schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn nulllengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 20 140 | details stringlengths 56 37.2k | severity stringlengths 2 92 | affected stringlengths 88 7.07k | references stringlengths 139 4.72k | database_specific stringlengths 131 185 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-257q-pv89-v3xv | 2023-07-07T15:07:56Z | 2023-06-26T21:30:58Z | null | ['CVE-2020-23064'] | jQuery Cross Site Scripting vulnerability | Cross Site Scripting vulnerability in jQuery v.2.2.0 until v.3.5.0 allows a remote attacker to execute arbitrary code via the `<options>` element. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'jquery'}, 'ecosystem_specific': {'affected_functions': ['jquery.htmlPrefilter']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.3'}, {'fixed': '3.5.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'jQuery'}, 'ecosystem_specific': {'affected_functions': [''... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-23064'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery/commit/1d61fd9407e6fbe82fe55cb0b938307aa0791f77'}, {'type': 'WEB', 'url': 'https://blog.jquery.com/2020/04/10/jquery-3-5-0-released/'}, {'type': 'PACKAGE', 'url': 'https://github.com... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T15:07:56Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gx4r-fvwg-8678 | 2023-06-06T02:07:41Z | 2023-06-05T18:30:27Z | null | ['CVE-2023-3109'] | Admidio vulnerable to Cross-site Scripting | Cross-site Scripting (XSS) - Stored in GitHub repository admidio/admidio prior to 4.2.8. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'admidio/admidio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3109'}, {'type': 'WEB', 'url': 'https://github.com/admidio/admidio/commit/a7c211b835cafe1158932fbfcff9e5552e57510a'}, {'type': 'PACKAGE', 'url': 'https://github.com/admidio/admidio'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/6fa6070e-8f7f... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T02:07:41Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3g7p-8qhx-mc8r | 2023-06-26T16:35:03Z | 2023-06-22T20:01:39Z | null | ['CVE-2023-35931'] | Shescape potential environment variable exposure on Windows with CMD | ### Impact
This impact users of Shescape:
1. On Windows using the Windows Command Prompt (i.e. `cmd.exe`), and
2. Using `quote`/`quoteAll` or `escape`/`escapeAll` with the `interpolation` option set to `true`.
An attacker may be able to get read-only access to environment variables. Example:
```javascript
import * ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'shescape'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ericcornelissen/shescape/security/advisories/GHSA-3g7p-8qhx-mc8r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35931'}, {'type': 'WEB', 'url': 'https://github.com/ericcornelissen/shescape/pull/982'}, {'type': 'WEB', 'url': 'https://github.com/ericc... | {'cwe_ids': ['CWE-526'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-22T20:01:39Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mppv-79ch-vw6q | 2023-06-30T19:56:21Z | 2023-06-21T12:30:19Z | null | ['CVE-2023-34981'] | Apache Tomcat vulnerable to information leak | A regression in the fix for bug 66512 in Apache Tomcat 11.0.0-M5, 10.1.8, 9.0.74 and 8.5.88 meant that, if a response did not include any HTTP headers no AJP SEND_HEADERS messare woudl be sent for the response which in turn meant that at least one AJP proxy (mod_proxy_ajp) would use the response headers from the previo... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0-M5'}, {'fixed': '11.0.0-M6'}]}], 'versions': ['11.0.0-M5']}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'i... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34981'}, {'type': 'WEB', 'url': 'https://bz.apache.org/bugzilla/show_bug.cgi?id=66512'}, {'type': 'WEB', 'url': 'https://bz.apache.org/bugzilla/show_bug.cgi?id=66591'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB',... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-21T22:06:39Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jhpr-j7cq-3jp3 | 2023-06-22T19:59:03Z | 2023-06-22T19:59:03Z | null | ['CVE-2023-34110'] | Flask-AppBuilder vulnerable to possible disclosure of sensitive information on user error | ### Impact
An authenticated malicious actor with Admin privileges, could by adding a special character on the add, edit User forms trigger a database error, this error is surfaced back to this actor on the UI. On certain database engines this error can include the entire user row including the pbkdf2:sha256 hashed pass... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Flask-AppBuilder'}, 'ecosystem_specific': {'affected_functions': ['flask_appbuilder.models.sqla.interface.SQLAInterface.add', 'flask_appbuilder.models.sqla.interface.SQLAInterface.edit', 'flask_appbuilder.models.sqla.interface.SQLAInterface.delete', 'flask_appbuilder.models.s... | [{'type': 'WEB', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder/security/advisories/GHSA-jhpr-j7cq-3jp3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34110'}, {'type': 'WEB', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder/pull/2045'}, {'type': 'WEB', 'url': 'https://github.com/dp... | {'cwe_ids': ['CWE-209'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-22T19:59:03Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c2pj-v37r-2p6h | 2023-08-25T21:35:14Z | 2023-06-26T15:48:33Z | null | ['CVE-2023-40586'] | Coraza has potential denial of service vulnerability | ### Summary
Due to the misuse of `log.Fatalf`, the application using coraza crashed after receiving crafted requests from attackers.
### Details
https://github.com/corazawaf/coraza/blob/82157f85f24c6107667bf0f686b71a72aafdf8a5/internal/bodyprocessors/multipart.go#L26-L29
The bodyprocessors of multipart uses `log.Fat... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/corazawaf/coraza/v3'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/corazawaf/coraza/v2'}, 'ecosystem_specific': {'... | [{'type': 'WEB', 'url': 'https://github.com/corazawaf/coraza/security/advisories/GHSA-c2pj-v37r-2p6h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-40586'}, {'type': 'WEB', 'url': 'https://github.com/corazawaf/coraza-caddy/issues/48'}, {'type': 'WEB', 'url': 'https://github.com/corazawaf/cora... | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-26T15:48:33Z', 'nvd_published_at': None} |
1.4.0 | GHSA-q2fp-jw87-86px | 2023-06-30T20:18:57Z | 2023-06-22T12:30:14Z | null | ['CVE-2023-29931'] | laravel-s vulnerable to Local File Inclusion | laravel-s prior to 3.7.36 is vulnerable to Local File Inclusion via `/src/Illuminate/Laravel.php`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'hhxsv5/laravel-s'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.7.36'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29931'}, {'type': 'WEB', 'url': 'https://github.com/hhxsv5/laravel-s/issues/437'}, {'type': 'WEB', 'url': 'https://github.com/hhxsv5/laravel-s/commit/05aa615527725f0b696da78ae4c7d3a5065bac6d'}, {'type': 'PACKAGE', 'url': 'https://github.com/hhxsv5/... | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-22T20:00:46Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hhqm-f4m4-pq39 | 2023-07-03T18:38:17Z | 2023-06-23T12:30:18Z | null | ['CVE-2023-30260'] | RaspAP raspap-webgui Command Injection vulnerability | Command injection vulnerability in RaspAP raspap-webgui 2.8.8 and earlier allows remote attackers to run arbitrary commands via crafted POST request to hostapd settings form. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'billz/raspap-webgui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30260'}, {'type': 'WEB', 'url': 'https://github.com/RaspAP/raspap-webgui/pull/1322'}, {'type': 'WEB', 'url': 'https://github.com/RaspAP/raspap-webgui/commit/238e1670fcef8b18ec4628ee74fc345607536a16'}, {'type': 'WEB', 'url': 'https://eldstal.se/advi... | {'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-23T21:44:57Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mm87-c3x2-6f89 | 2023-07-06T21:39:56Z | 2023-06-29T12:30:24Z | null | ['CVE-2023-22886'] | Apache Airflow JDBC Provider Improper Input Validation vulnerability | Improper Input Validation vulnerability in Apache Software Foundation Apache Airflow JDBC Provider. Airflow JDBC Provider Connection’s [Connection URL] parameters had no restrictions, which made it possible to implement RCE attacks via different type JDBC drivers, obtain airflow server permission. This issue affects Ap... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow-providers-jdbc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22886'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/ynbjwp4n0vzql0xzhog1gkp1ovncf8j3'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:40:04Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h53w-7qw7-vh5c | 2023-06-09T22:53:51Z | 2023-06-09T22:53:51Z | null | ['CVE-2023-34232'] | Snowflake NodeJS Driver vulnerable to Command Injection | ### Issue
Snowflake was informed via our bug bounty program of a command injection vulnerability in the Snowflake NodeJS driver via SSO browser URL authentication.
### Impacted driver package:
snowflake-connector-nodejs
### Impacted version range:
before [Version 1.6.21](https://community.snowflake.com/s/article/No... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'snowflake-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.21'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/snowflakedb/snowflake-connector-nodejs/security/advisories/GHSA-h53w-7qw7-vh5c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34232'}, {'type': 'WEB', 'url': 'https://github.com/snowflakedb/snowflake-connector-nodejs/pull/465'}, {'type': 'WEB', 'url... | {'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T22:53:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qvxg-wjxc-r4gg | 2023-06-07T16:11:16Z | 2023-06-07T16:11:16Z | null | ['CVE-2022-31019'] | Vapor vulnerable to denial of service in URLEncodedFormDecoder | Vapor is an HTTP web framework for Swift. Vapor versions earlier than 4.61.1 are vulnerable to a denial of service in the URLEncodedFormDecoder.
### Impact
When using automatic content decoding, e.g.
```swift
app.post("foo") { request -> String in
let foo = try request.content.decode(Foo.self)
return "\(foo)"
}
... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'purl-type:swift', 'name': 'github.com/vapor/vapor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.61.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/vapor/vapor/security/advisories/GHSA-qvxg-wjxc-r4gg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31019'}, {'type': 'WEB', 'url': 'https://github.com/vapor/vapor/commit/6c63226a4ab82ce53730eb1afb9ca63866fcf033'}, {'type': 'PACKAGE', 'url': 'https:/... | {'cwe_ids': ['CWE-120', 'CWE-121', 'CWE-674'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-07T16:11:16Z', 'nvd_published_at': '2022-06-09T13:15:00Z'} |
1.4.0 | GHSA-rv3x-xq3r-8j9h | 2023-06-09T19:32:32Z | 2023-06-09T19:32:32Z | null | ['CVE-2021-37634'] | LeafKit allows XSS with untrusted user input | ### Impact
This affects anyone passing unsanitised data to Leaf's variable tags. Before this fix, Leaf would not escape any strings passed to tags as variables. If an attacker managed to find a variable that was rendered with their unsanitised data, they could inject scripts into a generated Leaf page, which could enab... | [] | [{'package': {'ecosystem': 'purl-type:swift', 'name': 'github.com/vapor/leaf-kit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/vapor/leaf-kit/security/advisories/GHSA-rv3x-xq3r-8j9h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37634'}, {'type': 'PACKAGE', 'url': 'https://github.com/vapor/leaf-kit'}, {'type': 'WEB', 'url': 'https://github.com/vapor/leaf-kit/releases/tag/1.... | {'cwe_ids': ['CWE-79', 'CWE-80'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T19:32:32Z', 'nvd_published_at': '2021-08-09T20:15:00Z'} |
1.4.0 | GHSA-xhg5-42rf-296r | 2023-06-16T17:53:30Z | 2023-06-06T16:45:29Z | null | ['CVE-2023-33959'] | notation-go's verification bypass can cause users to verify the wrong artifact | ### Impact
An attacker who controls or compromises a registry can lead a user to verify the wrong artifact.
### Patches
The problem has been fixed in the release [v1.0.0-rc.6](https://github.com/notaryproject/notation-go/releases/tag/v1.0.0-rc.6). Users should upgrade their notation-go library to [v1.0.0-rc.6](https:/... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/notaryproject/notation-go'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0-rc.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/notaryproject/notation-go/security/advisories/GHSA-xhg5-42rf-296r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33959'}, {'type': 'WEB', 'url': 'https://github.com/notaryproject/notation-go/commit/39c8ed050a65cca3f3f308534acb612096735a64'}, {'type'... | {'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T16:45:29Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hp5w-w29m-vg63 | 2023-06-28T16:30:49Z | 2023-06-21T09:30:15Z | null | ['CVE-2023-34340'] | Apache Accumulo Improper Authentication vulnerability | Improper Authentication vulnerability in Apache Software Foundation Apache Accumulo.
This issue affects Apache Accumulo: 2.1.0.
Accumulo 2.1.0 contains a defect in the user authentication process that may succeed when invalid credentials are provided. Users are advised to upgrade to 2.1.1.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.accumulo:accumulo-shell'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.1'}]}], 'versions': ['2.1.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34340'}, {'type': 'WEB', 'url': 'https://github.com/apache/accumulo/issues/3427'}, {'type': 'WEB', 'url': 'https://github.com/apache/accumulo/issues/3433'}, {'type': 'WEB', 'url': 'https://github.com/apache/accumulo/pull/3440'}, {'type': 'WEB', 'ur... | {'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-21T22:06:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4g42-gqrg-4633 | 2023-06-21T21:47:38Z | 2023-06-14T09:30:42Z | null | ['CVE-2023-34396'] | Apache Struts vulnerable to memory exhaustion | Denial of service via out of memory (OOM) owing to no sanity limit on normal form fields in multipart forms. When a Multipart request has non-file normal form fields, Struts used to bring them into memory as Strings without checking their sizes. This could lead to an OOM if developer has set struts.multipart.maxSize to... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.31'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fi... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34396'}, {'type': 'WEB', 'url': 'https://github.com/apache/struts/commit/2d6f1bc0a6f5ac575a56784ac6461816b67c4f21'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/WW/S2-064'}, {'type': 'PACKAGE', 'url': 'https://github.com/apa... | {'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T20:16:52Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gcj9-jj38-hwmc | 2023-06-09T19:31:47Z | 2023-06-09T19:31:47Z | null | ['CVE-2021-21328'] | Vapor's Metrics integration could cause a system drain | ### Impact
This is a DoS attack against anyone who Bootstraps a metrics backend for their Vapor app with the following attack vector:
1. send unlimited requests against a vapor instance with different paths. this will create “unlimited” counters and timers, which will eventually drain the system.
2. downstream service... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'purl-type:swift', 'name': 'github.com/vapor/vapor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.40.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.40.0'}}] | [{'type': 'WEB', 'url': 'https://github.com/vapor/vapor/security/advisories/GHSA-gcj9-jj38-hwmc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21328'}, {'type': 'WEB', 'url': 'https://github.com/vapor/vapor/commit/e3aa712508db2854ac0ab905696c65fd88fa7e23'}, {'type': 'PACKAGE', 'url': 'https:/... | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T19:31:47Z', 'nvd_published_at': '2021-02-26T02:15:00Z'} |
1.4.0 | GHSA-c2qf-rxjj-qqgw | 2023-07-10T22:57:56Z | 2023-06-21T06:30:28Z | null | ['CVE-2022-25883'] | semver vulnerable to Regular Expression Denial of Service | Versions of the package semver before 7.5.2 on the 7.x branch, before 6.3.1 on the 6.x branch, and all other versions before 5.7.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range, when untrusted user data is provided as a range. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'semver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.5.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'semver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.3.1'}]}]}, {'package': {'ecosystem': 'np... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25883'}, {'type': 'WEB', 'url': 'https://github.com/npm/node-semver/pull/564'}, {'type': 'WEB', 'url': 'https://github.com/npm/node-semver/pull/585'}, {'type': 'WEB', 'url': 'https://github.com/npm/node-semver/pull/593'}, {'type': 'WEB', 'url': 'ht... | {'cwe_ids': ['CWE-1333'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-22T16:52:56Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c29g-q3h3-mwcf | 2023-06-16T17:47:39Z | 2023-06-07T21:30:18Z | null | ['CVE-2023-33496'] | xxl-rpc deserialization vulnerability | xxl-rpc v1.7.0 was discovered to contain a deserialization vulnerability via the component `com.xxl.rpc.core.remoting.net.impl.netty.codec.NettyDecode#decode`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.xuxueli:xxl-rpc-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.7.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33496'}, {'type': 'WEB', 'url': 'https://github.com/edirc-wong/record/blob/main/deserialization_vulnerability_report.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/xuxueli/xxl-rpc'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T22:52:46Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vfrj-fv6p-3cpf | 2023-06-06T01:38:11Z | 2023-06-06T01:38:11Z | null | ['CVE-2023-33965'] | Brook's tproxy server is vulnerable to a drive-by command injection. | The `tproxy` server is vulnerable to a drive-by command injection. An attacker may fool a victim into visiting a malicious web page which will trigger requests to the local `tproxy` service leading to remote code execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/txthinking/brook'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20230606'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/txthinking/brook/security/advisories/GHSA-vfrj-fv6p-3cpf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33965'}, {'type': 'WEB', 'url': 'https://github.com/txthinking/brook/commit/314d7070c37babf6c38a0fe1eada872bb74bf03e'}, {'type': 'PACKAGE', 'url'... | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T01:38:11Z', 'nvd_published_at': None} |
1.4.0 | GHSA-373w-rj84-pv6x | 2023-06-29T15:02:16Z | 2023-06-29T15:02:16Z | null | [] | SafeURL-Python's hostname blocklist does not block FQDNs | ### Description
If a hostname was blacklisted, it was possible to bypass the blacklist by requesting the FQDN of the host (e.g. adding `.` to the end).
### Impact
The main purpose of this library is to block requests to internal/private IPs and these cannot be bypassed using this finding. But if a library user had spe... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'SafeURL-Python'}, 'ecosystem_specific': {'affected_functions': ['safeurl.safeurl.Options.isInList']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/IncludeSecurity/safeurl-python/security/advisories/GHSA-373w-rj84-pv6x'}, {'type': 'WEB', 'url': 'https://github.com/IncludeSecurity/safeurl-python/pull/6'}, {'type': 'WEB', 'url': 'https://github.com/IncludeSecurity/safeurl-python/commit/c4f9677f8790a58eaa1953bac286cca75a5f5... | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-29T15:02:16Z', 'nvd_published_at': None} |
1.4.0 | GHSA-455c-vqrf-mghr | 2023-06-23T21:37:38Z | 2023-06-16T09:30:24Z | null | ['CVE-2023-2783'] | Mattermost Server Missing Authorization vulnerability | Mattermost Apps Framework fails to verify that a secret provided in the incoming webhook request allowing an attacker to modify the contents of the post sent by the Apps.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.10.0'}, {'fixed': '7.10.1'}]}], 'versions': ['7.10.0']}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ranges': [{'type': 'ECOSY... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2783'}, {'type': 'PACKAGE', 'url': 'https://github.com/mattermost/mattermost-server'}, {'type': 'WEB', 'url': 'https://mattermost.com/security-updates'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-23T21:37:38Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j245-v2mh-5h6f | 2023-06-09T16:53:00Z | 2023-06-03T12:30:15Z | null | ['CVE-2023-3086'] | TeamPass vulnerable to stored Cross-site Scripting | Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.9. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'nilsteampassnet/teampass'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3086'}, {'type': 'WEB', 'url': 'https://github.com/nilsteampassnet/teampass/commit/1c0825b67eb8f8b5ecc418ff7614423a275e6a79'}, {'type': 'PACKAGE', 'url': 'https://github.com/nilsteampassnet/teampass'}, {'type': 'WEB', 'url': 'https://huntr.dev/boun... | {'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T02:06:02Z', 'nvd_published_at': None} |
1.4.0 | GHSA-97wh-6hmj-g8j9 | 2023-06-30T20:34:45Z | 2023-06-28T15:30:23Z | null | ['CVE-2023-3445'] | Spina Cross-site Scripting vulnerability | Cross-site Scripting (XSS) - Stored in GitHub repository spinacms/spina prior to 2.15.1. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'spina'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.15.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3445'}, {'type': 'WEB', 'url': 'https://github.com/spinacms/spina/commit/9adfe7b4807b3cc10dbb7351a26cc32f5d8c14a3'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/spina/CVE-2023-3445.yml'}, {'type': 'PACKAGE',... | {'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:34:45Z', 'nvd_published_at': None} |
1.4.0 | GHSA-74j8-w7f9-pp62 | 2023-06-30T20:25:52Z | 2023-06-30T20:25:52Z | null | ['CVE-2023-33190'] | Improper configuration of RBAC permissions obtaining cluster control permissions | ### Summary
Improper configuration of RBAC permissions resulted in obtaining cluster control permissions, which could control the entire cluster deployed with Sealos, as well as hundreds of pods and other resources within the cluster.
### Details
detail's is disable by publish.
### PoC
detail's is disable by publish.... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/labring/sealos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.1-rc4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/labring/sealos/security/advisories/GHSA-74j8-w7f9-pp62'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33190'}, {'type': 'WEB', 'url': 'https://github.com/labring/sealos/commit/4cdf52e55666864e5f90ed502e9fc13e18985b7b'}, {'type': 'PACKAGE', 'url': 'h... | {'cwe_ids': ['CWE-287', 'CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:25:52Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j8xg-fqg3-53r7 | 2023-06-27T15:48:19Z | 2023-06-22T06:30:18Z | null | ['CVE-2023-26115'] | word-wrap vulnerable to Regular Expression Denial of Service | All versions of the package word-wrap are vulnerable to Regular Expression Denial of Service (ReDoS) due to the usage of an insecure regular expression within the result variable.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'word-wrap'}, 'ecosystem_specific': {'affected_functions': ['word-wrap']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26115'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/word-wrap/commit/420dce9a2412b21881202b73a3c34f0edc53cb2e'}, {'type': 'PACKAGE', 'url': 'https://github.com/jonschlinkert/word-wrap'}, {'type': 'WEB', 'url': 'https://github.com/jons... | {'cwe_ids': ['CWE-1333'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-23T21:36:40Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xcf7-rvmh-g6q4 | 2023-06-21T22:07:52Z | 2023-06-21T22:07:52Z | null | [] | `openssl` `X509VerifyParamRef::set_host` buffer over-read | When this function was passed an empty string, `openssl` would attempt to call `strlen` on it, reading arbitrary memory until it reached a NUL byte.
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'openssl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.10.0'}, {'fixed': '0.10.55'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/sfackler/rust-openssl/issues/1965'}, {'type': 'WEB', 'url': 'https://github.com/sfackler/rust-openssl/pull/1968'}, {'type': 'PACKAGE', 'url': 'https://github.com/sfackler/rust-openssl'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0044.html'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-21T22:07:52Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9q9m-c65c-37pq | 2023-08-28T17:16:39Z | 2023-06-05T18:30:27Z | null | ['CVE-2023-33733'] | Reportlab vulnerable to remote code execution | Reportlab up to and including v3.6.12 allows attackers to execute arbitrary code via supplying a crafted PDF file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'reportlab'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.13'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.6.12'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33733'}, {'type': 'WEB', 'url': 'https://github.com/c53elyas/CVE-2023-33733'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36WOY22ECJCPOXHVTNCHEWOQLL7JSWP4/'}, {'type': 'WEB... | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-28T17:16:39Z', 'nvd_published_at': None} |
1.4.0 | GHSA-853p-5678-hv8f | 2023-06-16T17:57:43Z | 2023-06-14T20:11:38Z | null | ['CVE-2023-34449'] | ink! vulnerable to incorrect decoding of storage value when using `DelegateCall` | ### Summary
The return value when using delegate call mechanics, either through [`CallBuilder::delegate`](https://docs.rs/ink_env/4.2.0/ink_env/call/struct.CallBuilder.html#method.delegate) or [`ink_env::invoke_contract_delegate`](https://docs.rs/ink_env/4.2.0/ink_env/fn.invoke_contract_delegate.html), is being decoded... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'ink'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.2.1'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'ink_env'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.2.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/paritytech/ink/security/advisories/GHSA-853p-5678-hv8f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34449'}, {'type': 'WEB', 'url': 'https://github.com/paritytech/ink/pull/1450'}, {'type': 'WEB', 'url': 'https://github.com/paritytech/ink/commit/f1... | {'cwe_ids': ['CWE-253', 'CWE-754'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T20:11:38Z', 'nvd_published_at': None} |
1.4.0 | GHSA-98px-6486-j7qc | 2023-06-07T13:50:21Z | 2023-06-06T16:41:34Z | null | ['CVE-2023-32683'] | Synapse has URL deny list bypass via oEmbed and image URLs when generating previews | ### Impact
A discovered oEmbed or image URL can bypass the `url_preview_url_blacklist` setting potentially allowing server side request forgery or bypassing network policies. Impact is limited to IP addresses allowed by the `url_preview_ip_range_blacklist` setting (by default this only allows public IPs) and by the lim... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'matrix-synapse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.85.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/security/advisories/GHSA-98px-6486-j7qc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-32683'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/pull/15601'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/... | {'cwe_ids': ['CWE-863', 'CWE-918'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T16:41:34Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j3v8-v77f-fvgm | 2023-06-16T19:36:52Z | 2023-06-16T19:36:52Z | null | ['CVE-2023-34253'] | Grav Server-side Template Injection (SSTI) via Denylist Bypass Vulnerability | Hi,
actually we have sent the bug report to security@getgrav.org on 27th March 2023 and on 10th April 2023.
# Grav Server-side Template Injection (SSTI) via Denylist Bypass Vulnerability
## Summary:
| **Product** | Grav CMS |
| ----------------------- | -----------... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'getgrav/grav'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.42'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/getgrav/grav/security/advisories/GHSA-j3v8-v77f-fvgm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34253'}, {'type': 'WEB', 'url': 'https://github.com/getgrav/grav/commit/244758d4383034fe4cd292d41e477177870b65ec'}, {'type': 'WEB', 'url': 'https://g... | {'cwe_ids': ['CWE-1336', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-16T19:36:52Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pqr6-cmr2-h8hf | 2023-06-27T21:57:08Z | 2023-06-15T16:13:20Z | null | ['CVE-2023-34453'] | snappy-java's Integer Overflow vulnerability in shuffle leads to DoS | ## Summary
Due to unchecked multiplications, an integer overflow may occur, causing a fatal error.
## Impact
Denial of Service
## Description
The function [shuffle(int[] input)](https://github.com/xerial/snappy-java/blob/05c39b2ca9b5b7b39611529cc302d3d796329611/src/main/java/org/xerial/snappy/BitShuffle.java#L107) in t... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xerial.snappy:snappy-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.10.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.1.10.0'}}] | [{'type': 'WEB', 'url': 'https://github.com/xerial/snappy-java/security/advisories/GHSA-pqr6-cmr2-h8hf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34453'}, {'type': 'WEB', 'url': 'https://github.com/xerial/snappy-java/commit/820e2e074c58748b41dbd547f4edba9e108ad905'}, {'type': 'PACKAGE', '... | {'cwe_ids': ['CWE-190'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-15T16:13:20Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5w5m-pfw9-c8fp | 2023-06-16T22:09:31Z | 2023-06-09T22:53:14Z | null | ['CVE-2023-34233'] | Snowflake Python Connector vulnerable to Command Injection | ### Issue
Snowflake was informed via our bug bounty program of a command injection vulnerability in the Snowflake Python connector via SSO browser URL authentication.
### Impacted driver package:
snowflake-connector-python
### Impacted version range:
before [Version 3.0.2](https://community.snowflake.com/s/article... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'snowflake-connector-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/snowflakedb/snowflake-connector-python/security/advisories/GHSA-5w5m-pfw9-c8fp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34233'}, {'type': 'WEB', 'url': 'https://github.com/snowflakedb/snowflake-connector-python/pull/1480'}, {'type': 'WEB', 'ur... | {'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T22:53:14Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5fm9-h728-fwpj | 2023-06-06T02:06:23Z | 2023-06-06T02:06:23Z | null | [] | trust-dns vulnerable to Remote Attackers causing Denial-of-Service (packet loops) with crafted DNS packets | trust-dns and trust-dns-server are vulnerable to remotely triggered denial-of-service attacks, consuming both network and CPU resources.
DNS messages with the QR=1 bit set are responded to with a `FormErr` response.
This allows creating a traffic loop, in which these `FormErr` responses are sent nonstop between vulnera... | [] | [{'package': {'ecosystem': 'crates.io', 'name': 'trust-dns-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.22.1'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'trust-dns-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.23.0-alpha.2'}, {'fixed': '0.23... | [{'type': 'WEB', 'url': 'https://github.com/bluejekyll/trust-dns/pull/1952'}, {'type': 'PACKAGE', 'url': 'https://github.com/bluejekyll/trust-dns'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0041.html'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T02:06:23Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7vr7-cghh-ch63 | 2023-06-20T16:45:32Z | 2023-06-20T16:45:32Z | null | ['CVE-2023-34467'] | XWiki Platform may retrieve email addresses of all users | ### Impact
The mail obfuscation configuration was not fully taken into account and while the mail displayed to the end user was obfuscated:
- the rest response was also containing the mail unobfuscated
- user were able to filter and sort on the unobfuscated (allowing to infer the mail content)
The consequence was the ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-livetable-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5-milestone-1'}, {'fixed': '14.4.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-livetable-ui'}, 'ranges': [{'type': 'ECOSYS... | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-7vr7-cghh-ch63'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34467'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/71f889db9962df2d385f4298e29cfbc9050b828a#diff-5a739e5865b1f1a... | {'cwe_ids': ['CWE-402', 'CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-20T16:45:32Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6vf2-mfmr-qqqw | 2023-06-27T21:59:44Z | 2023-06-20T15:31:09Z | null | ['CVE-2020-21489'] | Liufee CMS File Upload vulnerability | File Upload vulnerability in Liufee CMS, AKA Feehicms v.2.0.8 allows a remote attacker to execute arbitrary code via the `/admin/index.php?r=admin-user%2Fupdate-self` component. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'feehi/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.8.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-21489'}, {'type': 'WEB', 'url': 'https://github.com/liufee/cms/issues/46'}, {'type': 'WEB', 'url': 'https://github.com/liufee/cms/commit/ecbfb0ca77874ead5b6e79b96a5e1f94e67475a9'}, {'type': 'PACKAGE', 'url': 'https://github.com/liufee/cms'}] | {'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-21T22:09:36Z', 'nvd_published_at': None} |
1.4.0 | GHSA-462x-c3jw-7vr6 | 2023-06-30T20:41:43Z | 2023-06-30T20:41:43Z | null | ['CVE-2023-36475'] | Parse Server vulnerable to remote code execution via MongoDB BSON parser through prototype pollution | ### Impact
An attacker can use this prototype pollution sink to trigger a remote code execution through the MongoDB BSON parser.
### Patches
Prevent prototype pollution in MongoDB database adapter.
### Workarounds
Disable remote code execution through the MongoDB BSON parser.
### Credits
- Discovered by hir0ot w... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.5.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': ... | [{'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/security/advisories/GHSA-462x-c3jw-7vr6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36475'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/issues/8674'}, {'type': 'WEB', 'url': 'https://githu... | {'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:41:43Z', 'nvd_published_at': None} |
1.4.0 | GHSA-784x-7w88-w564 | 2023-06-19T22:46:34Z | 2023-06-19T06:30:42Z | null | ['CVE-2023-34602'] | JeecgBoot vulnerable to SQL injection in queryTableDictItemsByCode | JeecgBoot up to v 3.5.1 was discovered to contain a SQL injection vulnerability via the component `queryTableDictItemsByCode` in method `org.jeecg.modules.api.controller.SystemApiController`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg-boot-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34602'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/issues/4983'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/commit/dd7bf104e7ed59142909567ecd004335c3442ec5'}, {'type': 'PACKAGE', 'url': 'https://github.co... | {'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-19T22:46:34Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5wrg-8fxp-cx9r | 2023-06-21T22:06:22Z | 2023-06-21T22:06:22Z | null | [] | passport-wsfed-saml2 Signature Bypass vulnerability | ## Information
Please note that this is not a new disclosure, and is previously reported in our [SECURITY-NOTICE.md](https://github.com/auth0/passport-wsfed-saml2/commit/520b9fc0bb4249ce83bec47e30153419f086ab70
) which we removed in favor of github advisory.
# Overview
A vulnerability was found in the validation of ... | [] | [{'package': {'ecosystem': 'npm', 'name': 'passport-wsfed-saml2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.10'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/auth0/passport-wsfed-saml2/security/advisories/GHSA-5wrg-8fxp-cx9r'}, {'type': 'WEB', 'url': 'https://github.com/auth0/passport-wsfed-saml2/pull/79'}, {'type': 'WEB', 'url': 'https://github.com/auth0/passport-wsfed-saml2/commit/f75211d42d2586a0d24a9da29ba8590e42363500'}, {'ty... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-21T22:06:22Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8jxm-xp43-qh3q | 2023-06-30T20:22:45Z | 2023-06-21T22:08:34Z | null | ['CVE-2023-34758'] | Silver vulnerable to MitM attack against implants due to a cryptography vulnerability | ### Summary
The current cryptography implementation in Sliver up to version 1.5.39 allows a MitM with access to the corresponding implant binary to execute arbitrary codes on implanted devices via intercepted and crafted responses. (Reserved CVE ID: CVE-2023-34758)
### Details
Please see [the PoC repo](https://github.... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/bishopfox/sliver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.40'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/BishopFox/sliver/security/advisories/GHSA-8jxm-xp43-qh3q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34758'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35170'}, {'type': 'WEB', 'url': 'https://github.com/BishopFox/sli... | {'cwe_ids': ['CWE-327'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-21T22:08:34Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fmrf-p77g-vv5c | 2023-07-07T16:30:42Z | 2023-06-30T18:31:02Z | null | ['CVE-2023-37302'] | MediaWiki Cross-site Scripting vulnerability | An issue was discovered in SiteLinksView.php in Wikibase in MediaWiki through 1.39.3. There is XSS via a crafted badge title attribute. This is also related to lack of escaping in wbTemplate (from resources/wikibase/templates.js) for quotes (which can be in a title attribute). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'wikibase/wikibase'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.39.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37302'}, {'type': 'WEB', 'url': 'https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Wikibase/+/933649'}, {'type': 'WEB', 'url': 'https://gerrit.wikimedia.org/r/c/mediawiki/extensions/Wikibase/+/933650'}, {'type': 'PACKAGE', 'url': 'https://githu... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:25:26Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6mjq-h674-j845 | 2023-06-23T13:56:06Z | 2023-06-20T16:33:22Z | null | ['CVE-2023-34462'] | netty-handler SniHandler 16MB allocation | ### Summary
The `SniHandler` can allocate up to 16MB of heap for each channel during the TLS handshake. When the handler or the channel does not have an idle timeout, it can be used to make a TCP server using the `SniHandler` to allocate 16MB of heap.
### Details
The `SniHandler` class is a handler that waits for the ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.netty:netty-handler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.94.Final'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/netty/netty/security/advisories/GHSA-6mjq-h674-j845'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34462'}, {'type': 'WEB', 'url': 'https://github.com/netty/netty/commit/535da17e45201ae4278c0479e6162bb4127d4c32'}, {'type': 'PACKAGE', 'url': 'https:/... | {'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-20T16:33:22Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wfg4-322g-9vqv | 2023-06-21T22:06:29Z | 2023-06-21T22:06:29Z | null | [] | memoffset allows reading uninitialized memory | memoffset allows attempt of reading data from address `0` with arbitrary type. This behavior is an undefined behavior because address `0` to `std::mem::size_of<T>` may not have valid bit-pattern with `T`. Old implementation dereferences uninitialized memory obtained from `std::mem::align_of`. Older implementation prior... | [] | [{'package': {'ecosystem': 'crates.io', 'name': 'memoffset'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Gilnaa/memoffset/issues/24'}, {'type': 'WEB', 'url': 'https://github.com/Gilnaa/memoffset/pull/50'}, {'type': 'PACKAGE', 'url': 'https://github.com/Gilnaa/memoffset'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0045.html'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-21T22:06:29Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2fqm-m4r2-fh98 | 2023-06-06T16:46:16Z | 2023-06-06T16:46:16Z | null | ['CVE-2023-33977'] | kiwitcms vulnerable to stored cross-site scripting via unrestricted file upload | ### Impact
Kiwi TCMS allows users to upload attachments to test plans, test cases, etc. Earlier versions of Kiwi TCMS had introduced upload validators in order to prevent potentially dangerous files from being uploaded and Content-Security-Policy definition to prevent cross-site-scripting attacks.
The upload validat... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'kiwitcms'}, 'ecosystem_specific': {'affected_functions': ['tcms.kiwi_attachments.validators.deny_uploads_containing_script_tag']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.4'}]}], 'database_specific': {'last_known_affected_version_range':... | [{'type': 'WEB', 'url': 'https://github.com/kiwitcms/Kiwi/security/advisories/GHSA-2fqm-m4r2-fh98'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33977'}, {'type': 'WEB', 'url': 'https://github.com/kiwitcms/kiwi/commit/d789f4b51025de4f8c747c037d02e1b0da80b034'}, {'type': 'PACKAGE', 'url': 'htt... | {'cwe_ids': ['CWE-434', 'CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T16:46:16Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jr66-9ghf-6gp3 | 2023-06-16T17:56:21Z | 2023-06-11T12:30:16Z | null | ['CVE-2023-3192'] | Froxlor Session Fixation vulnerability | Versions of froxlor/froxlor prior to release 2.1.0 did not regenerate session ids appropriately which may result in session fixation. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'froxlor/froxlor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3192'}, {'type': 'WEB', 'url': 'https://github.com/froxlor/froxlor/commit/94d9c3eedf31bc8447e3aa349e32880dde02ee52'}, {'type': 'PACKAGE', 'url': 'https://github.com/froxlor/froxlor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/f3644772-9c86... | {'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-12T18:38:30Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xp5h-f8jf-rc8q | 2023-06-09T22:41:16Z | 2023-06-09T22:41:16Z | null | ['CVE-2023-23913'] | rails-ujs vulnerable to DOM Based Cross-site Scripting contenteditable HTML Elements | NOTE: rails-ujs is part of Rails/actionview since 5.1.0.
There is a potential DOM based cross-site scripting issue in rails-ujs
which leverages the Clipboard API to target HTML elements that are
assigned the contenteditable attribute. This has the potential to
occur when pasting malicious HTML content from the clipboa... | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}, {'fixed': '6.1.7.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.4.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/5037a13614d71727af8a175063bcf6ba1a74bdbd'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/73009ea59a811b28e8ec2a9c9bc24635aa891214'}, {'type': 'WEB', 'url': 'https://discuss.rubyonrails.org/t/cve-2023-23913-dom-based-cross-site-scripting-in-... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T22:41:16Z', 'nvd_published_at': None} |
1.4.0 | GHSA-p2qf-9vp6-3jjq | 2023-06-26T22:41:59Z | 2023-06-15T15:30:15Z | null | ['CVE-2023-3276'] | HuTool XML parsing module has blind XXE vulnerability | A vulnerability, which was classified as problematic, has been found in Dromara HuTool up to 5.8.19. Affected by this issue is the function readBySax of the file XmlUtil.java of the component XML Parsing Module. The manipulation leads to xml external entity reference. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'cn.hutool:hutool-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.8.19'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3276'}, {'type': 'WEB', 'url': 'https://fbdhhhh47.github.io/2023/06/06/hutool-XXE/'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.231626'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.231626'}] | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-16T19:39:29Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7grw-xfx6-qhx6 | 2023-07-06T21:39:16Z | 2023-06-30T15:30:22Z | null | ['CVE-2023-37298'] | Joplin Cross-site Scripting vulnerability | Joplin before 2.11.5 allows XSS via a USE element in an SVG document. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'joplin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-37298'}, {'type': 'WEB', 'url': 'https://github.com/laurent22/joplin/commit/caf66068bfc474bbfd505013076ed173cd90ca83'}, {'type': 'PACKAGE', 'url': 'https://github.com/laurent22/joplin'}, {'type': 'WEB', 'url': 'https://github.com/laurent22/joplin/r... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:39:28Z', 'nvd_published_at': None} |
1.4.0 | GHSA-r7wr-4w5q-55m6 | 2023-06-16T17:47:56Z | 2023-06-16T17:47:56Z | null | ['CVE-2023-34242'] | Cilium vulnerable to information leakage via incorrect ReferenceGrant handling | ### Impact
When the [Gateway API](https://docs.cilium.io/en/v1.13/network/servicemesh/gateway-api/gateway-api/) is enabled in Cilium, the absence of a check on the namespace in which a [ReferenceGrant](https://gateway-api.sigs.k8s.io/api-types/referencegrant/) is created could result in Cilium gaining visibility of se... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/cilium/cilium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.0'}, {'fixed': '1.13.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/cilium/cilium/security/advisories/GHSA-r7wr-4w5q-55m6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34242'}, {'type': 'PACKAGE', 'url': 'https://github.com/cilium/cilium'}, {'type': 'WEB', 'url': 'https://github.com/cilium/cilium/releases/tag/v1.13... | {'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-16T17:47:56Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j6v2-mwxm-f952 | 2023-07-06T21:39:34Z | 2023-06-29T21:30:29Z | null | ['CVE-2020-26709'] | py-xml XML External Entity Injection vulnerability | py-xml v1.0 was discovered to contain an XML External Entity Injection (XXE) vulnerability which allows attackers to execute arbitrary code via a crafted XML file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'py-xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26709'}, {'type': 'WEB', 'url': 'https://github.com/PinaeOS/py-xml/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/PinaeOS/py-xml'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/py-xml/PYSEC-2023-95.y... | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:36:36Z', 'nvd_published_at': None} |
1.4.0 | GHSA-ch48-9r3q-pv7x | 2023-06-22T20:01:03Z | 2023-06-22T20:01:03Z | null | ['CVE-2023-25500'] | Vaadin vulnerable to possible information disclosure of class and method names in RPC response | ### Description
Possible information disclosure in Vaadin 10.0.0 to 10.0.23, 11.0.0 to 14.10.1, 15.0.0 to 22.0.28, 23.0.0 to 23.3.13, 24.0.0 to 24.0.6, 24.1.0.alpha1 to 24.1.0.rc2, resulting in potential information disclosure of class and method names in RPC responses by sending modified requests.
https://vaadin.com/... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.21'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.vaadin:flow-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '2.9.3... | [{'type': 'WEB', 'url': 'https://github.com/vaadin/platform/security/advisories/GHSA-ch48-9r3q-pv7x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25500'}, {'type': 'WEB', 'url': 'https://github.com/vaadin/flow/pull/16935'}, {'type': 'PACKAGE', 'url': 'https://github.com/vaadin/platform'}, {'... | {'cwe_ids': ['CWE-1295', 'CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-22T20:01:03Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4vvm-4w3v-6mr8 | 2023-07-07T17:19:37Z | 2023-06-30T20:33:57Z | null | ['CVE-2023-36464'] | pypdf and PyPDF2 possible Infinite Loop when a comment isn't followed by a character | ### Impact
An attacker who uses this vulnerability can craft a PDF which leads to an infinite loop if `__parse_content_stream` is executed. This infinite loop blocks the current process and can utilize a single core of the CPU by 100%. It does not affect memory usage. That is, for example, the case if the user extracte... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pypdf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.9.0'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'PyPDF2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'last_affected': '3.0.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/py-pdf/pypdf/security/advisories/GHSA-4vvm-4w3v-6mr8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36464'}, {'type': 'WEB', 'url': 'https://github.com/py-pdf/pypdf/pull/1828'}, {'type': 'WEB', 'url': 'https://github.com/py-pdf/pypdf/pull/969'}, {'t... | {'cwe_ids': ['CWE-835'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:33:57Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7gf7-jv65-wjmh | 2023-06-13T22:40:01Z | 2023-06-05T06:30:15Z | null | ['CVE-2023-34411'] | xml-rs vulnerable to denial of service via invalid token in XML document | The xml-rs crate >= 0.8.9 and < 0.8.14 for Rust and Crab allows a denial of service (panic) via an invalid <! token (such as <!DOCTYPEs/%<!A nesting) in an XML document. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'xml-rs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8.9'}, {'fixed': '0.8.14'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34411'}, {'type': 'WEB', 'url': 'https://github.com/netvl/xml-rs/pull/226'}, {'type': 'WEB', 'url': 'https://github.com/00xc/xml-rs/commit/0f084d45aa53e4a27476961785f59f2bd7d59a9f'}, {'type': 'WEB', 'url': 'https://github.com/netvl/xml-rs/commit/01... | {'cwe_ids': ['CWE-617'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T02:06:58Z', 'nvd_published_at': None} |
1.4.0 | GHSA-353f-5xf4-qw67 | 2023-09-01T21:30:14Z | 2023-06-06T02:01:39Z | null | ['CVE-2023-34092'] | Vite Server Options (server.fs.deny) can be bypassed using double forward-slash (//) | ### Summary
The issue involves a security vulnerability in Vite, where the server options can be bypassed using a double forward slash (`//`). This vulnerability poses a potential security risk as it can allow unauthorized access to sensitive directories and files. This document outlines the steps to address and mitiga... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'vite'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.16'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'vite'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOS... | [{'type': 'WEB', 'url': 'https://github.com/vitejs/vite/security/advisories/GHSA-353f-5xf4-qw67'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34092'}, {'type': 'WEB', 'url': 'https://github.com/vitejs/vite/pull/13348'}, {'type': 'WEB', 'url': 'https://github.com/vitejs/vite/commit/813ddd6155... | {'cwe_ids': ['CWE-200', 'CWE-50', 'CWE-706'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T02:01:39Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4g8v-vg43-wpgf | 2023-06-29T15:03:16Z | 2023-06-29T15:03:16Z | null | ['CVE-2023-28362'] | Actionpack has possible cross-site scripting vulnerability via User Supplied Values to redirect_to | The `redirect_to` method in Rails allows provided values to contain characters which are not legal in an HTTP header value. This results in the potential for downstream services which enforce RFC compliance on HTTP response headers to remove the assigned Location header. This vulnerability has been assigned the CVE ide... | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.1.7.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.5.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/1c3f93d1e90a3475f9ae2377ead25ccf11f71441'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/c9ab9b32bcdcfd8bcd55907f6c7b20b4e004cc23'}, {'type': 'WEB', 'url': 'https://discuss.rubyonrails.org/t/cve-2023-28362-possible-xss-via-user-supplied-val... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-29T15:03:16Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rx62-5cw6-x29q | 2023-06-19T22:46:24Z | 2023-06-18T09:30:17Z | null | ['CVE-2023-3308'] | Whaleal IceFrog is vulnerable to deserialization | Whaleal IceFrog v1.1.8 component Aviator Template Engine is vulnerable to deserialization of untrusted data. The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.whaleal.icefrog:icefrog-all'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3308'}, {'type': 'WEB', 'url': 'https://github.com/NanKeXXX/selfVuln_poc/blob/main/whaleal%3Aicefrog/icefrog_1.1.8_RCE.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/whaleal/icefrog'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.231804'}... | {'cwe_ids': ['CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-19T22:46:24Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hr9r-8phq-5x8j | 2023-07-03T18:39:26Z | 2023-06-28T22:49:49Z | null | ['CVE-2023-35933'] | OpenFGA vulnerable to denial of service due to circular relationship | ### Overview
OpenFGA versions v1.1.0 and prior are vulnerable to a DoS attack when certain Check and ListObjects calls are executed against authorization models that contain circular relationship definitions.
### Am I Affected?
You are affected by this vulnerability if you are using OpenFGA v1.1.0 or earlier, and if... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/openfga/openfga'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/openfga/openfga/security/advisories/GHSA-hr9r-8phq-5x8j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35933'}, {'type': 'WEB', 'url': 'https://github.com/openfga/openfga/commit/087ce392595f3c319ab3028b5089118ea4063452'}, {'type': 'PACKAGE', 'url': ... | {'cwe_ids': ['CWE-835'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-28T22:49:49Z', 'nvd_published_at': None} |
1.4.0 | GHSA-whj9-m24x-qhhp | 2023-06-22T20:00:36Z | 2023-06-22T20:00:36Z | null | ['CVE-2023-35925'] | FastAsyncWorldEdit vulnerable to Uncontrolled Resource Consumption | ### Coordinated Disclosure Timeline
- 10.06.2023: Issue reported to IntellectualSites
- 11.06.2023: Issue is acknowledged
- 12.06.2023: Issue has been fixed
- 22.06.2023: Advisory has been published
### Impacted version range
Before 2.6.3
### Details
#### Proof of Concept
As a user, do the following:
1. Select p... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fastasyncworldedit:FastAsyncWorldEdit-Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fastasyncworldedit:FastAsyncWorldEdit-Bukkit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events... | [{'type': 'WEB', 'url': 'https://github.com/IntellectualSites/FastAsyncWorldEdit/security/advisories/GHSA-whj9-m24x-qhhp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35925'}, {'type': 'WEB', 'url': 'https://github.com/IntellectualSites/FastAsyncWorldEdit/pull/2285'}, {'type': 'PACKAGE', 'ur... | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-22T20:00:36Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4gxf-g5gf-22h4 | 2023-06-12T18:34:39Z | 2023-06-10T06:30:25Z | null | ['CVE-2023-26132'] | dottie vulnerable to Prototype Pollution | Versions of the package dottie before 2.0.4 are vulnerable to Prototype Pollution due to insufficient checks, via the `set()` function and the current variable in the `/dottie.js` file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'dottie'}, 'ecosystem_specific': {'affected_functions': ['dottie.set']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26132'}, {'type': 'WEB', 'url': 'https://github.com/mickhansen/dottie.js/commit/7d3aee1c9c3c842720506e131de7e181e5c8db68'}, {'type': 'PACKAGE', 'url': 'https://github.com/mickhansen/dottie.js'}, {'type': 'WEB', 'url': 'https://github.com/mickhansen... | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-12T18:34:39Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9849-p7jc-9rmv | 2023-06-22T19:58:54Z | 2023-06-22T19:58:54Z | null | ['CVE-2022-24839'] | org.nokogiri:nekohtml vulnerable to Uncontrolled Resource Consumption | ## Summary
The fork of `org.cyberneko.html` used by Nokogiri (Rubygem) raises a `java.lang.OutOfMemoryError` exception when parsing ill-formed HTML markup.
## Severity
The maintainers have evaluated this as [**High Severity** 7.5 (CVSS3.1)](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.nokogiri:nekohtml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.22.noko2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24839'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nekohtml/commit/a800fce3b079def130ed42a408ff1d09f89e773d'}, {'type': 'PAC... | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-22T19:58:54Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qcm3-vfq5-wfr2 | 2023-06-12T20:09:30Z | 2023-06-06T18:30:20Z | null | ['CVE-2023-31606'] | RedCloth Regular Expression Denial of Service issue | A Regular Expression Denial of Service (ReDoS) issue was discovered in the `sanitize_html` function of RedCloth gem v4.0.0. This vulnerability allows attackers to cause a Denial of Service (DoS) via supplying a crafted payload. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'RedCloth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-31606'}, {'type': 'WEB', 'url': 'https://github.com/jgarber/redcloth/issues/73'}, {'type': 'WEB', 'url': 'https://github.com/e23e/CVE-2023-31606#readme'}, {'type': 'PACKAGE', 'url': 'https://github.com/jgarber/redcloth'}, {'type': 'WEB', 'url': 'ht... | {'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T20:27:29Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fwfj-8p36-rc64 | 2023-06-30T20:21:14Z | 2023-06-22T21:30:49Z | null | ['CVE-2023-35131'] | Moodle vulnerable to Cross-site Scripting | Content on the groups page required additional sanitizing to prevent an XSS risk. This flaw affects Moodle versions 4.2, 4.1 to 4.1.3, 4.0 to 4.0.8 and 3.11 to 3.11.14. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.1'}]}], 'versions': ['4.2.0']}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fi... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35131'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7A72KX4WU6GK2CX4TKYFGFASPKOEOJFC/'}, {'type': 'WEB', 'ur... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-23T21:38:20Z', 'nvd_published_at': None} |
1.4.0 | GHSA-w2rr-wvh9-m2m7 | 2023-06-27T21:01:16Z | 2023-06-14T15:30:38Z | null | ['CVE-2023-34615'] | JSONUtil vulnerable to stack exhaustion | An issue was discovered JSONUtil through 5.0 that allows attackers to cause a denial of service or other unspecified impacts via crafted objects that deeply nested structures. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'net.pwall.json:jsonutil'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34615'}, {'type': 'WEB', 'url': 'https://github.com/billdavidson/JSONUtil/issues/10'}] | {'cwe_ids': ['CWE-400', 'CWE-787'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T21:20:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x3m2-3pwj-8fj4 | 2023-06-28T16:29:10Z | 2023-06-23T15:30:43Z | null | ['CVE-2023-3304'] | Admidio Improper Access Control vulnerability | Admidio prior to 4.2.9 is vulnerable to Improper Access Control. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'admidio/admidio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3304'}, {'type': 'WEB', 'url': 'https://github.com/admidio/admidio/commit/3b248b7d5e0e60a00ee2f9a6908d538d62a5837f'}, {'type': 'PACKAGE', 'url': 'https://github.com/admidio/admidio'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/721fae61-3c8c... | {'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-23T17:01:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-q97c-2mh3-pgw9 | 2023-06-28T22:33:26Z | 2023-06-28T22:33:26Z | null | ['CVE-2023-34098'] | Shopware dependency configuration exposed | ### Impact
Due to a wrong configuration in the `.htaccess` file, the configuration file of Javascript dependencies could be read in production environments (`themes/package-lock.json`). With this information, the used Shopware version might be determined by an attacker, which could be used for further attacks.
### Pa... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'shopware/shopware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.6.0'}, {'fixed': '5.7.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.7.17'}}] | [{'type': 'WEB', 'url': 'https://github.com/shopware/shopware/security/advisories/GHSA-q97c-2mh3-pgw9'}, {'type': 'WEB', 'url': 'https://github.com/shopware5/shopware/security/advisories/GHSA-q97c-2mh3-pgw9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34098'}, {'type': 'WEB', 'url': 'https:... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-28T22:33:26Z', 'nvd_published_at': None} |
1.4.0 | GHSA-793w-g325-hrw2 | 2023-06-30T20:40:47Z | 2023-06-30T20:40:47Z | null | ['CVE-2023-36477'] | XWiki Platform vulnerable to persistent Cross-site Scripting through CKEditor Configuration pages | ### Effect
Any user with edit rights can edit all pages in the `CKEditor' space. This makes it possible to perform a variety of harmful actions, such as
- removing technical documents, leading to loss of service
- Editing the javascript configuration of CKEditor, leading to persistent XSS
### Patches
This issue has be... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-ckeditor-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.6-rc-1'}, {'fixed': '14.10.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.contrib:application-ckeditor-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'even... | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-793w-g325-hrw2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36477'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/9d9d86179457cb8dc48b4491510537878800be4f'}, {'type': 'PACKAGE... | {'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:40:47Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qcwq-55hx-v3vh | 2023-08-18T15:45:35Z | 2023-06-15T17:15:06Z | null | ['CVE-2023-34455'] | snappy-java's unchecked chunk length leads to DoS | ## Summary
Due to use of an unchecked chunk length, an unrecoverable fatal error can occur.
## Impact
Denial of Service
## Description
The code in the function [hasNextChunk](https://github.com/xerial/snappy-java/blob/05c39b2ca9b5b7b39611529cc302d3d796329611/src/main/java/org/xerial/snappy/SnappyInputStream.java#L388) ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xerial.snappy:snappy-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.10.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.1.10.0'}}] | [{'type': 'WEB', 'url': 'https://github.com/xerial/snappy-java/security/advisories/GHSA-qcwq-55hx-v3vh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34455'}, {'type': 'WEB', 'url': 'https://github.com/xerial/snappy-java/commit/3bf67857fcf70d9eea56eed4af7c925671e8eaea'}, {'type': 'PACKAGE', '... | {'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-15T17:15:06Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2jx2-qcm4-rf9h | 2023-06-09T19:32:18Z | 2023-06-09T19:32:18Z | null | ['CVE-2021-36153'] | Incomplete Internal State Distinction in GRPCWebToHTTP2ServerCodec | ### Impact
Affected gRPC Swift servers are vulnerable to precondition failures when parsing certain gRPC Web requests. This may lead to a denial of service.
### Patches
The problem has been fixed in 1.2.0.
### Workarounds
No workaround is available. Users must upgrade. | [] | [{'package': {'ecosystem': 'purl-type:swift', 'name': 'github.com/grpc/grpc-swift'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/grpc/grpc-swift/security/advisories/GHSA-2jx2-qcm4-rf9h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36153'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=35267'}, {'type': 'PACKAGE', 'url': 'https://github.com/grp... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T19:32:18Z', 'nvd_published_at': '2021-07-09T12:15:00Z'} |
1.4.0 | GHSA-779h-3r69-4f5p | 2023-06-27T19:48:33Z | 2023-06-14T15:30:38Z | null | ['CVE-2023-34610'] | json-io vulnerable to stack exhaustion | An issue was discovered json-io through 4.14.0 allows attackers to cause a denial of service or other unspecified impacts via crafted object that have deeply nested structures. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.cedarsoftware:json-io'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.14.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34610'}, {'type': 'WEB', 'url': 'https://github.com/jdereg/json-io/issues/169'}, {'type': 'PACKAGE', 'url': 'https://github.com/jdereg/json-io'}] | {'cwe_ids': ['CWE-400', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T21:04:22Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hww2-5g85-429m | 2023-07-14T21:52:02Z | 2023-06-29T15:30:34Z | null | ['CVE-2023-36617'] | URI gem has ReDoS vulnerability | A ReDoS issue was discovered in the URI component before 0.12.2 for Ruby. The URI parser mishandles invalid URLs that have specific characters. There is an increase in execution time for parsing strings to URI objects with `rfc2396_parser.rb` and `rfc3986_parser.rb`.
NOTE: this issue exists becuse of an incomplete fix... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'uri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.3'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'uri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.11.0'}, {'fixed': '0.12.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36617'}, {'type': 'WEB', 'url': 'https://github.com/ruby/uri/commit/3cd938df20db26c9439e9f681aadfb9bbeb6d1c0'}, {'type': 'WEB', 'url': 'https://github.com/ruby/uri/commit/4d02315181d8a485496f1bb107a6ab51d6f3a35f'}, {'type': 'WEB', 'url': 'https://g... | {'cwe_ids': ['CWE-1333'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-14T21:52:02Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wprv-93r4-jj2p | 2023-06-19T19:46:37Z | 2023-06-19T19:46:37Z | null | ['CVE-2023-34459'] | OpenZeppelin Contracts using MerkleProof multiproofs may allow proving arbitrary leaves for specific trees | ### Impact
When the `verifyMultiProof`, `verifyMultiProofCalldata`, `processMultiProof`, or `processMultiProofCalldata` functions are in use, it is possible to construct merkle trees that allow forging a valid multiproof for an arbitrary set of leaves.
A contract may be vulnerable if it uses multiproofs for verificat... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.7.0'}, {'fixed': '4.9.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts-upgradeable'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.7.0'}, {'fixed... | [{'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-wprv-93r4-jj2p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34459'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/commit/4d2383e17186be3e8ccf5a442e9686e... | {'cwe_ids': ['CWE-354'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-19T19:46:37Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hh54-53m7-7ffj | 2023-06-13T23:57:23Z | 2023-06-07T15:30:17Z | null | ['CVE-2023-33498'] | alist Incorrect Access Control vulnerability | alist <=3.16.3 is vulnerable to Incorrect Access Control. Low privilege accounts can upload any file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/alist-org/alist/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.16.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33498'}, {'type': 'WEB', 'url': 'https://github.com/YUyuanAN-com/loophole'}, {'type': 'PACKAGE', 'url': 'https://github.com/alist-org/alist'}] | {'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-08T18:05:49Z', 'nvd_published_at': None} |
1.4.0 | GHSA-223g-8w3x-98wr | 2023-06-09T22:40:23Z | 2023-06-09T22:40:23Z | null | ['CVE-2023-34230'] | Snowflake Connector .Net Command Injection | ### Issue
Snowflake was informed via our bug bounty program of a command injection vulnerability in the Snowflake .NET driver via SSO URL authentication.
### Impacted driver package:
snowflake-connector-net
### Impacted version range:
before [Version 2.0.18](https://community.snowflake.com/s/article/Dot-NET-Driver-... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Snowflake.Data'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.18'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/snowflakedb/snowflake-connector-net/security/advisories/GHSA-223g-8w3x-98wr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34230'}, {'type': 'PACKAGE', 'url': 'https://github.com/snowflakedb/snowflake-connector-net'}] | {'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T22:40:23Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3qh5-qqj2-c78f | 2023-06-30T20:31:37Z | 2023-06-30T20:31:37Z | null | ['CVE-2023-2422'] | Keycloak vulnerable to Improper Client Certificate Validation for OAuth/OpenID clients | When a Keycloak server is configured to support mTLS authentication for OAuth/OpenID clients, it does not properly verify the client certificate chain. A client that possesses a proper certificate can authorize itself as any other client and therefore access data that belongs to other clients. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-services'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '21.1.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/security/advisories/GHSA-3qh5-qqj2-c78f'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/commit/5c6c55945a384bfd82e51283096204dcb6f63d91'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}] | {'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:31:37Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7w2c-w47h-789w | 2023-07-11T20:19:37Z | 2023-06-12T19:50:34Z | null | ['CVE-2023-34246'] | Doorkeeper Improper Authentication vulnerability | OAuth RFC 8252 says https://www.rfc-editor.org/rfc/rfc8252#section-8.6
> the authorization server SHOULD NOT process authorization requests automatically without user consent or interaction, except when the identity of the client can be assured. **This includes the case where the user has previously approved an autho... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'doorkeeper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/doorkeeper-gem/doorkeeper/security/advisories/GHSA-7w2c-w47h-789w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34246'}, {'type': 'WEB', 'url': 'https://github.com/doorkeeper-gem/doorkeeper/issues/1589'}, {'type': 'WEB', 'url': 'https://github.com/... | {'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-12T19:50:34Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mjff-wv85-hmcj | 2023-06-27T20:28:27Z | 2023-06-19T09:30:17Z | null | ['CVE-2023-35005'] | Apache Airflow vulnerable to exposure of sensitive information | In Apache Airflow, some potentially sensitive values were being shown to the user in certain situations.
This vulnerability is mitigated by the fact configuration is not shown in the UI by default (only if `[webserver] expose_config` is set to `non-sensitive-only`), and not all uncensored values are actually sentitive... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.6.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35005'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/31788'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/31820'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https:... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-19T22:47:45Z', 'nvd_published_at': None} |
1.4.0 | GHSA-87mf-9wg6-ppf8 | 2023-06-16T17:45:05Z | 2023-06-12T18:52:23Z | null | [] | Ouroboros is Unsound | In 0.15.0 and prior, Ouroboros works internally by creating a struct where all uses of 'this are replaced by 'static. However, a recent addition to Miri checks that references passed to functions are valid during the entire execution of the function, even when those references are passed inside a struct. This poses an ... | [] | [{'package': {'ecosystem': 'crates.io', 'name': 'ouroboros'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.16.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/joshua-maros/ouroboros/issues/88'}, {'type': 'PACKAGE', 'url': 'https://github.com/joshua-maros/ouroboros'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2023-0042.html'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-12T18:52:23Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7c94-gvvj-r3mg | 2023-06-05T20:36:58Z | 2023-06-05T20:36:58Z | null | [] | cheqd-node affected by Inter-blockchain Communication (IBC) protocol "Huckleberry" vulnerability | ### Impact
This vulnerability affects the [`ibc-go` package for those running full nodes, dubbed "Huckleberry"](https://forum.cosmos.network/t/ibc-security-advisory-huckleberry/10731). According to their advisory:
> This issue is low-severity in general, and it has a low impact and likelihood of exploitation. Dependin... | [] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/cheqd/cheqd-node'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/cheqd/cheqd-node/security/advisories/GHSA-7c94-gvvj-r3mg'}, {'type': 'WEB', 'url': 'https://github.com/cheqd/cheqd-node/commit/f325f5f250e150e3e76a5a557669f67b606e34e1'}, {'type': 'WEB', 'url': 'https://forum.cosmos.network/t/ibc-security-advisory-huckleberry/10731'}, {'type'... | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-05T20:36:58Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rwcp-qrwg-56cg | 2023-06-30T19:58:47Z | 2023-06-22T15:30:23Z | null | ['CVE-2023-34927'] | Casdoor Cross-Site Request Forgery vulnerability | Casdoor v1.331.0 and below was discovered to contain a Cross-Site Request Forgery (CSRF) in the endpoint `/api/set-password`. This vulnerability allows attackers to arbitrarily change the victim user's password via supplying a crafted URL. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/casdoor/casdoor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.331.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34927'}, {'type': 'WEB', 'url': 'https://github.com/casdoor/casdoor/issues/1531'}, {'type': 'WEB', 'url': 'https://casdoor.org/'}, {'type': 'WEB', 'url': 'https://gist.github.com/omriman067/4e90a3a4ffa40984f011d8777a995469'}, {'type': 'PACKAGE', 'u... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-22T20:01:21Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rqjq-ww83-wv5c | 2023-06-06T02:04:22Z | 2023-06-03T00:30:16Z | null | ['CVE-2023-2816'] | Hashicorp Consul allows user with service:write permissions to patch remote proxy instances | Consul and Consul Enterprise allowed any user with service:write permissions to use Envoy extensions configured via service-defaults to patch remote proxy instances that target the configured service, regardless of whether the user has permission to modify the service(s) corresponding to those modified proxies. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.15.0'}, {'fixed': '1.15.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2816'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2023-16-consul-envoy-extension-downstream-proxy-configuration-by-upstream-service-owner/54525'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/consul'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T02:04:22Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jrjw-qgr2-wfcg | 2023-06-23T21:37:26Z | 2023-06-23T21:37:26Z | null | ['CVE-2023-33141'] | YARP Denial of Service Vulnerability | ### Impact
A denial of service vulnerability exists in YARP.
### Patches
If you're using YARP 1.x, you should update to NuGet package version [1.1.2](https://www.nuget.org/packages/Yarp.ReverseProxy/1.1.2).
If you're using YARP 2.0.0, you should update to NuGet package version [2.0.1](https://www.nuget.org/packages/Ya... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Yarp.ReverseProxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.1.1'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Yarp.ReverseProxy'}, 'ranges': [{'type': 'ECOSYST... | [{'type': 'WEB', 'url': 'https://github.com/microsoft/reverse-proxy/security/advisories/GHSA-jrjw-qgr2-wfcg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33141'}, {'type': 'PACKAGE', 'url': 'https://github.com/microsoft/reverse-proxy'}, {'type': 'WEB', 'url': 'https://msrc.microsoft.com/upda... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-23T21:37:26Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vmxg-wx6c-4f3r | 2023-06-28T16:28:27Z | 2023-06-23T15:30:43Z | null | ['CVE-2023-3303'] | Admidio Improper Access Control vulnerability | Admidio prior to 4.2.9 is vulnerable to Improper Access Control. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'admidio/admidio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3303'}, {'type': 'WEB', 'url': 'https://github.com/admidio/admidio/commit/3d8bafaa4e9b7a314ffdf548622a8c7b38faee8a'}, {'type': 'PACKAGE', 'url': 'https://github.com/admidio/admidio'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/65d260cc-55a9... | {'cwe_ids': ['CWE-284'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-23T17:00:55Z', 'nvd_published_at': None} |
1.4.0 | GHSA-m3v5-gjj9-rg24 | 2023-06-27T21:58:21Z | 2023-06-20T15:31:08Z | null | ['CVE-2023-33495'] | Craft CMS vulnerable to HTML injection | Craft CMS through 4.4.9 is vulnerable to HTML Injection. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.4.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33495'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftcms/cms'}, {'type': 'WEB', 'url': 'https://medium.com/@mondalsomnath9135/html-injection-in-craft-cms-application-e2b28f746212'}, {'type': 'WEB', 'url': 'https://owasp.org/www-project-web-... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-21T18:36:27Z', 'nvd_published_at': None} |
1.4.0 | GHSA-q36x-r5x4-h4q6 | 2023-06-09T19:32:49Z | 2023-06-09T19:32:49Z | null | ['CVE-2022-0618'] | Denial of service via HTTP/2 HEADERS frames padding | A program using swift-nio-http2 is vulnerable to a denial of service attack, caused by a network peer sending a specially crafted HTTP/2 frame. This attack affects all swift-nio-http2 versions from 1.0.0 to 1.19.2. It is fixed in 1.20.0 and later releases.
This vulnerability is caused by a logical error when parsing a... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'purl-type:swift', 'name': 'https://github.com/apple/swift-nio-http2.git'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.20'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/apple/swift-nio-http2/security/advisories/GHSA-q36x-r5x4-h4q6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0618'}, {'type': 'WEB', 'url': 'https://github.com/apple/swift-nio-http2/commit/ac2a5afce3dbb6795b4f78ec3f19726dc28f5617'}, {'type': 'PACKAG... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T19:32:49Z', 'nvd_published_at': '2022-03-10T17:44:00Z'} |
1.4.0 | GHSA-7g45-4rm6-3mm3 | 2023-06-14T21:01:07Z | 2023-06-14T18:30:38Z | null | ['CVE-2023-2976'] | Guava vulnerable to insecure use of temporary directory | Use of Java's default temporary directory for file creation in `FileBackedOutputStream` in Google Guava versions 1.0 to 31.1 on Unix systems and Android Ice Cream Sandwich allows other users and apps on the machine with access to the default Java temporary directory to be able to access the files created by the class.
... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.google.guava:guava'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0'}, {'fixed': '32.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2976'}, {'type': 'WEB', 'url': 'https://github.com/google/guava/issues/2575'}, {'type': 'WEB', 'url': 'https://github.com/google/guava/issues/6532'}, {'type': 'WEB', 'url': 'https://github.com/google/guava/commit/feb83a1c8fd2e7670b244d5afd23cba5aca... | {'cwe_ids': ['CWE-379', 'CWE-552'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T21:01:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-75m3-f4hr-2vh9 | 2023-06-27T19:48:59Z | 2023-06-14T15:30:39Z | null | ['CVE-2023-35110'] | jjson vulnerable to stack exhaustion | An issue was discovered jjson through 0.1.7 allows attackers to cause a denial of service or other unspecified impacts via crafted objects that deeply nested structures. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'de.grobmeier.json:jjson'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35110'}, {'type': 'WEB', 'url': 'https://github.com/grobmeier/jjson/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/grobmeier/jjson'}] | {'cwe_ids': ['CWE-400', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T21:11:23Z', 'nvd_published_at': None} |
End of preview. Expand in Data Studio
README.md exists but content is empty.
- Downloads last month
- 30