ecosystem stringclasses 14
values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5
values | score float64 0 10 ⌀ | cwe_id stringclasses 988
values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Packagist | GHSA-xp5q-77mh-6hm2 | firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF) | firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF) | {'CVE-2021-3728'} | 2021-08-24T20:02:07Z | 2021-08-25T14:50:17Z | MODERATE | null | {'CWE-352'} | {'https://github.com/firefly-iii/firefly-iii/commit/14cdce113e0eb8090d09066fcd2b5cf03b5ac84e', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3728', 'https://github.com/firefly-iii/firefly-iii/', 'https://huntr.dev/bounties/dd54c5a1-0d4a-4f02-a111-7ce4ddc67a4d'} | null |
Packagist | GHSA-3wwj-wh2w-g4xp | CRLF Injection in microweber | CRLF Injection leads to Stack Trace Exposure due to lack of filtering at https://demo.microweber.org/ in Packagist microweber/microweber prior to 1.2.11. | {'CVE-2022-0666'} | 2022-02-23T15:04:54Z | 2022-02-19T00:01:35Z | HIGH | null | {'CWE-93'} | {'https://github.com/microweber/microweber', 'https://github.com/microweber/microweber/commit/f0e338f1b7dc5ec9d99231f4ed3fa6245a5eb128', 'https://huntr.dev/bounties/7215afc7-9133-4749-8e8e-0569317dbd55', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0666'} | null |
Packagist | GHSA-4p92-fv6v-fhfj | Cross-site Scripting in microweber | Microweber prior to 1.2.11 is vulnerable to reflected cross-site scripting. | {'CVE-2022-0723'} | 2022-03-09T20:43:44Z | 2022-02-27T00:00:15Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0723', 'https://github.com/microweber/microweber/commit/15e519a86e4b24526abaf9e6dc81cb1af86843a5', 'https://huntr.dev/bounties/16b0547b-1bb3-493c-8a00-5b6a11fca1c5', 'https://github.com/microweber/microweber'} | null |
Packagist | GHSA-j5qg-w9jg-3wg3 | Inability to de-op players if listed in ops.txt with non-lowercase letters | ### Impact
Originally reported in iTXTech/Genisys#1188
```txt
PotterHarry98
potterharry98
```
`deop PotterHarry98`
will remove `potterharry98` from the ops.txt but not `PotterHarry98`.
Operator permissions are checked using `Config->exists()` with `lowercase=true`, which will result in a match:
https://github.com/p... | null | 2021-12-16T15:47:47Z | 2021-12-16T18:53:57Z | LOW | null | null | {'https://github.com/pmmp/PocketMine-MP', 'https://github.com/pmmp/PocketMine-MP/blob/4.0.3/changelogs/4.0.md#403', 'https://github.com/pmmp/PocketMine-MP/commit/4d37b79ff7f9d9452e988387f97919a9a1c4954e', 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-j5qg-w9jg-3wg3', 'https://github.com/iTXTech/Genisy... | null |
Packagist | GHSA-m6q5-wv4x-fv6h | Cross-site Scripting in Drupal Core | Access Bypass vulnerability in Drupal Core allows for an attacker to leverage the way that HTML is rendered for affected forms in order to exploit the vulnerability. This issue affects: Drupal Core 8.8.x versions prior to 8.8.10; 8.9.x versions prior to 8.9.6; 9.0.x versions prior to 9.0.6. | {'CVE-2020-13668'} | 2022-02-25T15:33:47Z | 2022-02-12T00:00:47Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-13668', 'https://github.com/drupal/core', 'https://www.drupal.org/sa-core-2020-009'} | null |
Packagist | GHSA-qv7g-j98v-8pp7 | XSS vulnerability on email template preview page | ### Summary
Email template preview is vulnerable to XSS payload added to email template content. The attacker should have permission to create or edit an email template. For successful payload, execution attacked user should preview a vulnerable email template.
### Workarounds
There are no workarounds that address t... | {'CVE-2021-41236'} | 2022-01-04T17:51:41Z | 2022-01-06T18:34:35Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-41236', 'https://github.com/oroinc/platform/security/advisories/GHSA-qv7g-j98v-8pp7', 'https://github.com/oroinc/platform', 'https://github.com/oroinc/platform/commit/2a089c971fc70bc63baf8770d29ee515ce5a415a'} | null |
Packagist | GHSA-86pv-95mj-7w5f | Stored XSS vulnerability on Bounce Management Callback | ### Impact
Insufficient sanitization / filtering allows for arbitrary JavaScript Injection in Mautic using the bounce management callback function. The values submitted in the "error" and "error_related_to" parameters of the POST request of the bounce management callback will be permanently stored and executed once the... | {'CVE-2021-27910'} | 2021-08-30T18:05:04Z | 2021-09-01T18:40:48Z | HIGH | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-27910', 'https://github.com/mautic/mautic', 'https://github.com/mautic/mautic/security/advisories/GHSA-86pv-95mj-7w5f'} | null |
Packagist | GHSA-7mv4-4xpg-xq44 | FormField with square brackets in field name skips validation | FileField with array notation skips validation
The FileField class is commonly used for file upload in custom code on a Silverstripe website. This field is designed to be used with a single file upload.
PHP allows for submitting multiple values by adding square brackets to the field name. When this is done to a FileF... | {'CVE-2020-26138'} | 2022-03-26T00:14:34Z | 2022-03-26T00:14:34Z | MODERATE | null | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-26138', 'https://www.silverstripe.org/download/security-releases/cve-2020-26138/'} | null |
Packagist | GHSA-579x-cjvr-cqj9 | Observable Response Discrepancy in Lost Password Service | ### Impact
It is possible to enumerate usernames via the forgot password functionality
### Patches
Update to version `10.1.3` or apply this patch manually: https://github.com/pimcore/pimcore/pull/10223.patch
### Workarounds
Apply https://github.com/pimcore/pimcore/pull/10223.patch manually.
| {'CVE-2021-39189'} | 2021-09-17T18:38:47Z | 2021-09-20T19:53:55Z | MODERATE | null | {'CWE-203', 'CWE-204'} | {'https://github.com/pimcore/pimcore', 'https://github.com/pimcore/pimcore/security/advisories/GHSA-579x-cjvr-cqj9', 'https://github.com/pimcore/pimcore/pull/10223.patch', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39189', 'https://github.com/pimcore/pimcore/pull/10223/commits/d0a4de39cf05dce6af71f8ca039132bdfcbb0dce',... | null |
Packagist | GHSA-974j-wjxx-wggj | Incorrect Access Control vulnerability in api-platform/core | API Platform version from 2.2.0 to 2.3.5 contains an Incorrect Access Control vulnerability in GraphQL delete mutations that can result in a user authorized to delete a resource can delete any resource. This attack appears to be exploitable via the user must be authorized. This vulnerability appears to have been fixed ... | {'CVE-2019-1000011'} | 2021-06-11T15:59:46Z | 2019-10-14T21:23:26Z | MODERATE | null | {'CWE-284'} | {'https://github.com/FriendsOfPHP/security-advisories/blob/master/api-platform/core/CVE-2019-1000011.yaml', 'https://github.com/api-platform/core/issues/2364', 'https://github.com/api-platform/core/pull/2441', 'https://nvd.nist.gov/vuln/detail/CVE-2019-1000011'} | null |
Packagist | GHSA-mr6r-82x4-f4jj | Timing attacks might allow practical recovery of the long-term private key | In elliptic-php versions priot to 1.0.6, Timing attacks might be possible which can result in practical recovery of the long-term private key generated by the library under certain conditions. Leakage of a bit-length of the scalar during scalar multiplication is possible on an elliptic curve which might allow practical... | {'CVE-2019-10764'} | 2021-08-18T22:40:49Z | 2019-11-20T01:34:50Z | HIGH | null | {'CWE-203'} | {'https://minerva.crocs.fi.muni.cz/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10764', 'https://github.com/simplito/elliptic-php/commit/15652609aa55968d56685c2a9120535ccdc00fd9', 'https://snyk.io/vuln/SNYK-PHP-SIMPLITOELLIPTICPHP-534576'} | null |
Packagist | GHSA-mxh3-2699-98g9 | Cross-site Scripting pimcore | pimcore version 10.3.0 and prior is vulnerable to cross-site scripting. | {'CVE-2022-0510'} | 2022-02-14T22:35:03Z | 2022-02-09T00:00:28Z | MODERATE | null | {'CWE-79'} | {'https://huntr.dev/bounties/bb3525d5-dedc-48b8-ab04-ad4c72499abe', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0510', 'https://github.com/pimcore/pimcore/', 'https://github.com/pimcore/pimcore/commit/b5a9ad65e5a4dde1916f02019f8686ad835681ce'} | null |
Packagist | GHSA-gj85-pvp5-mvf9 | Cross-site Scripting in Beanstalk console | Beanstalk console prior to version 1.7.12 is vulnerable to cross-site scripting. | {'CVE-2022-0501'} | 2022-02-14T22:30:43Z | 2022-02-06T00:00:54Z | MODERATE | null | {'CWE-79'} | {'https://huntr.dev/bounties/9af1c35e-3f74-4c93-a241-e8be01335ec7', 'https://github.com/ptrofimov/beanstalk_console/commit/e351c8260ec1d3718d9e475ee57c7e12c47f19da', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0501', 'https://github.com/ptrofimov/beanstalk_console'} | null |
Packagist | GHSA-xmq3-hgjx-6997 | Cross-site Scripting in Pimcore | Pimcore 10.3.3 and prior is vulnerable to stored cross-site scripting. A patch is available on the 10.x branch and will likely be part of version 10.4.0. | {'CVE-2022-0705'} | 2022-03-29T15:16:27Z | 2022-03-17T00:00:47Z | MODERATE | null | {'CWE-79'} | {'https://github.com/pimcore/pimcore', 'https://huntr.dev/bounties/0e1b6836-e5b5-4e47-b9ab-2f6a4790ee7b', 'https://github.com/pimcore/pimcore/pull/11447', 'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0705'} | null |
Packagist | GHSA-hfm8-2q22-h7hv | Cross-site Scripting in pegasus/google-for-jobs | An XSS issue was discovered in the google_for_jobs (aka Google for Jobs) extension before 1.5.1 and 2.x before 2.1.1 for TYPO3. The extension fails to properly encode user input for output in HTML context. A TYPO3 backend user account is required to exploit the vulnerability. | {'CVE-2021-43561'} | 2021-11-17T21:24:36Z | 2021-11-15T17:39:18Z | MODERATE | null | {'CWE-79'} | {'https://github.com/pegasuswerbeagentur/google_for_jobs', 'https://typo3.org/security/advisory/typo3-ext-sa-2021-015', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43561'} | null |
Packagist | GHSA-427g-2r83-3ccm | Information disclosure through processing of external XML entities | An XML entity injection vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated admin user can craft document type definition for an XML representing XML layout. The crafted document type definition and XML layout allow processing of external entities which can lead... | {'CVE-2019-8126'} | 2021-07-28T15:37:48Z | 2019-11-12T22:59:24Z | MODERATE | null | {'CWE-776', 'CWE-611'} | {'https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update', 'https://nvd.nist.gov/vuln/detail/CVE-2019-8126'} | null |
Packagist | GHSA-cpv8-6xgr-rmf6 | Cross-site Scripting in Dolibarr | In “Dolibarr ERP CRM”, WYSIWYG Editor module, v2.8.1 to v13.0.2 are affected by a stored XSS vulnerability that allows low privileged application users to store malicious scripts in the “Private Note” field at “/adherents/note.php?id=1” endpoint. These scripts are executed in a victim’s browser when they open the page ... | {'CVE-2021-25955'} | 2021-10-21T14:19:19Z | 2021-08-30T16:22:46Z | CRITICAL | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-25955', 'https://github.com/Dolibarr/dolibarr/', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25955', 'https://github.com/Dolibarr/dolibarr/commit/796b2d201acb9938b903fb2afa297db289ecc93e'} | null |
Packagist | GHSA-x8xx-x82q-42q3 | Exposure of Resource to Wrong Sphere in ezsystems/ezplatform-kernel | When image files are uploaded, they are made accessible under a name similar to the original file name. There are two issues with this. Both require access to uploading images in order to exploit them, this limits the impact. The first issue is that certain injection attacks can be possible, since not all possible atta... | {'CVE-2022-25336'} | 2022-03-04T21:37:29Z | 2022-02-19T00:01:25Z | MODERATE | null | {'CWE-668'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-25336', 'https://github.com/ezsystems/ezplatform-kernel', 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-001-image-filenames-sanitization'} | null |
Packagist | GHSA-xh9g-cp3v-p8q4 | Missing Authorization in Crater Invoice | Crater Invoice prior to version 6.0.2 has a missing authorization vulnerability.. | {'CVE-2022-0203'} | 2022-02-03T21:01:13Z | 2022-01-27T00:01:17Z | MODERATE | null | {'CWE-862', 'CWE-284'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0203', 'https://github.com/crater-invoice/crater', 'https://huntr.dev/bounties/395fc553-2b90-4e69-ba07-a316e1c06406', 'https://github.com/crater-invoice/crater/commit/dd324c8bb6b17009f82afe8bc830caec7241e992'} | null |
Packagist | GHSA-82rr-mq4r-p4r3 | SQL injection in francoisjacquet/rosariosis | An SQL Injection vulnerability exits in RosarioSIS before 7.6.1 via the votes parameter in ProgramFunctions/PortalPollsNotes.fnc.php. | {'CVE-2021-44567'} | 2022-03-04T21:39:00Z | 2022-02-25T00:01:08Z | CRITICAL | null | {'CWE-89'} | {'https://gitlab.com/francoisjacquet/rosariosis/-/commit/e001430aa9fb53d2502fb6f036f6c51c578d2016', 'https://gitlab.com/francoisjacquet/rosariosis', 'https://gitlab.com/francoisjacquet/rosariosis/-/issues/308', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44567', 'https://gitlab.com/francoisjacquet/rosariosis/-/commit/51... | null |
Packagist | GHSA-7vph-p634-vrqf | Command Injection in RaspAP 2.6.6 | includes/configure_client.php in RaspAP 2.6.6 allows attackers to execute commands via command injection. | {'CVE-2021-38556'} | 2021-09-03T20:35:52Z | 2021-09-02T17:11:00Z | HIGH | null | {'CWE-77'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-38556', 'https://github.com/RaspAP/raspap-webgui', 'https://zerosecuritypenetrationtesting.com/?page_id=306', 'https://github.com/RaspAP/raspap-webgui/blob/0e1d652c5e55f812aaf2a5908884e9db179416ee/includes/configure_client.php'} | null |
Packagist | GHSA-p5hj-xxfr-pwc3 | Code Injection in microweber | Code Injection in Packagist microweber/microweber prior to 1.2.11. | {'CVE-2022-0282'} | 2022-01-27T18:32:42Z | 2022-01-21T18:02:39Z | HIGH | null | {'CWE-94'} | {'https://github.com/microweber/microweber', 'https://huntr.dev/bounties/8815b642-bd9b-4737-951b-bde7319faedd', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0282', 'https://github.com/microweber/microweber/commit/51b5a4e3ef01e587797c0109159a8ad9d2bac77a'} | null |
Packagist | GHSA-jv64-2m3x-6v4q | Cross-site scripting (XSS) vulnerability exists in the "contact us" plugin for Subrion CMS | A cross-site scripting (XSS) vulnerability exists in the "contact us" plugin for Subrion CMS <= 4.2.1 version via "List of subjects". | {'CVE-2021-41948'} | 2022-05-04T18:10:42Z | 2022-04-30T00:00:36Z | MODERATE | null | {'CWE-79'} | {'https://github.com/intelliants/subrion-plugin-contact_us/', 'https://github.com/intelliants/subrion-plugin-contact_us/issues/8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41948'} | null |
Packagist | GHSA-7vwg-39h8-8qp8 | /user/sessions endpoint allows detecting valid accounts | This Security Advisory is about a vulnerability in eZ Platform v1.13, v2.5, and v3.2, and in Ibexa DXP and Ibexa Open Source v3.3. The /user/sessions endpoint can let an attacker detect if a given username or email refers to a valid account. This can be detected through differences in the response data or response time... | null | 2021-03-11T17:41:09Z | 2021-03-11T17:42:01Z | HIGH | null | {'CWE-203'} | {'https://github.com/ezsystems/ezplatform-rest/commit/e239bba8b154a3b4cf787e29b9f15edf8945d933', 'https://packagist.org/packages/ezsystems/ezplatform-rest', 'https://github.com/ezsystems/ezplatform-rest/security/advisories/GHSA-7vwg-39h8-8qp8'} | null |
Packagist | GHSA-79mg-4w23-4fqc | Unauthenticated SQL Injection in Cachet | ### Impact
In Cachet versions through 2.3.18, there is a SQL injection which is in the `SearchableTrait#scopeSearch()`. Attackers without authentication can utilize this vulnerability to exfiltrate sensitive data from the database such as administrator's password and session.
### Patches
The original repository of [h... | {'CVE-2021-39165'} | 2021-08-27T12:54:52Z | 2021-08-30T16:12:58Z | HIGH | null | {'CWE-287', 'CWE-89'} | {'https://github.com/fiveai/Cachet/security/advisories/GHSA-79mg-4w23-4fqc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39165', 'https://github.com/fiveai/Cachet/commit/27bca8280419966ba80c6fa283d985ddffa84bb6'} | null |
Packagist | GHSA-9722-rr68-rfpg | Upload whitelisted files to any directory in OctoberCMS | ### Impact
An attacker can exploit this vulnerability to upload jpg, jpeg, bmp, png, webp, gif, ico, css, js, woff, woff2, svg, ttf, eot, json, md, less, sass, scss, xml files to any directory of an October CMS server. The vulnerability is only exploitable by an authenticated backend user with the `cms.manage_assets` p... | {'CVE-2020-5297'} | 2021-03-04T18:26:59Z | 2020-06-03T21:58:27Z | LOW | null | {'CWE-73'} | {'https://github.com/octobercms/october/commit/6711dae8ef70caf0e94cec434498012a2ccd86b8', 'https://github.com/octobercms/october/security/advisories/GHSA-9722-rr68-rfpg', 'http://seclists.org/fulldisclosure/2020/Aug/2', 'http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-I... | null |
Packagist | GHSA-3vg7-jw9m-pc3f | Broken Access Control in Form Framework |
### Problem
Due to improper input validation, attackers can by-pass restrictions of predefined options and submit arbitrary data in the Form Designer backend module of the Form Framework.
In the default configuration of the Form Framework this allows attackers to explicitly allow arbitrary mime-types for file uploads... | {'CVE-2021-21357'} | 2021-03-29T18:01:00Z | 2021-03-23T01:53:57Z | HIGH | null | {'CWE-434', 'CWE-22', 'CWE-20'} | {'https://packagist.org/packages/typo3/cms-form', 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-3vg7-jw9m-pc3f', 'https://typo3.org/security/advisory/typo3-core-sa-2021-003', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21357'} | null |
Packagist | GHSA-gwpx-q2h9-wxgx | elgg is vulnerable to Authorization Bypass Through User-Controlled Key | elgg is vulnerable to Authorization Bypass Through User-Controlled Key | {'CVE-2021-3964'} | 2021-12-03T15:16:06Z | 2021-12-03T20:43:25Z | MODERATE | null | {'CWE-639'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-3964', 'https://huntr.dev/bounties/a4df45d6-b739-4299-967f-c960b569383a', 'https://github.com/elgg/elgg/', 'https://github.com/elgg/elgg/commit/d9fcad76ee380ea17edd61d13d0f87828ea3f744'} | null |
Packagist | GHSA-673x-f5wx-fxpw | Cross Site Scripting and RCE in baserCMS | baserCMS 4.3.6 and earlier is affected by Cross Site Scripting (XSS) and Remote Code Execution (RCE).
* Impact: XSS to RCE via Arbitrary file upload.
* Attack vector is: Administrator must be logged in.
* Components are: ThemeFilesController.php, UploaderFilesController.php.
* Tested baserCMS Version : 4.3.6 (Latest)
... | {'CVE-2020-15159'} | 2021-01-07T23:39:00Z | 2020-08-28T21:45:15Z | LOW | null | {'CWE-79'} | {'https://basercms.net/security/20200827', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15159', 'https://github.com/baserproject/basercms/commit/16a7b3cd09a0ca355474119c76897eac2034a66d', 'https://github.com/baserproject/basercms/security/advisories/GHSA-673x-f5wx-fxpw'} | null |
Packagist | GHSA-g7w8-pp9w-7p32 | Creation of order credits was not validated by acl in admin orders | ### Impact
Creation of order credits was not validated by ACL in admin orders
### Patches
We recommend updating to the current version 6.4.1.1. You can get the update to 6.4.1.1 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
For ... | null | 2021-10-05T17:26:03Z | 2021-06-28T16:57:32Z | LOW | null | {'CWE-306'} | {'https://github.com/shopware/platform/security/advisories/GHSA-g7w8-pp9w-7p32', 'https://store.shopware.com/en/detail/index/sArticle/518463/number/Swag136939272659', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32709', 'https://www.shopware.com/en/download/#shopware-6', 'https://github.com/shopware/platform'} | null |
Packagist | GHSA-xpfv-89vg-r562 | Cross Site Request Forgery in Moodle | A flaw was found in Moodle in versions 3.11 to 3.11.4, 3.10 to 3.10.8, 3.9 to 3.9.11 and earlier unsupported versions. The "delete badge alignment" functionality did not include the necessary token check to prevent a CSRF risk. | {'CVE-2022-0335'} | 2022-02-02T16:06:32Z | 2022-01-28T22:07:23Z | HIGH | null | {'CWE-352'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=2043666', 'https://github.com/moodle/moodle/commit/d40cc61eba229c6d1f47b9a525022fbc9136b9f6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0335', 'https://github.com/moodle/moodle', 'https://moodle.org/mod/forum/discuss.php?d=431103'} | null |
Packagist | GHSA-68wg-qv6r-j4vp | SQL Injection in usmanhalalit/pixie | Pixie versions 1.0.x before 1.0.3, and 2.0.x before 2.0.2 allow SQL Injection in the limit() function due to improper sanitization. | {'CVE-2019-10766'} | 2021-08-18T22:44:59Z | 2019-11-20T17:44:54Z | CRITICAL | null | {'CWE-89'} | {'https://snyk.io/vuln/SNYK-PHP-USMANHALALITPIXIE-534879', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10766', 'https://github.com/usmanhalalit/pixie/commit/9bd991021abbcbfb19347a07dca8b7e518b8abc9'} | null |
Packagist | GHSA-7fjp-g4m7-fx23 | User (Encrypted) Password Field Being Serialised | ### Impact
Leaking Password field during serialisation of the User model. Password is in the encrypted form but if User model is requested in json or array form the value is printed.
### Patches
Issue has been patched in version 0.3.7-beta and onwards.
### Workarounds
Add the 'password' field to the Users model file ... | null | 2021-04-12T20:05:57Z | 2021-04-13T15:12:26Z | LOW | null | {'CWE-200'} | {'https://github.com/pwweb/laravel-core/security/advisories/GHSA-7fjp-g4m7-fx23'} | null |
Packagist | GHSA-g54x-29xv-58h5 | Remote code execution in Subrion | Subrion is an open source php content management system. A Remiote Code Execution (RCE) vulnerability exiss in Subrion CMS 4.2.1 via modified code in a background field; when the information is modified, the data in it will be executed through eval(). | {'CVE-2021-43464'} | 2022-04-15T02:46:19Z | 2022-04-05T00:00:23Z | HIGH | null | null | {'https://github.com/intelliants/subrion/issues/888', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43464', 'https://github.com/intelliants/subrion'} | null |
Packagist | GHSA-79hv-pfx6-hhpj | Cross-site scripting (XSS) | Cross-site scripting (XSS) in modules/content/admin/content.php in ImpressCMS profile 1.4.2 allows remote attackers to inject arbitrary web script or HTML parameters through the "Display Name" field. | {'CVE-2021-28088'} | 2021-03-12T19:56:01Z | 2021-03-12T21:34:02Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-28088', 'https://anotepad.com/note/read/s3kkk6h7', 'https://hackerone.com/reports/1119296'} | null |
Packagist | GHSA-crf2-xm6x-46p6 | Observable Timing Discrepancy in OpenMage LTS | ### Impact
This vulnerability allows to circumvent the **formkey protection** in the Admin Interface and increases the attack surface for **Cross Site Request Forgery** attacks
### Patches
The latest OpenMage Versions up from 19.4.6 and 20.0.2 have this Issue solved
### References
Related to Adobes CVE-2020-9690 (... | {'CVE-2020-15151'} | 2021-11-19T15:36:13Z | 2020-08-19T18:02:36Z | HIGH | null | {'CWE-203', 'CWE-352'} | {'https://github.com/OpenMage/magento-lts', 'https://helpx.adobe.com/security/products/magento/apsb20-47.html', 'https://github.com/OpenMage/magento-lts/security/advisories/GHSA-crf2-xm6x-46p6', 'https://github.com/OpenMage/magento-lts/commit/7c526bc6a6a51b57a1bab4c60f104dc36cde347a', 'https://nvd.nist.gov/vuln/detail/... | null |
Packagist | GHSA-2rxh-h6h9-qrqc | Class destructors causing side-effects when being unserialized in TYPO3 CMS | Calling unserialize() on malicious user-submitted content can result in the following scenarios:
- trigger deletion of arbitrary directory in file system (if writable for web server)
- trigger message submission via email using identity of web site (mail relay)
Another insecure deserialization vulnerability is require... | {'CVE-2020-11066'} | 2021-01-08T20:16:34Z | 2020-05-13T23:18:38Z | HIGH | null | {'CWE-915'} | {'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-2rxh-h6h9-qrqc', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11066'} | null |
Packagist | GHSA-64fq-9c6w-rq44 | Improper Neutralization of Formula Elements in a CSV File in Kimai 2 | A CSV Injection vulnerablity exists in Kimai Kimai 2 prior to 1.14.1 via a description in a new timesheet. | {'CVE-2021-43515'} | 2022-04-22T20:21:47Z | 2022-04-09T00:00:25Z | HIGH | null | {'CWE-1236'} | {'https://github.com/kevinpapst/kimai2/pull/2532', 'https://github.com/kevinpapst/kimai2/commit/dad1b8b772947f1596175add1b4f33b791705507#diff-6774f5865dbaf8bc6c55b75bd92e6f9950ebe7834aa2efd828a19fd637e667cf', 'https://github.com/kevinpapst/kimai2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43515'} | null |
Packagist | GHSA-qcgx-7p5f-hxvr | Discoverability of user password hash in Statamic CMS | ## Description
It was possible to confirm a single character of a user's password hash (just the hash, not the password) using a specially crafted regular expression filter in the users endpoint of the REST API. Many requests could eventually uncover the entire hash.
The hash would not be in the response, however the... | {'CVE-2022-24784'} | 2022-03-29T22:11:45Z | 2022-03-29T22:11:45Z | LOW | null | {'CWE-326', 'CWE-200'} | {'https://github.com/statamic/cms', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24784', 'https://github.com/statamic/cms/security/advisories/GHSA-qcgx-7p5f-hxvr', 'https://github.com/statamic/cms/issues/5604', 'https://github.com/statamic/cms/pull/5568'} | null |
Packagist | GHSA-q348-f93x-9gx4 | Lack of Input Validation in zendesk_api_client_php for Zendesk Subdomain | ### Impact
Lack of input validation of the Zendesk subdomain could expose users of the library to Server Side Request Forgery (SSRF).
### Resolution
Validate the provided Zendesk subdomain to be a valid subdomain in:
* getAuthUrl
* getAccessToken | {'CVE-2021-30492'} | 2021-04-28T22:29:16Z | 2021-04-29T21:53:06Z | CRITICAL | null | {'CWE-918', 'CWE-20'} | {'https://github.com/zendesk/zendesk_api_client_php/commit/b451b743d9d6d81a9abf7cb86e70ec9c5332123e', 'https://github.com/zendesk/zendesk_api_client_php/pull/466', 'https://github.com/zendesk/zendesk_api_client_php/security/advisories/GHSA-q348-f93x-9gx4'} | null |
Packagist | GHSA-59x4-67mh-px54 | Crypt_GPG does not prevent additional options in GPG calls | The Crypt_GPG extension before 1.6.7 for PHP does not prevent additional options in GPG calls, which presents a risk for certain environments and GPG versions. | {'CVE-2022-24953'} | 2022-03-01T18:36:13Z | 2022-02-18T00:00:36Z | MODERATE | null | {'CWE-20'} | {'https://github.com/pear/Crypt_GPG/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24953', 'https://github.com/pear/Crypt_GPG/commit/29c0fbe96d0d4063ecd5c9a4644cb65a7fb7cc4e', 'https://github.com/pear/Crypt_GPG/commit/74c8f989cefbe0887274b461dc56197e121bfd04'} | null |
Packagist | GHSA-h6m7-j4h3-9rf5 | Remote Code Execution in SyliusResourceBundle | ### Impact
Request parameters injected inside an expression evaluated by `symfony/expression-language` package haven't been sanitized properly. This allows the attacker to access any public service by manipulating that request parameter, allowing for Remote Code Execution.
The vulnerable versions include: `<=1.3.13 |... | {'CVE-2020-15146'} | 2021-11-19T15:36:47Z | 2020-08-19T19:52:30Z | CRITICAL | null | {'CWE-917', 'CWE-74'} | {'https://github.com/Sylius/SyliusResourceBundle', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15146', 'https://github.com/Sylius/SyliusResourceBundle/security/advisories/GHSA-h6m7-j4h3-9rf5'} | null |
Packagist | GHSA-5rcc-6cmj-7728 | Cross-site Scripting in BookStack | Iframe tags don't have a sandbox attribute, this makes an attacker able to execute malicious javascript via an iframe and perform phishing attacks. The sandbox attribute will block script execution and prevents the content to navigate its top-level browsing context which will stop this type of attack. | {'CVE-2022-0877'} | 2022-03-14T21:03:33Z | 2022-03-09T00:00:44Z | MODERATE | null | {'CWE-79'} | {'https://huntr.dev/bounties/b04df4e3-ae5a-4dc6-81ec-496248b15f3c', 'https://github.com/bookstackapp/bookstack', 'https://github.com/bookstackapp/bookstack/commit/856fca8289b7370cafa033ea21c408e7d4303fd6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0877'} | null |
Packagist | GHSA-vpq7-m4qm-p2gp | Business Logic Errors in microweber | Business Logic Errors in Packagist microweber/microweber prior to 1.2.11. | {'CVE-2022-0596'} | 2022-02-24T13:55:54Z | 2022-02-16T00:01:45Z | MODERATE | null | null | {'https://github.com/microweber/microweber', 'https://github.com/microweber/microweber/commit/91a9d899741557c75050614ff7adb8c0e3feb005', 'https://huntr.dev/bounties/f68b994e-2b8b-49f5-af2a-8cd99e8048a5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0596'} | null |
Packagist | GHSA-h7f9-cvh5-qw7f | Path traversal in pimcore/pimcore | This affects the package pimcore/pimcore before 6.8.8. A Local FIle Inclusion vulnerability exists in the downloadCsvAction function of the CustomReportController class (bundles/AdminBundle/Controller/Reports/CustomReportController.php). An authenticated user can reach this function with a GET request at the following ... | {'CVE-2021-23340'} | 2021-02-24T07:37:55Z | 2021-02-25T16:32:46Z | HIGH | null | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-23340', 'https://github.com/pimcore/pimcore/commit/1786bdd4962ee51544fad537352c2b4223309442', 'https://github.com/pimcore/pimcore/blob/v6.7.2/bundles/AdminBundle/Controller/Reports/CustomReportController.php%23L454', 'https://snyk.io/vuln/SNYK-PHP-PIMCOREPIMCORE-1070132'} | null |
Packagist | GHSA-mj9p-v2r8-wf8w | Cross-site scripting in SimpleSAMLphp | ### Background
SimpleSAMLphp allows users to report errors and failures to the system administrators via a web form. This web form gathers some contextual information automatically, but it also allows the user to provide their email address for follow-ups and a free-text explanation of what happened. Once submitted, t... | {'CVE-2020-5226'} | 2021-01-08T20:32:54Z | 2020-01-24T21:26:54Z | LOW | null | {'CWE-79'} | {'https://github.com/simplesamlphp/simplesamlphp/security/advisories/GHSA-mj9p-v2r8-wf8w', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5226', 'https://simplesamlphp.org/security/202001-01'} | null |
Packagist | GHSA-v9p9-535w-4285 | Prototype Pollution in litespeed.js and appwrite/server-ce | This affects the package litespeed.js before 0.3.12; the package appwrite/server-ce from 0.12.0 and before 0.12.2, before 0.11.1. When parsing the query string in the getJsonFromUrl function, the key that is set in the result object is not properly sanitized leading to a Prototype Pollution vulnerability. | {'CVE-2021-23682'} | 2022-02-25T15:40:33Z | 2022-02-17T00:00:32Z | CRITICAL | null | {'CWE-1321'} | {'https://github.com/litespeed-js/litespeed.js/pull/18', 'https://snyk.io/vuln/SNYK-JS-LITESPEEDJS-2359250', 'https://github.com/appwrite/appwrite/pull/2778', 'https://snyk.io/vuln/SNYK-PHP-APPWRITESERVERCE-2401820', 'https://github.com/appwrite/appwrite/releases/tag/0.12.2', 'https://github.com/appwrite/appwrite/relea... | null |
Packagist | GHSA-x2j7-6hxm-87p3 | Remote code injection | An issue was discovered in Craft CMS before 3.6.7. In some circumstances, a potential Remote Code Execution vulnerability existed on sites that did not restrict administrative changes (if an attacker were somehow able to hijack an administrator's session). | {'CVE-2021-27903'} | 2021-07-07T17:13:30Z | 2021-07-02T18:36:41Z | CRITICAL | null | {'CWE-94', 'CWE-74'} | {'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#security', 'https://github.com/craftcms/cms/commit/c17728fa0bec11d3b82c34defe0930ed409aec38', 'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#367---2021-02-23', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27903'} | null |
Packagist | GHSA-xv7v-rf6g-xwrc | Directory Traversal in typo3/phar-stream-wrapper | The PharStreamWrapper (aka phar-stream-wrapper) package 2.x before 2.1.1 and 3.x before 3.1.1 for TYPO3 does not prevent directory traversal, which allows attackers to bypass a deserialization protection mechanism, as demonstrated by a phar:///path/bad.phar/../good.phar URL. | {'CVE-2019-11831'} | 2021-09-30T16:49:05Z | 2021-09-30T17:10:14Z | CRITICAL | null | {'CWE-502', 'CWE-22'} | {'https://github.com/TYPO3/phar-stream-wrapper/releases/tag/v2.1.1', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11831', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E3NUKPG7V4QEM6QXRMHYR4ABFMW5MM2P/', 'https://github.com/TYPO3/phar-stream-wrapper/releases/tag/v3.1.1', ... | null |
Packagist | GHSA-w2fr-65vp-mxw3 | Deserialization of untrusted data in Symfony | In Symfony before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, it is possible to cache objects that may contain bad user input. On serialization or unserialization, this could result in the deletion of files that the current user has access to. This is related to symfony/cache and symfony/phpun... | {'CVE-2019-10912'} | 2021-08-19T17:12:23Z | 2020-02-12T18:44:50Z | HIGH | null | {'CWE-502'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BHHIG4GMSGEIDT3RITSW7GJ5NT6IBHXU/', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10912.yaml', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.... | null |
Packagist | GHSA-8xv9-qcr9-ww9j | Authenticated XML External Entity Processing | ### Impact
Authenticated XML External Entity Processing
### Patches
We recommend to update to the current version 6.3.2.1. You can get the update to 6.3.2.1 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
For older versions of 6.1... | null | 2021-10-04T21:28:06Z | 2020-10-19T21:32:18Z | MODERATE | null | {'CWE-611'} | {'https://github.com/shopware/platform', 'https://github.com/shopware/platform/security/advisories/GHSA-8xv9-qcr9-ww9j', 'https://snyk.io/vuln/SNYK-PHP-SHOPWAREPLATFORM-1019470'} | null |
Packagist | GHSA-j85q-whc9-g4p9 | Use of Cryptographically Weak Pseudo-Random Number Generator in showdoc | showdoc is vulnerable to Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) | {'CVE-2021-3678'} | 2021-08-16T23:13:12Z | 2021-09-02T17:07:48Z | MODERATE | null | {'CWE-338'} | {'https://github.com/star7th/showdoc/commit/4b962c1740311e0d46775023b6acba39ad60e370', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3678', 'https://huntr.dev/bounties/f9a9defd-29ea-4442-b692-ff1512813de4'} | null |
Packagist | GHSA-m2q4-qghh-p9cq | Server-Side Request Forgery in yoast_seo | The yoast_seo (aka Yoast SEO) extension before 7.2.1 for TYPO3 allows SSRF via a backend user account. | {'CVE-2021-31779'} | 2021-05-20T22:39:55Z | 2021-05-21T19:21:38Z | MODERATE | null | {'CWE-918'} | {'https://typo3.org/security/advisory/typo3-ext-sa-2021-006', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31779'} | null |
Packagist | GHSA-cv9j-78f7-w6v9 | Incorrect Authorization in TYPO3 extension | The l10nmgr (aka Localization Manager) extension before 7.4.0, 8.x before 8.7.0, and 9.x before 9.2.0 for TYPO3 allows Information Disclosure (translatable fields). | {'CVE-2020-25025'} | 2021-07-28T19:21:31Z | 2021-07-26T21:41:22Z | MODERATE | null | {'CWE-863'} | {'https://typo3.org/help/security-advisories', 'https://typo3.org/security/advisory/typo3-ext-sa-2020-016', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25025'} | null |
Packagist | GHSA-jp6h-mxhx-pgqh | Shopware guest session is shared between customers | ### Impact
Guest sessions are shared between customers when HTTP cache is enabled. Setups with Varnish are not affected by this issue
## Patches
We recommend updating to the current version 6.4.8.2. You can get the update to 6.4.8.2 regularly via the Auto-Updater or directly via the download overview.
https://www.sh... | {'CVE-2022-24745'} | 2022-03-24T00:22:07Z | 2022-03-10T17:28:55Z | MODERATE | null | {'CWE-384'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-24745', 'https://github.com/shopware/platform', 'https://github.com/shopware/platform/security/advisories/GHSA-jp6h-mxhx-pgqh', 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-03-2022?_ga=2.159980029.1931762803.1646933116-1088482757.1646933116'} | null |
Packagist | GHSA-4jhw-2p6j-5wmp | Open Redirection in Login Handling |
### Problem
It has been discovered that Login Handling is susceptible to open redirection which allows attackers redirecting to arbitrary content, and conducting phishing attacks. No authentication is required in order to exploit this vulnerability.
### Solution
Update to TYPO3 versions 6.2.57, 7.6.51, 8.7.40, 9.5.25... | {'CVE-2021-21338'} | 2021-03-29T18:07:53Z | 2021-03-23T01:53:35Z | MODERATE | null | {'CWE-601'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-21338', 'https://packagist.org/packages/typo3/cms-core', 'https://typo3.org/security/advisory/typo3-core-sa-2021-001', 'https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-4jhw-2p6j-5wmp'} | null |
Packagist | GHSA-952m-m83c-3xm6 | Open redirect in direct_mail | The direct_mail extension through 5.2.3 for TYPO3 has an Open Redirect via jumpUrl. | {'CVE-2020-12699'} | 2021-05-21T23:05:25Z | 2021-05-24T16:58:37Z | MODERATE | null | {'CWE-601'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-12699', 'https://typo3.org/help/security-advisories', 'https://typo3.org/security/advisory/typo3-ext-sa-2020-005'} | null |
Packagist | GHSA-x752-qjv4-c4hc | Remote code injection in dompdf/dompdf | Dompdf is an HTML to PDF converter. Dompdf before 1.2.1 allows remote code execution via a .php file in the src:url field of an @font-face Cascading Style Sheets (CSS) statement (within an HTML input file). | {'CVE-2022-28368'} | 2022-04-15T16:49:27Z | 2022-04-04T00:00:55Z | CRITICAL | null | {'CWE-74'} | {'https://snyk.io/blog/security-alert-php-pdf-library-dompdf-rce/', 'https://packagist.org/packages/dompdf/dompdf#v1.2.1', 'https://github.com/snyk-labs/php-goof', 'https://github.com/dompdf/dompdf/issues/2598', 'https://github.com/dompdf/dompdf', 'https://nvd.nist.gov/vuln/detail/CVE-2022-28368', 'https://github.com/d... | null |
Packagist | GHSA-xx8f-qf9f-5fgw | Remote code execution in zendframework and laminas-http | Zend Framework 3.0.0 has a deserialization vulnerability that can lead to remote code execution if the content is controllable, related to the __destruct method of the Zend\Http\Response\Stream class in Stream.php. NOTE: the code may be related to Laminas Project laminas-http. Zend Framework is no longer supported by t... | {'CVE-2021-3007'} | 2021-04-07T18:11:15Z | 2021-06-08T20:11:19Z | CRITICAL | null | {'CWE-502'} | {'https://github.com/laminas/laminas-http/commits/2.15.x/src/Response/Stream.php', 'https://github.com/laminas/laminas-http/pull/48', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3007', 'https://research.checkpoint.com/2021/freakout-leveraging-newest-vulnerabilities-for-creating-a-botnet/', 'https://github.com/laminas/la... | null |
Packagist | GHSA-c32w-3cqh-f6jx | Weak Password Recovery Mechanism for Forgotten Password | In “Dolibarr” application, v2.8.1 to v13.0.2 are vulnerable to account takeover via password reset functionality. A low privileged attacker can reset the password of any user in the application using the password reset link the user received through email when requested for a forgotten password. | {'CVE-2021-25957'} | 2021-10-21T14:15:19Z | 2021-09-02T17:08:33Z | HIGH | null | {'CWE-640'} | {'https://github.com/Dolibarr/dolibarr/commit/87f9530272925f0d651f59337a35661faeb6f377', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25957', 'https://github.com/Dolibarr/dolibarr', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25957'} | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.