T19:20:26Z', 'nvd_published_at': '2022-01-18T23:15:00Z'} |
1.4.0 | GHSA-v82v-rq72-phq9 | 2022-01-31T22:00:02Z | 2022-01-26T22:13:05Z | null | ['CVE-2021-23664'] | Server side request forgery in @isomorphic-git/cors-proxy | The package @isomorphic-git/cors-proxy before 2.7.1 is vulnerable to Server-side Request Forgery (SSRF) due to missing sanitization and validation of the redirection action in middleware.js. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': '@isomorphic-git/cors-proxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23664'}, {'type': 'WEB', 'url': 'https://github.com/isomorphic-git/cors-proxy/commit/1b1c91e71d946544d97ccc7cf0ac62b859e03311'}, {'type': 'PACKAGE', 'url': 'https://github.com/isomorphic-git/cors-proxy'}, {'type': 'WEB', 'url': 'https://snyk.io/vul... | {'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-24T22:53:26Z', 'nvd_published_at': '2022-01-21T20:15:00Z'} |
1.4.0 | GHSA-2gxj-qrp2-53jv | 2023-06-13T18:34:26Z | 2022-01-06T22:11:11Z | null | ['CVE-2021-45695'] | Incorrect reliance on Trait memory layout in mopa | The mopa crate redefines the deprecated TraitObject struct from core::raw. This is done to then transmute a reference to a trait object (&dyn Trait for any trait Trait) into this struct and retrieve the data field for the purpose of downcasting. This is used to implement downcast_ref_unchecked(), in terms of which down... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'mopa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45695'}, {'type': 'WEB', 'url': 'https://github.com/chris-morgan/mopa/issues/13'}, {'type': 'PACKAGE', 'url': 'https://github.com/chris-morgan/mopa'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/mopa/RU... | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T14:22:40Z', 'nvd_published_at': '2021-12-27T00:15:00Z'} |
1.4.0 | GHSA-45hx-wfhj-473x | 2022-01-27T18:28:14Z | 2022-01-21T23:07:39Z | null | ['CVE-2022-23221'] | Arbitrary code execution in H2 Console | H2 Console before 2.1.210 allows remote attackers to execute arbitrary code via a jdbc:h2:mem JDBC URL containing the IGNORE_UNKNOWN_SETTINGS=TRUE;FORBID_CREATION=FALSE;INIT=RUNSCRIPT substring, a different vulnerability than CVE-2021-42392. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.h2database:h2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.210'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23221'}, {'type': 'PACKAGE', 'url': 'https://github.com/h2database/h2database'}, {'type': 'WEB', 'url': 'https://github.com/h2database/h2database/releases/tag/version-2.1.210'}, {'type': 'WEB', 'url': 'https://github.com/h2database/h2database/secur... | {'cwe_ids': ['CWE-88'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-20T16:13:20Z', 'nvd_published_at': '2022-01-19T17:15:00Z'} |
1.4.0 | GHSA-9mp7-45qh-r8j8 | 2023-06-13T17:04:59Z | 2022-01-06T22:13:46Z | null | ['CVE-2021-45685'] | columnar: Read on uninitialized buffer may cause UB (ColumnarReadExt::read_typed_vec()) | Affected versions of this crate passes an uninitialized buffer to a user-provided Read implementation (ColumnarReadExt::read_typed_vec()).
Arbitrary Read implementations can read from the uninitialized buffer (memory exposure) and also can return incorrect number of bytes written to the buffer. Reading from uninitiali... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'columnar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.19'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45685'}, {'type': 'WEB', 'url': 'https://github.com/frankmcsherry/columnar/issues/6'}, {'type': 'PACKAGE', 'url': 'https://github.com/frankmcsherry/columnar.git'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/c... | {'cwe_ids': ['CWE-908'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T17:12:24Z', 'nvd_published_at': '2021-12-27T00:15:00Z'} |
1.4.0 | GHSA-rfmp-jvr7-hx78 | 2022-04-29T20:27:44Z | 2022-01-06T20:41:06Z | null | ['CVE-2020-9491'] | Inadequate Encryption Strength in Apache NiFi | In Apache NiFi 1.2.0 to 1.11.4, the NiFi UI and API were protected by mandating TLS v1.2, as well as listening connections established by processors like ListenHTTP, HandleHttpRequest, etc. However intracluster communication such as cluster request replication, Site-to-Site, and load balanced queues continued to suppor... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.12.0-RC1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.11.4'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-9491'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi/commit/441781cec50f77d9f1e65093f55bbd614b8c5ec6'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/nifi'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2d9c21f9ec... | {'cwe_ids': ['CWE-327'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T16:50:01Z', 'nvd_published_at': '2020-10-01T20:15:00Z'} |
1.4.0 | GHSA-74fj-2j2h-c42q | 2022-01-20T15:34:48Z | 2022-01-12T22:46:26Z | null | ['CVE-2022-0155'] | Exposure of sensitive information in follow-redirects | follow-redirects is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'follow-redirects'}, 'ecosystem_specific': {'affected_functions': ['follow-redirects.get']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.14.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0155'}, {'type': 'WEB', 'url': 'https://github.com/follow-redirects/follow-redirects/commit/8b347cbcef7c7b72a6e9be20f5710c17d6163c22'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf'}, {'type': 'PACKAGE', 'u... | {'cwe_ids': ['CWE-359'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-11T18:41:08Z', 'nvd_published_at': '2022-01-10T20:15:00Z'} |
1.4.0 | GHSA-75vw-3m5v-fprh | 2022-01-24T22:08:31Z | 2022-01-21T23:43:11Z | null | ['CVE-2022-0239'] | corenlp is vulnerable to Improper Restriction of XML External Entity Reference | corenlp is vulnerable to Improper Restriction of XML External Entity Reference | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'edu.stanford.nlp:stanford-corenlp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0239'}, {'type': 'WEB', 'url': 'https://github.com/stanfordnlp/corenlp/commit/1940ffb938dc4f3f5bc5f2a2fd8b35aabbbae3dd'}, {'type': 'PACKAGE', 'url': 'https://github.com/stanfordnlp/corenlp'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a717a... | {'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T15:02:11Z', 'nvd_published_at': '2022-01-17T07:15:00Z'} |
1.4.0 | GHSA-29mw-wpgm-hmr9 | 2023-09-05T22:58:25Z | 2022-01-06T20:30:46Z | null | ['CVE-2020-28500'] | Regular Expression Denial of Service (ReDoS) in lodash | All versions of package lodash prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the `toNumber`, `trim` and `trimEnd` functions.
Steps to reproduce (provided by reporter Liyuan Chen):
```js
var lo = require('lodash');
function build_blank(n) {
var ret = "1"
for (var i = 0; i... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'lodash'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.17.21'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'lodash-es'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28500'}, {'type': 'WEB', 'url': 'https://github.com/lodash/lodash/pull/5065'}, {'type': 'WEB', 'url': 'https://github.com/lodash/lodash/pull/5065/commits/02906b8191d3c100c193fe6f7b27d1c40f200bb7'}, {'type': 'WEB', 'url': 'https://github.com/lodash/... | {'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-19T22:45:28Z', 'nvd_published_at': '2021-02-15T11:15:00Z'} |
1.4.0 | GHSA-rcrv-228c-gprj | 2022-01-20T18:36:49Z | 2022-01-21T18:39:40Z | null | [] | Invalid URL generation in bitlyshortener | ### Impact
Due to a sudden upstream breaking change by Bitly, versions of `bitlyshortener` <0.6.0 generate invalid short URLs. All users are affected and must update immediately.
### Patches
Upgrading `bitlyshortener` to 0.6.0 or newer will prevent the generation such invalid short URLs.
### Workarounds
A workaround ... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'bitlyshortener'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/impredicative/bitlyshortener/security/advisories/GHSA-rcrv-228c-gprj'}, {'type': 'WEB', 'url': 'https://github.com/impredicative/bitlyshortener/commit/b307d70bedf745305fa0dd3c5c600d8cb88d09b5'}, {'type': 'PACKAGE', 'url': 'https://github.com/impredicative/bitlyshortener'}, {'... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-20T18:36:49Z', 'nvd_published_at': None} |
1.4.0 | GHSA-r58x-wjg8-63m9 | 2022-01-13T18:33:25Z | 2022-01-08T00:40:30Z | null | ['CVE-2021-40110'] | Denial of Service in Apache James | In Apache James, using Jazzer fuzzer, we identified that an IMAP user can craft IMAP LIST commands to orchestrate a Denial Of Service using a vulnerable Regular expression. This affected Apache James prior to 3.6.1 We recommend upgrading to Apache James 3.6.1 or higher , which enforce the use of RE2J regular expression... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.james:james-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40110'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2022/01/04/2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/01/04/2'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T18:34:26Z', 'nvd_published_at': '2022-01-04T09:15:00Z'} |
1.4.0 | GHSA-76w9-p8mg-j927 | 2023-06-13T18:32:56Z | 2022-01-06T22:07:14Z | null | ['CVE-2021-45707'] | Out-of-bounds Write in nix | On certain platforms, if a user has more than 16 groups, the nix::unistd::getgrouplist function will call the libc getgrouplist function with a length parameter greater than the size of the buffer it provides, resulting in an out-of-bounds write and memory corruption.
The libc getgrouplist function takes an in/out par... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'nix'}, 'ecosystem_specific': {'affected_functions': ['nix::unistd::getgrouplist']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.16.0'}, {'fixed': '0.20.2'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'nix'}, 'ecosystem_specific': {'affected_func... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45707'}, {'type': 'WEB', 'url': 'https://github.com/nix-rust/nix/issues/1541'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wgrg-5h56-jg27'}, {'type': 'PACKAGE', 'url': 'https://github.com/nix-rust/nix'}, {'type': 'WEB', 'url': ... | {'cwe_ids': ['CWE-787'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T23:13:23Z', 'nvd_published_at': '2021-12-27T00:15:00Z'} |
1.4.0 | GHSA-r8pr-83cc-ccv7 | 2022-01-27T18:26:22Z | 2022-01-21T23:34:27Z | null | ['CVE-2022-22691'] | Umbraco Persistent Password Reset Poison | The password reset component deployed within Umbraco uses the hostname supplied within the request host header when building a password reset URL. It may be possible to manipulate the URL sent to Umbraco users when so that it points to the attackers server thereby disclosing the password reset token if/when the link is... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Umbraco.Cms.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22691'}, {'type': 'WEB', 'url': 'https://appcheck-ng.com/umbraco-applicationurl-overwrite-persistent-password-reset-poison-cve-2022-22690-cve-2022-22691/'}, {'type': 'PACKAGE', 'url': 'https://github.com/umbraco/Umbraco-CMS'}] | {'cwe_ids': ['CWE-444', 'CWE-640'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T22:24:13Z', 'nvd_published_at': '2022-01-18T17:15:00Z'} |
1.4.0 | GHSA-gh38-x2wm-xmc8 | 2022-01-31T21:45:30Z | 2022-01-28T22:13:27Z | null | ['CVE-2021-45029'] | Code injection in ShenYu | Groovy Code Injection & SpEL Injection which lead to Remote Code Execution. This issue affected Apache ShenYu 2.4.0 and 2.4.1. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.shenyu:shenyu-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45029'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/incubator-shenyu/'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/3zzmwvg3012tg306x8o893fvdcssx639'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/... | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-26T22:40:21Z', 'nvd_published_at': '2022-01-25T13:15:00Z'} |
1.4.0 | GHSA-jr37-66pj-36v7 | 2022-01-10T21:46:18Z | 2022-01-08T00:32:00Z | null | ['CVE-2022-22109'] | Cross-site Scripting in DayByDay CRM | In Daybyday CRM, version 2.2.0 is vulnerable to Stored Cross-Site Scripting (XSS) vulnerability that allows low privileged application users to store malicious scripts in the title field of new tasks. These scripts are executed in a victim’s browser when they open the “/tasks” page to view all the tasks. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'bottelet/flarepoint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22109'}, {'type': 'WEB', 'url': 'https://github.com/Bottelet/DaybydayCRM/commit/002dc75f400cf307bd00b71a5a93f1e26e52cee2'}, {'type': 'PACKAGE', 'url': 'https://github.com/Bottelet/DaybydayCRM'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftwa... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T20:42:41Z', 'nvd_published_at': '2022-01-05T15:15:00Z'} |
1.4.0 | GHSA-g5jm-xhwm-9xp9 | 2022-09-07T23:58:36Z | 2022-01-03T00:00:59Z | null | ['CVE-2022-22293'] | Cross site scripting in dolibarr | admin/limits.php in Dolibarr 7.0.2 allows HTML injection, as demonstrated by the MAIN_MAX_DECIMALS_TOT parameter. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '13.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22293'}, {'type': 'WEB', 'url': 'https://github.com/Dolibarr/dolibarr/issues/20237'}, {'type': 'PACKAGE', 'url': 'https://github.com/Dolibarr/dolibarr'}, {'type': 'WEB', 'url': 'https://github.com/mustgundogdu/Research/blob/main/Dolibar_7.0.2-Store... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-07T23:58:36Z', 'nvd_published_at': '2022-01-02T00:15:00Z'} |
1.4.0 | GHSA-6p56-wp2h-9hxr | 2022-08-10T23:29:06Z | 2022-01-07T00:09:39Z | null | ['CVE-2021-33430'] | NumPy Buffer Overflow (Disputed) | A Buffer Overflow vulnerability exists in NumPy 1.9.x in the PyArray_NewFromDescr_int function of ctors.c when specifying arrays of large dimensions (over 32) from Python code, which could let a malicious user cause a Denial of Service.
NOTE: The vendor does not agree this is a vulneraility; In (very limited) circumst... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'numpy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.9.0'}, {'fixed': '1.21'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33430'}, {'type': 'WEB', 'url': 'https://github.com/numpy/numpy/issues/18939'}, {'type': 'WEB', 'url': 'https://github.com/numpy/numpy/commit/ae317fd9ff3e79c0eac357d723bfc29cbd625f2e'}, {'type': 'PACKAGE', 'url': 'https://github.com/numpy/numpy'}] | {'cwe_ids': ['CWE-120'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-04T20:52:47Z', 'nvd_published_at': '2021-12-17T19:15:00Z'} |
1.4.0 | GHSA-xqxm-2rpm-3889 | 2022-01-18T21:16:18Z | 2022-01-21T23:43:50Z | null | ['CVE-2022-21683'] | Comment reply notifications sent to incorrect users | ### Impact
When notifications for new replies in comment threads are sent, they are sent to all users who have replied or commented anywhere on the site, rather than only in the relevant threads. This means that a user could listen in to new comment replies on pages they have not had editing access to, as long as they ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'wagtail'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.13'}, {'fixed': '2.15.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/security/advisories/GHSA-xqxm-2rpm-3889'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21683'}, {'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/commit/5fe901e5d86ed02dbbb63039a897582951266afd'}, {'type': 'PACKAGE', 'url': ... | {'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-01-18T21:16:18Z', 'nvd_published_at': '2022-01-18T18:15:00Z'} |
1.4.0 | GHSA-h65f-jvqw-m9fj | 2023-06-22T19:15:05Z | 2022-01-27T16:13:07Z | null | ['CVE-2022-23437'] | Infinite Loop in Apache Xerces Java | There's a vulnerability within the Apache Xerces Java (XercesJ) XML parser when handling specially crafted XML document payloads. This causes, the XercesJ XML parser to wait in an infinite loop, which may sometimes consume system resources for prolonged duration. This vulnerability is present within XercesJ version 2.1... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'xerces:xercesImpl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.12.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23437'}, {'type': 'PACKAGE', 'url': 'https://github.com/jboss/xerces'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/6pjwm10bb69kq955fzr1n0nflnjd27dl'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20221028-0005/'}, ... | {'cwe_ids': ['CWE-91'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-25T20:46:16Z', 'nvd_published_at': '2022-01-24T15:15:00Z'} |
1.4.0 | GHSA-36m2-8rhx-f36j | 2022-01-14T19:42:25Z | 2022-01-06T23:17:07Z | null | ['CVE-2022-21648'] | Sandbox bypass in Latte templates | ### Impact
The problem affects users who use the sandbox in Latte and templates from untrusted sources.
### Patches
Sandbox first appeared in Latte 2.8.0. The issue is fixed in the versions 2.8.8, 2.9.6 and 2.10.8.
### References
The issues were discovered by
- JinYiTong (https://github.com/JinYiTong)
- 赵钰迪 <2021201... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'latte/latte'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.10.0'}, {'fixed': '2.10.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'latte/latte'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.6'}]}]}, {'pac... | [{'type': 'WEB', 'url': 'https://github.com/nette/latte/security/advisories/GHSA-36m2-8rhx-f36j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21648'}, {'type': 'WEB', 'url': 'https://github.com/nette/latte/commit/9e1b4f7d70f7a9c3fa6753ffa7d7e450a3d4abb0'}, {'type': 'PACKAGE', 'url': 'https:/... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T19:42:15Z', 'nvd_published_at': '2022-01-04T20:15:00Z'} |
1.4.0 | GHSA-f6f2-3w33-54r9 | 2022-01-07T16:14:05Z | 2022-01-06T22:02:36Z | null | ['CVE-2021-45714'] | Use After Free in rusqlite | An issue was discovered in the rusqlite crate 0.25.x before 0.25.4 and 0.26.x before 0.26.2 for Rust. create_aggregate_function has a use-after-free. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'rusqlite'}, 'ecosystem_specific': {'affected_functions': ['rusqlite::Connection::create_aggregate_function']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.25.0'}, {'fixed': '0.25.4'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'rusqlite'}, 'ecos... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45714'}, {'type': 'WEB', 'url': 'https://github.com/rusqlite/rusqlite/issues/1048'}, {'type': 'PACKAGE', 'url': 'https://github.com/rusqlite/rusqlite'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/rusql... | {'cwe_ids': ['CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T21:07:30Z', 'nvd_published_at': '2021-12-26T22:15:00Z'} |
1.4.0 | GHSA-6v39-p2xq-g5c3 | 2022-02-02T16:16:05Z | 2022-01-28T22:13:44Z | null | ['CVE-2022-23944'] | Missing authentication in ShenYu | User can access /plugin api without authentication. This issue affected Apache ShenYu 2.4.0 and 2.4.1. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.shenyu:shenyu-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23944'}, {'type': 'WEB', 'url': 'https://github.com/apache/incubator-shenyu/pull/2462'}, {'type': 'WEB', 'url': 'https://github.com/apache/shenyu/pull/2462/commits/50e4b5e626ad94b415e26ef4fbe584bd51fd1b77'}, {'type': 'PACKAGE', 'url': 'https://gith... | {'cwe_ids': ['CWE-306', 'CWE-862'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-26T22:41:59Z', 'nvd_published_at': '2022-01-25T13:15:00Z'} |
1.4.0 | GHSA-q674-xm3x-2926 | 2022-01-07T16:08:29Z | 2022-01-06T21:37:02Z | null | ['CVE-2021-23490'] | Uncontrolled Resource Consumption in parse-link-header | The package parse-link-header before 2.0.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the checkHeader function. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'parse-link-header'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23490'}, {'type': 'WEB', 'url': 'https://github.com/thlorenz/parse-link-header/commit/72f05c717b3f129c5331a07bf300ed8886eb8ae1'}, {'type': 'PACKAGE', 'url': 'https://github.com/thlorenz/parse-link-header'}, {'type': 'WEB', 'url': 'https://snyk.io/v... | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T20:18:47Z', 'nvd_published_at': '2021-12-24T20:15:00Z'} |
1.4.0 | GHSA-44m4-9cjp-j587 | 2022-01-19T16:14:58Z | 2022-01-21T23:24:14Z | null | [] | IBX-1392: Image filenames sanitization | ezsystems/ezpublish-kernel versions 7.5.* before 7.5.26 are vulnerable to certain injection attacks and unauthorized access to some image files. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezpublish-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.5.0'}, {'fixed': '7.5.26'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ezsystems/ezpublish-kernel/security/advisories/GHSA-44m4-9cjp-j587'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-001-image-filenames-sanitization'}, {'type': 'PACKAGE', 'url': 'https://github.com/ezsystems/ezpublish-kernel/'}, {'type... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T16:14:58Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qc9x-gjcv-465w | 2022-03-30T16:44:16Z | 2022-01-12T22:29:41Z | null | ['CVE-2022-21668'] | Pipenv's requirements.txt parsing allows malicious index url in comments | ## Issue Summary
Due to a flaw in pipenv's parsing of requirements files, an attacker can insert a specially crafted string inside a comment anywhere within a requirements.txt file, which will cause victims who use pipenv to install the requirements file (e.g. with "`pipenv install -r requirements.txt`") to download de... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pipenv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2018.10.9'}, {'fixed': '2022.1.8'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/pypa/pipenv/security/advisories/GHSA-qc9x-gjcv-465w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21668'}, {'type': 'WEB', 'url': 'https://github.com/pypa/pipenv/commit/439782a8ae36c4762c88e43d5f0d8e563371b46f'}, {'type': 'PACKAGE', 'url': 'https:/... | {'cwe_ids': ['CWE-20', 'CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-10T21:52:02Z', 'nvd_published_at': '2022-01-10T21:15:00Z'} |
1.4.0 | GHSA-xc47-3rch-cv57 | 2022-01-26T20:23:15Z | 2022-01-26T20:24:23Z | null | ['CVE-2022-0178'] | Improper Access Control in snipe-it | Users with no system permissions are able to see and create personal access tokens | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.3.7'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0178'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/0e5ef53c352754de2778ffa20c85da15fd6f7ae0'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/512dbfee7acfcafa1524c8b2fb4cc4ef96958d0b'}, {'type': 'PACKAGE', 'u... | {'cwe_ids': ['CWE-284', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-24T22:48:49Z', 'nvd_published_at': '2022-01-13T23:15:00Z'} |
1.4.0 | GHSA-883x-6fch-6wjx | 2022-01-18T22:55:47Z | 2022-01-21T23:39:19Z | null | [] | Trust Boundary Violation due to Incomplete Blacklist in Test Failure Processing in Ares | ### Impact
This allows an attacker to create special subclasses of `InvocationTargetException` that escape the exception sanitization because JUnit extracts the cause in a trusted context before the exception reaches Ares. This means that arbitrary student code can be executed in a trusted context, and that in turn all... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'de.tum.in.ase:artemis-java-test-sandbox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ls1intum/Ares/security/advisories/GHSA-883x-6fch-6wjx'}, {'type': 'WEB', 'url': 'https://github.com/ls1intum/Ares/issues/15#issuecomment-996449371'}, {'type': 'WEB', 'url': 'https://github.com/ls1intum/Ares/commit/af4f28a56e2fe600d8750b3b415352a0a3217392'}, {'type': 'PACKAGE'... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-18T22:55:47Z', 'nvd_published_at': None} |
1.4.0 | GHSA-59j4-wjwp-mw9m | 2022-04-01T20:22:44Z | 2022-01-06T20:32:36Z | null | ['CVE-2020-13936'] | Sandbox Bypass in Apache Velocity Engine | An attacker that is able to modify Velocity templates may execute arbitrary Java code or run arbitrary system commands with the same privileges as the account running the Servlet container. This applies to applications that allow untrusted users to upload/modify velocity templates running Apache Velocity Engine version... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.velocity:velocity-engine-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.velocity:velocity'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13936'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/velocity-engine'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r01043f584cbd47959fabe18fff64de940f81a65024bb8dddbda31d9a%40%3Cuser.velocity.apache.org%3E'}, {'type': 'W... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-17T00:56:56Z', 'nvd_published_at': '2021-03-10T08:15:00Z'} |
1.4.0 | GHSA-p5hj-xxfr-pwc3 | 2022-01-27T18:32:42Z | 2022-01-21T18:02:39Z | null | ['CVE-2022-0282'] | Code Injection in microweber | Code Injection in Packagist microweber/microweber prior to 1.2.11. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0282'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/51b5a4e3ef01e587797c0109159a8ad9d2bac77a'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8... | {'cwe_ids': ['CWE-79', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-21T16:58:03Z', 'nvd_published_at': '2022-01-20T12:15:00Z'} |
1.4.0 | GHSA-5q7q-qqw2-hjq7 | 2022-08-11T18:44:32Z | 2022-01-06T18:32:24Z | null | ['CVE-2021-43853'] | AjaxNetProfessional deserializes arbitrary JavaScript objects | ### Overview
Affected versions of this package are vulnerable to Deserialization of Untrusted Data due to the possibility of deserialization of arbitrary JavaScript objects.
### Description
Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and t... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'AjaxNetProfessional'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '21.12.22.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/michaelschwarz/Ajax.NET-Professional/security/advisories/GHSA-5q7q-qqw2-hjq7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43853'}, {'type': 'WEB', 'url': 'https://github.com/michaelschwarz/Ajax.NET-Professional/commit/c89e39b9679fcb8ab6644fe21cc7e... | {'cwe_ids': ['CWE-502', 'CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-04T21:21:17Z', 'nvd_published_at': '2021-12-22T21:15:00Z'} |
1.4.0 | GHSA-8cw5-rv98-5c46 | 2022-01-06T19:00:47Z | 2022-01-06T22:30:06Z | null | ['CVE-2019-6339'] | Arbitrary PHP code execution in Drupal | In Drupal Core versions 7.x prior to 7.62, 8.6.x prior to 8.6.6, and 8.5.x prior to 8.5.9; A remote code execution vulnerability exists in
PHP's built-in phar stream wrapper when performing file operations on an untrusted phar:// URI. Some Drupal code (core, contrib, and custom) may be performing file operations on ins... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'drupal/drupal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.62.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'drupal/drupal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.5.9'}]}]}, {'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-6339'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/drupal/drupal/CVE-2019-6339.yaml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/02/msg00004.html'}, {'type': 'WEB', 'url':... | {'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T19:00:47Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c6fg-99pr-25m9 | 2022-01-06T19:47:00Z | 2022-01-06T23:53:58Z | null | [] | Uncapped length of skin data fields submitted by players | ### Impact
Some skin data fields (e.g. skinID, geometryName) are not capped in length. These fields are typically saved in the NBT data of a player when the player quits the server, or during an autosave.
This is problematic due to the 32767 byte limit on `TAG_String`s. If any of these fields exceeds 32767 bytes, an e... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pocketmine/pocketmine-mp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.26.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'pocketmine/pocketmine-mp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed'... | [{'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-c6fg-99pr-25m9'}, {'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/commit/6492cac5c10f9fa8443ceddd2191a7b65b73f601'}, {'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/commit/958a9dbf0fe3131ab60319c5a939f5df... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T19:47:00Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wg6g-ppvx-927h | 2022-01-27T14:26:40Z | 2022-01-27T14:27:53Z | null | ['CVE-2021-23518'] | Prototype Pollution in cached-path-relative | The package cached-path-relative before 1.1.0 is vulnerable to Prototype Pollution via the cache variable that is set as {} instead of Object.create(null) in the cachedPathRelative function, which allows access to the parent prototype properties when the object is used to create the cached relative path. When using the... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'cached-path-relative'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23518'}, {'type': 'WEB', 'url': 'https://github.com/ashaffer/cached-path-relative/commit/40c73bf70c58add5aec7d11e4f36b93d144bb760'}, {'type': 'PACKAGE', 'url': 'https://github.com/ashaffer/cached-path-relative'}, {'type': 'WEB', 'url': 'https://lis... | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-24T23:03:02Z', 'nvd_published_at': '2022-01-21T20:15:00Z'} |
1.4.0 | GHSA-68vr-8f46-vc9f | 2022-01-19T19:41:55Z | 2022-01-21T23:20:14Z | null | ['CVE-2022-21696'] | Username spoofing in OnionShare | Between September 26, 2021 and October 8, 2021, [Radically Open Security](https://www.radicallyopensecurity.com/) conducted a penetration test of OnionShare 2.4, funded by the Open Technology Fund's [Red Team lab](https://www.opentech.fund/labs/red-team-lab/). This is an issue from that penetration test.
- Vulnerabili... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'onionshare-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3'}, {'fixed': '2.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/onionshare/onionshare/security/advisories/GHSA-68vr-8f46-vc9f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21696'}, {'type': 'PACKAGE', 'url': 'https://github.com/onionshare/onionshare'}, {'type': 'WEB', 'url': 'https://github.com/onionshare/onion... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T19:41:55Z', 'nvd_published_at': '2022-01-18T20:15:00Z'} |
1.4.0 | GHSA-9328-7pcw-vw69 | 2022-01-04T16:32:38Z | 2022-01-06T18:34:53Z | null | ['CVE-2020-1692'] | Cross-Site Request Forgery in Moodle | Moodle before version 3.7.2 is vulnerable to information exposure of service tokens for users enrolled in the same course. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.7.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1692'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1692'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-04T16:32:38Z', 'nvd_published_at': '2020-02-17T16:15:00Z'} |
1.4.0 | GHSA-xvvv-wj7j-r9jm | 2023-09-13T12:58:16Z | 2022-01-06T22:04:19Z | null | ['CVE-2021-45895'] | Cross-site Scripting in Netgen Tags Bundle | Netgen Tags Bundle 3.4.x before 3.4.11 and 4.0.x before 4.0.15 allows XSS in the Tags Admin interface. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'netgen/tagsbundle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.4.0'}, {'fixed': '3.4.11'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'netgen/tagsbundle'}, 'ecosystem_specific': {'affected_fu... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45895'}, {'type': 'PACKAGE', 'url': 'https://github.com/netgen/TagsBundle'}, {'type': 'WEB', 'url': 'https://github.com/netgen/TagsBundle/releases/tag/3.4.11'}, {'type': 'WEB', 'url': 'https://github.com/netgen/TagsBundle/releases/tag/4.0.15'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T21:32:08Z', 'nvd_published_at': '2021-12-27T21:15:00Z'} |
1.4.0 | GHSA-hr52-f9vp-582c | 2022-01-07T16:30:51Z | 2022-01-06T22:12:28Z | null | ['CVE-2021-45692'] | Use of Uninitialized Resource in messagepack-rs. | An issue was discovered in the messagepack-rs crate through 2021-01-26 for Rust. deserialize_extension_others may read from uninitialized memory locations. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'messagepack-rs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.8.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45692'}, {'type': 'WEB', 'url': 'https://github.com/otake84/messagepack-rs/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/otake84/messagepack-rs'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crate... | {'cwe_ids': ['CWE-908'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T14:36:43Z', 'nvd_published_at': '2021-12-27T00:15:00Z'} |
1.4.0 | GHSA-6m93-343m-3jrc | 2022-01-25T20:48:30Z | 2022-01-21T23:29:48Z | null | ['CVE-2021-45394'] | Cross-site Scripting in HTML2PDF | An issue was discovered in Spipu HTML2PDF before 5.2.4. Attackers can trigger deserialization of arbitrary data via the injection of a malicious <link> tag in the converted HTML document. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'spipu/html2pdf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45394'}, {'type': 'WEB', 'url': 'https://github.com/spipu/html2pdf/commit/100a4d509abf8550765cf0e0da83e83abb422585'}, {'type': 'WEB', 'url': 'https://github.com/spipu/html2pdf/commit/2e6bab9a2afe9cfd4d3c3038da64d8ad74e41d7f'}, {'type': 'PACKAGE', '... | {'cwe_ids': ['CWE-79', 'CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T22:40:38Z', 'nvd_published_at': '2022-01-18T12:15:00Z'} |
1.4.0 | GHSA-fc7x-2cmc-8j2g | 2023-06-13T20:41:36Z | 2022-01-06T22:10:26Z | null | ['CVE-2021-45696'] | Incorrect hash in sha2 | The v0.9.7 release of the sha2 crate introduced a new AVX2-accelerated backend which was automatically enabled for all x86/x86_64 CPUs where AVX2 support was autodetected at runtime.
This backend was buggy and would miscompute results for long messages (i.e. messages spanning multiple SHA blocks).
The crate has since... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'sha2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.7'}, {'fixed': '0.9.8'}]}], 'versions': ['0.9.7']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45696'}, {'type': 'WEB', 'url': 'https://github.com/RustCrypto/hashes/pull/314'}, {'type': 'PACKAGE', 'url': 'https://github.com/RustCrypto/hashes'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/sha2/RUS... | {'cwe_ids': ['CWE-327'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T14:26:28Z', 'nvd_published_at': '2021-12-27T00:15:00Z'} |
1.4.0 | GHSA-w6jr-wj64-mc9x | 2022-01-06T19:32:43Z | 2022-01-06T22:52:41Z | null | ['CVE-2022-21647'] | Deserialization of Untrusted Data in Codeigniter4 | ### Impact
Deserialization of Untrusted Data was found in the `old()` function in CodeIgniter4.
Remote attackers may inject auto-loadable arbitrary objects with this vulnerability,
and possibly execute existing PHP code on the server.
We are aware of a working exploit, which can lead to SQL injection.
### Patches
Upg... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'codeigniter4/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/codeigniter4/CodeIgniter4/security/advisories/GHSA-w6jr-wj64-mc9x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21647'}, {'type': 'WEB', 'url': 'https://github.com/codeigniter4/CodeIgniter4/commit/ce95ed5765256e2f09f3513e7d42790e0d6948f5'}, {'type'... | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T19:32:43Z', 'nvd_published_at': '2022-01-04T20:15:00Z'} |
1.4.0 | GHSA-2vj5-px25-gjrp | 2022-01-06T21:28:12Z | 2022-01-06T23:58:59Z | null | ['CVE-2021-4118'] | pytorch-lightning is vulnerable to Deserialization of Untrusted Data | pytorch-lightning is vulnerable to Deserialization of Untrusted Data. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pytorch-lightning'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4118'}, {'type': 'WEB', 'url': 'https://github.com/PyTorchLightning/pytorch-lightning/issues/11045'}, {'type': 'WEB', 'url': 'https://github.com/PyTorchLightning/pytorch-lightning/pull/11099'}, {'type': 'WEB', 'url': 'https://github.com/pytorchligh... | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T17:49:21Z', 'nvd_published_at': '2021-12-23T18:15:00Z'} |
1.4.0 | GHSA-4h9c-v5vg-5m6m | 2022-01-20T15:33:55Z | 2022-01-12T22:43:42Z | null | ['CVE-2021-21408'] | Access to restricted PHP code by dynamic static class access in smarty | ### Impact
Template authors could run restricted static php methods.
### Patches
Please upgrade to 3.1.40 or higher.
### References
See the [documentation on Smarty security features](https://www.smarty.net/docs/en/advanced.features.tpl#advanced.features.security) on the static_classes access filter.
### For more in... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'smarty/smarty'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.43'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'smarty/smarty'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/smarty-php/smarty/security/advisories/GHSA-4h9c-v5vg-5m6m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21408'}, {'type': 'WEB', 'url': 'https://github.com/smarty-php/smarty/commit/19ae410bf56007a5ef24441cdc6414619cfaf664'}, {'type': 'PACKAGE', 'ur... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-10T22:09:37Z', 'nvd_published_at': '2022-01-10T20:15:00Z'} |
1.4.0 | GHSA-w4hp-pcp8-qhf3 | 2022-02-03T20:16:38Z | 2022-01-28T23:06:32Z | null | ['CVE-2022-0387'] | Cross-site Scripting in livehelperchat | Stored XSS is found in Settings>Live help configuration>Departments->Departments groups->edit When a user creates a new webhook under the NAME field and puts a payload {{constructor.constructor('alert(1)')()}}, the input gets stored, at user edit groupname , the payload gets executed. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.93'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0387'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/ff70c7dd641b68b9afb170b89ec1ef003a4e3444'}, {'type': 'PACKAGE', 'url': 'https://github.com/livehelperchat/livehelperchat'}, {'type': 'WEB', 'url': 'https://hunt... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-28T20:26:07Z', 'nvd_published_at': '2022-01-27T06:15:00Z'} |
1.4.0 | GHSA-x76r-966h-5qv9 | 2022-01-07T16:19:25Z | 2022-01-06T22:15:56Z | null | ['CVE-2021-45680'] | Out-of-bounds Write in vec-const | An issue was discovered in the vec-const crate before 2.0.0 for Rust. It tries to construct a Vec from a pointer to a const slice, leading to memory corruption. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'vec-const'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45680'}, {'type': 'WEB', 'url': 'https://github.com/Eolu/vec-const/issues/1#issuecomment-898908241'}, {'type': 'PACKAGE', 'url': 'https://github.com/Eolu/vec-const/'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/ma... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T18:17:26Z', 'nvd_published_at': '2021-12-27T00:15:00Z'} |
1.4.0 | GHSA-rrrm-qjm4-v8hf | 2022-01-14T19:56:20Z | 2022-01-14T21:04:41Z | null | ['CVE-2022-21680'] | Inefficient Regular Expression Complexity in marked | ### Impact
_What kind of vulnerability is it?_
Denial of service.
The regular expression `block.def` may cause catastrophic backtracking against some strings.
PoC is the following.
```javascript
import * as marked from "marked";
marked.parse(`[x]:${' '.repeat(1500)}x ${' '.repeat(1500)} x`);
```
_Who is impacted?... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'marked'}, 'ecosystem_specific': {'affected_functions': ['marked.parse']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.10'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/markedjs/marked/security/advisories/GHSA-rrrm-qjm4-v8hf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21680'}, {'type': 'WEB', 'url': 'https://github.com/markedjs/marked/commit/c4a3ccd344b6929afa8a1d50ac54a721e57012c0'}, {'type': 'PACKAGE', 'url': ... | {'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-14T19:56:20Z', 'nvd_published_at': '2022-01-14T17:15:00Z'} |
1.4.0 | GHSA-w4cc-pc2h-whcj | 2022-01-07T16:17:28Z | 2022-01-06T22:16:10Z | null | ['CVE-2021-45681'] | Out-of-bounds Write in derive-com-impl | An issue was discovered in the derive-com-impl crate before 0.1.2 for Rust. An invalid reference (and memory corruption) can occur because AddRef might not be called before returning a pointer. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'derive-com-impl'}, 'ecosystem_specific': {'affected_functions': ['derive_com_impl::derive_com_impl']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 0.1.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45681'}, {'type': 'WEB', 'url': 'https://github.com/Connicpu/com-impl/issues/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/connicpu/com-impl'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/derive-c... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T17:46:38Z', 'nvd_published_at': '2021-12-27T00:15:00Z'} |
1.4.0 | GHSA-9236-8w7q-rmrv | 2022-01-05T20:41:25Z | 2022-01-06T21:59:50Z | null | ['CVE-2021-4162'] | archivy is vulnerable to Cross-Site Request Forgery (CSRF) | archivy is vulnerable to Cross-Site Request Forgery (CSRF). There is [a fix](https://github.com/archivy/archivy/commit/796c3ae318eea183fc88c87ec5a27355b0f6a99d) available in the master branch. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'archivy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4162'}, {'type': 'WEB', 'url': 'https://github.com/archivy/archivy/commit/796c3ae318eea183fc88c87ec5a27355b0f6a99d'}, {'type': 'PACKAGE', 'url': 'https://github.com/archivy/archivy/'}, {'type': 'WEB', 'url': 'https://github.com/archivy/archivy/rele... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T20:41:25Z', 'nvd_published_at': '2021-12-25T12:15:00Z'} |
1.4.0 | GHSA-96v6-hrwg-p378 | 2022-01-24T22:07:06Z | 2022-01-08T00:31:51Z | null | ['CVE-2022-22110'] | Weak Password Requirements in Daybyday CRM | In Daybyday CRM, versions 1.1 through 2.2.0 enforce weak password requirements in the user update functionality. A user with privileges to update his password could change it to a weak password, such as those with a length of a single character. This may allow an attacker to brute-force users’ passwords with minimal to... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'bottelet/flarepoint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1'}, {'fixed': '2.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22110'}, {'type': 'WEB', 'url': 'https://github.com/Bottelet/DaybydayCRM/commit/a0392f4a4a14e1e3fedaf6817aefce69b6bd661b'}, {'type': 'PACKAGE', 'url': 'https://github.com/Bottelet/DaybydayCRM/'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftw... | {'cwe_ids': ['CWE-521'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T19:46:24Z', 'nvd_published_at': '2022-01-05T15:15:00Z'} |
1.4.0 | GHSA-xwqr-xmgg-j69q | 2023-04-26T22:14:09Z | 2022-01-28T22:59:28Z | null | ['CVE-2021-46102'] | Integer overflow in solana_rbpf | From version 0.2.14 to 0.2.16 for Solana rBPF, function "relocate" in the file src/elf.rs has an integer overflow bug because the sym.st_value is read directly from ELF file without checking. If the sym.st_value is rather large, an integer overflow is triggered while calculating the variable "addr" via `addr = (sym.st_... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'solana_rbpf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.14'}, {'fixed': '0.2.17'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46102'}, {'type': 'WEB', 'url': 'https://github.com/solana-labs/rbpf/pull/200'}, {'type': 'WEB', 'url': 'https://github.com/solana-labs/rbpf/pull/236'}, {'type': 'WEB', 'url': 'https://blocksecteam.medium.com/new-integer-overflow-bug-discovered-in-... | {'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-28T19:06:48Z', 'nvd_published_at': '2022-01-27T18:15:00Z'} |
1.4.0 | GHSA-r3rr-wph6-9638 | 2022-11-29T21:26:23Z | 2022-01-13T00:00:53Z | null | ['CVE-2022-23114'] | Password stored in plain text by Jenkins Publish Over SSH Plugin | Jenkins Publish Over SSH Plugin 1.22 and earlier stores password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:publish-over-ssh'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.23'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23114'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/publish-over-ssh-plugin'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/publish-over-ssh-plugin/releases/tag/publish-over-ssh-1.23'}, {'type': 'WEB', 'url': 'https://www.jenk... | {'cwe_ids': ['CWE-522'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T21:26:23Z', 'nvd_published_at': '2022-01-12T20:15:00Z'} |
1.4.0 | GHSA-c6rp-xvqv-mwmf | 2023-09-12T21:00:42Z | 2022-01-21T23:52:17Z | null | ['CVE-2021-33040'] | Cross-site Scripting in epubjs | managers/views/iframe.js in FuturePress EPub.js before 0.3.89 allows XSS. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'epubjs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.89'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33040'}, {'type': 'WEB', 'url': 'https://github.com/futurepress/epub.js/commit/ab4dd46408cce0324e1c67de4a3ba96b59e5012e'}, {'type': 'PACKAGE', 'url': 'https://github.com/futurepress/epub.js'}, {'type': 'WEB', 'url': 'https://github.com/futurepress/... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T14:07:11Z', 'nvd_published_at': '2022-01-17T17:15:00Z'} |
1.4.0 | GHSA-xhw6-hjc9-679m | 2023-09-26T17:27:45Z | 2022-01-08T00:36:05Z | null | ['CVE-2021-44878'] | Pac4j token validation bypass if OpenID Connect provider supports none algorithm | If an OpenID Connect provider supports the “none” algorithm (i.e., tokens with no signature), pac4j v5.3.0 (and prior) does not refuse it without an explicit configuration on its side or for the “idtoken” response type which is not secure and violates the OpenID Core Specification. The "none" algorithm does not require... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.pac4j:pac4j-oidc'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.pac4j:pac4j-oidc'}, 'ecosystem_specific': {'affected_functions... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44878'}, {'type': 'WEB', 'url': 'https://github.com/pac4j/pac4j/commit/09684e0de1c4753d22c53b8135d4ef61cfda76f7'}, {'type': 'WEB', 'url': 'https://github.com/pac4j/pac4j/commit/22b82ffd702a132d9f09da60362fc6264fc281ae'}, {'type': 'WEB', 'url': 'htt... | {'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T22:41:34Z', 'nvd_published_at': '2022-01-06T13:15:00Z'} |
1.4.0 | GHSA-m8rp-q82r-c5mf | 2022-01-27T18:31:46Z | 2022-01-21T18:06:49Z | null | ['CVE-2022-0278'] | Cross-site Scripting in microweber | Cross-site Scripting (XSS) - Stored in Packagist microweber/microweber prior to 1.2.11. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0278'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/b64ef574b82dbf89a908e1569d790c7012d1ccd7'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/6... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-21T17:01:34Z', 'nvd_published_at': '2022-01-20T10:15:00Z'} |
1.4.0 | GHSA-w4jv-6rg4-pr4m | 2023-05-24T17:27:23Z | 2022-01-13T00:01:00Z | null | ['CVE-2022-20619'] | Cross-Site Request Forgery in Jenkins Bitbucket Branch Source Plugin | Jenkins Bitbucket Branch Source Plugin prior to 746.v350d2781c184, 725.vd9f8be0fa250, 2.9.11.2, and 2.9.7.2 does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability.
This allows attackers with Overall/Read access to connect to an attacker-specified URL using a... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:cloudbees-bitbucket-branch-source'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '726.v7e6f53de133c'}, {'fixed': '746.v350d2781c184'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:cloudbees-bitbucket-branch-sour... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-20619'}, {'type': 'WEB', 'url': 'https://github.com/CVEProject/cvelist/blob/2d78eb36f4d084db7fb35f1535d8d84fdcb7d859/2022/20xxx/CVE-2022-20619.json'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/bitbucket-branch-source-plugin'}, {'type... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:49:06Z', 'nvd_published_at': '2022-01-12T20:15:00Z'} |
1.4.0 | GHSA-vc89-hccf-rq55 | 2022-01-06T20:19:30Z | 2022-01-06T23:48:35Z | null | ['CVE-2022-21653'] | Hash collision in typelevel jawn | ### Impact
Extenders of the `org.typelevel.jawn.SimpleFacade` and `org.typelevel.jawn.MutableFacade` who don't override `objectContext()` are vulnerable to a hash collision attack. Most applications do not implement these traits directly, but inherit from a library:
Affected implementations include:
* `org.http4s` :... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.typelevel:jawn-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/typelevel/jawn/security/advisories/GHSA-vc89-hccf-rq55'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21653'}, {'type': 'WEB', 'url': 'https://github.com/typelevel/jawn/pull/390'}, {'type': 'PACKAGE', 'url': 'https://github.com/typelevel/jawn'}] | {'cwe_ids': ['CWE-326', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T20:19:30Z', 'nvd_published_at': '2022-01-05T21:15:00Z'} |
1.4.0 | GHSA-7vvq-7r29-5vg3 | 2022-01-28T18:32:38Z | 2022-01-27T16:00:48Z | 2022-01-28T18:32:01Z | ['CVE-2022-0177'] | Cross site scripting in three.js | # CVE has been withdrawn
Versions of three.js prior to 0.137.0 load untrusted iframes and allow for attackers to inject arbitrary javascript into a users browser.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'three'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.137.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0177'}, {'type': 'WEB', 'url': 'https://github.com/mrdoob/three.js/pull/23245'}, {'type': 'WEB', 'url': 'https://github.com/mrdoob/three.js/commit/0c31bc605e21965aad8a6479bb1969351773f76d'}, {'type': 'PACKAGE', 'url': 'https://github.com/mrdoob/thr... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-25T21:13:47Z', 'nvd_published_at': '2022-01-24T21:15:00Z'} |
1.4.0 | GHSA-gf8q-jrpm-jvxq | 2022-01-07T22:20:43Z | 2022-01-08T00:22:02Z | null | [] | URL parsing in node-forge could lead to undesired behavior. | ### Impact
The regex used for the `forge.util.parseUrl` API would not properly parse certain inputs resulting in a parsed data structure that could lead to undesired behavior.
### Patches
`forge.util.parseUrl` and other very old related URL APIs were removed in 1.0.0 in favor of letting applications use the more moder... | [] | [{'package': {'ecosystem': 'npm', 'name': 'node-forge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/digitalbazaar/forge/security/advisories/GHSA-gf8q-jrpm-jvxq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0122'}, {'type': 'PACKAGE', 'url': 'https://github.com/digitalbazaar/forge/'}, {'type': 'WEB', 'url': 'https://www.huntr.dev/bounties/41852c50... | {'cwe_ids': ['CWE-601'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T22:20:43Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pccr-q7v9-5f27 | 2022-08-11T18:41:45Z | 2022-01-06T21:32:35Z | null | ['CVE-2021-44548'] | Apache Solr Improper Input Validation and Path Traversal | An Improper Input Validation vulnerability in DataImportHandler of Apache Solr allows an attacker to provide a Windows UNC path resulting in an SMB network call being made from the Solr host to another host on the network. If the attacker has wider access to the network, this may lead to SMB attacks, which may result i... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.11.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44548'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/solr'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220114-0005/'}, {'type': 'WEB', 'url': 'https://solr.apache.org/security.html#cve-2021-44548-apache-solr-info... | {'cwe_ids': ['CWE-20', 'CWE-22', 'CWE-40'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T17:54:06Z', 'nvd_published_at': '2021-12-23T09:15:00Z'} |
1.4.0 | GHSA-xrcv-f9gm-v42c | 2022-02-17T23:26:14Z | 2022-01-12T20:07:41Z | null | ['CVE-2022-22816'] | Out-of-bounds Read in Pillow | path_getbbox in path.c in Pillow before 9.0.0 has a buffer over-read during initialization of ImagePath.Path. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['PIL.ImagePath.Path']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22816'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/5920'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/5543e4e2d409cd9e409bc64cdc77be0af007a31f'}, {'type': 'PACKAGE', 'url': 'https://github.com/... | {'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-11T18:02:58Z', 'nvd_published_at': '2022-01-10T14:12:00Z'} |
1.4.0 | GHSA-mpp5-2x55-49xw | 2021-05-25T19:52:21Z | 2022-01-06T19:45:13Z | null | ['CVE-2020-11887'] | XSS in svg2png (NPM package) | svg2png 4.1.1 allows XSS with resultant SSRF via JavaScript inside an SVG document. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'svg2png'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11887'}, {'type': 'WEB', 'url': 'https://github.com/domenic/svg2png/issues/117'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T19:52:21Z', 'nvd_published_at': '2020-04-17T21:15:00Z'} |
1.4.0 | GHSA-8m28-w6xg-35hw | 2022-01-24T22:54:21Z | 2022-01-26T20:22:08Z | null | ['CVE-2022-0231'] | Cross-Site Request Forgery (CSRF) in livehelperchat | livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.92'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0231'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/6ad1349dc5e7503b00c5017499a0a895d7654a61'}, {'type': 'PACKAGE', 'url': 'https://github.com/livehelperchat/livehelperchat'}, {'type': 'WEB', 'url': 'https://hunt... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-24T22:54:21Z', 'nvd_published_at': '2022-01-14T12:15:00Z'} |
1.4.0 | GHSA-6r92-cgxc-r5fg | 2022-01-24T22:05:31Z | 2022-01-21T23:35:35Z | null | [] | Denial of service in CBOR library | ### Impact
Due to this library's use of an inefficient algorithm, it is vulnerable to a denial of service attack when a maliciously crafted input is passed to `DecodeFromBytes` or other CBOR decoding mechanisms in this library.
Affected versions _include_ versions 4.0.0 through 4.5.0.
This vulnerability was privately... | [] | [{'package': {'ecosystem': 'NuGet', 'name': 'PeterO.Cbor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.5.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/peteroupc/CBOR/security/advisories/GHSA-6r92-cgxc-r5fg'}, {'type': 'WEB', 'url': 'https://github.com/peteroupc/CBOR/commit/b4117dbbb4cd5a4a963f9d0c9aa132f033e15b95'}, {'type': 'PACKAGE', 'url': 'https://github.com/peteroupc/CBOR'}, {'type': 'WEB', 'url': 'https://github.com/p... | {'cwe_ids': ['CWE-407'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-18T22:57:46Z', 'nvd_published_at': None} |
1.4.0 | GHSA-59qh-g7m4-j9m9 | 2022-02-02T16:05:01Z | 2022-01-28T23:06:12Z | null | ['CVE-2022-0374'] | Cross-site Scripting in livehelperchat | Stored XSS attacks exist in new the form creation flow. New forms can be given a title which will render javascript. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.93'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0374'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/bbfaa26ce54a2a86ce1a42a16496038f5bdfc102'}, {'type': 'PACKAGE', 'url': 'https://github.com/livehelperchat/livehelperchat/'}, {'type': 'WEB', 'url': 'https://hun... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-27T23:20:12Z', 'nvd_published_at': '2022-01-26T10:15:00Z'} |
1.4.0 | GHSA-m7vp-hqwv-7m5x | 2022-01-11T16:45:39Z | 2022-01-12T22:33:04Z | null | [] | Unbounded memory usage on exposed HTTP/2 (non-gRPC) endpoints | ### Impact
The net/http Go package has a reported vulnerability tracked under CVE-2021-44716 which allows attacker controlled HTTP/2 requests to trigger unbounded memory usage in HTTP/2 endpoints. gRPC endpoints are not vulnerable as they rely on their own HTTP/2 implementation instead of the net/http package. HTTP/2 e... | [] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/spiffe/spire'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/spiffe/spire'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/spiffe/spire/security/advisories/GHSA-m7vp-hqwv-7m5x'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-10T22:07:35Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7w54-gp8x-f33m | 2023-07-24T19:32:58Z | 2022-01-12T22:44:47Z | null | ['CVE-2022-21671'] | Potential exposure of tokens to an Unauthorized Actor | ### Impact
When using this library as a way to programmatically communicate with Replit in a standalone fashion, if there are multiple failed attempts to contact Replit through a WebSocket, the library will attempt to communicate using a fallback poll-based proxy. The URL of the proxy has changed, so any communication... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': '@replit/crosis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.3.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/replit/crosis/security/advisories/GHSA-7w54-gp8x-f33m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21671'}, {'type': 'WEB', 'url': 'https://github.com/replit/crosis/commit/e44b6a8f5fa28cb2872e3c19bb8a205bb5bfc281'}, {'type': 'PACKAGE', 'url': 'htt... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-10T23:18:10Z', 'nvd_published_at': '2022-01-11T15:15:00Z'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.