schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
8
154
details
stringlengths
31
19.1k
severity
stringlengths
2
92
affected
stringlengths
75
28.5k
references
stringlengths
79
7.48k
database_specific
stringlengths
131
196
1.4.0
GHSA-vgmw-9cww-qq99
2022-02-07T21:14:46Z
2022-01-31T00:00:29Z
null
['CVE-2022-0273']
Incorrect Authorization in calibreweb
calibreweb prior to version 0.6.16 contains an Incorrect Authorization vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'calibreweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.16'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0273'}, {'type': 'WEB', 'url': 'https://github.com/janeczku/calibre-web/commit/0c0313f375bed7b035c8c0482bbb09599e16bfcf'}, {'type': 'PACKAGE', 'url': 'https://github.com/janeczku/calibre-web'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8f2...
{'cwe_ids': ['CWE-284', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-07T21:14:46Z', 'nvd_published_at': '2022-01-30T14:15:00Z'}
1.4.0
GHSA-5v2h-r2cx-5xgj
2022-01-14T19:57:17Z
2022-01-14T21:04:46Z
null
['CVE-2022-21681']
Inefficient Regular Expression Complexity in marked
### Impact _What kind of vulnerability is it?_ Denial of service. The regular expression `inline.reflinkSearch` may cause catastrophic backtracking against some strings. PoC is the following. ```javascript import * as marked from 'marked'; console.log(marked.parse(`[x]: x \\[\\](\\[\\](\\[\\](\\[\\](\\[\\](\\[\\]...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'marked'}, 'ecosystem_specific': {'affected_functions': ['marked.parse']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.10'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/markedjs/marked/security/advisories/GHSA-5v2h-r2cx-5xgj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21681'}, {'type': 'WEB', 'url': 'https://github.com/markedjs/marked/commit/8f806573a3f6c6b7a39b8cdb66ab5ebb8d55a5f5'}, {'type': 'PACKAGE', 'url': ...
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-14T19:57:17Z', 'nvd_published_at': '2022-01-14T17:15:00Z'}
1.4.0
GHSA-r8hp-5m7c-jhv4
2022-01-21T21:09:59Z
2022-01-21T23:08:50Z
null
['CVE-2022-0274']
Cross-site Scripting OrchardCore.Application.Cms.Targets
Cross-site Scripting (XSS) - Stored in NuGet OrchardCore.Application.Cms.Targets prior to 1.2.2.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'OrchardCore.Application.Cms.Targets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0274'}, {'type': 'WEB', 'url': 'https://github.com/orchardcms/orchardcore/commit/218f25ddfadb66a54de7a82dffe3ab2e4ab7c4b4'}, {'type': 'PACKAGE', 'url': 'https://github.com/orchardcms/orchardcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-21T21:09:59Z', 'nvd_published_at': '2022-01-19T18:15:00Z'}
1.4.0
GHSA-p92q-7fhh-mq35
2022-01-20T14:46:50Z
2022-01-21T23:37:57Z
null
['CVE-2022-20612']
Cross-Site Request Forgery in Jenkins
A cross-site request forgery (CSRF) vulnerability in Jenkins 2.329 and earlier, LTS 2.319.1 and earlier allows attackers to trigger build of job without parameters when no security realm is set.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.320'}, {'fixed': '2.330'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-20612'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/changelog-stable/#v2.319.2'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/changelog/#v2.330'}, {'type': 'WEB', 'url': 'ht...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-20T14:46:50Z', 'nvd_published_at': '2022-01-12T20:15:00Z'}
1.4.0
GHSA-pmcr-2rhp-36hr
2022-01-25T21:03:46Z
2022-01-27T16:23:02Z
null
['CVE-2022-23857']
SQL injection in github.com/navidrome/navidrome
model/criteria/criteria.go in Navidrome before 0.47.5 is vulnerable to SQL injection attacks when processing crafted Smart Playlists. An authenticated user could abuse this to extract arbitrary data from the database, including the user table (which contains sensitive information such as the users' encrypted passwords)...
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/navidrome/navidrome'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.47.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23857'}, {'type': 'WEB', 'url': 'https://github.com/navidrome/navidrome/commit/9e79b5cbf2a48c1e4344df00fea4ed3844ea965d'}, {'type': 'PACKAGE', 'url': 'https://github.com/navidrome/navidrome'}, {'type': 'WEB', 'url': 'https://github.com/navidrome/na...
{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-25T21:03:46Z', 'nvd_published_at': '2022-01-24T02:15:00Z'}
1.4.0
GHSA-g4c2-ghfg-g5rh
2022-02-07T21:16:57Z
2022-01-28T23:10:37Z
null
['CVE-2022-23599']
Cross-site Scripting and Open Redirect in Products.ATContentTypes
### Impact Plone is vulnerable to reflected cross site scripting and open redirect when an attacker can get a compromised version of the image_view_fullscreen page in a cache, for example in Varnish. The technique is known as cache poisoning. Any later visitor can get redirected when clicking on a link on this page. Us...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Products.ATContentTypes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/plone/Products.ATContentTypes/security/advisories/GHSA-g4c2-ghfg-g5rh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23599'}, {'type': 'WEB', 'url': 'https://github.com/plone/Products.ATContentTypes/commit/fc793f88f35a15a68b52e4abed77af0da5fdbab8'},...
{'cwe_ids': ['CWE-601', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-28T22:15:57Z', 'nvd_published_at': '2022-01-28T22:15:00Z'}
1.4.0
GHSA-wrp6-9w7f-3wxg
2022-01-18T22:52:28Z
2022-01-21T23:55:34Z
null
['CVE-2021-4170']
calibre-web is vulnerable to Cross-site Scripting
calibre-web is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'calibreweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.15'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4170'}, {'type': 'WEB', 'url': 'https://github.com/janeczku/calibre-web/commit/7ad419dc8c12180e842a82118f4866ac3d074bc5'}, {'type': 'PACKAGE', 'url': 'https://github.com/janeczku/calibre-web/'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ff...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-18T22:52:28Z', 'nvd_published_at': '2022-01-16T21:15:00Z'}
1.4.0
GHSA-5c6c-w4c4-vgvx
2022-12-13T18:00:58Z
2022-01-06T18:45:09Z
null
['CVE-2021-21668']
Stored XSS vulnerability in Jenkins Scriptler Plugin
Scriptler Plugin 3.1 and earlier does not escape script content. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Scriptler/Configure permission. Scriptler Plugin 3.2 escapes script content.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:scriptler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21668'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/scriptler-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-06-16/#SECURITY-2390'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-17T17:44:14Z', 'nvd_published_at': '2021-06-16T14:15:00Z'}
1.4.0
GHSA-8x44-pwr2-rgc6
2022-02-03T19:56:45Z
2022-01-28T23:05:03Z
null
['CVE-2022-0348']
Cross-site Scripting in pimcore
Pimcore settings module is vulnerable to stored cross site scripting
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.2.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.2.9'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0348'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/832c34aeb9f21f213295a0c28377132df996352a'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/250e79be-7e5d...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-28T19:12:11Z', 'nvd_published_at': '2022-01-27T14:15:00Z'}
1.4.0
GHSA-4rmr-c2jx-vx27
2022-08-11T17:05:16Z
2022-01-27T14:51:00Z
null
['CVE-2022-0323']
Mustache remote code injection vulnerability
In Mustache.php v2.0.0 through v2.14.0, Sections tag can lead to arbitrary php code execution even if strict_callables is true when section value is controllable.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'mustache/mustache'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.14.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0323'}, {'type': 'WEB', 'url': 'https://github.com/bobthecow/mustache.php/commit/579ffa5c96e1d292c060b3dd62811ff01ad8c24e'}, {'type': 'PACKAGE', 'url': 'https://github.com/bobthecow/mustache.php'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties...
{'cwe_ids': ['CWE-1336', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-24T23:01:39Z', 'nvd_published_at': '2022-01-21T18:15:00Z'}
1.4.0
GHSA-64wv-8vwp-xgw2
2022-01-07T17:19:25Z
2022-01-06T22:13:02Z
null
['CVE-2021-45688']
Use of Uninitialized Resource in ash.
An issue was discovered in the ash crate before 0.33.1 for Rust. util::read_spv may read from uninitialized memory locations.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'ash'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.33.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45688'}, {'type': 'WEB', 'url': 'https://github.com/MaikKlein/ash/issues/354'}, {'type': 'WEB', 'url': 'https://github.com/ash-rs/ash/issues/354'}, {'type': 'WEB', 'url': 'https://github.com/ash-rs/ash/pull/470'}, {'type': 'WEB', 'url': 'https://gi...
{'cwe_ids': ['CWE-908'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T16:49:36Z', 'nvd_published_at': '2021-12-27T00:15:00Z'}
1.4.0
GHSA-455w-gv5p-wgg3
2022-01-26T22:10:34Z
2022-01-26T22:10:48Z
null
['CVE-2022-0260']
Cross-site Scripting in pimcore
pimcore is vulnerable to Stored XSS at Name field in the setting tab of the Global Targeting Rules.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.2.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0260'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/11205'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/665976327ad3c2c87efa2a5a64d696032c0a8109'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pi...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-25T21:15:55Z', 'nvd_published_at': '2022-01-18T15:15:00Z'}
1.4.0
GHSA-jx5q-g37m-h5hj
2022-01-04T22:46:13Z
2022-01-06T18:29:51Z
null
['CVE-2021-43852']
Client-Side JavaScript Prototype Pollution in oro/platform
### Summary By sending a specially crafted request, an attacker could inject properties into existing JavaScript language construct prototypes, such as objects. Later this injection may lead to JS code execution by libraries that are vulnerable to Prototype Pollution. ### Workarounds Configure WAF to drop requests c...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'oro/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.14'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'oro/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.8'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/oroinc/platform/security/advisories/GHSA-jx5q-g37m-h5hj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43852'}, {'type': 'WEB', 'url': 'https://github.com/oroinc/platform/commit/62c26936b3adee9c20255dcd9f8ee5c299b464a9'}, {'type': 'PACKAGE', 'url': ...
{'cwe_ids': ['CWE-1321', 'CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-04T22:46:13Z', 'nvd_published_at': '2022-01-04T20:15:00Z'}
1.4.0
GHSA-wjfq-88q2-r34j
2022-01-21T21:16:09Z
2022-01-21T23:02:14Z
null
[]
Unhandled exception when decoding form response JSON
### Impact When handling form responses from the client (`ModalFormResponsePacket`), the Minecraft Windows client may send weird JSON that `json_decode()` can't understand. A workaround for this is implemented in `InGamePacketHandler::stupid_json_decode()`. An `InvalidArgumentException` is thrown by this function when...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pocketmine/pocketmine-mp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.7'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-wjfq-88q2-r34j'}, {'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/commit/56fe71d939c38fe14e18a31a673a9331bcc0e4ca'}, {'type': 'PACKAGE', 'url': 'https://github.com/pmmp/PocketMine-MP'}, {'type': 'WEB', 'url': 'https://...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-21T21:16:09Z', 'nvd_published_at': None}
1.4.0
GHSA-735v-wx75-xmmm
2022-01-31T21:45:04Z
2022-01-27T18:27:56Z
null
['CVE-2022-0268']
Cross-site Scripting in grav
In grav prior to version 1.7.28, a low privilege user can create a page with arbitrary javascript by bypassing insufficent XSS filtering.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:H/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'getgrav/grav'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.28'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0268'}, {'type': 'WEB', 'url': 'https://github.com/getgrav/grav/commit/6f2fa9311afb9ecd34030dec2aff7b39e9e7e735'}, {'type': 'PACKAGE', 'url': 'https://github.com/getgrav/grav'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/67085545-331e-4469-...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-26T22:38:10Z', 'nvd_published_at': '2022-01-25T11:15:00Z'}
1.4.0
GHSA-7mq6-cp5m-f4j5
2022-01-04T20:59:44Z
2022-01-05T14:54:36Z
null
['CVE-2021-44116']
Cross-site Scripting in Anchor CMS
Cross Site Scripting (XSS) vulnerability exits in Anchor CMS <=0.12.7 in posts.php. Attackers can use the posts column to upload the title and content containing malicious code to achieve the purpose of obtaining the administrator cookie, thereby achieving other malicious operations.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'anchorcms/anchor-cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.12.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44116'}, {'type': 'PACKAGE', 'url': 'https://github.com/anchorcms/anchor-cms'}, {'type': 'WEB', 'url': 'https://www.cnblogs.com/unrealnumb/p/15573449.html'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-04T20:59:44Z', 'nvd_published_at': '2021-12-15T22:15:00Z'}
1.4.0
GHSA-wxr6-29pv-ch68
2022-01-19T14:24:33Z
2022-01-21T23:44:17Z
null
['CVE-2021-4164']
calibre-web is vulnerable to Cross-Site Request Forgery (CSRF)
calibre-web is vulnerable to Cross-Site Request Forgery (CSRF)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'calibreweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.15'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4164'}, {'type': 'WEB', 'url': 'https://github.com/janeczku/calibre-web/commit/785726deee13b4d56f6c3503dd57c1e3eb7d6f30'}, {'type': 'PACKAGE', 'url': 'https://github.com/janeczku/calibre-web'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/2de...
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T14:24:33Z', 'nvd_published_at': '2022-01-17T13:15:00Z'}
1.4.0
GHSA-rrgw-3hg3-9x8c
2022-01-10T21:39:18Z
2022-01-12T21:49:49Z
null
[]
XSS vulnerability in translations
### Summary An attacker with admin privileges and access to Translations management functionality may add JS payload to translation values via: - Translation management UI. - Translations downloaded via the Crowdin service may also contain JS strings used for XSS attacks, for a successful attack poisoned translatio...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'oro/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.29'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'oro/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.17'}]}]}, {'p...
[{'type': 'WEB', 'url': 'https://github.com/oroinc/platform-er/security/advisories/GHSA-rrgw-3hg3-9x8c'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-10T21:39:18Z', 'nvd_published_at': None}
1.4.0
GHSA-wxgw-qj99-44c2
2022-01-07T22:20:50Z
2022-01-08T00:22:40Z
null
[]
Prototype Pollution in node-forge util.setPath API
### Impact `forge.util.setPath` had a potential prototype pollution issue if called with untrusted keys. This API was not used by forge itself. ### Patches The `forge.util.setPath` API and related functions were removed in 0.10.0. ### Workarounds Don't call `forge.util.setPath` directly or indirectly with untrusted k...
[]
[{'package': {'ecosystem': 'npm', 'name': 'node-forge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/digitalbazaar/forge/security/advisories/GHSA-wxgw-qj99-44c2'}]
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T22:20:50Z', 'nvd_published_at': None}
1.4.0
GHSA-77rm-9x9h-xj3g
2022-02-03T22:48:51Z
2022-01-27T00:01:15Z
null
['CVE-2021-22570']
NULL Pointer Dereference in Protocol Buffers
Nullptr dereference when a null char is present in a proto symbol. The symbol is parsed incorrectly, leading to an unchecked call into the proto file's name during generation of the resulting error message. Since the symbol is incorrectly parsed, the file is nullptr. We recommend upgrading to version 3.15.0 or greater.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Google.Protobuf'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.15.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'google/protobuf'}, 'ecosystem_specific': {'affected_functions': ['...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22570'}, {'type': 'PACKAGE', 'url': 'https://github.com/protocolbuffers/protobuf'}, {'type': 'WEB', 'url': 'https://github.com/protocolbuffers/protobuf/releases/tag/v3.15.0'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/202...
{'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T22:48:51Z', 'nvd_published_at': '2022-01-26T14:15:00Z'}
1.4.0
GHSA-cwx9-rp4w-4545
2022-10-25T19:59:06Z
2022-01-27T00:01:00Z
null
['CVE-2021-46386']
Mingsoft MCMS vulnerable to Remote Code Execution via file upload.
Mingsoft MCMS is a Java CMS. Versions prior to and including 5.2.5 contain a file upload vulnerability allowing for a jspx webshell to be uploaded via net.mingsoft.basic.action.web.FileAction#upload, resulting in remote code execution. It is unclear if this issue has been patched.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46386'}, {'type': 'PACKAGE', 'url': 'https://gitee.com/mingSoft/MCMS'}, {'type': 'WEB', 'url': 'https://gitee.com/mingSoft/MCMS/issues/I4R0GW'}, {'type': 'WEB', 'url': 'https://github.com/ming-soft/MCMS'}]
{'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T19:59:06Z', 'nvd_published_at': '2022-01-26T17:15:00Z'}
1.4.0
GHSA-64g7-mvw6-v9qj
2022-01-14T20:50:57Z
2022-01-14T21:09:50Z
null
[]
Improper Privilege Management in shelljs
### Impact Output from the synchronous version of `shell.exec()` may be visible to other users on the same system. You may be affected if you execute `shell.exec()` in multi-user Mac, Linux, or WSL environments, or if you execute `shell.exec()` as the root user. Other shelljs functions (including the asynchronous vers...
[]
[{'package': {'ecosystem': 'npm', 'name': 'shelljs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/shelljs/shelljs/security/advisories/GHSA-64g7-mvw6-v9qj'}, {'type': 'PACKAGE', 'url': 'https://github.com/shelljs/shelljs'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/50996581-c08e-4eed-a90e-c0bac082679c/'}]
{'cwe_ids': ['CWE-269'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-14T20:50:57Z', 'nvd_published_at': None}
1.4.0
GHSA-8xx9-rxrj-2m2w
2022-01-04T21:18:40Z
2022-01-05T20:35:12Z
null
['CVE-2021-4139']
Cross-site Scripting in pimcore
pimcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.2.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4139'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/d5c3e876d910784000335061c3bd24d301351245'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/6ec59e43-095f...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-04T21:18:40Z', 'nvd_published_at': '2021-12-21T13:15:00Z'}
1.4.0
GHSA-r683-j2x4-v87g
2023-09-07T18:38:41Z
2022-01-21T23:55:52Z
null
['CVE-2022-0235']
node-fetch forwards secure headers to untrusted sites
node-fetch forwards secure headers such as `authorization`, `www-authenticate`, `cookie`, & `cookie2` when redirecting to a untrusted site.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'node-fetch'}, 'ecosystem_specific': {'affected_functions': ['node-fetch.fetch']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'node-fetch'}, 'ecosystem_specific': {'affected_functions': [...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0235'}, {'type': 'WEB', 'url': 'https://github.com/node-fetch/node-fetch/pull/1449/commits/5c32f002fdd65b1c6a8f1e3620210813d45c7e60'}, {'type': 'WEB', 'url': 'https://github.com/node-fetch/node-fetch/pull/1453'}, {'type': 'WEB', 'url': 'https://git...
{'cwe_ids': ['CWE-173', 'CWE-200', 'CWE-601'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-18T22:51:22Z', 'nvd_published_at': '2022-01-16T17:15:00Z'}
1.4.0
GHSA-r57r-j98g-587f
2022-01-07T18:29:44Z
2022-01-06T22:08:56Z
null
['CVE-2021-45705']
Pointer dereference in nanorand
An issue was discovered in the nanorand crate before 0.6.1 for Rust. There can be multiple mutable references to the same object because the TlsWyRand Deref implementation dereferences a raw pointer.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'nanorand'}, 'ecosystem_specific': {'affected_functions': ['nanorand::tls::tls_rand']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.5.0'}, {'fixed': '0.6.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45705'}, {'type': 'WEB', 'url': 'https://github.com/Absolucy/nanorand-rs/issues/28'}, {'type': 'PACKAGE', 'url': 'https://github.com/Absolucy/nanorand-rs'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/n...
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T23:20:00Z', 'nvd_published_at': '2021-12-27T00:15:00Z'}
1.4.0
GHSA-h79x-98r2-g6qc
2022-01-24T22:08:04Z
2022-01-21T23:02:15Z
null
[]
Impersonation of other users (passing XBOX Live authentication) by theft of logins in PocketMine-MP
# Impact Minecraft Bedrock authentication and its protocol encryption are inseparably linked. One is not complete without the other. This vulnerability affects servers which are able to be directly connected to via the internet (i.e. not behind a proxy). If you are using a proxy, please check that it supports protoco...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pocketmine/pocketmine-mp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '4.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-h79x-98r2-g6qc'}, {'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/issues/4580'}, {'type': 'PACKAGE', 'url': 'https://github.com/pmmp/PocketMine-MP'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-21T21:16:04Z', 'nvd_published_at': None}
1.4.0
GHSA-vxh4-x6gv-mphf
2022-01-25T20:48:52Z
2022-01-21T23:25:45Z
null
['CVE-2022-0245']
Cross-Site Request Forgery (CSRF) in livehelperchat/livehelperchat
Cross-Site Request Forgery (CSRF) in GitHub repository livehelperchat/livehelperchat.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'livehelperchat/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.91'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0245'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/c2fa19afeb8b1ea927fea3fd452515c95f289fb9'}, {'type': 'PACKAGE', 'url': 'https://github.com/livehelperchat/livehelperchat'}, {'type': 'WEB', 'url': 'https://hunt...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T22:45:24Z', 'nvd_published_at': '2022-01-18T06:15:00Z'}
1.4.0
GHSA-7p8f-8hjm-wm92
2022-01-13T15:02:31Z
2022-01-13T15:05:41Z
null
['CVE-2022-21646']
Lookup operations do not take into account wildcards in SpiceDB
### Impact Any user making use of a wildcard relationship under the right hand branch of an `exclusion` or within an `intersection` operation will see `Lookup`/`LookupResources` return a resource as "accessible" if it is *not* accessible by virtue of the inclusion of the wildcard in the intersection or the right side o...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/authzed/spicedb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.4.0'}]}], 'versions': ['1.3.0']}]
[{'type': 'WEB', 'url': 'https://github.com/authzed/spicedb/security/advisories/GHSA-7p8f-8hjm-wm92'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21646'}, {'type': 'WEB', 'url': 'https://github.com/authzed/spicedb/issues/358'}, {'type': 'WEB', 'url': 'https://github.com/authzed/spicedb/commi...
{'cwe_ids': ['CWE-155', 'CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-11T21:06:45Z', 'nvd_published_at': '2022-01-11T22:15:00Z'}
1.4.0
GHSA-jg6j-jrxv-2hh9
2022-01-07T23:38:31Z
2022-01-08T00:46:17Z
null
['CVE-2021-36738']
Cross-site Scripting in Apache Pluto
The input fields in the JSP version of the Apache Pluto Applicant MVCBean CDI portlet are vulnerable to Cross-Site Scripting (XSS) attacks. Users should migrate to version 3.1.1 of the applicant-mvcbean-cdi-jsp-portlet.war artifact
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.portals.pluto:pluto-portal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36738'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/portals-pluto'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/11j19v1gjsk7o6o8nch1xrydow9b8lll'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T23:38:31Z', 'nvd_published_at': '2022-01-06T09:15:00Z'}
1.4.0
GHSA-53qw-q765-4fww
2023-09-05T19:51:28Z
2022-01-12T19:20:53Z
null
['CVE-2021-45115']
Denial-of-service in Django
An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1. `UserAttributeSimilarityValidator` incurred significant overhead in evaluating a submitted password that was artificially large in relation to the comparison values. In a situation where access to user registration was unrestr...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.26'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'ty...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45115'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/4.0/releases/security/'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!forum/django-announce'}, {'type':...
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-12T19:18:33Z', 'nvd_published_at': '2022-01-05T00:15:00Z'}
1.4.0
GHSA-9hfg-pxr6-q4vp
2023-06-13T17:23:04Z
2022-01-06T22:04:51Z
null
['CVE-2021-45709']
Use of a Broken or Risky Cryptographic Algorithm in crypto2
The implementation does not enforce alignment requirements on input slices while incorrectly assuming 4-byte alignment through an unsafe call to std::slice::from_raw_parts_mut, which breaks the contract and introduces undefined behavior. This affects Chacha20 encryption and decryption in crypto2.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'crypto2'}, 'ecosystem_specific': {'affected_functions': ['crypto2::streamcipher::Chacha20::decrypt_slice', 'crypto2::streamcipher::Chacha20::encrypt_slice', 'crypto2::streamcipher::xor_si512_inplace']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'l...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45709'}, {'type': 'WEB', 'url': 'https://github.com/shadowsocks/crypto2/issues/27'}, {'type': 'PACKAGE', 'url': 'https://github.com/shadowsocks/crypto2'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/cry...
{'cwe_ids': ['CWE-119'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T22:55:41Z', 'nvd_published_at': '2021-12-27T00:15:00Z'}
1.4.0
GHSA-799f-r78p-gq9c
2022-01-07T16:22:24Z
2022-01-06T22:17:38Z
null
['CVE-2020-36513']
Use of Uninitialized Resource in acc_reader.
An issue was discovered in the acc_reader crate through 2020-12-27 for Rust. read_up_to may read from uninitialized memory locations.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'acc_reader'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36513'}, {'type': 'WEB', 'url': 'https://github.com/netvl/acc_reader/issues/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/netvl/acc_reader'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/acc_reader...
{'cwe_ids': ['CWE-908'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T18:13:55Z', 'nvd_published_at': '2021-12-27T00:15:00Z'}
1.4.0
GHSA-82v2-mx6x-wq7q
2022-10-03T19:49:13Z
2022-01-21T18:53:27Z
null
['CVE-2022-21704']
Incorrect Default Permissions in log4js
### Impact Default file permissions for log files created by the file, fileSync and dateFile appenders are world-readable (in unix). This could cause problems if log files contain sensitive information. This would affect any users that have not supplied their own permissions for the files via the mode parameter in the ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'log4js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/log4js-node/log4js-node/security/advisories/GHSA-82v2-mx6x-wq7q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21704'}, {'type': 'WEB', 'url': 'https://github.com/log4js-node/log4js-node/pull/1141/commits/8042252861a1b65adb66931fdf702ead34fa9b76'}, ...
{'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T22:47:14Z', 'nvd_published_at': '2022-01-19T23:15:00Z'}
1.4.0
GHSA-39ph-wr67-j4xq
2023-08-03T16:37:17Z
2022-01-26T00:01:50Z
null
['CVE-2022-0338']
loguru vulnerable to improper privilege management
Improper Privilege Management in Conda loguru prior to 0.5.3.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'loguru'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0338'}, {'type': 'WEB', 'url': 'https://github.com/delgan/loguru/commit/ea39375e62f9b8f18e2ca798a5c0fb8c972b7eaa'}, {'type': 'PACKAGE', 'url': 'https://github.com/Delgan/loguru'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/359bea50-2bc6-426...
{'cwe_ids': ['CWE-269', 'CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T16:37:17Z', 'nvd_published_at': '2022-01-25T09:15:00Z'}
1.4.0
GHSA-756h-r2c9-qp5j
2022-02-03T20:20:13Z
2022-01-06T23:48:50Z
null
['CVE-2021-32849']
An authenticated user can execute arbitrary command in Gerapy
### Impact An authenticated user can execute arbitrary command, see more in https://github.com/Gerapy/Gerapy/issues/211. ### Patches Fixed in 0.9.9
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'gerapy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.9'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Gerapy/Gerapy/security/advisories/GHSA-756h-r2c9-qp5j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32849'}, {'type': 'WEB', 'url': 'https://github.com/Gerapy/Gerapy/issues/197'}, {'type': 'WEB', 'url': 'https://github.com/Gerapy/Gerapy/issues/217'...
{'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T23:30:47Z', 'nvd_published_at': '2022-01-26T22:15:00Z'}
1.4.0
GHSA-gjj5-998g-v36v
2022-01-19T19:20:26Z
2022-01-21T23:20:21Z
null
['CVE-2022-21692']
Improper Access Control in Onionshare
Between September 26, 2021 and October 8, 2021, [Radically Open Security](https://www.radicallyopensecurity.com/) conducted a penetration test of OnionShare 2.4, funded by the Open Technology Fund's [Red Team lab](https://www.opentech.fund/labs/red-team-lab/). This is an issue from that penetration test. - Vulnerabili...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'onionshare-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3'}, {'fixed': '2.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/onionshare/onionshare/security/advisories/GHSA-gjj5-998g-v36v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21692'}, {'type': 'PACKAGE', 'url': 'https://github.com/onionshare/onionshare'}, {'type': 'WEB', 'url': 'https://github.com/onionshare/onion...
{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T19:20:26Z', 'nvd_published_at': '2022-01-18T23:15:00Z'}
1.4.0
GHSA-v82v-rq72-phq9
2022-01-31T22:00:02Z
2022-01-26T22:13:05Z
null
['CVE-2021-23664']
Server side request forgery in @isomorphic-git/cors-proxy
The package @isomorphic-git/cors-proxy before 2.7.1 is vulnerable to Server-side Request Forgery (SSRF) due to missing sanitization and validation of the redirection action in middleware.js.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@isomorphic-git/cors-proxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23664'}, {'type': 'WEB', 'url': 'https://github.com/isomorphic-git/cors-proxy/commit/1b1c91e71d946544d97ccc7cf0ac62b859e03311'}, {'type': 'PACKAGE', 'url': 'https://github.com/isomorphic-git/cors-proxy'}, {'type': 'WEB', 'url': 'https://snyk.io/vul...
{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-24T22:53:26Z', 'nvd_published_at': '2022-01-21T20:15:00Z'}
1.4.0
GHSA-2gxj-qrp2-53jv
2023-06-13T18:34:26Z
2022-01-06T22:11:11Z
null
['CVE-2021-45695']
Incorrect reliance on Trait memory layout in mopa
The mopa crate redefines the deprecated TraitObject struct from core::raw. This is done to then transmute a reference to a trait object (&dyn Trait for any trait Trait) into this struct and retrieve the data field for the purpose of downcasting. This is used to implement downcast_ref_unchecked(), in terms of which down...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'mopa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45695'}, {'type': 'WEB', 'url': 'https://github.com/chris-morgan/mopa/issues/13'}, {'type': 'PACKAGE', 'url': 'https://github.com/chris-morgan/mopa'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/mopa/RU...
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T14:22:40Z', 'nvd_published_at': '2021-12-27T00:15:00Z'}
1.4.0
GHSA-45hx-wfhj-473x
2022-01-27T18:28:14Z
2022-01-21T23:07:39Z
null
['CVE-2022-23221']
Arbitrary code execution in H2 Console
H2 Console before 2.1.210 allows remote attackers to execute arbitrary code via a jdbc:h2:mem JDBC URL containing the IGNORE_UNKNOWN_SETTINGS=TRUE;FORBID_CREATION=FALSE;INIT=RUNSCRIPT substring, a different vulnerability than CVE-2021-42392.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.h2database:h2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.210'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23221'}, {'type': 'PACKAGE', 'url': 'https://github.com/h2database/h2database'}, {'type': 'WEB', 'url': 'https://github.com/h2database/h2database/releases/tag/version-2.1.210'}, {'type': 'WEB', 'url': 'https://github.com/h2database/h2database/secur...
{'cwe_ids': ['CWE-88'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-20T16:13:20Z', 'nvd_published_at': '2022-01-19T17:15:00Z'}
1.4.0
GHSA-9mp7-45qh-r8j8
2023-06-13T17:04:59Z
2022-01-06T22:13:46Z
null
['CVE-2021-45685']
columnar: Read on uninitialized buffer may cause UB (ColumnarReadExt::read_typed_vec())
Affected versions of this crate passes an uninitialized buffer to a user-provided Read implementation (ColumnarReadExt::read_typed_vec()). Arbitrary Read implementations can read from the uninitialized buffer (memory exposure) and also can return incorrect number of bytes written to the buffer. Reading from uninitiali...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'columnar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.19'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45685'}, {'type': 'WEB', 'url': 'https://github.com/frankmcsherry/columnar/issues/6'}, {'type': 'PACKAGE', 'url': 'https://github.com/frankmcsherry/columnar.git'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/c...
{'cwe_ids': ['CWE-908'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T17:12:24Z', 'nvd_published_at': '2021-12-27T00:15:00Z'}
1.4.0
GHSA-rfmp-jvr7-hx78
2022-04-29T20:27:44Z
2022-01-06T20:41:06Z
null
['CVE-2020-9491']
Inadequate Encryption Strength in Apache NiFi
In Apache NiFi 1.2.0 to 1.11.4, the NiFi UI and API were protected by mandating TLS v1.2, as well as listening connections established by processors like ListenHTTP, HandleHttpRequest, etc. However intracluster communication such as cluster request replication, Site-to-Site, and load balanced queues continued to suppor...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.12.0-RC1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.11.4'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-9491'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi/commit/441781cec50f77d9f1e65093f55bbd614b8c5ec6'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/nifi'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2d9c21f9ec...
{'cwe_ids': ['CWE-327'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T16:50:01Z', 'nvd_published_at': '2020-10-01T20:15:00Z'}
1.4.0
GHSA-74fj-2j2h-c42q
2022-01-20T15:34:48Z
2022-01-12T22:46:26Z
null
['CVE-2022-0155']
Exposure of sensitive information in follow-redirects
follow-redirects is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'follow-redirects'}, 'ecosystem_specific': {'affected_functions': ['follow-redirects.get']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.14.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0155'}, {'type': 'WEB', 'url': 'https://github.com/follow-redirects/follow-redirects/commit/8b347cbcef7c7b72a6e9be20f5710c17d6163c22'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf'}, {'type': 'PACKAGE', 'u...
{'cwe_ids': ['CWE-359'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-11T18:41:08Z', 'nvd_published_at': '2022-01-10T20:15:00Z'}
1.4.0
GHSA-75vw-3m5v-fprh
2022-01-24T22:08:31Z
2022-01-21T23:43:11Z
null
['CVE-2022-0239']
corenlp is vulnerable to Improper Restriction of XML External Entity Reference
corenlp is vulnerable to Improper Restriction of XML External Entity Reference
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'edu.stanford.nlp:stanford-corenlp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0239'}, {'type': 'WEB', 'url': 'https://github.com/stanfordnlp/corenlp/commit/1940ffb938dc4f3f5bc5f2a2fd8b35aabbbae3dd'}, {'type': 'PACKAGE', 'url': 'https://github.com/stanfordnlp/corenlp'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a717a...
{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T15:02:11Z', 'nvd_published_at': '2022-01-17T07:15:00Z'}
1.4.0
GHSA-29mw-wpgm-hmr9
2023-09-05T22:58:25Z
2022-01-06T20:30:46Z
null
['CVE-2020-28500']
Regular Expression Denial of Service (ReDoS) in lodash
All versions of package lodash prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the `toNumber`, `trim` and `trimEnd` functions. Steps to reproduce (provided by reporter Liyuan Chen): ```js var lo = require('lodash'); function build_blank(n) { var ret = "1" for (var i = 0; i...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'lodash'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.17.21'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'lodash-es'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28500'}, {'type': 'WEB', 'url': 'https://github.com/lodash/lodash/pull/5065'}, {'type': 'WEB', 'url': 'https://github.com/lodash/lodash/pull/5065/commits/02906b8191d3c100c193fe6f7b27d1c40f200bb7'}, {'type': 'WEB', 'url': 'https://github.com/lodash/...
{'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-19T22:45:28Z', 'nvd_published_at': '2021-02-15T11:15:00Z'}
1.4.0
GHSA-rcrv-228c-gprj
2022-01-20T18:36:49Z
2022-01-21T18:39:40Z
null
[]
Invalid URL generation in bitlyshortener
### Impact Due to a sudden upstream breaking change by Bitly, versions of `bitlyshortener` <0.6.0 generate invalid short URLs. All users are affected and must update immediately. ### Patches Upgrading `bitlyshortener` to 0.6.0 or newer will prevent the generation such invalid short URLs. ### Workarounds A workaround ...
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'bitlyshortener'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/impredicative/bitlyshortener/security/advisories/GHSA-rcrv-228c-gprj'}, {'type': 'WEB', 'url': 'https://github.com/impredicative/bitlyshortener/commit/b307d70bedf745305fa0dd3c5c600d8cb88d09b5'}, {'type': 'PACKAGE', 'url': 'https://github.com/impredicative/bitlyshortener'}, {'...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-20T18:36:49Z', 'nvd_published_at': None}
1.4.0
GHSA-r58x-wjg8-63m9
2022-01-13T18:33:25Z
2022-01-08T00:40:30Z
null
['CVE-2021-40110']
Denial of Service in Apache James
In Apache James, using Jazzer fuzzer, we identified that an IMAP user can craft IMAP LIST commands to orchestrate a Denial Of Service using a vulnerable Regular expression. This affected Apache James prior to 3.6.1 We recommend upgrading to Apache James 3.6.1 or higher , which enforce the use of RE2J regular expression...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.james:james-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40110'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2022/01/04/2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/01/04/2'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T18:34:26Z', 'nvd_published_at': '2022-01-04T09:15:00Z'}
1.4.0
GHSA-76w9-p8mg-j927
2023-06-13T18:32:56Z
2022-01-06T22:07:14Z
null
['CVE-2021-45707']
Out-of-bounds Write in nix
On certain platforms, if a user has more than 16 groups, the nix::unistd::getgrouplist function will call the libc getgrouplist function with a length parameter greater than the size of the buffer it provides, resulting in an out-of-bounds write and memory corruption. The libc getgrouplist function takes an in/out par...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'nix'}, 'ecosystem_specific': {'affected_functions': ['nix::unistd::getgrouplist']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.16.0'}, {'fixed': '0.20.2'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'nix'}, 'ecosystem_specific': {'affected_func...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45707'}, {'type': 'WEB', 'url': 'https://github.com/nix-rust/nix/issues/1541'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wgrg-5h56-jg27'}, {'type': 'PACKAGE', 'url': 'https://github.com/nix-rust/nix'}, {'type': 'WEB', 'url': ...
{'cwe_ids': ['CWE-787'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T23:13:23Z', 'nvd_published_at': '2021-12-27T00:15:00Z'}
1.4.0
GHSA-r8pr-83cc-ccv7
2022-01-27T18:26:22Z
2022-01-21T23:34:27Z
null
['CVE-2022-22691']
Umbraco Persistent Password Reset Poison
The password reset component deployed within Umbraco uses the hostname supplied within the request host header when building a password reset URL. It may be possible to manipulate the URL sent to Umbraco users when so that it points to the attackers server thereby disclosing the password reset token if/when the link is...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Umbraco.Cms.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22691'}, {'type': 'WEB', 'url': 'https://appcheck-ng.com/umbraco-applicationurl-overwrite-persistent-password-reset-poison-cve-2022-22690-cve-2022-22691/'}, {'type': 'PACKAGE', 'url': 'https://github.com/umbraco/Umbraco-CMS'}]
{'cwe_ids': ['CWE-444', 'CWE-640'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T22:24:13Z', 'nvd_published_at': '2022-01-18T17:15:00Z'}
1.4.0
GHSA-gh38-x2wm-xmc8
2022-01-31T21:45:30Z
2022-01-28T22:13:27Z
null
['CVE-2021-45029']
Code injection in ShenYu
Groovy Code Injection & SpEL Injection which lead to Remote Code Execution. This issue affected Apache ShenYu 2.4.0 and 2.4.1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.shenyu:shenyu-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45029'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/incubator-shenyu/'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/3zzmwvg3012tg306x8o893fvdcssx639'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/...
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-26T22:40:21Z', 'nvd_published_at': '2022-01-25T13:15:00Z'}
1.4.0
GHSA-jr37-66pj-36v7
2022-01-10T21:46:18Z
2022-01-08T00:32:00Z
null
['CVE-2022-22109']
Cross-site Scripting in DayByDay CRM
In Daybyday CRM, version 2.2.0 is vulnerable to Stored Cross-Site Scripting (XSS) vulnerability that allows low privileged application users to store malicious scripts in the title field of new tasks. These scripts are executed in a victim’s browser when they open the “/tasks” page to view all the tasks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'bottelet/flarepoint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22109'}, {'type': 'WEB', 'url': 'https://github.com/Bottelet/DaybydayCRM/commit/002dc75f400cf307bd00b71a5a93f1e26e52cee2'}, {'type': 'PACKAGE', 'url': 'https://github.com/Bottelet/DaybydayCRM'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftwa...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T20:42:41Z', 'nvd_published_at': '2022-01-05T15:15:00Z'}
1.4.0
GHSA-g5jm-xhwm-9xp9
2022-09-07T23:58:36Z
2022-01-03T00:00:59Z
null
['CVE-2022-22293']
Cross site scripting in dolibarr
admin/limits.php in Dolibarr 7.0.2 allows HTML injection, as demonstrated by the MAIN_MAX_DECIMALS_TOT parameter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '13.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22293'}, {'type': 'WEB', 'url': 'https://github.com/Dolibarr/dolibarr/issues/20237'}, {'type': 'PACKAGE', 'url': 'https://github.com/Dolibarr/dolibarr'}, {'type': 'WEB', 'url': 'https://github.com/mustgundogdu/Research/blob/main/Dolibar_7.0.2-Store...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-07T23:58:36Z', 'nvd_published_at': '2022-01-02T00:15:00Z'}
1.4.0
GHSA-6p56-wp2h-9hxr
2022-08-10T23:29:06Z
2022-01-07T00:09:39Z
null
['CVE-2021-33430']
NumPy Buffer Overflow (Disputed)
A Buffer Overflow vulnerability exists in NumPy 1.9.x in the PyArray_NewFromDescr_int function of ctors.c when specifying arrays of large dimensions (over 32) from Python code, which could let a malicious user cause a Denial of Service. NOTE: The vendor does not agree this is a vulneraility; In (very limited) circumst...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'numpy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.9.0'}, {'fixed': '1.21'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33430'}, {'type': 'WEB', 'url': 'https://github.com/numpy/numpy/issues/18939'}, {'type': 'WEB', 'url': 'https://github.com/numpy/numpy/commit/ae317fd9ff3e79c0eac357d723bfc29cbd625f2e'}, {'type': 'PACKAGE', 'url': 'https://github.com/numpy/numpy'}]
{'cwe_ids': ['CWE-120'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-04T20:52:47Z', 'nvd_published_at': '2021-12-17T19:15:00Z'}
1.4.0
GHSA-xqxm-2rpm-3889
2022-01-18T21:16:18Z
2022-01-21T23:43:50Z
null
['CVE-2022-21683']
Comment reply notifications sent to incorrect users
### Impact When notifications for new replies in comment threads are sent, they are sent to all users who have replied or commented anywhere on the site, rather than only in the relevant threads. This means that a user could listen in to new comment replies on pages they have not had editing access to, as long as they ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'wagtail'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.13'}, {'fixed': '2.15.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/security/advisories/GHSA-xqxm-2rpm-3889'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21683'}, {'type': 'WEB', 'url': 'https://github.com/wagtail/wagtail/commit/5fe901e5d86ed02dbbb63039a897582951266afd'}, {'type': 'PACKAGE', 'url': ...
{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-01-18T21:16:18Z', 'nvd_published_at': '2022-01-18T18:15:00Z'}
1.4.0
GHSA-h65f-jvqw-m9fj
2023-06-22T19:15:05Z
2022-01-27T16:13:07Z
null
['CVE-2022-23437']
Infinite Loop in Apache Xerces Java
There's a vulnerability within the Apache Xerces Java (XercesJ) XML parser when handling specially crafted XML document payloads. This causes, the XercesJ XML parser to wait in an infinite loop, which may sometimes consume system resources for prolonged duration. This vulnerability is present within XercesJ version 2.1...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'xerces:xercesImpl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.12.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23437'}, {'type': 'PACKAGE', 'url': 'https://github.com/jboss/xerces'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/6pjwm10bb69kq955fzr1n0nflnjd27dl'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20221028-0005/'}, ...
{'cwe_ids': ['CWE-91'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-25T20:46:16Z', 'nvd_published_at': '2022-01-24T15:15:00Z'}
1.4.0
GHSA-36m2-8rhx-f36j
2022-01-14T19:42:25Z
2022-01-06T23:17:07Z
null
['CVE-2022-21648']
Sandbox bypass in Latte templates
### Impact The problem affects users who use the sandbox in Latte and templates from untrusted sources. ### Patches Sandbox first appeared in Latte 2.8.0. The issue is fixed in the versions 2.8.8, 2.9.6 and 2.10.8. ### References The issues were discovered by - JinYiTong (https://github.com/JinYiTong) - 赵钰迪 <2021201...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'latte/latte'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.10.0'}, {'fixed': '2.10.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'latte/latte'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.6'}]}]}, {'pac...
[{'type': 'WEB', 'url': 'https://github.com/nette/latte/security/advisories/GHSA-36m2-8rhx-f36j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21648'}, {'type': 'WEB', 'url': 'https://github.com/nette/latte/commit/9e1b4f7d70f7a9c3fa6753ffa7d7e450a3d4abb0'}, {'type': 'PACKAGE', 'url': 'https:/...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T19:42:15Z', 'nvd_published_at': '2022-01-04T20:15:00Z'}
1.4.0
GHSA-f6f2-3w33-54r9
2022-01-07T16:14:05Z
2022-01-06T22:02:36Z
null
['CVE-2021-45714']
Use After Free in rusqlite
An issue was discovered in the rusqlite crate 0.25.x before 0.25.4 and 0.26.x before 0.26.2 for Rust. create_aggregate_function has a use-after-free.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'rusqlite'}, 'ecosystem_specific': {'affected_functions': ['rusqlite::Connection::create_aggregate_function']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.25.0'}, {'fixed': '0.25.4'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'rusqlite'}, 'ecos...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45714'}, {'type': 'WEB', 'url': 'https://github.com/rusqlite/rusqlite/issues/1048'}, {'type': 'PACKAGE', 'url': 'https://github.com/rusqlite/rusqlite'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/rusql...
{'cwe_ids': ['CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T21:07:30Z', 'nvd_published_at': '2021-12-26T22:15:00Z'}
1.4.0
GHSA-6v39-p2xq-g5c3
2022-02-02T16:16:05Z
2022-01-28T22:13:44Z
null
['CVE-2022-23944']
Missing authentication in ShenYu
User can access /plugin api without authentication. This issue affected Apache ShenYu 2.4.0 and 2.4.1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.shenyu:shenyu-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23944'}, {'type': 'WEB', 'url': 'https://github.com/apache/incubator-shenyu/pull/2462'}, {'type': 'WEB', 'url': 'https://github.com/apache/shenyu/pull/2462/commits/50e4b5e626ad94b415e26ef4fbe584bd51fd1b77'}, {'type': 'PACKAGE', 'url': 'https://gith...
{'cwe_ids': ['CWE-306', 'CWE-862'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-26T22:41:59Z', 'nvd_published_at': '2022-01-25T13:15:00Z'}
1.4.0
GHSA-q674-xm3x-2926
2022-01-07T16:08:29Z
2022-01-06T21:37:02Z
null
['CVE-2021-23490']
Uncontrolled Resource Consumption in parse-link-header
The package parse-link-header before 2.0.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the checkHeader function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'parse-link-header'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23490'}, {'type': 'WEB', 'url': 'https://github.com/thlorenz/parse-link-header/commit/72f05c717b3f129c5331a07bf300ed8886eb8ae1'}, {'type': 'PACKAGE', 'url': 'https://github.com/thlorenz/parse-link-header'}, {'type': 'WEB', 'url': 'https://snyk.io/v...
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T20:18:47Z', 'nvd_published_at': '2021-12-24T20:15:00Z'}
1.4.0
GHSA-44m4-9cjp-j587
2022-01-19T16:14:58Z
2022-01-21T23:24:14Z
null
[]
IBX-1392: Image filenames sanitization
ezsystems/ezpublish-kernel versions 7.5.* before 7.5.26 are vulnerable to certain injection attacks and unauthorized access to some image files.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezpublish-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.5.0'}, {'fixed': '7.5.26'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ezsystems/ezpublish-kernel/security/advisories/GHSA-44m4-9cjp-j587'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-001-image-filenames-sanitization'}, {'type': 'PACKAGE', 'url': 'https://github.com/ezsystems/ezpublish-kernel/'}, {'type...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T16:14:58Z', 'nvd_published_at': None}
1.4.0
GHSA-qc9x-gjcv-465w
2022-03-30T16:44:16Z
2022-01-12T22:29:41Z
null
['CVE-2022-21668']
Pipenv's requirements.txt parsing allows malicious index url in comments
## Issue Summary Due to a flaw in pipenv's parsing of requirements files, an attacker can insert a specially crafted string inside a comment anywhere within a requirements.txt file, which will cause victims who use pipenv to install the requirements file (e.g. with "`pipenv install -r requirements.txt`") to download de...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pipenv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2018.10.9'}, {'fixed': '2022.1.8'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pypa/pipenv/security/advisories/GHSA-qc9x-gjcv-465w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21668'}, {'type': 'WEB', 'url': 'https://github.com/pypa/pipenv/commit/439782a8ae36c4762c88e43d5f0d8e563371b46f'}, {'type': 'PACKAGE', 'url': 'https:/...
{'cwe_ids': ['CWE-20', 'CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-10T21:52:02Z', 'nvd_published_at': '2022-01-10T21:15:00Z'}
1.4.0
GHSA-xc47-3rch-cv57
2022-01-26T20:23:15Z
2022-01-26T20:24:23Z
null
['CVE-2022-0178']
Improper Access Control in snipe-it
Users with no system permissions are able to see and create personal access tokens
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.3.7'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0178'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/0e5ef53c352754de2778ffa20c85da15fd6f7ae0'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/512dbfee7acfcafa1524c8b2fb4cc4ef96958d0b'}, {'type': 'PACKAGE', 'u...
{'cwe_ids': ['CWE-284', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-24T22:48:49Z', 'nvd_published_at': '2022-01-13T23:15:00Z'}
1.4.0
GHSA-883x-6fch-6wjx
2022-01-18T22:55:47Z
2022-01-21T23:39:19Z
null
[]
Trust Boundary Violation due to Incomplete Blacklist in Test Failure Processing in Ares
### Impact This allows an attacker to create special subclasses of `InvocationTargetException` that escape the exception sanitization because JUnit extracts the cause in a trusted context before the exception reaches Ares. This means that arbitrary student code can be executed in a trusted context, and that in turn all...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'de.tum.in.ase:artemis-java-test-sandbox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ls1intum/Ares/security/advisories/GHSA-883x-6fch-6wjx'}, {'type': 'WEB', 'url': 'https://github.com/ls1intum/Ares/issues/15#issuecomment-996449371'}, {'type': 'WEB', 'url': 'https://github.com/ls1intum/Ares/commit/af4f28a56e2fe600d8750b3b415352a0a3217392'}, {'type': 'PACKAGE'...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-18T22:55:47Z', 'nvd_published_at': None}
1.4.0
GHSA-59j4-wjwp-mw9m
2022-04-01T20:22:44Z
2022-01-06T20:32:36Z
null
['CVE-2020-13936']
Sandbox Bypass in Apache Velocity Engine
An attacker that is able to modify Velocity templates may execute arbitrary Java code or run arbitrary system commands with the same privileges as the account running the Servlet container. This applies to applications that allow untrusted users to upload/modify velocity templates running Apache Velocity Engine version...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.velocity:velocity-engine-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.velocity:velocity'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13936'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/velocity-engine'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r01043f584cbd47959fabe18fff64de940f81a65024bb8dddbda31d9a%40%3Cuser.velocity.apache.org%3E'}, {'type': 'W...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-17T00:56:56Z', 'nvd_published_at': '2021-03-10T08:15:00Z'}
1.4.0
GHSA-p5hj-xxfr-pwc3
2022-01-27T18:32:42Z
2022-01-21T18:02:39Z
null
['CVE-2022-0282']
Code Injection in microweber
Code Injection in Packagist microweber/microweber prior to 1.2.11.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0282'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/51b5a4e3ef01e587797c0109159a8ad9d2bac77a'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8...
{'cwe_ids': ['CWE-79', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-21T16:58:03Z', 'nvd_published_at': '2022-01-20T12:15:00Z'}
1.4.0
GHSA-5q7q-qqw2-hjq7
2022-08-11T18:44:32Z
2022-01-06T18:32:24Z
null
['CVE-2021-43853']
AjaxNetProfessional deserializes arbitrary JavaScript objects
### Overview Affected versions of this package are vulnerable to Deserialization of Untrusted Data due to the possibility of deserialization of arbitrary JavaScript objects. ### Description Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and t...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'AjaxNetProfessional'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '21.12.22.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/michaelschwarz/Ajax.NET-Professional/security/advisories/GHSA-5q7q-qqw2-hjq7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43853'}, {'type': 'WEB', 'url': 'https://github.com/michaelschwarz/Ajax.NET-Professional/commit/c89e39b9679fcb8ab6644fe21cc7e...
{'cwe_ids': ['CWE-502', 'CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-04T21:21:17Z', 'nvd_published_at': '2021-12-22T21:15:00Z'}
1.4.0
GHSA-8cw5-rv98-5c46
2022-01-06T19:00:47Z
2022-01-06T22:30:06Z
null
['CVE-2019-6339']
Arbitrary PHP code execution in Drupal
In Drupal Core versions 7.x prior to 7.62, 8.6.x prior to 8.6.6, and 8.5.x prior to 8.5.9; A remote code execution vulnerability exists in PHP's built-in phar stream wrapper when performing file operations on an untrusted phar:// URI. Some Drupal code (core, contrib, and custom) may be performing file operations on ins...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'drupal/drupal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.62.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'drupal/drupal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.5.9'}]}]}, {'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-6339'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/drupal/drupal/CVE-2019-6339.yaml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/02/msg00004.html'}, {'type': 'WEB', 'url':...
{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T19:00:47Z', 'nvd_published_at': None}
1.4.0
GHSA-c6fg-99pr-25m9
2022-01-06T19:47:00Z
2022-01-06T23:53:58Z
null
[]
Uncapped length of skin data fields submitted by players
### Impact Some skin data fields (e.g. skinID, geometryName) are not capped in length. These fields are typically saved in the NBT data of a player when the player quits the server, or during an autosave. This is problematic due to the 32767 byte limit on `TAG_String`s. If any of these fields exceeds 32767 bytes, an e...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pocketmine/pocketmine-mp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.26.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'pocketmine/pocketmine-mp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed'...
[{'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-c6fg-99pr-25m9'}, {'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/commit/6492cac5c10f9fa8443ceddd2191a7b65b73f601'}, {'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/commit/958a9dbf0fe3131ab60319c5a939f5df...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T19:47:00Z', 'nvd_published_at': None}
1.4.0
GHSA-wg6g-ppvx-927h
2022-01-27T14:26:40Z
2022-01-27T14:27:53Z
null
['CVE-2021-23518']
Prototype Pollution in cached-path-relative
The package cached-path-relative before 1.1.0 is vulnerable to Prototype Pollution via the cache variable that is set as {} instead of Object.create(null) in the cachedPathRelative function, which allows access to the parent prototype properties when the object is used to create the cached relative path. When using the...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'cached-path-relative'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23518'}, {'type': 'WEB', 'url': 'https://github.com/ashaffer/cached-path-relative/commit/40c73bf70c58add5aec7d11e4f36b93d144bb760'}, {'type': 'PACKAGE', 'url': 'https://github.com/ashaffer/cached-path-relative'}, {'type': 'WEB', 'url': 'https://lis...
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-24T23:03:02Z', 'nvd_published_at': '2022-01-21T20:15:00Z'}
1.4.0
GHSA-68vr-8f46-vc9f
2022-01-19T19:41:55Z
2022-01-21T23:20:14Z
null
['CVE-2022-21696']
Username spoofing in OnionShare
Between September 26, 2021 and October 8, 2021, [Radically Open Security](https://www.radicallyopensecurity.com/) conducted a penetration test of OnionShare 2.4, funded by the Open Technology Fund's [Red Team lab](https://www.opentech.fund/labs/red-team-lab/). This is an issue from that penetration test. - Vulnerabili...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'onionshare-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3'}, {'fixed': '2.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/onionshare/onionshare/security/advisories/GHSA-68vr-8f46-vc9f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21696'}, {'type': 'PACKAGE', 'url': 'https://github.com/onionshare/onionshare'}, {'type': 'WEB', 'url': 'https://github.com/onionshare/onion...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T19:41:55Z', 'nvd_published_at': '2022-01-18T20:15:00Z'}
1.4.0
GHSA-9328-7pcw-vw69
2022-01-04T16:32:38Z
2022-01-06T18:34:53Z
null
['CVE-2020-1692']
Cross-Site Request Forgery in Moodle
Moodle before version 3.7.2 is vulnerable to information exposure of service tokens for users enrolled in the same course.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.7.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1692'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1692'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-04T16:32:38Z', 'nvd_published_at': '2020-02-17T16:15:00Z'}
1.4.0
GHSA-xvvv-wj7j-r9jm
2023-09-13T12:58:16Z
2022-01-06T22:04:19Z
null
['CVE-2021-45895']
Cross-site Scripting in Netgen Tags Bundle
Netgen Tags Bundle 3.4.x before 3.4.11 and 4.0.x before 4.0.15 allows XSS in the Tags Admin interface.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'netgen/tagsbundle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.4.0'}, {'fixed': '3.4.11'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'netgen/tagsbundle'}, 'ecosystem_specific': {'affected_fu...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45895'}, {'type': 'PACKAGE', 'url': 'https://github.com/netgen/TagsBundle'}, {'type': 'WEB', 'url': 'https://github.com/netgen/TagsBundle/releases/tag/3.4.11'}, {'type': 'WEB', 'url': 'https://github.com/netgen/TagsBundle/releases/tag/4.0.15'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T21:32:08Z', 'nvd_published_at': '2021-12-27T21:15:00Z'}
1.4.0
GHSA-hr52-f9vp-582c
2022-01-07T16:30:51Z
2022-01-06T22:12:28Z
null
['CVE-2021-45692']
Use of Uninitialized Resource in messagepack-rs.
An issue was discovered in the messagepack-rs crate through 2021-01-26 for Rust. deserialize_extension_others may read from uninitialized memory locations.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'messagepack-rs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.8.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45692'}, {'type': 'WEB', 'url': 'https://github.com/otake84/messagepack-rs/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/otake84/messagepack-rs'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crate...
{'cwe_ids': ['CWE-908'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T14:36:43Z', 'nvd_published_at': '2021-12-27T00:15:00Z'}
1.4.0
GHSA-6m93-343m-3jrc
2022-01-25T20:48:30Z
2022-01-21T23:29:48Z
null
['CVE-2021-45394']
Cross-site Scripting in HTML2PDF
An issue was discovered in Spipu HTML2PDF before 5.2.4. Attackers can trigger deserialization of arbitrary data via the injection of a malicious <link> tag in the converted HTML document.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'spipu/html2pdf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45394'}, {'type': 'WEB', 'url': 'https://github.com/spipu/html2pdf/commit/100a4d509abf8550765cf0e0da83e83abb422585'}, {'type': 'WEB', 'url': 'https://github.com/spipu/html2pdf/commit/2e6bab9a2afe9cfd4d3c3038da64d8ad74e41d7f'}, {'type': 'PACKAGE', '...
{'cwe_ids': ['CWE-79', 'CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T22:40:38Z', 'nvd_published_at': '2022-01-18T12:15:00Z'}
1.4.0
GHSA-fc7x-2cmc-8j2g
2023-06-13T20:41:36Z
2022-01-06T22:10:26Z
null
['CVE-2021-45696']
Incorrect hash in sha2
The v0.9.7 release of the sha2 crate introduced a new AVX2-accelerated backend which was automatically enabled for all x86/x86_64 CPUs where AVX2 support was autodetected at runtime. This backend was buggy and would miscompute results for long messages (i.e. messages spanning multiple SHA blocks). The crate has since...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'sha2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.7'}, {'fixed': '0.9.8'}]}], 'versions': ['0.9.7']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45696'}, {'type': 'WEB', 'url': 'https://github.com/RustCrypto/hashes/pull/314'}, {'type': 'PACKAGE', 'url': 'https://github.com/RustCrypto/hashes'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/sha2/RUS...
{'cwe_ids': ['CWE-327'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T14:26:28Z', 'nvd_published_at': '2021-12-27T00:15:00Z'}
1.4.0
GHSA-w6jr-wj64-mc9x
2022-01-06T19:32:43Z
2022-01-06T22:52:41Z
null
['CVE-2022-21647']
Deserialization of Untrusted Data in Codeigniter4
### Impact Deserialization of Untrusted Data was found in the `old()` function in CodeIgniter4. Remote attackers may inject auto-loadable arbitrary objects with this vulnerability, and possibly execute existing PHP code on the server. We are aware of a working exploit, which can lead to SQL injection. ### Patches Upg...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'codeigniter4/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/codeigniter4/CodeIgniter4/security/advisories/GHSA-w6jr-wj64-mc9x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21647'}, {'type': 'WEB', 'url': 'https://github.com/codeigniter4/CodeIgniter4/commit/ce95ed5765256e2f09f3513e7d42790e0d6948f5'}, {'type'...
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T19:32:43Z', 'nvd_published_at': '2022-01-04T20:15:00Z'}
1.4.0
GHSA-2vj5-px25-gjrp
2022-01-06T21:28:12Z
2022-01-06T23:58:59Z
null
['CVE-2021-4118']
pytorch-lightning is vulnerable to Deserialization of Untrusted Data
pytorch-lightning is vulnerable to Deserialization of Untrusted Data.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pytorch-lightning'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4118'}, {'type': 'WEB', 'url': 'https://github.com/PyTorchLightning/pytorch-lightning/issues/11045'}, {'type': 'WEB', 'url': 'https://github.com/PyTorchLightning/pytorch-lightning/pull/11099'}, {'type': 'WEB', 'url': 'https://github.com/pytorchligh...
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T17:49:21Z', 'nvd_published_at': '2021-12-23T18:15:00Z'}
1.4.0
GHSA-4h9c-v5vg-5m6m
2022-01-20T15:33:55Z
2022-01-12T22:43:42Z
null
['CVE-2021-21408']
Access to restricted PHP code by dynamic static class access in smarty
### Impact Template authors could run restricted static php methods. ### Patches Please upgrade to 3.1.40 or higher. ### References See the [documentation on Smarty security features](https://www.smarty.net/docs/en/advanced.features.tpl#advanced.features.security) on the static_classes access filter. ### For more in...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'smarty/smarty'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.43'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'smarty/smarty'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/smarty-php/smarty/security/advisories/GHSA-4h9c-v5vg-5m6m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21408'}, {'type': 'WEB', 'url': 'https://github.com/smarty-php/smarty/commit/19ae410bf56007a5ef24441cdc6414619cfaf664'}, {'type': 'PACKAGE', 'ur...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-10T22:09:37Z', 'nvd_published_at': '2022-01-10T20:15:00Z'}
1.4.0
GHSA-w4hp-pcp8-qhf3
2022-02-03T20:16:38Z
2022-01-28T23:06:32Z
null
['CVE-2022-0387']
Cross-site Scripting in livehelperchat
Stored XSS is found in Settings>Live help configuration>Departments->Departments groups->edit When a user creates a new webhook under the NAME field and puts a payload {{constructor.constructor('alert(1)')()}}, the input gets stored, at user edit groupname , the payload gets executed.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.93'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0387'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/ff70c7dd641b68b9afb170b89ec1ef003a4e3444'}, {'type': 'PACKAGE', 'url': 'https://github.com/livehelperchat/livehelperchat'}, {'type': 'WEB', 'url': 'https://hunt...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-28T20:26:07Z', 'nvd_published_at': '2022-01-27T06:15:00Z'}
1.4.0
GHSA-x76r-966h-5qv9
2022-01-07T16:19:25Z
2022-01-06T22:15:56Z
null
['CVE-2021-45680']
Out-of-bounds Write in vec-const
An issue was discovered in the vec-const crate before 2.0.0 for Rust. It tries to construct a Vec from a pointer to a const slice, leading to memory corruption.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'vec-const'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45680'}, {'type': 'WEB', 'url': 'https://github.com/Eolu/vec-const/issues/1#issuecomment-898908241'}, {'type': 'PACKAGE', 'url': 'https://github.com/Eolu/vec-const/'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/ma...
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T18:17:26Z', 'nvd_published_at': '2021-12-27T00:15:00Z'}
1.4.0
GHSA-rrrm-qjm4-v8hf
2022-01-14T19:56:20Z
2022-01-14T21:04:41Z
null
['CVE-2022-21680']
Inefficient Regular Expression Complexity in marked
### Impact _What kind of vulnerability is it?_ Denial of service. The regular expression `block.def` may cause catastrophic backtracking against some strings. PoC is the following. ```javascript import * as marked from "marked"; marked.parse(`[x]:${' '.repeat(1500)}x ${' '.repeat(1500)} x`); ``` _Who is impacted?...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'marked'}, 'ecosystem_specific': {'affected_functions': ['marked.parse']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.10'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/markedjs/marked/security/advisories/GHSA-rrrm-qjm4-v8hf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21680'}, {'type': 'WEB', 'url': 'https://github.com/markedjs/marked/commit/c4a3ccd344b6929afa8a1d50ac54a721e57012c0'}, {'type': 'PACKAGE', 'url': ...
{'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-14T19:56:20Z', 'nvd_published_at': '2022-01-14T17:15:00Z'}
1.4.0
GHSA-w4cc-pc2h-whcj
2022-01-07T16:17:28Z
2022-01-06T22:16:10Z
null
['CVE-2021-45681']
Out-of-bounds Write in derive-com-impl
An issue was discovered in the derive-com-impl crate before 0.1.2 for Rust. An invalid reference (and memory corruption) can occur because AddRef might not be called before returning a pointer.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'derive-com-impl'}, 'ecosystem_specific': {'affected_functions': ['derive_com_impl::derive_com_impl']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 0.1.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45681'}, {'type': 'WEB', 'url': 'https://github.com/Connicpu/com-impl/issues/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/connicpu/com-impl'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/derive-c...
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T17:46:38Z', 'nvd_published_at': '2021-12-27T00:15:00Z'}
1.4.0
GHSA-9236-8w7q-rmrv
2022-01-05T20:41:25Z
2022-01-06T21:59:50Z
null
['CVE-2021-4162']
archivy is vulnerable to Cross-Site Request Forgery (CSRF)
archivy is vulnerable to Cross-Site Request Forgery (CSRF). There is [a fix](https://github.com/archivy/archivy/commit/796c3ae318eea183fc88c87ec5a27355b0f6a99d) available in the master branch.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'archivy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4162'}, {'type': 'WEB', 'url': 'https://github.com/archivy/archivy/commit/796c3ae318eea183fc88c87ec5a27355b0f6a99d'}, {'type': 'PACKAGE', 'url': 'https://github.com/archivy/archivy/'}, {'type': 'WEB', 'url': 'https://github.com/archivy/archivy/rele...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T20:41:25Z', 'nvd_published_at': '2021-12-25T12:15:00Z'}
1.4.0
GHSA-96v6-hrwg-p378
2022-01-24T22:07:06Z
2022-01-08T00:31:51Z
null
['CVE-2022-22110']
Weak Password Requirements in Daybyday CRM
In Daybyday CRM, versions 1.1 through 2.2.0 enforce weak password requirements in the user update functionality. A user with privileges to update his password could change it to a weak password, such as those with a length of a single character. This may allow an attacker to brute-force users’ passwords with minimal to...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'bottelet/flarepoint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1'}, {'fixed': '2.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22110'}, {'type': 'WEB', 'url': 'https://github.com/Bottelet/DaybydayCRM/commit/a0392f4a4a14e1e3fedaf6817aefce69b6bd661b'}, {'type': 'PACKAGE', 'url': 'https://github.com/Bottelet/DaybydayCRM/'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftw...
{'cwe_ids': ['CWE-521'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T19:46:24Z', 'nvd_published_at': '2022-01-05T15:15:00Z'}
1.4.0
GHSA-xwqr-xmgg-j69q
2023-04-26T22:14:09Z
2022-01-28T22:59:28Z
null
['CVE-2021-46102']
Integer overflow in solana_rbpf
From version 0.2.14 to 0.2.16 for Solana rBPF, function "relocate" in the file src/elf.rs has an integer overflow bug because the sym.st_value is read directly from ELF file without checking. If the sym.st_value is rather large, an integer overflow is triggered while calculating the variable "addr" via `addr = (sym.st_...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'solana_rbpf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.14'}, {'fixed': '0.2.17'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46102'}, {'type': 'WEB', 'url': 'https://github.com/solana-labs/rbpf/pull/200'}, {'type': 'WEB', 'url': 'https://github.com/solana-labs/rbpf/pull/236'}, {'type': 'WEB', 'url': 'https://blocksecteam.medium.com/new-integer-overflow-bug-discovered-in-...
{'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-28T19:06:48Z', 'nvd_published_at': '2022-01-27T18:15:00Z'}
1.4.0
GHSA-r3rr-wph6-9638
2022-11-29T21:26:23Z
2022-01-13T00:00:53Z
null
['CVE-2022-23114']
Password stored in plain text by Jenkins Publish Over SSH Plugin
Jenkins Publish Over SSH Plugin 1.22 and earlier stores password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:publish-over-ssh'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.23'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23114'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/publish-over-ssh-plugin'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/publish-over-ssh-plugin/releases/tag/publish-over-ssh-1.23'}, {'type': 'WEB', 'url': 'https://www.jenk...
{'cwe_ids': ['CWE-522'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T21:26:23Z', 'nvd_published_at': '2022-01-12T20:15:00Z'}
1.4.0
GHSA-c6rp-xvqv-mwmf
2023-09-12T21:00:42Z
2022-01-21T23:52:17Z
null
['CVE-2021-33040']
Cross-site Scripting in epubjs
managers/views/iframe.js in FuturePress EPub.js before 0.3.89 allows XSS.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'epubjs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.89'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33040'}, {'type': 'WEB', 'url': 'https://github.com/futurepress/epub.js/commit/ab4dd46408cce0324e1c67de4a3ba96b59e5012e'}, {'type': 'PACKAGE', 'url': 'https://github.com/futurepress/epub.js'}, {'type': 'WEB', 'url': 'https://github.com/futurepress/...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T14:07:11Z', 'nvd_published_at': '2022-01-17T17:15:00Z'}
1.4.0
GHSA-xhw6-hjc9-679m
2023-09-26T17:27:45Z
2022-01-08T00:36:05Z
null
['CVE-2021-44878']
Pac4j token validation bypass if OpenID Connect provider supports none algorithm
If an OpenID Connect provider supports the “none” algorithm (i.e., tokens with no signature), pac4j v5.3.0 (and prior) does not refuse it without an explicit configuration on its side or for the “idtoken” response type which is not secure and violates the OpenID Core Specification. The "none" algorithm does not require...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.pac4j:pac4j-oidc'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.pac4j:pac4j-oidc'}, 'ecosystem_specific': {'affected_functions...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44878'}, {'type': 'WEB', 'url': 'https://github.com/pac4j/pac4j/commit/09684e0de1c4753d22c53b8135d4ef61cfda76f7'}, {'type': 'WEB', 'url': 'https://github.com/pac4j/pac4j/commit/22b82ffd702a132d9f09da60362fc6264fc281ae'}, {'type': 'WEB', 'url': 'htt...
{'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T22:41:34Z', 'nvd_published_at': '2022-01-06T13:15:00Z'}
1.4.0
GHSA-m8rp-q82r-c5mf
2022-01-27T18:31:46Z
2022-01-21T18:06:49Z
null
['CVE-2022-0278']
Cross-site Scripting in microweber
Cross-site Scripting (XSS) - Stored in Packagist microweber/microweber prior to 1.2.11.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0278'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/b64ef574b82dbf89a908e1569d790c7012d1ccd7'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/6...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-21T17:01:34Z', 'nvd_published_at': '2022-01-20T10:15:00Z'}
1.4.0
GHSA-w4jv-6rg4-pr4m
2023-05-24T17:27:23Z
2022-01-13T00:01:00Z
null
['CVE-2022-20619']
Cross-Site Request Forgery in Jenkins Bitbucket Branch Source Plugin
Jenkins Bitbucket Branch Source Plugin prior to 746.v350d2781c184, 725.vd9f8be0fa250, 2.9.11.2, and 2.9.7.2 does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability. This allows attackers with Overall/Read access to connect to an attacker-specified URL using a...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:cloudbees-bitbucket-branch-source'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '726.v7e6f53de133c'}, {'fixed': '746.v350d2781c184'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:cloudbees-bitbucket-branch-sour...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-20619'}, {'type': 'WEB', 'url': 'https://github.com/CVEProject/cvelist/blob/2d78eb36f4d084db7fb35f1535d8d84fdcb7d859/2022/20xxx/CVE-2022-20619.json'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/bitbucket-branch-source-plugin'}, {'type...
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:49:06Z', 'nvd_published_at': '2022-01-12T20:15:00Z'}
1.4.0
GHSA-vc89-hccf-rq55
2022-01-06T20:19:30Z
2022-01-06T23:48:35Z
null
['CVE-2022-21653']
Hash collision in typelevel jawn
### Impact Extenders of the `org.typelevel.jawn.SimpleFacade` and `org.typelevel.jawn.MutableFacade` who don't override `objectContext()` are vulnerable to a hash collision attack. Most applications do not implement these traits directly, but inherit from a library: Affected implementations include: * `org.http4s` :...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.typelevel:jawn-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/typelevel/jawn/security/advisories/GHSA-vc89-hccf-rq55'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21653'}, {'type': 'WEB', 'url': 'https://github.com/typelevel/jawn/pull/390'}, {'type': 'PACKAGE', 'url': 'https://github.com/typelevel/jawn'}]
{'cwe_ids': ['CWE-326', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T20:19:30Z', 'nvd_published_at': '2022-01-05T21:15:00Z'}
1.4.0
GHSA-7vvq-7r29-5vg3
2022-01-28T18:32:38Z
2022-01-27T16:00:48Z
2022-01-28T18:32:01Z
['CVE-2022-0177']
Cross site scripting in three.js
# CVE has been withdrawn Versions of three.js prior to 0.137.0 load untrusted iframes and allow for attackers to inject arbitrary javascript into a users browser.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'three'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.137.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0177'}, {'type': 'WEB', 'url': 'https://github.com/mrdoob/three.js/pull/23245'}, {'type': 'WEB', 'url': 'https://github.com/mrdoob/three.js/commit/0c31bc605e21965aad8a6479bb1969351773f76d'}, {'type': 'PACKAGE', 'url': 'https://github.com/mrdoob/thr...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-25T21:13:47Z', 'nvd_published_at': '2022-01-24T21:15:00Z'}
1.4.0
GHSA-gf8q-jrpm-jvxq
2022-01-07T22:20:43Z
2022-01-08T00:22:02Z
null
[]
URL parsing in node-forge could lead to undesired behavior.
### Impact The regex used for the `forge.util.parseUrl` API would not properly parse certain inputs resulting in a parsed data structure that could lead to undesired behavior. ### Patches `forge.util.parseUrl` and other very old related URL APIs were removed in 1.0.0 in favor of letting applications use the more moder...
[]
[{'package': {'ecosystem': 'npm', 'name': 'node-forge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/digitalbazaar/forge/security/advisories/GHSA-gf8q-jrpm-jvxq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0122'}, {'type': 'PACKAGE', 'url': 'https://github.com/digitalbazaar/forge/'}, {'type': 'WEB', 'url': 'https://www.huntr.dev/bounties/41852c50...
{'cwe_ids': ['CWE-601'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T22:20:43Z', 'nvd_published_at': None}
1.4.0
GHSA-pccr-q7v9-5f27
2022-08-11T18:41:45Z
2022-01-06T21:32:35Z
null
['CVE-2021-44548']
Apache Solr Improper Input Validation and Path Traversal
An Improper Input Validation vulnerability in DataImportHandler of Apache Solr allows an attacker to provide a Windows UNC path resulting in an SMB network call being made from the Solr host to another host on the network. If the attacker has wider access to the network, this may lead to SMB attacks, which may result i...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.11.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44548'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/solr'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220114-0005/'}, {'type': 'WEB', 'url': 'https://solr.apache.org/security.html#cve-2021-44548-apache-solr-info...
{'cwe_ids': ['CWE-20', 'CWE-22', 'CWE-40'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T17:54:06Z', 'nvd_published_at': '2021-12-23T09:15:00Z'}
1.4.0
GHSA-xrcv-f9gm-v42c
2022-02-17T23:26:14Z
2022-01-12T20:07:41Z
null
['CVE-2022-22816']
Out-of-bounds Read in Pillow
path_getbbox in path.c in Pillow before 9.0.0 has a buffer over-read during initialization of ImagePath.Path.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['PIL.ImagePath.Path']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22816'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/5920'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/5543e4e2d409cd9e409bc64cdc77be0af007a31f'}, {'type': 'PACKAGE', 'url': 'https://github.com/...
{'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-11T18:02:58Z', 'nvd_published_at': '2022-01-10T14:12:00Z'}
1.4.0
GHSA-mpp5-2x55-49xw
2021-05-25T19:52:21Z
2022-01-06T19:45:13Z
null
['CVE-2020-11887']
XSS in svg2png (NPM package)
svg2png 4.1.1 allows XSS with resultant SSRF via JavaScript inside an SVG document.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'svg2png'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11887'}, {'type': 'WEB', 'url': 'https://github.com/domenic/svg2png/issues/117'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T19:52:21Z', 'nvd_published_at': '2020-04-17T21:15:00Z'}
1.4.0
GHSA-8m28-w6xg-35hw
2022-01-24T22:54:21Z
2022-01-26T20:22:08Z
null
['CVE-2022-0231']
Cross-Site Request Forgery (CSRF) in livehelperchat
livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.92'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0231'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/6ad1349dc5e7503b00c5017499a0a895d7654a61'}, {'type': 'PACKAGE', 'url': 'https://github.com/livehelperchat/livehelperchat'}, {'type': 'WEB', 'url': 'https://hunt...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-24T22:54:21Z', 'nvd_published_at': '2022-01-14T12:15:00Z'}
1.4.0
GHSA-6r92-cgxc-r5fg
2022-01-24T22:05:31Z
2022-01-21T23:35:35Z
null
[]
Denial of service in CBOR library
### Impact Due to this library's use of an inefficient algorithm, it is vulnerable to a denial of service attack when a maliciously crafted input is passed to `DecodeFromBytes` or other CBOR decoding mechanisms in this library. Affected versions _include_ versions 4.0.0 through 4.5.0. This vulnerability was privately...
[]
[{'package': {'ecosystem': 'NuGet', 'name': 'PeterO.Cbor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.5.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/peteroupc/CBOR/security/advisories/GHSA-6r92-cgxc-r5fg'}, {'type': 'WEB', 'url': 'https://github.com/peteroupc/CBOR/commit/b4117dbbb4cd5a4a963f9d0c9aa132f033e15b95'}, {'type': 'PACKAGE', 'url': 'https://github.com/peteroupc/CBOR'}, {'type': 'WEB', 'url': 'https://github.com/p...
{'cwe_ids': ['CWE-407'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-18T22:57:46Z', 'nvd_published_at': None}
1.4.0
GHSA-59qh-g7m4-j9m9
2022-02-02T16:05:01Z
2022-01-28T23:06:12Z
null
['CVE-2022-0374']
Cross-site Scripting in livehelperchat
Stored XSS attacks exist in new the form creation flow. New forms can be given a title which will render javascript.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.93'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0374'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/bbfaa26ce54a2a86ce1a42a16496038f5bdfc102'}, {'type': 'PACKAGE', 'url': 'https://github.com/livehelperchat/livehelperchat/'}, {'type': 'WEB', 'url': 'https://hun...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-27T23:20:12Z', 'nvd_published_at': '2022-01-26T10:15:00Z'}
1.4.0
GHSA-m7vp-hqwv-7m5x
2022-01-11T16:45:39Z
2022-01-12T22:33:04Z
null
[]
Unbounded memory usage on exposed HTTP/2 (non-gRPC) endpoints
### Impact The net/http Go package has a reported vulnerability tracked under CVE-2021-44716 which allows attacker controlled HTTP/2 requests to trigger unbounded memory usage in HTTP/2 endpoints. gRPC endpoints are not vulnerable as they rely on their own HTTP/2 implementation instead of the net/http package. HTTP/2 e...
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/spiffe/spire'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/spiffe/spire'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/spiffe/spire/security/advisories/GHSA-m7vp-hqwv-7m5x'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-10T22:07:35Z', 'nvd_published_at': None}
1.4.0
GHSA-7w54-gp8x-f33m
2023-07-24T19:32:58Z
2022-01-12T22:44:47Z
null
['CVE-2022-21671']
Potential exposure of tokens to an Unauthorized Actor
### Impact When using this library as a way to programmatically communicate with Replit in a standalone fashion, if there are multiple failed attempts to contact Replit through a WebSocket, the library will attempt to communicate using a fallback poll-based proxy. The URL of the proxy has changed, so any communication...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@replit/crosis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.3.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/replit/crosis/security/advisories/GHSA-7w54-gp8x-f33m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21671'}, {'type': 'WEB', 'url': 'https://github.com/replit/crosis/commit/e44b6a8f5fa28cb2872e3c19bb8a205bb5bfc281'}, {'type': 'PACKAGE', 'url': 'htt...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-10T23:18:10Z', 'nvd_published_at': '2022-01-11T15:15:00Z'}