schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 8 154 | details stringlengths 31 19.1k | severity stringlengths 2 92 | affected stringlengths 75 28.5k | references stringlengths 79 7.48k | database_specific stringlengths 131 196 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-c2jg-hw38-jrqq | 2022-04-04T21:29:41Z | 2022-04-04T21:29:41Z | null | ['CVE-2022-24801'] | Inconsistent Interpretation of HTTP Requests in twisted.web | The Twisted Web HTTP 1.1 server, located in the `twisted.web.http` module, parsed several HTTP request constructs more leniently than permitted by RFC 7230:
1. The Content-Length header value could have a `+` or `-` prefix.
2. Illegal characters were permitted in chunked extensions, such as the LF (`\n`) character.
3.... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'twisted'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.4.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/twisted/twisted/security/advisories/GHSA-c2jg-hw38-jrqq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24801'}, {'type': 'WEB', 'url': 'https://github.com/twisted/twisted/commit/592217e951363d60e9cd99c5bbfd23d4615043ac'}, {'type': 'WEB', 'url': 'htt... | {'cwe_ids': ['CWE-444'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-04T21:29:41Z', 'nvd_published_at': '2022-04-04T18:15:00Z'} |
1.4.0 | GHSA-rh6c-jh4c-9fg3 | 2023-09-18T22:51:56Z | 2022-04-29T02:59:06Z | null | ['CVE-2004-1177'] | mailman Cross-site scripting (XSS) vulnerability | Cross-site scripting (XSS) vulnerability in the driver script in mailman before 2.1.5 allows remote attackers to inject arbitrary web script or HTML via a URL, which is not properly escaped in the resulting error page. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'mailman'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2004-1177'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/18854'}, {'type': 'PACKAGE', 'url': 'https://github.com/terencehonles/mailman'}, {'type': 'WEB', 'url': 'https://oval.cisecurity.org/repository/search/definition/o... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T22:51:56Z', 'nvd_published_at': '2005-01-10T05:00:00Z'} |
1.4.0 | GHSA-v5c9-98f7-2h54 | 2023-08-29T19:54:42Z | 2022-04-23T00:40:07Z | null | ['CVE-2012-2945'] | Hadoop symlink vulnerability | Hadoop 1.0.3 contains a symlink vulnerability as a result of storing pid files in the shared `/tmp` directory by default. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-2945'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=535861'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/hadoop'}, {'type': 'WEB', 'url': 'https://seclists.org/fulldisclosure/2012/Jul/3'}, {'type': 'WEB', 'u... | {'cwe_ids': ['CWE-377', 'CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T19:54:42Z', 'nvd_published_at': '2019-10-29T19:15:00Z'} |
1.4.0 | GHSA-f99r-jjgr-f373 | 2022-04-18T22:23:05Z | 2022-04-06T00:01:30Z | null | ['CVE-2022-26986'] | SQL injection in ImpressCMS | SQL Injection in ImpressCMS 1.4.3 and earlier allows remote attackers to inject into the code in unintended way, this allows an attacker to read and modify the sensitive information from the database used by the application. If misconfigured, an attacker can even upload a malicious web shell to compromise the entire sy... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'impresscms/impresscms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26986'}, {'type': 'PACKAGE', 'url': 'https://github.com/ImpressCMS/impresscms'}, {'type': 'WEB', 'url': 'https://github.com/sartlabs/0days/blob/main/ImpressCMS1.4.3/Exploit.txt'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/171485/... | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T18:21:23Z', 'nvd_published_at': '2022-04-05T15:15:00Z'} |
1.4.0 | GHSA-j2x6-9323-fp7h | 2022-04-22T20:24:13Z | 2022-04-22T20:24:13Z | null | ['CVE-2022-24845'] | Integer bounds error in Vyper | ### Impact
in the following code, the return of `<iface>.returns_int128()` is not validated to fall within the bounds of `int128`. as of v0.3.0, `<iface>.returns_int128()` is validated in simple expressions, but not complex expressions.
```vyper
interface iface:
def returns_int128() -> int128: view
def returns_... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'vyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/security/advisories/GHSA-j2x6-9323-fp7h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24845'}, {'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/commit/049dbdc647b2ce838fae7c188e6bb09cf16e470b'}, {'type': 'WEB', 'url': 'htt... | {'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:24:13Z', 'nvd_published_at': '2022-04-13T22:15:00Z'} |
1.4.0 | GHSA-vrgp-3ph6-2wwq | 2022-04-13T14:57:08Z | 2022-04-01T00:00:41Z | null | ['CVE-2021-36625'] | SQL Injection in Dolibarr | An SQL Injection vulnerability exists in Dolibarr ERP/CRM 13.0.2 (fixed version is 14.0.0) via a POST request to the country_id parameter in an UPDATE statement. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '14.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36625'}, {'type': 'WEB', 'url': 'https://github.com/Dolibarr/dolibarr/commit/abb1ad6bf0469eccd2b58beb20bdabc18fc36e22'}, {'type': 'PACKAGE', 'url': 'https://github.com/Dolibarr/dolibarr'}] | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-13T14:57:08Z', 'nvd_published_at': '2022-03-31T18:15:00Z'} |
1.4.0 | GHSA-4pc7-vqv5-5r3v | 2022-12-01T22:10:45Z | 2022-04-27T21:25:59Z | null | ['CVE-2021-3827'] | ECP SAML binding bypasses authentication flows | ### Description
A flaw was found in keycloak, where the default ECP binding flow allows other authentication flows to be bypassed. By exploiting this behavior an attacker can bypass the MFA authentication by sending a SOAP request with an AuthnRequest and Authorization header with the user's credentials. The highest th... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-saml-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '18.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/security/advisories/GHSA-4pc7-vqv5-5r3v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3827'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/commit/44000caaf5051d7f218d1ad79573bd3d175cad0d'}, {'type': 'WEB', 'url': '... | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-27T21:25:59Z', 'nvd_published_at': '2022-08-23T16:15:00Z'} |
1.4.0 | GHSA-32rp-q37p-jg6w | 2022-04-28T21:12:15Z | 2022-04-20T00:00:30Z | null | ['CVE-2022-1384'] | Insecure plugin handling in Mattermost | Mattermost version 6.4.x and earlier fails to properly check the plugin version when a plugin is installed from the Marketplace, which allows an authenticated and an authorized user to install and exploit an old plugin version from the Marketplace which might have known vulnerabilities. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.4.0'}, {'fixed': '6.5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1384'}, {'type': 'WEB', 'url': 'https://mattermost.com/security-updates/'}, {'type': 'PACKAGE', 'url': 'github.com/mattermost/mattermost-server'}] | {'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T21:12:15Z', 'nvd_published_at': '2022-04-19T21:15:00Z'} |
1.4.0 | GHSA-c3g4-w6cv-6v7h | 2022-04-19T18:02:46Z | 2022-04-01T13:56:42Z | null | ['CVE-2022-27651'] | Non-empty default inheritable capabilities for linux container in Buildah | A bug was found in Buildah where containers were created with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during execve(2).
This bug did not affect the container secu... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/containers/buildah'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.25.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/containers/buildah/security/advisories/GHSA-c3g4-w6cv-6v7h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27651'}, {'type': 'WEB', 'url': 'https://github.com/containers/buildah/pull/3855'}, {'type': 'WEB', 'url': 'https://github.com/containers/build... | {'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T13:56:42Z', 'nvd_published_at': '2022-04-04T20:15:00Z'} |
1.4.0 | GHSA-8wp2-vxpg-xcvp | 2022-05-05T13:47:28Z | 2022-04-26T00:00:43Z | null | ['CVE-2022-1457'] | Cross site scripting in facturascripts | facturasripts is an open source ERP software. Store XSS in title parameter executing at EditUser Page & EditProducto page in GitHub repository neorazorx/facturascripts prior to 2022.04. Cross-site scripting attacks can have devastating consequences. Code injected into a vulnerable application can exfiltrate data or ins... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'neorazorx/facturascripts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2022.04'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1457'}, {'type': 'WEB', 'url': 'https://github.com/neorazorx/facturascripts/commit/b3e7527d1e100898c15fec067825b6bc738613df'}, {'type': 'PACKAGE', 'url': 'https://github.com/neorazorx/facturascripts'}, {'type': 'WEB', 'url': 'https://huntr.dev/boun... | {'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-27T20:20:50Z', 'nvd_published_at': '2022-04-25T10:15:00Z'} |
1.4.0 | GHSA-g54x-29xv-58h5 | 2022-04-15T02:46:19Z | 2022-04-05T00:00:23Z | null | ['CVE-2021-43464'] | Remote code execution in Subrion | Subrion is an open source php content management system. A Remiote Code Execution (RCE) vulnerability exiss in Subrion CMS 4.2.1 via modified code in a background field; when the information is modified, the data in it will be executed through eval(). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'intelliants/subrion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43464'}, {'type': 'WEB', 'url': 'https://github.com/intelliants/subrion/issues/888'}, {'type': 'PACKAGE', 'url': 'https://github.com/intelliants/subrion'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T15:16:10Z', 'nvd_published_at': '2022-04-04T18:15:00Z'} |
1.4.0 | GHSA-58hj-575g-5j25 | 2023-09-18T22:35:47Z | 2022-04-30T18:16:47Z | null | ['CVE-2001-0829'] | Apache Tomcat allows webmasters to insert xss into error messages | A cross-site scripting vulnerability in Apache Tomcat 3.2.1 allows a malicious webmaster to embed Javascript in a request for a .JSP file, which causes the Javascript to be inserted into an error message. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2001-0829'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20021108153830/http://online.securityfocus.com/bid/2982'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20021201182720/http://jakarta.apache.org/tomcat/tomcat-3.2-doc/readme'}, {'ty... | {'cwe_ids': ['CWE-80'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T22:35:47Z', 'nvd_published_at': '2001-12-06T05:00:00Z'} |
1.4.0 | GHSA-gcj7-j438-hjj2 | 2022-04-07T22:10:22Z | 2022-04-07T22:10:22Z | null | ['CVE-2022-24825'] | Smokescreen SSRF via deny list bypass | The primary use case for Smokescreen is to prevent server-side request forgery (SSRF) attacks in which external attackers leverage the behavior of applications to connect to or scan internal infrastructure.
Smokescreen also offers an option to deny access to additional (e.g., external) URLs by way of a deny list. Ther... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/stripe/smokescreen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/stripe/smokescreen/security/advisories/GHSA-gcj7-j438-hjj2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24825'}, {'type': 'WEB', 'url': 'https://github.com/stripe/smokescreen/commit/fafb6ae48c6c40aa011d87b61306abc48db8797b'}, {'type': 'PACKAGE', '... | {'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T22:10:22Z', 'nvd_published_at': '2022-04-19T20:15:00Z'} |
1.4.0 | GHSA-rjvg-8v36-xv9r | 2023-04-11T14:26:34Z | 2022-04-26T00:00:42Z | null | ['CVE-2022-27103'] | element-plus vulnerable to cross-site scripting (XSS) via el-table-column | element-plus below 2.0.5 is vulnerable to Cross Site Scripting (XSS) when attribute `show-tooltips-overflow` of `el-table-column` is true. The mouseover action will make the text of this column render as html. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'element-plus'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27103'}, {'type': 'WEB', 'url': 'https://github.com/asjdf/element-table-xss-test/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/element-plus/element-plus/issues/6514'}, {'type': 'WEB', 'url': 'https://github.com/element-plus/element-plus/pu... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-11T14:26:34Z', 'nvd_published_at': '2022-04-25T13:15:00Z'} |
1.4.0 | GHSA-j3gg-r6gp-95q2 | 2022-04-12T20:22:57Z | 2022-04-12T20:22:57Z | null | [] | XSS in HEEx class attributes | The `class` attribute was not protected against XSS attacks when using HEEx. | [] | [{'package': {'ecosystem': 'Hex', 'name': 'phoenix_html'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/phoenixframework/phoenix_html/commit/62a0139fb716bcdce697f6221244bd81d321d620'}, {'type': 'PACKAGE', 'url': 'https://github.com/phoenixframework/phoenix_html'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-12T20:22:57Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x2w5-725j-gf2g | 2022-05-26T19:43:23Z | 2022-04-20T16:21:03Z | null | ['CVE-2022-22143'] | Prototype Pollution in convict | ### Impact
* An attacker can inject attributes that are used in other components
* An attacker can override existing attributes with ones that have incompatible type, which may lead to a crash.
The main use case of Convict is for handling server-side configurations written by the admins owning the servers, and not ra... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'convict'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.2.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/mozilla/node-convict/security/advisories/GHSA-x2w5-725j-gf2g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22143'}, {'type': 'WEB', 'url': 'https://github.com/mozilla/node-convict/pull/384'}, {'type': 'WEB', 'url': 'https://github.com/mozilla/node-... | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-20T16:21:03Z', 'nvd_published_at': '2022-05-01T16:15:00Z'} |
1.4.0 | GHSA-wf98-vxv9-jqfv | 2022-04-05T18:31:51Z | 2022-04-05T18:31:51Z | null | [] | XSS Injection Vulnerability | ### Impact
Under some circumstances, the Feeds widget on the dashboard could have an XSS vulnerability if a malformed feed was supplied.
### Patches
This has been patched in Craft 3.7.29.
### References
* https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#3729---2022-01-18
### For more information
If you ... | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.7.29'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/craftcms/cms/security/advisories/GHSA-wf98-vxv9-jqfv'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftcms/cms'}] | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-04-05T18:31:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4g29-fccr-p59w | 2022-04-28T20:59:24Z | 2022-04-28T20:59:24Z | null | ['CVE-2022-24873'] | Reflected Cross-site Scripting in Shopware storefront | ### Impact
Not-stored XSS in storefront.
Request parameter were directly assigned to the template, so that malicious code could be send via an URL.
### Patches
We recommend updating to the current version 5.7.9. You can get the update to 5.7.9 regularly via the Auto-Updater or directly via the download overview.
https... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'shopware/shopware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.7.9'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/shopware/shopware/security/advisories/GHSA-4g29-fccr-p59w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24873'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-04-2022'}, {'type': 'PACKAGE', 'url... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T20:59:24Z', 'nvd_published_at': '2022-04-28T14:15:00Z'} |
1.4.0 | GHSA-ffjp-66mx-3qpj | 2022-04-07T18:31:32Z | 2022-04-06T00:01:30Z | null | ['CVE-2021-27116'] | Privilege escalation in beego | An issue was discovered in file profile.go. The MemProf and GetCPUProfile functions do not correctly check whether the created file exists. As a result attackers can launch attacks symlink attacks locally. Attackers can use this vulnerability to escalate privileges. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/beego/beego/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/beego/beego'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27116'}, {'type': 'WEB', 'url': 'https://github.com/beego/beego/issues/4484'}, {'type': 'PACKAGE', 'url': 'https://github.com/beego/beego'}] | {'cwe_ids': ['CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T18:31:32Z', 'nvd_published_at': '2022-04-05T16:15:00Z'} |
1.4.0 | GHSA-f37q-q7p2-ccfc | 2022-04-26T13:05:37Z | 2022-04-14T00:00:17Z | null | ['CVE-2022-1337'] | Resource exhaustion in Mattermost | The image proxy component in Mattermost version 6.4.1 and earlier allocates memory for multiple copies of a proxied image, which allows an authenticated attacker to crash the server via links to very large image files. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1337'}, {'type': 'PACKAGE', 'url': 'https://github.com/mattermost/mattermost-server'}, {'type': 'WEB', 'url': 'https://mattermost.com/security-updates/'}] | {'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-26T13:05:37Z', 'nvd_published_at': '2022-04-13T18:15:00Z'} |
1.4.0 | GHSA-xm99-6pv5-q363 | 2023-05-24T17:39:54Z | 2022-04-23T00:03:03Z | 2023-05-24T17:39:14Z | ['CVE-2022-29583'] | Disputed: OS Command injection in github.com/kardianos/service | service_windows.go in the kardianos service package for Go omits quoting that is sometimes needed for execution of a Windows service executable from the intended directory.
The validity of this vulnerability has been [questioned](https://github.com/kardianos/service/pull/290#issuecomment-1109831505) and the reporter h... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/kardianos/service'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29583'}, {'type': 'WEB', 'url': 'https://github.com/kardianos/service/issues/289'}, {'type': 'WEB', 'url': 'https://github.com/kardianos/service/pull/290'}, {'type': 'PACKAGE', 'url': 'https://github.com/kardianos/service'}] | {'cwe_ids': ['CWE-426', 'CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-26T13:15:34Z', 'nvd_published_at': '2022-04-22T16:15:00Z'} |
1.4.0 | GHSA-h2xh-jvpf-xq42 | 2023-09-18T22:28:05Z | 2022-04-30T18:15:07Z | null | ['CVE-2000-1211'] | Zope does not properly perform security registration for legacy names | Zope 2.2.0 through 2.2.4 does not properly perform security registration for legacy names of object constructors such as DTML method objects, which could allow attackers to perform unauthorized activities. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'zope'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'last_affected': '2.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2000-1211'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20010910131909/http://www.linux-mandrake.com/en/security/2000/MDKSA-2000-083.php3'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20021227061438/http://www.iss.net/security_center/s... | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T22:28:05Z', 'nvd_published_at': '2000-12-16T05:00:00Z'} |
1.4.0 | GHSA-wpr6-qvcq-8269 | 2022-12-01T23:57:35Z | 2022-04-13T00:00:17Z | null | ['CVE-2022-29046'] | Stored Cross-site Scripting vulnerability in Jenkins Subversion Plugin | Jenkins Subversion Plugin 2.15.3 and earlier does not escape the name and description of List Subversion tags (and more) parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Exploitation of this vulnerability ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:subversion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.15.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29046'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/subversion-plugin'}, {'type': 'WEB', 'url': 'https://support.apple.com/kb/HT213345'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617'}, {'... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-01T23:57:35Z', 'nvd_published_at': '2022-04-12T20:15:00Z'} |
1.4.0 | GHSA-g94p-h263-c26q | 2022-05-26T19:41:20Z | 2022-04-23T00:03:01Z | null | ['CVE-2022-27340'] | Cross Site Request Forgery in Mingsoft MCMS | MCMS v5.2.7 contains a Cross-Site Request Forgery (CSRF) via /role/saveOrUpdateRole.do. This vulnerability allows attackers to escalate privileges and modify data. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27340'}, {'type': 'WEB', 'url': 'https://github.com/UDKI11/vul/blob/main/Mcms%E8%B7%A8%E7%AB%99%E8%AF%B7%E6%B1%82%E4%BC%AA%E9%80%A0.docx'}, {'type': 'PACKAGE', 'url': 'https://github.com/ming-soft/MCMS'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-26T13:09:39Z', 'nvd_published_at': '2022-04-22T20:15:00Z'} |
1.4.0 | GHSA-2gwj-7jmv-h26r | 2023-09-05T19:23:06Z | 2022-04-13T00:00:33Z | null | ['CVE-2022-28346'] | SQL Injection in Django | An issue was discovered in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. `QuerySet.annotate()`, `aggregate()`, and `extra()` methods are subject to SQL injection in column aliases via a crafted dictionary (with dictionary expansion) as the passed `**kwargs`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ecosystem_specific': {'affected_functions': ['django.db.models.QuerySet.annotate', 'django.db.models.QuerySet.aggregate', 'django.db.models.QuerySet.extra']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixed': '2.2.28'}]}]}, {'package': {'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28346'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/2044dac5c6968441be6f534c4139bcf48c5c7e48'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/2c09e68ec911919360d5f8502cefc312f9e03c5d'}, {'type': 'WEB', 'url': ... | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:33:03Z', 'nvd_published_at': '2022-04-12T05:15:00Z'} |
1.4.0 | GHSA-mwm4-5qwr-g9pf | 2022-04-28T21:00:31Z | 2022-04-28T21:00:31Z | null | [] | Keycloak is vulnerable to IDN homograph attack | A flaw was found in keycloak, where IDN homograph attacks are possible. This flaw allows a malicious user to register a name that already exists and then tricking an admin to grant extra privileges. The highest threat from this vulnerability is to integrity. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-services'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '18.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/security/advisories/GHSA-mwm4-5qwr-g9pf'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/commit/ac79fd0c23c6947a04073afc61e30d341498438e'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}] | {'cwe_ids': ['CWE-284'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T21:00:31Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9h73-w7ch-rh73 | 2022-04-12T21:26:27Z | 2022-04-12T21:26:27Z | null | ['CVE-2018-1000883'] | Header Injection | Elixir Plug Plug version All contains a Header Injection vulnerability in Connection that can result in Given a cookie value, Headers can be added. This attack appear to be exploitable via Crafting a value to be sent as a cookie. This vulnerability appears to have been fixed in >= 1.3.5 or ~> 1.2.5 or ~> 1.1.9 or ~> 1.... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Hex', 'name': 'plug'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.6'}]}]}, {'package': {'ecosystem': 'Hex', 'name': 'plug'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.9'}]}]}, {'package': {'ecosystem': 'Hex', 'nam... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000883'}, {'type': 'WEB', 'url': 'https://github.com/elixir-plug/plug/commit/8857f8ab4acf9b9c22e80480dae2636692f5f573'}, {'type': 'WEB', 'url': 'https://github.com/dependabot/elixir-security-advisories/blob/master/packages/plug/2017-04-17.yml'}, {... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-12T21:26:27Z', 'nvd_published_at': None} |
1.4.0 | GHSA-w98m-2xqg-9cvj | 2022-04-12T19:36:39Z | 2022-04-12T19:36:39Z | null | ['CVE-2020-15150'] | Remote Code Execution in paginator | There is a vulnerability in Paginator which makes it susceptible to Remote Code Execution (RCE) attacks via input parameters to the `paginate()` function.
### Impact
There is a vulnerability in Paginator which makes it susceptible to Remote Code Execution (RCE) attacks via input parameters to the `paginate()` function... | [] | [{'package': {'ecosystem': 'Hex', 'name': 'paginator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/duffelhq/paginator/security/advisories/GHSA-w98m-2xqg-9cvj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15150'}, {'type': 'WEB', 'url': 'https://github.com/duffelhq/paginator/commit/bf45e92602e517c75aea0465efc35cd661d9ebf8'}, {'type': 'PACKAGE', '... | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-12T19:36:39Z', 'nvd_published_at': '2020-09-01T17:15:00Z'} |
1.4.0 | GHSA-f6p5-76fp-m248 | 2022-04-28T21:09:54Z | 2022-04-28T21:09:54Z | null | [] | URL Rewrite vulnerability in multiple zendframework components | zend-diactoros (and, by extension, Expressive), zend-http (and, by extension, Zend Framework MVC projects), and zend-feed (specifically, its PubSubHubbub sub-component) each contain a potential URL rewrite exploit. In each case, marshaling a request URI includes logic that introspects HTTP request headers that are spec... | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'zendframework/zend-diactoros'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'zendframework/zend-feed'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': ... | [{'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/zendframework/zend-diactoros/ZF2018-01.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/zendframework/zend-feed/ZF2018-01.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPH... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T21:09:54Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hf55-c445-2w97 | 2022-04-15T16:57:07Z | 2022-04-03T00:01:00Z | null | ['CVE-2022-21830'] | Cross-site Scripting in @rocket.chat/livechat | A blind self XSS vulnerability exists in RocketChat LiveChat versions lower than 1.9 that could allow an attacker to trick a victim pasting malicious code in their chat instance. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': '@rocket.chat/livechat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21830'}, {'type': 'WEB', 'url': 'https://github.com/RocketChat/Rocket.Chat.Livechat/pull/558'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1091118'}, {'type': 'PACKAGE', 'url': 'https://github.com/RocketChat/Rocket.Chat.Livechat'}, {'typ... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-05T17:57:47Z', 'nvd_published_at': '2022-04-01T23:15:00Z'} |
1.4.0 | GHSA-p3w3-4ppm-c3f6 | 2022-04-29T21:02:47Z | 2022-04-29T00:00:23Z | null | ['CVE-2022-1514'] | Cross site scripting in FacturaScripts | FacturaScripts prior to version 2022.06 is vulnerable to stored cross-site scripting via upload plugin functionality in zip format. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'facturascripts/facturascripts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2022.06'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1514'}, {'type': 'WEB', 'url': 'https://github.com/neorazorx/facturascripts/commit/aa9f28cb86467468f43486b77ddef7ff4d3c687e'}, {'type': 'PACKAGE', 'url': 'https://github.com/NeoRazorX/facturascripts'}, {'type': 'WEB', 'url': 'https://huntr.dev/boun... | {'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-29T21:02:47Z', 'nvd_published_at': '2022-04-28T16:15:00Z'} |
1.4.0 | GHSA-28r6-jm5h-mrgg | 2022-04-07T18:13:46Z | 2022-04-06T00:01:30Z | null | ['CVE-2021-30080'] | Access control bypass in Beego | An issue was discovered in the route lookup process in beego through 2.0.1, allows attackers to bypass access control. | [] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/beego/beego/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/beego/beego'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.12.... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-30080'}, {'type': 'WEB', 'url': 'https://github.com/beego/beego/pull/4459'}, {'type': 'WEB', 'url': 'https://github.com/beego/beego/commit/d5df5e470d0a8ed291930ae802fd7e6b95226519'}, {'type': 'PACKAGE', 'url': 'https://github.com/beego/beego'}, {'t... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T18:13:46Z', 'nvd_published_at': '2022-04-05T16:15:00Z'} |
1.4.0 | GHSA-r9w3-g83q-m6hq | 2022-04-13T16:28:10Z | 2022-04-01T17:26:03Z | null | ['CVE-2022-24802'] | Prototype Pollution in deepmerge-ts | deepmerge-ts is used to merge 2 or more objects respecting type information. deepmerge-ts is vulnerable to Prototype Pollution via file deepmerge.ts, function defaultMergeRecords(). A fix was released in version 4.0.2. Currently, there is no known workaround. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'deepmerge-ts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/RebeccaStevens/deepmerge-ts/security/advisories/GHSA-r9w3-g83q-m6hq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24802'}, {'type': 'WEB', 'url': 'https://github.com/RebeccaStevens/deepmerge-ts/commit/b39f1a93d9e1c3541bd2fe159fd696a16dbe1c72'}, {'t... | {'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T17:26:03Z', 'nvd_published_at': '2022-04-01T00:15:00Z'} |
1.4.0 | GHSA-7627-mp87-jf6q | 2022-04-04T21:58:52Z | 2022-04-02T00:00:13Z | null | ['CVE-2022-24440'] | Command injection in cocoapods-downloader | The package cocoapods-downloader before 1.6.0, from 1.6.2 and before 1.6.3 are vulnerable to Command Injection via git argument injection. When calling the Pod::Downloader.preprocess_options function and using git, both the git and branch parameters are passed to the git ls-remote subcommand in a way that additional fl... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'cocoapods-downloader'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'cocoapods-downloader'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.2'}, {'fixed': '1.6.3'}]... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24440'}, {'type': 'WEB', 'url': 'https://github.com/CocoaPods/cocoapods-downloader/pull/124'}, {'type': 'WEB', 'url': 'https://github.com/CocoaPods/cocoapods-downloader/pull/128'}, {'type': 'WEB', 'url': 'https://github.com/CocoaPods/cocoapods-down... | {'cwe_ids': ['CWE-74', 'CWE-88'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-04T21:58:52Z', 'nvd_published_at': '2022-04-01T18:15:00Z'} |
1.4.0 | GHSA-8m5h-hrqm-pxm2 | 2022-04-27T21:09:43Z | 2022-04-27T21:09:43Z | null | ['CVE-2022-23457'] | Path traversal in the OWASP Enterprise Security API | ### Impact
The default implementation of `Validator.getValidDirectoryPath(String, String, File, boolean)` may incorrectly treat the tested input string as a child of the specified parent directory. This potentially could allow control-flow bypass checks to be defeated if an attack can specify the entire string represen... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.owasp.esapi:esapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.3.1'}}] | [{'type': 'WEB', 'url': 'https://github.com/ESAPI/esapi-java-legacy/security/advisories/GHSA-8m5h-hrqm-pxm2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23457'}, {'type': 'WEB', 'url': 'https://github.com/ESAPI/esapi-java-legacy/commit/a0d67b75593878b1b6e39e2acc1773b3effedb2a'}, {'type': 'P... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-27T21:09:43Z', 'nvd_published_at': '2022-04-25T20:15:00Z'} |
1.4.0 | GHSA-9hgc-wpc5-v8p9 | 2022-05-26T19:40:11Z | 2022-04-30T00:00:37Z | null | ['CVE-2022-1530'] | An attacker can execute malicious javascript in Live Helper Chat | Cross-site Scripting (XSS) in GitHub repository livehelperchat/livehelperchat prior to 3.99v. Attacker can execute malicious javascript on application. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.99'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1530'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/edef7a8387be718d0de2dfd1e722789afb0461bc'}, {'type': 'PACKAGE', 'url': 'https://github.com/livehelperchat/livehelperchat'}, {'type': 'WEB', 'url': 'https://hunt... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-03T20:49:15Z', 'nvd_published_at': '2022-04-29T09:15:00Z'} |
1.4.0 | GHSA-gp7c-xmmm-7pqr | 2022-12-02T21:29:59Z | 2022-04-13T00:00:18Z | null | ['CVE-2022-29038'] | Stored Cross-site Scripting vulnerabilities in Jenkins Extended Choice Parameter Plugin | Jenkins Extended Choice Parameter Plugin 346.vd87693c5a_86c and earlier does not escape the name and description of Extended Choice parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:extended-choice-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '346.vd87693c5a'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29038'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/extended-choice-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T21:29:59Z', 'nvd_published_at': '2022-04-12T20:15:00Z'} |
1.4.0 | GHSA-hhr9-7xvh-8xgc | 2022-04-19T17:55:45Z | 2022-04-06T00:01:32Z | null | ['CVE-2022-1213'] | Server side request forgery in LiveHelperChat | SSRF filter bypass port 80, 433 in LiveHelperChat prior to v3.67. An attacker could make the application perform arbitrary requests, bypass CVE-2022-1191 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.67'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1213'}, {'type': 'WEB', 'url': 'https://github.com/LiveHelperChat/livehelperchat/issues/1752'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/abc9599ee7aded466ca216741dcaea533c908111'}, {'type': 'PACKAGE', 'url': '... | {'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T15:44:18Z', 'nvd_published_at': '2022-04-05T04:15:00Z'} |
1.4.0 | GHSA-gx8x-g87m-h5q6 | 2022-04-11T21:38:11Z | 2022-04-11T21:38:11Z | null | [] | Denial of Service (DoS) in Nokogiri on JRuby | ## Summary
Nokogiri `v1.13.4` updates the vendored `org.cyberneko.html` library to `1.9.22.noko2` which addresses [CVE-2022-24839](https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv). That CVE is rated 7.5 (High Severity).
See [GHSA-9849-p7jc-9rmv](https://github.com/sparklemotion/nekoh... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-gx8x-g87m-h5q6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24839'}, {'type': 'WEB', 'url'... | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-11T21:38:11Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8hfj-j24r-96c4 | 2022-04-04T21:25:48Z | 2022-04-04T21:25:48Z | null | ['CVE-2022-24785'] | Path Traversal: 'dir/../../filename' in moment.locale | ### Impact
This vulnerability impacts npm (server) users of moment.js, especially if user provided locale string, eg `fr` is directly used to switch moment locale.
### Patches
This problem is patched in 2.29.2, and the patch can be applied to all affected versions (from 1.0.1 up until 2.29.1, inclusive).
### Workarou... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'moment'}, 'ecosystem_specific': {'affected_functions': ['moment.locale']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.29.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Moment.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduce... | [{'type': 'WEB', 'url': 'https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24785'}, {'type': 'WEB', 'url': 'https://github.com/moment/moment/commit/4211bfc8f15746be4019bba557e29a7ba83d54c5'}, {'type': 'PACKAGE', 'url': 'htt... | {'cwe_ids': ['CWE-22', 'CWE-27'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-04T21:25:48Z', 'nvd_published_at': '2022-04-04T17:15:00Z'} |
1.4.0 | GHSA-69p6-wvmq-27gg | 2023-07-03T23:11:16Z | 2022-04-20T00:00:33Z | null | ['CVE-2022-25648'] | Command injection in ruby-git | The package prior to v1.11.0 is vulnerable to Command Injection via git argument injection. When calling the `fetch(remote = 'origin', opts = {})` function, the remote parameter is passed to the `git fetch` subcommand in a way such that additional flags can be set. The additional flags can be used to perform a command ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'git'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25648'}, {'type': 'WEB', 'url': 'https://github.com/ruby-git/ruby-git/pull/569'}, {'type': 'WEB', 'url': 'https://github.com/ruby-git/ruby-git/commit/291ca0946bec7164b90ad5c572ac147f512c7159'}, {'type': 'PACKAGE', 'url': 'https://github.com/ruby-gi... | {'cwe_ids': ['CWE-88'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T21:13:22Z', 'nvd_published_at': '2022-04-19T17:15:00Z'} |
1.4.0 | GHSA-5h7w-hmxc-99g5 | 2022-04-28T21:15:03Z | 2022-04-19T00:00:45Z | null | ['CVE-2022-1091'] | Cross site scripting in safe-svg | The sanitisation step of the Safe SVG WordPress plugin before 1.9.10 can be bypassed by spoofing the content-type in the POST request to upload a file. Exploiting this vulnerability, an attacker will be able to perform the kinds of attacks that this plugin should prevent (mainly XSS, but depending on further use of upl... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'darylldoyle/safe-svg'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1091'}, {'type': 'WEB', 'url': 'https://github.com/10up/safe-svg/pull/28'}, {'type': 'WEB', 'url': 'https://github.com/10up/safe-svg/commit/00cb9a86d1bff2214714557d1901ec3896564e50'}, {'type': 'PACKAGE', 'url': 'https://github.com/10up/safe-svg'}, ... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T21:15:03Z', 'nvd_published_at': '2022-04-18T18:15:00Z'} |
1.4.0 | GHSA-7gc6-qh9x-w6h8 | 2022-04-28T20:45:25Z | 2022-04-17T00:00:32Z | null | ['CVE-2022-1365'] | Incorrect Authorization in cross-fetch | When fetching a remote url with Cookie if it get Location response header then it will follow that url and try to fetch that url with provided cookie . So cookie is leaked here to thirdparty.
Ex: you try to fetch example.com with cookie and if it get redirect url to attacker.com then it fetch that redirect url with pro... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'cross-fetch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.5'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'cross-fetch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1365'}, {'type': 'WEB', 'url': 'https://github.com/lquixada/cross-fetch/pull/135'}, {'type': 'WEB', 'url': 'https://github.com/lquixada/cross-fetch/commit/a3b3a9481091ddd06b8f83784ba9c4e034dc912a'}, {'type': 'PACKAGE', 'url': 'https://github.com/lq... | {'cwe_ids': ['CWE-359', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T20:45:25Z', 'nvd_published_at': '2022-04-15T23:15:00Z'} |
1.4.0 | GHSA-rqrc-8q8f-cp9c | 2022-04-08T18:11:51Z | 2022-04-08T18:11:51Z | null | ['CVE-2020-1469'] | Infinite loop in .Net Bond | A denial of service vulnerability exists when the .NET implementation of Bond improperly parses input, aka 'Bond Denial of Service Vulnerability'. Handling of large container lengths that could cause an infinite loop when deserializing some payloads. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Bond.Core.CSharp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '9.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1469'}, {'type': 'WEB', 'url': 'https://github.com/microsoft/bond/commit/3afea822c42dd0095fedb9e7db9ebb99165e7343'}, {'type': 'WEB', 'url': 'https://github.com/microsoft/bond/commit/b0fd4a15a7cae946dd2855122559ca59cc34dbea'}, {'type': 'PACKAGE', 'u... | {'cwe_ids': ['CWE-434', 'CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-08T18:11:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5v4m-c73v-c7gq | 2022-04-12T21:23:43Z | 2022-04-12T21:23:43Z | null | ['CVE-2017-1000053'] | Arbitrary Code Execution in Cookie Serialization | The default serialization used by Plug session may result in code execution
in certain situations. Keep in mind, however, the session cookie is signed
and this attack can only be exploited if the attacker has access to your
secret key as well as your signing/encryption salts. We recommend users to
change their ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Hex', 'name': 'plug'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'Hex', 'name': 'plug'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.7'}]}]}, {'package': {'ecosystem': 'Hex', 'nam... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000053'}, {'type': 'WEB', 'url': 'https://elixirforum.com/t/security-releases-for-plug/3913'}, {'type': 'PACKAGE', 'url': 'https://github.com/elixir-plug/plug'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-12T21:23:43Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pfv6-prqm-85q8 | 2022-04-22T20:50:33Z | 2022-04-16T00:00:26Z | null | ['CVE-2022-24279'] | Prototype Pollution in madlib-object-utils | The package madlib-object-utils before version 0.1.8 is vulnerable to Prototype Pollution via the `setValue` method, as it allows an attacker to merge object prototypes into it. *Note:* This vulnerability derives from an incomplete fix of [CVE-2020-7701](https://security.snyk.io/vuln/SNYK-JS-MADLIBOBJECTUTILS-598676) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'madlib-object-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24279'}, {'type': 'WEB', 'url': 'https://github.com/Qwerios/madlib-object-utils/commit/8d5d54c11c8fb9a7980a99778329acd13e3ef98f'}, {'type': 'PACKAGE', 'url': 'https://github.com/Qwerios/madlib-object-utils'}, {'type': 'WEB', 'url': 'https://snyk.io... | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:50:33Z', 'nvd_published_at': '2022-04-15T20:15:00Z'} |
1.4.0 | GHSA-3xpw-vhmv-cw7h | 2022-04-27T14:35:56Z | 2022-04-26T00:00:35Z | null | ['CVE-2022-25866'] | Command injection in czproject/git-php | The package czproject/git-php before 4.0.3 are vulnerable to Command Injection via git argument injection. When calling the isRemoteUrlReadable($url, array $refs = NULL) function, both the url and refs parameters are passed to the git ls-remote subcommand in a way that additional flags can be set. The additional flags ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'czproject/git-php'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25866'}, {'type': 'WEB', 'url': 'https://github.com/czproject/git-php/commit/5e82d5479da5f16d37a915de4ec55e1ac78de733'}, {'type': 'PACKAGE', 'url': 'https://github.com/czproject/git-php'}, {'type': 'WEB', 'url': 'https://github.com/czproject/git-ph... | {'cwe_ids': ['CWE-74', 'CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-27T14:35:56Z', 'nvd_published_at': '2022-04-25T17:15:00Z'} |
1.4.0 | GHSA-v6gp-9mmm-c6p5 | 2022-04-11T21:21:28Z | 2022-04-11T21:21:28Z | null | [] | Out-of-bounds Write in zlib affects Nokogiri | ## Summary
Nokogiri v1.13.4 updates the vendored zlib from 1.2.11 to 1.2.12, which addresses [CVE-2018-25032](https://nvd.nist.gov/vuln/detail/CVE-2018-25032). That CVE is scored as CVSS 7.4 "High" on the NVD record as of 2022-04-05.
Please note that this advisory only applies to the CRuby implementation of Nokogiri ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25032'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jc36-42cf-vqwj'}, {'type': 'PACKAGE', 'url': 'https://github.com/s... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-11T21:21:28Z', 'nvd_published_at': None} |
1.4.0 | GHSA-ch3h-j2vf-95pv | 2023-06-07T15:35:54Z | 2022-04-27T22:32:49Z | null | ['CVE-2022-27777'] | XSS Vulnerability in Action View tag helpers | There is a possible XSS vulnerability in Action View tag helpers. Passing untrusted input as hash keys can lead to a possible XSS vulnerability. This vulnerability has been assigned the CVE identifier CVE-2022-27777.
Versions Affected: ALL
Not affected: NONE
Fixed Versions: 7.0.2.4, 6.1.5.1, 6.0.4.8, 5.2.7.... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.7.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.7.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM',... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27777'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/649516ce0feb699ae06a8c5e81df75d460cc9a85'}, {'type': 'WEB', 'url': 'https://discuss.rubyonrails.org/t/cve-2022-27777-possible-xss-vulnerability-in-action-view-tag-helpers/80534'... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-27T22:32:49Z', 'nvd_published_at': '2022-05-26T17:15:00Z'} |
1.4.0 | GHSA-j739-gw6q-f4c7 | 2022-04-22T20:41:49Z | 2022-04-14T00:00:19Z | null | ['CVE-2020-29653'] | HTML Injection in Froxlor | Froxlor through 0.10.22 does not perform validation on user input passed in the customermail GET parameter. The value of this parameter is reflected in the login webpage, allowing the injection of arbitrary HTML tags.
Note: Froxlor version 0.10.22 introduces AntiXSS cross-site scripting protection, but AntiXSS only pr... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'froxlor/froxlor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.10.22'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-29653'}, {'type': 'WEB', 'url': 'https://github.com/Froxlor/Froxlor/commit/6bf5eccc2477257b6c1760a3c3784ae7e0554ce0'}, {'type': 'PACKAGE', 'url': 'https://github.com/Froxlor/Froxlor'}, {'type': 'WEB', 'url': 'https://github.com/Froxlor/Froxlor/secu... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:41:49Z', 'nvd_published_at': '2022-04-13T13:15:00Z'} |
1.4.0 | GHSA-6p96-vfrc-fv32 | 2023-07-07T19:13:30Z | 2022-04-12T00:00:34Z | null | ['CVE-2022-27115'] | RCE in Studio-42 elFinder on Windows before 2.1.61 | In Studio-42 elFinder 2.1.60, there is a vulnerability that causes remote code execution through file name bypass for file upload. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'studio-42/elfinder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.61'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27115'}, {'type': 'WEB', 'url': 'https://github.com/Studio-42/elFinder/issues/3458'}, {'type': 'WEB', 'url': 'https://github.com/Studio-42/elFinder/commit/69be51eea5b484822a29ddd40f1b72845954ba60'}] | {'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T19:13:30Z', 'nvd_published_at': '2022-04-11T15:15:00Z'} |
1.4.0 | GHSA-c4r5-xvgw-2942 | 2023-09-25T11:33:41Z | 2022-04-19T00:00:50Z | null | ['CVE-2021-3503'] | Metrics exposure in Wildfly | A flaw was found in Wildfly where insufficient RBAC restrictions may lead to expose metrics data. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.wildfly:wildfly-metrics'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '23.0.1.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 23.0.0.Final'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3503'}, {'type': 'WEB', 'url': 'https://github.com/wildfly/wildfly/pull/14136'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2021-3503'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1942693'}, {'type':... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T21:16:02Z', 'nvd_published_at': '2022-04-18T17:15:00Z'} |
1.4.0 | GHSA-5cmw-fhq9-8fhh | 2022-04-12T18:10:00Z | 2022-04-01T00:00:40Z | null | ['CVE-2022-1176'] | Type Confusion in LiveHelperChat | Live Helper Chat provides live support for your website. Loose comparison causes IDOR on multiple endpoints in LiveHelperChat prior to 3.96. There is a fix released in versions 3.96 and 3.97. Currently, there is no known workaround. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.96'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1176'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/72c0df160bfe9838c618652facef29af99392ce3'}, {'type': 'PACKAGE', 'url': 'https://github.com/livehelperchat/livehelperchat'}, {'type': 'WEB', 'url': 'https://hunt... | {'cwe_ids': ['CWE-843'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T19:41:31Z', 'nvd_published_at': '2022-03-31T10:15:00Z'} |
1.4.0 | GHSA-gprh-7767-cw39 | 2022-04-22T20:18:24Z | 2022-04-12T00:00:34Z | null | ['CVE-2021-40219'] | Code Injection in Bolt CMS | Bolt CMS <= 4.2 is vulnerable to Remote Code Execution. Unsafe theme rendering allows an authenticated attacker to edit theme to inject server-side template injection that leads to remote code execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'bolt/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40219'}, {'type': 'PACKAGE', 'url': 'https://github.com/bolt/core'}, {'type': 'WEB', 'url': 'https://github.com/bolt/core/blob/3b21a73ebf519b76756d3ad2841312d10ef11461/src/Controller/Frontend/TemplateController.php'}, {'type': 'WEB', 'url': 'https:... | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:18:24Z', 'nvd_published_at': '2022-04-11T17:15:00Z'} |
1.4.0 | GHSA-p5rr-q5g6-gm42 | 2023-09-18T22:57:43Z | 2022-04-29T03:01:19Z | null | ['CVE-2004-2381'] | Jetty HTTP Server Denial of Service vulnerability | HttpRequest.java in Jetty HTTP Server before 4.2.19 allows remote attackers to cause denial of service (memory usage and application crash) via HTTP requests with a large Content-Length. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.mortbay.jetty:jetty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.19'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2004-2381'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/15537'}, {'type': 'WEB', 'url': 'http://cvs.sourceforge.net/viewcvs.py/jetty/Jetty/src/org/mortbay/http/HttpRequest.java?r1=1.75&r2=1.76'}, {'type': 'WEB', 'url': ... | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T22:57:43Z', 'nvd_published_at': '2004-12-31T05:00:00Z'} |
1.4.0 | GHSA-64fq-9c6w-rq44 | 2022-04-22T20:21:47Z | 2022-04-09T00:00:25Z | null | ['CVE-2021-43515'] | Improper Neutralization of Formula Elements in a CSV File in Kimai 2 | A CSV Injection vulnerablity exists in Kimai Kimai 2 prior to 1.14.1 via a description in a new timesheet. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'kevinpapst/kimai2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.14.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43515'}, {'type': 'WEB', 'url': 'https://github.com/kevinpapst/kimai2/pull/2532'}, {'type': 'WEB', 'url': 'https://github.com/kevinpapst/kimai2/commit/dad1b8b772947f1596175add1b4f33b791705507#diff-6774f5865dbaf8bc6c55b75bd92e6f9950ebe7834aa2efd828a... | {'cwe_ids': ['CWE-1236'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:21:47Z', 'nvd_published_at': '2022-04-08T17:15:00Z'} |
1.4.0 | GHSA-g397-v4w5-4m79 | 2022-04-04T21:57:37Z | 2022-04-02T00:00:13Z | null | ['CVE-2022-21223'] | Command injection in cocoapods-downloader | The package cocoapods-downloader before 1.6.2 are vulnerable to Command Injection via hg argument injection. When calling the download function (when using hg), the url (and/or revision, tag, branch) is passed to the hg clone command in a way that additional flags can be set. The additional flags can be used to perform... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'cocoapods-downloader'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21223'}, {'type': 'WEB', 'url': 'https://github.com/CocoaPods/cocoapods-downloader/pull/127'}, {'type': 'PACKAGE', 'url': 'https://github.com/CocoaPods/cocoapods-downloader'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob... | {'cwe_ids': ['CWE-74', 'CWE-88'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-04T21:57:37Z', 'nvd_published_at': '2022-04-01T18:15:00Z'} |
1.4.0 | GHSA-c2cp-3xj9-97w9 | 2022-05-04T03:52:42Z | 2022-04-22T00:00:33Z | null | ['CVE-2022-22969'] | Denial of service in Spring Security OAuth | Spring Security OAuth versions 2.5.x prior to 2.5.2 and older unsupported versions are susceptible to a Denial-of-Service (DoS) attack via the initiation of the Authorization Request in an OAuth 2.0 Client application. A malicious user or attacker can send multiple requests initiating the Authorization Request for the ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security.oauth:spring-security-oauth-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2.RELEASE'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.5.1.RELEASE'}}, {'package': {'ecosystem': '... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22969'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2022-22969'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}] | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-26T13:01:06Z', 'nvd_published_at': '2022-04-21T19:15:00Z'} |
1.4.0 | GHSA-2v7p-f4qm-r5pc | 2022-05-03T21:01:41Z | 2022-04-23T00:03:03Z | null | ['CVE-2022-1429'] | SQL Injection found in Pimcore | Pimcore is an open source data & experience management platform. A SQL injection was discovered in GridHelperService.php in GitHub repository pimcore/pimcore prior to 10.3.6. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.3.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1429'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/523a735ab94f004459b84ffdfd3db784586bbd82'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/cfba30b4-85fa... | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-03T21:01:41Z', 'nvd_published_at': '2022-04-22T09:15:00Z'} |
1.4.0 | GHSA-f9wg-5f46-cjmw | 2022-04-22T20:49:09Z | 2022-04-22T20:49:09Z | null | ['CVE-2022-24858'] | NextAuth.js default redirect callback vulnerable to open redirects | `next-auth` v3 users before version 3.29.2 are impacted. (We recommend upgrading to v4 in most cases. See our [migration guide](https://next-auth.js.org/getting-started/upgrade-v4)).`next-auth` v4 users before version 4.3.2 are impacted. Upgrading to 3.29.2 or 4.3.2 will patch this vulnerability. If you are not able to... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'next-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.29.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'next-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/nextauthjs/next-auth/security/advisories/GHSA-f9wg-5f46-cjmw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24858'}, {'type': 'WEB', 'url': 'https://github.com/nextauthjs/next-auth/commit/6e15bdcb2d93c1ad5ee3889f702607637e79db50'}, {'type': 'PACKAGE... | {'cwe_ids': ['CWE-290', 'CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:49:09Z', 'nvd_published_at': '2022-04-19T23:15:00Z'} |
1.4.0 | GHSA-q58j-fmvf-9rq6 | 2023-05-26T21:13:22Z | 2022-04-22T00:24:28Z | null | ['CVE-2011-1497'] | Cross site scripting in actionpack Rubygem | A cross-site scripting vulnerability flaw was found in the `auto_link` function in Rails before version 3.0.6. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-1497'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/61ee3449674c591747db95f9b3472c5c3bd9e84d'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/blob/38df020c95be... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:31:04Z', 'nvd_published_at': '2021-10-19T14:15:00Z'} |
1.4.0 | GHSA-xxx9-3xcr-gjj3 | 2022-04-11T21:30:00Z | 2022-04-11T21:30:00Z | null | [] | XML Injection in Xerces Java affects Nokogiri | ## Summary
Nokogiri v1.13.4 updates the vendored `xerces:xercesImpl` from 2.12.0 to 2.12.2, which addresses [CVE-2022-23437](https://nvd.nist.gov/vuln/detail/CVE-2022-23437). That CVE is scored as CVSS 6.5 "Medium" on the NVD record.
Please note that this advisory only applies to the **JRuby** implementation of Nokog... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-xxx9-3xcr-gjj3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23437'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h65f-jvqw-m9fj'}, {'type': 'PACKAGE', 'url': 'https://github.com/s... | {'cwe_ids': ['CWE-91'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-11T21:30:00Z', 'nvd_published_at': None} |
1.4.0 | GHSA-ghcq-472w-vf4h | 2022-04-08T21:59:04Z | 2022-04-08T21:59:04Z | null | ['CVE-2022-24821'] | Incorrect Use of Privileged APIs in org.xwiki.platform.skin.skinx | ### Impact
Simple users can create global SSX/JSX without specific rights: in theory only users with Programming Rights should be allowed to create SSX or JSX that are executed everywhere on a wiki. But a bug allow anyone with edit rights to actually create those.
### Patches
This issue has been patched in XWiki 13.... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-skin-skinx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '13.5.0'}, {'fixed': '13.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-skin-skinx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events'... | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-ghcq-472w-vf4h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24821'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-1... | {'cwe_ids': ['CWE-648'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-08T21:59:04Z', 'nvd_published_at': '2022-04-08T19:15:00Z'} |
1.4.0 | GHSA-w5m2-299g-rff5 | 2022-04-26T12:59:00Z | 2022-04-26T12:59:00Z | null | ['CVE-2022-28820'] | Page Compare Reflected Cross-site Scripting (XSS) vulnerability | ### Impact
ACS Commons version 5.1.x (and earlier) suffers from a Reflected Cross-site Scripting (XSS) vulnerability in `/apps/acs-commons/content/page-compare.html` endpoint via the `a` and `b` GET parameters. User input submitted via these parameters is not validated or sanitized.
An attacker must provide a link to... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.adobe.acs:acs-aem-commons'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Adobe-Consulting-Services/acs-aem-commons/security/advisories/GHSA-w5m2-299g-rff5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28820'}, {'type': 'PACKAGE', 'url': 'https://github.com/Adobe-Consulting-Services/acs-aem-commons'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-26T12:59:00Z', 'nvd_published_at': '2022-04-21T19:15:00Z'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.