schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
20
140
details
stringlengths
56
37.2k
severity
stringlengths
2
92
affected
stringlengths
88
7.07k
references
stringlengths
139
4.72k
database_specific
stringlengths
131
185
1.4.0
GHSA-hm9v-vj3r-r55m
2023-06-30T22:19:39Z
2023-06-30T22:19:39Z
null
['CVE-2023-36807']
PyPDF2 vulnerable to possible Infinite Loop when reading malformed objects
### Impact An attacker who uses this vulnerability can craft a PDF which leads to an infinite loop. This infinite loop blocks the current process and can utilize a single core of the CPU by 100%. It does not affect memory usage. That is, for example, the case if the user extracted metadata from such a malformed PDF. #...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'PyPDF2'}, 'ecosystem_specific': {'affected_functions': ['PyPDF2._reader.PdfReader.get_object', 'PyPDF2.generic._base.NameObject.read_from_stream', 'PyPDF2.generic._data_structures.DictionaryObject.read_from_stream', 'PyPDF2.generic._data_structures.read_object']}, 'ranges': [...
[{'type': 'WEB', 'url': 'https://github.com/py-pdf/pypdf/security/advisories/GHSA-hm9v-vj3r-r55m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36807'}, {'type': 'WEB', 'url': 'https://github.com/py-pdf/pypdf/issues/1329'}, {'type': 'WEB', 'url': 'https://github.com/py-pdf/pypdf/pull/1331'}, ...
{'cwe_ids': ['CWE-835'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T22:19:39Z', 'nvd_published_at': None}
1.4.0
GHSA-hq4m-4948-64cc
2023-06-05T17:10:13Z
2023-06-05T17:10:13Z
null
['CVE-2023-34091']
Kyverno resource with a deletionTimestamp may allow policy circumvention
### Impact In versions of Kyverno prior to 1.10.0, resources which have the `deletionTimestamp` field defined can bypass validate, generate, or mutate-existing policies, even in cases where the `validationFailureAction` field is set to `Enforce`. This situation occurs as resources pending deletion were being conscio...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/kyverno/kyverno'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/kyverno/kyverno/security/advisories/GHSA-hq4m-4948-64cc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34091'}, {'type': 'PACKAGE', 'url': 'https://github.com/kyverno/kyverno'}, {'type': 'WEB', 'url': 'https://github.com/kyverno/kyverno/releases/tag...
{'cwe_ids': ['CWE-285'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-05T17:10:13Z', 'nvd_published_at': None}
1.4.0
GHSA-v3v9-3jf4-5pxx
2023-06-16T17:55:54Z
2023-06-07T21:30:18Z
null
['CVE-2023-33510']
Jeecg P3 Biz Chat allows remote attackers to read arbitrary files
Jeecg P3 Biz Chat 1.0.5 allows remote attackers to read arbitrary files through specific parameters.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.p3:jeecg-p3-biz-chat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33510'}, {'type': 'WEB', 'url': 'https://carl1l.github.io/2023/05/08/jeecg-p3-biz-chat-1-0-5-jar-has-arbitrary-file-read-vulnerability/'}]
{'cwe_ids': ['CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T22:54:03Z', 'nvd_published_at': None}
1.4.0
GHSA-ghqq-jfx7-f6m9
2023-06-14T19:26:52Z
2023-06-09T03:30:24Z
null
['CVE-2023-3172']
Froxlor vulnerable to Path Traversal
Path Traversal in GitHub repository froxlor/froxlor prior to 2.0.20.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'froxlor/froxlor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.20'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3172'}, {'type': 'WEB', 'url': 'https://github.com/froxlor/froxlor/commit/da810ea95393dfaec68a70e30b7c887c50563a7e'}, {'type': 'PACKAGE', 'url': 'https://github.com/froxlor/froxlor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/e50966cd-9222...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T22:41:31Z', 'nvd_published_at': None}
1.4.0
GHSA-75r3-38rh-pmxv
2023-06-27T21:00:35Z
2023-06-14T15:30:38Z
null
['CVE-2023-34613']
sojo vulnerable to stack exhaustion
An issue was discovered sojo through 1.1.1 allows attackers to cause a denial of service or other unspecified impacts via crafted objects that deeply nested structures.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'net.sf.sojo:sojo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34613'}, {'type': 'WEB', 'url': 'https://github.com/maddingo/sojo/issues/15'}, {'type': 'PACKAGE', 'url': 'https://github.com/maddingo/sojo'}]
{'cwe_ids': ['CWE-400', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T21:10:32Z', 'nvd_published_at': None}
1.4.0
GHSA-vj2m-9f5j-mpr5
2023-06-07T16:26:25Z
2023-06-07T16:26:25Z
null
['CVE-2022-31005']
Vapor vulnerable to denial of service in HTTP Range Request of FileMiddleware
Vapor is an HTTP web framework for Swift and [middleware](https://docs.vapor.codes/advanced/middleware/) is a logic chain between the client and a Vapor route handler. [FileMiddleware](https://docs.vapor.codes/advanced/middleware/#file-middleware) enables the serving of assets from the Public folder of a project to the...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'purl-type:swift', 'name': 'github.com/vapor/vapor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.60.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/vapor/vapor/security/advisories/GHSA-vj2m-9f5j-mpr5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31005'}, {'type': 'WEB', 'url': 'https://github.com/vapor/vapor/commit/953a349b539b3e0d3653585c8ffb50c427986df1'}, {'type': 'PACKAGE', 'url': 'https:/...
{'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-07T16:26:25Z', 'nvd_published_at': '2022-05-31T20:15:00Z'}
1.4.0
GHSA-gm2g-2xr9-pxxj
2023-07-10T10:36:45Z
2023-06-30T18:31:02Z
null
['CVE-2023-3485']
Temporal Server vulnerable to Incorrect Authorization and Insecure Default Initialization of Resource
Insecure defaults in open-source Temporal Server before version 1.20 on all platforms allows an attacker to craft a task token with access to a namespace other than the one specified in the request. Creation of this task token must be done outside of the normal Temporal server flow. It requires the namespace UUID and i...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'go.temporal.io/server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.20.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3485'}, {'type': 'PACKAGE', 'url': 'https://github.com/temporalio/temporal'}, {'type': 'WEB', 'url': 'https://github.com/temporalio/temporal/releases/tag/v1.20.0'}]
{'cwe_ids': ['CWE-1188', 'CWE-863'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:25:35Z', 'nvd_published_at': None}
1.4.0
GHSA-25mx-8f3v-8wh7
2023-06-06T01:58:04Z
2023-06-06T01:58:04Z
null
[]
sequoia-openpgp vulnerable to out-of-bounds array access leading to panic
Affected versions of the crate have several bugs where attacker-controlled input can result in the use of an out-of-bound array index. Rust detects the use of the out-of-bound index and causes the application to panic. An attacker may be able to use this to cause a denial-of-service. However, it is not possible for ...
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'sequoia-openpgp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'sequoia-openpgp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.8.1'}]}]}, {'p...
[{'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-29mf-62xx-28jq'}, {'type': 'PACKAGE', 'url': 'https://gitlab.com/sequoia-pgp/sequoia'}, {'type': 'WEB', 'url': 'https://gitlab.com/sequoia-pgp/sequoia/-/blob/main/openpgp/NEWS'}, {'type': 'WEB', 'url': 'https://lists.sequoia-pgp.org/hyperkitty/list/announ...
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T01:58:04Z', 'nvd_published_at': None}
1.4.0
GHSA-6pqf-c99p-758v
2023-06-30T20:41:50Z
2023-06-30T20:41:50Z
null
['CVE-2023-36471']
org.xwiki.commons:xwiki-commons-xml's HTML sanitizer allows form elements in restricted
### Impact The HTML sanitizer that is included in XWiki since version 14.6RC1 allowed form and input HTML tags. In the context of XWiki, this allows an attacker without script right to either create forms that can be used for phishing attacks or also in the context of a sheet, the attacker could add an input like `{{h...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.commons:xwiki-commons-xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.6-rc-1'}, {'fixed': '14.10.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.commons:xwiki-commons-xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduc...
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-6pqf-c99p-758v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36471'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-commons/commit/99484d48e899a68a1b6e33d457825b776c6fe8c3'}, {'type': 'PACKAGE',...
{'cwe_ids': ['CWE-74', 'CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:41:50Z', 'nvd_published_at': None}
1.4.0
GHSA-5ghv-wxh9-7356
2023-06-14T20:33:37Z
2023-06-14T15:30:37Z
null
['CVE-2023-35149']
Jenkins Digital.ai App Management Publisher Plugin missing permission checks
Jenkins Digital.ai App Management Publisher Plugin 2.6 and earlier does not perform permission checks in several HTTP endpoints. This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials sto...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ease-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35149'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-06-14/#SECURITY-2911'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/06/14/5'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T20:33:37Z', 'nvd_published_at': None}
1.4.0
GHSA-3p62-6fjh-3p5h
2023-07-07T21:47:57Z
2023-06-30T20:30:50Z
null
['CVE-2022-4361']
Keycloak vulnerable to cross-site scripting when validating URI-schemes on SAML and OIDC
AssertionConsumerServiceURL is a Java implementation for SAML Service Providers (org.keycloak.protocol.saml). Affected versions of this package are vulnerable to Cross-site Scripting (XSS). AssertionConsumerServiceURL allows XSS when sending a crafted SAML XML request.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-services'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '21.1.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/security/advisories/GHSA-3p62-6fjh-3p5h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4361'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/commit/a1cfe6e24e5b34792699a00b8b4a8016a5929e3a'}, {'type': 'WEB', 'url': '...
{'cwe_ids': ['CWE-79', 'CWE-81'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:30:50Z', 'nvd_published_at': None}
1.4.0
GHSA-q3q5-qvh5-cmw5
2023-06-27T21:59:07Z
2023-06-20T15:31:08Z
null
['CVE-2020-21174']
liufee CMS File Upload vulnerability
File Upload vulnerability in liufee CMS v.2.0.7.1 allows a remote attacker to execute arbitrary code via the image suffix function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'feehi/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.8.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-21174'}, {'type': 'WEB', 'url': 'https://github.com/liufee/cms/issues/44'}, {'type': 'WEB', 'url': 'https://github.com/liufee/cms/commit/ecbfb0ca77874ead5b6e79b96a5e1f94e67475a9'}, {'type': 'PACKAGE', 'url': 'https://github.com/liufee/cms'}]
{'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-21T22:09:57Z', 'nvd_published_at': None}
1.4.0
GHSA-7mcw-xmx3-7p8m
2023-06-21T17:18:42Z
2023-06-13T18:30:39Z
null
['CVE-2023-33695']
Insecure Temporary File in HuTool
Hutool v5.8.17 and below was discovered to contain an information disclosure vulnerability via the `File.createTempFile()` function at `/core/io/FileUtil.java`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'cn.hutool:hutool-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.8.19'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33695'}, {'type': 'WEB', 'url': 'https://github.com/dromara/hutool/issues/3103'}, {'type': 'WEB', 'url': 'https://github.com/dromara/hutool/commit/c33550f703f5d1d7dd71ad2992d79a5e5532ce2c'}, {'type': 'PACKAGE', 'url': 'https://github.com/dromara/hu...
{'cwe_ids': ['CWE-377', 'CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T16:38:27Z', 'nvd_published_at': None}
1.4.0
GHSA-f5h4-wmp5-xhg6
2023-06-30T20:29:25Z
2023-06-30T20:29:25Z
null
['CVE-2023-2585']
Client Spoofing within the Keycloak Device Authorisation Grant
Under certain pre-conditions the vulnerability allows an attacker to spoof parts of the device flow and use a device_code to retrieve an access token for other OAuth clients.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-services'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '21.1.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-server-spi-private'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}...
[{'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/security/advisories/GHSA-f5h4-wmp5-xhg6'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/commit/04e6244c387a1bde86184635a0049537611e3915'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:29:25Z', 'nvd_published_at': None}
1.4.0
GHSA-jf2f-hvxx-4rqx
2023-06-26T22:06:15Z
2023-06-16T18:30:33Z
null
['CVE-2023-34660']
jeecg-boot unrestricted file upload vulnerability
jeecg-boot V3.5.0 has an unauthorized arbitrary file upload in `/jeecg-boot/jmreport/upload` interface.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg-boot-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34660'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/issues/4990'}, {'type': 'PACKAGE', 'url': 'https://github.com/jeecgboot/jeecg-boot'}]
{'cwe_ids': ['CWE-434'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-16T20:27:31Z', 'nvd_published_at': None}
1.4.0
GHSA-3w3w-pxmm-2w2j
2023-06-16T22:12:34Z
2023-06-12T03:30:17Z
null
['CVE-2020-36732']
crypto-js uses insecure random numbers
The crypto-js package before 3.2.1 for Node.js generates random numbers by concatenating the string "0." with an integer, which makes the output more predictable than necessary.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'crypto-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36732'}, {'type': 'WEB', 'url': 'https://github.com/brix/crypto-js/issues/254'}, {'type': 'WEB', 'url': 'https://github.com/brix/crypto-js/issues/256'}, {'type': 'WEB', 'url': 'https://github.com/brix/crypto-js/pull/257/commits/e4ac157d8b75b962d653...
{'cwe_ids': ['CWE-330'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-13T12:44:48Z', 'nvd_published_at': None}
1.4.0
GHSA-wmxx-2pvr-x7j6
2023-06-14T20:30:40Z
2023-06-14T15:30:37Z
null
['CVE-2023-35145']
Jenkins Sonargraph Integration Plugin vulnerable to Stored Cross-site Scripting
Jenkins Sonargraph Integration Plugin 5.0.1 and earlier does not correctly escape the file path and the project name for the Log file field form validation. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:sonargraph-integration'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35145'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-06-14/#SECURITY-3155'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/06/14/5'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T20:29:11Z', 'nvd_published_at': None}
1.4.0
GHSA-5cr9-5jx3-2g39
2023-06-09T15:03:08Z
2023-06-06T14:13:08Z
null
['CVE-2023-34103']
avo vulnerable to Stored XSS (Cross Site Scripting) in html content based fields
### Summary Some avo fields are vulnerable to XSS when rendering html based content. ### Details During the analysis of the web application, a rendered field was discovered that did not filter JS / HTML tags in a safe way and can be abused to execute js code on a client side. The trix field uses the trix editor in the...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'avo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.33.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.33.2'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'avo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'in...
[{'type': 'WEB', 'url': 'https://github.com/avo-hq/avo/security/advisories/GHSA-5cr9-5jx3-2g39'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34103'}, {'type': 'WEB', 'url': 'https://github.com/avo-hq/avo/commit/7891c01e1fba9ca5d7dbccc43d27f385e5d08563'}, {'type': 'PACKAGE', 'url': 'https://g...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T14:13:08Z', 'nvd_published_at': None}
1.4.0
GHSA-x2w4-c67p-g44j
2023-06-07T15:08:08Z
2023-06-06T21:30:18Z
null
['CVE-2023-2801']
Grafana Missing Synchronization vulnerability
Grafana is an open-source platform for monitoring and observability. Using public dashboards users can query multiple distinct data sources using mixed queries. However such query has a possibility of crashing a Grafana instance. The only feature that uses mixed queries at the moment is public dashboards, but it's a...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.4.12'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.5.0'}, {'fixed': '9.5.3'}...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2801'}, {'type': 'PACKAGE', 'url': 'https://github.com/grafana/grafana'}, {'type': 'WEB', 'url': 'https://grafana.com/security/security-advisories/cve-2023-2801/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230706-0002/'}]
{'cwe_ids': ['CWE-662', 'CWE-820'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-07T15:08:08Z', 'nvd_published_at': None}
1.4.0
GHSA-7fj7-39wj-c64f
2023-06-07T16:01:53Z
2023-06-07T16:01:53Z
null
['CVE-2022-3215']
SwiftNIO vulnerable to Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting')
`NIOHTTP1` and projects using it for generating HTTP responses, including SwiftNIO, can be subject to a HTTP Response Injection attack. This occurs when a HTTP/1.1 server accepts user generated input from an incoming request and reflects it into a HTTP/1.1 response header in some form. A malicious user can add newlines...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'purl-type:swift', 'name': 'github.com/apple/swift-nio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.41.0'}, {'fixed': '2.42.0'}]}]}, {'package': {'ecosystem': 'purl-type:swift', 'name': 'github.com/apple/swift-nio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced...
[{'type': 'WEB', 'url': 'https://github.com/apple/swift-nio/security/advisories/GHSA-7fj7-39wj-c64f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3215'}, {'type': 'WEB', 'url': 'https://github.com/apple/swift-nio/commit/a16e2f54a25b2af217044e5168997009a505930f'}, {'type': 'PACKAGE', 'url': '...
{'cwe_ids': ['CWE-113', 'CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-07T16:01:53Z', 'nvd_published_at': '2022-09-28T20:15:00Z'}
1.4.0
GHSA-46g3-f9r8-xj4v
2023-06-06T01:51:34Z
2023-06-06T01:51:34Z
null
['CVE-2023-2984']
Pimcore vulnerable to Pre-Auth Path Traversal in pimcore_log parameter
### Impact A path traversal vulnerability exists in the CMS, which allows an attacker to overwrite or modify sensitive files by manipulating the `pimcore_log` parameter.This can lead to potential denial of service---key file overwrite. The impact of this vulnerability allows attackers to: - Overwrite or modify sensi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.22'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-46g3-f9r8-xj4v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2984'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/e8dbc4da58ae86618bceb67ed35ce23e5e54d2ed'}, {'type': 'PACKAGE', 'url': '...
{'cwe_ids': ['CWE-29'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T01:51:34Z', 'nvd_published_at': None}
1.4.0
GHSA-mrcj-5qxr-vhp2
2023-07-07T16:28:14Z
2023-06-30T18:31:01Z
null
['CVE-2023-34840']
angular-ui-notification Cross-site Scripting vulnerability
angular-ui-notification v0.1.0, v0.2.0, and v0.3.6 was discovered to contain a cross-site scripting (XSS) vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'angular-ui-notification'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.0'}, {'last_affected': '0.3.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34840'}, {'type': 'WEB', 'url': 'https://github.com/Xh4H/CVE-2023-34840'}, {'type': 'PACKAGE', 'url': 'https://github.com/alexcrack/angular-ui-notification'}, {'type': 'WEB', 'url': 'http://alexcrack.com'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:35:15Z', 'nvd_published_at': None}
1.4.0
GHSA-wmff-grcw-jcfm
2023-06-21T18:35:21Z
2023-06-21T18:35:21Z
null
['CVE-2023-34460']
Tauri vulnerable to Regression on Filesystem Scope Checks for Dotfiles
### Impact The 1.4.0 release includes a regression on the filesystem scope check for dotfiles on Linux and macOS. Previously dotfiles (eg. `$HOME/.ssh/`) were not implicitly allowed by the glob wildcard scopes (eg. `$HOME/*`), but a regression was introduced when a configuration option for this behavior was implemente...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'tauri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.1'}]}], 'versions': ['1.4.0']}]
[{'type': 'WEB', 'url': 'https://github.com/tauri-apps/tauri/security/advisories/GHSA-6mv3-wm7j-h4w5'}, {'type': 'WEB', 'url': 'https://github.com/tauri-apps/tauri/security/advisories/GHSA-wmff-grcw-jcfm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34460'}, {'type': 'WEB', 'url': 'https://g...
{'cwe_ids': ['CWE-285'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-21T18:35:21Z', 'nvd_published_at': None}
1.4.0
GHSA-fpvg-m786-h5vr
2023-06-26T20:55:12Z
2023-06-13T18:30:39Z
null
['CVE-2023-33568']
Dolibarr vulnerable to unauthenticated database access
An issue in Dolibarr v16.0.0 to v16.0.5 allows unauthenticated attackers to perform a database dump and access a company's entire customer file, prospects, suppliers, and employee information if a contact file exists.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '16.0.0'}, {'fixed': '16.0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33568'}, {'type': 'WEB', 'url': 'https://github.com/Dolibarr/dolibarr/commit/bb7b69ef43673ed403436eac05e0bc31d5033ff7'}, {'type': 'WEB', 'url': 'https://github.com/Dolibarr/dolibarr/commit/be82f51f68d738cce205f4ce5b469ef42ed82d9e'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-200', 'CWE-552'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T16:23:01Z', 'nvd_published_at': None}
1.4.0
GHSA-239c-6cv2-wwx8
2023-06-07T16:07:36Z
2023-06-07T16:07:36Z
null
['CVE-2022-1642']
Swift-corelibs-foundation denial of service in JSON decoding with JSONDecoder
### Impact A program using swift-corelibs-foundation is vulnerable to a denial of service attack caused by a potentially malicious source producing a JSON document containing a type mismatch. This vulnerability is caused by the interaction between a deserialization mechanism offered by the Swift standard library, the...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'purl-type:swift', 'name': 'github.com/apple/swift-corelibs-foundation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/apple/swift-corelibs-foundation/security/advisories/GHSA-239c-6cv2-wwx8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1642'}, {'type': 'WEB', 'url': 'https://github.com/apple/swift-corelibs-foundation/commit/b541491f73b39007a38f3ff5a0cbe89d09ef1614...
{'cwe_ids': ['CWE-704'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-07T16:07:36Z', 'nvd_published_at': '2022-06-16T17:15:00Z'}
1.4.0
GHSA-hcpw-v727-64qh
2023-06-20T16:35:50Z
2023-06-19T21:30:21Z
null
['CVE-2023-3315']
Jenkins Team Concert Plugin does not perform permission checks in methods implementing form validation
Jenkins Team Concert Plugin 2.4.1 and earlier does not perform permission checks in methods implementing form validation. This allows attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system. Team Concert Plugin 2.4.2 requires Overall/A...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:teamconcert'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3315'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-06-14/#SECURITY-2932'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-20T16:35:50Z', 'nvd_published_at': None}
1.4.0
GHSA-8vm8-38pc-8xhh
2023-06-09T16:52:45Z
2023-06-03T12:30:14Z
null
['CVE-2023-3084']
TeamPass vulnerable to stored Cross-site Scripting
Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.9.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'nilsteampassnet/teampass'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3084'}, {'type': 'WEB', 'url': 'https://github.com/nilsteampassnet/teampass/commit/61b9b7d4e33bbaad2cd61a7ee988f9c22298bf1a'}, {'type': 'PACKAGE', 'url': 'https://github.com/nilsteampassnet/teampass'}, {'type': 'WEB', 'url': 'https://huntr.dev/boun...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T02:05:45Z', 'nvd_published_at': None}
1.4.0
GHSA-g75c-cjr6-39mc
2023-06-20T16:44:55Z
2023-06-20T16:44:55Z
null
['CVE-2023-34465']
XWiki Platform's Mail.MailConfig can be edited by any user with edit rights
### Impact `Mail.MailConfig` can be edited by any logged-in user by default. Consequently, they can: - change the mail obfuscation configuration - view and edit the mail sending configuration, including the smtp domain name and credentials. ### Patches The problem has been patched on XWiki 14.4.8, 15.1, and 14.10.6. ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-mail-send-default'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.8-rc-1'}, {'fixed': '14.4.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-mail-send-default'}, 'ranges': [{'type': 'EC...
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-g75c-cjr6-39mc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34465'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/8910b8857d3442d2e8142f655fdc0512930354d1'}, {'type': 'WEB', '...
{'cwe_ids': ['CWE-269'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-20T16:44:55Z', 'nvd_published_at': None}
1.4.0
GHSA-3p2q-mh7q-9pxj
2023-06-19T20:16:20Z
2023-06-19T03:30:19Z
2023-06-19T20:16:20Z
[]
Duplicate Advisory: elFinder vulnerable to path traversal in LocalVolumeDriver connector
### Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-wm5g-p99q-66g4. This link is maintained to preserve external references. ### Original Description _joinPath in elFinderVolumeLocalFileSystem.class.php in elFinder before 2.1.62 allows path traversal in the PHP LocalVolumeDriver c...
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'studio-42/elfinder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.62'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Studio-42/elFinder/security/advisories/GHSA-wm5g-p99q-66g4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35840'}, {'type': 'WEB', 'url': 'https://github.com/Studio-42/elFinder/commit/bb9aaa7b096a1b83f2f85657c43f12131ece2891'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-19T20:16:20Z', 'nvd_published_at': None}
1.4.0
GHSA-cvgc-465m-cw9g
2023-06-19T22:46:38Z
2023-06-19T06:30:42Z
null
['CVE-2023-34603']
JeecgBoot vulnerable to SQL injection in queryFilterTableDictInfo
JeecgBoot up to v 3.5.1 was discovered to contain a SQL injection vulnerability via the component `queryFilterTableDictInfo` in method `org.jeecg.modules.api.controller.SystemApiController`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg-boot-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34603'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/issues/4984'}, {'type': 'PACKAGE', 'url': 'https://github.com/jeecgboot/jeecg-boot'}]
{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-19T22:46:38Z', 'nvd_published_at': None}
1.4.0
GHSA-8qxh-2gh8-r923
2023-06-12T18:34:26Z
2023-06-12T18:34:26Z
null
[]
cheqd-node subject to Cosmos SDK "Barberry" vulnerability
### Impact This [vulnerability dubbed "Barberry" affects the Cosmos SDK framework](https://forum.cosmos.network/t/cosmos-sdk-security-advisory-barberry/10825) used by `cheqd-node` as base. It impacts the way Cosmos SDK handles vesting accounts, and can therefore be a high-impact vulnerability for any network running t...
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/cheqd/cheqd-node'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/cheqd/cheqd-node/security/advisories/GHSA-8qxh-2gh8-r923'}, {'type': 'WEB', 'url': 'https://forum.cosmos.network/t/cosmos-sdk-security-advisory-barberry/10825'}, {'type': 'PACKAGE', 'url': 'https://github.com/cheqd/cheqd-node'}, {'type': 'WEB', 'url': 'https://github.com/cosm...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-12T18:34:26Z', 'nvd_published_at': None}
1.4.0
GHSA-3qqg-pgqq-3695
2023-06-09T22:51:19Z
2023-06-09T22:51:19Z
null
['CVE-2023-34239']
Gradio vulnerable to arbitrary file read and proxying of arbitrary URLs
### Impact There are two separate security vulnerabilities here: (1) a security vulnerability that allows users to read arbitrary files on the machines that are running shared Gradio apps (2) the ability of users to use machines that are sharing Gradio apps to proxy arbitrary URLs ### Patches Both problems have been s...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'gradio'}, 'ecosystem_specific': {'affected_functions': ['gradio.blocks.Blocks.from_config', 'gradio.blocks.Blocks.render']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.34.0'}]}], 'database_specific': {'last_known_affected_version_range': '<=...
[{'type': 'WEB', 'url': 'https://github.com/gradio-app/gradio/security/advisories/GHSA-3qqg-pgqq-3695'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34239'}, {'type': 'WEB', 'url': 'https://github.com/gradio-app/gradio/pull/4370'}, {'type': 'WEB', 'url': 'https://github.com/gradio-app/gradio/...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T22:51:19Z', 'nvd_published_at': None}
1.4.0
GHSA-pm73-x2h5-cmj3
2023-07-05T17:16:47Z
2023-06-23T09:30:17Z
null
['CVE-2023-31469']
Apache StreamPipes Improper Privilege Management vulnerability
A REST interface in Apache StreamPipes (versions 0.69.0 to 0.91.0) was not properly restricted to admin-only access. This allowed a non-admin user with valid login credentials to elevate privileges beyond the initially assigned roles. The issue is resolved by upgrading to StreamPipes 0.92.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.streampipes:streampipes-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.69.0'}, {'fixed': '0.92.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-31469'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/streampipes'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/c4y8kf9bzpf36v4bottfmd8tc9cxo19m'}]
{'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-23T21:44:46Z', 'nvd_published_at': None}
1.4.0
GHSA-h87r-f4vc-mchv
2023-06-06T01:51:09Z
2023-06-06T01:51:09Z
null
[]
PocketMine-MP vulnerable to improperly checked dropped item count leading to server crash
### Impact In 4.18.0, the network handling of inventories was completely revamped. Due to this, a bug was introduced which allowed players to request that the server drop more of an item than they had available in their hotbar. This did not lead to any duplication issues, but instead led to a server crash, and is beli...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pocketmine/pocketmine-mp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.18.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-h87r-f4vc-mchv'}, {'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/commit/58974765a68f63a9968a7ff3a06f584ff2ee08d2'}, {'type': 'PACKAGE', 'url': 'https://github.com/pmmp/PocketMine-MP'}, {'type': 'WEB', 'url': 'https://...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T01:51:09Z', 'nvd_published_at': None}
1.4.0
GHSA-9766-v29c-4vm7
2023-07-06T16:02:24Z
2023-06-27T12:30:42Z
null
['CVE-2023-34395']
Apache Airflow ODBC Provider Argument Injection vulnerability
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability in Apache Software Foundation Apache Airflow ODBC Provider. In OdbcHook, A privilege escalation vulnerability exists in a system due to controllable ODBC driver parameters that allow the loading of arbitrary dynamic-link li...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow-providers-odbc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34395'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/31713'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/commit/2844dad1c762f5c7dd1271866d3661bf66657300'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airf...
{'cwe_ids': ['CWE-88'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:26:04Z', 'nvd_published_at': None}
1.4.0
GHSA-66gv-5m8q-rrjc
2023-06-27T20:18:52Z
2023-06-14T15:30:38Z
null
['CVE-2023-34614']
jsonij vulnerable to stack exhaustion
An issue was discovered jmarsden/jsonij through 0.5.2 allows attackers to cause a denial of service or other unspecified impacts via crafted objects that deeply nested structures.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'cc.plural:jsonij'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.5.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34614'}, {'type': 'PACKAGE', 'url': 'https://bitbucket.org/jmarsden/jsonij'}, {'type': 'WEB', 'url': 'https://bitbucket.org/jmarsden/jsonij/issues/7/stack-overflow-error-caused-by-jsonij'}]
{'cwe_ids': ['CWE-400', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T20:49:08Z', 'nvd_published_at': None}
1.4.0
GHSA-x234-mg7q-m8g8
2023-06-22T19:59:47Z
2023-06-22T19:59:47Z
null
['CVE-2023-35159']
XWiki Platform vulnerable to reflected cross-site scripting via xredirect parameter in deletespace template
### Impact Users are able to forge an URL with a payload allowing to inject Javascript in the page (XSS). It's possible to exploit the deletespace template to perform a XSS, e.g. by using URL such as: > xwiki/bin/deletespace/Sandbox/?xredirect=javascript:alert(document.domain) This vulnerability exists since XWiki 3....
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web-templates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.4-milestone-1'}, {'fixed': '14.10.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web-templates'}, 'ranges': [{'type': 'ECO...
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-x234-mg7q-m8g8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35159'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/5c20ff5e3bdea50f1053fe99a27e011b8d0e4b34'}, {'type': 'PACKAGE...
{'cwe_ids': ['CWE-79', 'CWE-87'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-22T19:59:47Z', 'nvd_published_at': None}
1.4.0
GHSA-qfh9-8p57-mjjj
2023-06-12T18:55:56Z
2023-06-12T15:30:28Z
null
['CVE-2023-33290']
git-url-parse crate vulnerable to Regular Expression Denial of Service
The git-url-parse crate through 0.4.4 for Rust allows Regular Expression Denial of Service (ReDos) via a crafted URL to `normalize_url` in `lib.rs`, a similar issue to CVE-2023-32758 (Python).
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'git-url-parse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.4.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33290'}, {'type': 'WEB', 'url': 'https://github.com/tjtelan/git-url-parse-rs/issues/51'}, {'type': 'PACKAGE', 'url': 'https://github.com/tjtelan/git-url-parse-rs'}, {'type': 'WEB', 'url': 'https://github.com/tjtelan/git-url-parse-rs/blob/main/src/l...
{'cwe_ids': ['CWE-1333'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-12T18:55:56Z', 'nvd_published_at': None}
1.4.0
GHSA-4xm7-5q79-3fch
2023-06-22T20:00:00Z
2023-06-22T20:00:00Z
null
['CVE-2023-35161']
XWiki Platform vulnerable to reflected cross-site scripting via xredirect parameter in DeleteApplication page
### Impact Users are able to forge an URL with a payload allowing to inject Javascript in the page (XSS). It's possible to exploit the DeleteApplication page to perform a XSS, e.g. by using URL such as: > xwiki/bin/view/AppWithinMinutes/DeleteApplication?appName=Menu&resolve=true&xredirect=javascript:alert(document.do...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-appwithinminutes-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.2-milestone-1'}, {'fixed': '14.10.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-appwithinminutes-ui'}, 'ranges': [{...
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-4xm7-5q79-3fch'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35161'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/8f5a889b7cd140770e54f5b4195d88058790e305'}, {'type': 'PACKAGE...
{'cwe_ids': ['CWE-79', 'CWE-87'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-22T20:00:00Z', 'nvd_published_at': None}
1.4.0
GHSA-g3hh-q55f-9g3w
2023-06-09T22:42:22Z
2023-06-08T15:30:20Z
null
['CVE-2023-3163']
RuoYi Uncontrolled Resource Consumption vulnerability
A vulnerability was found in y_project RuoYi up to 4.7.7. It has been classified as problematic. Affected is the function filterKeyword. The manipulation of the argument value leads to resource consumption. VDB-231090 is the identifier assigned to this vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.ruoyi:ruoyi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.7.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3163'}, {'type': 'PACKAGE', 'url': 'https://gitee.com/y_project/RuoYi'}, {'type': 'WEB', 'url': 'https://gitee.com/y_project/RuoYi/issues/I78DOR'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.231090'}, {'type': 'WEB', 'url': 'https://vuldb.com...
{'cwe_ids': ['CWE-400', 'CWE-89'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T22:42:22Z', 'nvd_published_at': None}
1.4.0
GHSA-fm68-j7ww-h9xf
2023-06-30T20:41:57Z
2023-06-30T20:41:57Z
null
['CVE-2023-36470']
XWiki Platform vulnerable to Code Injection in icon themes
### Impact By either creating a new or editing an existing document with an icon set, an attacker can inject XWiki syntax and Velocity code that is executed with programming rights and thus allows remote code execution. There are different attack vectors, the simplest is the Velocity code in the icon set's HTML or XWik...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-icon-default'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.2-milestone-1'}, {'fixed': '14.10.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-icon-script'}, 'ranges': [{'type': 'ECOSYS...
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-fm68-j7ww-h9xf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36470'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/46b542854978e9caa687a5c2b8817b8b17877d94'}, {'type': 'WEB', '...
{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:41:57Z', 'nvd_published_at': None}
1.4.0
GHSA-fp7h-f9f5-x4q7
2023-06-20T16:44:35Z
2023-06-20T16:44:35Z
null
['CVE-2023-34464']
XWiki vulnerable to stored cross-site scripting via any wiki document and the displaycontent/rendercontent template
### Impact Any user who can edit a document in a wiki like the user profile can create a stored XSS attack by putting plain HTML code into that document and then tricking another user to visit that document with the `displaycontent` or `rendercontent` template and plain output syntax. For example, edit any document wi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.1'}, {'fixed': '14.4.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web-templates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{...
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-fp7h-f9f5-x4q7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34464'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/53e8292a31ec70fba5e1d705a4ac443658b9e6df'}, {'type': 'PACKAGE...
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-20T16:44:35Z', 'nvd_published_at': None}
1.4.0
GHSA-xc8m-28vv-4pjc
2023-06-30T20:33:26Z
2023-06-16T09:30:24Z
null
['CVE-2023-2431']
Kubelet vulnerable to bypass of seccomp profile enforcement
A security issue was discovered in Kubelet that allows pods to bypass the seccomp profile enforcement. Pods that use localhost type for seccomp profile but specify an empty profile field, are affected by this issue. In this scenario, this vulnerability allows the pod to run in unconfined (seccomp disabled) mode. This b...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.24.14'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.25.0'}, {'fixed': '1.25.10'}]}]}, {'packag...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2431'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/118690'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/pull/117020'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/pull/117116'}...
{'cwe_ids': ['CWE-1287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-16T19:42:18Z', 'nvd_published_at': None}
1.4.0
GHSA-pqwh-c2f3-vxmq
2023-06-09T19:31:54Z
2023-06-09T19:31:54Z
null
['CVE-2021-32742']
Untrusted data fed into `Data.init(base32Encoded:)` can result in exposing server memory and/or crash
### Impact A bug in the `Data.init(base32Encoded:)` function opens up the potential for exposing server memory and/or crashing the server (Denial of Service) for applications where untrusted data can end up in said function. Vapor does not currently use this function itself so this only impact applications that use the...
[]
[{'package': {'ecosystem': 'purl-type:swift', 'name': 'github.com/vapor/vapor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.47.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/vapor/vapor/security/advisories/GHSA-pqwh-c2f3-vxmq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32742'}, {'type': 'PACKAGE', 'url': 'https://github.com/vapor/vapor'}, {'type': 'WEB', 'url': 'https://github.com/vapor/vapor/releases/tag/4.47.2'}]
{'cwe_ids': ['CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T19:31:54Z', 'nvd_published_at': '2021-07-09T14:15:00Z'}
1.4.0
GHSA-gc34-5v43-h7v8
2023-06-22T20:04:01Z
2023-06-13T18:30:40Z
null
['CVE-2023-3224']
nuxt Code Injection vulnerability
he Nuxt dev server between versions 3.4.0 and 3.4.3 is vulnerable to code injection when it is exposed publicly.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'nuxt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.4.0'}, {'fixed': '3.4.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3224'}, {'type': 'WEB', 'url': 'https://github.com/nuxt/nuxt/issues/21694'}, {'type': 'WEB', 'url': 'https://github.com/nuxt/nuxt/commit/65a8f4eb3ef1b249a95fd59e323835a96428baff'}, {'type': 'WEB', 'url': 'https://github.com/nuxt/nuxt/commit/72ba53e...
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-21T22:09:01Z', 'nvd_published_at': None}
1.4.0
GHSA-f4m6-x2xj-jc7w
2023-06-16T19:50:28Z
2023-06-16T15:30:19Z
null
['CVE-2023-35783']
ke_search (aka Faceted Search) vulnerable to Cross-Site Scripting
The ke_search (aka Faceted Search) extension before 4.0.3, 4.1.x through 4.6.x before 4.6.6, and 5.x before 5.0.2 for TYPO3 allows XSS via indexed data.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'tpwd/ke_search'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'tpwd/ke_search'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.6.6'}]}]}, {...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35783'}, {'type': 'WEB', 'url': 'https://github.com/tpwd/ke_search/commit/14fa0703c2469e04eb398be4ae6268ec6ad6e720'}, {'type': 'WEB', 'url': 'https://github.com/tpwd/ke_search/commit/b0f05d7e7e207bc0d5051bd96f3ff43c5c3658c6'}, {'type': 'WEB', 'url'...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-16T19:50:28Z', 'nvd_published_at': None}
1.4.0
GHSA-chw4-88xc-79w6
2023-06-16T17:47:20Z
2023-06-09T03:30:24Z
null
['CVE-2023-3173']
Froxlor vulnerable to Improper Restriction of Excessive Authentication Attempts
Improper Restriction of Excessive Authentication Attempts in GitHub repository froxlor/froxlor prior to 2.0.20.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'froxlor/froxlor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.20'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3173'}, {'type': 'WEB', 'url': 'https://github.com/froxlor/froxlor/commit/464216072456efb35b4541c58e7016463dfbd9a6'}, {'type': 'PACKAGE', 'url': 'https://github.com/froxlor/froxlor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/4d715f76-950d...
{'cwe_ids': ['CWE-307'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T22:41:26Z', 'nvd_published_at': None}
1.4.0
GHSA-qmw8-x364-xxxm
2023-06-16T17:46:37Z
2023-06-10T09:30:16Z
null
['CVE-2023-3191']
Teampass Cross-site Scripting vulnerability
In versions of nilsteampassnet/teampass prior to 3.0.9 some user input was not properly sanitized which may have lead to stored cross-site scripting (XSS) vectors in the application.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'nilsteampassnet/teampass'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3191'}, {'type': 'WEB', 'url': 'https://github.com/nilsteampassnet/teampass/commit/241dbd4159a5d63b55af426464d30dbb53925705'}, {'type': 'PACKAGE', 'url': 'https://github.com/nilsteampassnet/teampass'}, {'type': 'WEB', 'url': 'https://huntr.dev/boun...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-12T18:00:47Z', 'nvd_published_at': None}
1.4.0
GHSA-mwxj-g7fw-7hc8
2023-06-26T16:33:58Z
2023-06-22T19:59:33Z
null
['CVE-2023-35158']
XWiki Platform vulnerable to reflected cross-site scripting via xredirect parameter in restore template
### Impact Users are able to forge an URL with a payload allowing to inject Javascript in the page (XSS). It's possible to exploit the restore template to perform a XSS, e.g. by using URL such as: > /xwiki/bin/view/XWiki/Main?xpage=restore&showBatch=true&xredirect=javascript:alert(document.domain) This vulnerability ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-flamingo-skin-resources'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.4-rc-1'}, {'fixed': '14.10.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-flamingo-skin-resources'}, 'ranges': [...
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-mwxj-g7fw-7hc8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35158'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/d5472100606c8355ed44ada273e91df91f682738'}, {'type': 'PACKAGE...
{'cwe_ids': ['CWE-87'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-22T19:59:33Z', 'nvd_published_at': None}
1.4.0
GHSA-x49m-3cw7-gq5q
2023-06-26T16:31:23Z
2023-06-23T21:44:35Z
null
['CVE-2023-35932']
jcvi vulnerable to Configuration Injection due to unsanitized user input
### Summary A configuration injection happens when user input is considered by the application in an unsanitized format and can reach the configuration file. A malicious user may craft a special payload that may lead to a command injection. ### PoC The vulnerable code snippet is [/jcvi/apps/base.py#LL2227C1-L2228C41]...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'jcvi'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/tanghaibao/jcvi/security/advisories/GHSA-x49m-3cw7-gq5q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35932'}, {'type': 'PACKAGE', 'url': 'https://github.com/tanghaibao/jcvi'}, {'type': 'WEB', 'url': 'https://github.com/tanghaibao/jcvi/blob/cede6c6...
{'cwe_ids': ['CWE-1284', 'CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-23T21:44:35Z', 'nvd_published_at': None}
1.4.0
GHSA-v4f4-23wc-99mh
2023-07-10T19:06:13Z
2023-06-30T21:30:26Z
null
['CVE-2023-31543']
pipreqs vulnerable to Dependency Confusion
A dependency confusion in pipreqs v0.3.0 to v0.4.11 allows attackers to execute arbitrary code via uploading a crafted PyPI package to the chosen repository server.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pipreqs'}, 'ecosystem_specific': {'affected_functions': ['pipreqs.pipreqs.get_import_local', 'pipreqs.pipreqs.init']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.0'}, {'fixed': '0.4.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-31543'}, {'type': 'WEB', 'url': 'https://github.com/bndr/pipreqs/pull/364'}, {'type': 'WEB', 'url': 'https://github.com/bndr/pipreqs/commit/3f5964fcb90ec6eb6df46d78e651a1b73538d0ba'}, {'type': 'WEB', 'url': 'https://gist.github.com/adeadfed/ccc8344...
{'cwe_ids': ['CWE-427'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T22:12:37Z', 'nvd_published_at': None}
1.4.0
GHSA-r6ww-5963-7r95
2023-06-09T19:33:16Z
2023-06-09T19:33:16Z
null
['CVE-2022-24777']
Denial of Service via reachable assertion
A grpc-swift server is vulnerable to a denial of service attack via a reachable assertion. This was due to incorrect logic when handling `GOAWAY` frames. The attack is low-effort: it takes very little resources to construct and send the required sequence of frames. The impact on availability is high as the server will...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'purl-type:swift', 'name': 'https://github.com/grpc/grpc-swift.git'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/grpc/grpc-swift/security/advisories/GHSA-r6ww-5963-7r95'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24777'}, {'type': 'WEB', 'url': 'https://github.com/grpc/grpc-swift/commit/858f977f2a51fca2292f384cf7a108dc2e73a3bd'}, {'type': 'PACKAGE', 'url': ...
{'cwe_ids': ['CWE-617'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T19:33:16Z', 'nvd_published_at': '2022-03-25T17:15:00Z'}
1.4.0
GHSA-42qm-8v8m-m78c
2023-06-01T19:10:40Z
2023-06-01T19:10:40Z
null
[]
PocketMine MP vulnerable to uncontrolled resource consumption via mismatched type of 'InventoryTransactionPacket'
### Impact A "mismatch" type `InventoryTransactionPacket` is sent by the client to request a resync of all currently open inventories. Since PocketMine-MP does not rate-limit these "mismatch" transactions, and the syncing of inventories is not deferred until, e.g. the end of the current tick, they can be used as a ver...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pocketmine/pocketmine-mp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.18.0-ALPHA2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-42qm-8v8m-m78c'}, {'type': 'PACKAGE', 'url': 'https://github.com/pmmp/PocketMine-MP'}, {'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/blob/4.18.0-ALPHA2/changelogs/4.18-alpha.md#4180-ALPHA2'}]
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-01T19:10:40Z', 'nvd_published_at': None}
1.4.0
GHSA-c6f8-8r25-c4gc
2023-06-09T22:52:01Z
2023-06-09T22:52:01Z
null
['CVE-2023-34238']
Gatsby develop server has Local File Inclusion vulnerability
### Impact The Gatsby framework prior to versions 4.25.7 and 5.9.1 contain a Local File Inclusion vulnerability in the `__file-code-frame` and `__original-stack-frame` paths, exposed when running the Gatsby develop server (`gatsby develop`). The following steps can be used to reproduce the vulnerability: ``` # Creat...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'gatsby'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.25.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.25.6'}}, {'package': {'ecosystem': 'npm', 'name': 'gatsby'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introd...
[{'type': 'WEB', 'url': 'https://github.com/gatsbyjs/gatsby/security/advisories/GHSA-c6f8-8r25-c4gc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34238'}, {'type': 'WEB', 'url': 'https://github.com/gatsbyjs/gatsby/commit/ae5a654eb346b2e7a9d341b809b2f82d34c0f17c'}, {'type': 'WEB', 'url': 'htt...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T22:52:01Z', 'nvd_published_at': None}
1.4.0
GHSA-5cpq-8wj7-hf2v
2023-06-02T17:13:10Z
2023-06-02T17:13:10Z
null
[]
Vulnerable OpenSSL included in cryptography wheels
pyca/cryptography's wheels include a statically linked copy of OpenSSL. The versions of OpenSSL included in cryptography 0.5-40.0.2 are vulnerable to a security issue. More details about the vulnerability itself can be found in https://www.openssl.org/news/secadv/20230530.txt. If you are building cryptography source (...
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'cryptography'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.5'}, {'fixed': '41.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 40.0.2'}}]
[{'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/security/advisories/GHSA-5cpq-8wj7-hf2v'}, {'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/commit/8708245ccdeaff21d65eea68a4f8d2a7c5949a22'}, {'type': 'WEB', 'url': 'https://cryptography.io/en/latest/changelog/#v41-0-0'}, {'type': 'PACKAGE', 'ur...
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-02T17:13:10Z', 'nvd_published_at': None}
1.4.0
GHSA-88q2-h5g3-p4pg
2023-06-14T17:01:16Z
2023-06-14T17:01:16Z
null
['CVE-2023-24897']
.NET Remote Code Execution Vulnerability
# Microsoft Security Advisory CVE-2023-24897: .NET Remote Code Execution Vulnerability ## <a name="executive-summary"></a>Executive summary Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 7.0 and .NET 6.0. This advisory also provides guidance on what developers can d...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.5'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Run...
[{'type': 'WEB', 'url': 'https://github.com/dotnet/runtime/security/advisories/GHSA-88q2-h5g3-p4pg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24897'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/260'}, {'type': 'PACKAGE', 'url': 'https://github.com/dotnet/runtim...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T17:01:16Z', 'nvd_published_at': None}
1.4.0
GHSA-96xv-rmwj-6p9w
2023-06-16T19:36:39Z
2023-06-16T19:36:39Z
null
['CVE-2023-34252']
Grav Server-side Template Injection (SSTI) via Twig Default Filters
Hi, actually we have sent the bug report to [security@getgrav.org](mailto:security@getgrav.org) on 27th March 2023 and on 10th April 2023. # Grav Server-side Template Injection (SSTI) via Insufficient Validation in filterFilter ## Summary: | **Product** | Grav CMS |...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'getgrav/grav'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.42'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/getgrav/grav/security/advisories/GHSA-96xv-rmwj-6p9w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34252'}, {'type': 'WEB', 'url': 'https://github.com/getgrav/grav/commit/244758d4383034fe4cd292d41e477177870b65ec'}, {'type': 'WEB', 'url': 'https://g...
{'cwe_ids': ['CWE-1336', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-16T19:36:39Z', 'nvd_published_at': None}
1.4.0
GHSA-7xqx-xwg9-jx34
2023-06-27T22:22:11Z
2023-06-20T15:31:08Z
null
['CVE-2020-20697']
NodCMS Cross Site Scripting vulnerability
Cross Site Scripting vulnerability in khodakhah NodCMS v.3.0 allows an attacker with administrative privileges to execute arbitrary code and gain access to sensitive information via a crafted script to the address parameter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'khodakhah/nodcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-20697'}, {'type': 'WEB', 'url': 'https://github.com/khodakhah/nodcms/issues/41'}, {'type': 'PACKAGE', 'url': 'https://github.com/khodakhah/nodcms'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-21T22:10:00Z', 'nvd_published_at': None}
1.4.0
GHSA-49mv-vfcp-8gg9
2023-06-30T20:23:28Z
2023-06-22T21:30:49Z
null
['CVE-2023-35132']
Moodle vulnerable to SQL Injection
A limited SQL injection risk was identified on the Mnet SSO access control page. This flaw affects Moodle versions 4.2, 4.1 to 4.1.3, 4.0 to 4.0.8, 3.11 to 3.11.14, 3.9 to 3.9.21 and earlier unsupported versions.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.1'}]}], 'versions': ['4.2.0']}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fi...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35132'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7A72KX4WU6GK2CX4TKYFGFASPKOEOJFC/'}, {'type': 'WEB', 'ur...
{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-23T21:38:31Z', 'nvd_published_at': None}
1.4.0
GHSA-f9jf-4cp4-4fq5
2023-06-16T19:35:56Z
2023-06-16T19:35:56Z
null
['CVE-2023-34251']
Grav Server Side Template Injection (SSTI) vulnerability
### Summary I found an RCE(Remote Code Execution) by SSTI in the admin screen. ### Details Remote Code Execution is possible by embedding malicious PHP code on the administrator screen by a user with page editing privileges. ### PoC 1. Log in to the administrator screen and access the edit screen of the default page ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'getgrav/grav'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.42'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/getgrav/grav/security/advisories/GHSA-f9jf-4cp4-4fq5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34251'}, {'type': 'WEB', 'url': 'https://github.com/getgrav/grav/commit/244758d4383034fe4cd292d41e477177870b65ec'}, {'type': 'WEB', 'url': 'https://g...
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-16T19:35:56Z', 'nvd_published_at': None}
1.4.0
GHSA-g3jr-6vj4-3x82
2023-06-09T22:18:39Z
2023-06-04T12:30:18Z
null
['CVE-2023-3095']
TeamPass vulnerable to Improper Access Control
Improper Access Control in GitHub repository nilsteampassnet/teampass prior to 3.0.9.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'nilsteampassnet/teampass'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3095'}, {'type': 'WEB', 'url': 'https://github.com/nilsteampassnet/teampass/commit/774985f62f080715774604927fba2cb6ef701612'}, {'type': 'PACKAGE', 'url': 'https://github.com/nilsteampassnet/teampass'}, {'type': 'WEB', 'url': 'https://huntr.dev/boun...
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T02:06:40Z', 'nvd_published_at': None}
1.4.0
GHSA-9rp6-23gf-4c3h
2023-06-06T18:50:28Z
2023-06-06T16:39:57Z
null
['CVE-2022-46165']
syncthing vulnerable to Cross-site Scripting (XSS) in Web GUI
## Impact 1. A compromised instance with shared folders could sync malicious files which contain arbitrary HTML and JavaScript in the name. If the owner of another device looks over the shared folder settings and moves the mouse over the latest sync, a script could be executed to change settings for shared folders or ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/syncthing/syncthing'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.23.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/syncthing/syncthing/security/advisories/GHSA-9rp6-23gf-4c3h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46165'}, {'type': 'WEB', 'url': 'https://github.com/syncthing/syncthing/commit/73c52eafb6566435dffd979c3c49562b6d5a4238'}, {'type': 'WEB', 'ur...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T16:39:57Z', 'nvd_published_at': None}
1.4.0
GHSA-xxp4-mf4h-6cwm
2023-06-30T20:21:55Z
2023-06-22T21:30:49Z
null
['CVE-2023-35133']
Moodle vulnerable to Server Side Request Forgery
An issue in the logic used to check 0.0.0.0 against the cURL blocked hosts lists resulted in an SSRF risk. This flaw affects Moodle versions 4.2, 4.1 to 4.1.3, 4.0 to 4.0.8, 3.11 to 3.11.14, 3.9 to 3.9.21 and earlier unsupported versions.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.1'}]}], 'versions': ['4.2.0']}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fi...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35133'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7A72KX4WU6GK2CX4TKYFGFASPKOEOJFC/'}, {'type': 'WEB', 'ur...
{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-23T21:38:44Z', 'nvd_published_at': None}
1.4.0
GHSA-7px2-3c2p-q4v4
2023-06-30T20:38:36Z
2023-06-30T06:30:14Z
null
['CVE-2023-26135']
flatnest Prototype Pollution vulnerability
All versions of the package flatnest are vulnerable to Prototype Pollution via the `nest()` function in `flatnest/nest.js` file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'flatnest'}, 'ecosystem_specific': {'affected_functions': ['flatnest.nest']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26135'}, {'type': 'WEB', 'url': 'https://github.com/brycebaril/node-flatnest/issues/4'}, {'type': 'PACKAGE', 'url': 'https://github.com/brycebaril/node-flatnest'}, {'type': 'WEB', 'url': 'https://github.com/brycebaril/node-flatnest/blob/b7d97ec64a0...
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:38:36Z', 'nvd_published_at': None}
1.4.0
GHSA-7q8c-49f4-4c8q
2023-06-27T19:50:27Z
2023-06-19T03:30:18Z
null
['CVE-2023-35839']
Solon vulnerable to deserialization of untrusted data
Solon before 2.3.3 allows Deserialization of Untrusted Data.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.noear:solon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35839'}, {'type': 'WEB', 'url': 'https://github.com/noear/solon/issues/145'}, {'type': 'PACKAGE', 'url': 'https://github.com/noear/solon'}, {'type': 'WEB', 'url': 'https://github.com/noear/solon/compare/v2.3.2...v2.3.3'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-20T16:09:20Z', 'nvd_published_at': None}
1.4.0
GHSA-r8xc-xxh3-q5x3
2023-06-30T20:27:58Z
2023-06-22T19:59:55Z
null
['CVE-2023-35160']
XWiki Platform vulnerable to reflected cross-site scripting via back and xcontinue parameters in resubmit template
### Impact Users are able to forge an URL with a payload allowing to inject Javascript in the page (XSS). It's possible to exploit the resubmit template to perform a XSS, e.g. by using URL such as: > xwiki/bin/view/XWiki/Main?xpage=resubmit&resubmit=javascript:alert(document.domain)&xback=javascript:alert(document.do...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web-templates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5-milestone-2'}, {'fixed': '14.10.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web-templates'}, 'ranges': [{'type': 'ECO...
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-r8xc-xxh3-q5x3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35160'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/dbc92dcdace33823ffd1e1591617006cb5fc6a7f'}, {'type': 'PACKAGE...
{'cwe_ids': ['CWE-79', 'CWE-87'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-22T19:59:55Z', 'nvd_published_at': None}
1.4.0
GHSA-x32c-59v5-h7fg
2023-06-14T21:14:49Z
2023-06-14T15:30:39Z
null
['CVE-2023-34540']
Langchain OS Command Injection vulnerability
Langchain 0.0.171 is vulnerable to Arbitrary Code Execution via command injection in the `jira.run()` command
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'langchain'}, 'ecosystem_specific': {'affected_functions': ['langchain.utilities.jira.JiraAPIWrapper.run']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.225'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34540'}, {'type': 'WEB', 'url': 'https://github.com/hwchase17/langchain/issues/4833'}, {'type': 'WEB', 'url': 'https://github.com/langchain-ai/langchain/issues/4833'}, {'type': 'WEB', 'url': 'https://github.com/langchain-ai/langchain/pull/6992'}, {...
{'cwe_ids': ['CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T21:02:46Z', 'nvd_published_at': None}
1.4.0
GHSA-5fp6-4xw3-xqq3
2023-06-23T13:56:28Z
2023-06-12T18:37:31Z
null
[]
@keystone-6/core's bundled cuid package known to be insecure
### Summary The `cuid` package used by `@keystone-6/*` and upstream dependencies is deprecated and [marked as insecure by the author](https://github.com/paralleldrive/cuid#status-deprecated-due-to-security-use-cuid2-instead). As reported by the author > Cuid and other k-sortable and non-cryptographic ids (Ulid, Object...
[]
[{'package': {'ecosystem': 'npm', 'name': '@keystone-6/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.3.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/security/advisories/GHSA-5fp6-4xw3-xqq3'}, {'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/issues/8282#issuecomment-1586019823'}, {'type': 'PACKAGE', 'url': 'https://github.com/keystonejs/keystone'}, {'type': 'WEB', 'url': 'https://github.co...
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-12T18:37:31Z', 'nvd_published_at': None}
1.4.0
GHSA-rm8v-mxj3-5rmq
2023-06-14T17:24:36Z
2023-06-14T17:24:36Z
null
[]
github.com/lestrrat-go/jwx vulnerable to Potential Padding Oracle Attack
### Summary Decrypting AES-CBC encrypted JWE has Potential Padding Oracle Attack Vulnerability. ### Details On [v2.0.10](https://github.com/lestrrat-go/jwx/releases/tag/v2.0.10), decrypting AES-CBC encrypted JWE may return an error "failed to generate plaintext from decrypted blocks: invalid padding": https://githu...
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/lestrrat-go/jwx/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.10'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/lestrrat-go/jwx'}, 'ranges': [...
[{'type': 'WEB', 'url': 'https://github.com/lestrrat-go/jwx/security/advisories/GHSA-rm8v-mxj3-5rmq'}, {'type': 'WEB', 'url': 'https://github.com/lestrrat-go/jwx/commit/6c41e3822485fc7e11dd70b4b0524b075d66b103'}, {'type': 'WEB', 'url': 'https://github.com/lestrrat-go/jwx/commit/d9ddbc8e5009cfdd8c28413390b67afa7f576dd6'...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T17:24:36Z', 'nvd_published_at': None}
1.4.0
GHSA-6w63-h3fj-q4vw
2023-06-06T17:33:13Z
2023-06-06T17:33:13Z
null
['CVE-2023-34104']
fast-xml-parser vulnerable to Regex Injection via Doctype Entities
### Impact "fast-xml-parser" allows special characters in entity names, which are not escaped or sanitized. Since the entity name is used for creating a regex for searching and replacing entities in the XML body, an attacker can abuse it for DoS attacks. By crafting an entity name that results in an intentionally bad p...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'fast-xml-parser'}, 'ecosystem_specific': {'affected_functions': ['fast-xml-parser.XMLParser']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/NaturalIntelligence/fast-xml-parser/security/advisories/GHSA-6w63-h3fj-q4vw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34104'}, {'type': 'WEB', 'url': 'https://github.com/NaturalIntelligence/fast-xml-parser/commit/39b0e050bb909e8499478657f84a307...
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T17:33:13Z', 'nvd_published_at': None}
1.4.0
GHSA-8rc9-vxjh-qjf2
2023-06-26T16:32:12Z
2023-06-20T16:36:18Z
null
['CVE-2023-35163']
Vega's validators able to submit duplicate transactions
A vulnerability exists that allows a malicious validator to trick the Vega network into re-processing past Ethereum events from Vega’s Ethereum bridge. For example, a deposit to the collateral bridge for 100USDT that credits a party’s general account on Vega, can be re-processed 50 times resulting in 5000USDT in that p...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:C/C:H/I:L/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'code.vegaprotocol.io/vega'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.71.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/vegaprotocol/vega/security/advisories/GHSA-8rc9-vxjh-qjf2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35163'}, {'type': 'WEB', 'url': 'https://github.com/vegaprotocol/vega/commit/56b09bf57af8cd9eca5996252d86f469a3e34c68'}, {'type': 'PACKAGE', 'ur...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-20T16:36:18Z', 'nvd_published_at': None}
1.4.0
GHSA-vpxf-q44g-w34w
2023-07-03T18:38:23Z
2023-06-30T20:36:55Z
null
['CVE-2023-36815']
Sealos billing system permission control defect
### Summary There is a permission flaw in the Sealos billing system, which allows users to control the recharge resource account. sealos. io/v1/Payment, resulting in the ability to recharge any amount of 1 RMB. ### Details The reason is that sealos is in arrears. Egg pain, we can't create a terminal anymore. Let's c...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/labring/sealos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.2.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/labring/sealos/security/advisories/GHSA-vpxf-q44g-w34w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36815'}, {'type': 'PACKAGE', 'url': 'https://github.com/labring/sealos'}]
{'cwe_ids': ['CWE-287', 'CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:36:55Z', 'nvd_published_at': None}
1.4.0
GHSA-c6fv-3jm9-6r8f
2023-06-09T16:52:12Z
2023-06-03T09:30:16Z
null
['CVE-2023-3083']
TeamPass vulnerable to stored Cross-site Scripting
Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.9.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'nilsteampassnet/teampass'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3083'}, {'type': 'WEB', 'url': 'https://github.com/nilsteampassnet/teampass/commit/79731553fa305d45dabb7a227f3074d56d7c94c1'}, {'type': 'PACKAGE', 'url': 'https://github.com/nilsteampassnet/teampass'}, {'type': 'WEB', 'url': 'https://huntr.dev/boun...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T02:05:23Z', 'nvd_published_at': None}
1.4.0
GHSA-6449-vf6p-9hfp
2023-01-24T18:05:48Z
2023-01-16T00:30:24Z
null
['CVE-2023-0312']
thorsten/phpmyfaq is vulnerable to cross-site scripting (XSS)
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.10.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0312'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/65d419ca04111ee2612ae81cdd59753654cfe18a'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpMyFAQ'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/f50ec8d1-...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-19T11:47:51Z', 'nvd_published_at': '2023-01-15T22:15:00Z'}
1.4.0
GHSA-rw83-v3pw-m362
2023-02-07T23:25:27Z
2023-01-30T06:30:27Z
2023-02-01T20:04:51Z
[]
Withdrawn: safeurl-python contains Server-Side Request Forgery
## Withdrawn This advisory has been withdrawn as a duplicate of [GHSA-jgh8-vchw-q3g7](https://github.com/advisories/GHSA-jgh8-vchw-q3g7). ## Original Description isInList in the safeurl-python package before 1.2 for Python has an insufficiently restrictive regular expression for external domains, leading to SSRF.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'safeurl-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/IncludeSecurity/safeurl-python/security/advisories/GHSA-jgh8-vchw-q3g7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24622'}, {'type': 'PACKAGE', 'url': 'https://github.com/IncludeSecurity/safeurl-python'}]
{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-01T20:04:51Z', 'nvd_published_at': '2023-01-30T05:15:00Z'}
1.4.0
GHSA-w7w4-qjgg-372x
2023-02-07T21:22:10Z
2023-01-30T00:30:35Z
null
['CVE-2023-0566']
Froxlor contains Static Code Injection
Static Code Injection in GitHub repository froxlor/froxlor prior to 2.0.10.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'froxlor/froxlor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0566'}, {'type': 'WEB', 'url': 'https://github.com/froxlor/froxlor/commit/bd5b99dc1c06f594b9563d459a50bf3b32504876'}, {'type': 'PACKAGE', 'url': 'https://github.com/Froxlor/Froxlor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8339e4f1-d430...
{'cwe_ids': ['CWE-79', 'CWE-96'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-01T01:38:29Z', 'nvd_published_at': '2023-01-29T22:15:00Z'}
1.4.0
GHSA-8r5j-22j5-w4cm
2023-02-08T17:57:31Z
2023-01-20T18:30:22Z
null
['CVE-2021-26642']
XpressEngine vulnerable to Unrestricted Upload of File with Dangerous Type
When uploading an image file to a bulletin board developed with XpressEngine, a vulnerability in which an arbitrary file can be uploaded due to insufficient verification of the file. A remote attacker can use this vulnerability to execute arbitrary code on the server where the bulletin board is running.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'xpressengine/xpressengine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.15'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26642'}, {'type': 'WEB', 'url': 'https://github.com/xpressengine/xpressengine/issues/1366'}, {'type': 'WEB', 'url': 'https://boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=67125'}]
{'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T17:57:31Z', 'nvd_published_at': '2023-01-20T17:15:00Z'}
1.4.0
GHSA-3hc7-2xcc-7p8f
2023-01-12T23:44:02Z
2023-01-07T21:30:40Z
null
['CVE-2020-36645']
Squalor SQL Injection vulnerability
A vulnerability, which was classified as critical, was found in square squalor. This affects an unknown part. The manipulation leads to sql injection. Upgrading to version v0.0.0 is able to address this issue. The name of the patch is f6f0a47cc344711042eb0970cb423e6950ba3f93. It is recommended to upgrade the affected c...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/square/squalor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36645'}, {'type': 'WEB', 'url': 'https://github.com/square/squalor/pull/76'}, {'type': 'WEB', 'url': 'https://github.com/square/squalor/commit/f6f0a47cc344711042eb0970cb423e6950ba3f93'}, {'type': 'PACKAGE', 'url': 'https://github.com/square/squalor...
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-12T23:44:02Z', 'nvd_published_at': '2023-01-07T19:15:00Z'}
1.4.0
GHSA-9f2c-xxfm-32mj
2023-01-11T18:58:40Z
2023-01-11T06:30:20Z
2023-01-11T18:58:40Z
[]
Duplicate of GHSA-4xh4-v2pq-jvhm
## Duplicate Advisory This advisory has been withdrawn because it is a duplicate of [GHSA-4xh4-v2pq-jvhm](https://github.com/advisories/GHSA-4xh4-v2pq-jvhm). This link is maintained to preserve external references. ## Original Description The personnummer implementation before 3.0.3 for Dart mishandles numbers in wh...
[]
[{'package': {'ecosystem': 'Pub', 'name': 'personnummer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/personnummer/dart/security/advisories/GHSA-4xh4-v2pq-jvhm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22963'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4xh4-v2pq-jvhm'}]
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-01-11T18:58:40Z', 'nvd_published_at': '2023-01-11T06:15:00Z'}
1.4.0
GHSA-f976-24hc-mjvr
2023-01-27T01:02:10Z
2023-01-26T21:30:18Z
null
['CVE-2023-24444']
Session fixation vulnerability in Jenkins OpenID Plugin
Jenkins OpenID Plugin 2.4 and earlier does not invalidate the previous session on login.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:openid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24444'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2996'}]
{'cwe_ids': ['CWE-384'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:02:10Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}
1.4.0
GHSA-rqv2-275x-2jq5
2023-02-10T00:21:49Z
2023-01-18T18:19:21Z
null
['CVE-2022-44572']
Denial of service via multipart parsing in Rack
There is a denial of service vulnerability in the multipart parsing component of Rack. This vulnerability has been assigned the CVE identifier CVE-2022-44572. Versions Affected: >= 2.0.0 Not affected: None. Fixed Versions: 2.0.9.2, 2.1.4.2, 2.2.6.1, 3.0.0.1 Impact Carefully crafted input can cause RFC2183 multipart b...
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.9.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0.0'}, {'fixed': '2.1.4.2'}]}]}, {'package': {'eco...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-44572'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1639882'}, {'type': 'PACKAGE', 'url': 'https://github.com/rack/rack'}, {'type': 'WEB', 'url': 'https://github.com/rack/rack/releases/tag/v3.0.4.1'}, {'type': 'WEB', 'url': 'https://gith...
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-01-18T18:19:21Z', 'nvd_published_at': '2023-02-09T20:15:00Z'}
1.4.0
GHSA-vxmh-p52j-h33m
2023-02-03T20:46:07Z
2023-01-26T21:30:18Z
null
['CVE-2023-24424']
Session fixation vulnerability in Jenkins OpenId Connect Authentication Plugin
Jenkins OpenId Connect Authentication Plugin 2.4 and earlier does not invalidate the previous session on login.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:oic-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24424'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2978'}]
{'cwe_ids': ['CWE-384'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:06:14Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}
1.4.0
GHSA-8hcf-2m4v-f2rq
2023-01-24T20:29:47Z
2023-01-16T12:30:18Z
null
['CVE-2016-15020']
SQL Injection in liftkit/database
A vulnerability was found in liftkit database up to 2.13.1. It has been classified as critical. This affects the function processOrderBy of the file src/Query/Query.php. The manipulation leads to sql injection. Upgrading to version 2.13.2 is able to address this issue. The name of the patch is 42ec8f2b22e0b0b98fb5b4444...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'liftkit/database'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.13.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-15020'}, {'type': 'WEB', 'url': 'https://github.com/liftkit/database/commit/42ec8f2b22e0b0b98fb5b4444ed451c1b21d125a'}, {'type': 'PACKAGE', 'url': 'https://github.com/liftkit/database'}, {'type': 'WEB', 'url': 'https://github.com/liftkit/database/r...
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-24T20:29:47Z', 'nvd_published_at': '2023-01-16T11:15:00Z'}
1.4.0
GHSA-7mc4-jp4f-v2j2
2023-01-25T22:03:13Z
2023-01-14T09:30:23Z
null
['CVE-2023-0298']
Improper Authorization in grumpydictator/firefly-iii
Improper Authorization in GitHub repository firefly-iii/firefly-iii prior to 5.8.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'grumpydictator/firefly-iii'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.8.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0298'}, {'type': 'WEB', 'url': 'https://github.com/firefly-iii/firefly-iii/commit/db0500dcf0d4f1990fc7a377ef0d56c3884fcaa4'}, {'type': 'PACKAGE', 'url': 'https://github.com/firefly-iii/firefly-iii'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounti...
{'cwe_ids': ['CWE-285', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-25T22:03:13Z', 'nvd_published_at': '2023-01-14T08:15:00Z'}
1.4.0
GHSA-cxvp-3frm-3876
2023-01-24T18:52:56Z
2023-01-16T12:30:18Z
null
['CVE-2022-41703']
Apache Superset's SQL Alchemy connector vulnerable to SQL Injection
A vulnerability in the SQL Alchemy connector of Apache Superset allows an authenticated user with read access to a specific database to add subqueries to the WHERE and HAVING fields referencing tables on the same database that the user should not have access to, despite the user having the feature flag "ALLOW_ADHOC_SUB...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'versions': ['2.0.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41703'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/superset'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/g7jjw0okxjk5y57pbbxy19ydw42kqcos'}]
{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T23:17:15Z', 'nvd_published_at': '2023-01-16T11:15:00Z'}
1.4.0
GHSA-579w-22j4-4749
2023-08-18T21:11:49Z
2023-01-18T18:21:12Z
null
['CVE-2022-44566']
Denial of Service Vulnerability in ActiveRecord's PostgreSQL adapter
There is a potential denial of service vulnerability present in ActiveRecord’s PostgreSQL adapter. This has been assigned the CVE identifier CVE-2022-44566. Versions Affected: All. Not affected: None. Fixed Versions: 5.2.8.15 (Rails LTS, which is a paid service and not part of the rubygem), 6.1.7.1, 7.0.4.1 Impact: ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.1.7.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-44566'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/4f44aa9d514e701ada92b5cf08beccf566eeaebf'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/82bcdc011e2ff674e7dd8fd8cee3a831c908d29b'}, {'type': 'WEB', 'url': 'htt...
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-18T18:21:12Z', 'nvd_published_at': '2023-02-09T20:15:00Z'}
1.4.0
GHSA-v9mp-j8g7-2q6m
2023-02-08T21:51:47Z
2023-01-30T06:30:27Z
null
['CVE-2023-24623']
Paranoidhttp Server-Side Request Forgery vulnerability
Paranoidhttp before 0.3.0 allows SSRF because [::] is equivalent to the 127.0.0.1 address, but does not match the filter for private addresses.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hakobe/paranoidhttp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24623'}, {'type': 'WEB', 'url': 'https://github.com/hakobe/paranoidhttp/commit/07f671da14ce63a80f4e52432b32e8d178d75fd3'}, {'type': 'PACKAGE', 'url': 'https://github.com/hakobe/paranoidhttp'}, {'type': 'WEB', 'url': 'https://github.com/hakobe/paran...
{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T21:51:47Z', 'nvd_published_at': '2023-01-30T05:15:00Z'}
1.4.0
GHSA-jmj6-p2j9-68cp
2023-01-25T21:37:25Z
2023-01-13T06:30:22Z
null
['CVE-2022-3143']
Wildfly-elytron possibly vulnerable to timing attacks via use of unsafe comparator
wildfly-elytron: possible timing attacks via use of unsafe comparator. A flaw was found in Wildfly-elytron. Wildfly-elytron uses `java.util.Arrays.equals` in several places, which is unsafe and vulnerable to timing attacks. To compare values securely, use `java.security.MessageDigest.isEqual` instead. This flaw allows ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.wildfly.security:wildfly-elytron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.15.Final'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.wildfly.security:wildfly-elytron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduc...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3143'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2022-3143'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2124682'}, {'type': 'PACKAGE', 'url': 'https://github.com/wildfly-security/wildfly-elytron'}...
{'cwe_ids': ['CWE-203', 'CWE-208'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-13T21:32:28Z', 'nvd_published_at': '2023-01-13T06:15:00Z'}
1.4.0
GHSA-gqx8-hxmv-c4v4
2023-01-24T23:29:03Z
2023-01-09T21:56:09Z
null
['CVE-2023-22478']
KubePi may allow unauthorized access to system API
### Summary Unauthorized access refers to the ability to bypass the system's preset permission settings to access some API interfaces. The attack exploits a flaw in how online applications handle routing permissions. ### Affected Version <= v1.6.3 ### Patches The vulnerability has been fixed in v1.6.4. https://githu...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/KubeOperator/kubepi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.6.3'}}]
[{'type': 'WEB', 'url': 'https://github.com/1Panel-dev/KubePi/security/advisories/GHSA-gqx8-hxmv-c4v4'}, {'type': 'WEB', 'url': 'https://github.com/KubeOperator/KubePi/security/advisories/GHSA-gqx8-hxmv-c4v4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22478'}, {'type': 'WEB', 'url': 'https...
{'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T21:56:09Z', 'nvd_published_at': '2023-01-14T01:15:00Z'}
1.4.0
GHSA-ggj9-6x8j-49w9
2023-01-10T00:40:56Z
2023-01-01T18:30:22Z
null
['CVE-2010-10002']
SimpleSAMLphp simplesamlphp-module-openid
A vulnerability classified as problematic has been found in SimpleSAMLphp simplesamlphp-module-openid. Affected is an unknown function of the file `templates/consumer.php` of the component `OpenID Handler`. The manipulation of the argument `AuthState` leads to cross site scripting. It is possible to launch the attack r...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'simplesamlphp/simplesamlphp-module-openid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-10002'}, {'type': 'WEB', 'url': 'https://github.com/simplesamlphp/simplesamlphp-module-openid/commit/d652d41ccaf8c45d5707e741c0c5d82a2365a9a3'}, {'type': 'PACKAGE', 'url': 'https://github.com/simplesamlphp/simplesamlphp-module-openid'}, {'type': 'W...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-10T00:40:56Z', 'nvd_published_at': '2023-01-01T17:15:00Z'}
1.4.0
GHSA-76qj-9gwh-pvv3
2023-02-06T16:45:45Z
2023-01-26T21:30:19Z
null
['CVE-2023-24422']
Sandbox bypass in Jenkins Script Security Plugin
A sandbox bypass vulnerability involving map constructors in Jenkins Script Security Plugin 1228.vd93135a_2fb_25 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:script-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1229.v4880b'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24422'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/script-security-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-3016'}]
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:05:51Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}
1.4.0
GHSA-7m37-cx35-qgmr
2023-01-11T23:47:54Z
2023-01-04T18:31:00Z
null
['CVE-2022-48216']
Uniswap Universal Router Incorrect Authorization vulnerability
Uniswap Universal Router before 1.1.0 mishandles reentrancy. This would have allowed theft of funds.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': '@uniswap/universal-router'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-48216'}, {'type': 'WEB', 'url': 'https://github.com/Uniswap/universal-router/pull/189'}, {'type': 'WEB', 'url': 'https://github.com/Uniswap/universal-router/commit/d82c6685ef566d9b280651c99f4b93a8454c08a8'}, {'type': 'PACKAGE', 'url': 'https://gith...
{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-11T23:47:54Z', 'nvd_published_at': '2023-01-04T16:15:00Z'}
1.4.0
GHSA-9c64-x3cx-vgmm
2023-01-23T20:35:23Z
2023-01-23T15:30:33Z
null
['CVE-2023-0438']
Cross-Site Request Forgery in modoboa
Cross-Site Request Forgery (CSRF) in GitHub repository modoboa/modoboa prior to 2.0.4.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'modoboa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0438'}, {'type': 'WEB', 'url': 'https://github.com/modoboa/modoboa/commit/38d778cc71e370216e067d054ce0169ad83078c8'}, {'type': 'PACKAGE', 'url': 'https://github.com/modoboa/modoboa'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/07a5b61b-306d...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-23T20:35:23Z', 'nvd_published_at': '2023-01-23T14:15:00Z'}
1.4.0
GHSA-g5vm-525q-r66c
2023-02-01T01:37:19Z
2023-01-18T21:30:21Z
null
['CVE-2023-0242']
Velociraptor vulnerable to Missing Authorization
Rapid7 Velociraptor allows users to be created with different privileges on the server. Administrators are generally allowed to run any command on the server including writing arbitrary files. However, lower privilege users are generally forbidden from writing or modifying files on the server. The VQL copy() function a...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'www.velocidex.com/golang/velociraptor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.7-5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0242'}, {'type': 'WEB', 'url': 'https://docs.velociraptor.app/announcements/2023-cves/#:~:text=to%20upgrade%20clients.-,CVE%2D2023%2D0242,-Insufficient%20Permission%20Check'}, {'type': 'PACKAGE', 'url': 'https://github.com/Velocidex/velociraptor'}]
{'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-01T01:37:19Z', 'nvd_published_at': '2023-01-18T21:15:00Z'}
1.4.0
GHSA-9445-4cr6-336r
2023-06-26T22:33:39Z
2023-01-18T18:21:23Z
null
['CVE-2023-22797']
Open Redirect Vulnerability in Action Pack
There is a vulnerability in Action Controller’s redirect_to. This vulnerability has been assigned the CVE identifier CVE-2023-22797. Versions Affected: >= 7.0.0 Not affected: < 7.0.0 Fixed Versions: 7.0.4.1 Impact There is a possible open redirect when using the redirect_to helper with untrusted user input. Vulnera...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22797'}, {'type': 'WEB', 'url': 'https://discuss.rubyonrails.org/t/cve-2023-22799-possible-redos-based-dos-vulnerability-in-globalid/82127'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/r...
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-18T18:21:23Z', 'nvd_published_at': '2023-02-09T20:15:00Z'}
1.4.0
GHSA-6j27-3xfw-cj2w
2023-02-06T16:41:08Z
2023-01-26T21:30:18Z
null
['CVE-2023-24438']
Missing permissions check in Jenkins JIRA Pipeline Steps Plugin
A missing permission check in Jenkins JIRA Pipeline Steps Plugin 2.0.165.v8846cf59f3db and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:jira-steps'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.165.v8846cf59f3db'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24438'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2786'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:08:29Z', 'nvd_published_at': '2023-01-26T21:18:00Z'}
1.4.0
GHSA-9mjx-wfqp-j5ph
2023-01-10T21:42:15Z
2023-01-04T18:30:59Z
null
['CVE-2022-25926']
window-control vulnerable to Command Injection due to improper input sanitization
window-control is an npm package that provides tools to manage window focus. Versions before 1.4.5 are vulnerable to Command Injection via the `sendKeys` function due to improper input sanitization.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'window-control'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25926'}, {'type': 'WEB', 'url': 'https://github.com/bruno-robert/window-control/commit/075c854534a749d887655a906759f5a7eee95173'}, {'type': 'PACKAGE', 'url': 'https://github.com/bruno-robert/window-control'}, {'type': 'WEB', 'url': 'https://github....
{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-06T21:39:16Z', 'nvd_published_at': '2023-01-04T18:15:00Z'}
1.4.0
GHSA-wqqv-jcfr-9f5g
2023-01-09T20:07:27Z
2023-01-09T20:07:27Z
null
[]
PocketMine-MP has improperly handled dye colour IDs in banner NBT, leading to server crash
### Impact `DyeColorIdMap->fromId()` did not account for the possibility that it might be given invalid input. This means that an undefined offset error would occur whenever this happened. This code is indirectly called during [`Banner->deserializeCompoundTag()`](https://github.com/pmmp/PocketMine-MP/blob/38d6284671e8...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pocketmine/pocketmine-mp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.8.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-wqqv-jcfr-9f5g'}, {'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/commit/08b9495bce2d65a6d1d3eeb76e484499a00765eb'}, {'type': 'PACKAGE', 'url': 'https://github.com/pmmp/PocketMine-MP'}, {'type': 'WEB', 'url': 'https://...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T20:07:27Z', 'nvd_published_at': None}
1.4.0
GHSA-wxgh-8gmr-3qh3
2023-01-12T23:43:03Z
2023-01-07T18:30:20Z
null
['CVE-2021-4306']
terminal-kit Inefficient Regular Expression Complexity vulnerability
A vulnerability classified as problematic has been found in cronvel terminal-kit up to 2.1.7. Affected is an unknown function. The manipulation leads to inefficient regular expression complexity. Upgrading to version 2.1.8 can address this issue. The name of the patch is a2e446cc3927b559d0281683feb9b821e83b758c. It is ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'terminal-kit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4306'}, {'type': 'WEB', 'url': 'https://github.com/cronvel/terminal-kit/commit/a2e446cc3927b559d0281683feb9b821e83b758c'}, {'type': 'PACKAGE', 'url': 'https://github.com/cronvel/terminal-kit'}, {'type': 'WEB', 'url': 'https://github.com/cronvel/ter...
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-12T23:43:03Z', 'nvd_published_at': '2023-01-07T17:15:00Z'}
1.4.0
GHSA-xj9v-6q2f-vqhx
2023-01-13T17:15:16Z
2023-01-09T06:30:26Z
null
['CVE-2022-25890']
wifey vulnerable to Command Injection due to improper input sanitization
All versions of the package wifey are vulnerable to Command Injection via the `connect()` function due to improper input sanitization.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'wifey'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25890'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-WIFEY-3175615'}]
{'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T21:56:33Z', 'nvd_published_at': '2023-01-09T05:15:00Z'}