schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 8 154 | details stringlengths 31 19.1k | severity stringlengths 2 92 | affected stringlengths 75 28.5k | references stringlengths 79 7.48k | database_specific stringlengths 131 196 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-g644-pr5v-vppf | 2023-09-12T15:04:25Z | 2022-01-06T20:41:02Z | null | ['CVE-2020-9486'] | Insertion of Sensitive Information into Log File in Apache NiFi Stateless | In Apache NiFi 1.10.0 to 1.11.4, the NiFi stateless execution engine produced log output which included sensitive property values. When a flow was triggered, the flow definition configuration JSON was printed, potentially containing sensitive values in plaintext. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi-stateless'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed': '1.12.0-RC1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.11.4'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-9486'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi/commit/148537d64a017b73160b0d49943183c18f883ab0'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/nifi'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security#CVE-2020-9486'}... | {'cwe_ids': ['CWE-532'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T16:28:50Z', 'nvd_published_at': '2020-10-01T20:15:00Z'} |
1.4.0 | GHSA-65fg-84f6-3jq3 | 2022-02-24T12:05:54Z | 2022-01-21T23:26:47Z | null | ['CVE-2022-23305'] | SQL Injection in Log4j 1.2.x | By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as a configuration parameter where the values to be inserted are converters from PatternLayout. The message converter, %m, is likely to always be included. This allows attackers to manipulate the SQL by entering crafted strings into input fields or hea... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'log4j:log4j'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.17'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23305'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/logging-log4j1'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/pt6lh3pbsvxqlwlp4c5l798dv2hkc85y'}, {'type': 'WEB', 'url': 'https://logging.apache.org/log4j/1.2/index.html'}, ... | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T22:31:49Z', 'nvd_published_at': '2022-01-18T16:15:00Z'} |
1.4.0 | GHSA-cjg2-2fjg-fph4 | 2022-01-14T19:58:51Z | 2022-01-14T21:03:36Z | null | ['CVE-2022-21685'] | Integer underflow in Frontier | ### Impact
A bug in Frontier's MODEXP precompile implementation can cause an integer underflow in certain conditions. This will cause a node crash for debug builds. For release builds (and production WebAssembly binaries), the impact is limited as it can only cause a normal EVM out-of-gas. It is recommended that you a... | [] | [{'package': {'ecosystem': 'crates.io', 'name': 'frontier'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/paritytech/frontier/security/advisories/GHSA-cjg2-2fjg-fph4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21685'}, {'type': 'WEB', 'url': 'https://github.com/paritytech/frontier/pull/549'}, {'type': 'WEB', 'url': 'https://github.com/paritytech/fron... | {'cwe_ids': ['CWE-191'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-14T19:58:51Z', 'nvd_published_at': '2022-01-14T17:15:00Z'} |
1.4.0 | GHSA-ghhm-xrwp-75m9 | 2022-01-07T22:38:34Z | 2022-01-08T00:34:12Z | null | ['CVE-2021-4194'] | bookstack is vulnerable to Improper Access Control | bookstack is vulnerable to Improper Access Control | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'ssddanbrown/bookstack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '21.12.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4194'}, {'type': 'WEB', 'url': 'https://github.com/bookstackapp/bookstack/commit/cb0d674a71449de883713db2fcdccb6e108992ad'}, {'type': 'PACKAGE', 'url': 'https://github.com/bookstackapp/bookstack'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties... | {'cwe_ids': ['CWE-284', 'CWE-668', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T22:38:34Z', 'nvd_published_at': '2022-01-06T18:15:00Z'} |
1.4.0 | GHSA-87xh-9q6h-r5cc | 2022-01-07T16:08:56Z | 2022-01-06T22:00:49Z | null | ['CVE-2021-45715'] | Use After Free in rusqlite | An issue was discovered in the rusqlite crate 0.25.x before 0.25.4 and 0.26.x before 0.26.2 for Rust. create_window_function has a use-after-free. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'rusqlite'}, 'ecosystem_specific': {'affected_functions': ['rusqlite::Connection::create_window_function']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.25.0'}, {'fixed': '0.25.4'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'rusqlite'}, 'ecosyst... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45715'}, {'type': 'WEB', 'url': 'https://github.com/rusqlite/rusqlite/issues/1048'}, {'type': 'PACKAGE', 'url': 'https://github.com/rusqlite/rusqlite'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/rusql... | {'cwe_ids': ['CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T21:10:30Z', 'nvd_published_at': '2021-12-26T22:15:00Z'} |
1.4.0 | GHSA-jrh2-hc4r-7jwx | 2022-02-14T22:18:43Z | 2022-01-12T19:21:04Z | null | ['CVE-2021-45452'] | Directory-traversal in Django | Storage.save in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1 allows directory traversal if crafted filenames are directly passed to it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.26'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.11'}]}]}, {'package': {'ecosystem':... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45452'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/4cb35b384ceef52123fc66411a73c36a706825e1'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/8d2f7cff76200cbd2337b2cf1707e383eb1fb54b'}, {'type': 'WEB', 'url': ... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-12T19:17:35Z', 'nvd_published_at': '2022-01-05T00:15:00Z'} |
1.4.0 | GHSA-x9r5-jxvq-4387 | 2022-08-11T19:20:18Z | 2022-01-06T22:48:56Z | null | ['CVE-2021-43862'] | jquery.terminal self XSS on user input | ### Impact
This is low impact and limited XSS, because code for XSS payload is always visible, but attacker can use other techniques to hide the code the victim sees.
Also if the application use execHash option and execute code from URL the attacker can use this URL to execute his code. The scope is limited because th... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'jquery.terminal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.31.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/jcubic/jquery.terminal/security/advisories/GHSA-x9r5-jxvq-4387'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43862'}, {'type': 'WEB', 'url': 'https://github.com/jcubic/jquery.terminal/issues/727'}, {'type': 'WEB', 'url': 'https://github.com/jcubic/... | {'cwe_ids': ['CWE-79', 'CWE-80'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T19:18:42Z', 'nvd_published_at': '2021-12-30T15:15:00Z'} |
1.4.0 | GHSA-q656-g2x3-8cgh | 2022-01-07T23:21:51Z | 2022-01-08T00:43:01Z | null | ['CVE-2021-31522'] | Kylin can receive user input and load any class through Class.forName(...). | Kylin can receive user input and load any class through Class.forName(...). This issue affects Apache Kylin 2 version 2.6.6 and prior versions; Apache Kylin 3 version 3.1.2 and prior versions; Apache Kylin 4 version 4.0.0 and prior versions. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.kylin:kylin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.kylin:kylin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.1'}]}]... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31522'}, {'type': 'WEB', 'url': 'https://github.com/apache/kylin/pull/1695'}, {'type': 'WEB', 'url': 'https://github.com/apache/kylin/pull/1763'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/kylin'}, {'type': 'WEB', 'url': 'https://lists.... | {'cwe_ids': ['CWE-470'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T23:21:51Z', 'nvd_published_at': '2022-01-06T13:15:00Z'} |
1.4.0 | GHSA-w9m4-7w72-r766 | 2022-01-19T19:04:59Z | 2022-01-21T23:20:22Z | null | ['CVE-2022-21691'] | Improper Access Control in Onionshare | Between September 26, 2021 and October 8, 2021, [Radically Open Security](https://www.radicallyopensecurity.com/) conducted a penetration test of OnionShare 2.4, funded by the Open Technology Fund's [Red Team lab](https://www.opentech.fund/labs/red-team-lab/). This is an issue from that penetration test.
- Vulnerabili... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'onionshare-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3'}, {'fixed': '2.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/onionshare/onionshare/security/advisories/GHSA-w9m4-7w72-r766'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21691'}, {'type': 'PACKAGE', 'url': 'https://github.com/onionshare/onionshare'}, {'type': 'WEB', 'url': 'https://github.com/onionshare/onion... | {'cwe_ids': ['CWE-306'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T19:04:59Z', 'nvd_published_at': '2022-01-18T22:15:00Z'} |
1.4.0 | GHSA-p46c-w9m3-7qr2 | 2023-06-13T18:08:03Z | 2022-01-06T22:18:35Z | null | ['CVE-2021-45684'] | Use of Uninitialized Resource in flumedb. | Affected versions of this crate passes an uninitialized buffer to a user-provided Read implementation. There are two of such cases (go_offset_log::read_entry() & offset_log::read_entry()).
Arbitrary Read implementations can read from the uninitialized buffer (memory exposure) and also can return incorrect number of by... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'flumedb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45684'}, {'type': 'WEB', 'url': 'https://github.com/sunrise-choir/flumedb-rs/issues/10'}, {'type': 'WEB', 'url': 'https://github.com/sunrise-choir/flumedb-rs/pull/12'}, {'type': 'WEB', 'url': 'https://github.com/sunrise-choir/flumedb-rs/commit/14b7... | {'cwe_ids': ['CWE-908'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T18:10:24Z', 'nvd_published_at': '2021-12-27T00:15:00Z'} |
1.4.0 | GHSA-4qr3-m7ww-hh9g | 2022-01-06T20:21:05Z | 2022-01-06T22:01:40Z | null | ['CVE-2021-45717'] | Use After Free in rusqlite | An issue was discovered in the rusqlite crate 0.25.x before 0.25.4 and 0.26.x before 0.26.2 for Rust. commit_hook has a use-after-free. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'rusqlite'}, 'ecosystem_specific': {'affected_functions': ['rusqlite::Connection::commit_hook']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.25.0'}, {'fixed': '0.25.4'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'rusqlite'}, 'ecosystem_specific... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45717'}, {'type': 'WEB', 'url': 'https://github.com/rusqlite/rusqlite/issues/1048'}, {'type': 'PACKAGE', 'url': 'https://github.com/rusqlite/rusqlite'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/rusql... | {'cwe_ids': ['CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T21:15:20Z', 'nvd_published_at': '2021-12-26T22:15:00Z'} |
1.4.0 | GHSA-wrx7-qgmj-mf2q | 2022-01-07T23:16:38Z | 2022-01-08T00:43:04Z | null | ['CVE-2021-27738'] | Server-Side Request Forgery in Apache Kylin | All request mappings in `StreamingCoordinatorController.java` handling `/kylin/api/streaming_coordinator/*` REST API endpoints did not include any security checks, which allowed an unauthenticated user to issue arbitrary requests, such as assigning/unassigning of streaming cubes, creation/modification and deletion of r... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.kylin:kylin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27738'}, {'type': 'WEB', 'url': 'https://github.com/apache/kylin/pull/1646'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/kylin'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/vkohh0to2vzwymyb2x13fszs3cs3vd70'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T23:16:38Z', 'nvd_published_at': '2022-01-06T13:15:00Z'} |
1.4.0 | GHSA-g23v-p5jq-jvh4 | 2021-06-24T13:23:03Z | 2022-01-06T18:37:14Z | null | ['CVE-2021-30468'] | Infinite loop in Apache CFX | A vulnerability in the JsonMapObjectReaderWriter of Apache CXF allows an attacker to submit malformed JSON to a web service, which results in the thread getting stuck in an infinite loop, consuming CPU indefinitely. This issue affects Apache CXF versions prior to 3.4.4; Apache CXF versions prior to 3.3.11. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:apache-cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.4.0'}, {'fixed': '3.4.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:apache-cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-30468'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3f46ae38e4a6e80c069cdb320e0ce831b0a21a12ef0cc92c0943f34a@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4771084730c4cf6e59eda60b... | {'cwe_ids': ['CWE-400', 'CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-17T18:54:46Z', 'nvd_published_at': '2021-06-16T12:15:00Z'} |
1.4.0 | GHSA-vv38-4xcj-q4rw | 2022-01-25T20:49:39Z | 2022-01-21T23:52:00Z | null | ['CVE-2021-42357'] | Cross-site Scripting in Apache Knox SSO | When using Apache Knox SSO prior to 1.6.1, a request could be crafted to redirect a user to a malicious page due to improper URL parsing. A request that included a specially crafted request parameter could be used to redirect the user to a page controlled by an attacker. This URL would need to be presented to the user ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.knox:gateway-service-knoxsso'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42357'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/b7v5dkpyqb51nw0lvz4cybhgrfhk1g7j'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/01/17/2'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T14:11:29Z', 'nvd_published_at': '2022-01-17T20:15:00Z'} |
1.4.0 | GHSA-pqhq-xx62-2v2p | 2021-03-26T22:28:03Z | 2022-01-06T20:35:39Z | null | ['CVE-2020-1933'] | Cross-site scripting in Apache NiFi | A XSS vulnerability was found in Apache NiFi 1.0.0 to 1.10.0. Malicious scripts could be injected to the UI through action by an unaware authenticated user in Firefox. Did not appear to occur in other browsers. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.11.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.10.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1933'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi/pull/3991'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security.html#CVE-2020-1933'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-26T22:28:03Z', 'nvd_published_at': '2020-01-28T01:15:00Z'} |
1.4.0 | GHSA-9cq5-xgg4-x477 | 2022-02-03T21:37:09Z | 2022-01-27T00:01:15Z | null | ['CVE-2022-0362'] | SQL Injection in showdoc | Showdoc verions 2.10.2 and prior is vulnerable to SQL injection. A patch is available in the `master` branch of the repository. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.10.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0362'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/2b34e267e4186125f99bfa420140634ad45801fb'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/e7c72417-eb8f... | {'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T21:37:09Z', 'nvd_published_at': '2022-01-26T13:15:00Z'} |
1.4.0 | GHSA-fh56-85cw-5pq6 | 2022-08-11T22:08:14Z | 2022-01-21T23:27:45Z | null | ['CVE-2021-45958'] | UltraJSON vulnerable to Out-of-bounds Write | UltraJSON (aka ujson) 1.34 through 5.1.0 has a stack-based buffer overflow in Buffer_AppendIndentUnchecked (called from encode). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ujson'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.34'}, {'fixed': '5.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45958'}, {'type': 'WEB', 'url': 'https://github.com/ultrajson/ultrajson/issues/501'}, {'type': 'WEB', 'url': 'https://github.com/ultrajson/ultrajson/issues/502#issuecomment-1031747284'}, {'type': 'WEB', 'url': 'https://github.com/ultrajson/ultrajso... | {'cwe_ids': ['CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-12T19:29:48Z', 'nvd_published_at': '2022-01-01T00:15:00Z'} |
1.4.0 | GHSA-p62j-hrxm-xcxf | 2022-01-06T19:44:35Z | 2022-01-06T23:53:35Z | null | [] | Book page text, count, and author/title length is not limited in PocketMine-MP | ### Impact
Players can fill book pages with as many characters as they like; the server does not check this.
In addition, the maximum of 50 pages is also not enforced, meaning that players can create "book bombs".
This causes a variety of problems:
- Oversized NBT on the wire costing excess bandwidth for server and cl... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pocketmine/pocketmine-mp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.26.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'pocketmine/pocketmine-mp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed'... | [{'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-p62j-hrxm-xcxf'}, {'type': 'PACKAGE', 'url': 'https://github.com/pmmp/PocketMine-MP'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T19:44:35Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xp7p-3gx7-j6wx | 2022-01-25T19:12:24Z | 2022-01-21T23:44:15Z | null | ['CVE-2021-4171'] | calibre-web is vulnerable to Business Logic Errors | calibre-web is vulnerable to Business Logic Errors | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'calibreweb'}, 'ecosystem_specific': {'affected_functions': ['calibreweb.cps.shelf.check_shelf_is_unique', 'calibreweb.cps.shelf.create_edit_shelf']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.15'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4171'}, {'type': 'WEB', 'url': 'https://github.com/janeczku/calibre-web/commit/3e0d8763c377d2146462811e3e4ccf13f0d312ce'}, {'type': 'PACKAGE', 'url': 'https://github.com/janeczku/calibre-web'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/111... | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T15:03:22Z', 'nvd_published_at': '2022-01-17T10:15:00Z'} |
1.4.0 | GHSA-884c-9wwh-9p6v | 2022-11-29T21:21:52Z | 2022-01-13T00:00:53Z | null | ['CVE-2022-23111'] | CSRF vulnerability and missing permission checks in Jenkins Publish Over SSH Plugin | A cross-site request forgery (CSRF) vulnerability in Jenkins Publish Over SSH Plugin 1.22 and earlier allows attackers to connect to an attacker-specified SSH server using attacker-specified credentials. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:publish-over-ssh'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.23'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23111'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/publish-over-ssh-plugin'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/publish-over-ssh-plugin/releases/tag/publish-over-ssh-1.23'}, {'type': 'WEB', 'url': 'https://www.jenk... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T21:21:52Z', 'nvd_published_at': '2022-01-12T20:15:00Z'} |
1.4.0 | GHSA-vj9x-w7ch-f46p | 2022-01-19T14:22:43Z | 2022-01-21T23:50:08Z | null | ['CVE-2022-0258'] | pimcore is vulnerable to SQL Injection | pimcore is vulnerable to Improper Neutralization of Special Elements used in an SQL Command | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.2.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0258'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/66281c12479dc01a06258d8533eaddfb1770d5bd'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0df891e4-6412... | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T14:22:43Z', 'nvd_published_at': '2022-01-17T16:15:00Z'} |
1.4.0 | GHSA-3269-x4pw-vffg | 2021-07-28T22:42:20Z | 2022-01-07T00:21:08Z | null | ['CVE-2020-7631'] | OS Command Injection in diskusage-ng | diskusage-ng through 0.2.4 is vulnerable to Command Injection.It allows execution of arbitrary commands via the path argument. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'diskusage-ng'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7631'}, {'type': 'WEB', 'url': 'https://github.com/iximiuz/node-diskusage-ng/blob/master/lib/posix.js#L11'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DISKUSAGENG-564425'}] | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T22:33:53Z', 'nvd_published_at': '2020-04-06T13:15:00Z'} |
1.4.0 | GHSA-wc6f-cjcp-cc33 | 2021-05-25T20:27:25Z | 2022-01-06T19:45:30Z | null | ['CVE-2020-1952'] | Improper Certificate Validation in Apache IoTDB | An issue was found in Apache IoTDB .9.0 to 0.9.1 and 0.8.0 to 0.8.2. When starting IoTDB, the JMX port 31999 is exposed with no certification.Then, clients could execute code remotely. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.iotdb:iotdb-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1952'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3d2ff899ead64d2952fdc1fbb1f520ca42011ed2b4c7f786e921f6b9%40%3Cdev.iotdb.apache.org%3E'}] | {'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T20:27:25Z', 'nvd_published_at': '2020-04-27T17:15:00Z'} |
1.4.0 | GHSA-8rh6-h94m-vj54 | 2022-01-04T16:55:20Z | 2022-01-07T00:01:11Z | null | ['CVE-2021-41500'] | Incorrect Comparison in cvxopt | Incomplete string comparison vulnerability exits in cvxopt.org cvxop <= 1.2.6 in APIs (cvxopt.cholmod.diag, cvxopt.cholmod.getfactor, cvxopt.cholmod.solve, cvxopt.cholmod.spsolve), which allows attackers to conduct Denial of Service attacks by construct fake Capsule objects. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'cvxopt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41500'}, {'type': 'WEB', 'url': 'https://github.com/cvxopt/cvxopt/issues/193'}, {'type': 'WEB', 'url': 'https://github.com/cvxopt/cvxopt/commit/d5a21cf1da62e4269176384b1ff62edac5579f94'}, {'type': 'PACKAGE', 'url': 'https://github.com/cvxopt/cvxopt... | {'cwe_ids': ['CWE-697'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-04T16:55:20Z', 'nvd_published_at': '2021-12-17T21:15:00Z'} |
1.4.0 | GHSA-v362-2895-h9r2 | 2023-06-13T18:38:43Z | 2022-01-07T22:37:01Z | null | ['CVE-2021-45720'] | Use After Free in lru | Lru crate has two functions for getting an iterator. Both iterators give references to key and value. Calling specific functions, like pop(), will remove and free the value, and but it's still possible to access the reference of value which is already dropped causing use after free. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'lru'}, 'ecosystem_specific': {'affected_functions': ['lru::LruCache::iter', 'lru::LruCache::iter_mut']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45720'}, {'type': 'WEB', 'url': 'https://github.com/jeromefroe/lru-rs/issues/120'}, {'type': 'PACKAGE', 'url': 'https://github.com/jeromefroe/lru-rs.git'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/lr... | {'cwe_ids': ['CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T20:44:44Z', 'nvd_published_at': '2021-12-26T22:15:00Z'} |
1.4.0 | GHSA-jrfj-98qg-qjgv | 2023-01-24T15:46:01Z | 2022-01-27T14:42:37Z | null | ['CVE-2022-23837'] | Denial of service in sidekiq | In `api.rb` in Sidekiq before 6.4.0 and 5.2.10, there is no limit on the number of days when requesting stats for the graph. This overloads the system, affecting the Web UI, and makes it unavailable to users. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'sidekiq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.4.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sidekiq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23837'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/pull/495'}, {'type': 'WEB', 'url': 'https://github.com/mperham/sidekiq/commit/7785ac1399f1b28992adb56055f6acd88fd1d956'}, {'type': 'WEB', 'url': 'https://github.com/TUTUMS... | {'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-24T22:50:23Z', 'nvd_published_at': '2022-01-21T21:15:00Z'} |
1.4.0 | GHSA-jrmq-rv9w-63rv | 2022-01-19T22:24:06Z | 2022-01-21T23:34:24Z | null | ['CVE-2022-22690'] | Umbraco ApplicationURL Overwrite | Within the Umbraco CMS, a configuration element named "UmbracoApplicationUrl" (or just "ApplicationUrl") is used whenever application code needs to build a URL pointing back to the site. For example, when a user resets their password and the application builds a password reset URL or when the administrator invites user... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Umbraco.Cms.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22690'}, {'type': 'WEB', 'url': 'https://appcheck-ng.com/umbraco-applicationurl-overwrite-persistent-password-reset-poison-cve-2022-22690-cve-2022-22691/'}, {'type': 'PACKAGE', 'url': 'https://github.com/umbraco/Umbraco-CMS'}] | {'cwe_ids': ['CWE-444'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T22:24:06Z', 'nvd_published_at': '2022-01-18T17:15:00Z'} |
1.4.0 | GHSA-gp6j-vx54-5pmf | 2022-01-04T22:41:52Z | 2022-01-06T18:30:26Z | null | [] | Incorrect validation of parties IDs leaks secret keys in Secret-sharing scheme | # Summary
In the threshold signature scheme, participants start by dividing secrets into shares using a secret sharing scheme. The Verifiable Secret Sharing scheme generates shares from the user’s IDs but does not properly validate them. Using a malicious ID will make other users reveal their secrets during the secret... | [] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/keep-network/keep-ecdsa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/keep-network/keep-ecdsa/security/advisories/GHSA-gp6j-vx54-5pmf'}, {'type': 'PACKAGE', 'url': 'https://github.com/keep-network/keep-ecdsa'}, {'type': 'WEB', 'url': 'https://github.com/keep-network/keep-ecdsa/releases/tag/v1.8.1'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-04T22:41:52Z', 'nvd_published_at': None} |
1.4.0 | GHSA-93pj-4p65-qmr9 | 2022-02-02T16:13:31Z | 2022-01-28T22:07:40Z | null | ['CVE-2022-0334'] | Insufficient user authorization in Moodle | A flaw was found in Moodle in versions 3.11 to 3.11.4, 3.10 to 3.10.8, 3.9 to 3.9.11 and earlier unsupported versions. Insufficient capability checks could lead to users accessing their grade report for courses where they did not have the required gradereport/user:view capability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11'}, {'fixed': '3.11.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10'}, {'fixed': '3.10.8'}]}]}, {'p... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0334'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/1964d68f8500ea3c7b776fa8a2af6266ed109f84'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/6d18f136ae88ec97e351a723df570816a959ec68'}, {'type': 'WEB', 'url': '... | {'cwe_ids': ['CWE-668', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-26T22:48:21Z', 'nvd_published_at': '2022-01-25T20:15:00Z'} |
1.4.0 | GHSA-5hfj-r725-wpc4 | 2022-08-11T16:55:36Z | 2022-01-14T21:08:26Z | null | ['CVE-2021-32650'] | october/system arbitrary code execution | ### Impact
Assuming an attacker with access to the backend is able to execute PHP code by using the theme import feature. This will bypass the safe mode feature that prevents PHP execution in the CMS templates.
### Patches
Issue has been patched in Build 473 and v1.1.6
### Workarounds
Apply https://github.com/octo... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'october/system'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'october/system'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.473'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/octobercms/october/security/advisories/GHSA-5hfj-r725-wpc4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32650'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/october/commit/167b592eed291ae1563c8fcc5b9b34a03a300f26'}, {'type': 'PACKAGE', '... | {'cwe_ids': ['CWE-74', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-14T20:47:55Z', 'nvd_published_at': '2022-01-14T15:15:00Z'} |
1.4.0 | GHSA-544x-2jx9-4pfg | 2022-02-04T13:51:18Z | 2022-01-28T22:25:03Z | null | ['CVE-2022-22932'] | Path traversal in Apache Karaf | Apache Karaf obr:* commands and run goal on the karaf-maven-plugin have partial path traversal which allows to break out of expected folder. The risk is low as obr:* commands are not very used and the entry is set by user. This has been fixed in revision: https://gitbox.apache.org/repos/asf?p=karaf.git;h=36a2bc4 https:... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.karaf:apache-karaf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.karaf:apache-karaf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22932'}, {'type': 'WEB', 'url': 'https://github.com/apache/karaf/pull/1485'}, {'type': 'WEB', 'url': 'https://gitbox.apache.org/repos/asf?p=karaf.git;h=36a2bc4'}, {'type': 'WEB', 'url': 'https://gitbox.apache.org/repos/asf?p=karaf.git;h=52b70cf'}, ... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-27T23:10:36Z', 'nvd_published_at': '2022-01-26T11:15:00Z'} |
1.4.0 | GHSA-ff2r-xpwq-6whj | 2023-06-13T17:10:49Z | 2022-01-06T22:12:14Z | null | ['CVE-2021-45689'] | Use of Uninitialized Resource in gfx-auxil | Affected versions of this crate passes an uninitialized buffer to a user-provided Read implementation.
Arbitrary Read implementations can read from the uninitialized buffer (memory exposure) and also can return incorrect number of bytes written to the buffer. Reading from uninitialized memory produces undefined values... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'gfx-auxil'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.10.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45689'}, {'type': 'WEB', 'url': 'https://github.com/gfx-rs/gfx/issues/3567'}, {'type': 'PACKAGE', 'url': 'https://github.com/gfx-rs/gfx'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/gfx-auxil/RUSTSEC-2... | {'cwe_ids': ['CWE-908'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T16:10:35Z', 'nvd_published_at': '2021-12-27T00:15:00Z'} |
1.4.0 | GHSA-m36x-mgfh-8g78 | 2023-07-07T16:28:46Z | 2022-01-27T15:15:25Z | null | ['CVE-2023-36474'] | Subdomain Takeover in Interactsh server | A domain configured with interactsh server was vulnerable to subdomain takeover for specfic subdomain, i.e `app`, Interactsh server before `< 1.0.0` used to create cname entries for `app` pointing to `projectdiscovery.github.io` as default which intended to used for hosting interactsh [web client](https://github.com/pr... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/projectdiscovery/interactsh'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/projectdiscovery/interactsh/security/advisories/GHSA-m36x-mgfh-8g78'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36474'}, {'type': 'WEB', 'url': 'https://github.com/projectdiscovery/interactsh/issues/136'}, {'type': 'WEB', 'url': 'https://github.c... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-24T22:24:55Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mh8g-8jwp-q6xw | 2022-11-29T21:27:43Z | 2022-01-13T00:00:53Z | null | ['CVE-2022-23115'] | CSRF vulnerability in Jenkins batch task Plugin | Cross-site request forgery (CSRF) vulnerabilities in Jenkins batch task Plugin 1.19 and earlier allows attackers with Overall/Read access to retrieve logs, build or delete a batch task. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:batch-task'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.19'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23115'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/batch-task-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-1025'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T21:27:43Z', 'nvd_published_at': '2022-01-12T20:15:00Z'} |
1.4.0 | GHSA-m434-m5pv-p35w | 2022-02-02T16:12:13Z | 2022-01-28T22:08:02Z | null | ['CVE-2022-0333'] | Insufficient user authorization in Moodle | A flaw was found in Moodle in versions 3.11 to 3.11.4, 3.10 to 3.10.8, 3.9 to 3.9.11 and earlier unsupported versions. The calendar:manageentries capability allowed managers to access or modify any calendar event, but should have been restricted from accessing user level events. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11'}, {'fixed': '3.11.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions':... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0333'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/2ee27313cea0d7073f5a6a35eccdfddcb3a9adad'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2043663'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle... | {'cwe_ids': ['CWE-863'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-01-26T22:50:46Z', 'nvd_published_at': '2022-01-25T20:15:00Z'} |
1.4.0 | GHSA-7rjp-fgwj-47rw | 2022-02-02T16:17:08Z | 2022-01-28T22:14:11Z | null | ['CVE-2022-23945'] | Missing authentication in ShenYu | Missing authentication on ShenYu Admin when register by HTTP. This issue affected Apache ShenYu 2.4.0 and 2.4.1. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.shenyu:shenyu-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23945'}, {'type': 'WEB', 'url': 'https://github.com/apache/shenyu/pull/2723'}, {'type': 'WEB', 'url': 'https://github.com/apache/shenyu/commit/9a02215013037e1cc8cd41f216164628a9e9e28f'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/incubat... | {'cwe_ids': ['CWE-306', 'CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-26T22:42:09Z', 'nvd_published_at': '2022-01-25T13:15:00Z'} |
1.4.0 | GHSA-rwqq-p4p9-5wpq | 2022-01-04T20:03:15Z | 2022-01-07T00:00:29Z | null | ['CVE-2021-43678'] | Wechat-php-sdk is affected by a Cross Site Scripting vulnerability. | Wechat-php-sdk v1.10.2 is affected by a Cross Site Scripting (XSS) vulnerability in Wechat.php. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'gaoming13/wechat-php-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.10.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43678'}, {'type': 'WEB', 'url': 'https://github.com/gaoming13/wechat-php-sdk/issues/30'}, {'type': 'PACKAGE', 'url': 'https://github.com/gaoming13/wechat-php-sdk'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-04T20:03:15Z', 'nvd_published_at': '2021-12-17T13:15:00Z'} |
1.4.0 | GHSA-gqm2-2gcx-p88w | 2023-05-24T16:41:08Z | 2022-01-13T00:01:03Z | null | ['CVE-2022-20616'] | Incorrect Permission Assignment for Critical Resource in Jenkins Credentials Binding Plugin | Jenkins Credentials Binding Plugin prior to 1.27.1 and 1.24.1 does not perform a permission check in a method implementing form validation.
This allows attackers with Overall/Read access to validate if a credential ID refers to a secret file credential and whether it’s a zip file.
Credentials Binding Plugin 1.27.1 an... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:credentials'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.25'}, {'fixed': '1.27.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:credentials'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-20616'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/credentials-binding-plugin/commit/2dd5eda721e52d9a5bf6748405adf965ba517d8a'}, {'type': 'WEB', 'url': 'https://github.com/CVEProject/cvelist/blob/2d78eb36f4d084db7fb35f1535d8d84fdcb7d859/... | {'cwe_ids': ['CWE-732', 'CWE-862'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:49:42Z', 'nvd_published_at': '2022-01-12T20:15:00Z'} |
1.4.0 | GHSA-vqwg-4v6f-h6x5 | 2023-05-24T16:37:08Z | 2022-01-13T00:01:04Z | null | ['CVE-2022-20615'] | Stored XSS vulnerability in Matrix Project Plugin | Jenkins Matrix Project Plugin prior to 1.20 and 1.18.1 does not escape HTML metacharacters in node and label names, and label descriptions.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Agent/Configure permission.
Matrix Project Plugin 1.20 and 1.18.1 escapes HTML met... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:matrix-project'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.19'}, {'fixed': '1.20'}]}], 'versions': ['1.19']}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:matrix-project'}, 'ranges': [{'type': 'ECOSYSTEM', 'ev... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-20615'}, {'type': 'WEB', 'url': 'https://github.com/CVEProject/cvelist/blob/2d78eb36f4d084db7fb35f1535d8d84fdcb7d859/2022/20xxx/CVE-2022-20615.json'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/matrix-project-plugin'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-29T04:33:51Z', 'nvd_published_at': '2022-01-12T20:15:00Z'} |
1.4.0 | GHSA-4jh2-3c85-q67h | 2022-01-27T23:12:43Z | 2022-01-28T21:55:34Z | null | ['CVE-2021-45230'] | Improper Privilege Management in apache-airflow | In Apache Airflow prior to 2.2.0. This CVE applies to a specific case where a User who has "can_create" permissions on DAG Runs can create Dag Runs for dags that they don't have "edit" permissions for. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45230'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/m778ojn0k595rwco4ht9wjql89mjoxnl'}] | {'cwe_ids': ['CWE-269'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-27T23:12:43Z', 'nvd_published_at': '2022-01-20T11:15:00Z'} |
1.4.0 | GHSA-qpw2-xchm-655q | 2021-05-04T20:42:24Z | 2022-01-06T20:31:01Z | 2021-03-19T20:58:21Z | [] | Out-of-Bounds read in stringstream | Versions less than 0.0.6 of the Node.js stringstream module are vulnerable to an out-of-bounds read because of allocation of uninitialized buffers when a number is passed in the input stream (when using Node.js 4.x).
# WITHDRAWN
This is a duplicate of GHSA-mf6x-7mm4-x2g7 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'stringstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-21270'}, {'type': 'WEB', 'url': 'https://github.com/mhart/StringStream/issues/7'}, {'type': 'WEB', 'url': 'https://github.com/mhart/StringStream/commit/2f4a9d496f94b0880e01a26857aa266a5a3ef274'}, {'type': 'WEB', 'url': 'https://hackerone.com/report... | {'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T23:57:13Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xrg3-hmf3-rvgw | 2023-06-13T20:41:58Z | 2022-01-06T22:03:56Z | null | ['CVE-2021-45712'] | Path Traversal in rust-embed | When running in debug mode and the debug-embed (off by default) feature is not enabled, the generated get method does not check that the input path is a child of the folder given.
This allows attackers to read arbitrary files in the file system if they have control over the filename given. The following code will prin... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'rust-embed'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45712'}, {'type': 'WEB', 'url': 'https://github.com/pyros2097/rust-embed/issues/159'}, {'type': 'PACKAGE', 'url': 'https://github.com/pyros2097/rust-embed'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T21:02:56Z', 'nvd_published_at': '2021-12-26T22:15:00Z'} |
1.4.0 | GHSA-86wf-436m-h424 | 2021-03-31T21:09:25Z | 2022-01-06T20:30:13Z | null | ['CVE-2019-10196'] | Resource Exhaustion Denial of Service in http-proxy-agent | A flaw was found in http-proxy-agent, prior to version 2.1.0. It was discovered http-proxy-agent passes an auth option to the Buffer constructor without proper sanitization. This could result in a Denial of Service through the usage of all available CPU resources and data exposure through an uninitialized memory leak i... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'http-proxy-agent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10196'}, {'type': 'WEB', 'url': 'https://github.com/TooTallNate/node-http-proxy-agent/commit/b7b7cc793c3226aa83f820ce5c277e81862d32eb'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1567245'}, {'type': 'WEB', 'url': 'https://... | {'cwe_ids': ['CWE-665'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T22:28:09Z', 'nvd_published_at': '2021-03-19T20:15:00Z'} |
1.4.0 | GHSA-6jmh-9gqm-5xrx | 2022-01-24T21:11:02Z | 2022-01-26T20:21:03Z | null | ['CVE-2022-0226'] | Cross-Site Request Forgery (CSRF) in livehelperchat | A CSRF issue is found in the audit configuration under settings. It was found that no CSRF token validation is getting done on the server-side. If we remove the CSRF token and keep the CSRF token field empty, the action is getting performed. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.92'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0226'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/f59ffb02984c0ce2fbb19ac39365066507de9370'}, {'type': 'PACKAGE', 'url': 'https://github.com/livehelperchat/livehelperchat'}, {'type': 'WEB', 'url': 'https://hunt... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-24T21:11:02Z', 'nvd_published_at': '2022-01-14T19:15:00Z'} |
1.4.0 | GHSA-jq4p-mq33-w375 | 2022-02-07T21:16:31Z | 2022-01-28T23:08:29Z | null | ['CVE-2022-23598'] | Cross-site Scripting when rendering error messages in laminas-form | ### Impact
When rendering validation error messages via the `formElementErrors()` view helper shipped with laminas-form, many messages will contain the submitted value. However, in vulnerable versions of laminas-form, the value was not being escaped for HTML contexts, which can potentially lead to a Reflected Cross-Si... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'laminas/laminas-form'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'laminas/laminas-form'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.... | [{'type': 'WEB', 'url': 'https://github.com/laminas/laminas-form/security/advisories/GHSA-jq4p-mq33-w375'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23598'}, {'type': 'WEB', 'url': 'https://github.com/laminas/laminas-form/commit/43005a3ec4c2292d4f825273768d9b884acbca37'}, {'type': 'WEB', '... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-28T18:49:08Z', 'nvd_published_at': '2022-01-28T22:15:00Z'} |
1.4.0 | GHSA-fqgw-6qj5-8hmp | 2022-01-07T18:33:44Z | 2022-01-08T00:40:37Z | null | ['CVE-2021-40111'] | Infinite Loop in Apache James | In Apache James, while fuzzing with Jazzer the IMAP parsing stack, we discover that crafted APPEND and STATUS IMAP command could be used to trigger infinite loops resulting in expensive CPU computations and OutOfMemory exceptions. This can be used for a Denial Of Service attack. The IMAP user needs to be authenticated ... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.james:james-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40111'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2022/01/04/3'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/01/04/3'}] | {'cwe_ids': ['CWE-835'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T18:33:44Z', 'nvd_published_at': '2022-01-04T09:15:00Z'} |
1.4.0 | GHSA-2457-2263-mm9f | 2022-01-19T19:56:29Z | 2022-01-21T23:19:36Z | null | ['CVE-2022-21700'] | Memory leak in micronaut-core | ### Impact
Sending an invalid Content Type header leads to memory leak in `DefaultArgumentConversionContext` as this type is erroneously used in static state.
### Patches
The problem is patched in Micronaut 3.2.7 and above.
### Workarounds
The default content type binder can be replaced in an existing Micronaut ap... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.micronaut:micronaut-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.7'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/micronaut-projects/micronaut-core/security/advisories/GHSA-2457-2263-mm9f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21700'}, {'type': 'WEB', 'url': 'https://github.com/micronaut-projects/micronaut-core/commit/b8ec32c311689667c69ae7d9f9c3b3a8abc... | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T19:56:29Z', 'nvd_published_at': '2022-01-18T23:15:00Z'} |
1.4.0 | GHSA-6qj8-c27w-rp33 | 2021-05-25T20:49:00Z | 2022-01-06T19:38:07Z | null | ['CVE-2019-17557'] | Cross-site scripting in Apache Syncome EndUser | It was found that the Apache Syncope EndUser UI login page prio to 2.0.15 and 2.1.6 reflects the successMessage parameters. By this mean, a user accessing the Enduser UI could execute javascript code from URL query string. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.syncope.client:syncope-client-enduser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.15'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.syncope.client:syncope-client-enduser'}, 'ranges': [{'type': 'ECOSYSTEM', 'eve... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17557'}, {'type': 'WEB', 'url': 'http://syncope.apache.org/security'}] | {'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T20:49:00Z', 'nvd_published_at': '2020-05-04T13:15:00Z'} |
1.4.0 | GHSA-f8x6-m9f5-ffp8 | 2022-01-06T19:58:35Z | 2022-01-06T21:08:34Z | null | ['CVE-2021-23814'] | Unrestricted Upload of File with Dangerous Type in unisharp/laravel-filemanager | This affects the package unisharp/laravel-filemanager from 0.0.0. The upload() function does not sufficiently validate the file type when uploading. An attacker may be able to reproduce the following steps: - Install a package with a web Laravel application. - Navigate to the Upload window - Upload an image file, then ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'unisharp/laravel-filemanager'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23814'}, {'type': 'PACKAGE', 'url': 'https://github.com/UniSharp/laravel-filemanager'}, {'type': 'WEB', 'url': 'https://github.com/UniSharp/laravel-filemanager/blob/master/src/Controllers/UploadController.php%23L26'}, {'type': 'WEB', 'url': 'https:... | {'cwe_ids': ['CWE-434'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-04T18:05:21Z', 'nvd_published_at': '2021-12-17T20:15:00Z'} |
1.4.0 | GHSA-w3v3-cxq5-9vr4 | 2023-06-30T20:03:01Z | 2022-01-21T23:58:07Z | null | ['CVE-2022-0179'] | Incorrect Default Permissions and Improper Access Control in snipe-it | snipe-it is vulnerable to Improper Access Control/Incorrect Default Permissions. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0179'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/pull/10498'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/cf14a0222c67472086cd08b2155f045edaf75f2e'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-... | {'cwe_ids': ['CWE-276', 'CWE-284', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-18T22:12:25Z', 'nvd_published_at': '2022-01-12T05:15:00Z'} |
1.4.0 | GHSA-29gp-2c3m-3j6m | 2022-01-20T15:34:11Z | 2022-01-12T22:43:00Z | null | ['CVE-2021-29454'] | Sandbox Escape by math function in smarty | ### Impact
Template authors could run arbitrary PHP code by crafting a malicious math string.
If a math string is passed through as user provided data to the math function, external users could run arbitrary PHP code by crafting a malicious math string.
### Patches
Please upgrade to 4.0.2 or 3.1.42 or higher.
### Ref... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'smarty/smarty'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.42'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'smarty/smarty'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/smarty-php/smarty/security/advisories/GHSA-29gp-2c3m-3j6m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29454'}, {'type': 'WEB', 'url': 'https://github.com/smarty-php/smarty/commit/215d81a9fa3cd63d82fb3ab56ecaf97cf1e7db71'}, {'type': 'PACKAGE', 'ur... | {'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-10T22:08:56Z', 'nvd_published_at': '2022-01-10T20:15:00Z'} |
1.4.0 | GHSA-xh99-hw7h-wf63 | 2022-01-13T22:08:36Z | 2022-01-13T22:25:44Z | null | [] | Unchecked validity of Facing values in PlayerActionPacket | ### Impact
A remote attacker may crash a server by sending `PlayerActionPacket` with invalid facing values (e.g. negative), specifically with `START_BREAK` or `CRACK_BLOCK` actions, or with a `UseItemTransactionData` (typically in `InventoryTransactionPacket`).
### Patches
f126479c37ff00a717a828f5271cf8e821d12d6c
###... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pocketmine/pocketmine-mp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-xh99-hw7h-wf63'}, {'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/commit/f126479c37ff00a717a828f5271cf8e821d12d6c'}, {'type': 'PACKAGE', 'url': 'https://github.com/pmmp/PocketMine-MP'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-13T22:08:36Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gg9m-x3cg-69vh | 2023-05-24T17:49:07Z | 2022-01-13T00:00:57Z | null | ['CVE-2022-20621'] | Access key stored in plain text by Jenkins Metrics Plugin | Jenkins Metrics Plugin 4.0.2.8 and earlier stores access keys unencrypted in its global configuration file `jenkins.metrics.api.MetricsAccessKey.xml` on the Jenkins controller as part of its configuration.
This access key can be viewed by users with access to the Jenkins controller file system.
Metrics Plugin 4.0.2.8... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:metrics'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.2.8'}, {'fixed': '4.0.2.8.1'}]}], 'versions': ['4.0.2.8']}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:metrics'}, 'ranges': [{'type': 'ECOSYSTEM', 'event... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-20621'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/metrics-plugin/commit/9810480370d4c5e04a2b710934db5461bde0d1b6'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/metrics-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.i... | {'cwe_ids': ['CWE-522'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-05-04T20:59:58Z', 'nvd_published_at': '2022-01-12T20:15:00Z'} |
1.4.0 | GHSA-2w8g-m5j8-7m87 | 2022-01-10T21:37:04Z | 2022-01-12T21:45:59Z | null | [] | Zalgo-like output that crashes the server | ### Impact
_What kind of vulnerability is it? Who is impacted?_
[`colors`](https://npmjs.com/package/colors) package caused zalgo-like output (see https://github.com/soketi/soketi/issues/276, https://github.com/Marak/colors.js/issues/289), breaking the servers.
**Only NPM users that recently upgraded or installed the... | [] | [{'package': {'ecosystem': 'npm', 'name': '@soketi/soketi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.26.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/soketi/soketi/security/advisories/GHSA-2w8g-m5j8-7m87'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-10T21:37:04Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jh5g-9m4v-9vv9 | 2023-09-11T22:18:57Z | 2022-01-28T22:24:48Z | null | ['CVE-2021-41766'] | Insecure Java Deserialization in Apache Karaf | Apache Karaf allows monitoring of applications and the Java runtime by using the Java Management Extensions (JMX). JMX is a Java RMI based technology that relies on Java serialized objects for client server communication. Whereas the default JMX implementation is hardened against unauthenticated deserialization attacks... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.karaf.management:org.apache.karaf.management.server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41766'}, {'type': 'WEB', 'url': 'https://github.com/apache/karaf/pull/1475'}, {'type': 'WEB', 'url': 'https://github.com/apache/karaf/commit/b42c82ca3b9a22bd92d249a1060a1953f4188bc2'}, {'type': 'WEB', 'url': 'https://gitbox.apache.org/repos/asf?p=k... | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-27T23:08:06Z', 'nvd_published_at': '2022-01-26T11:15:00Z'} |
1.4.0 | GHSA-f7q6-xxph-mfm8 | 2022-02-03T17:53:53Z | 2022-01-27T00:01:26Z | null | ['CVE-2022-0251'] | Cross-site Scripting in Pimcore | Pimcore prior to version 10.2.10 contains a cross-site scripting vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.2.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0251'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/3ae96b9d41c117aafa45873ad10077d4b873a3cb'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/eb4b08f9-cf8b... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T17:53:53Z', 'nvd_published_at': '2022-01-26T11:15:00Z'} |
1.4.0 | GHSA-q2x5-6q7q-r872 | 2022-01-07T17:52:38Z | 2022-01-06T22:10:17Z | null | ['CVE-2021-45701'] | Use After Free in tremor-script | An issue was discovered in the tremor-script crate before 0.11.6 for Rust. A patch operation may result in a use-after-free. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'tremor-script'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7.2'}, {'fixed': '0.11.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45701'}, {'type': 'WEB', 'url': 'https://github.com/tremor-rs/tremor-runtime/pull/1217'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/tremor-script/RUSTSEC-2021-0111.md'}, {'type': 'WEB', 'url': 'https:... | {'cwe_ids': ['CWE-416'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T13:27:33Z', 'nvd_published_at': '2021-12-27T00:15:00Z'} |
1.4.0 | GHSA-4f5x-q4jc-xfcf | 2022-01-19T22:33:53Z | 2022-01-21T23:31:35Z | null | ['CVE-2022-0262'] | Cross-site Scripting in pimcore | Cross-site Scripting (XSS) - Stored in Packagist pimcore/pimcore. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.2.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0262'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/6f36e841ce55f67e2e95253dd58f80659ef166c7'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b38a4e14-5dcb... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T22:33:53Z', 'nvd_published_at': '2022-01-18T16:15:00Z'} |
1.4.0 | GHSA-5429-pjww-7675 | 2023-08-08T20:44:51Z | 2022-01-08T00:43:04Z | null | ['CVE-2021-36774'] | SQL Injection in Apache Kylin | Apache Kylin allows users to read data from other database systems using JDBC. The MySQL JDBC driver supports certain properties, which, if left unmitigated, can allow an attacker to execute arbitrary code from a hacker-controlled malicious MySQL server within Kylin server processes. This issue affects Apache Kylin 2 v... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.kylin:kylin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36774'}, {'type': 'WEB', 'url': 'https://github.com/apache/kylin/pull/1646'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/kylin'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/lchpcvoolc6w8zc6vo1wstk8zbfqv2ow'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-668', 'CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T23:19:03Z', 'nvd_published_at': '2022-01-06T13:15:00Z'} |
1.4.0 | GHSA-m6w8-fq7v-ph4m | 2022-01-12T21:38:27Z | 2022-01-13T16:09:36Z | null | [] | GovernorCompatibilityBravo incorrect ABI encoding may lead to unexpected behavior | ### Impact
The `GovernorCompatibilityBravo` module may lead to the creation of governance proposals that execute function calls with incorrect arguments due to bad ABI encoding. This happens if the proposal is created using explicit function signatures, e.g. a proposal to invoke the function `foo(uint256)` is created ... | [] | [{'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.4.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts-upgradeable'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed... | [{'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-m6w8-fq7v-ph4m'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-11T23:50:55Z', 'nvd_published_at': None} |
1.4.0 | GHSA-g4h2-4wvh-grc5 | 2022-01-07T18:25:29Z | 2022-01-06T22:05:05Z | null | ['CVE-2021-45711'] | Uncontrolled Resource Consumption in simple_asn1 | An issue was discovered in the simple_asn1 crate 0.6.0 before 0.6.1 for Rust. There is a panic if UTCTime data, supplied by a remote attacker, has a second character greater than 0x7f. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'simple_asn1'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.6.0'}, {'fixed': '0.6.1'}]}], 'versions': ['0.6.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45711'}, {'type': 'WEB', 'url': 'https://github.com/acw/simple_asn1/issues/27'}, {'type': 'WEB', 'url': 'https://github.com/acw/simple_asn1/commit/d7d39d709577710e9dc8833ee57d200eef366db8'}, {'type': 'PACKAGE', 'url': 'https://github.com/acw/simple... | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T21:37:42Z', 'nvd_published_at': '2021-12-27T00:15:00Z'} |
1.4.0 | GHSA-w4fj-ccr6-7pcp | 2023-09-25T11:29:40Z | 2022-01-06T20:40:56Z | null | ['CVE-2020-1928'] | Apache NiFi Insertion of Sensitive Information into Log File | An information disclosure vulnerability was found in Apache NiFi 1.10.0. The sensitive parameter parser would log parsed values for debugging purposes. This would expose literal values entered in a sensitive property when no parameter was present. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi-parameter'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed': '1.11.0'}]}], 'versions': ['1.10.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1928'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi/pull/3935'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi/commit/42cb6e84898e66672878f61f99543d6af3c0a567'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/nifi'}, {'ty... | {'cwe_ids': ['CWE-200', 'CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T14:27:46Z', 'nvd_published_at': '2020-01-28T01:15:00Z'} |
1.4.0 | GHSA-vp5x-3v8r-qprw | 2022-01-19T18:25:14Z | 2022-01-12T22:51:04Z | null | ['CVE-2021-43297'] | Deserialization of Untrusted Data in Dubbo | A deserialization vulnerability existed in dubbo hessian-lite 3.2.11 and its earlier versions, which could lead to malicious code execution. Most Dubbo users use Hessian2 as the default serialization/deserialization protocol, during Hessian catch unexpected exceptions, Hessian will log out some imformation for users, w... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.12'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.1... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43297'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/1mszxrvp90y01xob56yp002939c7hlww'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-11T18:30:09Z', 'nvd_published_at': '2022-01-10T16:15:00Z'} |
1.4.0 | GHSA-gm68-g349-gxgg | 2022-01-28T22:20:30Z | 2022-01-28T22:35:16Z | null | ['CVE-2021-39480'] | Denial of service in bingrep | Bingrep v0.8.5 was discovered to contain a memory allocation failure which can cause a Denial of Service (DoS). | [] | [{'package': {'ecosystem': 'crates.io', 'name': 'bingrep'}, 'versions': ['0.8.5']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39480'}, {'type': 'WEB', 'url': 'https://github.com/m4b/bingrep/issues/30'}, {'type': 'PACKAGE', 'url': 'https://github.com/m4b/bingrep'}] | {'cwe_ids': ['CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-28T22:20:30Z', 'nvd_published_at': '2022-01-21T22:15:00Z'} |
1.4.0 | GHSA-44gv-fgcj-w546 | 2022-01-07T20:37:12Z | 2022-01-08T00:31:55Z | null | ['CVE-2022-22107'] | Missing Authorization in DayByDay CRM | In Daybyday CRM, versions 2.0.0 through 2.2.0 are vulnerable to Missing Authorization. An attacker that has the lowest privileges account (employee type user), can view the appointments of all users in the system including administrators. However, this type of user is not authorized to view the calendar at all. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'bottelet/flarepoint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22107'}, {'type': 'WEB', 'url': 'https://github.com/Bottelet/DaybydayCRM/commit/a0392f4a4a14e1e3fedaf6817aefce69b6bd661b'}, {'type': 'PACKAGE', 'url': 'https://github.com/Bottelet/DaybydayCRM'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftwa... | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T20:37:12Z', 'nvd_published_at': '2022-01-05T15:15:00Z'} |
1.4.0 | GHSA-92cx-4xm7-jr9m | 2022-01-07T16:09:58Z | 2022-01-06T22:02:56Z | null | ['CVE-2021-45713'] | Use After Free in rusqlite | An issue was discovered in the rusqlite crate 0.25.x before 0.25.4 and 0.26.x before 0.26.2 for Rust. create_scalar_function has a use-after-free. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'rusqlite'}, 'ecosystem_specific': {'affected_functions': ['rusqlite::Connection::create_scalar_function']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.25.0'}, {'fixed': '0.25.4'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'rusqlite'}, 'ecosyst... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45713'}, {'type': 'WEB', 'url': 'https://github.com/rusqlite/rusqlite/issues/1048'}, {'type': 'WEB', 'url': 'https://github.com/rusqlite/rusqlite/pull/1049'}, {'type': 'WEB', 'url': 'https://github.com/rusqlite/rusqlite/commit/30f8c8c502675011603c4... | {'cwe_ids': ['CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T21:05:16Z', 'nvd_published_at': '2021-12-26T22:15:00Z'} |
1.4.0 | GHSA-mrq4-7ch7-2465 | 2022-02-07T21:21:25Z | 2022-01-27T18:32:47Z | null | ['CVE-2022-21686'] | Server Side Twig Template Injection | PrestaShop is an Open Source e-commerce platform. Starting with version 1.7.0.0 and ending with version 1.7.8.3, an attacker is able to inject twig code inside the back office when using the legacy layout. The problem is fixed in version 1.7.8.3. There are no known workarounds.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0.0'}, {'fixed': '1.7.8.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.7.8.2'}}] | [{'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-mrq4-7ch7-2465'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21686'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/commit/d02b469ec365822e6a9f017e57f588966248bf21'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-26T22:51:57Z', 'nvd_published_at': '2022-01-26T20:15:00Z'} |
1.4.0 | GHSA-pwm7-qr6j-3vjg | 2022-01-11T18:14:15Z | 2022-01-12T22:56:13Z | null | ['CVE-2021-23594'] | Prototype Pollution in realms-shim | All versions of package realms-shim are vulnerable to Sandbox Bypass via a Prototype Pollution attack vector. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'realms-shim'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23594'}, {'type': 'PACKAGE', 'url': 'https://github.com/Agoric/realms-shim'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-REALMSSHIM-2309907'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/realms-shim'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-11T18:14:15Z', 'nvd_published_at': '2022-01-10T14:10:00Z'} |
1.4.0 | GHSA-6vfw-74wr-3chh | 2022-02-03T21:01:10Z | 2022-01-28T00:03:42Z | null | ['CVE-2022-0372'] | Cross-site Scripting in Crater Invoice | Crater invoice prior to version 6.0.0 has a cross-site scripting vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'bytefury/crater'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0372'}, {'type': 'WEB', 'url': 'https://github.com/crater-invoice/crater/pull/681'}, {'type': 'WEB', 'url': 'https://github.com/crater-invoice/crater/commit/cdc913d16cf624aee852bc9163a7c6ffc8d1da9d'}, {'type': 'PACKAGE', 'url': 'https://github.com/... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T21:01:10Z', 'nvd_published_at': '2022-01-27T08:15:00Z'} |
1.4.0 | GHSA-x588-g38j-f672 | 2022-01-07T23:37:32Z | 2022-01-08T00:46:20Z | null | ['CVE-2021-36737'] | Cross-site Scripting in Apache Pluto | The input fields of the Apache Pluto UrlTestPortlet are vulnerable to Cross-Site Scripting (XSS) attacks. Users should migrate to version 3.1.1 of the v3-demo-portlet.war artifact | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.portals.pluto:pluto-portal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36737'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/portals-pluto'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/x7kt47bf358x8sg9qg02zt0dmdrtow25'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T23:37:32Z', 'nvd_published_at': '2022-01-06T09:15:00Z'} |
1.4.0 | GHSA-pw3c-h7wp-cvhx | 2023-09-04T16:47:08Z | 2022-01-12T20:07:43Z | null | ['CVE-2022-22815'] | Improper Initialization in Pillow | Pillow is the friendly PIL (Python Imaging Library) fork. `path_getbbox` in `path.c` in Pillow before 9.0.0 improperly initializes `ImagePath.Path`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['PIL.ImagePath.Path.__init__']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22815'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/c48271ab354db49cdbd740bc45e13be4f0f7993c'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://github.com/python-pil... | {'cwe_ids': ['CWE-665'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-11T18:02:06Z', 'nvd_published_at': '2022-01-10T14:12:00Z'} |
1.4.0 | GHSA-5f5c-687x-g5qm | 2022-01-06T18:52:40Z | 2022-01-07T00:10:33Z | null | ['CVE-2021-41499'] | Classic Buffer Overflow in pyo | Buffer Overflow Vulnerability exists in ajaxsoundstudio.com in Pyo < 1.03 in the Server_debug function, which allows remote attackers to conduct DoS attacks by deliberately passing on an overlong audio file name. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pyo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41499'}, {'type': 'WEB', 'url': 'https://github.com/belangeo/pyo/issues/222'}, {'type': 'PACKAGE', 'url': 'https://github.com/belangeo/pyo'}] | {'cwe_ids': ['CWE-120'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T18:52:40Z', 'nvd_published_at': '2021-12-17T21:15:00Z'} |
1.4.0 | GHSA-3j58-p785-f27x | 2022-02-03T20:34:27Z | 2022-01-28T22:15:24Z | null | ['CVE-2022-0378'] | Cross-site Scripting in microweber | There is a reflected cross sitem scripting attack in microweber via url parameters. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0378'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/fc7e1a026735b93f0e0047700d08c44954fce9ce'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/5... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-27T18:43:08Z', 'nvd_published_at': '2022-01-26T16:15:00Z'} |
1.4.0 | GHSA-cm8g-544f-p9x9 | 2022-01-07T16:13:53Z | 2022-01-06T22:03:16Z | null | ['CVE-2021-45716'] | Use After Free in rusqlite | An issue was discovered in the rusqlite crate 0.25.x before 0.25.4 and 0.26.x before 0.26.2 for Rust. create_collation has a use-after-free. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'rusqlite'}, 'ecosystem_specific': {'affected_functions': ['rusqlite::Connection::create_collation']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.25.0'}, {'fixed': '0.25.4'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'rusqlite'}, 'ecosystem_spe... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45716'}, {'type': 'WEB', 'url': 'https://github.com/rusqlite/rusqlite/issues/1048'}, {'type': 'PACKAGE', 'url': 'https://github.com/rusqlite/rusqlite'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/rusql... | {'cwe_ids': ['CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T21:16:15Z', 'nvd_published_at': '2021-12-26T22:15:00Z'} |
1.4.0 | GHSA-5rrq-pxf6-6jx5 | 2022-01-07T22:20:53Z | 2022-01-08T00:22:42Z | null | [] | Prototype Pollution in node-forge debug API. | ### Impact
The `forge.debug` API had a potential prototype pollution issue if called with untrusted input. The API was only used for internal debug purposes in a safe way and never documented or advertised. It is suspected that uses of this API, if any exist, would likely not have used untrusted inputs in a vulnerable... | [] | [{'package': {'ecosystem': 'npm', 'name': 'node-forge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/digitalbazaar/forge/security/advisories/GHSA-5rrq-pxf6-6jx5'}, {'type': 'PACKAGE', 'url': 'https://github.com/digitalbazaar/forge'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T22:20:53Z', 'nvd_published_at': None} |
1.4.0 | GHSA-p4cr-64x4-f92f | 2022-01-07T16:21:25Z | 2022-01-06T22:17:23Z | null | ['CVE-2020-36514'] | Use of Uninitialized Resource in acc_reader. | An issue was discovered in the acc_reader crate through 2020-12-27 for Rust. fill_buf may read from uninitialized memory locations. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'acc_reader'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36514'}, {'type': 'WEB', 'url': 'https://github.com/netvl/acc_reader/issues/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/netvl/acc_reader'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/acc_reader... | {'cwe_ids': ['CWE-908'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T18:14:54Z', 'nvd_published_at': '2021-12-27T00:15:00Z'} |
1.4.0 | GHSA-85rq-hp8x-ghjq | 2023-05-23T18:40:48Z | 2022-01-13T00:01:04Z | null | ['CVE-2022-20613'] | Cross-Site Request Forgery in Jenkins Mailer Plugin | Jenkins Mailer Plugin prior to 408.vd726a_1130320 and 1.34.2 does not perform a permission check in a method implementing form validation.
This allows attackers with Overall/Read access to use the DNS used by the Jenkins instance to resolve an attacker-specified hostname.
Additionally, this form validation method doe... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:mailer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '391.ve4a38c1bcf4b'}, {'fixed': '408.vd726a'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:mailer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduce... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-20613'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/mailer-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2163'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr20... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:50:18Z', 'nvd_published_at': '2022-01-12T20:15:00Z'} |
1.4.0 | GHSA-gjm5-83cw-p3p2 | 2022-01-11T18:11:48Z | 2022-01-12T22:59:13Z | null | ['CVE-2021-23568'] | Prototype Pollution in extend2 | The package extend2 before 1.0.1 are vulnerable to Prototype Pollution via the extend function due to unsafe recursive merge. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'extend2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23568'}, {'type': 'WEB', 'url': 'https://github.com/eggjs/extend2/pull/2'}, {'type': 'WEB', 'url': 'https://github.com/eggjs/extend2/commit/aa332a59116c8398976434b57ea477c6823054f8'}, {'type': 'PACKAGE', 'url': 'https://github.com/eggjs/extend2'}, ... | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-11T18:11:48Z', 'nvd_published_at': '2022-01-10T14:10:00Z'} |
1.4.0 | GHSA-rq96-qhc5-vm4r | 2022-01-04T20:18:58Z | 2022-01-05T17:33:32Z | null | ['CVE-2021-44145'] | Exposure of Sensitive Information to an Unauthorized Actor in Apache NiFi | In the TransformXML processor of Apache NiFi before 1.15.1 an authenticated user could configure an XSLT file which, if it included malicious external entity calls, may reveal sensitive information. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44145'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security.html#1.15.1-vulnerabilities'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/12/17/1'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-04T20:18:58Z', 'nvd_published_at': '2021-12-17T09:15:00Z'} |
1.4.0 | GHSA-cxm3-v4mv-6mh8 | 2023-09-12T19:28:09Z | 2022-01-28T22:04:11Z | null | ['CVE-2021-4103'] | vditor Vulnerable to Cross-site Scripting in SVG events | vditor does not filter user input in SVG events, leading to XSS
### PoC
```html
</a>
<svg><animate onbegin=alert(11) attributeName=x dur=1s>
``` | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'vditor'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4103'}, {'type': 'WEB', 'url': 'https://github.com/Vanessa219/vditor/issues/1133'}, {'type': 'WEB', 'url': 'https://github.com/vanessa219/vditor/commit/8d4d0889dd72b2f839e93a49db3da3a370416c7d'}, {'type': 'PACKAGE', 'url': 'https://github.com/vanes... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-28T21:55:58Z', 'nvd_published_at': '2022-01-23T02:15:00Z'} |
1.4.0 | GHSA-jpxj-vgq5-prjc | 2022-04-29T04:27:21Z | 2022-01-13T00:01:03Z | null | ['CVE-2022-20617'] | OS command execution vulnerability in Docker Commons Plugin | Jenkins Docker Commons Plugin 1.17 and earlier does not sanitize the name of an image or a tag, resulting in an OS command execution vulnerability exploitable by attackers with Item/Configure permission or able to control the contents of a previously configured job's SCM repository. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:docker-commons'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.18'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-20617'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/docker-commons-plugin'}, {'type': 'WEB', 'url': 'https://plugins.jenkins.io/docker-commons'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-18... | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-29T04:27:21Z', 'nvd_published_at': '2022-01-12T20:15:00Z'} |
1.4.0 | GHSA-7q8g-gpfp-v8gx | 2021-07-28T18:31:48Z | 2022-01-06T20:40:58Z | null | ['CVE-2020-1942'] | Insertion of Sensitive Information into Log File in Apache NiFi | In Apache NiFi 0.0.1 to 1.11.0, the flow fingerprint factory generated flow fingerprints which included sensitive property descriptor values. In the event a node attempted to join a cluster and the cluster flow was not inheritable, the flow fingerprint of both the cluster and local flow was printed, potentially contain... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi-framework-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.1'}, {'fixed': '1.12.0-RC1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.11.0'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi-... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1942'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi/pull/4028'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi/commit/95746d346cddbd6134c4b28fdc39d5813a626f97'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi/commit/d7c2... | {'cwe_ids': ['CWE-200', 'CWE-532'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T15:49:09Z', 'nvd_published_at': '2020-02-11T21:15:00Z'} |
1.4.0 | GHSA-w6rp-4vj7-v2m8 | 2022-01-10T21:46:05Z | 2022-01-08T00:31:49Z | null | ['CVE-2022-22111'] | Missing Authorization in DayByDay CRM | In DayByDay CRM, version 2.2.0 is vulnerable to missing authorization. Any application user in the application who has update user permission enabled is able to change the password of other users, including the administrator’s. This allows the attacker to gain access to the highest privileged user in the application. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'bottelet/flarepoint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22111'}, {'type': 'WEB', 'url': 'https://github.com/Bottelet/DaybydayCRM/commit/fe842ea5ede237443f1f45a99aeb839133115d8b'}, {'type': 'PACKAGE', 'url': 'https://github.com/Bottelet/DaybydayCRM'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftwa... | {'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T19:55:18Z', 'nvd_published_at': '2022-01-05T15:15:00Z'} |
1.4.0 | GHSA-hw3m-8h25-8frw | 2022-01-07T22:53:55Z | 2022-01-08T00:42:59Z | null | ['CVE-2021-45456'] | Command Injection in Apache Kylin | Apache kylin checks the legitimacy of the project before executing some commands with the project name passed in by the user. There is a mismatch between what is being checked and what is being used as the shell command argument in DiagnosisService. This may cause an illegal project name to pass the check and perform t... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.kylin:kylin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45456'}, {'type': 'WEB', 'url': 'https://github.com/apache/kylin/pull/1781'}, {'type': 'WEB', 'url': 'https://github.com/apache/kylin/commit/f4daf14dde99b934c92ce2c832509f24342bc845'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/kylin'}, ... | {'cwe_ids': ['CWE-77'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T22:48:38Z', 'nvd_published_at': '2022-01-06T13:15:00Z'} |
1.4.0 | GHSA-qv7g-j98v-8pp7 | 2022-01-04T17:51:41Z | 2022-01-06T18:34:35Z | null | ['CVE-2021-41236'] | XSS vulnerability on email template preview page | ### Summary
Email template preview is vulnerable to XSS payload added to email template content. The attacker should have permission to create or edit an email template. For successful payload, execution attacked user should preview a vulnerable email template.
### Workarounds
There are no workarounds that address t... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'oro/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.21'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'oro/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.14'}]}]}, {'p... | [{'type': 'WEB', 'url': 'https://github.com/oroinc/platform/security/advisories/GHSA-qv7g-j98v-8pp7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41236'}, {'type': 'WEB', 'url': 'https://github.com/oroinc/platform/commit/2a089c971fc70bc63baf8770d29ee515ce5a415a'}, {'type': 'PACKAGE', 'url': ... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-04T17:51:41Z', 'nvd_published_at': '2022-01-04T19:15:00Z'} |
1.4.0 | GHSA-566m-qj78-rww5 | 2023-09-08T19:35:12Z | 2022-01-07T00:21:36Z | null | ['CVE-2021-23382'] | Regular Expression Denial of Service in postcss | The package postcss versions before 7.0.36 or between 8.0.0 and 8.2.13 are vulnerable to Regular Expression Denial of Service (ReDoS) via getAnnotationURL() and loadAnnotation() in lib/previous-map.js. The vulnerable regexes are caused mainly by the sub-pattern
```regex
\/\*\s* sourceMappingURL=(.*)
```
### PoC
```js... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'postcss'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.2.13'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'postcss'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'ty... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23382'}, {'type': 'WEB', 'url': 'https://github.com/postcss/postcss/commit/2b1d04c867995e55124e0a165b7c6622c1735956'}, {'type': 'WEB', 'url': 'https://github.com/postcss/postcss/releases/tag/7.0.36'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SN... | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T21:23:19Z', 'nvd_published_at': '2021-04-26T16:15:00Z'} |
1.4.0 | GHSA-2rxc-8f9w-fjq8 | 2023-06-13T20:24:32Z | 2022-01-06T22:14:13Z | null | ['CVE-2021-45694'] | Window may read from uninitialized memory locations in rdiff | An issue was discovered in the rdiff crate through version 0.1.2 for Rust. Window may read from uninitialized memory locations. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'rdiff'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45694'}, {'type': 'WEB', 'url': 'https://github.com/dyule/rdiff/issues/3'}, {'type': 'PACKAGE', 'url': 'https://github.com/dyule/rdiff'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/rdiff/RUSTSEC-2021-0... | {'cwe_ids': ['CWE-908'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T14:39:27Z', 'nvd_published_at': '2021-12-27T00:15:00Z'} |
1.4.0 | GHSA-w2pm-r78h-4m7v | 2022-01-05T17:39:12Z | 2022-01-06T23:13:42Z | null | ['CVE-2020-19316'] | OS Command Injection in Laravel Framework | OS Command injection vulnerability in function link in Filesystem.php in Laravel Framework before 5.8.17. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'laravel/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.8.17'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-19316'}, {'type': 'WEB', 'url': 'https://github.com/laravel/framework/commit/44c3feb604944599ad1c782a9942981c3991fa31'}, {'type': 'PACKAGE', 'url': 'https://github.com/laravel/framework'}, {'type': 'WEB', 'url': 'http://www.netbytesec.com/advisorie... | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T17:39:12Z', 'nvd_published_at': '2021-12-20T20:15:00Z'} |
1.4.0 | GHSA-cw4j-cf6c-mmfv | 2022-01-07T17:36:37Z | 2022-01-06T22:14:24Z | null | ['CVE-2021-45683'] | Use of Uninitialized Resource in binjs_io. | An issue was discovered in the binjs_io crate through 2021-01-03 for Rust. The Read method may read from uninitialized memory locations. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'binjs_io'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45683'}, {'type': 'WEB', 'url': 'https://github.com/binast/binjs-ref/issues/460'}, {'type': 'PACKAGE', 'url': 'https://github.com/Yoric/binjs-ref'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/binjs_io/... | {'cwe_ids': ['CWE-908'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T18:05:53Z', 'nvd_published_at': '2021-12-27T00:15:00Z'} |
1.4.0 | GHSA-3cf2-x423-x582 | 2022-02-09T18:28:05Z | 2022-01-06T21:12:50Z | null | ['CVE-2021-4024'] | Exposure of Sensitive Information to an Unauthorized Actor and Origin Validation Error in podman | A flaw was found in podman. The `podman machine` function (used to create and manage Podman virtual machine containing a Podman process) spawns a `gvproxy` process on the host system. The `gvproxy` API is accessible on port 7777 on all IP addresses on the host. If that port is open on the host's firewall, an attacker c... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/containers/podman/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4024'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2026675,'}, {'type': 'PACKAGE', 'url': 'https://github.com/containers/podman'}, {'type': 'WEB', 'url': 'https://github.com/containers/podman/releases/tag/v3.4.3'}, {'type':... | {'cwe_ids': ['CWE-200', 'CWE-346'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T17:44:04Z', 'nvd_published_at': '2021-12-23T20:15:00Z'} |
1.4.0 | GHSA-4jf5-jggp-g56j | 2021-03-22T23:14:16Z | 2022-01-06T20:23:05Z | null | ['CVE-2020-28452'] | Cross-Site Request Forgery in com.softwaremill.akka-http-session:core_2.12 | This affects the package com.softwaremill.akka-http-session:core_2.12 from 0 and before 0.6.1; all versions of package com.softwaremill.akka-http-session:core_2.11; the package com.softwaremill.akka-http-session:core_2.13 from 0 and before 0.6.1. CSRF protection can be bypassed by forging a request that contains the sa... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.softwaremill.akka-http-session:core_2.12'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.0'}, {'fixed': '0.6.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28452'}, {'type': 'WEB', 'url': 'https://github.com/softwaremill/akka-http-session/issues/77'}, {'type': 'WEB', 'url': 'https://github.com/softwaremill/akka-http-session/pull/79'}, {'type': 'WEB', 'url': 'https://github.com/softwaremill/akka-http-s... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T23:14:16Z', 'nvd_published_at': '2021-01-20T18:15:00Z'} |
1.4.0 | GHSA-7g7r-gr46-q4p5 | 2022-01-31T21:47:28Z | 2022-01-27T16:21:33Z | null | ['CVE-2022-0269'] | Cross-Site Request Forgery in yetiforce | Versions of yetiforce 6.3.0 and prior are subject to privilege escalation via a cross site request forgery bug. This allows an attacker to create a new admin account even with SameSite: Strict enabled. This vulnerability can be exploited by any user on the system including guest users. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'yetiforce/yetiforce-crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0269'}, {'type': 'WEB', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm/commit/298c7870e6fe4332d8aa1757a9c8d79f841389ff'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a0470915-f6df-45b8-b3a2-01aebe764df0'}, {'type': 'PACKAGE', 'url'... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-25T21:09:59Z', 'nvd_published_at': '2022-01-24T12:15:00Z'} |
1.4.0 | GHSA-hrgx-7j6v-xj82 | 2022-01-19T17:42:16Z | 2022-01-12T21:55:40Z | null | ['CVE-2022-0087'] | Reflected cross-site scripting (XSS) vulnerability | This security advisory relates to a capability for an attacker to exploit a reflected cross-site scripting vulnerability when using the `@keystone-6/auth` package.
#### Impact
The vulnerability can impact users of the administration user interface when following an untrusted link to the `signin` or `init` page.
This i... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': '@keystone-6/auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@keystone-next/auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '37.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/security/advisories/GHSA-hrgx-7j6v-xj82'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0087'}, {'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/commit/96bf833a23b1a0a5d365cf394467a943cc481b38'}, {'type': 'PACKAGE', ... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-10T21:45:34Z', 'nvd_published_at': '2022-01-12T00:15:00Z'} |
1.4.0 | GHSA-hjgm-f7vx-m5g7 | 2021-05-25T19:50:23Z | 2022-01-06T19:44:49Z | null | ['CVE-2020-1964'] | Deserialization of Untrusted Data in Apache Heron | It was noticed that Apache Heron 0.20.2-incubating, Release 0.20.1-incubating, and Release v-0.20.0-incubating does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerabilities (CWE-502: Deserialization of Untrusted Data). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.heron:heron-simulator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.20.0-incubating'}, {'fixed': '0.20.3-incubating'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.20.2-incubating'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1964'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r16dd39f4180e4443ef4ca774a3a5a3d7ac69f91812c183ed2a99e959%40%3Cdev.heron.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd43ae18588fd7bdb375be63bc95... | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T19:50:23Z', 'nvd_published_at': '2020-04-16T19:15:00Z'} |
1.4.0 | GHSA-h3fg-h5v3-vf8m | 2023-05-04T19:59:15Z | 2022-01-06T18:33:44Z | null | ['CVE-2021-43846'] | CSRF forgery protection bypass in solidus_frontend | ### Impact
CSRF vulnerability that allows a malicious site to add an item to the user's cart without their knowledge.
All `solidus_frontend` versions are affected. If you're using your own storefront, please, follow along to make sure you're not affected.
To reproduce the issue:
- Pick the id for a variant with avai... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'solidus_frontend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.14'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'solidus_frontend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.5'}]}]}, {... | [{'type': 'WEB', 'url': 'https://github.com/solidusio/solidus/security/advisories/GHSA-h3fg-h5v3-vf8m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43846'}, {'type': 'WEB', 'url': 'https://github.com/solidusio/solidus/commit/4d17cacf066d9492fc04eb3a0b16084b47376d81'}, {'type': 'WEB', 'url': ... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-04T20:24:16Z', 'nvd_published_at': '2021-12-20T22:15:00Z'} |
1.4.0 | GHSA-c6h4-gc3f-hgjq | 2022-01-13T18:28:50Z | 2022-01-06T21:58:56Z | null | ['CVE-2021-23574'] | Prototype Pollution in js-data | All versions of package js-data are vulnerable to Prototype Pollution via the deepFillIn and the set functions. This is an incomplete fix of [CVE-2020-28442](https://snyk.io/vuln/SNYK-JS-JSDATA-1023655). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'js-data'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23574'}, {'type': 'WEB', 'url': 'https://github.com/js-data/js-data/issues/576'}, {'type': 'WEB', 'url': 'https://github.com/js-data/js-data/issues/577'}, {'type': 'PACKAGE', 'url': 'https://github.com/js-data/js-data'}, {'type': 'WEB', 'url': 'htt... | {'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T20:22:05Z', 'nvd_published_at': '2021-12-24T20:15:00Z'} |
1.4.0 | GHSA-fpj7-9xm6-8hgr | 2023-05-24T14:00:21Z | 2022-01-21T23:38:30Z | null | ['CVE-2022-23106'] | Observable Discrepancy and Observable Timing Discrepancy in Jenkins Configuration as Code Plugin | Jenkins Configuration as Code Plugin prior to 1.55.1, 1.54.1, 1.53.1, and 1.47.1 does not use a constant-time comparison when checking whether two authentication tokens are equal.
This could potentially allow attackers to use statistical methods to obtain a valid authentication token.
Configuration as Code Plugin 1.5... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins:configuration-as-code'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.55'}, {'fixed': '1.55.1'}]}], 'versions': ['1.55']}, {'package': {'ecosystem': 'Maven', 'name': 'io.jenkins:configuration-as-code'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23106'}, {'type': 'WEB', 'url': 'https://github.com/CVEProject/cvelist/blob/00bfb5abeecc9f553a2f42954ee540e493498ee9/2022/23xxx/CVE-2022-23106.json'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/configuration-as-code-plugin'}, {'type':... | {'cwe_ids': ['CWE-203', 'CWE-208'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-01-20T14:42:40Z', 'nvd_published_at': '2022-01-12T20:15:00Z'} |
1.4.0 | GHSA-wrvw-hg22-4m67 | 2023-01-24T15:45:26Z | 2022-01-07T22:31:44Z | null | ['CVE-2021-22569'] | A potential Denial of Service issue in protobuf-java | ## Summary
A potential Denial of Service issue in protobuf-java was discovered in the parsing procedure for binary data.
Reporter: [OSS-Fuzz](https://github.com/google/oss-fuzz)
Affected versions: All versions of Java Protobufs (including Kotlin and JRuby) prior to the versions listed below. Protobuf "javalite" user... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.google.protobuf:protobuf-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.16.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'google-protobuf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.19.2... | [{'type': 'WEB', 'url': 'https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-wrvw-hg22-4m67'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22569'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39330'}, {'type': 'WEB', 'url': 'https://cloud.goo... | {'cwe_ids': ['CWE-696'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T22:23:14Z', 'nvd_published_at': '2022-01-10T14:10:00Z'} |
1.4.0 | GHSA-c38m-7h53-g9v4 | 2022-03-30T21:13:23Z | 2022-01-21T23:36:47Z | null | ['CVE-2021-40525'] | Path traversal in Apache James | Apache James ManagedSieve implementation alongside with the file storage for sieve scripts is vulnerable to path traversal, allowing reading and writing any file. This vulnerability had been patched in Apache James 3.6.1 and higher. We recommend the upgrade. Distributed and Cassandra based products are also not impacte... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.james:james-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40525'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/james-project'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2022/01/04/4'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/01/04/4'}, {... | {'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-13T18:51:30Z', 'nvd_published_at': '2022-01-04T09:15:00Z'} |
1.4.0 | GHSA-w9p3-5cr8-m3jj | 2022-02-23T22:07:51Z | 2022-01-21T23:27:14Z | null | ['CVE-2022-23302'] | Deserialization of Untrusted Data in Log4j 1.x | JMSSink in all versions of Log4j 1.x is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration or if the configuration references an LDAP service the attacker has access to. The attacker can provide a TopicConnectionFactoryBindingName configuration causing JMSSink ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'log4j:log4j'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.17'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23302'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/logging-log4j1'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/bsr3l5qz4g0myrjhy9h67bcxodpkwj4w'}, {'type': 'WEB', 'url': 'https://logging.apache.org/log4j/1.2/index.html'}, ... | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T22:31:40Z', 'nvd_published_at': '2022-01-18T16:15:00Z'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.