schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
8
154
details
stringlengths
31
19.1k
severity
stringlengths
2
92
affected
stringlengths
75
28.5k
references
stringlengths
79
7.48k
database_specific
stringlengths
131
196
1.4.0
GHSA-c2jg-hw38-jrqq
2022-04-04T21:29:41Z
2022-04-04T21:29:41Z
null
['CVE-2022-24801']
Inconsistent Interpretation of HTTP Requests in twisted.web
The Twisted Web HTTP 1.1 server, located in the `twisted.web.http` module, parsed several HTTP request constructs more leniently than permitted by RFC 7230: 1. The Content-Length header value could have a `+` or `-` prefix. 2. Illegal characters were permitted in chunked extensions, such as the LF (`\n`) character. 3....
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'twisted'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.4.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/twisted/twisted/security/advisories/GHSA-c2jg-hw38-jrqq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24801'}, {'type': 'WEB', 'url': 'https://github.com/twisted/twisted/commit/592217e951363d60e9cd99c5bbfd23d4615043ac'}, {'type': 'WEB', 'url': 'htt...
{'cwe_ids': ['CWE-444'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-04T21:29:41Z', 'nvd_published_at': '2022-04-04T18:15:00Z'}
1.4.0
GHSA-rh6c-jh4c-9fg3
2023-09-18T22:51:56Z
2022-04-29T02:59:06Z
null
['CVE-2004-1177']
mailman Cross-site scripting (XSS) vulnerability
Cross-site scripting (XSS) vulnerability in the driver script in mailman before 2.1.5 allows remote attackers to inject arbitrary web script or HTML via a URL, which is not properly escaped in the resulting error page.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'mailman'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2004-1177'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/18854'}, {'type': 'PACKAGE', 'url': 'https://github.com/terencehonles/mailman'}, {'type': 'WEB', 'url': 'https://oval.cisecurity.org/repository/search/definition/o...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T22:51:56Z', 'nvd_published_at': '2005-01-10T05:00:00Z'}
1.4.0
GHSA-v5c9-98f7-2h54
2023-08-29T19:54:42Z
2022-04-23T00:40:07Z
null
['CVE-2012-2945']
Hadoop symlink vulnerability
Hadoop 1.0.3 contains a symlink vulnerability as a result of storing pid files in the shared `/tmp` directory by default.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-2945'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=535861'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/hadoop'}, {'type': 'WEB', 'url': 'https://seclists.org/fulldisclosure/2012/Jul/3'}, {'type': 'WEB', 'u...
{'cwe_ids': ['CWE-377', 'CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T19:54:42Z', 'nvd_published_at': '2019-10-29T19:15:00Z'}
1.4.0
GHSA-f99r-jjgr-f373
2022-04-18T22:23:05Z
2022-04-06T00:01:30Z
null
['CVE-2022-26986']
SQL injection in ImpressCMS
SQL Injection in ImpressCMS 1.4.3 and earlier allows remote attackers to inject into the code in unintended way, this allows an attacker to read and modify the sensitive information from the database used by the application. If misconfigured, an attacker can even upload a malicious web shell to compromise the entire sy...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'impresscms/impresscms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26986'}, {'type': 'PACKAGE', 'url': 'https://github.com/ImpressCMS/impresscms'}, {'type': 'WEB', 'url': 'https://github.com/sartlabs/0days/blob/main/ImpressCMS1.4.3/Exploit.txt'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/171485/...
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T18:21:23Z', 'nvd_published_at': '2022-04-05T15:15:00Z'}
1.4.0
GHSA-j2x6-9323-fp7h
2022-04-22T20:24:13Z
2022-04-22T20:24:13Z
null
['CVE-2022-24845']
Integer bounds error in Vyper
### Impact in the following code, the return of `<iface>.returns_int128()` is not validated to fall within the bounds of `int128`. as of v0.3.0, `<iface>.returns_int128()` is validated in simple expressions, but not complex expressions. ```vyper interface iface: def returns_int128() -> int128: view def returns_...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'vyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/security/advisories/GHSA-j2x6-9323-fp7h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24845'}, {'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/commit/049dbdc647b2ce838fae7c188e6bb09cf16e470b'}, {'type': 'WEB', 'url': 'htt...
{'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:24:13Z', 'nvd_published_at': '2022-04-13T22:15:00Z'}
1.4.0
GHSA-vrgp-3ph6-2wwq
2022-04-13T14:57:08Z
2022-04-01T00:00:41Z
null
['CVE-2021-36625']
SQL Injection in Dolibarr
An SQL Injection vulnerability exists in Dolibarr ERP/CRM 13.0.2 (fixed version is 14.0.0) via a POST request to the country_id parameter in an UPDATE statement.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '14.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36625'}, {'type': 'WEB', 'url': 'https://github.com/Dolibarr/dolibarr/commit/abb1ad6bf0469eccd2b58beb20bdabc18fc36e22'}, {'type': 'PACKAGE', 'url': 'https://github.com/Dolibarr/dolibarr'}]
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-13T14:57:08Z', 'nvd_published_at': '2022-03-31T18:15:00Z'}
1.4.0
GHSA-4pc7-vqv5-5r3v
2022-12-01T22:10:45Z
2022-04-27T21:25:59Z
null
['CVE-2021-3827']
ECP SAML binding bypasses authentication flows
### Description A flaw was found in keycloak, where the default ECP binding flow allows other authentication flows to be bypassed. By exploiting this behavior an attacker can bypass the MFA authentication by sending a SOAP request with an AuthnRequest and Authorization header with the user's credentials. The highest th...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-saml-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '18.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/security/advisories/GHSA-4pc7-vqv5-5r3v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3827'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/commit/44000caaf5051d7f218d1ad79573bd3d175cad0d'}, {'type': 'WEB', 'url': '...
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-27T21:25:59Z', 'nvd_published_at': '2022-08-23T16:15:00Z'}
1.4.0
GHSA-32rp-q37p-jg6w
2022-04-28T21:12:15Z
2022-04-20T00:00:30Z
null
['CVE-2022-1384']
Insecure plugin handling in Mattermost
Mattermost version 6.4.x and earlier fails to properly check the plugin version when a plugin is installed from the Marketplace, which allows an authenticated and an authorized user to install and exploit an old plugin version from the Marketplace which might have known vulnerabilities.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.4.0'}, {'fixed': '6.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1384'}, {'type': 'WEB', 'url': 'https://mattermost.com/security-updates/'}, {'type': 'PACKAGE', 'url': 'github.com/mattermost/mattermost-server'}]
{'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T21:12:15Z', 'nvd_published_at': '2022-04-19T21:15:00Z'}
1.4.0
GHSA-c3g4-w6cv-6v7h
2022-04-19T18:02:46Z
2022-04-01T13:56:42Z
null
['CVE-2022-27651']
Non-empty default inheritable capabilities for linux container in Buildah
A bug was found in Buildah where containers were created with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during execve(2). This bug did not affect the container secu...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/containers/buildah'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.25.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/containers/buildah/security/advisories/GHSA-c3g4-w6cv-6v7h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27651'}, {'type': 'WEB', 'url': 'https://github.com/containers/buildah/pull/3855'}, {'type': 'WEB', 'url': 'https://github.com/containers/build...
{'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T13:56:42Z', 'nvd_published_at': '2022-04-04T20:15:00Z'}
1.4.0
GHSA-8wp2-vxpg-xcvp
2022-05-05T13:47:28Z
2022-04-26T00:00:43Z
null
['CVE-2022-1457']
Cross site scripting in facturascripts
facturasripts is an open source ERP software. Store XSS in title parameter executing at EditUser Page & EditProducto page in GitHub repository neorazorx/facturascripts prior to 2022.04. Cross-site scripting attacks can have devastating consequences. Code injected into a vulnerable application can exfiltrate data or ins...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'neorazorx/facturascripts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2022.04'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1457'}, {'type': 'WEB', 'url': 'https://github.com/neorazorx/facturascripts/commit/b3e7527d1e100898c15fec067825b6bc738613df'}, {'type': 'PACKAGE', 'url': 'https://github.com/neorazorx/facturascripts'}, {'type': 'WEB', 'url': 'https://huntr.dev/boun...
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-27T20:20:50Z', 'nvd_published_at': '2022-04-25T10:15:00Z'}
1.4.0
GHSA-g54x-29xv-58h5
2022-04-15T02:46:19Z
2022-04-05T00:00:23Z
null
['CVE-2021-43464']
Remote code execution in Subrion
Subrion is an open source php content management system. A Remiote Code Execution (RCE) vulnerability exiss in Subrion CMS 4.2.1 via modified code in a background field; when the information is modified, the data in it will be executed through eval().
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'intelliants/subrion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43464'}, {'type': 'WEB', 'url': 'https://github.com/intelliants/subrion/issues/888'}, {'type': 'PACKAGE', 'url': 'https://github.com/intelliants/subrion'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T15:16:10Z', 'nvd_published_at': '2022-04-04T18:15:00Z'}
1.4.0
GHSA-58hj-575g-5j25
2023-09-18T22:35:47Z
2022-04-30T18:16:47Z
null
['CVE-2001-0829']
Apache Tomcat allows webmasters to insert xss into error messages
A cross-site scripting vulnerability in Apache Tomcat 3.2.1 allows a malicious webmaster to embed Javascript in a request for a .JSP file, which causes the Javascript to be inserted into an error message.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2001-0829'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20021108153830/http://online.securityfocus.com/bid/2982'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20021201182720/http://jakarta.apache.org/tomcat/tomcat-3.2-doc/readme'}, {'ty...
{'cwe_ids': ['CWE-80'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T22:35:47Z', 'nvd_published_at': '2001-12-06T05:00:00Z'}
1.4.0
GHSA-gcj7-j438-hjj2
2022-04-07T22:10:22Z
2022-04-07T22:10:22Z
null
['CVE-2022-24825']
Smokescreen SSRF via deny list bypass
The primary use case for Smokescreen is to prevent server-side request forgery (SSRF) attacks in which external attackers leverage the behavior of applications to connect to or scan internal infrastructure. Smokescreen also offers an option to deny access to additional (e.g., external) URLs by way of a deny list. Ther...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/stripe/smokescreen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/stripe/smokescreen/security/advisories/GHSA-gcj7-j438-hjj2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24825'}, {'type': 'WEB', 'url': 'https://github.com/stripe/smokescreen/commit/fafb6ae48c6c40aa011d87b61306abc48db8797b'}, {'type': 'PACKAGE', '...
{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T22:10:22Z', 'nvd_published_at': '2022-04-19T20:15:00Z'}
1.4.0
GHSA-rjvg-8v36-xv9r
2023-04-11T14:26:34Z
2022-04-26T00:00:42Z
null
['CVE-2022-27103']
element-plus vulnerable to cross-site scripting (XSS) via el-table-column
element-plus below 2.0.5 is vulnerable to Cross Site Scripting (XSS) when attribute `show-tooltips-overflow` of `el-table-column` is true. The mouseover action will make the text of this column render as html.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'element-plus'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27103'}, {'type': 'WEB', 'url': 'https://github.com/asjdf/element-table-xss-test/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/element-plus/element-plus/issues/6514'}, {'type': 'WEB', 'url': 'https://github.com/element-plus/element-plus/pu...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-11T14:26:34Z', 'nvd_published_at': '2022-04-25T13:15:00Z'}
1.4.0
GHSA-j3gg-r6gp-95q2
2022-04-12T20:22:57Z
2022-04-12T20:22:57Z
null
[]
XSS in HEEx class attributes
The `class` attribute was not protected against XSS attacks when using HEEx.
[]
[{'package': {'ecosystem': 'Hex', 'name': 'phoenix_html'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/phoenixframework/phoenix_html/commit/62a0139fb716bcdce697f6221244bd81d321d620'}, {'type': 'PACKAGE', 'url': 'https://github.com/phoenixframework/phoenix_html'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-12T20:22:57Z', 'nvd_published_at': None}
1.4.0
GHSA-x2w5-725j-gf2g
2022-05-26T19:43:23Z
2022-04-20T16:21:03Z
null
['CVE-2022-22143']
Prototype Pollution in convict
### Impact * An attacker can inject attributes that are used in other components * An attacker can override existing attributes with ones that have incompatible type, which may lead to a crash. The main use case of Convict is for handling server-side configurations written by the admins owning the servers, and not ra...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'convict'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.2.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/mozilla/node-convict/security/advisories/GHSA-x2w5-725j-gf2g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22143'}, {'type': 'WEB', 'url': 'https://github.com/mozilla/node-convict/pull/384'}, {'type': 'WEB', 'url': 'https://github.com/mozilla/node-...
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-20T16:21:03Z', 'nvd_published_at': '2022-05-01T16:15:00Z'}
1.4.0
GHSA-wf98-vxv9-jqfv
2022-04-05T18:31:51Z
2022-04-05T18:31:51Z
null
[]
XSS Injection Vulnerability
### Impact Under some circumstances, the Feeds widget on the dashboard could have an XSS vulnerability if a malformed feed was supplied. ### Patches This has been patched in Craft 3.7.29. ### References * https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#3729---2022-01-18 ### For more information If you ...
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.7.29'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/craftcms/cms/security/advisories/GHSA-wf98-vxv9-jqfv'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftcms/cms'}]
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-04-05T18:31:51Z', 'nvd_published_at': None}
1.4.0
GHSA-4g29-fccr-p59w
2022-04-28T20:59:24Z
2022-04-28T20:59:24Z
null
['CVE-2022-24873']
Reflected Cross-site Scripting in Shopware storefront
### Impact Not-stored XSS in storefront. Request parameter were directly assigned to the template, so that malicious code could be send via an URL. ### Patches We recommend updating to the current version 5.7.9. You can get the update to 5.7.9 regularly via the Auto-Updater or directly via the download overview. https...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/shopware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.7.9'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/shopware/shopware/security/advisories/GHSA-4g29-fccr-p59w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24873'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-04-2022'}, {'type': 'PACKAGE', 'url...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T20:59:24Z', 'nvd_published_at': '2022-04-28T14:15:00Z'}
1.4.0
GHSA-ffjp-66mx-3qpj
2022-04-07T18:31:32Z
2022-04-06T00:01:30Z
null
['CVE-2021-27116']
Privilege escalation in beego
An issue was discovered in file profile.go. The MemProf and GetCPUProfile functions do not correctly check whether the created file exists. As a result attackers can launch attacks symlink attacks locally. Attackers can use this vulnerability to escalate privileges.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/beego/beego/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/beego/beego'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27116'}, {'type': 'WEB', 'url': 'https://github.com/beego/beego/issues/4484'}, {'type': 'PACKAGE', 'url': 'https://github.com/beego/beego'}]
{'cwe_ids': ['CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T18:31:32Z', 'nvd_published_at': '2022-04-05T16:15:00Z'}
1.4.0
GHSA-f37q-q7p2-ccfc
2022-04-26T13:05:37Z
2022-04-14T00:00:17Z
null
['CVE-2022-1337']
Resource exhaustion in Mattermost
The image proxy component in Mattermost version 6.4.1 and earlier allocates memory for multiple copies of a proxied image, which allows an authenticated attacker to crash the server via links to very large image files.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1337'}, {'type': 'PACKAGE', 'url': 'https://github.com/mattermost/mattermost-server'}, {'type': 'WEB', 'url': 'https://mattermost.com/security-updates/'}]
{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-26T13:05:37Z', 'nvd_published_at': '2022-04-13T18:15:00Z'}
1.4.0
GHSA-xm99-6pv5-q363
2023-05-24T17:39:54Z
2022-04-23T00:03:03Z
2023-05-24T17:39:14Z
['CVE-2022-29583']
Disputed: OS Command injection in github.com/kardianos/service
service_windows.go in the kardianos service package for Go omits quoting that is sometimes needed for execution of a Windows service executable from the intended directory. The validity of this vulnerability has been [questioned](https://github.com/kardianos/service/pull/290#issuecomment-1109831505) and the reporter h...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/kardianos/service'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29583'}, {'type': 'WEB', 'url': 'https://github.com/kardianos/service/issues/289'}, {'type': 'WEB', 'url': 'https://github.com/kardianos/service/pull/290'}, {'type': 'PACKAGE', 'url': 'https://github.com/kardianos/service'}]
{'cwe_ids': ['CWE-426', 'CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-26T13:15:34Z', 'nvd_published_at': '2022-04-22T16:15:00Z'}
1.4.0
GHSA-h2xh-jvpf-xq42
2023-09-18T22:28:05Z
2022-04-30T18:15:07Z
null
['CVE-2000-1211']
Zope does not properly perform security registration for legacy names
Zope 2.2.0 through 2.2.4 does not properly perform security registration for legacy names of object constructors such as DTML method objects, which could allow attackers to perform unauthorized activities.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'zope'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'last_affected': '2.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2000-1211'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20010910131909/http://www.linux-mandrake.com/en/security/2000/MDKSA-2000-083.php3'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20021227061438/http://www.iss.net/security_center/s...
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T22:28:05Z', 'nvd_published_at': '2000-12-16T05:00:00Z'}
1.4.0
GHSA-wpr6-qvcq-8269
2022-12-01T23:57:35Z
2022-04-13T00:00:17Z
null
['CVE-2022-29046']
Stored Cross-site Scripting vulnerability in Jenkins Subversion Plugin
Jenkins Subversion Plugin 2.15.3 and earlier does not escape the name and description of List Subversion tags (and more) parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. Exploitation of this vulnerability ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:subversion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.15.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29046'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/subversion-plugin'}, {'type': 'WEB', 'url': 'https://support.apple.com/kb/HT213345'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617'}, {'...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-01T23:57:35Z', 'nvd_published_at': '2022-04-12T20:15:00Z'}
1.4.0
GHSA-g94p-h263-c26q
2022-05-26T19:41:20Z
2022-04-23T00:03:01Z
null
['CVE-2022-27340']
Cross Site Request Forgery in Mingsoft MCMS
MCMS v5.2.7 contains a Cross-Site Request Forgery (CSRF) via /role/saveOrUpdateRole.do. This vulnerability allows attackers to escalate privileges and modify data.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27340'}, {'type': 'WEB', 'url': 'https://github.com/UDKI11/vul/blob/main/Mcms%E8%B7%A8%E7%AB%99%E8%AF%B7%E6%B1%82%E4%BC%AA%E9%80%A0.docx'}, {'type': 'PACKAGE', 'url': 'https://github.com/ming-soft/MCMS'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-26T13:09:39Z', 'nvd_published_at': '2022-04-22T20:15:00Z'}
1.4.0
GHSA-2gwj-7jmv-h26r
2023-09-05T19:23:06Z
2022-04-13T00:00:33Z
null
['CVE-2022-28346']
SQL Injection in Django
An issue was discovered in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. `QuerySet.annotate()`, `aggregate()`, and `extra()` methods are subject to SQL injection in column aliases via a crafted dictionary (with dictionary expansion) as the passed `**kwargs`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ecosystem_specific': {'affected_functions': ['django.db.models.QuerySet.annotate', 'django.db.models.QuerySet.aggregate', 'django.db.models.QuerySet.extra']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixed': '2.2.28'}]}]}, {'package': {'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28346'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/2044dac5c6968441be6f534c4139bcf48c5c7e48'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/2c09e68ec911919360d5f8502cefc312f9e03c5d'}, {'type': 'WEB', 'url': ...
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:33:03Z', 'nvd_published_at': '2022-04-12T05:15:00Z'}
1.4.0
GHSA-mwm4-5qwr-g9pf
2022-04-28T21:00:31Z
2022-04-28T21:00:31Z
null
[]
Keycloak is vulnerable to IDN homograph attack
A flaw was found in keycloak, where IDN homograph attacks are possible. This flaw allows a malicious user to register a name that already exists and then tricking an admin to grant extra privileges. The highest threat from this vulnerability is to integrity.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-services'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '18.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/security/advisories/GHSA-mwm4-5qwr-g9pf'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/commit/ac79fd0c23c6947a04073afc61e30d341498438e'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}]
{'cwe_ids': ['CWE-284'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T21:00:31Z', 'nvd_published_at': None}
1.4.0
GHSA-9h73-w7ch-rh73
2022-04-12T21:26:27Z
2022-04-12T21:26:27Z
null
['CVE-2018-1000883']
Header Injection
Elixir Plug Plug version All contains a Header Injection vulnerability in Connection that can result in Given a cookie value, Headers can be added. This attack appear to be exploitable via Crafting a value to be sent as a cookie. This vulnerability appears to have been fixed in >= 1.3.5 or ~> 1.2.5 or ~> 1.1.9 or ~> 1....
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Hex', 'name': 'plug'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.6'}]}]}, {'package': {'ecosystem': 'Hex', 'name': 'plug'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.9'}]}]}, {'package': {'ecosystem': 'Hex', 'nam...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000883'}, {'type': 'WEB', 'url': 'https://github.com/elixir-plug/plug/commit/8857f8ab4acf9b9c22e80480dae2636692f5f573'}, {'type': 'WEB', 'url': 'https://github.com/dependabot/elixir-security-advisories/blob/master/packages/plug/2017-04-17.yml'}, {...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-12T21:26:27Z', 'nvd_published_at': None}
1.4.0
GHSA-w98m-2xqg-9cvj
2022-04-12T19:36:39Z
2022-04-12T19:36:39Z
null
['CVE-2020-15150']
Remote Code Execution in paginator
There is a vulnerability in Paginator which makes it susceptible to Remote Code Execution (RCE) attacks via input parameters to the `paginate()` function. ### Impact There is a vulnerability in Paginator which makes it susceptible to Remote Code Execution (RCE) attacks via input parameters to the `paginate()` function...
[]
[{'package': {'ecosystem': 'Hex', 'name': 'paginator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/duffelhq/paginator/security/advisories/GHSA-w98m-2xqg-9cvj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15150'}, {'type': 'WEB', 'url': 'https://github.com/duffelhq/paginator/commit/bf45e92602e517c75aea0465efc35cd661d9ebf8'}, {'type': 'PACKAGE', '...
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-12T19:36:39Z', 'nvd_published_at': '2020-09-01T17:15:00Z'}
1.4.0
GHSA-f6p5-76fp-m248
2022-04-28T21:09:54Z
2022-04-28T21:09:54Z
null
[]
URL Rewrite vulnerability in multiple zendframework components
zend-diactoros (and, by extension, Expressive), zend-http (and, by extension, Zend Framework MVC projects), and zend-feed (specifically, its PubSubHubbub sub-component) each contain a potential URL rewrite exploit. In each case, marshaling a request URI includes logic that introspects HTTP request headers that are spec...
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'zendframework/zend-diactoros'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'zendframework/zend-feed'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': ...
[{'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/zendframework/zend-diactoros/ZF2018-01.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/zendframework/zend-feed/ZF2018-01.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPH...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T21:09:54Z', 'nvd_published_at': None}
1.4.0
GHSA-hf55-c445-2w97
2022-04-15T16:57:07Z
2022-04-03T00:01:00Z
null
['CVE-2022-21830']
Cross-site Scripting in @rocket.chat/livechat
A blind self XSS vulnerability exists in RocketChat LiveChat versions lower than 1.9 that could allow an attacker to trick a victim pasting malicious code in their chat instance.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@rocket.chat/livechat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21830'}, {'type': 'WEB', 'url': 'https://github.com/RocketChat/Rocket.Chat.Livechat/pull/558'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1091118'}, {'type': 'PACKAGE', 'url': 'https://github.com/RocketChat/Rocket.Chat.Livechat'}, {'typ...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-05T17:57:47Z', 'nvd_published_at': '2022-04-01T23:15:00Z'}
1.4.0
GHSA-p3w3-4ppm-c3f6
2022-04-29T21:02:47Z
2022-04-29T00:00:23Z
null
['CVE-2022-1514']
Cross site scripting in FacturaScripts
FacturaScripts prior to version 2022.06 is vulnerable to stored cross-site scripting via upload plugin functionality in zip format.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'facturascripts/facturascripts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2022.06'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1514'}, {'type': 'WEB', 'url': 'https://github.com/neorazorx/facturascripts/commit/aa9f28cb86467468f43486b77ddef7ff4d3c687e'}, {'type': 'PACKAGE', 'url': 'https://github.com/NeoRazorX/facturascripts'}, {'type': 'WEB', 'url': 'https://huntr.dev/boun...
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-29T21:02:47Z', 'nvd_published_at': '2022-04-28T16:15:00Z'}
1.4.0
GHSA-28r6-jm5h-mrgg
2022-04-07T18:13:46Z
2022-04-06T00:01:30Z
null
['CVE-2021-30080']
Access control bypass in Beego
An issue was discovered in the route lookup process in beego through 2.0.1, allows attackers to bypass access control.
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/beego/beego/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/beego/beego'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.12....
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-30080'}, {'type': 'WEB', 'url': 'https://github.com/beego/beego/pull/4459'}, {'type': 'WEB', 'url': 'https://github.com/beego/beego/commit/d5df5e470d0a8ed291930ae802fd7e6b95226519'}, {'type': 'PACKAGE', 'url': 'https://github.com/beego/beego'}, {'t...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T18:13:46Z', 'nvd_published_at': '2022-04-05T16:15:00Z'}
1.4.0
GHSA-r9w3-g83q-m6hq
2022-04-13T16:28:10Z
2022-04-01T17:26:03Z
null
['CVE-2022-24802']
Prototype Pollution in deepmerge-ts
deepmerge-ts is used to merge 2 or more objects respecting type information. deepmerge-ts is vulnerable to Prototype Pollution via file deepmerge.ts, function defaultMergeRecords(). A fix was released in version 4.0.2. Currently, there is no known workaround.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'deepmerge-ts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/RebeccaStevens/deepmerge-ts/security/advisories/GHSA-r9w3-g83q-m6hq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24802'}, {'type': 'WEB', 'url': 'https://github.com/RebeccaStevens/deepmerge-ts/commit/b39f1a93d9e1c3541bd2fe159fd696a16dbe1c72'}, {'t...
{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T17:26:03Z', 'nvd_published_at': '2022-04-01T00:15:00Z'}
1.4.0
GHSA-7627-mp87-jf6q
2022-04-04T21:58:52Z
2022-04-02T00:00:13Z
null
['CVE-2022-24440']
Command injection in cocoapods-downloader
The package cocoapods-downloader before 1.6.0, from 1.6.2 and before 1.6.3 are vulnerable to Command Injection via git argument injection. When calling the Pod::Downloader.preprocess_options function and using git, both the git and branch parameters are passed to the git ls-remote subcommand in a way that additional fl...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'cocoapods-downloader'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'cocoapods-downloader'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.2'}, {'fixed': '1.6.3'}]...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24440'}, {'type': 'WEB', 'url': 'https://github.com/CocoaPods/cocoapods-downloader/pull/124'}, {'type': 'WEB', 'url': 'https://github.com/CocoaPods/cocoapods-downloader/pull/128'}, {'type': 'WEB', 'url': 'https://github.com/CocoaPods/cocoapods-down...
{'cwe_ids': ['CWE-74', 'CWE-88'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-04T21:58:52Z', 'nvd_published_at': '2022-04-01T18:15:00Z'}
1.4.0
GHSA-8m5h-hrqm-pxm2
2022-04-27T21:09:43Z
2022-04-27T21:09:43Z
null
['CVE-2022-23457']
Path traversal in the OWASP Enterprise Security API
### Impact The default implementation of `Validator.getValidDirectoryPath(String, String, File, boolean)` may incorrectly treat the tested input string as a child of the specified parent directory. This potentially could allow control-flow bypass checks to be defeated if an attack can specify the entire string represen...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.owasp.esapi:esapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.3.1'}}]
[{'type': 'WEB', 'url': 'https://github.com/ESAPI/esapi-java-legacy/security/advisories/GHSA-8m5h-hrqm-pxm2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23457'}, {'type': 'WEB', 'url': 'https://github.com/ESAPI/esapi-java-legacy/commit/a0d67b75593878b1b6e39e2acc1773b3effedb2a'}, {'type': 'P...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-27T21:09:43Z', 'nvd_published_at': '2022-04-25T20:15:00Z'}
1.4.0
GHSA-9hgc-wpc5-v8p9
2022-05-26T19:40:11Z
2022-04-30T00:00:37Z
null
['CVE-2022-1530']
An attacker can execute malicious javascript in Live Helper Chat
Cross-site Scripting (XSS) in GitHub repository livehelperchat/livehelperchat prior to 3.99v. Attacker can execute malicious javascript on application.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.99'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1530'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/edef7a8387be718d0de2dfd1e722789afb0461bc'}, {'type': 'PACKAGE', 'url': 'https://github.com/livehelperchat/livehelperchat'}, {'type': 'WEB', 'url': 'https://hunt...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-03T20:49:15Z', 'nvd_published_at': '2022-04-29T09:15:00Z'}
1.4.0
GHSA-gp7c-xmmm-7pqr
2022-12-02T21:29:59Z
2022-04-13T00:00:18Z
null
['CVE-2022-29038']
Stored Cross-site Scripting vulnerabilities in Jenkins Extended Choice Parameter Plugin
Jenkins Extended Choice Parameter Plugin 346.vd87693c5a_86c and earlier does not escape the name and description of Extended Choice parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:extended-choice-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '346.vd87693c5a'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29038'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/extended-choice-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2617'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T21:29:59Z', 'nvd_published_at': '2022-04-12T20:15:00Z'}
1.4.0
GHSA-hhr9-7xvh-8xgc
2022-04-19T17:55:45Z
2022-04-06T00:01:32Z
null
['CVE-2022-1213']
Server side request forgery in LiveHelperChat
SSRF filter bypass port 80, 433 in LiveHelperChat prior to v3.67. An attacker could make the application perform arbitrary requests, bypass CVE-2022-1191
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.67'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1213'}, {'type': 'WEB', 'url': 'https://github.com/LiveHelperChat/livehelperchat/issues/1752'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/abc9599ee7aded466ca216741dcaea533c908111'}, {'type': 'PACKAGE', 'url': '...
{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T15:44:18Z', 'nvd_published_at': '2022-04-05T04:15:00Z'}
1.4.0
GHSA-gx8x-g87m-h5q6
2022-04-11T21:38:11Z
2022-04-11T21:38:11Z
null
[]
Denial of Service (DoS) in Nokogiri on JRuby
## Summary Nokogiri `v1.13.4` updates the vendored `org.cyberneko.html` library to `1.9.22.noko2` which addresses [CVE-2022-24839](https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv). That CVE is rated 7.5 (High Severity). See [GHSA-9849-p7jc-9rmv](https://github.com/sparklemotion/nekoh...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-gx8x-g87m-h5q6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24839'}, {'type': 'WEB', 'url'...
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-11T21:38:11Z', 'nvd_published_at': None}
1.4.0
GHSA-8hfj-j24r-96c4
2022-04-04T21:25:48Z
2022-04-04T21:25:48Z
null
['CVE-2022-24785']
Path Traversal: 'dir/../../filename' in moment.locale
### Impact This vulnerability impacts npm (server) users of moment.js, especially if user provided locale string, eg `fr` is directly used to switch moment locale. ### Patches This problem is patched in 2.29.2, and the patch can be applied to all affected versions (from 1.0.1 up until 2.29.1, inclusive). ### Workarou...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'moment'}, 'ecosystem_specific': {'affected_functions': ['moment.locale']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.29.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Moment.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduce...
[{'type': 'WEB', 'url': 'https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24785'}, {'type': 'WEB', 'url': 'https://github.com/moment/moment/commit/4211bfc8f15746be4019bba557e29a7ba83d54c5'}, {'type': 'PACKAGE', 'url': 'htt...
{'cwe_ids': ['CWE-22', 'CWE-27'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-04T21:25:48Z', 'nvd_published_at': '2022-04-04T17:15:00Z'}
1.4.0
GHSA-69p6-wvmq-27gg
2023-07-03T23:11:16Z
2022-04-20T00:00:33Z
null
['CVE-2022-25648']
Command injection in ruby-git
The package prior to v1.11.0 is vulnerable to Command Injection via git argument injection. When calling the `fetch(remote = 'origin', opts = {})` function, the remote parameter is passed to the `git fetch` subcommand in a way such that additional flags can be set. The additional flags can be used to perform a command ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'git'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25648'}, {'type': 'WEB', 'url': 'https://github.com/ruby-git/ruby-git/pull/569'}, {'type': 'WEB', 'url': 'https://github.com/ruby-git/ruby-git/commit/291ca0946bec7164b90ad5c572ac147f512c7159'}, {'type': 'PACKAGE', 'url': 'https://github.com/ruby-gi...
{'cwe_ids': ['CWE-88'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T21:13:22Z', 'nvd_published_at': '2022-04-19T17:15:00Z'}
1.4.0
GHSA-5h7w-hmxc-99g5
2022-04-28T21:15:03Z
2022-04-19T00:00:45Z
null
['CVE-2022-1091']
Cross site scripting in safe-svg
The sanitisation step of the Safe SVG WordPress plugin before 1.9.10 can be bypassed by spoofing the content-type in the POST request to upload a file. Exploiting this vulnerability, an attacker will be able to perform the kinds of attacks that this plugin should prevent (mainly XSS, but depending on further use of upl...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'darylldoyle/safe-svg'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1091'}, {'type': 'WEB', 'url': 'https://github.com/10up/safe-svg/pull/28'}, {'type': 'WEB', 'url': 'https://github.com/10up/safe-svg/commit/00cb9a86d1bff2214714557d1901ec3896564e50'}, {'type': 'PACKAGE', 'url': 'https://github.com/10up/safe-svg'}, ...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T21:15:03Z', 'nvd_published_at': '2022-04-18T18:15:00Z'}
1.4.0
GHSA-7gc6-qh9x-w6h8
2022-04-28T20:45:25Z
2022-04-17T00:00:32Z
null
['CVE-2022-1365']
Incorrect Authorization in cross-fetch
When fetching a remote url with Cookie if it get Location response header then it will follow that url and try to fetch that url with provided cookie . So cookie is leaked here to thirdparty. Ex: you try to fetch example.com with cookie and if it get redirect url to attacker.com then it fetch that redirect url with pro...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'cross-fetch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.5'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'cross-fetch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1365'}, {'type': 'WEB', 'url': 'https://github.com/lquixada/cross-fetch/pull/135'}, {'type': 'WEB', 'url': 'https://github.com/lquixada/cross-fetch/commit/a3b3a9481091ddd06b8f83784ba9c4e034dc912a'}, {'type': 'PACKAGE', 'url': 'https://github.com/lq...
{'cwe_ids': ['CWE-359', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T20:45:25Z', 'nvd_published_at': '2022-04-15T23:15:00Z'}
1.4.0
GHSA-rqrc-8q8f-cp9c
2022-04-08T18:11:51Z
2022-04-08T18:11:51Z
null
['CVE-2020-1469']
Infinite loop in .Net Bond
A denial of service vulnerability exists when the .NET implementation of Bond improperly parses input, aka 'Bond Denial of Service Vulnerability'. Handling of large container lengths that could cause an infinite loop when deserializing some payloads.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Bond.Core.CSharp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '9.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1469'}, {'type': 'WEB', 'url': 'https://github.com/microsoft/bond/commit/3afea822c42dd0095fedb9e7db9ebb99165e7343'}, {'type': 'WEB', 'url': 'https://github.com/microsoft/bond/commit/b0fd4a15a7cae946dd2855122559ca59cc34dbea'}, {'type': 'PACKAGE', 'u...
{'cwe_ids': ['CWE-434', 'CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-08T18:11:51Z', 'nvd_published_at': None}
1.4.0
GHSA-5v4m-c73v-c7gq
2022-04-12T21:23:43Z
2022-04-12T21:23:43Z
null
['CVE-2017-1000053']
Arbitrary Code Execution in Cookie Serialization
The default serialization used by Plug session may result in code execution in certain situations. Keep in mind, however, the session cookie is signed and this attack can only be exploited if the attacker has access to your secret key as well as your signing/encryption salts. We recommend users to change their ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Hex', 'name': 'plug'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'Hex', 'name': 'plug'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.7'}]}]}, {'package': {'ecosystem': 'Hex', 'nam...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000053'}, {'type': 'WEB', 'url': 'https://elixirforum.com/t/security-releases-for-plug/3913'}, {'type': 'PACKAGE', 'url': 'https://github.com/elixir-plug/plug'}]
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-12T21:23:43Z', 'nvd_published_at': None}
1.4.0
GHSA-pfv6-prqm-85q8
2022-04-22T20:50:33Z
2022-04-16T00:00:26Z
null
['CVE-2022-24279']
Prototype Pollution in madlib-object-utils
The package madlib-object-utils before version 0.1.8 is vulnerable to Prototype Pollution via the `setValue` method, as it allows an attacker to merge object prototypes into it. *Note:* This vulnerability derives from an incomplete fix of [CVE-2020-7701](https://security.snyk.io/vuln/SNYK-JS-MADLIBOBJECTUTILS-598676)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'madlib-object-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24279'}, {'type': 'WEB', 'url': 'https://github.com/Qwerios/madlib-object-utils/commit/8d5d54c11c8fb9a7980a99778329acd13e3ef98f'}, {'type': 'PACKAGE', 'url': 'https://github.com/Qwerios/madlib-object-utils'}, {'type': 'WEB', 'url': 'https://snyk.io...
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:50:33Z', 'nvd_published_at': '2022-04-15T20:15:00Z'}
1.4.0
GHSA-3xpw-vhmv-cw7h
2022-04-27T14:35:56Z
2022-04-26T00:00:35Z
null
['CVE-2022-25866']
Command injection in czproject/git-php
The package czproject/git-php before 4.0.3 are vulnerable to Command Injection via git argument injection. When calling the isRemoteUrlReadable($url, array $refs = NULL) function, both the url and refs parameters are passed to the git ls-remote subcommand in a way that additional flags can be set. The additional flags ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'czproject/git-php'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25866'}, {'type': 'WEB', 'url': 'https://github.com/czproject/git-php/commit/5e82d5479da5f16d37a915de4ec55e1ac78de733'}, {'type': 'PACKAGE', 'url': 'https://github.com/czproject/git-php'}, {'type': 'WEB', 'url': 'https://github.com/czproject/git-ph...
{'cwe_ids': ['CWE-74', 'CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-27T14:35:56Z', 'nvd_published_at': '2022-04-25T17:15:00Z'}
1.4.0
GHSA-v6gp-9mmm-c6p5
2022-04-11T21:21:28Z
2022-04-11T21:21:28Z
null
[]
Out-of-bounds Write in zlib affects Nokogiri
## Summary Nokogiri v1.13.4 updates the vendored zlib from 1.2.11 to 1.2.12, which addresses [CVE-2018-25032](https://nvd.nist.gov/vuln/detail/CVE-2018-25032). That CVE is scored as CVSS 7.4 "High" on the NVD record as of 2022-04-05. Please note that this advisory only applies to the CRuby implementation of Nokogiri ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25032'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jc36-42cf-vqwj'}, {'type': 'PACKAGE', 'url': 'https://github.com/s...
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-11T21:21:28Z', 'nvd_published_at': None}
1.4.0
GHSA-ch3h-j2vf-95pv
2023-06-07T15:35:54Z
2022-04-27T22:32:49Z
null
['CVE-2022-27777']
XSS Vulnerability in Action View tag helpers
There is a possible XSS vulnerability in Action View tag helpers. Passing untrusted input as hash keys can lead to a possible XSS vulnerability. This vulnerability has been assigned the CVE identifier CVE-2022-27777. Versions Affected: ALL Not affected: NONE Fixed Versions: 7.0.2.4, 6.1.5.1, 6.0.4.8, 5.2.7....
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.7.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.7.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM',...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27777'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/649516ce0feb699ae06a8c5e81df75d460cc9a85'}, {'type': 'WEB', 'url': 'https://discuss.rubyonrails.org/t/cve-2022-27777-possible-xss-vulnerability-in-action-view-tag-helpers/80534'...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-27T22:32:49Z', 'nvd_published_at': '2022-05-26T17:15:00Z'}
1.4.0
GHSA-j739-gw6q-f4c7
2022-04-22T20:41:49Z
2022-04-14T00:00:19Z
null
['CVE-2020-29653']
HTML Injection in Froxlor
Froxlor through 0.10.22 does not perform validation on user input passed in the customermail GET parameter. The value of this parameter is reflected in the login webpage, allowing the injection of arbitrary HTML tags. Note: Froxlor version 0.10.22 introduces AntiXSS cross-site scripting protection, but AntiXSS only pr...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'froxlor/froxlor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.10.22'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-29653'}, {'type': 'WEB', 'url': 'https://github.com/Froxlor/Froxlor/commit/6bf5eccc2477257b6c1760a3c3784ae7e0554ce0'}, {'type': 'PACKAGE', 'url': 'https://github.com/Froxlor/Froxlor'}, {'type': 'WEB', 'url': 'https://github.com/Froxlor/Froxlor/secu...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:41:49Z', 'nvd_published_at': '2022-04-13T13:15:00Z'}
1.4.0
GHSA-6p96-vfrc-fv32
2023-07-07T19:13:30Z
2022-04-12T00:00:34Z
null
['CVE-2022-27115']
RCE in Studio-42 elFinder on Windows before 2.1.61
In Studio-42 elFinder 2.1.60, there is a vulnerability that causes remote code execution through file name bypass for file upload.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'studio-42/elfinder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.61'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27115'}, {'type': 'WEB', 'url': 'https://github.com/Studio-42/elFinder/issues/3458'}, {'type': 'WEB', 'url': 'https://github.com/Studio-42/elFinder/commit/69be51eea5b484822a29ddd40f1b72845954ba60'}]
{'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T19:13:30Z', 'nvd_published_at': '2022-04-11T15:15:00Z'}
1.4.0
GHSA-c4r5-xvgw-2942
2023-09-25T11:33:41Z
2022-04-19T00:00:50Z
null
['CVE-2021-3503']
Metrics exposure in Wildfly
A flaw was found in Wildfly where insufficient RBAC restrictions may lead to expose metrics data.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.wildfly:wildfly-metrics'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '23.0.1.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 23.0.0.Final'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3503'}, {'type': 'WEB', 'url': 'https://github.com/wildfly/wildfly/pull/14136'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2021-3503'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1942693'}, {'type':...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-28T21:16:02Z', 'nvd_published_at': '2022-04-18T17:15:00Z'}
1.4.0
GHSA-5cmw-fhq9-8fhh
2022-04-12T18:10:00Z
2022-04-01T00:00:40Z
null
['CVE-2022-1176']
Type Confusion in LiveHelperChat
Live Helper Chat provides live support for your website. Loose comparison causes IDOR on multiple endpoints in LiveHelperChat prior to 3.96. There is a fix released in versions 3.96 and 3.97. Currently, there is no known workaround.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.96'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1176'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/72c0df160bfe9838c618652facef29af99392ce3'}, {'type': 'PACKAGE', 'url': 'https://github.com/livehelperchat/livehelperchat'}, {'type': 'WEB', 'url': 'https://hunt...
{'cwe_ids': ['CWE-843'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T19:41:31Z', 'nvd_published_at': '2022-03-31T10:15:00Z'}
1.4.0
GHSA-gprh-7767-cw39
2022-04-22T20:18:24Z
2022-04-12T00:00:34Z
null
['CVE-2021-40219']
Code Injection in Bolt CMS
Bolt CMS <= 4.2 is vulnerable to Remote Code Execution. Unsafe theme rendering allows an authenticated attacker to edit theme to inject server-side template injection that leads to remote code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'bolt/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40219'}, {'type': 'PACKAGE', 'url': 'https://github.com/bolt/core'}, {'type': 'WEB', 'url': 'https://github.com/bolt/core/blob/3b21a73ebf519b76756d3ad2841312d10ef11461/src/Controller/Frontend/TemplateController.php'}, {'type': 'WEB', 'url': 'https:...
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:18:24Z', 'nvd_published_at': '2022-04-11T17:15:00Z'}
1.4.0
GHSA-p5rr-q5g6-gm42
2023-09-18T22:57:43Z
2022-04-29T03:01:19Z
null
['CVE-2004-2381']
Jetty HTTP Server Denial of Service vulnerability
HttpRequest.java in Jetty HTTP Server before 4.2.19 allows remote attackers to cause denial of service (memory usage and application crash) via HTTP requests with a large Content-Length.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.mortbay.jetty:jetty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.19'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2004-2381'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/15537'}, {'type': 'WEB', 'url': 'http://cvs.sourceforge.net/viewcvs.py/jetty/Jetty/src/org/mortbay/http/HttpRequest.java?r1=1.75&r2=1.76'}, {'type': 'WEB', 'url': ...
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T22:57:43Z', 'nvd_published_at': '2004-12-31T05:00:00Z'}
1.4.0
GHSA-64fq-9c6w-rq44
2022-04-22T20:21:47Z
2022-04-09T00:00:25Z
null
['CVE-2021-43515']
Improper Neutralization of Formula Elements in a CSV File in Kimai 2
A CSV Injection vulnerablity exists in Kimai Kimai 2 prior to 1.14.1 via a description in a new timesheet.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'kevinpapst/kimai2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.14.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43515'}, {'type': 'WEB', 'url': 'https://github.com/kevinpapst/kimai2/pull/2532'}, {'type': 'WEB', 'url': 'https://github.com/kevinpapst/kimai2/commit/dad1b8b772947f1596175add1b4f33b791705507#diff-6774f5865dbaf8bc6c55b75bd92e6f9950ebe7834aa2efd828a...
{'cwe_ids': ['CWE-1236'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:21:47Z', 'nvd_published_at': '2022-04-08T17:15:00Z'}
1.4.0
GHSA-g397-v4w5-4m79
2022-04-04T21:57:37Z
2022-04-02T00:00:13Z
null
['CVE-2022-21223']
Command injection in cocoapods-downloader
The package cocoapods-downloader before 1.6.2 are vulnerable to Command Injection via hg argument injection. When calling the download function (when using hg), the url (and/or revision, tag, branch) is passed to the hg clone command in a way that additional flags can be set. The additional flags can be used to perform...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'cocoapods-downloader'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21223'}, {'type': 'WEB', 'url': 'https://github.com/CocoaPods/cocoapods-downloader/pull/127'}, {'type': 'PACKAGE', 'url': 'https://github.com/CocoaPods/cocoapods-downloader'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob...
{'cwe_ids': ['CWE-74', 'CWE-88'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-04T21:57:37Z', 'nvd_published_at': '2022-04-01T18:15:00Z'}
1.4.0
GHSA-c2cp-3xj9-97w9
2022-05-04T03:52:42Z
2022-04-22T00:00:33Z
null
['CVE-2022-22969']
Denial of service in Spring Security OAuth
Spring Security OAuth versions 2.5.x prior to 2.5.2 and older unsupported versions are susceptible to a Denial-of-Service (DoS) attack via the initiation of the Authorization Request in an OAuth 2.0 Client application. A malicious user or attacker can send multiple requests initiating the Authorization Request for the ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security.oauth:spring-security-oauth-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.2.RELEASE'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.5.1.RELEASE'}}, {'package': {'ecosystem': '...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22969'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2022-22969'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-26T13:01:06Z', 'nvd_published_at': '2022-04-21T19:15:00Z'}
1.4.0
GHSA-2v7p-f4qm-r5pc
2022-05-03T21:01:41Z
2022-04-23T00:03:03Z
null
['CVE-2022-1429']
SQL Injection found in Pimcore
Pimcore is an open source data & experience management platform. A SQL injection was discovered in GridHelperService.php in GitHub repository pimcore/pimcore prior to 10.3.6.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.3.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1429'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/523a735ab94f004459b84ffdfd3db784586bbd82'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/cfba30b4-85fa...
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-03T21:01:41Z', 'nvd_published_at': '2022-04-22T09:15:00Z'}
1.4.0
GHSA-f9wg-5f46-cjmw
2022-04-22T20:49:09Z
2022-04-22T20:49:09Z
null
['CVE-2022-24858']
NextAuth.js default redirect callback vulnerable to open redirects
`next-auth` v3 users before version 3.29.2 are impacted. (We recommend upgrading to v4 in most cases. See our [migration guide](https://next-auth.js.org/getting-started/upgrade-v4)).`next-auth` v4 users before version 4.3.2 are impacted. Upgrading to 3.29.2 or 4.3.2 will patch this vulnerability. If you are not able to...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'next-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.29.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'next-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/nextauthjs/next-auth/security/advisories/GHSA-f9wg-5f46-cjmw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24858'}, {'type': 'WEB', 'url': 'https://github.com/nextauthjs/next-auth/commit/6e15bdcb2d93c1ad5ee3889f702607637e79db50'}, {'type': 'PACKAGE...
{'cwe_ids': ['CWE-290', 'CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-22T20:49:09Z', 'nvd_published_at': '2022-04-19T23:15:00Z'}
1.4.0
GHSA-q58j-fmvf-9rq6
2023-05-26T21:13:22Z
2022-04-22T00:24:28Z
null
['CVE-2011-1497']
Cross site scripting in actionpack Rubygem
A cross-site scripting vulnerability flaw was found in the `auto_link` function in Rails before version 3.0.6.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-1497'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/61ee3449674c591747db95f9b3472c5c3bd9e84d'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/blob/38df020c95be...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:31:04Z', 'nvd_published_at': '2021-10-19T14:15:00Z'}
1.4.0
GHSA-xxx9-3xcr-gjj3
2022-04-11T21:30:00Z
2022-04-11T21:30:00Z
null
[]
XML Injection in Xerces Java affects Nokogiri
## Summary Nokogiri v1.13.4 updates the vendored `xerces:xercesImpl` from 2.12.0 to 2.12.2, which addresses [CVE-2022-23437](https://nvd.nist.gov/vuln/detail/CVE-2022-23437). That CVE is scored as CVSS 6.5 "Medium" on the NVD record. Please note that this advisory only applies to the **JRuby** implementation of Nokog...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-xxx9-3xcr-gjj3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23437'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h65f-jvqw-m9fj'}, {'type': 'PACKAGE', 'url': 'https://github.com/s...
{'cwe_ids': ['CWE-91'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-11T21:30:00Z', 'nvd_published_at': None}
1.4.0
GHSA-ghcq-472w-vf4h
2022-04-08T21:59:04Z
2022-04-08T21:59:04Z
null
['CVE-2022-24821']
Incorrect Use of Privileged APIs in org.xwiki.platform.skin.skinx
### Impact Simple users can create global SSX/JSX without specific rights: in theory only users with Programming Rights should be allowed to create SSX or JSX that are executed everywhere on a wiki. But a bug allow anyone with edit rights to actually create those. ### Patches This issue has been patched in XWiki 13....
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-skin-skinx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '13.5.0'}, {'fixed': '13.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-skin-skinx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events'...
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-ghcq-472w-vf4h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24821'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-1...
{'cwe_ids': ['CWE-648'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-08T21:59:04Z', 'nvd_published_at': '2022-04-08T19:15:00Z'}
1.4.0
GHSA-w5m2-299g-rff5
2022-04-26T12:59:00Z
2022-04-26T12:59:00Z
null
['CVE-2022-28820']
Page Compare Reflected Cross-site Scripting (XSS) vulnerability
### Impact ACS Commons version 5.1.x (and earlier) suffers from a Reflected Cross-site Scripting (XSS) vulnerability in `/apps/acs-commons/content/page-compare.html` endpoint via the `a` and `b` GET parameters. User input submitted via these parameters is not validated or sanitized. An attacker must provide a link to...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.adobe.acs:acs-aem-commons'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Adobe-Consulting-Services/acs-aem-commons/security/advisories/GHSA-w5m2-299g-rff5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28820'}, {'type': 'PACKAGE', 'url': 'https://github.com/Adobe-Consulting-Services/acs-aem-commons'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-26T12:59:00Z', 'nvd_published_at': '2022-04-21T19:15:00Z'}