ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Packagist
GHSA-xp5q-77mh-6hm2
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF)
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF)
{'CVE-2021-3728'}
2021-08-24T20:02:07Z
2021-08-25T14:50:17Z
MODERATE
null
{'CWE-352'}
{'https://github.com/firefly-iii/firefly-iii/commit/14cdce113e0eb8090d09066fcd2b5cf03b5ac84e', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3728', 'https://github.com/firefly-iii/firefly-iii/', 'https://huntr.dev/bounties/dd54c5a1-0d4a-4f02-a111-7ce4ddc67a4d'}
null
Packagist
GHSA-3wwj-wh2w-g4xp
CRLF Injection in microweber
CRLF Injection leads to Stack Trace Exposure due to lack of filtering at https://demo.microweber.org/ in Packagist microweber/microweber prior to 1.2.11.
{'CVE-2022-0666'}
2022-02-23T15:04:54Z
2022-02-19T00:01:35Z
HIGH
null
{'CWE-93'}
{'https://github.com/microweber/microweber', 'https://github.com/microweber/microweber/commit/f0e338f1b7dc5ec9d99231f4ed3fa6245a5eb128', 'https://huntr.dev/bounties/7215afc7-9133-4749-8e8e-0569317dbd55', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0666'}
null
Packagist
GHSA-4p92-fv6v-fhfj
Cross-site Scripting in microweber
Microweber prior to 1.2.11 is vulnerable to reflected cross-site scripting.
{'CVE-2022-0723'}
2022-03-09T20:43:44Z
2022-02-27T00:00:15Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0723', 'https://github.com/microweber/microweber/commit/15e519a86e4b24526abaf9e6dc81cb1af86843a5', 'https://huntr.dev/bounties/16b0547b-1bb3-493c-8a00-5b6a11fca1c5', 'https://github.com/microweber/microweber'}
null
Packagist
GHSA-j5qg-w9jg-3wg3
Inability to de-op players if listed in ops.txt with non-lowercase letters
### Impact Originally reported in iTXTech/Genisys#1188 ```txt PotterHarry98 potterharry98 ``` `deop PotterHarry98` will remove `potterharry98` from the ops.txt but not `PotterHarry98`. Operator permissions are checked using `Config->exists()` with `lowercase=true`, which will result in a match: https://github.com/p...
null
2021-12-16T15:47:47Z
2021-12-16T18:53:57Z
LOW
null
null
{'https://github.com/pmmp/PocketMine-MP', 'https://github.com/pmmp/PocketMine-MP/blob/4.0.3/changelogs/4.0.md#403', 'https://github.com/pmmp/PocketMine-MP/commit/4d37b79ff7f9d9452e988387f97919a9a1c4954e', 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-j5qg-w9jg-3wg3', 'https://github.com/iTXTech/Genisy...
null
Packagist
GHSA-m6q5-wv4x-fv6h
Cross-site Scripting in Drupal Core
Access Bypass vulnerability in Drupal Core allows for an attacker to leverage the way that HTML is rendered for affected forms in order to exploit the vulnerability. This issue affects: Drupal Core 8.8.x versions prior to 8.8.10; 8.9.x versions prior to 8.9.6; 9.0.x versions prior to 9.0.6.
{'CVE-2020-13668'}
2022-02-25T15:33:47Z
2022-02-12T00:00:47Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-13668', 'https://github.com/drupal/core', 'https://www.drupal.org/sa-core-2020-009'}
null
Packagist
GHSA-qv7g-j98v-8pp7
XSS vulnerability on email template preview page
### Summary Email template preview is vulnerable to XSS payload added to email template content. The attacker should have permission to create or edit an email template. For successful payload, execution attacked user should preview a vulnerable email template. ### Workarounds There are no workarounds that address t...
{'CVE-2021-41236'}
2022-01-04T17:51:41Z
2022-01-06T18:34:35Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41236', 'https://github.com/oroinc/platform/security/advisories/GHSA-qv7g-j98v-8pp7', 'https://github.com/oroinc/platform', 'https://github.com/oroinc/platform/commit/2a089c971fc70bc63baf8770d29ee515ce5a415a'}
null
Packagist
GHSA-86pv-95mj-7w5f
Stored XSS vulnerability on Bounce Management Callback
### Impact Insufficient sanitization / filtering allows for arbitrary JavaScript Injection in Mautic using the bounce management callback function. The values submitted in the "error" and "error_related_to" parameters of the POST request of the bounce management callback will be permanently stored and executed once the...
{'CVE-2021-27910'}
2021-08-30T18:05:04Z
2021-09-01T18:40:48Z
HIGH
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-27910', 'https://github.com/mautic/mautic', 'https://github.com/mautic/mautic/security/advisories/GHSA-86pv-95mj-7w5f'}
null
Packagist
GHSA-7mv4-4xpg-xq44
FormField with square brackets in field name skips validation
FileField with array notation skips validation The FileField class is commonly used for file upload in custom code on a Silverstripe website. This field is designed to be used with a single file upload. PHP allows for submitting multiple values by adding square brackets to the field name. When this is done to a FileF...
{'CVE-2020-26138'}
2022-03-26T00:14:34Z
2022-03-26T00:14:34Z
MODERATE
null
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-26138', 'https://www.silverstripe.org/download/security-releases/cve-2020-26138/'}
null
Packagist
GHSA-579x-cjvr-cqj9
Observable Response Discrepancy in Lost Password Service
### Impact It is possible to enumerate usernames via the forgot password functionality ### Patches Update to version `10.1.3` or apply this patch manually: https://github.com/pimcore/pimcore/pull/10223.patch ### Workarounds Apply https://github.com/pimcore/pimcore/pull/10223.patch manually.
{'CVE-2021-39189'}
2021-09-17T18:38:47Z
2021-09-20T19:53:55Z
MODERATE
null
{'CWE-203', 'CWE-204'}
{'https://github.com/pimcore/pimcore', 'https://github.com/pimcore/pimcore/security/advisories/GHSA-579x-cjvr-cqj9', 'https://github.com/pimcore/pimcore/pull/10223.patch', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39189', 'https://github.com/pimcore/pimcore/pull/10223/commits/d0a4de39cf05dce6af71f8ca039132bdfcbb0dce',...
null
Packagist
GHSA-974j-wjxx-wggj
Incorrect Access Control vulnerability in api-platform/core
API Platform version from 2.2.0 to 2.3.5 contains an Incorrect Access Control vulnerability in GraphQL delete mutations that can result in a user authorized to delete a resource can delete any resource. This attack appears to be exploitable via the user must be authorized. This vulnerability appears to have been fixed ...
{'CVE-2019-1000011'}
2021-06-11T15:59:46Z
2019-10-14T21:23:26Z
MODERATE
null
{'CWE-284'}
{'https://github.com/FriendsOfPHP/security-advisories/blob/master/api-platform/core/CVE-2019-1000011.yaml', 'https://github.com/api-platform/core/issues/2364', 'https://github.com/api-platform/core/pull/2441', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1000011'}
null
Packagist
GHSA-mr6r-82x4-f4jj
Timing attacks might allow practical recovery of the long-term private key
In elliptic-php versions priot to 1.0.6, Timing attacks might be possible which can result in practical recovery of the long-term private key generated by the library under certain conditions. Leakage of a bit-length of the scalar during scalar multiplication is possible on an elliptic curve which might allow practical...
{'CVE-2019-10764'}
2021-08-18T22:40:49Z
2019-11-20T01:34:50Z
HIGH
null
{'CWE-203'}
{'https://minerva.crocs.fi.muni.cz/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10764', 'https://github.com/simplito/elliptic-php/commit/15652609aa55968d56685c2a9120535ccdc00fd9', 'https://snyk.io/vuln/SNYK-PHP-SIMPLITOELLIPTICPHP-534576'}
null
Packagist
GHSA-mxh3-2699-98g9
Cross-site Scripting pimcore
pimcore version 10.3.0 and prior is vulnerable to cross-site scripting.
{'CVE-2022-0510'}
2022-02-14T22:35:03Z
2022-02-09T00:00:28Z
MODERATE
null
{'CWE-79'}
{'https://huntr.dev/bounties/bb3525d5-dedc-48b8-ab04-ad4c72499abe', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0510', 'https://github.com/pimcore/pimcore/', 'https://github.com/pimcore/pimcore/commit/b5a9ad65e5a4dde1916f02019f8686ad835681ce'}
null
Packagist
GHSA-gj85-pvp5-mvf9
Cross-site Scripting in Beanstalk console
Beanstalk console prior to version 1.7.12 is vulnerable to cross-site scripting.
{'CVE-2022-0501'}
2022-02-14T22:30:43Z
2022-02-06T00:00:54Z
MODERATE
null
{'CWE-79'}
{'https://huntr.dev/bounties/9af1c35e-3f74-4c93-a241-e8be01335ec7', 'https://github.com/ptrofimov/beanstalk_console/commit/e351c8260ec1d3718d9e475ee57c7e12c47f19da', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0501', 'https://github.com/ptrofimov/beanstalk_console'}
null
Packagist
GHSA-xmq3-hgjx-6997
Cross-site Scripting in Pimcore
Pimcore 10.3.3 and prior is vulnerable to stored cross-site scripting. A patch is available on the 10.x branch and will likely be part of version 10.4.0.
{'CVE-2022-0705'}
2022-03-29T15:16:27Z
2022-03-17T00:00:47Z
MODERATE
null
{'CWE-79'}
{'https://github.com/pimcore/pimcore', 'https://huntr.dev/bounties/0e1b6836-e5b5-4e47-b9ab-2f6a4790ee7b', 'https://github.com/pimcore/pimcore/pull/11447', 'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0705'}
null
Packagist
GHSA-hfm8-2q22-h7hv
Cross-site Scripting in pegasus/google-for-jobs
An XSS issue was discovered in the google_for_jobs (aka Google for Jobs) extension before 1.5.1 and 2.x before 2.1.1 for TYPO3. The extension fails to properly encode user input for output in HTML context. A TYPO3 backend user account is required to exploit the vulnerability.
{'CVE-2021-43561'}
2021-11-17T21:24:36Z
2021-11-15T17:39:18Z
MODERATE
null
{'CWE-79'}
{'https://github.com/pegasuswerbeagentur/google_for_jobs', 'https://typo3.org/security/advisory/typo3-ext-sa-2021-015', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43561'}
null
Packagist
GHSA-427g-2r83-3ccm
Information disclosure through processing of external XML entities
An XML entity injection vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated admin user can craft document type definition for an XML representing XML layout. The crafted document type definition and XML layout allow processing of external entities which can lead...
{'CVE-2019-8126'}
2021-07-28T15:37:48Z
2019-11-12T22:59:24Z
MODERATE
null
{'CWE-776', 'CWE-611'}
{'https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update', 'https://nvd.nist.gov/vuln/detail/CVE-2019-8126'}
null
Packagist
GHSA-cpv8-6xgr-rmf6
Cross-site Scripting in Dolibarr
In “Dolibarr ERP CRM”, WYSIWYG Editor module, v2.8.1 to v13.0.2 are affected by a stored XSS vulnerability that allows low privileged application users to store malicious scripts in the “Private Note” field at “/adherents/note.php?id=1” endpoint. These scripts are executed in a victim’s browser when they open the page ...
{'CVE-2021-25955'}
2021-10-21T14:19:19Z
2021-08-30T16:22:46Z
CRITICAL
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-25955', 'https://github.com/Dolibarr/dolibarr/', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25955', 'https://github.com/Dolibarr/dolibarr/commit/796b2d201acb9938b903fb2afa297db289ecc93e'}
null
Packagist
GHSA-x8xx-x82q-42q3
Exposure of Resource to Wrong Sphere in ezsystems/ezplatform-kernel
When image files are uploaded, they are made accessible under a name similar to the original file name. There are two issues with this. Both require access to uploading images in order to exploit them, this limits the impact. The first issue is that certain injection attacks can be possible, since not all possible atta...
{'CVE-2022-25336'}
2022-03-04T21:37:29Z
2022-02-19T00:01:25Z
MODERATE
null
{'CWE-668'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-25336', 'https://github.com/ezsystems/ezplatform-kernel', 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-001-image-filenames-sanitization'}
null
Packagist
GHSA-xh9g-cp3v-p8q4
Missing Authorization in Crater Invoice
Crater Invoice prior to version 6.0.2 has a missing authorization vulnerability..
{'CVE-2022-0203'}
2022-02-03T21:01:13Z
2022-01-27T00:01:17Z
MODERATE
null
{'CWE-862', 'CWE-284'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0203', 'https://github.com/crater-invoice/crater', 'https://huntr.dev/bounties/395fc553-2b90-4e69-ba07-a316e1c06406', 'https://github.com/crater-invoice/crater/commit/dd324c8bb6b17009f82afe8bc830caec7241e992'}
null
Packagist
GHSA-82rr-mq4r-p4r3
SQL injection in francoisjacquet/rosariosis
An SQL Injection vulnerability exits in RosarioSIS before 7.6.1 via the votes parameter in ProgramFunctions/PortalPollsNotes.fnc.php.
{'CVE-2021-44567'}
2022-03-04T21:39:00Z
2022-02-25T00:01:08Z
CRITICAL
null
{'CWE-89'}
{'https://gitlab.com/francoisjacquet/rosariosis/-/commit/e001430aa9fb53d2502fb6f036f6c51c578d2016', 'https://gitlab.com/francoisjacquet/rosariosis', 'https://gitlab.com/francoisjacquet/rosariosis/-/issues/308', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44567', 'https://gitlab.com/francoisjacquet/rosariosis/-/commit/51...
null
Packagist
GHSA-7vph-p634-vrqf
Command Injection in RaspAP 2.6.6
includes/configure_client.php in RaspAP 2.6.6 allows attackers to execute commands via command injection.
{'CVE-2021-38556'}
2021-09-03T20:35:52Z
2021-09-02T17:11:00Z
HIGH
null
{'CWE-77'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-38556', 'https://github.com/RaspAP/raspap-webgui', 'https://zerosecuritypenetrationtesting.com/?page_id=306', 'https://github.com/RaspAP/raspap-webgui/blob/0e1d652c5e55f812aaf2a5908884e9db179416ee/includes/configure_client.php'}
null
Packagist
GHSA-p5hj-xxfr-pwc3
Code Injection in microweber
Code Injection in Packagist microweber/microweber prior to 1.2.11.
{'CVE-2022-0282'}
2022-01-27T18:32:42Z
2022-01-21T18:02:39Z
HIGH
null
{'CWE-94'}
{'https://github.com/microweber/microweber', 'https://huntr.dev/bounties/8815b642-bd9b-4737-951b-bde7319faedd', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0282', 'https://github.com/microweber/microweber/commit/51b5a4e3ef01e587797c0109159a8ad9d2bac77a'}
null
Packagist
GHSA-jv64-2m3x-6v4q
Cross-site scripting (XSS) vulnerability exists in the "contact us" plugin for Subrion CMS
A cross-site scripting (XSS) vulnerability exists in the "contact us" plugin for Subrion CMS <= 4.2.1 version via "List of subjects".
{'CVE-2021-41948'}
2022-05-04T18:10:42Z
2022-04-30T00:00:36Z
MODERATE
null
{'CWE-79'}
{'https://github.com/intelliants/subrion-plugin-contact_us/', 'https://github.com/intelliants/subrion-plugin-contact_us/issues/8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41948'}
null
Packagist
GHSA-7vwg-39h8-8qp8
/user/sessions endpoint allows detecting valid accounts
This Security Advisory is about a vulnerability in eZ Platform v1.13, v2.5, and v3.2, and in Ibexa DXP and Ibexa Open Source v3.3. The /user/sessions endpoint can let an attacker detect if a given username or email refers to a valid account. This can be detected through differences in the response data or response time...
null
2021-03-11T17:41:09Z
2021-03-11T17:42:01Z
HIGH
null
{'CWE-203'}
{'https://github.com/ezsystems/ezplatform-rest/commit/e239bba8b154a3b4cf787e29b9f15edf8945d933', 'https://packagist.org/packages/ezsystems/ezplatform-rest', 'https://github.com/ezsystems/ezplatform-rest/security/advisories/GHSA-7vwg-39h8-8qp8'}
null
Packagist
GHSA-79mg-4w23-4fqc
Unauthenticated SQL Injection in Cachet
### Impact In Cachet versions through 2.3.18, there is a SQL injection which is in the `SearchableTrait#scopeSearch()`. Attackers without authentication can utilize this vulnerability to exfiltrate sensitive data from the database such as administrator's password and session. ### Patches The original repository of [h...
{'CVE-2021-39165'}
2021-08-27T12:54:52Z
2021-08-30T16:12:58Z
HIGH
null
{'CWE-287', 'CWE-89'}
{'https://github.com/fiveai/Cachet/security/advisories/GHSA-79mg-4w23-4fqc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39165', 'https://github.com/fiveai/Cachet/commit/27bca8280419966ba80c6fa283d985ddffa84bb6'}
null
Packagist
GHSA-9722-rr68-rfpg
Upload whitelisted files to any directory in OctoberCMS
### Impact An attacker can exploit this vulnerability to upload jpg, jpeg, bmp, png, webp, gif, ico, css, js, woff, woff2, svg, ttf, eot, json, md, less, sass, scss, xml files to any directory of an October CMS server. The vulnerability is only exploitable by an authenticated backend user with the `cms.manage_assets` p...
{'CVE-2020-5297'}
2021-03-04T18:26:59Z
2020-06-03T21:58:27Z
LOW
null
{'CWE-73'}
{'https://github.com/octobercms/october/commit/6711dae8ef70caf0e94cec434498012a2ccd86b8', 'https://github.com/octobercms/october/security/advisories/GHSA-9722-rr68-rfpg', 'http://seclists.org/fulldisclosure/2020/Aug/2', 'http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-I...
null
Packagist
GHSA-3vg7-jw9m-pc3f
Broken Access Control in Form Framework
### Problem Due to improper input validation, attackers can by-pass restrictions of predefined options and submit arbitrary data in the Form Designer backend module of the Form Framework. In the default configuration of the Form Framework this allows attackers to explicitly allow arbitrary mime-types for file uploads...
{'CVE-2021-21357'}
2021-03-29T18:01:00Z
2021-03-23T01:53:57Z
HIGH
null
{'CWE-434', 'CWE-22', 'CWE-20'}
{'https://packagist.org/packages/typo3/cms-form', 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-3vg7-jw9m-pc3f', 'https://typo3.org/security/advisory/typo3-core-sa-2021-003', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21357'}
null
Packagist
GHSA-gwpx-q2h9-wxgx
elgg is vulnerable to Authorization Bypass Through User-Controlled Key
elgg is vulnerable to Authorization Bypass Through User-Controlled Key
{'CVE-2021-3964'}
2021-12-03T15:16:06Z
2021-12-03T20:43:25Z
MODERATE
null
{'CWE-639'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3964', 'https://huntr.dev/bounties/a4df45d6-b739-4299-967f-c960b569383a', 'https://github.com/elgg/elgg/', 'https://github.com/elgg/elgg/commit/d9fcad76ee380ea17edd61d13d0f87828ea3f744'}
null
Packagist
GHSA-673x-f5wx-fxpw
Cross Site Scripting and RCE in baserCMS
baserCMS 4.3.6 and earlier is affected by Cross Site Scripting (XSS) and Remote Code Execution (RCE). * Impact: XSS to RCE via Arbitrary file upload. * Attack vector is: Administrator must be logged in. * Components are: ThemeFilesController.php, UploaderFilesController.php. * Tested baserCMS Version : 4.3.6 (Latest) ...
{'CVE-2020-15159'}
2021-01-07T23:39:00Z
2020-08-28T21:45:15Z
LOW
null
{'CWE-79'}
{'https://basercms.net/security/20200827', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15159', 'https://github.com/baserproject/basercms/commit/16a7b3cd09a0ca355474119c76897eac2034a66d', 'https://github.com/baserproject/basercms/security/advisories/GHSA-673x-f5wx-fxpw'}
null
Packagist
GHSA-g7w8-pp9w-7p32
Creation of order credits was not validated by acl in admin orders
### Impact Creation of order credits was not validated by ACL in admin orders ### Patches We recommend updating to the current version 6.4.1.1. You can get the update to 6.4.1.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ### Workarounds For ...
null
2021-10-05T17:26:03Z
2021-06-28T16:57:32Z
LOW
null
{'CWE-306'}
{'https://github.com/shopware/platform/security/advisories/GHSA-g7w8-pp9w-7p32', 'https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32709', 'https://www.shopware.com/en/download/#shopware-6', 'https://github.com/shopware/platform'}
null
Packagist
GHSA-xpfv-89vg-r562
Cross Site Request Forgery in Moodle
A flaw was found in Moodle in versions 3.11 to 3.11.4, 3.10 to 3.10.8, 3.9 to 3.9.11 and earlier unsupported versions. The "delete badge alignment" functionality did not include the necessary token check to prevent a CSRF risk.
{'CVE-2022-0335'}
2022-02-02T16:06:32Z
2022-01-28T22:07:23Z
HIGH
null
{'CWE-352'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=2043666', 'https://github.com/moodle/moodle/commit/d40cc61eba229c6d1f47b9a525022fbc9136b9f6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0335', 'https://github.com/moodle/moodle', 'https://moodle.org/mod/forum/discuss.php?d=431103'}
null
Packagist
GHSA-68wg-qv6r-j4vp
SQL Injection in usmanhalalit/pixie
Pixie versions 1.0.x before 1.0.3, and 2.0.x before 2.0.2 allow SQL Injection in the limit() function due to improper sanitization.
{'CVE-2019-10766'}
2021-08-18T22:44:59Z
2019-11-20T17:44:54Z
CRITICAL
null
{'CWE-89'}
{'https://snyk.io/vuln/SNYK-PHP-USMANHALALITPIXIE-534879', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10766', 'https://github.com/usmanhalalit/pixie/commit/9bd991021abbcbfb19347a07dca8b7e518b8abc9'}
null
Packagist
GHSA-7fjp-g4m7-fx23
User (Encrypted) Password Field Being Serialised
### Impact Leaking Password field during serialisation of the User model. Password is in the encrypted form but if User model is requested in json or array form the value is printed. ### Patches Issue has been patched in version 0.3.7-beta and onwards. ### Workarounds Add the 'password' field to the Users model file ...
null
2021-04-12T20:05:57Z
2021-04-13T15:12:26Z
LOW
null
{'CWE-200'}
{'https://github.com/pwweb/laravel-core/security/advisories/GHSA-7fjp-g4m7-fx23'}
null
Packagist
GHSA-g54x-29xv-58h5
Remote code execution in Subrion
Subrion is an open source php content management system. A Remiote Code Execution (RCE) vulnerability exiss in Subrion CMS 4.2.1 via modified code in a background field; when the information is modified, the data in it will be executed through eval().
{'CVE-2021-43464'}
2022-04-15T02:46:19Z
2022-04-05T00:00:23Z
HIGH
null
null
{'https://github.com/intelliants/subrion/issues/888', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43464', 'https://github.com/intelliants/subrion'}
null
Packagist
GHSA-79hv-pfx6-hhpj
Cross-site scripting (XSS)
Cross-site scripting (XSS) in modules/content/admin/content.php in ImpressCMS profile 1.4.2 allows remote attackers to inject arbitrary web script or HTML parameters through the "Display Name" field.
{'CVE-2021-28088'}
2021-03-12T19:56:01Z
2021-03-12T21:34:02Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-28088', 'https://anotepad.com/note/read/s3kkk6h7', 'https://hackerone.com/reports/1119296'}
null
Packagist
GHSA-crf2-xm6x-46p6
Observable Timing Discrepancy in OpenMage LTS
### Impact This vulnerability allows to circumvent the **formkey protection** in the Admin Interface and increases the attack surface for **Cross Site Request Forgery** attacks ### Patches The latest OpenMage Versions up from 19.4.6 and 20.0.2 have this Issue solved ### References Related to Adobes CVE-2020-9690 (...
{'CVE-2020-15151'}
2021-11-19T15:36:13Z
2020-08-19T18:02:36Z
HIGH
null
{'CWE-203', 'CWE-352'}
{'https://github.com/OpenMage/magento-lts', 'https://helpx.adobe.com/security/products/magento/apsb20-47.html', 'https://github.com/OpenMage/magento-lts/security/advisories/GHSA-crf2-xm6x-46p6', 'https://github.com/OpenMage/magento-lts/commit/7c526bc6a6a51b57a1bab4c60f104dc36cde347a', 'https://nvd.nist.gov/vuln/detail/...
null
Packagist
GHSA-2rxh-h6h9-qrqc
Class destructors causing side-effects when being unserialized in TYPO3 CMS
Calling unserialize() on malicious user-submitted content can result in the following scenarios: - trigger deletion of arbitrary directory in file system (if writable for web server) - trigger message submission via email using identity of web site (mail relay) Another insecure deserialization vulnerability is require...
{'CVE-2020-11066'}
2021-01-08T20:16:34Z
2020-05-13T23:18:38Z
HIGH
null
{'CWE-915'}
{'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-2rxh-h6h9-qrqc', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11066'}
null
Packagist
GHSA-64fq-9c6w-rq44
Improper Neutralization of Formula Elements in a CSV File in Kimai 2
A CSV Injection vulnerablity exists in Kimai Kimai 2 prior to 1.14.1 via a description in a new timesheet.
{'CVE-2021-43515'}
2022-04-22T20:21:47Z
2022-04-09T00:00:25Z
HIGH
null
{'CWE-1236'}
{'https://github.com/kevinpapst/kimai2/pull/2532', 'https://github.com/kevinpapst/kimai2/commit/dad1b8b772947f1596175add1b4f33b791705507#diff-6774f5865dbaf8bc6c55b75bd92e6f9950ebe7834aa2efd828a19fd637e667cf', 'https://github.com/kevinpapst/kimai2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43515'}
null
Packagist
GHSA-qcgx-7p5f-hxvr
Discoverability of user password hash in Statamic CMS
## Description It was possible to confirm a single character of a user's password hash (just the hash, not the password) using a specially crafted regular expression filter in the users endpoint of the REST API. Many requests could eventually uncover the entire hash. The hash would not be in the response, however the...
{'CVE-2022-24784'}
2022-03-29T22:11:45Z
2022-03-29T22:11:45Z
LOW
null
{'CWE-326', 'CWE-200'}
{'https://github.com/statamic/cms', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24784', 'https://github.com/statamic/cms/security/advisories/GHSA-qcgx-7p5f-hxvr', 'https://github.com/statamic/cms/issues/5604', 'https://github.com/statamic/cms/pull/5568'}
null
Packagist
GHSA-q348-f93x-9gx4
Lack of Input Validation in zendesk_api_client_php for Zendesk Subdomain
### Impact Lack of input validation of the Zendesk subdomain could expose users of the library to Server Side Request Forgery (SSRF). ### Resolution Validate the provided Zendesk subdomain to be a valid subdomain in: * getAuthUrl * getAccessToken
{'CVE-2021-30492'}
2021-04-28T22:29:16Z
2021-04-29T21:53:06Z
CRITICAL
null
{'CWE-918', 'CWE-20'}
{'https://github.com/zendesk/zendesk_api_client_php/commit/b451b743d9d6d81a9abf7cb86e70ec9c5332123e', 'https://github.com/zendesk/zendesk_api_client_php/pull/466', 'https://github.com/zendesk/zendesk_api_client_php/security/advisories/GHSA-q348-f93x-9gx4'}
null
Packagist
GHSA-59x4-67mh-px54
Crypt_GPG does not prevent additional options in GPG calls
The Crypt_GPG extension before 1.6.7 for PHP does not prevent additional options in GPG calls, which presents a risk for certain environments and GPG versions.
{'CVE-2022-24953'}
2022-03-01T18:36:13Z
2022-02-18T00:00:36Z
MODERATE
null
{'CWE-20'}
{'https://github.com/pear/Crypt_GPG/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24953', 'https://github.com/pear/Crypt_GPG/commit/29c0fbe96d0d4063ecd5c9a4644cb65a7fb7cc4e', 'https://github.com/pear/Crypt_GPG/commit/74c8f989cefbe0887274b461dc56197e121bfd04'}
null
Packagist
GHSA-h6m7-j4h3-9rf5
Remote Code Execution in SyliusResourceBundle
### Impact Request parameters injected inside an expression evaluated by `symfony/expression-language` package haven't been sanitized properly. This allows the attacker to access any public service by manipulating that request parameter, allowing for Remote Code Execution. The vulnerable versions include: `<=1.3.13 |...
{'CVE-2020-15146'}
2021-11-19T15:36:47Z
2020-08-19T19:52:30Z
CRITICAL
null
{'CWE-917', 'CWE-74'}
{'https://github.com/Sylius/SyliusResourceBundle', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15146', 'https://github.com/Sylius/SyliusResourceBundle/security/advisories/GHSA-h6m7-j4h3-9rf5'}
null
Packagist
GHSA-5rcc-6cmj-7728
Cross-site Scripting in BookStack
Iframe tags don't have a sandbox attribute, this makes an attacker able to execute malicious javascript via an iframe and perform phishing attacks. The sandbox attribute will block script execution and prevents the content to navigate its top-level browsing context which will stop this type of attack.
{'CVE-2022-0877'}
2022-03-14T21:03:33Z
2022-03-09T00:00:44Z
MODERATE
null
{'CWE-79'}
{'https://huntr.dev/bounties/b04df4e3-ae5a-4dc6-81ec-496248b15f3c', 'https://github.com/bookstackapp/bookstack', 'https://github.com/bookstackapp/bookstack/commit/856fca8289b7370cafa033ea21c408e7d4303fd6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0877'}
null
Packagist
GHSA-vpq7-m4qm-p2gp
Business Logic Errors in microweber
Business Logic Errors in Packagist microweber/microweber prior to 1.2.11.
{'CVE-2022-0596'}
2022-02-24T13:55:54Z
2022-02-16T00:01:45Z
MODERATE
null
null
{'https://github.com/microweber/microweber', 'https://github.com/microweber/microweber/commit/91a9d899741557c75050614ff7adb8c0e3feb005', 'https://huntr.dev/bounties/f68b994e-2b8b-49f5-af2a-8cd99e8048a5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0596'}
null
Packagist
GHSA-h7f9-cvh5-qw7f
Path traversal in pimcore/pimcore
This affects the package pimcore/pimcore before 6.8.8. A Local FIle Inclusion vulnerability exists in the downloadCsvAction function of the CustomReportController class (bundles/AdminBundle/Controller/Reports/CustomReportController.php). An authenticated user can reach this function with a GET request at the following ...
{'CVE-2021-23340'}
2021-02-24T07:37:55Z
2021-02-25T16:32:46Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23340', 'https://github.com/pimcore/pimcore/commit/1786bdd4962ee51544fad537352c2b4223309442', 'https://github.com/pimcore/pimcore/blob/v6.7.2/bundles/AdminBundle/Controller/Reports/CustomReportController.php%23L454', 'https://snyk.io/vuln/SNYK-PHP-PIMCOREPIMCORE-1070132'}
null
Packagist
GHSA-mj9p-v2r8-wf8w
Cross-site scripting in SimpleSAMLphp
### Background SimpleSAMLphp allows users to report errors and failures to the system administrators via a web form. This web form gathers some contextual information automatically, but it also allows the user to provide their email address for follow-ups and a free-text explanation of what happened. Once submitted, t...
{'CVE-2020-5226'}
2021-01-08T20:32:54Z
2020-01-24T21:26:54Z
LOW
null
{'CWE-79'}
{'https://github.com/simplesamlphp/simplesamlphp/security/advisories/GHSA-mj9p-v2r8-wf8w', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5226', 'https://simplesamlphp.org/security/202001-01'}
null
Packagist
GHSA-v9p9-535w-4285
Prototype Pollution in litespeed.js and appwrite/server-ce
This affects the package litespeed.js before 0.3.12; the package appwrite/server-ce from 0.12.0 and before 0.12.2, before 0.11.1. When parsing the query string in the getJsonFromUrl function, the key that is set in the result object is not properly sanitized leading to a Prototype Pollution vulnerability.
{'CVE-2021-23682'}
2022-02-25T15:40:33Z
2022-02-17T00:00:32Z
CRITICAL
null
{'CWE-1321'}
{'https://github.com/litespeed-js/litespeed.js/pull/18', 'https://snyk.io/vuln/SNYK-JS-LITESPEEDJS-2359250', 'https://github.com/appwrite/appwrite/pull/2778', 'https://snyk.io/vuln/SNYK-PHP-APPWRITESERVERCE-2401820', 'https://github.com/appwrite/appwrite/releases/tag/0.12.2', 'https://github.com/appwrite/appwrite/relea...
null
Packagist
GHSA-x2j7-6hxm-87p3
Remote code injection
An issue was discovered in Craft CMS before 3.6.7. In some circumstances, a potential Remote Code Execution vulnerability existed on sites that did not restrict administrative changes (if an attacker were somehow able to hijack an administrator's session).
{'CVE-2021-27903'}
2021-07-07T17:13:30Z
2021-07-02T18:36:41Z
CRITICAL
null
{'CWE-94', 'CWE-74'}
{'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#security', 'https://github.com/craftcms/cms/commit/c17728fa0bec11d3b82c34defe0930ed409aec38', 'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#367---2021-02-23', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27903'}
null
Packagist
GHSA-xv7v-rf6g-xwrc
Directory Traversal in typo3/phar-stream-wrapper
The PharStreamWrapper (aka phar-stream-wrapper) package 2.x before 2.1.1 and 3.x before 3.1.1 for TYPO3 does not prevent directory traversal, which allows attackers to bypass a deserialization protection mechanism, as demonstrated by a phar:///path/bad.phar/../good.phar URL.
{'CVE-2019-11831'}
2021-09-30T16:49:05Z
2021-09-30T17:10:14Z
CRITICAL
null
{'CWE-502', 'CWE-22'}
{'https://github.com/TYPO3/phar-stream-wrapper/releases/tag/v2.1.1', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11831', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E3NUKPG7V4QEM6QXRMHYR4ABFMW5MM2P/', 'https://github.com/TYPO3/phar-stream-wrapper/releases/tag/v3.1.1', ...
null
Packagist
GHSA-w2fr-65vp-mxw3
Deserialization of untrusted data in Symfony
In Symfony before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, it is possible to cache objects that may contain bad user input. On serialization or unserialization, this could result in the deletion of files that the current user has access to. This is related to symfony/cache and symfony/phpun...
{'CVE-2019-10912'}
2021-08-19T17:12:23Z
2020-02-12T18:44:50Z
HIGH
null
{'CWE-502'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BHHIG4GMSGEIDT3RITSW7GJ5NT6IBHXU/', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10912.yaml', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject....
null
Packagist
GHSA-8xv9-qcr9-ww9j
Authenticated XML External Entity Processing
### Impact Authenticated XML External Entity Processing ### Patches We recommend to update to the current version 6.3.2.1. You can get the update to 6.3.2.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ### Workarounds For older versions of 6.1...
null
2021-10-04T21:28:06Z
2020-10-19T21:32:18Z
MODERATE
null
{'CWE-611'}
{'https://github.com/shopware/platform', 'https://github.com/shopware/platform/security/advisories/GHSA-8xv9-qcr9-ww9j', 'https://snyk.io/vuln/SNYK-PHP-SHOPWAREPLATFORM-1019470'}
null
Packagist
GHSA-j85q-whc9-g4p9
Use of Cryptographically Weak Pseudo-Random Number Generator in showdoc
showdoc is vulnerable to Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
{'CVE-2021-3678'}
2021-08-16T23:13:12Z
2021-09-02T17:07:48Z
MODERATE
null
{'CWE-338'}
{'https://github.com/star7th/showdoc/commit/4b962c1740311e0d46775023b6acba39ad60e370', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3678', 'https://huntr.dev/bounties/f9a9defd-29ea-4442-b692-ff1512813de4'}
null
Packagist
GHSA-m2q4-qghh-p9cq
Server-Side Request Forgery in yoast_seo
The yoast_seo (aka Yoast SEO) extension before 7.2.1 for TYPO3 allows SSRF via a backend user account.
{'CVE-2021-31779'}
2021-05-20T22:39:55Z
2021-05-21T19:21:38Z
MODERATE
null
{'CWE-918'}
{'https://typo3.org/security/advisory/typo3-ext-sa-2021-006', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31779'}
null
Packagist
GHSA-cv9j-78f7-w6v9
Incorrect Authorization in TYPO3 extension
The l10nmgr (aka Localization Manager) extension before 7.4.0, 8.x before 8.7.0, and 9.x before 9.2.0 for TYPO3 allows Information Disclosure (translatable fields).
{'CVE-2020-25025'}
2021-07-28T19:21:31Z
2021-07-26T21:41:22Z
MODERATE
null
{'CWE-863'}
{'https://typo3.org/help/security-advisories', 'https://typo3.org/security/advisory/typo3-ext-sa-2020-016', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25025'}
null
Packagist
GHSA-jp6h-mxhx-pgqh
Shopware guest session is shared between customers
### Impact Guest sessions are shared between customers when HTTP cache is enabled. Setups with Varnish are not affected by this issue ## Patches We recommend updating to the current version 6.4.8.2. You can get the update to 6.4.8.2 regularly via the Auto-Updater or directly via the download overview. https://www.sh...
{'CVE-2022-24745'}
2022-03-24T00:22:07Z
2022-03-10T17:28:55Z
MODERATE
null
{'CWE-384'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24745', 'https://github.com/shopware/platform', 'https://github.com/shopware/platform/security/advisories/GHSA-jp6h-mxhx-pgqh', 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-03-2022?_ga=2.159980029.1931762803.1646933116-1088482757.1646933116'}
null
Packagist
GHSA-4jhw-2p6j-5wmp
Open Redirection in Login Handling
### Problem It has been discovered that Login Handling is susceptible to open redirection which allows attackers redirecting to arbitrary content, and conducting phishing attacks. No authentication is required in order to exploit this vulnerability. ### Solution Update to TYPO3 versions 6.2.57, 7.6.51, 8.7.40, 9.5.25...
{'CVE-2021-21338'}
2021-03-29T18:07:53Z
2021-03-23T01:53:35Z
MODERATE
null
{'CWE-601'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21338', 'https://packagist.org/packages/typo3/cms-core', 'https://typo3.org/security/advisory/typo3-core-sa-2021-001', 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-4jhw-2p6j-5wmp'}
null
Packagist
GHSA-952m-m83c-3xm6
Open redirect in direct_mail
The direct_mail extension through 5.2.3 for TYPO3 has an Open Redirect via jumpUrl.
{'CVE-2020-12699'}
2021-05-21T23:05:25Z
2021-05-24T16:58:37Z
MODERATE
null
{'CWE-601'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-12699', 'https://typo3.org/help/security-advisories', 'https://typo3.org/security/advisory/typo3-ext-sa-2020-005'}
null
Packagist
GHSA-x752-qjv4-c4hc
Remote code injection in dompdf/dompdf
Dompdf is an HTML to PDF converter. Dompdf before 1.2.1 allows remote code execution via a .php file in the src:url field of an @font-face Cascading Style Sheets (CSS) statement (within an HTML input file).
{'CVE-2022-28368'}
2022-04-15T16:49:27Z
2022-04-04T00:00:55Z
CRITICAL
null
{'CWE-74'}
{'https://snyk.io/blog/security-alert-php-pdf-library-dompdf-rce/', 'https://packagist.org/packages/dompdf/dompdf#v1.2.1', 'https://github.com/snyk-labs/php-goof', 'https://github.com/dompdf/dompdf/issues/2598', 'https://github.com/dompdf/dompdf', 'https://nvd.nist.gov/vuln/detail/CVE-2022-28368', 'https://github.com/d...
null
Packagist
GHSA-xx8f-qf9f-5fgw
Remote code execution in zendframework and laminas-http
Zend Framework 3.0.0 has a deserialization vulnerability that can lead to remote code execution if the content is controllable, related to the __destruct method of the Zend\Http\Response\Stream class in Stream.php. NOTE: the code may be related to Laminas Project laminas-http. Zend Framework is no longer supported by t...
{'CVE-2021-3007'}
2021-04-07T18:11:15Z
2021-06-08T20:11:19Z
CRITICAL
null
{'CWE-502'}
{'https://github.com/laminas/laminas-http/commits/2.15.x/src/Response/Stream.php', 'https://github.com/laminas/laminas-http/pull/48', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3007', 'https://research.checkpoint.com/2021/freakout-leveraging-newest-vulnerabilities-for-creating-a-botnet/', 'https://github.com/laminas/la...
null
Packagist
GHSA-c32w-3cqh-f6jx
Weak Password Recovery Mechanism for Forgotten Password
In “Dolibarr” application, v2.8.1 to v13.0.2 are vulnerable to account takeover via password reset functionality. A low privileged attacker can reset the password of any user in the application using the password reset link the user received through email when requested for a forgotten password.
{'CVE-2021-25957'}
2021-10-21T14:15:19Z
2021-09-02T17:08:33Z
HIGH
null
{'CWE-640'}
{'https://github.com/Dolibarr/dolibarr/commit/87f9530272925f0d651f59337a35661faeb6f377', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25957', 'https://github.com/Dolibarr/dolibarr', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25957'}
null