Dataset Viewer
Auto-converted to Parquet Duplicate
schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
nulllengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
20
140
details
stringlengths
56
37.2k
severity
stringlengths
2
92
affected
stringlengths
88
7.07k
references
stringlengths
139
4.72k
database_specific
stringlengths
131
185
1.4.0
GHSA-257q-pv89-v3xv
2023-07-07T15:07:56Z
2023-06-26T21:30:58Z
null
['CVE-2020-23064']
jQuery Cross Site Scripting vulnerability
Cross Site Scripting vulnerability in jQuery v.2.2.0 until v.3.5.0 allows a remote attacker to execute arbitrary code via the `<options>` element.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'jquery'}, 'ecosystem_specific': {'affected_functions': ['jquery.htmlPrefilter']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.3'}, {'fixed': '3.5.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'jQuery'}, 'ecosystem_specific': {'affected_functions': [''...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-23064'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery/commit/1d61fd9407e6fbe82fe55cb0b938307aa0791f77'}, {'type': 'WEB', 'url': 'https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/'}, {'type': 'PACKAGE', 'url': 'https://github.com...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T15:07:56Z', 'nvd_published_at': None}
1.4.0
GHSA-gx4r-fvwg-8678
2023-06-06T02:07:41Z
2023-06-05T18:30:27Z
null
['CVE-2023-3109']
Admidio vulnerable to Cross-site Scripting
Cross-site Scripting (XSS) - Stored in GitHub repository admidio/admidio prior to 4.2.8.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'admidio/admidio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3109'}, {'type': 'WEB', 'url': 'https://github.com/admidio/admidio/commit/a7c211b835cafe1158932fbfcff9e5552e57510a'}, {'type': 'PACKAGE', 'url': 'https://github.com/admidio/admidio'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/6fa6070e-8f7f...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T02:07:41Z', 'nvd_published_at': None}
1.4.0
GHSA-3g7p-8qhx-mc8r
2023-06-26T16:35:03Z
2023-06-22T20:01:39Z
null
['CVE-2023-35931']
Shescape potential environment variable exposure on Windows with CMD
### Impact This impact users of Shescape: 1. On Windows using the Windows Command Prompt (i.e. `cmd.exe`), and 2. Using `quote`/`quoteAll` or `escape`/`escapeAll` with the `interpolation` option set to `true`. An attacker may be able to get read-only access to environment variables. Example: ```javascript import * ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'shescape'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ericcornelissen/shescape/security/advisories/GHSA-3g7p-8qhx-mc8r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35931'}, {'type': 'WEB', 'url': 'https://github.com/ericcornelissen/shescape/pull/982'}, {'type': 'WEB', 'url': 'https://github.com/ericc...
{'cwe_ids': ['CWE-526'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-22T20:01:39Z', 'nvd_published_at': None}
1.4.0
GHSA-mppv-79ch-vw6q
2023-06-30T19:56:21Z
2023-06-21T12:30:19Z
null
['CVE-2023-34981']
Apache Tomcat vulnerable to information leak
A regression in the fix for bug 66512 in Apache Tomcat 11.0.0-M5, 10.1.8, 9.0.74 and 8.5.88 meant that, if a response did not include any HTTP headers no AJP SEND_HEADERS messare woudl be sent for the response which in turn meant that at least one AJP proxy (mod_proxy_ajp) would use the response headers from the previo...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0-M5'}, {'fixed': '11.0.0-M6'}]}], 'versions': ['11.0.0-M5']}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'i...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34981'}, {'type': 'WEB', 'url': 'https://bz.apache.org/bugzilla/show_bug.cgi?id=66512'}, {'type': 'WEB', 'url': 'https://bz.apache.org/bugzilla/show_bug.cgi?id=66591'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB',...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-21T22:06:39Z', 'nvd_published_at': None}
1.4.0
GHSA-jhpr-j7cq-3jp3
2023-06-22T19:59:03Z
2023-06-22T19:59:03Z
null
['CVE-2023-34110']
Flask-AppBuilder vulnerable to possible disclosure of sensitive information on user error
### Impact An authenticated malicious actor with Admin privileges, could by adding a special character on the add, edit User forms trigger a database error, this error is surfaced back to this actor on the UI. On certain database engines this error can include the entire user row including the pbkdf2:sha256 hashed pass...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Flask-AppBuilder'}, 'ecosystem_specific': {'affected_functions': ['flask_appbuilder.models.sqla.interface.SQLAInterface.add', 'flask_appbuilder.models.sqla.interface.SQLAInterface.edit', 'flask_appbuilder.models.sqla.interface.SQLAInterface.delete', 'flask_appbuilder.models.s...
[{'type': 'WEB', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder/security/advisories/GHSA-jhpr-j7cq-3jp3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34110'}, {'type': 'WEB', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder/pull/2045'}, {'type': 'WEB', 'url': 'https://github.com/dp...
{'cwe_ids': ['CWE-209'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-22T19:59:03Z', 'nvd_published_at': None}
1.4.0
GHSA-c2pj-v37r-2p6h
2023-08-25T21:35:14Z
2023-06-26T15:48:33Z
null
['CVE-2023-40586']
Coraza has potential denial of service vulnerability
### Summary Due to the misuse of `log.Fatalf`, the application using coraza crashed after receiving crafted requests from attackers. ### Details https://github.com/corazawaf/coraza/blob/82157f85f24c6107667bf0f686b71a72aafdf8a5/internal/bodyprocessors/multipart.go#L26-L29 The bodyprocessors of multipart uses `log.Fat...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/corazawaf/coraza/v3'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/corazawaf/coraza/v2'}, 'ecosystem_specific': {'...
[{'type': 'WEB', 'url': 'https://github.com/corazawaf/coraza/security/advisories/GHSA-c2pj-v37r-2p6h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40586'}, {'type': 'WEB', 'url': 'https://github.com/corazawaf/coraza-caddy/issues/48'}, {'type': 'WEB', 'url': 'https://github.com/corazawaf/cora...
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-26T15:48:33Z', 'nvd_published_at': None}
1.4.0
GHSA-q2fp-jw87-86px
2023-06-30T20:18:57Z
2023-06-22T12:30:14Z
null
['CVE-2023-29931']
laravel-s vulnerable to Local File Inclusion
laravel-s prior to 3.7.36 is vulnerable to Local File Inclusion via `/src/Illuminate/Laravel.php`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'hhxsv5/laravel-s'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.7.36'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29931'}, {'type': 'WEB', 'url': 'https://github.com/hhxsv5/laravel-s/issues/437'}, {'type': 'WEB', 'url': 'https://github.com/hhxsv5/laravel-s/commit/05aa615527725f0b696da78ae4c7d3a5065bac6d'}, {'type': 'PACKAGE', 'url': 'https://github.com/hhxsv5/...
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-22T20:00:46Z', 'nvd_published_at': None}
1.4.0
GHSA-hhqm-f4m4-pq39
2023-07-03T18:38:17Z
2023-06-23T12:30:18Z
null
['CVE-2023-30260']
RaspAP raspap-webgui Command Injection vulnerability
Command injection vulnerability in RaspAP raspap-webgui 2.8.8 and earlier allows remote attackers to run arbitrary commands via crafted POST request to hostapd settings form.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'billz/raspap-webgui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30260'}, {'type': 'WEB', 'url': 'https://github.com/RaspAP/raspap-webgui/pull/1322'}, {'type': 'WEB', 'url': 'https://github.com/RaspAP/raspap-webgui/commit/238e1670fcef8b18ec4628ee74fc345607536a16'}, {'type': 'WEB', 'url': 'https://eldstal.se/advi...
{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-23T21:44:57Z', 'nvd_published_at': None}
1.4.0
GHSA-mm87-c3x2-6f89
2023-07-06T21:39:56Z
2023-06-29T12:30:24Z
null
['CVE-2023-22886']
Apache Airflow JDBC Provider Improper Input Validation vulnerability
Improper Input Validation vulnerability in Apache Software Foundation Apache Airflow JDBC Provider. Airflow JDBC Provider Connection’s [Connection URL] parameters had no restrictions, which made it possible to implement RCE attacks via different type JDBC drivers, obtain airflow server permission. This issue affects Ap...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow-providers-jdbc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22886'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/ynbjwp4n0vzql0xzhog1gkp1ovncf8j3'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:40:04Z', 'nvd_published_at': None}
1.4.0
GHSA-h53w-7qw7-vh5c
2023-06-09T22:53:51Z
2023-06-09T22:53:51Z
null
['CVE-2023-34232']
Snowflake NodeJS Driver vulnerable to Command Injection
### Issue Snowflake was informed via our bug bounty program of a command injection vulnerability in the Snowflake NodeJS driver via SSO browser URL authentication. ### Impacted driver package: snowflake-connector-nodejs ### Impacted version range: before [Version 1.6.21](https://community.snowflake.com/s/article/No...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'snowflake-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.21'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/snowflakedb/snowflake-connector-nodejs/security/advisories/GHSA-h53w-7qw7-vh5c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34232'}, {'type': 'WEB', 'url': 'https://github.com/snowflakedb/snowflake-connector-nodejs/pull/465'}, {'type': 'WEB', 'url...
{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T22:53:51Z', 'nvd_published_at': None}
1.4.0
GHSA-qvxg-wjxc-r4gg
2023-06-07T16:11:16Z
2023-06-07T16:11:16Z
null
['CVE-2022-31019']
Vapor vulnerable to denial of service in URLEncodedFormDecoder
Vapor is an HTTP web framework for Swift. Vapor versions earlier than 4.61.1 are vulnerable to a denial of service in the URLEncodedFormDecoder. ### Impact When using automatic content decoding, e.g. ```swift app.post("foo") { request -> String in let foo = try request.content.decode(Foo.self) return "\(foo)" } ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'purl-type:swift', 'name': 'github.com/vapor/vapor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.61.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/vapor/vapor/security/advisories/GHSA-qvxg-wjxc-r4gg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31019'}, {'type': 'WEB', 'url': 'https://github.com/vapor/vapor/commit/6c63226a4ab82ce53730eb1afb9ca63866fcf033'}, {'type': 'PACKAGE', 'url': 'https:/...
{'cwe_ids': ['CWE-120', 'CWE-121', 'CWE-674'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-07T16:11:16Z', 'nvd_published_at': '2022-06-09T13:15:00Z'}
1.4.0
GHSA-rv3x-xq3r-8j9h
2023-06-09T19:32:32Z
2023-06-09T19:32:32Z
null
['CVE-2021-37634']
LeafKit allows XSS with untrusted user input
### Impact This affects anyone passing unsanitised data to Leaf's variable tags. Before this fix, Leaf would not escape any strings passed to tags as variables. If an attacker managed to find a variable that was rendered with their unsanitised data, they could inject scripts into a generated Leaf page, which could enab...
[]
[{'package': {'ecosystem': 'purl-type:swift', 'name': 'github.com/vapor/leaf-kit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/vapor/leaf-kit/security/advisories/GHSA-rv3x-xq3r-8j9h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37634'}, {'type': 'PACKAGE', 'url': 'https://github.com/vapor/leaf-kit'}, {'type': 'WEB', 'url': 'https://github.com/vapor/leaf-kit/releases/tag/1....
{'cwe_ids': ['CWE-79', 'CWE-80'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T19:32:32Z', 'nvd_published_at': '2021-08-09T20:15:00Z'}
1.4.0
GHSA-xhg5-42rf-296r
2023-06-16T17:53:30Z
2023-06-06T16:45:29Z
null
['CVE-2023-33959']
notation-go's verification bypass can cause users to verify the wrong artifact
### Impact An attacker who controls or compromises a registry can lead a user to verify the wrong artifact. ### Patches The problem has been fixed in the release [v1.0.0-rc.6](https://github.com/notaryproject/notation-go/releases/tag/v1.0.0-rc.6). Users should upgrade their notation-go library to [v1.0.0-rc.6](https:/...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/notaryproject/notation-go'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0-rc.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/notaryproject/notation-go/security/advisories/GHSA-xhg5-42rf-296r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33959'}, {'type': 'WEB', 'url': 'https://github.com/notaryproject/notation-go/commit/39c8ed050a65cca3f3f308534acb612096735a64'}, {'type'...
{'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T16:45:29Z', 'nvd_published_at': None}
1.4.0
GHSA-hp5w-w29m-vg63
2023-06-28T16:30:49Z
2023-06-21T09:30:15Z
null
['CVE-2023-34340']
Apache Accumulo Improper Authentication vulnerability
Improper Authentication vulnerability in Apache Software Foundation Apache Accumulo. This issue affects Apache Accumulo: 2.1.0. Accumulo 2.1.0 contains a defect in the user authentication process that may succeed when invalid credentials are provided. Users are advised to upgrade to 2.1.1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.accumulo:accumulo-shell'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.1'}]}], 'versions': ['2.1.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34340'}, {'type': 'WEB', 'url': 'https://github.com/apache/accumulo/issues/3427'}, {'type': 'WEB', 'url': 'https://github.com/apache/accumulo/issues/3433'}, {'type': 'WEB', 'url': 'https://github.com/apache/accumulo/pull/3440'}, {'type': 'WEB', 'ur...
{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-21T22:06:51Z', 'nvd_published_at': None}
1.4.0
GHSA-4g42-gqrg-4633
2023-06-21T21:47:38Z
2023-06-14T09:30:42Z
null
['CVE-2023-34396']
Apache Struts vulnerable to memory exhaustion
Denial of service via out of memory (OOM) owing to no sanity limit on normal form fields in multipart forms. When a Multipart request has non-file normal form fields, Struts used to bring them into memory as Strings without checking their sizes. This could lead to an OOM if developer has set struts.multipart.maxSize to...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.31'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fi...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34396'}, {'type': 'WEB', 'url': 'https://github.com/apache/struts/commit/2d6f1bc0a6f5ac575a56784ac6461816b67c4f21'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/WW/S2-064'}, {'type': 'PACKAGE', 'url': 'https://github.com/apa...
{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T20:16:52Z', 'nvd_published_at': None}
1.4.0
GHSA-gcj9-jj38-hwmc
2023-06-09T19:31:47Z
2023-06-09T19:31:47Z
null
['CVE-2021-21328']
Vapor's Metrics integration could cause a system drain
### Impact This is a DoS attack against anyone who Bootstraps a metrics backend for their Vapor app with the following attack vector: 1. send unlimited requests against a vapor instance with different paths. this will create “unlimited” counters and timers, which will eventually drain the system. 2. downstream service...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'purl-type:swift', 'name': 'github.com/vapor/vapor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.40.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.40.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/vapor/vapor/security/advisories/GHSA-gcj9-jj38-hwmc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21328'}, {'type': 'WEB', 'url': 'https://github.com/vapor/vapor/commit/e3aa712508db2854ac0ab905696c65fd88fa7e23'}, {'type': 'PACKAGE', 'url': 'https:/...
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T19:31:47Z', 'nvd_published_at': '2021-02-26T02:15:00Z'}
1.4.0
GHSA-c2qf-rxjj-qqgw
2023-07-10T22:57:56Z
2023-06-21T06:30:28Z
null
['CVE-2022-25883']
semver vulnerable to Regular Expression Denial of Service
Versions of the package semver before 7.5.2 on the 7.x branch, before 6.3.1 on the 6.x branch, and all other versions before 5.7.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range, when untrusted user data is provided as a range.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'semver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.5.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'semver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.3.1'}]}]}, {'package': {'ecosystem': 'np...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25883'}, {'type': 'WEB', 'url': 'https://github.com/npm/node-semver/pull/564'}, {'type': 'WEB', 'url': 'https://github.com/npm/node-semver/pull/585'}, {'type': 'WEB', 'url': 'https://github.com/npm/node-semver/pull/593'}, {'type': 'WEB', 'url': 'ht...
{'cwe_ids': ['CWE-1333'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-22T16:52:56Z', 'nvd_published_at': None}
1.4.0
GHSA-c29g-q3h3-mwcf
2023-06-16T17:47:39Z
2023-06-07T21:30:18Z
null
['CVE-2023-33496']
xxl-rpc deserialization vulnerability
xxl-rpc v1.7.0 was discovered to contain a deserialization vulnerability via the component `com.xxl.rpc.core.remoting.net.impl.netty.codec.NettyDecode#decode`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.xuxueli:xxl-rpc-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.7.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33496'}, {'type': 'WEB', 'url': 'https://github.com/edirc-wong/record/blob/main/deserialization_vulnerability_report.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/xuxueli/xxl-rpc'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T22:52:46Z', 'nvd_published_at': None}
1.4.0
GHSA-vfrj-fv6p-3cpf
2023-06-06T01:38:11Z
2023-06-06T01:38:11Z
null
['CVE-2023-33965']
Brook's tproxy server is vulnerable to a drive-by command injection.
The `tproxy` server is vulnerable to a drive-by command injection. An attacker may fool a victim into visiting a malicious web page which will trigger requests to the local `tproxy` service leading to remote code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/txthinking/brook'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20230606'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/txthinking/brook/security/advisories/GHSA-vfrj-fv6p-3cpf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33965'}, {'type': 'WEB', 'url': 'https://github.com/txthinking/brook/commit/314d7070c37babf6c38a0fe1eada872bb74bf03e'}, {'type': 'PACKAGE', 'url'...
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T01:38:11Z', 'nvd_published_at': None}
1.4.0
GHSA-373w-rj84-pv6x
2023-06-29T15:02:16Z
2023-06-29T15:02:16Z
null
[]
SafeURL-Python's hostname blocklist does not block FQDNs
### Description If a hostname was blacklisted, it was possible to bypass the blacklist by requesting the FQDN of the host (e.g. adding `.` to the end). ### Impact The main purpose of this library is to block requests to internal/private IPs and these cannot be bypassed using this finding. But if a library user had spe...
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'SafeURL-Python'}, 'ecosystem_specific': {'affected_functions': ['safeurl.safeurl.Options.isInList']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/IncludeSecurity/safeurl-python/security/advisories/GHSA-373w-rj84-pv6x'}, {'type': 'WEB', 'url': 'https://github.com/IncludeSecurity/safeurl-python/pull/6'}, {'type': 'WEB', 'url': 'https://github.com/IncludeSecurity/safeurl-python/commit/c4f9677f8790a58eaa1953bac286cca75a5f5...
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-29T15:02:16Z', 'nvd_published_at': None}
1.4.0
GHSA-455c-vqrf-mghr
2023-06-23T21:37:38Z
2023-06-16T09:30:24Z
null
['CVE-2023-2783']
Mattermost Server Missing Authorization vulnerability
Mattermost Apps Framework fails to verify that a secret provided in the incoming webhook request allowing an attacker to modify the contents of the post sent by the Apps.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.10.0'}, {'fixed': '7.10.1'}]}], 'versions': ['7.10.0']}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ranges': [{'type': 'ECOSY...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2783'}, {'type': 'PACKAGE', 'url': 'https://github.com/mattermost/mattermost-server'}, {'type': 'WEB', 'url': 'https://mattermost.com/security-updates'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-23T21:37:38Z', 'nvd_published_at': None}
1.4.0
GHSA-j245-v2mh-5h6f
2023-06-09T16:53:00Z
2023-06-03T12:30:15Z
null
['CVE-2023-3086']
TeamPass vulnerable to stored Cross-site Scripting
Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.9.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'nilsteampassnet/teampass'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3086'}, {'type': 'WEB', 'url': 'https://github.com/nilsteampassnet/teampass/commit/1c0825b67eb8f8b5ecc418ff7614423a275e6a79'}, {'type': 'PACKAGE', 'url': 'https://github.com/nilsteampassnet/teampass'}, {'type': 'WEB', 'url': 'https://huntr.dev/boun...
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T02:06:02Z', 'nvd_published_at': None}
1.4.0
GHSA-97wh-6hmj-g8j9
2023-06-30T20:34:45Z
2023-06-28T15:30:23Z
null
['CVE-2023-3445']
Spina Cross-site Scripting vulnerability
Cross-site Scripting (XSS) - Stored in GitHub repository spinacms/spina prior to 2.15.1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'spina'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.15.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3445'}, {'type': 'WEB', 'url': 'https://github.com/spinacms/spina/commit/9adfe7b4807b3cc10dbb7351a26cc32f5d8c14a3'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/spina/CVE-2023-3445.yml'}, {'type': 'PACKAGE',...
{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:34:45Z', 'nvd_published_at': None}
1.4.0
GHSA-74j8-w7f9-pp62
2023-06-30T20:25:52Z
2023-06-30T20:25:52Z
null
['CVE-2023-33190']
Improper configuration of RBAC permissions obtaining cluster control permissions
### Summary Improper configuration of RBAC permissions resulted in obtaining cluster control permissions, which could control the entire cluster deployed with Sealos, as well as hundreds of pods and other resources within the cluster. ### Details detail's is disable by publish. ### PoC detail's is disable by publish....
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/labring/sealos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.1-rc4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/labring/sealos/security/advisories/GHSA-74j8-w7f9-pp62'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33190'}, {'type': 'WEB', 'url': 'https://github.com/labring/sealos/commit/4cdf52e55666864e5f90ed502e9fc13e18985b7b'}, {'type': 'PACKAGE', 'url': 'h...
{'cwe_ids': ['CWE-287', 'CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:25:52Z', 'nvd_published_at': None}
1.4.0
GHSA-j8xg-fqg3-53r7
2023-06-27T15:48:19Z
2023-06-22T06:30:18Z
null
['CVE-2023-26115']
word-wrap vulnerable to Regular Expression Denial of Service
All versions of the package word-wrap are vulnerable to Regular Expression Denial of Service (ReDoS) due to the usage of an insecure regular expression within the result variable.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'word-wrap'}, 'ecosystem_specific': {'affected_functions': ['word-wrap']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26115'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/word-wrap/commit/420dce9a2412b21881202b73a3c34f0edc53cb2e'}, {'type': 'PACKAGE', 'url': 'https://github.com/jonschlinkert/word-wrap'}, {'type': 'WEB', 'url': 'https://github.com/jons...
{'cwe_ids': ['CWE-1333'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-23T21:36:40Z', 'nvd_published_at': None}
1.4.0
GHSA-xcf7-rvmh-g6q4
2023-06-21T22:07:52Z
2023-06-21T22:07:52Z
null
[]
`openssl` `X509VerifyParamRef::set_host` buffer over-read
When this function was passed an empty string, `openssl` would attempt to call `strlen` on it, reading arbitrary memory until it reached a NUL byte.
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'openssl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.10.0'}, {'fixed': '0.10.55'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/sfackler/rust-openssl/issues/1965'}, {'type': 'WEB', 'url': 'https://github.com/sfackler/rust-openssl/pull/1968'}, {'type': 'PACKAGE', 'url': 'https://github.com/sfackler/rust-openssl'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0044.html'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-21T22:07:52Z', 'nvd_published_at': None}
1.4.0
GHSA-9q9m-c65c-37pq
2023-08-28T17:16:39Z
2023-06-05T18:30:27Z
null
['CVE-2023-33733']
Reportlab vulnerable to remote code execution
Reportlab up to and including v3.6.12 allows attackers to execute arbitrary code via supplying a crafted PDF file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'reportlab'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.13'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.6.12'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33733'}, {'type': 'WEB', 'url': 'https://github.com/c53elyas/CVE-2023-33733'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36WOY22ECJCPOXHVTNCHEWOQLL7JSWP4/'}, {'type': 'WEB...
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-28T17:16:39Z', 'nvd_published_at': None}
1.4.0
GHSA-853p-5678-hv8f
2023-06-16T17:57:43Z
2023-06-14T20:11:38Z
null
['CVE-2023-34449']
ink! vulnerable to incorrect decoding of storage value when using `DelegateCall`
### Summary The return value when using delegate call mechanics, either through [`CallBuilder::delegate`](https://docs.rs/ink_env/4.2.0/ink_env/call/struct.CallBuilder.html#method.delegate) or [`ink_env::invoke_contract_delegate`](https://docs.rs/ink_env/4.2.0/ink_env/fn.invoke_contract_delegate.html), is being decoded...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'ink'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.2.1'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'ink_env'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.2.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/paritytech/ink/security/advisories/GHSA-853p-5678-hv8f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34449'}, {'type': 'WEB', 'url': 'https://github.com/paritytech/ink/pull/1450'}, {'type': 'WEB', 'url': 'https://github.com/paritytech/ink/commit/f1...
{'cwe_ids': ['CWE-253', 'CWE-754'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T20:11:38Z', 'nvd_published_at': None}
1.4.0
GHSA-98px-6486-j7qc
2023-06-07T13:50:21Z
2023-06-06T16:41:34Z
null
['CVE-2023-32683']
Synapse has URL deny list bypass via oEmbed and image URLs when generating previews
### Impact A discovered oEmbed or image URL can bypass the `url_preview_url_blacklist` setting potentially allowing server side request forgery or bypassing network policies. Impact is limited to IP addresses allowed by the `url_preview_ip_range_blacklist` setting (by default this only allows public IPs) and by the lim...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'matrix-synapse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.85.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/security/advisories/GHSA-98px-6486-j7qc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32683'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/pull/15601'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/...
{'cwe_ids': ['CWE-863', 'CWE-918'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T16:41:34Z', 'nvd_published_at': None}
1.4.0
GHSA-j3v8-v77f-fvgm
2023-06-16T19:36:52Z
2023-06-16T19:36:52Z
null
['CVE-2023-34253']
Grav Server-side Template Injection (SSTI) via Denylist Bypass Vulnerability
Hi, actually we have sent the bug report to security@getgrav.org on 27th March 2023 and on 10th April 2023. # Grav Server-side Template Injection (SSTI) via Denylist Bypass Vulnerability ## Summary: | **Product** | Grav CMS | | ----------------------- | -----------...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'getgrav/grav'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.42'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/getgrav/grav/security/advisories/GHSA-j3v8-v77f-fvgm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34253'}, {'type': 'WEB', 'url': 'https://github.com/getgrav/grav/commit/244758d4383034fe4cd292d41e477177870b65ec'}, {'type': 'WEB', 'url': 'https://g...
{'cwe_ids': ['CWE-1336', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-16T19:36:52Z', 'nvd_published_at': None}
1.4.0
GHSA-pqr6-cmr2-h8hf
2023-06-27T21:57:08Z
2023-06-15T16:13:20Z
null
['CVE-2023-34453']
snappy-java's Integer Overflow vulnerability in shuffle leads to DoS
## Summary Due to unchecked multiplications, an integer overflow may occur, causing a fatal error. ## Impact Denial of Service ## Description The function [shuffle(int[] input)](https://github.com/xerial/snappy-java/blob/05c39b2ca9b5b7b39611529cc302d3d796329611/src/main/java/org/xerial/snappy/BitShuffle.java#L107) in t...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xerial.snappy:snappy-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.10.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.1.10.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/xerial/snappy-java/security/advisories/GHSA-pqr6-cmr2-h8hf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34453'}, {'type': 'WEB', 'url': 'https://github.com/xerial/snappy-java/commit/820e2e074c58748b41dbd547f4edba9e108ad905'}, {'type': 'PACKAGE', '...
{'cwe_ids': ['CWE-190'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-15T16:13:20Z', 'nvd_published_at': None}
1.4.0
GHSA-5w5m-pfw9-c8fp
2023-06-16T22:09:31Z
2023-06-09T22:53:14Z
null
['CVE-2023-34233']
Snowflake Python Connector vulnerable to Command Injection
### Issue Snowflake was informed via our bug bounty program of a command injection vulnerability in the Snowflake Python connector via SSO browser URL authentication. ### Impacted driver package: snowflake-connector-python ### Impacted version range: before [Version 3.0.2](https://community.snowflake.com/s/article...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'snowflake-connector-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/snowflakedb/snowflake-connector-python/security/advisories/GHSA-5w5m-pfw9-c8fp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34233'}, {'type': 'WEB', 'url': 'https://github.com/snowflakedb/snowflake-connector-python/pull/1480'}, {'type': 'WEB', 'ur...
{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T22:53:14Z', 'nvd_published_at': None}
1.4.0
GHSA-5fm9-h728-fwpj
2023-06-06T02:06:23Z
2023-06-06T02:06:23Z
null
[]
trust-dns vulnerable to Remote Attackers causing Denial-of-Service (packet loops) with crafted DNS packets
trust-dns and trust-dns-server are vulnerable to remotely triggered denial-of-service attacks, consuming both network and CPU resources. DNS messages with the QR=1 bit set are responded to with a `FormErr` response. This allows creating a traffic loop, in which these `FormErr` responses are sent nonstop between vulnera...
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'trust-dns-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.22.1'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'trust-dns-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.23.0-alpha.2'}, {'fixed': '0.23...
[{'type': 'WEB', 'url': 'https://github.com/bluejekyll/trust-dns/pull/1952'}, {'type': 'PACKAGE', 'url': 'https://github.com/bluejekyll/trust-dns'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0041.html'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T02:06:23Z', 'nvd_published_at': None}
1.4.0
GHSA-7vr7-cghh-ch63
2023-06-20T16:45:32Z
2023-06-20T16:45:32Z
null
['CVE-2023-34467']
XWiki Platform may retrieve email addresses of all users
### Impact The mail obfuscation configuration was not fully taken into account and while the mail displayed to the end user was obfuscated: - the rest response was also containing the mail unobfuscated - user were able to filter and sort on the unobfuscated (allowing to infer the mail content) The consequence was the ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-livetable-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5-milestone-1'}, {'fixed': '14.4.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-livetable-ui'}, 'ranges': [{'type': 'ECOSYS...
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-7vr7-cghh-ch63'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34467'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/71f889db9962df2d385f4298e29cfbc9050b828a#diff-5a739e5865b1f1a...
{'cwe_ids': ['CWE-402', 'CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-20T16:45:32Z', 'nvd_published_at': None}
1.4.0
GHSA-6vf2-mfmr-qqqw
2023-06-27T21:59:44Z
2023-06-20T15:31:09Z
null
['CVE-2020-21489']
Liufee CMS File Upload vulnerability
File Upload vulnerability in Liufee CMS, AKA Feehicms v.2.0.8 allows a remote attacker to execute arbitrary code via the `/admin/index.php?r=admin-user%2Fupdate-self` component.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'feehi/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.8.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-21489'}, {'type': 'WEB', 'url': 'https://github.com/liufee/cms/issues/46'}, {'type': 'WEB', 'url': 'https://github.com/liufee/cms/commit/ecbfb0ca77874ead5b6e79b96a5e1f94e67475a9'}, {'type': 'PACKAGE', 'url': 'https://github.com/liufee/cms'}]
{'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-21T22:09:36Z', 'nvd_published_at': None}
1.4.0
GHSA-462x-c3jw-7vr6
2023-06-30T20:41:43Z
2023-06-30T20:41:43Z
null
['CVE-2023-36475']
Parse Server vulnerable to remote code execution via MongoDB BSON parser through prototype pollution
### Impact An attacker can use this prototype pollution sink to trigger a remote code execution through the MongoDB BSON parser. ### Patches Prevent prototype pollution in MongoDB database adapter. ### Workarounds Disable remote code execution through the MongoDB BSON parser. ### Credits - Discovered by hir0ot w...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.5.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': ...
[{'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/security/advisories/GHSA-462x-c3jw-7vr6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36475'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/issues/8674'}, {'type': 'WEB', 'url': 'https://githu...
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:41:43Z', 'nvd_published_at': None}
1.4.0
GHSA-784x-7w88-w564
2023-06-19T22:46:34Z
2023-06-19T06:30:42Z
null
['CVE-2023-34602']
JeecgBoot vulnerable to SQL injection in queryTableDictItemsByCode
JeecgBoot up to v 3.5.1 was discovered to contain a SQL injection vulnerability via the component `queryTableDictItemsByCode` in method `org.jeecg.modules.api.controller.SystemApiController`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg-boot-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34602'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/issues/4983'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/commit/dd7bf104e7ed59142909567ecd004335c3442ec5'}, {'type': 'PACKAGE', 'url': 'https://github.co...
{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-19T22:46:34Z', 'nvd_published_at': None}
1.4.0
GHSA-5wrg-8fxp-cx9r
2023-06-21T22:06:22Z
2023-06-21T22:06:22Z
null
[]
passport-wsfed-saml2 Signature Bypass vulnerability
## Information Please note that this is not a new disclosure, and is previously reported in our [SECURITY-NOTICE.md](https://github.com/auth0/passport-wsfed-saml2/commit/520b9fc0bb4249ce83bec47e30153419f086ab70 ) which we removed in favor of github advisory. # Overview A vulnerability was found in the validation of ...
[]
[{'package': {'ecosystem': 'npm', 'name': 'passport-wsfed-saml2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.10'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/auth0/passport-wsfed-saml2/security/advisories/GHSA-5wrg-8fxp-cx9r'}, {'type': 'WEB', 'url': 'https://github.com/auth0/passport-wsfed-saml2/pull/79'}, {'type': 'WEB', 'url': 'https://github.com/auth0/passport-wsfed-saml2/commit/f75211d42d2586a0d24a9da29ba8590e42363500'}, {'ty...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-21T22:06:22Z', 'nvd_published_at': None}
1.4.0
GHSA-8jxm-xp43-qh3q
2023-06-30T20:22:45Z
2023-06-21T22:08:34Z
null
['CVE-2023-34758']
Silver vulnerable to MitM attack against implants due to a cryptography vulnerability
### Summary The current cryptography implementation in Sliver up to version 1.5.39 allows a MitM with access to the corresponding implant binary to execute arbitrary codes on implanted devices via intercepted and crafted responses. (Reserved CVE ID: CVE-2023-34758) ### Details Please see [the PoC repo](https://github....
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/bishopfox/sliver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.40'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/BishopFox/sliver/security/advisories/GHSA-8jxm-xp43-qh3q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34758'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35170'}, {'type': 'WEB', 'url': 'https://github.com/BishopFox/sli...
{'cwe_ids': ['CWE-327'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-21T22:08:34Z', 'nvd_published_at': None}
1.4.0
GHSA-fmrf-p77g-vv5c
2023-07-07T16:30:42Z
2023-06-30T18:31:02Z
null
['CVE-2023-37302']
MediaWiki Cross-site Scripting vulnerability
An issue was discovered in SiteLinksView.php in Wikibase in MediaWiki through 1.39.3. There is XSS via a crafted badge title attribute. This is also related to lack of escaping in wbTemplate (from resources/wikibase/templates.js) for quotes (which can be in a title attribute).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'wikibase/wikibase'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.39.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37302'}, {'type': 'WEB', 'url': 'https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Wikibase/+/933649'}, {'type': 'WEB', 'url': 'https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Wikibase/+/933650'}, {'type': 'PACKAGE', 'url': 'https://githu...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:25:26Z', 'nvd_published_at': None}
1.4.0
GHSA-6mjq-h674-j845
2023-06-23T13:56:06Z
2023-06-20T16:33:22Z
null
['CVE-2023-34462']
netty-handler SniHandler 16MB allocation
### Summary The `SniHandler` can allocate up to 16MB of heap for each channel during the TLS handshake. When the handler or the channel does not have an idle timeout, it can be used to make a TCP server using the `SniHandler` to allocate 16MB of heap. ### Details The `SniHandler` class is a handler that waits for the ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.netty:netty-handler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.94.Final'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/netty/netty/security/advisories/GHSA-6mjq-h674-j845'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34462'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/commit/535da17e45201ae4278c0479e6162bb4127d4c32'}, {'type': 'PACKAGE', 'url': 'https:/...
{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-20T16:33:22Z', 'nvd_published_at': None}
1.4.0
GHSA-wfg4-322g-9vqv
2023-06-21T22:06:29Z
2023-06-21T22:06:29Z
null
[]
memoffset allows reading uninitialized memory
memoffset allows attempt of reading data from address `0` with arbitrary type. This behavior is an undefined behavior because address `0` to `std::mem::size_of<T>` may not have valid bit-pattern with `T`. Old implementation dereferences uninitialized memory obtained from `std::mem::align_of`. Older implementation prior...
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'memoffset'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Gilnaa/memoffset/issues/24'}, {'type': 'WEB', 'url': 'https://github.com/Gilnaa/memoffset/pull/50'}, {'type': 'PACKAGE', 'url': 'https://github.com/Gilnaa/memoffset'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0045.html'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-21T22:06:29Z', 'nvd_published_at': None}
1.4.0
GHSA-2fqm-m4r2-fh98
2023-06-06T16:46:16Z
2023-06-06T16:46:16Z
null
['CVE-2023-33977']
kiwitcms vulnerable to stored cross-site scripting via unrestricted file upload
### Impact Kiwi TCMS allows users to upload attachments to test plans, test cases, etc. Earlier versions of Kiwi TCMS had introduced upload validators in order to prevent potentially dangerous files from being uploaded and Content-Security-Policy definition to prevent cross-site-scripting attacks. The upload validat...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'kiwitcms'}, 'ecosystem_specific': {'affected_functions': ['tcms.kiwi_attachments.validators.deny_uploads_containing_script_tag']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.4'}]}], 'database_specific': {'last_known_affected_version_range':...
[{'type': 'WEB', 'url': 'https://github.com/kiwitcms/Kiwi/security/advisories/GHSA-2fqm-m4r2-fh98'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33977'}, {'type': 'WEB', 'url': 'https://github.com/kiwitcms/kiwi/commit/d789f4b51025de4f8c747c037d02e1b0da80b034'}, {'type': 'PACKAGE', 'url': 'htt...
{'cwe_ids': ['CWE-434', 'CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T16:46:16Z', 'nvd_published_at': None}
1.4.0
GHSA-jr66-9ghf-6gp3
2023-06-16T17:56:21Z
2023-06-11T12:30:16Z
null
['CVE-2023-3192']
Froxlor Session Fixation vulnerability
Versions of froxlor/froxlor prior to release 2.1.0 did not regenerate session ids appropriately which may result in session fixation.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'froxlor/froxlor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3192'}, {'type': 'WEB', 'url': 'https://github.com/froxlor/froxlor/commit/94d9c3eedf31bc8447e3aa349e32880dde02ee52'}, {'type': 'PACKAGE', 'url': 'https://github.com/froxlor/froxlor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/f3644772-9c86...
{'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-12T18:38:30Z', 'nvd_published_at': None}
1.4.0
GHSA-xp5h-f8jf-rc8q
2023-06-09T22:41:16Z
2023-06-09T22:41:16Z
null
['CVE-2023-23913']
rails-ujs vulnerable to DOM Based Cross-site Scripting contenteditable HTML Elements
NOTE: rails-ujs is part of Rails/actionview since 5.1.0. There is a potential DOM based cross-site scripting issue in rails-ujs which leverages the Clipboard API to target HTML elements that are assigned the contenteditable attribute. This has the potential to occur when pasting malicious HTML content from the clipboa...
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}, {'fixed': '6.1.7.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.4.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/5037a13614d71727af8a175063bcf6ba1a74bdbd'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/73009ea59a811b28e8ec2a9c9bc24635aa891214'}, {'type': 'WEB', 'url': 'https://discuss.rubyonrails.org/t/cve-2023-23913-dom-based-cross-site-scripting-in-...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T22:41:16Z', 'nvd_published_at': None}
1.4.0
GHSA-p2qf-9vp6-3jjq
2023-06-26T22:41:59Z
2023-06-15T15:30:15Z
null
['CVE-2023-3276']
HuTool XML parsing module has blind XXE vulnerability
A vulnerability, which was classified as problematic, has been found in Dromara HuTool up to 5.8.19. Affected by this issue is the function readBySax of the file XmlUtil.java of the component XML Parsing Module. The manipulation leads to xml external entity reference.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'cn.hutool:hutool-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.8.19'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3276'}, {'type': 'WEB', 'url': 'https://fbdhhhh47.github.io/2023/06/06/hutool-XXE/'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.231626'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.231626'}]
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-16T19:39:29Z', 'nvd_published_at': None}
1.4.0
GHSA-7grw-xfx6-qhx6
2023-07-06T21:39:16Z
2023-06-30T15:30:22Z
null
['CVE-2023-37298']
Joplin Cross-site Scripting vulnerability
Joplin before 2.11.5 allows XSS via a USE element in an SVG document.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'joplin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37298'}, {'type': 'WEB', 'url': 'https://github.com/laurent22/joplin/commit/caf66068bfc474bbfd505013076ed173cd90ca83'}, {'type': 'PACKAGE', 'url': 'https://github.com/laurent22/joplin'}, {'type': 'WEB', 'url': 'https://github.com/laurent22/joplin/r...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:39:28Z', 'nvd_published_at': None}
1.4.0
GHSA-r7wr-4w5q-55m6
2023-06-16T17:47:56Z
2023-06-16T17:47:56Z
null
['CVE-2023-34242']
Cilium vulnerable to information leakage via incorrect ReferenceGrant handling
### Impact When the [Gateway API](https://docs.cilium.io/en/v1.13/network/servicemesh/gateway-api/gateway-api/) is enabled in Cilium, the absence of a check on the namespace in which a [ReferenceGrant](https://gateway-api.sigs.k8s.io/api-types/referencegrant/) is created could result in Cilium gaining visibility of se...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/cilium/cilium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.0'}, {'fixed': '1.13.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/cilium/cilium/security/advisories/GHSA-r7wr-4w5q-55m6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34242'}, {'type': 'PACKAGE', 'url': 'https://github.com/cilium/cilium'}, {'type': 'WEB', 'url': 'https://github.com/cilium/cilium/releases/tag/v1.13...
{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-16T17:47:56Z', 'nvd_published_at': None}
1.4.0
GHSA-j6v2-mwxm-f952
2023-07-06T21:39:34Z
2023-06-29T21:30:29Z
null
['CVE-2020-26709']
py-xml XML External Entity Injection vulnerability
py-xml v1.0 was discovered to contain an XML External Entity Injection (XXE) vulnerability which allows attackers to execute arbitrary code via a crafted XML file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'py-xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26709'}, {'type': 'WEB', 'url': 'https://github.com/PinaeOS/py-xml/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/PinaeOS/py-xml'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/py-xml/PYSEC-2023-95.y...
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:36:36Z', 'nvd_published_at': None}
1.4.0
GHSA-ch48-9r3q-pv7x
2023-06-22T20:01:03Z
2023-06-22T20:01:03Z
null
['CVE-2023-25500']
Vaadin vulnerable to possible information disclosure of class and method names in RPC response
### Description Possible information disclosure in Vaadin 10.0.0 to 10.0.23, 11.0.0 to 14.10.1, 15.0.0 to 22.0.28, 23.0.0 to 23.3.13, 24.0.0 to 24.0.6, 24.1.0.alpha1 to 24.1.0.rc2, resulting in potential information disclosure of class and method names in RPC responses by sending modified requests. https://vaadin.com/...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.21'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '2.9.3...
[{'type': 'WEB', 'url': 'https://github.com/vaadin/platform/security/advisories/GHSA-ch48-9r3q-pv7x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25500'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/16935'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/platform'}, {'...
{'cwe_ids': ['CWE-1295', 'CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-22T20:01:03Z', 'nvd_published_at': None}
1.4.0
GHSA-4vvm-4w3v-6mr8
2023-07-07T17:19:37Z
2023-06-30T20:33:57Z
null
['CVE-2023-36464']
pypdf and PyPDF2 possible Infinite Loop when a comment isn't followed by a character
### Impact An attacker who uses this vulnerability can craft a PDF which leads to an infinite loop if `__parse_content_stream` is executed. This infinite loop blocks the current process and can utilize a single core of the CPU by 100%. It does not affect memory usage. That is, for example, the case if the user extracte...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pypdf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.9.0'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'PyPDF2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'last_affected': '3.0.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/py-pdf/pypdf/security/advisories/GHSA-4vvm-4w3v-6mr8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36464'}, {'type': 'WEB', 'url': 'https://github.com/py-pdf/pypdf/pull/1828'}, {'type': 'WEB', 'url': 'https://github.com/py-pdf/pypdf/pull/969'}, {'t...
{'cwe_ids': ['CWE-835'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:33:57Z', 'nvd_published_at': None}
1.4.0
GHSA-7gf7-jv65-wjmh
2023-06-13T22:40:01Z
2023-06-05T06:30:15Z
null
['CVE-2023-34411']
xml-rs vulnerable to denial of service via invalid token in XML document
The xml-rs crate >= 0.8.9 and < 0.8.14 for Rust and Crab allows a denial of service (panic) via an invalid <! token (such as <!DOCTYPEs/%<!A nesting) in an XML document.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'xml-rs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8.9'}, {'fixed': '0.8.14'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34411'}, {'type': 'WEB', 'url': 'https://github.com/netvl/xml-rs/pull/226'}, {'type': 'WEB', 'url': 'https://github.com/00xc/xml-rs/commit/0f084d45aa53e4a27476961785f59f2bd7d59a9f'}, {'type': 'WEB', 'url': 'https://github.com/netvl/xml-rs/commit/01...
{'cwe_ids': ['CWE-617'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T02:06:58Z', 'nvd_published_at': None}
1.4.0
GHSA-353f-5xf4-qw67
2023-09-01T21:30:14Z
2023-06-06T02:01:39Z
null
['CVE-2023-34092']
Vite Server Options (server.fs.deny) can be bypassed using double forward-slash (//)
### Summary The issue involves a security vulnerability in Vite, where the server options can be bypassed using a double forward slash (`//`). This vulnerability poses a potential security risk as it can allow unauthorized access to sensitive directories and files. This document outlines the steps to address and mitiga...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'vite'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.16'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'vite'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOS...
[{'type': 'WEB', 'url': 'https://github.com/vitejs/vite/security/advisories/GHSA-353f-5xf4-qw67'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34092'}, {'type': 'WEB', 'url': 'https://github.com/vitejs/vite/pull/13348'}, {'type': 'WEB', 'url': 'https://github.com/vitejs/vite/commit/813ddd6155...
{'cwe_ids': ['CWE-200', 'CWE-50', 'CWE-706'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T02:01:39Z', 'nvd_published_at': None}
1.4.0
GHSA-4g8v-vg43-wpgf
2023-06-29T15:03:16Z
2023-06-29T15:03:16Z
null
['CVE-2023-28362']
Actionpack has possible cross-site scripting vulnerability via User Supplied Values to redirect_to
The `redirect_to` method in Rails allows provided values to contain characters which are not legal in an HTTP header value. This results in the potential for downstream services which enforce RFC compliance on HTTP response headers to remove the assigned Location header. This vulnerability has been assigned the CVE ide...
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.1.7.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.5.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/1c3f93d1e90a3475f9ae2377ead25ccf11f71441'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/c9ab9b32bcdcfd8bcd55907f6c7b20b4e004cc23'}, {'type': 'WEB', 'url': 'https://discuss.rubyonrails.org/t/cve-2023-28362-possible-xss-via-user-supplied-val...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-29T15:03:16Z', 'nvd_published_at': None}
1.4.0
GHSA-rx62-5cw6-x29q
2023-06-19T22:46:24Z
2023-06-18T09:30:17Z
null
['CVE-2023-3308']
Whaleal IceFrog is vulnerable to deserialization
Whaleal IceFrog v1.1.8 component Aviator Template Engine is vulnerable to deserialization of untrusted data. The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.whaleal.icefrog:icefrog-all'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3308'}, {'type': 'WEB', 'url': 'https://github.com/NanKeXXX/selfVuln_poc/blob/main/whaleal%3Aicefrog/icefrog_1.1.8_RCE.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/whaleal/icefrog'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.231804'}...
{'cwe_ids': ['CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-19T22:46:24Z', 'nvd_published_at': None}
1.4.0
GHSA-hr9r-8phq-5x8j
2023-07-03T18:39:26Z
2023-06-28T22:49:49Z
null
['CVE-2023-35933']
OpenFGA vulnerable to denial of service due to circular relationship
### Overview OpenFGA versions v1.1.0 and prior are vulnerable to a DoS attack when certain Check and ListObjects calls are executed against authorization models that contain circular relationship definitions. ### Am I Affected? You are affected by this vulnerability if you are using OpenFGA v1.1.0 or earlier, and if...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/openfga/openfga'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/openfga/openfga/security/advisories/GHSA-hr9r-8phq-5x8j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35933'}, {'type': 'WEB', 'url': 'https://github.com/openfga/openfga/commit/087ce392595f3c319ab3028b5089118ea4063452'}, {'type': 'PACKAGE', 'url': ...
{'cwe_ids': ['CWE-835'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-28T22:49:49Z', 'nvd_published_at': None}
1.4.0
GHSA-whj9-m24x-qhhp
2023-06-22T20:00:36Z
2023-06-22T20:00:36Z
null
['CVE-2023-35925']
FastAsyncWorldEdit vulnerable to Uncontrolled Resource Consumption
### Coordinated Disclosure Timeline - 10.06.2023: Issue reported to IntellectualSites - 11.06.2023: Issue is acknowledged - 12.06.2023: Issue has been fixed - 22.06.2023: Advisory has been published ### Impacted version range Before 2.6.3 ### Details #### Proof of Concept As a user, do the following: 1. Select p...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fastasyncworldedit:FastAsyncWorldEdit-Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fastasyncworldedit:FastAsyncWorldEdit-Bukkit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events...
[{'type': 'WEB', 'url': 'https://github.com/IntellectualSites/FastAsyncWorldEdit/security/advisories/GHSA-whj9-m24x-qhhp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35925'}, {'type': 'WEB', 'url': 'https://github.com/IntellectualSites/FastAsyncWorldEdit/pull/2285'}, {'type': 'PACKAGE', 'ur...
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-22T20:00:36Z', 'nvd_published_at': None}
1.4.0
GHSA-4gxf-g5gf-22h4
2023-06-12T18:34:39Z
2023-06-10T06:30:25Z
null
['CVE-2023-26132']
dottie vulnerable to Prototype Pollution
Versions of the package dottie before 2.0.4 are vulnerable to Prototype Pollution due to insufficient checks, via the `set()` function and the current variable in the `/dottie.js` file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'dottie'}, 'ecosystem_specific': {'affected_functions': ['dottie.set']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26132'}, {'type': 'WEB', 'url': 'https://github.com/mickhansen/dottie.js/commit/7d3aee1c9c3c842720506e131de7e181e5c8db68'}, {'type': 'PACKAGE', 'url': 'https://github.com/mickhansen/dottie.js'}, {'type': 'WEB', 'url': 'https://github.com/mickhansen...
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-12T18:34:39Z', 'nvd_published_at': None}
1.4.0
GHSA-9849-p7jc-9rmv
2023-06-22T19:58:54Z
2023-06-22T19:58:54Z
null
['CVE-2022-24839']
org.nokogiri:nekohtml vulnerable to Uncontrolled Resource Consumption
## Summary The fork of `org.cyberneko.html` used by Nokogiri (Rubygem) raises a `java.lang.OutOfMemoryError` exception when parsing ill-formed HTML markup. ## Severity The maintainers have evaluated this as [**High Severity** 7.5 (CVSS3.1)](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.nokogiri:nekohtml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.22.noko2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24839'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nekohtml/commit/a800fce3b079def130ed42a408ff1d09f89e773d'}, {'type': 'PAC...
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-22T19:58:54Z', 'nvd_published_at': None}
1.4.0
GHSA-qcm3-vfq5-wfr2
2023-06-12T20:09:30Z
2023-06-06T18:30:20Z
null
['CVE-2023-31606']
RedCloth Regular Expression Denial of Service issue
A Regular Expression Denial of Service (ReDoS) issue was discovered in the `sanitize_html` function of RedCloth gem v4.0.0. This vulnerability allows attackers to cause a Denial of Service (DoS) via supplying a crafted payload.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'RedCloth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-31606'}, {'type': 'WEB', 'url': 'https://github.com/jgarber/redcloth/issues/73'}, {'type': 'WEB', 'url': 'https://github.com/e23e/CVE-2023-31606#readme'}, {'type': 'PACKAGE', 'url': 'https://github.com/jgarber/redcloth'}, {'type': 'WEB', 'url': 'ht...
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T20:27:29Z', 'nvd_published_at': None}
1.4.0
GHSA-fwfj-8p36-rc64
2023-06-30T20:21:14Z
2023-06-22T21:30:49Z
null
['CVE-2023-35131']
Moodle vulnerable to Cross-site Scripting
Content on the groups page required additional sanitizing to prevent an XSS risk. This flaw affects Moodle versions 4.2, 4.1 to 4.1.3, 4.0 to 4.0.8 and 3.11 to 3.11.14.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.1'}]}], 'versions': ['4.2.0']}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fi...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35131'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7A72KX4WU6GK2CX4TKYFGFASPKOEOJFC/'}, {'type': 'WEB', 'ur...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-23T21:38:20Z', 'nvd_published_at': None}
1.4.0
GHSA-w2rr-wvh9-m2m7
2023-06-27T21:01:16Z
2023-06-14T15:30:38Z
null
['CVE-2023-34615']
JSONUtil vulnerable to stack exhaustion
An issue was discovered JSONUtil through 5.0 that allows attackers to cause a denial of service or other unspecified impacts via crafted objects that deeply nested structures.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'net.pwall.json:jsonutil'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34615'}, {'type': 'WEB', 'url': 'https://github.com/billdavidson/JSONUtil/issues/10'}]
{'cwe_ids': ['CWE-400', 'CWE-787'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T21:20:51Z', 'nvd_published_at': None}
1.4.0
GHSA-x3m2-3pwj-8fj4
2023-06-28T16:29:10Z
2023-06-23T15:30:43Z
null
['CVE-2023-3304']
Admidio Improper Access Control vulnerability
Admidio prior to 4.2.9 is vulnerable to Improper Access Control.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'admidio/admidio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3304'}, {'type': 'WEB', 'url': 'https://github.com/admidio/admidio/commit/3b248b7d5e0e60a00ee2f9a6908d538d62a5837f'}, {'type': 'PACKAGE', 'url': 'https://github.com/admidio/admidio'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/721fae61-3c8c...
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-23T17:01:07Z', 'nvd_published_at': None}
1.4.0
GHSA-q97c-2mh3-pgw9
2023-06-28T22:33:26Z
2023-06-28T22:33:26Z
null
['CVE-2023-34098']
Shopware dependency configuration exposed
### Impact Due to a wrong configuration in the `.htaccess` file, the configuration file of Javascript dependencies could be read in production environments (`themes/package-lock.json`). With this information, the used Shopware version might be determined by an attacker, which could be used for further attacks. ### Pa...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/shopware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.6.0'}, {'fixed': '5.7.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.7.17'}}]
[{'type': 'WEB', 'url': 'https://github.com/shopware/shopware/security/advisories/GHSA-q97c-2mh3-pgw9'}, {'type': 'WEB', 'url': 'https://github.com/shopware5/shopware/security/advisories/GHSA-q97c-2mh3-pgw9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34098'}, {'type': 'WEB', 'url': 'https:...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-28T22:33:26Z', 'nvd_published_at': None}
1.4.0
GHSA-793w-g325-hrw2
2023-06-30T20:40:47Z
2023-06-30T20:40:47Z
null
['CVE-2023-36477']
XWiki Platform vulnerable to persistent Cross-site Scripting through CKEditor Configuration pages
### Effect Any user with edit rights can edit all pages in the `CKEditor' space. This makes it possible to perform a variety of harmful actions, such as - removing technical documents, leading to loss of service - Editing the javascript configuration of CKEditor, leading to persistent XSS ### Patches This issue has be...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-ckeditor-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.6-rc-1'}, {'fixed': '14.10.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.contrib:application-ckeditor-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'even...
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-793w-g325-hrw2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36477'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/9d9d86179457cb8dc48b4491510537878800be4f'}, {'type': 'PACKAGE...
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:40:47Z', 'nvd_published_at': None}
1.4.0
GHSA-qcwq-55hx-v3vh
2023-08-18T15:45:35Z
2023-06-15T17:15:06Z
null
['CVE-2023-34455']
snappy-java's unchecked chunk length leads to DoS
## Summary Due to use of an unchecked chunk length, an unrecoverable fatal error can occur. ## Impact Denial of Service ## Description The code in the function [hasNextChunk](https://github.com/xerial/snappy-java/blob/05c39b2ca9b5b7b39611529cc302d3d796329611/src/main/java/org/xerial/snappy/SnappyInputStream.java#L388) ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xerial.snappy:snappy-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.10.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.1.10.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/xerial/snappy-java/security/advisories/GHSA-qcwq-55hx-v3vh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34455'}, {'type': 'WEB', 'url': 'https://github.com/xerial/snappy-java/commit/3bf67857fcf70d9eea56eed4af7c925671e8eaea'}, {'type': 'PACKAGE', '...
{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-15T17:15:06Z', 'nvd_published_at': None}
1.4.0
GHSA-2jx2-qcm4-rf9h
2023-06-09T19:32:18Z
2023-06-09T19:32:18Z
null
['CVE-2021-36153']
Incomplete Internal State Distinction in GRPCWebToHTTP2ServerCodec
### Impact Affected gRPC Swift servers are vulnerable to precondition failures when parsing certain gRPC Web requests. This may lead to a denial of service. ### Patches The problem has been fixed in 1.2.0. ### Workarounds No workaround is available. Users must upgrade.
[]
[{'package': {'ecosystem': 'purl-type:swift', 'name': 'github.com/grpc/grpc-swift'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/grpc/grpc-swift/security/advisories/GHSA-2jx2-qcm4-rf9h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36153'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35267'}, {'type': 'PACKAGE', 'url': 'https://github.com/grp...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T19:32:18Z', 'nvd_published_at': '2021-07-09T12:15:00Z'}
1.4.0
GHSA-779h-3r69-4f5p
2023-06-27T19:48:33Z
2023-06-14T15:30:38Z
null
['CVE-2023-34610']
json-io vulnerable to stack exhaustion
An issue was discovered json-io through 4.14.0 allows attackers to cause a denial of service or other unspecified impacts via crafted object that have deeply nested structures.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.cedarsoftware:json-io'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.14.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34610'}, {'type': 'WEB', 'url': 'https://github.com/jdereg/json-io/issues/169'}, {'type': 'PACKAGE', 'url': 'https://github.com/jdereg/json-io'}]
{'cwe_ids': ['CWE-400', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T21:04:22Z', 'nvd_published_at': None}
1.4.0
GHSA-hww2-5g85-429m
2023-07-14T21:52:02Z
2023-06-29T15:30:34Z
null
['CVE-2023-36617']
URI gem has ReDoS vulnerability
A ReDoS issue was discovered in the URI component before 0.12.2 for Ruby. The URI parser mishandles invalid URLs that have specific characters. There is an increase in execution time for parsing strings to URI objects with `rfc2396_parser.rb` and `rfc3986_parser.rb`. NOTE: this issue exists becuse of an incomplete fix...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'uri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'uri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.11.0'}, {'fixed': '0.12.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36617'}, {'type': 'WEB', 'url': 'https://github.com/ruby/uri/commit/3cd938df20db26c9439e9f681aadfb9bbeb6d1c0'}, {'type': 'WEB', 'url': 'https://github.com/ruby/uri/commit/4d02315181d8a485496f1bb107a6ab51d6f3a35f'}, {'type': 'WEB', 'url': 'https://g...
{'cwe_ids': ['CWE-1333'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-14T21:52:02Z', 'nvd_published_at': None}
1.4.0
GHSA-wprv-93r4-jj2p
2023-06-19T19:46:37Z
2023-06-19T19:46:37Z
null
['CVE-2023-34459']
OpenZeppelin Contracts using MerkleProof multiproofs may allow proving arbitrary leaves for specific trees
### Impact When the `verifyMultiProof`, `verifyMultiProofCalldata`, `processMultiProof`, or `processMultiProofCalldata` functions are in use, it is possible to construct merkle trees that allow forging a valid multiproof for an arbitrary set of leaves. A contract may be vulnerable if it uses multiproofs for verificat...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.7.0'}, {'fixed': '4.9.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts-upgradeable'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.7.0'}, {'fixed...
[{'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-wprv-93r4-jj2p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34459'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/commit/4d2383e17186be3e8ccf5a442e9686e...
{'cwe_ids': ['CWE-354'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-19T19:46:37Z', 'nvd_published_at': None}
1.4.0
GHSA-hh54-53m7-7ffj
2023-06-13T23:57:23Z
2023-06-07T15:30:17Z
null
['CVE-2023-33498']
alist Incorrect Access Control vulnerability
alist <=3.16.3 is vulnerable to Incorrect Access Control. Low privilege accounts can upload any file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/alist-org/alist/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.16.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33498'}, {'type': 'WEB', 'url': 'https://github.com/YUyuanAN-com/loophole'}, {'type': 'PACKAGE', 'url': 'https://github.com/alist-org/alist'}]
{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-08T18:05:49Z', 'nvd_published_at': None}
1.4.0
GHSA-223g-8w3x-98wr
2023-06-09T22:40:23Z
2023-06-09T22:40:23Z
null
['CVE-2023-34230']
Snowflake Connector .Net Command Injection
### Issue Snowflake was informed via our bug bounty program of a command injection vulnerability in the Snowflake .NET driver via SSO URL authentication. ### Impacted driver package: snowflake-connector-net ### Impacted version range: before [Version 2.0.18](https://community.snowflake.com/s/article/Dot-NET-Driver-...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Snowflake.Data'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.18'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/snowflakedb/snowflake-connector-net/security/advisories/GHSA-223g-8w3x-98wr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34230'}, {'type': 'PACKAGE', 'url': 'https://github.com/snowflakedb/snowflake-connector-net'}]
{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T22:40:23Z', 'nvd_published_at': None}
1.4.0
GHSA-3qh5-qqj2-c78f
2023-06-30T20:31:37Z
2023-06-30T20:31:37Z
null
['CVE-2023-2422']
Keycloak vulnerable to Improper Client Certificate Validation for OAuth/OpenID clients
When a Keycloak server is configured to support mTLS authentication for OAuth/OpenID clients, it does not properly verify the client certificate chain. A client that possesses a proper certificate can authorize itself as any other client and therefore access data that belongs to other clients.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-services'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '21.1.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/security/advisories/GHSA-3qh5-qqj2-c78f'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/commit/5c6c55945a384bfd82e51283096204dcb6f63d91'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}]
{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:31:37Z', 'nvd_published_at': None}
1.4.0
GHSA-7w2c-w47h-789w
2023-07-11T20:19:37Z
2023-06-12T19:50:34Z
null
['CVE-2023-34246']
Doorkeeper Improper Authentication vulnerability
OAuth RFC 8252 says https://www.rfc-editor.org/rfc/rfc8252#section-8.6 > the authorization server SHOULD NOT process authorization requests automatically without user consent or interaction, except when the identity of the client can be assured. **This includes the case where the user has previously approved an autho...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'doorkeeper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/doorkeeper-gem/doorkeeper/security/advisories/GHSA-7w2c-w47h-789w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34246'}, {'type': 'WEB', 'url': 'https://github.com/doorkeeper-gem/doorkeeper/issues/1589'}, {'type': 'WEB', 'url': 'https://github.com/...
{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-12T19:50:34Z', 'nvd_published_at': None}
1.4.0
GHSA-mjff-wv85-hmcj
2023-06-27T20:28:27Z
2023-06-19T09:30:17Z
null
['CVE-2023-35005']
Apache Airflow vulnerable to exposure of sensitive information
In Apache Airflow, some potentially sensitive values were being shown to the user in certain situations. This vulnerability is mitigated by the fact configuration is not shown in the UI by default (only if `[webserver] expose_config` is set to `non-sensitive-only`), and not all uncensored values are actually sentitive...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.6.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35005'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/31788'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/31820'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https:...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-19T22:47:45Z', 'nvd_published_at': None}
1.4.0
GHSA-87mf-9wg6-ppf8
2023-06-16T17:45:05Z
2023-06-12T18:52:23Z
null
[]
Ouroboros is Unsound
In 0.15.0 and prior, Ouroboros works internally by creating a struct where all uses of 'this are replaced by 'static. However, a recent addition to Miri checks that references passed to functions are valid during the entire execution of the function, even when those references are passed inside a struct. This poses an ...
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'ouroboros'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.16.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/joshua-maros/ouroboros/issues/88'}, {'type': 'PACKAGE', 'url': 'https://github.com/joshua-maros/ouroboros'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0042.html'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-12T18:52:23Z', 'nvd_published_at': None}
1.4.0
GHSA-7c94-gvvj-r3mg
2023-06-05T20:36:58Z
2023-06-05T20:36:58Z
null
[]
cheqd-node affected by Inter-blockchain Communication (IBC) protocol "Huckleberry" vulnerability
### Impact This vulnerability affects the [`ibc-go` package for those running full nodes, dubbed "Huckleberry"](https://forum.cosmos.network/t/ibc-security-advisory-huckleberry/10731). According to their advisory: > This issue is low-severity in general, and it has a low impact and likelihood of exploitation. Dependin...
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/cheqd/cheqd-node'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/cheqd/cheqd-node/security/advisories/GHSA-7c94-gvvj-r3mg'}, {'type': 'WEB', 'url': 'https://github.com/cheqd/cheqd-node/commit/f325f5f250e150e3e76a5a557669f67b606e34e1'}, {'type': 'WEB', 'url': 'https://forum.cosmos.network/t/ibc-security-advisory-huckleberry/10731'}, {'type'...
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-05T20:36:58Z', 'nvd_published_at': None}
1.4.0
GHSA-rwcp-qrwg-56cg
2023-06-30T19:58:47Z
2023-06-22T15:30:23Z
null
['CVE-2023-34927']
Casdoor Cross-Site Request Forgery vulnerability
Casdoor v1.331.0 and below was discovered to contain a Cross-Site Request Forgery (CSRF) in the endpoint `/api/set-password`. This vulnerability allows attackers to arbitrarily change the victim user's password via supplying a crafted URL.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/casdoor/casdoor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.331.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34927'}, {'type': 'WEB', 'url': 'https://github.com/casdoor/casdoor/issues/1531'}, {'type': 'WEB', 'url': 'https://casdoor.org/'}, {'type': 'WEB', 'url': 'https://gist.github.com/omriman067/4e90a3a4ffa40984f011d8777a995469'}, {'type': 'PACKAGE', 'u...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-22T20:01:21Z', 'nvd_published_at': None}
1.4.0
GHSA-rqjq-ww83-wv5c
2023-06-06T02:04:22Z
2023-06-03T00:30:16Z
null
['CVE-2023-2816']
Hashicorp Consul allows user with service:write permissions to patch remote proxy instances
Consul and Consul Enterprise allowed any user with service:write permissions to use Envoy extensions configured via service-defaults to patch remote proxy instances that target the configured service, regardless of whether the user has permission to modify the service(s) corresponding to those modified proxies.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.15.0'}, {'fixed': '1.15.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2816'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2023-16-consul-envoy-extension-downstream-proxy-configuration-by-upstream-service-owner/54525'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/consul'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T02:04:22Z', 'nvd_published_at': None}
1.4.0
GHSA-jrjw-qgr2-wfcg
2023-06-23T21:37:26Z
2023-06-23T21:37:26Z
null
['CVE-2023-33141']
YARP Denial of Service Vulnerability
### Impact A denial of service vulnerability exists in YARP. ### Patches If you're using YARP 1.x, you should update to NuGet package version [1.1.2](https://www.nuget.org/packages/Yarp.ReverseProxy/1.1.2). If you're using YARP 2.0.0, you should update to NuGet package version [2.0.1](https://www.nuget.org/packages/Ya...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Yarp.ReverseProxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.1.1'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Yarp.ReverseProxy'}, 'ranges': [{'type': 'ECOSYST...
[{'type': 'WEB', 'url': 'https://github.com/microsoft/reverse-proxy/security/advisories/GHSA-jrjw-qgr2-wfcg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33141'}, {'type': 'PACKAGE', 'url': 'https://github.com/microsoft/reverse-proxy'}, {'type': 'WEB', 'url': 'https://msrc.microsoft.com/upda...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-23T21:37:26Z', 'nvd_published_at': None}
1.4.0
GHSA-vmxg-wx6c-4f3r
2023-06-28T16:28:27Z
2023-06-23T15:30:43Z
null
['CVE-2023-3303']
Admidio Improper Access Control vulnerability
Admidio prior to 4.2.9 is vulnerable to Improper Access Control.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'admidio/admidio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3303'}, {'type': 'WEB', 'url': 'https://github.com/admidio/admidio/commit/3d8bafaa4e9b7a314ffdf548622a8c7b38faee8a'}, {'type': 'PACKAGE', 'url': 'https://github.com/admidio/admidio'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/65d260cc-55a9...
{'cwe_ids': ['CWE-284'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-23T17:00:55Z', 'nvd_published_at': None}
1.4.0
GHSA-m3v5-gjj9-rg24
2023-06-27T21:58:21Z
2023-06-20T15:31:08Z
null
['CVE-2023-33495']
Craft CMS vulnerable to HTML injection
Craft CMS through 4.4.9 is vulnerable to HTML Injection.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.4.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33495'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftcms/cms'}, {'type': 'WEB', 'url': 'https://medium.com/@mondalsomnath9135/html-injection-in-craft-cms-application-e2b28f746212'}, {'type': 'WEB', 'url': 'https://owasp.org/www-project-web-...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-21T18:36:27Z', 'nvd_published_at': None}
1.4.0
GHSA-q36x-r5x4-h4q6
2023-06-09T19:32:49Z
2023-06-09T19:32:49Z
null
['CVE-2022-0618']
Denial of service via HTTP/2 HEADERS frames padding
A program using swift-nio-http2 is vulnerable to a denial of service attack, caused by a network peer sending a specially crafted HTTP/2 frame. This attack affects all swift-nio-http2 versions from 1.0.0 to 1.19.2. It is fixed in 1.20.0 and later releases. This vulnerability is caused by a logical error when parsing a...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'purl-type:swift', 'name': 'https://github.com/apple/swift-nio-http2.git'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.20'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/apple/swift-nio-http2/security/advisories/GHSA-q36x-r5x4-h4q6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0618'}, {'type': 'WEB', 'url': 'https://github.com/apple/swift-nio-http2/commit/ac2a5afce3dbb6795b4f78ec3f19726dc28f5617'}, {'type': 'PACKAG...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T19:32:49Z', 'nvd_published_at': '2022-03-10T17:44:00Z'}
1.4.0
GHSA-7g45-4rm6-3mm3
2023-06-14T21:01:07Z
2023-06-14T18:30:38Z
null
['CVE-2023-2976']
Guava vulnerable to insecure use of temporary directory
Use of Java's default temporary directory for file creation in `FileBackedOutputStream` in Google Guava versions 1.0 to 31.1 on Unix systems and Android Ice Cream Sandwich allows other users and apps on the machine with access to the default Java temporary directory to be able to access the files created by the class. ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.google.guava:guava'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0'}, {'fixed': '32.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2976'}, {'type': 'WEB', 'url': 'https://github.com/google/guava/issues/2575'}, {'type': 'WEB', 'url': 'https://github.com/google/guava/issues/6532'}, {'type': 'WEB', 'url': 'https://github.com/google/guava/commit/feb83a1c8fd2e7670b244d5afd23cba5aca...
{'cwe_ids': ['CWE-379', 'CWE-552'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T21:01:07Z', 'nvd_published_at': None}
1.4.0
GHSA-75m3-f4hr-2vh9
2023-06-27T19:48:59Z
2023-06-14T15:30:39Z
null
['CVE-2023-35110']
jjson vulnerable to stack exhaustion
An issue was discovered jjson through 0.1.7 allows attackers to cause a denial of service or other unspecified impacts via crafted objects that deeply nested structures.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'de.grobmeier.json:jjson'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35110'}, {'type': 'WEB', 'url': 'https://github.com/grobmeier/jjson/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/grobmeier/jjson'}]
{'cwe_ids': ['CWE-400', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T21:11:23Z', 'nvd_published_at': None}
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
30