schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
8
154
details
stringlengths
31
19.1k
severity
stringlengths
2
92
affected
stringlengths
75
28.5k
references
stringlengths
79
7.48k
database_specific
stringlengths
131
196
1.4.0
GHSA-g644-pr5v-vppf
2023-09-12T15:04:25Z
2022-01-06T20:41:02Z
null
['CVE-2020-9486']
Insertion of Sensitive Information into Log File in Apache NiFi Stateless
In Apache NiFi 1.10.0 to 1.11.4, the NiFi stateless execution engine produced log output which included sensitive property values. When a flow was triggered, the flow definition configuration JSON was printed, potentially containing sensitive values in plaintext.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi-stateless'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed': '1.12.0-RC1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.11.4'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-9486'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi/commit/148537d64a017b73160b0d49943183c18f883ab0'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/nifi'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security#CVE-2020-9486'}...
{'cwe_ids': ['CWE-532'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T16:28:50Z', 'nvd_published_at': '2020-10-01T20:15:00Z'}
1.4.0
GHSA-65fg-84f6-3jq3
2022-02-24T12:05:54Z
2022-01-21T23:26:47Z
null
['CVE-2022-23305']
SQL Injection in Log4j 1.2.x
By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as a configuration parameter where the values to be inserted are converters from PatternLayout. The message converter, %m, is likely to always be included. This allows attackers to manipulate the SQL by entering crafted strings into input fields or hea...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'log4j:log4j'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.17'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23305'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/logging-log4j1'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/pt6lh3pbsvxqlwlp4c5l798dv2hkc85y'}, {'type': 'WEB', 'url': 'https://logging.apache.org/log4j/1.2/index.html'}, ...
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T22:31:49Z', 'nvd_published_at': '2022-01-18T16:15:00Z'}
1.4.0
GHSA-cjg2-2fjg-fph4
2022-01-14T19:58:51Z
2022-01-14T21:03:36Z
null
['CVE-2022-21685']
Integer underflow in Frontier
### Impact A bug in Frontier's MODEXP precompile implementation can cause an integer underflow in certain conditions. This will cause a node crash for debug builds. For release builds (and production WebAssembly binaries), the impact is limited as it can only cause a normal EVM out-of-gas. It is recommended that you a...
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'frontier'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/paritytech/frontier/security/advisories/GHSA-cjg2-2fjg-fph4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21685'}, {'type': 'WEB', 'url': 'https://github.com/paritytech/frontier/pull/549'}, {'type': 'WEB', 'url': 'https://github.com/paritytech/fron...
{'cwe_ids': ['CWE-191'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-14T19:58:51Z', 'nvd_published_at': '2022-01-14T17:15:00Z'}
1.4.0
GHSA-ghhm-xrwp-75m9
2022-01-07T22:38:34Z
2022-01-08T00:34:12Z
null
['CVE-2021-4194']
bookstack is vulnerable to Improper Access Control
bookstack is vulnerable to Improper Access Control
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'ssddanbrown/bookstack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '21.12.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4194'}, {'type': 'WEB', 'url': 'https://github.com/bookstackapp/bookstack/commit/cb0d674a71449de883713db2fcdccb6e108992ad'}, {'type': 'PACKAGE', 'url': 'https://github.com/bookstackapp/bookstack'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties...
{'cwe_ids': ['CWE-284', 'CWE-668', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T22:38:34Z', 'nvd_published_at': '2022-01-06T18:15:00Z'}
1.4.0
GHSA-87xh-9q6h-r5cc
2022-01-07T16:08:56Z
2022-01-06T22:00:49Z
null
['CVE-2021-45715']
Use After Free in rusqlite
An issue was discovered in the rusqlite crate 0.25.x before 0.25.4 and 0.26.x before 0.26.2 for Rust. create_window_function has a use-after-free.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'rusqlite'}, 'ecosystem_specific': {'affected_functions': ['rusqlite::Connection::create_window_function']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.25.0'}, {'fixed': '0.25.4'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'rusqlite'}, 'ecosyst...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45715'}, {'type': 'WEB', 'url': 'https://github.com/rusqlite/rusqlite/issues/1048'}, {'type': 'PACKAGE', 'url': 'https://github.com/rusqlite/rusqlite'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/rusql...
{'cwe_ids': ['CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T21:10:30Z', 'nvd_published_at': '2021-12-26T22:15:00Z'}
1.4.0
GHSA-jrh2-hc4r-7jwx
2022-02-14T22:18:43Z
2022-01-12T19:21:04Z
null
['CVE-2021-45452']
Directory-traversal in Django
Storage.save in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1 allows directory traversal if crafted filenames are directly passed to it.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.26'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.11'}]}]}, {'package': {'ecosystem':...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45452'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/4cb35b384ceef52123fc66411a73c36a706825e1'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/8d2f7cff76200cbd2337b2cf1707e383eb1fb54b'}, {'type': 'WEB', 'url': ...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-12T19:17:35Z', 'nvd_published_at': '2022-01-05T00:15:00Z'}
1.4.0
GHSA-x9r5-jxvq-4387
2022-08-11T19:20:18Z
2022-01-06T22:48:56Z
null
['CVE-2021-43862']
jquery.terminal self XSS on user input
### Impact This is low impact and limited XSS, because code for XSS payload is always visible, but attacker can use other techniques to hide the code the victim sees. Also if the application use execHash option and execute code from URL the attacker can use this URL to execute his code. The scope is limited because th...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'jquery.terminal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.31.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/jcubic/jquery.terminal/security/advisories/GHSA-x9r5-jxvq-4387'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43862'}, {'type': 'WEB', 'url': 'https://github.com/jcubic/jquery.terminal/issues/727'}, {'type': 'WEB', 'url': 'https://github.com/jcubic/...
{'cwe_ids': ['CWE-79', 'CWE-80'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T19:18:42Z', 'nvd_published_at': '2021-12-30T15:15:00Z'}
1.4.0
GHSA-q656-g2x3-8cgh
2022-01-07T23:21:51Z
2022-01-08T00:43:01Z
null
['CVE-2021-31522']
Kylin can receive user input and load any class through Class.forName(...).
Kylin can receive user input and load any class through Class.forName(...). This issue affects Apache Kylin 2 version 2.6.6 and prior versions; Apache Kylin 3 version 3.1.2 and prior versions; Apache Kylin 4 version 4.0.0 and prior versions.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.kylin:kylin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.kylin:kylin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.1'}]}]...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31522'}, {'type': 'WEB', 'url': 'https://github.com/apache/kylin/pull/1695'}, {'type': 'WEB', 'url': 'https://github.com/apache/kylin/pull/1763'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/kylin'}, {'type': 'WEB', 'url': 'https://lists....
{'cwe_ids': ['CWE-470'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T23:21:51Z', 'nvd_published_at': '2022-01-06T13:15:00Z'}
1.4.0
GHSA-w9m4-7w72-r766
2022-01-19T19:04:59Z
2022-01-21T23:20:22Z
null
['CVE-2022-21691']
Improper Access Control in Onionshare
Between September 26, 2021 and October 8, 2021, [Radically Open Security](https://www.radicallyopensecurity.com/) conducted a penetration test of OnionShare 2.4, funded by the Open Technology Fund's [Red Team lab](https://www.opentech.fund/labs/red-team-lab/). This is an issue from that penetration test. - Vulnerabili...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'onionshare-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3'}, {'fixed': '2.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/onionshare/onionshare/security/advisories/GHSA-w9m4-7w72-r766'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21691'}, {'type': 'PACKAGE', 'url': 'https://github.com/onionshare/onionshare'}, {'type': 'WEB', 'url': 'https://github.com/onionshare/onion...
{'cwe_ids': ['CWE-306'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T19:04:59Z', 'nvd_published_at': '2022-01-18T22:15:00Z'}
1.4.0
GHSA-p46c-w9m3-7qr2
2023-06-13T18:08:03Z
2022-01-06T22:18:35Z
null
['CVE-2021-45684']
Use of Uninitialized Resource in flumedb.
Affected versions of this crate passes an uninitialized buffer to a user-provided Read implementation. There are two of such cases (go_offset_log::read_entry() & offset_log::read_entry()). Arbitrary Read implementations can read from the uninitialized buffer (memory exposure) and also can return incorrect number of by...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'flumedb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45684'}, {'type': 'WEB', 'url': 'https://github.com/sunrise-choir/flumedb-rs/issues/10'}, {'type': 'WEB', 'url': 'https://github.com/sunrise-choir/flumedb-rs/pull/12'}, {'type': 'WEB', 'url': 'https://github.com/sunrise-choir/flumedb-rs/commit/14b7...
{'cwe_ids': ['CWE-908'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T18:10:24Z', 'nvd_published_at': '2021-12-27T00:15:00Z'}
1.4.0
GHSA-4qr3-m7ww-hh9g
2022-01-06T20:21:05Z
2022-01-06T22:01:40Z
null
['CVE-2021-45717']
Use After Free in rusqlite
An issue was discovered in the rusqlite crate 0.25.x before 0.25.4 and 0.26.x before 0.26.2 for Rust. commit_hook has a use-after-free.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'rusqlite'}, 'ecosystem_specific': {'affected_functions': ['rusqlite::Connection::commit_hook']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.25.0'}, {'fixed': '0.25.4'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'rusqlite'}, 'ecosystem_specific...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45717'}, {'type': 'WEB', 'url': 'https://github.com/rusqlite/rusqlite/issues/1048'}, {'type': 'PACKAGE', 'url': 'https://github.com/rusqlite/rusqlite'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/rusql...
{'cwe_ids': ['CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T21:15:20Z', 'nvd_published_at': '2021-12-26T22:15:00Z'}
1.4.0
GHSA-wrx7-qgmj-mf2q
2022-01-07T23:16:38Z
2022-01-08T00:43:04Z
null
['CVE-2021-27738']
Server-Side Request Forgery in Apache Kylin
All request mappings in `StreamingCoordinatorController.java` handling `/kylin/api/streaming_coordinator/*` REST API endpoints did not include any security checks, which allowed an unauthenticated user to issue arbitrary requests, such as assigning/unassigning of streaming cubes, creation/modification and deletion of r...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.kylin:kylin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27738'}, {'type': 'WEB', 'url': 'https://github.com/apache/kylin/pull/1646'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/kylin'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/vkohh0to2vzwymyb2x13fszs3cs3vd70'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T23:16:38Z', 'nvd_published_at': '2022-01-06T13:15:00Z'}
1.4.0
GHSA-g23v-p5jq-jvh4
2021-06-24T13:23:03Z
2022-01-06T18:37:14Z
null
['CVE-2021-30468']
Infinite loop in Apache CFX
A vulnerability in the JsonMapObjectReaderWriter of Apache CXF allows an attacker to submit malformed JSON to a web service, which results in the thread getting stuck in an infinite loop, consuming CPU indefinitely. This issue affects Apache CXF versions prior to 3.4.4; Apache CXF versions prior to 3.3.11.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:apache-cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.4.0'}, {'fixed': '3.4.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:apache-cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3....
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-30468'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3f46ae38e4a6e80c069cdb320e0ce831b0a21a12ef0cc92c0943f34a@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4771084730c4cf6e59eda60b...
{'cwe_ids': ['CWE-400', 'CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-17T18:54:46Z', 'nvd_published_at': '2021-06-16T12:15:00Z'}
1.4.0
GHSA-vv38-4xcj-q4rw
2022-01-25T20:49:39Z
2022-01-21T23:52:00Z
null
['CVE-2021-42357']
Cross-site Scripting in Apache Knox SSO
When using Apache Knox SSO prior to 1.6.1, a request could be crafted to redirect a user to a malicious page due to improper URL parsing. A request that included a specially crafted request parameter could be used to redirect the user to a page controlled by an attacker. This URL would need to be presented to the user ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.knox:gateway-service-knoxsso'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42357'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/b7v5dkpyqb51nw0lvz4cybhgrfhk1g7j'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/01/17/2'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T14:11:29Z', 'nvd_published_at': '2022-01-17T20:15:00Z'}
1.4.0
GHSA-pqhq-xx62-2v2p
2021-03-26T22:28:03Z
2022-01-06T20:35:39Z
null
['CVE-2020-1933']
Cross-site scripting in Apache NiFi
A XSS vulnerability was found in Apache NiFi 1.0.0 to 1.10.0. Malicious scripts could be injected to the UI through action by an unaware authenticated user in Firefox. Did not appear to occur in other browsers.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.11.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.10.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1933'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi/pull/3991'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security.html#CVE-2020-1933'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-26T22:28:03Z', 'nvd_published_at': '2020-01-28T01:15:00Z'}
1.4.0
GHSA-9cq5-xgg4-x477
2022-02-03T21:37:09Z
2022-01-27T00:01:15Z
null
['CVE-2022-0362']
SQL Injection in showdoc
Showdoc verions 2.10.2 and prior is vulnerable to SQL injection. A patch is available in the `master` branch of the repository.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.10.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0362'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/2b34e267e4186125f99bfa420140634ad45801fb'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/e7c72417-eb8f...
{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T21:37:09Z', 'nvd_published_at': '2022-01-26T13:15:00Z'}
1.4.0
GHSA-fh56-85cw-5pq6
2022-08-11T22:08:14Z
2022-01-21T23:27:45Z
null
['CVE-2021-45958']
UltraJSON vulnerable to Out-of-bounds Write
UltraJSON (aka ujson) 1.34 through 5.1.0 has a stack-based buffer overflow in Buffer_AppendIndentUnchecked (called from encode).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ujson'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.34'}, {'fixed': '5.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45958'}, {'type': 'WEB', 'url': 'https://github.com/ultrajson/ultrajson/issues/501'}, {'type': 'WEB', 'url': 'https://github.com/ultrajson/ultrajson/issues/502#issuecomment-1031747284'}, {'type': 'WEB', 'url': 'https://github.com/ultrajson/ultrajso...
{'cwe_ids': ['CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-12T19:29:48Z', 'nvd_published_at': '2022-01-01T00:15:00Z'}
1.4.0
GHSA-p62j-hrxm-xcxf
2022-01-06T19:44:35Z
2022-01-06T23:53:35Z
null
[]
Book page text, count, and author/title length is not limited in PocketMine-MP
### Impact Players can fill book pages with as many characters as they like; the server does not check this. In addition, the maximum of 50 pages is also not enforced, meaning that players can create "book bombs". This causes a variety of problems: - Oversized NBT on the wire costing excess bandwidth for server and cl...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pocketmine/pocketmine-mp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.26.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'pocketmine/pocketmine-mp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed'...
[{'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-p62j-hrxm-xcxf'}, {'type': 'PACKAGE', 'url': 'https://github.com/pmmp/PocketMine-MP'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T19:44:35Z', 'nvd_published_at': None}
1.4.0
GHSA-xp7p-3gx7-j6wx
2022-01-25T19:12:24Z
2022-01-21T23:44:15Z
null
['CVE-2021-4171']
calibre-web is vulnerable to Business Logic Errors
calibre-web is vulnerable to Business Logic Errors
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'calibreweb'}, 'ecosystem_specific': {'affected_functions': ['calibreweb.cps.shelf.check_shelf_is_unique', 'calibreweb.cps.shelf.create_edit_shelf']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.15'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4171'}, {'type': 'WEB', 'url': 'https://github.com/janeczku/calibre-web/commit/3e0d8763c377d2146462811e3e4ccf13f0d312ce'}, {'type': 'PACKAGE', 'url': 'https://github.com/janeczku/calibre-web'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/111...
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T15:03:22Z', 'nvd_published_at': '2022-01-17T10:15:00Z'}
1.4.0
GHSA-884c-9wwh-9p6v
2022-11-29T21:21:52Z
2022-01-13T00:00:53Z
null
['CVE-2022-23111']
CSRF vulnerability and missing permission checks in Jenkins Publish Over SSH Plugin
A cross-site request forgery (CSRF) vulnerability in Jenkins Publish Over SSH Plugin 1.22 and earlier allows attackers to connect to an attacker-specified SSH server using attacker-specified credentials.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:publish-over-ssh'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.23'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23111'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/publish-over-ssh-plugin'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/publish-over-ssh-plugin/releases/tag/publish-over-ssh-1.23'}, {'type': 'WEB', 'url': 'https://www.jenk...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T21:21:52Z', 'nvd_published_at': '2022-01-12T20:15:00Z'}
1.4.0
GHSA-vj9x-w7ch-f46p
2022-01-19T14:22:43Z
2022-01-21T23:50:08Z
null
['CVE-2022-0258']
pimcore is vulnerable to SQL Injection
pimcore is vulnerable to Improper Neutralization of Special Elements used in an SQL Command
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.2.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0258'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/66281c12479dc01a06258d8533eaddfb1770d5bd'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0df891e4-6412...
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T14:22:43Z', 'nvd_published_at': '2022-01-17T16:15:00Z'}
1.4.0
GHSA-3269-x4pw-vffg
2021-07-28T22:42:20Z
2022-01-07T00:21:08Z
null
['CVE-2020-7631']
OS Command Injection in diskusage-ng
diskusage-ng through 0.2.4 is vulnerable to Command Injection.It allows execution of arbitrary commands via the path argument.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'diskusage-ng'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7631'}, {'type': 'WEB', 'url': 'https://github.com/iximiuz/node-diskusage-ng/blob/master/lib/posix.js#L11'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DISKUSAGENG-564425'}]
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T22:33:53Z', 'nvd_published_at': '2020-04-06T13:15:00Z'}
1.4.0
GHSA-wc6f-cjcp-cc33
2021-05-25T20:27:25Z
2022-01-06T19:45:30Z
null
['CVE-2020-1952']
Improper Certificate Validation in Apache IoTDB
An issue was found in Apache IoTDB .9.0 to 0.9.1 and 0.8.0 to 0.8.2. When starting IoTDB, the JMX port 31999 is exposed with no certification.Then, clients could execute code remotely.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.iotdb:iotdb-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1952'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3d2ff899ead64d2952fdc1fbb1f520ca42011ed2b4c7f786e921f6b9%40%3Cdev.iotdb.apache.org%3E'}]
{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T20:27:25Z', 'nvd_published_at': '2020-04-27T17:15:00Z'}
1.4.0
GHSA-8rh6-h94m-vj54
2022-01-04T16:55:20Z
2022-01-07T00:01:11Z
null
['CVE-2021-41500']
Incorrect Comparison in cvxopt
Incomplete string comparison vulnerability exits in cvxopt.org cvxop <= 1.2.6 in APIs (cvxopt.cholmod.diag, cvxopt.cholmod.getfactor, cvxopt.cholmod.solve, cvxopt.cholmod.spsolve), which allows attackers to conduct Denial of Service attacks by construct fake Capsule objects.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'cvxopt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41500'}, {'type': 'WEB', 'url': 'https://github.com/cvxopt/cvxopt/issues/193'}, {'type': 'WEB', 'url': 'https://github.com/cvxopt/cvxopt/commit/d5a21cf1da62e4269176384b1ff62edac5579f94'}, {'type': 'PACKAGE', 'url': 'https://github.com/cvxopt/cvxopt...
{'cwe_ids': ['CWE-697'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-04T16:55:20Z', 'nvd_published_at': '2021-12-17T21:15:00Z'}
1.4.0
GHSA-v362-2895-h9r2
2023-06-13T18:38:43Z
2022-01-07T22:37:01Z
null
['CVE-2021-45720']
Use After Free in lru
Lru crate has two functions for getting an iterator. Both iterators give references to key and value. Calling specific functions, like pop(), will remove and free the value, and but it's still possible to access the reference of value which is already dropped causing use after free.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'lru'}, 'ecosystem_specific': {'affected_functions': ['lru::LruCache::iter', 'lru::LruCache::iter_mut']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45720'}, {'type': 'WEB', 'url': 'https://github.com/jeromefroe/lru-rs/issues/120'}, {'type': 'PACKAGE', 'url': 'https://github.com/jeromefroe/lru-rs.git'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/lr...
{'cwe_ids': ['CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T20:44:44Z', 'nvd_published_at': '2021-12-26T22:15:00Z'}
1.4.0
GHSA-jrfj-98qg-qjgv
2023-01-24T15:46:01Z
2022-01-27T14:42:37Z
null
['CVE-2022-23837']
Denial of service in sidekiq
In `api.rb` in Sidekiq before 6.4.0 and 5.2.10, there is no limit on the number of days when requesting stats for the graph. This overloads the system, affecting the Web UI, and makes it unavailable to users.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'sidekiq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.4.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sidekiq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23837'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/pull/495'}, {'type': 'WEB', 'url': 'https://github.com/mperham/sidekiq/commit/7785ac1399f1b28992adb56055f6acd88fd1d956'}, {'type': 'WEB', 'url': 'https://github.com/TUTUMS...
{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-24T22:50:23Z', 'nvd_published_at': '2022-01-21T21:15:00Z'}
1.4.0
GHSA-jrmq-rv9w-63rv
2022-01-19T22:24:06Z
2022-01-21T23:34:24Z
null
['CVE-2022-22690']
Umbraco ApplicationURL Overwrite
Within the Umbraco CMS, a configuration element named "UmbracoApplicationUrl" (or just "ApplicationUrl") is used whenever application code needs to build a URL pointing back to the site. For example, when a user resets their password and the application builds a password reset URL or when the administrator invites user...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Umbraco.Cms.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22690'}, {'type': 'WEB', 'url': 'https://appcheck-ng.com/umbraco-applicationurl-overwrite-persistent-password-reset-poison-cve-2022-22690-cve-2022-22691/'}, {'type': 'PACKAGE', 'url': 'https://github.com/umbraco/Umbraco-CMS'}]
{'cwe_ids': ['CWE-444'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T22:24:06Z', 'nvd_published_at': '2022-01-18T17:15:00Z'}
1.4.0
GHSA-gp6j-vx54-5pmf
2022-01-04T22:41:52Z
2022-01-06T18:30:26Z
null
[]
Incorrect validation of parties IDs leaks secret keys in Secret-sharing scheme
# Summary In the threshold signature scheme, participants start by dividing secrets into shares using a secret sharing scheme. The Verifiable Secret Sharing scheme generates shares from the user’s IDs but does not properly validate them. Using a malicious ID will make other users reveal their secrets during the secret...
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/keep-network/keep-ecdsa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/keep-network/keep-ecdsa/security/advisories/GHSA-gp6j-vx54-5pmf'}, {'type': 'PACKAGE', 'url': 'https://github.com/keep-network/keep-ecdsa'}, {'type': 'WEB', 'url': 'https://github.com/keep-network/keep-ecdsa/releases/tag/v1.8.1'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-04T22:41:52Z', 'nvd_published_at': None}
1.4.0
GHSA-93pj-4p65-qmr9
2022-02-02T16:13:31Z
2022-01-28T22:07:40Z
null
['CVE-2022-0334']
Insufficient user authorization in Moodle
A flaw was found in Moodle in versions 3.11 to 3.11.4, 3.10 to 3.10.8, 3.9 to 3.9.11 and earlier unsupported versions. Insufficient capability checks could lead to users accessing their grade report for courses where they did not have the required gradereport/user:view capability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11'}, {'fixed': '3.11.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10'}, {'fixed': '3.10.8'}]}]}, {'p...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0334'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/1964d68f8500ea3c7b776fa8a2af6266ed109f84'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/6d18f136ae88ec97e351a723df570816a959ec68'}, {'type': 'WEB', 'url': '...
{'cwe_ids': ['CWE-668', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-26T22:48:21Z', 'nvd_published_at': '2022-01-25T20:15:00Z'}
1.4.0
GHSA-5hfj-r725-wpc4
2022-08-11T16:55:36Z
2022-01-14T21:08:26Z
null
['CVE-2021-32650']
october/system arbitrary code execution
### Impact Assuming an attacker with access to the backend is able to execute PHP code by using the theme import feature. This will bypass the safe mode feature that prevents PHP execution in the CMS templates. ### Patches Issue has been patched in Build 473 and v1.1.6 ### Workarounds Apply https://github.com/octo...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'october/system'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'october/system'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.473'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/octobercms/october/security/advisories/GHSA-5hfj-r725-wpc4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32650'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/october/commit/167b592eed291ae1563c8fcc5b9b34a03a300f26'}, {'type': 'PACKAGE', '...
{'cwe_ids': ['CWE-74', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-14T20:47:55Z', 'nvd_published_at': '2022-01-14T15:15:00Z'}
1.4.0
GHSA-544x-2jx9-4pfg
2022-02-04T13:51:18Z
2022-01-28T22:25:03Z
null
['CVE-2022-22932']
Path traversal in Apache Karaf
Apache Karaf obr:* commands and run goal on the karaf-maven-plugin have partial path traversal which allows to break out of expected folder. The risk is low as obr:* commands are not very used and the entry is set by user. This has been fixed in revision: https://gitbox.apache.org/repos/asf?p=karaf.git;h=36a2bc4 https:...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.karaf:apache-karaf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.karaf:apache-karaf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22932'}, {'type': 'WEB', 'url': 'https://github.com/apache/karaf/pull/1485'}, {'type': 'WEB', 'url': 'https://gitbox.apache.org/repos/asf?p=karaf.git;h=36a2bc4'}, {'type': 'WEB', 'url': 'https://gitbox.apache.org/repos/asf?p=karaf.git;h=52b70cf'}, ...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-27T23:10:36Z', 'nvd_published_at': '2022-01-26T11:15:00Z'}
1.4.0
GHSA-ff2r-xpwq-6whj
2023-06-13T17:10:49Z
2022-01-06T22:12:14Z
null
['CVE-2021-45689']
Use of Uninitialized Resource in gfx-auxil
Affected versions of this crate passes an uninitialized buffer to a user-provided Read implementation. Arbitrary Read implementations can read from the uninitialized buffer (memory exposure) and also can return incorrect number of bytes written to the buffer. Reading from uninitialized memory produces undefined values...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'gfx-auxil'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.10.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45689'}, {'type': 'WEB', 'url': 'https://github.com/gfx-rs/gfx/issues/3567'}, {'type': 'PACKAGE', 'url': 'https://github.com/gfx-rs/gfx'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/gfx-auxil/RUSTSEC-2...
{'cwe_ids': ['CWE-908'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T16:10:35Z', 'nvd_published_at': '2021-12-27T00:15:00Z'}
1.4.0
GHSA-m36x-mgfh-8g78
2023-07-07T16:28:46Z
2022-01-27T15:15:25Z
null
['CVE-2023-36474']
Subdomain Takeover in Interactsh server
A domain configured with interactsh server was vulnerable to subdomain takeover for specfic subdomain, i.e `app`, Interactsh server before `< 1.0.0` used to create cname entries for `app` pointing to `projectdiscovery.github.io` as default which intended to used for hosting interactsh [web client](https://github.com/pr...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/projectdiscovery/interactsh'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/projectdiscovery/interactsh/security/advisories/GHSA-m36x-mgfh-8g78'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36474'}, {'type': 'WEB', 'url': 'https://github.com/projectdiscovery/interactsh/issues/136'}, {'type': 'WEB', 'url': 'https://github.c...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-24T22:24:55Z', 'nvd_published_at': None}
1.4.0
GHSA-mh8g-8jwp-q6xw
2022-11-29T21:27:43Z
2022-01-13T00:00:53Z
null
['CVE-2022-23115']
CSRF vulnerability in Jenkins batch task Plugin
Cross-site request forgery (CSRF) vulnerabilities in Jenkins batch task Plugin 1.19 and earlier allows attackers with Overall/Read access to retrieve logs, build or delete a batch task.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:batch-task'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.19'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23115'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/batch-task-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-1025'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T21:27:43Z', 'nvd_published_at': '2022-01-12T20:15:00Z'}
1.4.0
GHSA-m434-m5pv-p35w
2022-02-02T16:12:13Z
2022-01-28T22:08:02Z
null
['CVE-2022-0333']
Insufficient user authorization in Moodle
A flaw was found in Moodle in versions 3.11 to 3.11.4, 3.10 to 3.10.8, 3.9 to 3.9.11 and earlier unsupported versions. The calendar:manageentries capability allowed managers to access or modify any calendar event, but should have been restricted from accessing user level events.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11'}, {'fixed': '3.11.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions':...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0333'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/2ee27313cea0d7073f5a6a35eccdfddcb3a9adad'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2043663'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle...
{'cwe_ids': ['CWE-863'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-01-26T22:50:46Z', 'nvd_published_at': '2022-01-25T20:15:00Z'}
1.4.0
GHSA-7rjp-fgwj-47rw
2022-02-02T16:17:08Z
2022-01-28T22:14:11Z
null
['CVE-2022-23945']
Missing authentication in ShenYu
Missing authentication on ShenYu Admin when register by HTTP. This issue affected Apache ShenYu 2.4.0 and 2.4.1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.shenyu:shenyu-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23945'}, {'type': 'WEB', 'url': 'https://github.com/apache/shenyu/pull/2723'}, {'type': 'WEB', 'url': 'https://github.com/apache/shenyu/commit/9a02215013037e1cc8cd41f216164628a9e9e28f'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/incubat...
{'cwe_ids': ['CWE-306', 'CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-26T22:42:09Z', 'nvd_published_at': '2022-01-25T13:15:00Z'}
1.4.0
GHSA-rwqq-p4p9-5wpq
2022-01-04T20:03:15Z
2022-01-07T00:00:29Z
null
['CVE-2021-43678']
Wechat-php-sdk is affected by a Cross Site Scripting vulnerability.
Wechat-php-sdk v1.10.2 is affected by a Cross Site Scripting (XSS) vulnerability in Wechat.php.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'gaoming13/wechat-php-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.10.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43678'}, {'type': 'WEB', 'url': 'https://github.com/gaoming13/wechat-php-sdk/issues/30'}, {'type': 'PACKAGE', 'url': 'https://github.com/gaoming13/wechat-php-sdk'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-04T20:03:15Z', 'nvd_published_at': '2021-12-17T13:15:00Z'}
1.4.0
GHSA-gqm2-2gcx-p88w
2023-05-24T16:41:08Z
2022-01-13T00:01:03Z
null
['CVE-2022-20616']
Incorrect Permission Assignment for Critical Resource in Jenkins Credentials Binding Plugin
Jenkins Credentials Binding Plugin prior to 1.27.1 and 1.24.1 does not perform a permission check in a method implementing form validation. This allows attackers with Overall/Read access to validate if a credential ID refers to a secret file credential and whether it’s a zip file. Credentials Binding Plugin 1.27.1 an...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:credentials'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.25'}, {'fixed': '1.27.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:credentials'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-20616'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/credentials-binding-plugin/commit/2dd5eda721e52d9a5bf6748405adf965ba517d8a'}, {'type': 'WEB', 'url': 'https://github.com/CVEProject/cvelist/blob/2d78eb36f4d084db7fb35f1535d8d84fdcb7d859/...
{'cwe_ids': ['CWE-732', 'CWE-862'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:49:42Z', 'nvd_published_at': '2022-01-12T20:15:00Z'}
1.4.0
GHSA-vqwg-4v6f-h6x5
2023-05-24T16:37:08Z
2022-01-13T00:01:04Z
null
['CVE-2022-20615']
Stored XSS vulnerability in Matrix Project Plugin
Jenkins Matrix Project Plugin prior to 1.20 and 1.18.1 does not escape HTML metacharacters in node and label names, and label descriptions. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Agent/Configure permission. Matrix Project Plugin 1.20 and 1.18.1 escapes HTML met...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:matrix-project'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.19'}, {'fixed': '1.20'}]}], 'versions': ['1.19']}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:matrix-project'}, 'ranges': [{'type': 'ECOSYSTEM', 'ev...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-20615'}, {'type': 'WEB', 'url': 'https://github.com/CVEProject/cvelist/blob/2d78eb36f4d084db7fb35f1535d8d84fdcb7d859/2022/20xxx/CVE-2022-20615.json'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/matrix-project-plugin'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-29T04:33:51Z', 'nvd_published_at': '2022-01-12T20:15:00Z'}
1.4.0
GHSA-4jh2-3c85-q67h
2022-01-27T23:12:43Z
2022-01-28T21:55:34Z
null
['CVE-2021-45230']
Improper Privilege Management in apache-airflow
In Apache Airflow prior to 2.2.0. This CVE applies to a specific case where a User who has "can_create" permissions on DAG Runs can create Dag Runs for dags that they don't have "edit" permissions for.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45230'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/m778ojn0k595rwco4ht9wjql89mjoxnl'}]
{'cwe_ids': ['CWE-269'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-27T23:12:43Z', 'nvd_published_at': '2022-01-20T11:15:00Z'}
1.4.0
GHSA-qpw2-xchm-655q
2021-05-04T20:42:24Z
2022-01-06T20:31:01Z
2021-03-19T20:58:21Z
[]
Out-of-Bounds read in stringstream
Versions less than 0.0.6 of the Node.js stringstream module are vulnerable to an out-of-bounds read because of allocation of uninitialized buffers when a number is passed in the input stream (when using Node.js 4.x). # WITHDRAWN This is a duplicate of GHSA-mf6x-7mm4-x2g7
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'stringstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-21270'}, {'type': 'WEB', 'url': 'https://github.com/mhart/StringStream/issues/7'}, {'type': 'WEB', 'url': 'https://github.com/mhart/StringStream/commit/2f4a9d496f94b0880e01a26857aa266a5a3ef274'}, {'type': 'WEB', 'url': 'https://hackerone.com/report...
{'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-18T23:57:13Z', 'nvd_published_at': None}
1.4.0
GHSA-xrg3-hmf3-rvgw
2023-06-13T20:41:58Z
2022-01-06T22:03:56Z
null
['CVE-2021-45712']
Path Traversal in rust-embed
When running in debug mode and the debug-embed (off by default) feature is not enabled, the generated get method does not check that the input path is a child of the folder given. This allows attackers to read arbitrary files in the file system if they have control over the filename given. The following code will prin...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'rust-embed'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45712'}, {'type': 'WEB', 'url': 'https://github.com/pyros2097/rust-embed/issues/159'}, {'type': 'PACKAGE', 'url': 'https://github.com/pyros2097/rust-embed'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T21:02:56Z', 'nvd_published_at': '2021-12-26T22:15:00Z'}
1.4.0
GHSA-86wf-436m-h424
2021-03-31T21:09:25Z
2022-01-06T20:30:13Z
null
['CVE-2019-10196']
Resource Exhaustion Denial of Service in http-proxy-agent
A flaw was found in http-proxy-agent, prior to version 2.1.0. It was discovered http-proxy-agent passes an auth option to the Buffer constructor without proper sanitization. This could result in a Denial of Service through the usage of all available CPU resources and data exposure through an uninitialized memory leak i...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'http-proxy-agent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10196'}, {'type': 'WEB', 'url': 'https://github.com/TooTallNate/node-http-proxy-agent/commit/b7b7cc793c3226aa83f820ce5c277e81862d32eb'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1567245'}, {'type': 'WEB', 'url': 'https://...
{'cwe_ids': ['CWE-665'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T22:28:09Z', 'nvd_published_at': '2021-03-19T20:15:00Z'}
1.4.0
GHSA-6jmh-9gqm-5xrx
2022-01-24T21:11:02Z
2022-01-26T20:21:03Z
null
['CVE-2022-0226']
Cross-Site Request Forgery (CSRF) in livehelperchat
A CSRF issue is found in the audit configuration under settings. It was found that no CSRF token validation is getting done on the server-side. If we remove the CSRF token and keep the CSRF token field empty, the action is getting performed.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.92'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0226'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/f59ffb02984c0ce2fbb19ac39365066507de9370'}, {'type': 'PACKAGE', 'url': 'https://github.com/livehelperchat/livehelperchat'}, {'type': 'WEB', 'url': 'https://hunt...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-24T21:11:02Z', 'nvd_published_at': '2022-01-14T19:15:00Z'}
1.4.0
GHSA-jq4p-mq33-w375
2022-02-07T21:16:31Z
2022-01-28T23:08:29Z
null
['CVE-2022-23598']
Cross-site Scripting when rendering error messages in laminas-form
### Impact When rendering validation error messages via the `formElementErrors()` view helper shipped with laminas-form, many messages will contain the submitted value. However, in vulnerable versions of laminas-form, the value was not being escaped for HTML contexts, which can potentially lead to a Reflected Cross-Si...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'laminas/laminas-form'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'laminas/laminas-form'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3....
[{'type': 'WEB', 'url': 'https://github.com/laminas/laminas-form/security/advisories/GHSA-jq4p-mq33-w375'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23598'}, {'type': 'WEB', 'url': 'https://github.com/laminas/laminas-form/commit/43005a3ec4c2292d4f825273768d9b884acbca37'}, {'type': 'WEB', '...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-28T18:49:08Z', 'nvd_published_at': '2022-01-28T22:15:00Z'}
1.4.0
GHSA-fqgw-6qj5-8hmp
2022-01-07T18:33:44Z
2022-01-08T00:40:37Z
null
['CVE-2021-40111']
Infinite Loop in Apache James
In Apache James, while fuzzing with Jazzer the IMAP parsing stack, we discover that crafted APPEND and STATUS IMAP command could be used to trigger infinite loops resulting in expensive CPU computations and OutOfMemory exceptions. This can be used for a Denial Of Service attack. The IMAP user needs to be authenticated ...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.james:james-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40111'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2022/01/04/3'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/01/04/3'}]
{'cwe_ids': ['CWE-835'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T18:33:44Z', 'nvd_published_at': '2022-01-04T09:15:00Z'}
1.4.0
GHSA-2457-2263-mm9f
2022-01-19T19:56:29Z
2022-01-21T23:19:36Z
null
['CVE-2022-21700']
Memory leak in micronaut-core
### Impact Sending an invalid Content Type header leads to memory leak in `DefaultArgumentConversionContext` as this type is erroneously used in static state. ### Patches The problem is patched in Micronaut 3.2.7 and above. ### Workarounds The default content type binder can be replaced in an existing Micronaut ap...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.micronaut:micronaut-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.7'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/micronaut-projects/micronaut-core/security/advisories/GHSA-2457-2263-mm9f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21700'}, {'type': 'WEB', 'url': 'https://github.com/micronaut-projects/micronaut-core/commit/b8ec32c311689667c69ae7d9f9c3b3a8abc...
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T19:56:29Z', 'nvd_published_at': '2022-01-18T23:15:00Z'}
1.4.0
GHSA-6qj8-c27w-rp33
2021-05-25T20:49:00Z
2022-01-06T19:38:07Z
null
['CVE-2019-17557']
Cross-site scripting in Apache Syncome EndUser
It was found that the Apache Syncope EndUser UI login page prio to 2.0.15 and 2.1.6 reflects the successMessage parameters. By this mean, a user accessing the Enduser UI could execute javascript code from URL query string.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.syncope.client:syncope-client-enduser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.15'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.syncope.client:syncope-client-enduser'}, 'ranges': [{'type': 'ECOSYSTEM', 'eve...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17557'}, {'type': 'WEB', 'url': 'http://syncope.apache.org/security'}]
{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T20:49:00Z', 'nvd_published_at': '2020-05-04T13:15:00Z'}
1.4.0
GHSA-f8x6-m9f5-ffp8
2022-01-06T19:58:35Z
2022-01-06T21:08:34Z
null
['CVE-2021-23814']
Unrestricted Upload of File with Dangerous Type in unisharp/laravel-filemanager
This affects the package unisharp/laravel-filemanager from 0.0.0. The upload() function does not sufficiently validate the file type when uploading. An attacker may be able to reproduce the following steps: - Install a package with a web Laravel application. - Navigate to the Upload window - Upload an image file, then ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'unisharp/laravel-filemanager'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23814'}, {'type': 'PACKAGE', 'url': 'https://github.com/UniSharp/laravel-filemanager'}, {'type': 'WEB', 'url': 'https://github.com/UniSharp/laravel-filemanager/blob/master/src/Controllers/UploadController.php%23L26'}, {'type': 'WEB', 'url': 'https:...
{'cwe_ids': ['CWE-434'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-04T18:05:21Z', 'nvd_published_at': '2021-12-17T20:15:00Z'}
1.4.0
GHSA-w3v3-cxq5-9vr4
2023-06-30T20:03:01Z
2022-01-21T23:58:07Z
null
['CVE-2022-0179']
Incorrect Default Permissions and Improper Access Control in snipe-it
snipe-it is vulnerable to Improper Access Control/Incorrect Default Permissions.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0179'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/pull/10498'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/cf14a0222c67472086cd08b2155f045edaf75f2e'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-...
{'cwe_ids': ['CWE-276', 'CWE-284', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-18T22:12:25Z', 'nvd_published_at': '2022-01-12T05:15:00Z'}
1.4.0
GHSA-29gp-2c3m-3j6m
2022-01-20T15:34:11Z
2022-01-12T22:43:00Z
null
['CVE-2021-29454']
Sandbox Escape by math function in smarty
### Impact Template authors could run arbitrary PHP code by crafting a malicious math string. If a math string is passed through as user provided data to the math function, external users could run arbitrary PHP code by crafting a malicious math string. ### Patches Please upgrade to 4.0.2 or 3.1.42 or higher. ### Ref...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'smarty/smarty'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.42'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'smarty/smarty'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/smarty-php/smarty/security/advisories/GHSA-29gp-2c3m-3j6m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29454'}, {'type': 'WEB', 'url': 'https://github.com/smarty-php/smarty/commit/215d81a9fa3cd63d82fb3ab56ecaf97cf1e7db71'}, {'type': 'PACKAGE', 'ur...
{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-10T22:08:56Z', 'nvd_published_at': '2022-01-10T20:15:00Z'}
1.4.0
GHSA-xh99-hw7h-wf63
2022-01-13T22:08:36Z
2022-01-13T22:25:44Z
null
[]
Unchecked validity of Facing values in PlayerActionPacket
### Impact A remote attacker may crash a server by sending `PlayerActionPacket` with invalid facing values (e.g. negative), specifically with `START_BREAK` or `CRACK_BLOCK` actions, or with a `UseItemTransactionData` (typically in `InventoryTransactionPacket`). ### Patches f126479c37ff00a717a828f5271cf8e821d12d6c ###...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pocketmine/pocketmine-mp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-xh99-hw7h-wf63'}, {'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/commit/f126479c37ff00a717a828f5271cf8e821d12d6c'}, {'type': 'PACKAGE', 'url': 'https://github.com/pmmp/PocketMine-MP'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-13T22:08:36Z', 'nvd_published_at': None}
1.4.0
GHSA-gg9m-x3cg-69vh
2023-05-24T17:49:07Z
2022-01-13T00:00:57Z
null
['CVE-2022-20621']
Access key stored in plain text by Jenkins Metrics Plugin
Jenkins Metrics Plugin 4.0.2.8 and earlier stores access keys unencrypted in its global configuration file `jenkins.metrics.api.MetricsAccessKey.xml` on the Jenkins controller as part of its configuration. This access key can be viewed by users with access to the Jenkins controller file system. Metrics Plugin 4.0.2.8...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:metrics'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.2.8'}, {'fixed': '4.0.2.8.1'}]}], 'versions': ['4.0.2.8']}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:metrics'}, 'ranges': [{'type': 'ECOSYSTEM', 'event...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-20621'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/metrics-plugin/commit/9810480370d4c5e04a2b710934db5461bde0d1b6'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/metrics-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.i...
{'cwe_ids': ['CWE-522'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-05-04T20:59:58Z', 'nvd_published_at': '2022-01-12T20:15:00Z'}
1.4.0
GHSA-2w8g-m5j8-7m87
2022-01-10T21:37:04Z
2022-01-12T21:45:59Z
null
[]
Zalgo-like output that crashes the server
### Impact _What kind of vulnerability is it? Who is impacted?_ [`colors`](https://npmjs.com/package/colors) package caused zalgo-like output (see https://github.com/soketi/soketi/issues/276, https://github.com/Marak/colors.js/issues/289), breaking the servers. **Only NPM users that recently upgraded or installed the...
[]
[{'package': {'ecosystem': 'npm', 'name': '@soketi/soketi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.26.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/soketi/soketi/security/advisories/GHSA-2w8g-m5j8-7m87'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-10T21:37:04Z', 'nvd_published_at': None}
1.4.0
GHSA-jh5g-9m4v-9vv9
2023-09-11T22:18:57Z
2022-01-28T22:24:48Z
null
['CVE-2021-41766']
Insecure Java Deserialization in Apache Karaf
Apache Karaf allows monitoring of applications and the Java runtime by using the Java Management Extensions (JMX). JMX is a Java RMI based technology that relies on Java serialized objects for client server communication. Whereas the default JMX implementation is hardened against unauthenticated deserialization attacks...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.karaf.management:org.apache.karaf.management.server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41766'}, {'type': 'WEB', 'url': 'https://github.com/apache/karaf/pull/1475'}, {'type': 'WEB', 'url': 'https://github.com/apache/karaf/commit/b42c82ca3b9a22bd92d249a1060a1953f4188bc2'}, {'type': 'WEB', 'url': 'https://gitbox.apache.org/repos/asf?p=k...
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-27T23:08:06Z', 'nvd_published_at': '2022-01-26T11:15:00Z'}
1.4.0
GHSA-f7q6-xxph-mfm8
2022-02-03T17:53:53Z
2022-01-27T00:01:26Z
null
['CVE-2022-0251']
Cross-site Scripting in Pimcore
Pimcore prior to version 10.2.10 contains a cross-site scripting vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.2.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0251'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/3ae96b9d41c117aafa45873ad10077d4b873a3cb'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/eb4b08f9-cf8b...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T17:53:53Z', 'nvd_published_at': '2022-01-26T11:15:00Z'}
1.4.0
GHSA-q2x5-6q7q-r872
2022-01-07T17:52:38Z
2022-01-06T22:10:17Z
null
['CVE-2021-45701']
Use After Free in tremor-script
An issue was discovered in the tremor-script crate before 0.11.6 for Rust. A patch operation may result in a use-after-free.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'tremor-script'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7.2'}, {'fixed': '0.11.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45701'}, {'type': 'WEB', 'url': 'https://github.com/tremor-rs/tremor-runtime/pull/1217'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/tremor-script/RUSTSEC-2021-0111.md'}, {'type': 'WEB', 'url': 'https:...
{'cwe_ids': ['CWE-416'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T13:27:33Z', 'nvd_published_at': '2021-12-27T00:15:00Z'}
1.4.0
GHSA-4f5x-q4jc-xfcf
2022-01-19T22:33:53Z
2022-01-21T23:31:35Z
null
['CVE-2022-0262']
Cross-site Scripting in pimcore
Cross-site Scripting (XSS) - Stored in Packagist pimcore/pimcore.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.2.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0262'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/6f36e841ce55f67e2e95253dd58f80659ef166c7'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b38a4e14-5dcb...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T22:33:53Z', 'nvd_published_at': '2022-01-18T16:15:00Z'}
1.4.0
GHSA-5429-pjww-7675
2023-08-08T20:44:51Z
2022-01-08T00:43:04Z
null
['CVE-2021-36774']
SQL Injection in Apache Kylin
Apache Kylin allows users to read data from other database systems using JDBC. The MySQL JDBC driver supports certain properties, which, if left unmitigated, can allow an attacker to execute arbitrary code from a hacker-controlled malicious MySQL server within Kylin server processes. This issue affects Apache Kylin 2 v...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.kylin:kylin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36774'}, {'type': 'WEB', 'url': 'https://github.com/apache/kylin/pull/1646'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/kylin'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/lchpcvoolc6w8zc6vo1wstk8zbfqv2ow'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-668', 'CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T23:19:03Z', 'nvd_published_at': '2022-01-06T13:15:00Z'}
1.4.0
GHSA-m6w8-fq7v-ph4m
2022-01-12T21:38:27Z
2022-01-13T16:09:36Z
null
[]
GovernorCompatibilityBravo incorrect ABI encoding may lead to unexpected behavior
### Impact The `GovernorCompatibilityBravo` module may lead to the creation of governance proposals that execute function calls with incorrect arguments due to bad ABI encoding. This happens if the proposal is created using explicit function signatures, e.g. a proposal to invoke the function `foo(uint256)` is created ...
[]
[{'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.4.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts-upgradeable'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed...
[{'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-m6w8-fq7v-ph4m'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-11T23:50:55Z', 'nvd_published_at': None}
1.4.0
GHSA-g4h2-4wvh-grc5
2022-01-07T18:25:29Z
2022-01-06T22:05:05Z
null
['CVE-2021-45711']
Uncontrolled Resource Consumption in simple_asn1
An issue was discovered in the simple_asn1 crate 0.6.0 before 0.6.1 for Rust. There is a panic if UTCTime data, supplied by a remote attacker, has a second character greater than 0x7f.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'simple_asn1'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.6.0'}, {'fixed': '0.6.1'}]}], 'versions': ['0.6.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45711'}, {'type': 'WEB', 'url': 'https://github.com/acw/simple_asn1/issues/27'}, {'type': 'WEB', 'url': 'https://github.com/acw/simple_asn1/commit/d7d39d709577710e9dc8833ee57d200eef366db8'}, {'type': 'PACKAGE', 'url': 'https://github.com/acw/simple...
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T21:37:42Z', 'nvd_published_at': '2021-12-27T00:15:00Z'}
1.4.0
GHSA-w4fj-ccr6-7pcp
2023-09-25T11:29:40Z
2022-01-06T20:40:56Z
null
['CVE-2020-1928']
Apache NiFi Insertion of Sensitive Information into Log File
An information disclosure vulnerability was found in Apache NiFi 1.10.0. The sensitive parameter parser would log parsed values for debugging purposes. This would expose literal values entered in a sensitive property when no parameter was present.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi-parameter'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed': '1.11.0'}]}], 'versions': ['1.10.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1928'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi/pull/3935'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi/commit/42cb6e84898e66672878f61f99543d6af3c0a567'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/nifi'}, {'ty...
{'cwe_ids': ['CWE-200', 'CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T14:27:46Z', 'nvd_published_at': '2020-01-28T01:15:00Z'}
1.4.0
GHSA-vp5x-3v8r-qprw
2022-01-19T18:25:14Z
2022-01-12T22:51:04Z
null
['CVE-2021-43297']
Deserialization of Untrusted Data in Dubbo
A deserialization vulnerability existed in dubbo hessian-lite 3.2.11 and its earlier versions, which could lead to malicious code execution. Most Dubbo users use Hessian2 as the default serialization/deserialization protocol, during Hessian catch unexpected exceptions, Hessian will log out some imformation for users, w...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.12'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.1...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43297'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/1mszxrvp90y01xob56yp002939c7hlww'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-11T18:30:09Z', 'nvd_published_at': '2022-01-10T16:15:00Z'}
1.4.0
GHSA-gm68-g349-gxgg
2022-01-28T22:20:30Z
2022-01-28T22:35:16Z
null
['CVE-2021-39480']
Denial of service in bingrep
Bingrep v0.8.5 was discovered to contain a memory allocation failure which can cause a Denial of Service (DoS).
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'bingrep'}, 'versions': ['0.8.5']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-39480'}, {'type': 'WEB', 'url': 'https://github.com/m4b/bingrep/issues/30'}, {'type': 'PACKAGE', 'url': 'https://github.com/m4b/bingrep'}]
{'cwe_ids': ['CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-28T22:20:30Z', 'nvd_published_at': '2022-01-21T22:15:00Z'}
1.4.0
GHSA-44gv-fgcj-w546
2022-01-07T20:37:12Z
2022-01-08T00:31:55Z
null
['CVE-2022-22107']
Missing Authorization in DayByDay CRM
In Daybyday CRM, versions 2.0.0 through 2.2.0 are vulnerable to Missing Authorization. An attacker that has the lowest privileges account (employee type user), can view the appointments of all users in the system including administrators. However, this type of user is not authorized to view the calendar at all.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'bottelet/flarepoint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22107'}, {'type': 'WEB', 'url': 'https://github.com/Bottelet/DaybydayCRM/commit/a0392f4a4a14e1e3fedaf6817aefce69b6bd661b'}, {'type': 'PACKAGE', 'url': 'https://github.com/Bottelet/DaybydayCRM'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftwa...
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T20:37:12Z', 'nvd_published_at': '2022-01-05T15:15:00Z'}
1.4.0
GHSA-92cx-4xm7-jr9m
2022-01-07T16:09:58Z
2022-01-06T22:02:56Z
null
['CVE-2021-45713']
Use After Free in rusqlite
An issue was discovered in the rusqlite crate 0.25.x before 0.25.4 and 0.26.x before 0.26.2 for Rust. create_scalar_function has a use-after-free.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'rusqlite'}, 'ecosystem_specific': {'affected_functions': ['rusqlite::Connection::create_scalar_function']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.25.0'}, {'fixed': '0.25.4'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'rusqlite'}, 'ecosyst...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45713'}, {'type': 'WEB', 'url': 'https://github.com/rusqlite/rusqlite/issues/1048'}, {'type': 'WEB', 'url': 'https://github.com/rusqlite/rusqlite/pull/1049'}, {'type': 'WEB', 'url': 'https://github.com/rusqlite/rusqlite/commit/30f8c8c502675011603c4...
{'cwe_ids': ['CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T21:05:16Z', 'nvd_published_at': '2021-12-26T22:15:00Z'}
1.4.0
GHSA-mrq4-7ch7-2465
2022-02-07T21:21:25Z
2022-01-27T18:32:47Z
null
['CVE-2022-21686']
Server Side Twig Template Injection
PrestaShop is an Open Source e-commerce platform. Starting with version 1.7.0.0 and ending with version 1.7.8.3, an attacker is able to inject twig code inside the back office when using the legacy layout. The problem is fixed in version 1.7.8.3. There are no known workarounds.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0.0'}, {'fixed': '1.7.8.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.7.8.2'}}]
[{'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-mrq4-7ch7-2465'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21686'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/commit/d02b469ec365822e6a9f017e57f588966248bf21'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-26T22:51:57Z', 'nvd_published_at': '2022-01-26T20:15:00Z'}
1.4.0
GHSA-pwm7-qr6j-3vjg
2022-01-11T18:14:15Z
2022-01-12T22:56:13Z
null
['CVE-2021-23594']
Prototype Pollution in realms-shim
All versions of package realms-shim are vulnerable to Sandbox Bypass via a Prototype Pollution attack vector.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'realms-shim'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23594'}, {'type': 'PACKAGE', 'url': 'https://github.com/Agoric/realms-shim'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-REALMSSHIM-2309907'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/realms-shim'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-11T18:14:15Z', 'nvd_published_at': '2022-01-10T14:10:00Z'}
1.4.0
GHSA-6vfw-74wr-3chh
2022-02-03T21:01:10Z
2022-01-28T00:03:42Z
null
['CVE-2022-0372']
Cross-site Scripting in Crater Invoice
Crater invoice prior to version 6.0.0 has a cross-site scripting vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'bytefury/crater'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0372'}, {'type': 'WEB', 'url': 'https://github.com/crater-invoice/crater/pull/681'}, {'type': 'WEB', 'url': 'https://github.com/crater-invoice/crater/commit/cdc913d16cf624aee852bc9163a7c6ffc8d1da9d'}, {'type': 'PACKAGE', 'url': 'https://github.com/...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T21:01:10Z', 'nvd_published_at': '2022-01-27T08:15:00Z'}
1.4.0
GHSA-x588-g38j-f672
2022-01-07T23:37:32Z
2022-01-08T00:46:20Z
null
['CVE-2021-36737']
Cross-site Scripting in Apache Pluto
The input fields of the Apache Pluto UrlTestPortlet are vulnerable to Cross-Site Scripting (XSS) attacks. Users should migrate to version 3.1.1 of the v3-demo-portlet.war artifact
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.portals.pluto:pluto-portal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36737'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/portals-pluto'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/x7kt47bf358x8sg9qg02zt0dmdrtow25'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T23:37:32Z', 'nvd_published_at': '2022-01-06T09:15:00Z'}
1.4.0
GHSA-pw3c-h7wp-cvhx
2023-09-04T16:47:08Z
2022-01-12T20:07:43Z
null
['CVE-2022-22815']
Improper Initialization in Pillow
Pillow is the friendly PIL (Python Imaging Library) fork. `path_getbbox` in `path.c` in Pillow before 9.0.0 improperly initializes `ImagePath.Path`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ecosystem_specific': {'affected_functions': ['PIL.ImagePath.Path.__init__']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22815'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/c48271ab354db49cdbd740bc45e13be4f0f7993c'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://github.com/python-pil...
{'cwe_ids': ['CWE-665'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-11T18:02:06Z', 'nvd_published_at': '2022-01-10T14:12:00Z'}
1.4.0
GHSA-5f5c-687x-g5qm
2022-01-06T18:52:40Z
2022-01-07T00:10:33Z
null
['CVE-2021-41499']
Classic Buffer Overflow in pyo
Buffer Overflow Vulnerability exists in ajaxsoundstudio.com in Pyo < 1.03 in the Server_debug function, which allows remote attackers to conduct DoS attacks by deliberately passing on an overlong audio file name.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pyo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41499'}, {'type': 'WEB', 'url': 'https://github.com/belangeo/pyo/issues/222'}, {'type': 'PACKAGE', 'url': 'https://github.com/belangeo/pyo'}]
{'cwe_ids': ['CWE-120'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T18:52:40Z', 'nvd_published_at': '2021-12-17T21:15:00Z'}
1.4.0
GHSA-3j58-p785-f27x
2022-02-03T20:34:27Z
2022-01-28T22:15:24Z
null
['CVE-2022-0378']
Cross-site Scripting in microweber
There is a reflected cross sitem scripting attack in microweber via url parameters.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0378'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/fc7e1a026735b93f0e0047700d08c44954fce9ce'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/5...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-27T18:43:08Z', 'nvd_published_at': '2022-01-26T16:15:00Z'}
1.4.0
GHSA-cm8g-544f-p9x9
2022-01-07T16:13:53Z
2022-01-06T22:03:16Z
null
['CVE-2021-45716']
Use After Free in rusqlite
An issue was discovered in the rusqlite crate 0.25.x before 0.25.4 and 0.26.x before 0.26.2 for Rust. create_collation has a use-after-free.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'rusqlite'}, 'ecosystem_specific': {'affected_functions': ['rusqlite::Connection::create_collation']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.25.0'}, {'fixed': '0.25.4'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'rusqlite'}, 'ecosystem_spe...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45716'}, {'type': 'WEB', 'url': 'https://github.com/rusqlite/rusqlite/issues/1048'}, {'type': 'PACKAGE', 'url': 'https://github.com/rusqlite/rusqlite'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/rusql...
{'cwe_ids': ['CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T21:16:15Z', 'nvd_published_at': '2021-12-26T22:15:00Z'}
1.4.0
GHSA-5rrq-pxf6-6jx5
2022-01-07T22:20:53Z
2022-01-08T00:22:42Z
null
[]
Prototype Pollution in node-forge debug API.
### Impact The `forge.debug` API had a potential prototype pollution issue if called with untrusted input. The API was only used for internal debug purposes in a safe way and never documented or advertised. It is suspected that uses of this API, if any exist, would likely not have used untrusted inputs in a vulnerable...
[]
[{'package': {'ecosystem': 'npm', 'name': 'node-forge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/digitalbazaar/forge/security/advisories/GHSA-5rrq-pxf6-6jx5'}, {'type': 'PACKAGE', 'url': 'https://github.com/digitalbazaar/forge'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T22:20:53Z', 'nvd_published_at': None}
1.4.0
GHSA-p4cr-64x4-f92f
2022-01-07T16:21:25Z
2022-01-06T22:17:23Z
null
['CVE-2020-36514']
Use of Uninitialized Resource in acc_reader.
An issue was discovered in the acc_reader crate through 2020-12-27 for Rust. fill_buf may read from uninitialized memory locations.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'acc_reader'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36514'}, {'type': 'WEB', 'url': 'https://github.com/netvl/acc_reader/issues/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/netvl/acc_reader'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/acc_reader...
{'cwe_ids': ['CWE-908'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T18:14:54Z', 'nvd_published_at': '2021-12-27T00:15:00Z'}
1.4.0
GHSA-85rq-hp8x-ghjq
2023-05-23T18:40:48Z
2022-01-13T00:01:04Z
null
['CVE-2022-20613']
Cross-Site Request Forgery in Jenkins Mailer Plugin
Jenkins Mailer Plugin prior to 408.vd726a_1130320 and 1.34.2 does not perform a permission check in a method implementing form validation. This allows attackers with Overall/Read access to use the DNS used by the Jenkins instance to resolve an attacker-specified hostname. Additionally, this form validation method doe...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:mailer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '391.ve4a38c1bcf4b'}, {'fixed': '408.vd726a'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:mailer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduce...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-20613'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/mailer-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2163'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr20...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:50:18Z', 'nvd_published_at': '2022-01-12T20:15:00Z'}
1.4.0
GHSA-gjm5-83cw-p3p2
2022-01-11T18:11:48Z
2022-01-12T22:59:13Z
null
['CVE-2021-23568']
Prototype Pollution in extend2
The package extend2 before 1.0.1 are vulnerable to Prototype Pollution via the extend function due to unsafe recursive merge.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'extend2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23568'}, {'type': 'WEB', 'url': 'https://github.com/eggjs/extend2/pull/2'}, {'type': 'WEB', 'url': 'https://github.com/eggjs/extend2/commit/aa332a59116c8398976434b57ea477c6823054f8'}, {'type': 'PACKAGE', 'url': 'https://github.com/eggjs/extend2'}, ...
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-11T18:11:48Z', 'nvd_published_at': '2022-01-10T14:10:00Z'}
1.4.0
GHSA-rq96-qhc5-vm4r
2022-01-04T20:18:58Z
2022-01-05T17:33:32Z
null
['CVE-2021-44145']
Exposure of Sensitive Information to an Unauthorized Actor in Apache NiFi
In the TransformXML processor of Apache NiFi before 1.15.1 an authenticated user could configure an XSLT file which, if it included malicious external entity calls, may reveal sensitive information.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44145'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security.html#1.15.1-vulnerabilities'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/12/17/1'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-04T20:18:58Z', 'nvd_published_at': '2021-12-17T09:15:00Z'}
1.4.0
GHSA-cxm3-v4mv-6mh8
2023-09-12T19:28:09Z
2022-01-28T22:04:11Z
null
['CVE-2021-4103']
vditor Vulnerable to Cross-site Scripting in SVG events
vditor does not filter user input in SVG events, leading to XSS ### PoC ```html </a> <svg><animate onbegin=alert(11) attributeName=x dur=1s> ```
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'vditor'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4103'}, {'type': 'WEB', 'url': 'https://github.com/Vanessa219/vditor/issues/1133'}, {'type': 'WEB', 'url': 'https://github.com/vanessa219/vditor/commit/8d4d0889dd72b2f839e93a49db3da3a370416c7d'}, {'type': 'PACKAGE', 'url': 'https://github.com/vanes...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-28T21:55:58Z', 'nvd_published_at': '2022-01-23T02:15:00Z'}
1.4.0
GHSA-jpxj-vgq5-prjc
2022-04-29T04:27:21Z
2022-01-13T00:01:03Z
null
['CVE-2022-20617']
OS command execution vulnerability in Docker Commons Plugin
Jenkins Docker Commons Plugin 1.17 and earlier does not sanitize the name of an image or a tag, resulting in an OS command execution vulnerability exploitable by attackers with Item/Configure permission or able to control the contents of a previously configured job's SCM repository.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:docker-commons'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.18'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-20617'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/docker-commons-plugin'}, {'type': 'WEB', 'url': 'https://plugins.jenkins.io/docker-commons'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-18...
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-29T04:27:21Z', 'nvd_published_at': '2022-01-12T20:15:00Z'}
1.4.0
GHSA-7q8g-gpfp-v8gx
2021-07-28T18:31:48Z
2022-01-06T20:40:58Z
null
['CVE-2020-1942']
Insertion of Sensitive Information into Log File in Apache NiFi
In Apache NiFi 0.0.1 to 1.11.0, the flow fingerprint factory generated flow fingerprints which included sensitive property descriptor values. In the event a node attempted to join a cluster and the cluster flow was not inheritable, the flow fingerprint of both the cluster and local flow was printed, potentially contain...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi-framework-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.1'}, {'fixed': '1.12.0-RC1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.11.0'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi-...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1942'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi/pull/4028'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi/commit/95746d346cddbd6134c4b28fdc39d5813a626f97'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi/commit/d7c2...
{'cwe_ids': ['CWE-200', 'CWE-532'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T15:49:09Z', 'nvd_published_at': '2020-02-11T21:15:00Z'}
1.4.0
GHSA-w6rp-4vj7-v2m8
2022-01-10T21:46:05Z
2022-01-08T00:31:49Z
null
['CVE-2022-22111']
Missing Authorization in DayByDay CRM
In DayByDay CRM, version 2.2.0 is vulnerable to missing authorization. Any application user in the application who has update user permission enabled is able to change the password of other users, including the administrator’s. This allows the attacker to gain access to the highest privileged user in the application.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'bottelet/flarepoint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22111'}, {'type': 'WEB', 'url': 'https://github.com/Bottelet/DaybydayCRM/commit/fe842ea5ede237443f1f45a99aeb839133115d8b'}, {'type': 'PACKAGE', 'url': 'https://github.com/Bottelet/DaybydayCRM'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftwa...
{'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T19:55:18Z', 'nvd_published_at': '2022-01-05T15:15:00Z'}
1.4.0
GHSA-hw3m-8h25-8frw
2022-01-07T22:53:55Z
2022-01-08T00:42:59Z
null
['CVE-2021-45456']
Command Injection in Apache Kylin
Apache kylin checks the legitimacy of the project before executing some commands with the project name passed in by the user. There is a mismatch between what is being checked and what is being used as the shell command argument in DiagnosisService. This may cause an illegal project name to pass the check and perform t...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.kylin:kylin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45456'}, {'type': 'WEB', 'url': 'https://github.com/apache/kylin/pull/1781'}, {'type': 'WEB', 'url': 'https://github.com/apache/kylin/commit/f4daf14dde99b934c92ce2c832509f24342bc845'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/kylin'}, ...
{'cwe_ids': ['CWE-77'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T22:48:38Z', 'nvd_published_at': '2022-01-06T13:15:00Z'}
1.4.0
GHSA-qv7g-j98v-8pp7
2022-01-04T17:51:41Z
2022-01-06T18:34:35Z
null
['CVE-2021-41236']
XSS vulnerability on email template preview page
### Summary Email template preview is vulnerable to XSS payload added to email template content. The attacker should have permission to create or edit an email template. For successful payload, execution attacked user should preview a vulnerable email template. ### Workarounds There are no workarounds that address t...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'oro/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.21'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'oro/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.14'}]}]}, {'p...
[{'type': 'WEB', 'url': 'https://github.com/oroinc/platform/security/advisories/GHSA-qv7g-j98v-8pp7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41236'}, {'type': 'WEB', 'url': 'https://github.com/oroinc/platform/commit/2a089c971fc70bc63baf8770d29ee515ce5a415a'}, {'type': 'PACKAGE', 'url': ...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-04T17:51:41Z', 'nvd_published_at': '2022-01-04T19:15:00Z'}
1.4.0
GHSA-566m-qj78-rww5
2023-09-08T19:35:12Z
2022-01-07T00:21:36Z
null
['CVE-2021-23382']
Regular Expression Denial of Service in postcss
The package postcss versions before 7.0.36 or between 8.0.0 and 8.2.13 are vulnerable to Regular Expression Denial of Service (ReDoS) via getAnnotationURL() and loadAnnotation() in lib/previous-map.js. The vulnerable regexes are caused mainly by the sub-pattern ```regex \/\*\s* sourceMappingURL=(.*) ``` ### PoC ```js...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'postcss'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.2.13'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'postcss'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'ty...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23382'}, {'type': 'WEB', 'url': 'https://github.com/postcss/postcss/commit/2b1d04c867995e55124e0a165b7c6622c1735956'}, {'type': 'WEB', 'url': 'https://github.com/postcss/postcss/releases/tag/7.0.36'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SN...
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T21:23:19Z', 'nvd_published_at': '2021-04-26T16:15:00Z'}
1.4.0
GHSA-2rxc-8f9w-fjq8
2023-06-13T20:24:32Z
2022-01-06T22:14:13Z
null
['CVE-2021-45694']
Window may read from uninitialized memory locations in rdiff
An issue was discovered in the rdiff crate through version 0.1.2 for Rust. Window may read from uninitialized memory locations.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'rdiff'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45694'}, {'type': 'WEB', 'url': 'https://github.com/dyule/rdiff/issues/3'}, {'type': 'PACKAGE', 'url': 'https://github.com/dyule/rdiff'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/rdiff/RUSTSEC-2021-0...
{'cwe_ids': ['CWE-908'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T14:39:27Z', 'nvd_published_at': '2021-12-27T00:15:00Z'}
1.4.0
GHSA-w2pm-r78h-4m7v
2022-01-05T17:39:12Z
2022-01-06T23:13:42Z
null
['CVE-2020-19316']
OS Command Injection in Laravel Framework
OS Command injection vulnerability in function link in Filesystem.php in Laravel Framework before 5.8.17.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'laravel/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.8.17'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-19316'}, {'type': 'WEB', 'url': 'https://github.com/laravel/framework/commit/44c3feb604944599ad1c782a9942981c3991fa31'}, {'type': 'PACKAGE', 'url': 'https://github.com/laravel/framework'}, {'type': 'WEB', 'url': 'http://www.netbytesec.com/advisorie...
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T17:39:12Z', 'nvd_published_at': '2021-12-20T20:15:00Z'}
1.4.0
GHSA-cw4j-cf6c-mmfv
2022-01-07T17:36:37Z
2022-01-06T22:14:24Z
null
['CVE-2021-45683']
Use of Uninitialized Resource in binjs_io.
An issue was discovered in the binjs_io crate through 2021-01-03 for Rust. The Read method may read from uninitialized memory locations.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'binjs_io'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45683'}, {'type': 'WEB', 'url': 'https://github.com/binast/binjs-ref/issues/460'}, {'type': 'PACKAGE', 'url': 'https://github.com/Yoric/binjs-ref'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/binjs_io/...
{'cwe_ids': ['CWE-908'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T18:05:53Z', 'nvd_published_at': '2021-12-27T00:15:00Z'}
1.4.0
GHSA-3cf2-x423-x582
2022-02-09T18:28:05Z
2022-01-06T21:12:50Z
null
['CVE-2021-4024']
Exposure of Sensitive Information to an Unauthorized Actor and Origin Validation Error in podman
A flaw was found in podman. The `podman machine` function (used to create and manage Podman virtual machine containing a Podman process) spawns a `gvproxy` process on the host system. The `gvproxy` API is accessible on port 7777 on all IP addresses on the host. If that port is open on the host's firewall, an attacker c...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/containers/podman/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4024'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2026675,'}, {'type': 'PACKAGE', 'url': 'https://github.com/containers/podman'}, {'type': 'WEB', 'url': 'https://github.com/containers/podman/releases/tag/v3.4.3'}, {'type':...
{'cwe_ids': ['CWE-200', 'CWE-346'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T17:44:04Z', 'nvd_published_at': '2021-12-23T20:15:00Z'}
1.4.0
GHSA-4jf5-jggp-g56j
2021-03-22T23:14:16Z
2022-01-06T20:23:05Z
null
['CVE-2020-28452']
Cross-Site Request Forgery in com.softwaremill.akka-http-session:core_2.12
This affects the package com.softwaremill.akka-http-session:core_2.12 from 0 and before 0.6.1; all versions of package com.softwaremill.akka-http-session:core_2.11; the package com.softwaremill.akka-http-session:core_2.13 from 0 and before 0.6.1. CSRF protection can be bypassed by forging a request that contains the sa...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.softwaremill.akka-http-session:core_2.12'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.0'}, {'fixed': '0.6.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28452'}, {'type': 'WEB', 'url': 'https://github.com/softwaremill/akka-http-session/issues/77'}, {'type': 'WEB', 'url': 'https://github.com/softwaremill/akka-http-session/pull/79'}, {'type': 'WEB', 'url': 'https://github.com/softwaremill/akka-http-s...
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T23:14:16Z', 'nvd_published_at': '2021-01-20T18:15:00Z'}
1.4.0
GHSA-7g7r-gr46-q4p5
2022-01-31T21:47:28Z
2022-01-27T16:21:33Z
null
['CVE-2022-0269']
Cross-Site Request Forgery in yetiforce
Versions of yetiforce 6.3.0 and prior are subject to privilege escalation via a cross site request forgery bug. This allows an attacker to create a new admin account even with SameSite: Strict enabled. This vulnerability can be exploited by any user on the system including guest users.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'yetiforce/yetiforce-crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0269'}, {'type': 'WEB', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm/commit/298c7870e6fe4332d8aa1757a9c8d79f841389ff'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a0470915-f6df-45b8-b3a2-01aebe764df0'}, {'type': 'PACKAGE', 'url'...
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-25T21:09:59Z', 'nvd_published_at': '2022-01-24T12:15:00Z'}
1.4.0
GHSA-hrgx-7j6v-xj82
2022-01-19T17:42:16Z
2022-01-12T21:55:40Z
null
['CVE-2022-0087']
Reflected cross-site scripting (XSS) vulnerability
This security advisory relates to a capability for an attacker to exploit a reflected cross-site scripting vulnerability when using the `@keystone-6/auth` package. #### Impact The vulnerability can impact users of the administration user interface when following an untrusted link to the `signin` or `init` page. This i...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': '@keystone-6/auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@keystone-next/auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '37.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/security/advisories/GHSA-hrgx-7j6v-xj82'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0087'}, {'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/commit/96bf833a23b1a0a5d365cf394467a943cc481b38'}, {'type': 'PACKAGE', ...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-10T21:45:34Z', 'nvd_published_at': '2022-01-12T00:15:00Z'}
1.4.0
GHSA-hjgm-f7vx-m5g7
2021-05-25T19:50:23Z
2022-01-06T19:44:49Z
null
['CVE-2020-1964']
Deserialization of Untrusted Data in Apache Heron
It was noticed that Apache Heron 0.20.2-incubating, Release 0.20.1-incubating, and Release v-0.20.0-incubating does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerabilities (CWE-502: Deserialization of Untrusted Data).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.heron:heron-simulator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.20.0-incubating'}, {'fixed': '0.20.3-incubating'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.20.2-incubating'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1964'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r16dd39f4180e4443ef4ca774a3a5a3d7ac69f91812c183ed2a99e959%40%3Cdev.heron.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd43ae18588fd7bdb375be63bc95...
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T19:50:23Z', 'nvd_published_at': '2020-04-16T19:15:00Z'}
1.4.0
GHSA-h3fg-h5v3-vf8m
2023-05-04T19:59:15Z
2022-01-06T18:33:44Z
null
['CVE-2021-43846']
CSRF forgery protection bypass in solidus_frontend
### Impact CSRF vulnerability that allows a malicious site to add an item to the user's cart without their knowledge. All `solidus_frontend` versions are affected. If you're using your own storefront, please, follow along to make sure you're not affected. To reproduce the issue: - Pick the id for a variant with avai...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'solidus_frontend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.14'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'solidus_frontend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.5'}]}]}, {...
[{'type': 'WEB', 'url': 'https://github.com/solidusio/solidus/security/advisories/GHSA-h3fg-h5v3-vf8m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43846'}, {'type': 'WEB', 'url': 'https://github.com/solidusio/solidus/commit/4d17cacf066d9492fc04eb3a0b16084b47376d81'}, {'type': 'WEB', 'url': ...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-04T20:24:16Z', 'nvd_published_at': '2021-12-20T22:15:00Z'}
1.4.0
GHSA-c6h4-gc3f-hgjq
2022-01-13T18:28:50Z
2022-01-06T21:58:56Z
null
['CVE-2021-23574']
Prototype Pollution in js-data
All versions of package js-data are vulnerable to Prototype Pollution via the deepFillIn and the set functions. This is an incomplete fix of [CVE-2020-28442](https://snyk.io/vuln/SNYK-JS-JSDATA-1023655).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'js-data'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23574'}, {'type': 'WEB', 'url': 'https://github.com/js-data/js-data/issues/576'}, {'type': 'WEB', 'url': 'https://github.com/js-data/js-data/issues/577'}, {'type': 'PACKAGE', 'url': 'https://github.com/js-data/js-data'}, {'type': 'WEB', 'url': 'htt...
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T20:22:05Z', 'nvd_published_at': '2021-12-24T20:15:00Z'}
1.4.0
GHSA-fpj7-9xm6-8hgr
2023-05-24T14:00:21Z
2022-01-21T23:38:30Z
null
['CVE-2022-23106']
Observable Discrepancy and Observable Timing Discrepancy in Jenkins Configuration as Code Plugin
Jenkins Configuration as Code Plugin prior to 1.55.1, 1.54.1, 1.53.1, and 1.47.1 does not use a constant-time comparison when checking whether two authentication tokens are equal. This could potentially allow attackers to use statistical methods to obtain a valid authentication token. Configuration as Code Plugin 1.5...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins:configuration-as-code'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.55'}, {'fixed': '1.55.1'}]}], 'versions': ['1.55']}, {'package': {'ecosystem': 'Maven', 'name': 'io.jenkins:configuration-as-code'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23106'}, {'type': 'WEB', 'url': 'https://github.com/CVEProject/cvelist/blob/00bfb5abeecc9f553a2f42954ee540e493498ee9/2022/23xxx/CVE-2022-23106.json'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/configuration-as-code-plugin'}, {'type':...
{'cwe_ids': ['CWE-203', 'CWE-208'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-01-20T14:42:40Z', 'nvd_published_at': '2022-01-12T20:15:00Z'}
1.4.0
GHSA-wrvw-hg22-4m67
2023-01-24T15:45:26Z
2022-01-07T22:31:44Z
null
['CVE-2021-22569']
A potential Denial of Service issue in protobuf-java
## Summary A potential Denial of Service issue in protobuf-java was discovered in the parsing procedure for binary data. Reporter: [OSS-Fuzz](https://github.com/google/oss-fuzz) Affected versions: All versions of Java Protobufs (including Kotlin and JRuby) prior to the versions listed below. Protobuf "javalite" user...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.google.protobuf:protobuf-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.16.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'google-protobuf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.19.2...
[{'type': 'WEB', 'url': 'https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-wrvw-hg22-4m67'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22569'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=39330'}, {'type': 'WEB', 'url': 'https://cloud.goo...
{'cwe_ids': ['CWE-696'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T22:23:14Z', 'nvd_published_at': '2022-01-10T14:10:00Z'}
1.4.0
GHSA-c38m-7h53-g9v4
2022-03-30T21:13:23Z
2022-01-21T23:36:47Z
null
['CVE-2021-40525']
Path traversal in Apache James
Apache James ManagedSieve implementation alongside with the file storage for sieve scripts is vulnerable to path traversal, allowing reading and writing any file. This vulnerability had been patched in Apache James 3.6.1 and higher. We recommend the upgrade. Distributed and Cassandra based products are also not impacte...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.james:james-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40525'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/james-project'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2022/01/04/4'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/01/04/4'}, {...
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-13T18:51:30Z', 'nvd_published_at': '2022-01-04T09:15:00Z'}
1.4.0
GHSA-w9p3-5cr8-m3jj
2022-02-23T22:07:51Z
2022-01-21T23:27:14Z
null
['CVE-2022-23302']
Deserialization of Untrusted Data in Log4j 1.x
JMSSink in all versions of Log4j 1.x is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration or if the configuration references an LDAP service the attacker has access to. The attacker can provide a TopicConnectionFactoryBindingName configuration causing JMSSink ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'log4j:log4j'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.17'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23302'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/logging-log4j1'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/bsr3l5qz4g0myrjhy9h67bcxodpkwj4w'}, {'type': 'WEB', 'url': 'https://logging.apache.org/log4j/1.2/index.html'}, ...
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T22:31:40Z', 'nvd_published_at': '2022-01-18T16:15:00Z'}