schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 20 140 | details stringlengths 56 37.2k | severity stringlengths 2 92 | affected stringlengths 88 7.07k | references stringlengths 139 4.72k | database_specific stringlengths 131 185 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-hm9v-vj3r-r55m | 2023-06-30T22:19:39Z | 2023-06-30T22:19:39Z | null | ['CVE-2023-36807'] | PyPDF2 vulnerable to possible Infinite Loop when reading malformed objects | ### Impact
An attacker who uses this vulnerability can craft a PDF which leads to an infinite loop.
This infinite loop blocks the current process and can utilize a single core of the CPU by 100%. It does not affect memory usage. That is, for example, the case if the user extracted metadata from such a malformed PDF.
#... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'PyPDF2'}, 'ecosystem_specific': {'affected_functions': ['PyPDF2._reader.PdfReader.get_object', 'PyPDF2.generic._base.NameObject.read_from_stream', 'PyPDF2.generic._data_structures.DictionaryObject.read_from_stream', 'PyPDF2.generic._data_structures.read_object']}, 'ranges': [... | [{'type': 'WEB', 'url': 'https://github.com/py-pdf/pypdf/security/advisories/GHSA-hm9v-vj3r-r55m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36807'}, {'type': 'WEB', 'url': 'https://github.com/py-pdf/pypdf/issues/1329'}, {'type': 'WEB', 'url': 'https://github.com/py-pdf/pypdf/pull/1331'}, ... | {'cwe_ids': ['CWE-835'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T22:19:39Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hq4m-4948-64cc | 2023-06-05T17:10:13Z | 2023-06-05T17:10:13Z | null | ['CVE-2023-34091'] | Kyverno resource with a deletionTimestamp may allow policy circumvention | ### Impact
In versions of Kyverno prior to 1.10.0, resources which have the `deletionTimestamp` field defined can bypass validate, generate, or mutate-existing policies, even in cases where the `validationFailureAction` field is set to `Enforce`.
This situation occurs as resources pending deletion were being conscio... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/kyverno/kyverno'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/kyverno/kyverno/security/advisories/GHSA-hq4m-4948-64cc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34091'}, {'type': 'PACKAGE', 'url': 'https://github.com/kyverno/kyverno'}, {'type': 'WEB', 'url': 'https://github.com/kyverno/kyverno/releases/tag... | {'cwe_ids': ['CWE-285'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-05T17:10:13Z', 'nvd_published_at': None} |
1.4.0 | GHSA-v3v9-3jf4-5pxx | 2023-06-16T17:55:54Z | 2023-06-07T21:30:18Z | null | ['CVE-2023-33510'] | Jeecg P3 Biz Chat allows remote attackers to read arbitrary files | Jeecg P3 Biz Chat 1.0.5 allows remote attackers to read arbitrary files through specific parameters. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.p3:jeecg-p3-biz-chat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33510'}, {'type': 'WEB', 'url': 'https://carl1l.github.io/2023/05/08/jeecg-p3-biz-chat-1-0-5-jar-has-arbitrary-file-read-vulnerability/'}] | {'cwe_ids': ['CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T22:54:03Z', 'nvd_published_at': None} |
1.4.0 | GHSA-ghqq-jfx7-f6m9 | 2023-06-14T19:26:52Z | 2023-06-09T03:30:24Z | null | ['CVE-2023-3172'] | Froxlor vulnerable to Path Traversal | Path Traversal in GitHub repository froxlor/froxlor prior to 2.0.20. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'froxlor/froxlor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.20'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3172'}, {'type': 'WEB', 'url': 'https://github.com/froxlor/froxlor/commit/da810ea95393dfaec68a70e30b7c887c50563a7e'}, {'type': 'PACKAGE', 'url': 'https://github.com/froxlor/froxlor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/e50966cd-9222... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T22:41:31Z', 'nvd_published_at': None} |
1.4.0 | GHSA-75r3-38rh-pmxv | 2023-06-27T21:00:35Z | 2023-06-14T15:30:38Z | null | ['CVE-2023-34613'] | sojo vulnerable to stack exhaustion | An issue was discovered sojo through 1.1.1 allows attackers to cause a denial of service or other unspecified impacts via crafted objects that deeply nested structures. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'net.sf.sojo:sojo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34613'}, {'type': 'WEB', 'url': 'https://github.com/maddingo/sojo/issues/15'}, {'type': 'PACKAGE', 'url': 'https://github.com/maddingo/sojo'}] | {'cwe_ids': ['CWE-400', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T21:10:32Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vj2m-9f5j-mpr5 | 2023-06-07T16:26:25Z | 2023-06-07T16:26:25Z | null | ['CVE-2022-31005'] | Vapor vulnerable to denial of service in HTTP Range Request of FileMiddleware | Vapor is an HTTP web framework for Swift and [middleware](https://docs.vapor.codes/advanced/middleware/) is a logic chain between the client and a Vapor route handler. [FileMiddleware](https://docs.vapor.codes/advanced/middleware/#file-middleware) enables the serving of assets from the Public folder of a project to the... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'purl-type:swift', 'name': 'github.com/vapor/vapor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.60.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/vapor/vapor/security/advisories/GHSA-vj2m-9f5j-mpr5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31005'}, {'type': 'WEB', 'url': 'https://github.com/vapor/vapor/commit/953a349b539b3e0d3653585c8ffb50c427986df1'}, {'type': 'PACKAGE', 'url': 'https:/... | {'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-07T16:26:25Z', 'nvd_published_at': '2022-05-31T20:15:00Z'} |
1.4.0 | GHSA-gm2g-2xr9-pxxj | 2023-07-10T10:36:45Z | 2023-06-30T18:31:02Z | null | ['CVE-2023-3485'] | Temporal Server vulnerable to Incorrect Authorization and Insecure Default Initialization of Resource | Insecure defaults in open-source Temporal Server before version 1.20 on all platforms allows an attacker to craft a task token with access to a namespace other than the one specified in the request. Creation of this task token must be done outside of the normal Temporal server flow. It requires the namespace UUID and i... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'go.temporal.io/server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.20.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3485'}, {'type': 'PACKAGE', 'url': 'https://github.com/temporalio/temporal'}, {'type': 'WEB', 'url': 'https://github.com/temporalio/temporal/releases/tag/v1.20.0'}] | {'cwe_ids': ['CWE-1188', 'CWE-863'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:25:35Z', 'nvd_published_at': None} |
1.4.0 | GHSA-25mx-8f3v-8wh7 | 2023-06-06T01:58:04Z | 2023-06-06T01:58:04Z | null | [] | sequoia-openpgp vulnerable to out-of-bounds array access leading to panic | Affected versions of the crate have several bugs where attacker-controlled input can result in the use of an out-of-bound array index. Rust detects the use of the out-of-bound index and causes the application to panic. An attacker may be able to use this to cause a denial-of-service. However, it is not possible for ... | [] | [{'package': {'ecosystem': 'crates.io', 'name': 'sequoia-openpgp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'sequoia-openpgp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.8.1'}]}]}, {'p... | [{'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-29mf-62xx-28jq'}, {'type': 'PACKAGE', 'url': 'https://gitlab.com/sequoia-pgp/sequoia'}, {'type': 'WEB', 'url': 'https://gitlab.com/sequoia-pgp/sequoia/-/blob/main/openpgp/NEWS'}, {'type': 'WEB', 'url': 'https://lists.sequoia-pgp.org/hyperkitty/list/announ... | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T01:58:04Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6pqf-c99p-758v | 2023-06-30T20:41:50Z | 2023-06-30T20:41:50Z | null | ['CVE-2023-36471'] | org.xwiki.commons:xwiki-commons-xml's HTML sanitizer allows form elements in restricted | ### Impact
The HTML sanitizer that is included in XWiki since version 14.6RC1 allowed form and input HTML tags. In the context of XWiki, this allows an attacker without script right to either create forms that can be used for phishing attacks or also in the context of a sheet, the attacker could add an input like `{{h... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.commons:xwiki-commons-xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.6-rc-1'}, {'fixed': '14.10.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.commons:xwiki-commons-xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduc... | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-6pqf-c99p-758v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36471'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-commons/commit/99484d48e899a68a1b6e33d457825b776c6fe8c3'}, {'type': 'PACKAGE',... | {'cwe_ids': ['CWE-74', 'CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:41:50Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5ghv-wxh9-7356 | 2023-06-14T20:33:37Z | 2023-06-14T15:30:37Z | null | ['CVE-2023-35149'] | Jenkins Digital.ai App Management Publisher Plugin missing permission checks | Jenkins Digital.ai App Management Publisher Plugin 2.6 and earlier does not perform permission checks in several HTTP endpoints.
This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials sto... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ease-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35149'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-06-14/#SECURITY-2911'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/06/14/5'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T20:33:37Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3p62-6fjh-3p5h | 2023-07-07T21:47:57Z | 2023-06-30T20:30:50Z | null | ['CVE-2022-4361'] | Keycloak vulnerable to cross-site scripting when validating URI-schemes on SAML and OIDC | AssertionConsumerServiceURL is a Java implementation for SAML Service Providers (org.keycloak.protocol.saml). Affected versions of this package are vulnerable to Cross-site Scripting (XSS).
AssertionConsumerServiceURL allows XSS when sending a crafted SAML XML request. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-services'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '21.1.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/security/advisories/GHSA-3p62-6fjh-3p5h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4361'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/commit/a1cfe6e24e5b34792699a00b8b4a8016a5929e3a'}, {'type': 'WEB', 'url': '... | {'cwe_ids': ['CWE-79', 'CWE-81'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:30:50Z', 'nvd_published_at': None} |
1.4.0 | GHSA-q3q5-qvh5-cmw5 | 2023-06-27T21:59:07Z | 2023-06-20T15:31:08Z | null | ['CVE-2020-21174'] | liufee CMS File Upload vulnerability | File Upload vulnerability in liufee CMS v.2.0.7.1 allows a remote attacker to execute arbitrary code via the image suffix function. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'feehi/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.8.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-21174'}, {'type': 'WEB', 'url': 'https://github.com/liufee/cms/issues/44'}, {'type': 'WEB', 'url': 'https://github.com/liufee/cms/commit/ecbfb0ca77874ead5b6e79b96a5e1f94e67475a9'}, {'type': 'PACKAGE', 'url': 'https://github.com/liufee/cms'}] | {'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-21T22:09:57Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7mcw-xmx3-7p8m | 2023-06-21T17:18:42Z | 2023-06-13T18:30:39Z | null | ['CVE-2023-33695'] | Insecure Temporary File in HuTool | Hutool v5.8.17 and below was discovered to contain an information disclosure vulnerability via the `File.createTempFile()` function at `/core/io/FileUtil.java`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'cn.hutool:hutool-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.8.19'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33695'}, {'type': 'WEB', 'url': 'https://github.com/dromara/hutool/issues/3103'}, {'type': 'WEB', 'url': 'https://github.com/dromara/hutool/commit/c33550f703f5d1d7dd71ad2992d79a5e5532ce2c'}, {'type': 'PACKAGE', 'url': 'https://github.com/dromara/hu... | {'cwe_ids': ['CWE-377', 'CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T16:38:27Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f5h4-wmp5-xhg6 | 2023-06-30T20:29:25Z | 2023-06-30T20:29:25Z | null | ['CVE-2023-2585'] | Client Spoofing within the Keycloak Device Authorisation Grant | Under certain pre-conditions the vulnerability allows an attacker to spoof parts of the device flow and use a device_code to retrieve an access token for other OAuth clients. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-services'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '21.1.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-server-spi-private'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}... | [{'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/security/advisories/GHSA-f5h4-wmp5-xhg6'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/commit/04e6244c387a1bde86184635a0049537611e3915'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:29:25Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jf2f-hvxx-4rqx | 2023-06-26T22:06:15Z | 2023-06-16T18:30:33Z | null | ['CVE-2023-34660'] | jeecg-boot unrestricted file upload vulnerability | jeecg-boot V3.5.0 has an unauthorized arbitrary file upload in `/jeecg-boot/jmreport/upload` interface. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg-boot-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34660'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/issues/4990'}, {'type': 'PACKAGE', 'url': 'https://github.com/jeecgboot/jeecg-boot'}] | {'cwe_ids': ['CWE-434'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-16T20:27:31Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3w3w-pxmm-2w2j | 2023-06-16T22:12:34Z | 2023-06-12T03:30:17Z | null | ['CVE-2020-36732'] | crypto-js uses insecure random numbers | The crypto-js package before 3.2.1 for Node.js generates random numbers by concatenating the string "0." with an integer, which makes the output more predictable than necessary. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'crypto-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36732'}, {'type': 'WEB', 'url': 'https://github.com/brix/crypto-js/issues/254'}, {'type': 'WEB', 'url': 'https://github.com/brix/crypto-js/issues/256'}, {'type': 'WEB', 'url': 'https://github.com/brix/crypto-js/pull/257/commits/e4ac157d8b75b962d653... | {'cwe_ids': ['CWE-330'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-13T12:44:48Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wmxx-2pvr-x7j6 | 2023-06-14T20:30:40Z | 2023-06-14T15:30:37Z | null | ['CVE-2023-35145'] | Jenkins Sonargraph Integration Plugin vulnerable to Stored Cross-site Scripting | Jenkins Sonargraph Integration Plugin 5.0.1 and earlier does not correctly escape the file path and the project name for the Log file field form validation.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:sonargraph-integration'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35145'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-06-14/#SECURITY-3155'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/06/14/5'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T20:29:11Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5cr9-5jx3-2g39 | 2023-06-09T15:03:08Z | 2023-06-06T14:13:08Z | null | ['CVE-2023-34103'] | avo vulnerable to Stored XSS (Cross Site Scripting) in html content based fields | ### Summary
Some avo fields are vulnerable to XSS when rendering html based content.
### Details
During the analysis of the web application, a rendered field was discovered that did not filter JS / HTML tags in a safe way and can be abused to execute js code on a client side. The trix field uses the trix editor in the... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'avo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.33.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.33.2'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'avo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'in... | [{'type': 'WEB', 'url': 'https://github.com/avo-hq/avo/security/advisories/GHSA-5cr9-5jx3-2g39'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34103'}, {'type': 'WEB', 'url': 'https://github.com/avo-hq/avo/commit/7891c01e1fba9ca5d7dbccc43d27f385e5d08563'}, {'type': 'PACKAGE', 'url': 'https://g... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T14:13:08Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x2w4-c67p-g44j | 2023-06-07T15:08:08Z | 2023-06-06T21:30:18Z | null | ['CVE-2023-2801'] | Grafana Missing Synchronization vulnerability | Grafana is an open-source platform for monitoring and observability.
Using public dashboards users can query multiple distinct data sources using mixed queries. However such query has a possibility of crashing a Grafana instance.
The only feature that uses mixed queries at the moment is public dashboards, but it's a... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.4.12'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.5.0'}, {'fixed': '9.5.3'}... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2801'}, {'type': 'PACKAGE', 'url': 'https://github.com/grafana/grafana'}, {'type': 'WEB', 'url': 'https://grafana.com/security/security-advisories/cve-2023-2801/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20230706-0002/'}] | {'cwe_ids': ['CWE-662', 'CWE-820'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-07T15:08:08Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7fj7-39wj-c64f | 2023-06-07T16:01:53Z | 2023-06-07T16:01:53Z | null | ['CVE-2022-3215'] | SwiftNIO vulnerable to Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting') | `NIOHTTP1` and projects using it for generating HTTP responses, including SwiftNIO, can be subject to a HTTP Response Injection attack. This occurs when a HTTP/1.1 server accepts user generated input from an incoming request and reflects it into a HTTP/1.1 response header in some form. A malicious user can add newlines... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'purl-type:swift', 'name': 'github.com/apple/swift-nio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.41.0'}, {'fixed': '2.42.0'}]}]}, {'package': {'ecosystem': 'purl-type:swift', 'name': 'github.com/apple/swift-nio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced... | [{'type': 'WEB', 'url': 'https://github.com/apple/swift-nio/security/advisories/GHSA-7fj7-39wj-c64f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3215'}, {'type': 'WEB', 'url': 'https://github.com/apple/swift-nio/commit/a16e2f54a25b2af217044e5168997009a505930f'}, {'type': 'PACKAGE', 'url': '... | {'cwe_ids': ['CWE-113', 'CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-07T16:01:53Z', 'nvd_published_at': '2022-09-28T20:15:00Z'} |
1.4.0 | GHSA-46g3-f9r8-xj4v | 2023-06-06T01:51:34Z | 2023-06-06T01:51:34Z | null | ['CVE-2023-2984'] | Pimcore vulnerable to Pre-Auth Path Traversal in pimcore_log parameter | ### Impact
A path traversal vulnerability exists in the CMS, which allows an attacker to overwrite or modify sensitive files by manipulating the `pimcore_log` parameter.This can lead to potential denial of service---key file overwrite.
The impact of this vulnerability allows attackers to:
- Overwrite or modify sensi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.22'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/security/advisories/GHSA-46g3-f9r8-xj4v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2984'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/e8dbc4da58ae86618bceb67ed35ce23e5e54d2ed'}, {'type': 'PACKAGE', 'url': '... | {'cwe_ids': ['CWE-29'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T01:51:34Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mrcj-5qxr-vhp2 | 2023-07-07T16:28:14Z | 2023-06-30T18:31:01Z | null | ['CVE-2023-34840'] | angular-ui-notification Cross-site Scripting vulnerability | angular-ui-notification v0.1.0, v0.2.0, and v0.3.6 was discovered to contain a cross-site scripting (XSS) vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'angular-ui-notification'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.0'}, {'last_affected': '0.3.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34840'}, {'type': 'WEB', 'url': 'https://github.com/Xh4H/CVE-2023-34840'}, {'type': 'PACKAGE', 'url': 'https://github.com/alexcrack/angular-ui-notification'}, {'type': 'WEB', 'url': 'http://alexcrack.com'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:35:15Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wmff-grcw-jcfm | 2023-06-21T18:35:21Z | 2023-06-21T18:35:21Z | null | ['CVE-2023-34460'] | Tauri vulnerable to Regression on Filesystem Scope Checks for Dotfiles | ### Impact
The 1.4.0 release includes a regression on the filesystem scope check for dotfiles on Linux and macOS.
Previously dotfiles (eg. `$HOME/.ssh/`) were not implicitly allowed by the glob wildcard scopes (eg. `$HOME/*`), but a regression was introduced when a configuration option for this behavior was implemente... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'tauri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.1'}]}], 'versions': ['1.4.0']}] | [{'type': 'WEB', 'url': 'https://github.com/tauri-apps/tauri/security/advisories/GHSA-6mv3-wm7j-h4w5'}, {'type': 'WEB', 'url': 'https://github.com/tauri-apps/tauri/security/advisories/GHSA-wmff-grcw-jcfm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34460'}, {'type': 'WEB', 'url': 'https://g... | {'cwe_ids': ['CWE-285'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-21T18:35:21Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fpvg-m786-h5vr | 2023-06-26T20:55:12Z | 2023-06-13T18:30:39Z | null | ['CVE-2023-33568'] | Dolibarr vulnerable to unauthenticated database access | An issue in Dolibarr v16.0.0 to v16.0.5 allows unauthenticated attackers to perform a database dump and access a company's entire customer file, prospects, suppliers, and employee information if a contact file exists. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '16.0.0'}, {'fixed': '16.0.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33568'}, {'type': 'WEB', 'url': 'https://github.com/Dolibarr/dolibarr/commit/bb7b69ef43673ed403436eac05e0bc31d5033ff7'}, {'type': 'WEB', 'url': 'https://github.com/Dolibarr/dolibarr/commit/be82f51f68d738cce205f4ce5b469ef42ed82d9e'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-200', 'CWE-552'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T16:23:01Z', 'nvd_published_at': None} |
1.4.0 | GHSA-239c-6cv2-wwx8 | 2023-06-07T16:07:36Z | 2023-06-07T16:07:36Z | null | ['CVE-2022-1642'] | Swift-corelibs-foundation denial of service in JSON decoding with JSONDecoder | ### Impact
A program using swift-corelibs-foundation is vulnerable to a denial of service attack caused by a potentially malicious source producing a JSON document containing a type mismatch.
This vulnerability is caused by the interaction between a deserialization mechanism offered by the Swift standard library, the... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'purl-type:swift', 'name': 'github.com/apple/swift-corelibs-foundation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/apple/swift-corelibs-foundation/security/advisories/GHSA-239c-6cv2-wwx8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1642'}, {'type': 'WEB', 'url': 'https://github.com/apple/swift-corelibs-foundation/commit/b541491f73b39007a38f3ff5a0cbe89d09ef1614... | {'cwe_ids': ['CWE-704'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-07T16:07:36Z', 'nvd_published_at': '2022-06-16T17:15:00Z'} |
1.4.0 | GHSA-hcpw-v727-64qh | 2023-06-20T16:35:50Z | 2023-06-19T21:30:21Z | null | ['CVE-2023-3315'] | Jenkins Team Concert Plugin does not perform permission checks in methods implementing form validation | Jenkins Team Concert Plugin 2.4.1 and earlier does not perform permission checks in methods implementing form validation.
This allows attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.
Team Concert Plugin 2.4.2 requires Overall/A... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:teamconcert'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3315'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-06-14/#SECURITY-2932'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-20T16:35:50Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8vm8-38pc-8xhh | 2023-06-09T16:52:45Z | 2023-06-03T12:30:14Z | null | ['CVE-2023-3084'] | TeamPass vulnerable to stored Cross-site Scripting | Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.9. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'nilsteampassnet/teampass'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3084'}, {'type': 'WEB', 'url': 'https://github.com/nilsteampassnet/teampass/commit/61b9b7d4e33bbaad2cd61a7ee988f9c22298bf1a'}, {'type': 'PACKAGE', 'url': 'https://github.com/nilsteampassnet/teampass'}, {'type': 'WEB', 'url': 'https://huntr.dev/boun... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T02:05:45Z', 'nvd_published_at': None} |
1.4.0 | GHSA-g75c-cjr6-39mc | 2023-06-20T16:44:55Z | 2023-06-20T16:44:55Z | null | ['CVE-2023-34465'] | XWiki Platform's Mail.MailConfig can be edited by any user with edit rights | ### Impact
`Mail.MailConfig` can be edited by any logged-in user by default. Consequently, they can:
- change the mail obfuscation configuration
- view and edit the mail sending configuration, including the smtp domain name and credentials.
### Patches
The problem has been patched on XWiki 14.4.8, 15.1, and 14.10.6.
... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-mail-send-default'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.8-rc-1'}, {'fixed': '14.4.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-mail-send-default'}, 'ranges': [{'type': 'EC... | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-g75c-cjr6-39mc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34465'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/8910b8857d3442d2e8142f655fdc0512930354d1'}, {'type': 'WEB', '... | {'cwe_ids': ['CWE-269'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-20T16:44:55Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3p2q-mh7q-9pxj | 2023-06-19T20:16:20Z | 2023-06-19T03:30:19Z | 2023-06-19T20:16:20Z | [] | Duplicate Advisory: elFinder vulnerable to path traversal in LocalVolumeDriver connector | ### Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-wm5g-p99q-66g4. This link is maintained to preserve external references.
### Original Description
_joinPath in elFinderVolumeLocalFileSystem.class.php in elFinder before 2.1.62 allows path traversal in the PHP LocalVolumeDriver c... | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'studio-42/elfinder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.62'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Studio-42/elFinder/security/advisories/GHSA-wm5g-p99q-66g4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35840'}, {'type': 'WEB', 'url': 'https://github.com/Studio-42/elFinder/commit/bb9aaa7b096a1b83f2f85657c43f12131ece2891'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-19T20:16:20Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cvgc-465m-cw9g | 2023-06-19T22:46:38Z | 2023-06-19T06:30:42Z | null | ['CVE-2023-34603'] | JeecgBoot vulnerable to SQL injection in queryFilterTableDictInfo | JeecgBoot up to v 3.5.1 was discovered to contain a SQL injection vulnerability via the component `queryFilterTableDictInfo` in method `org.jeecg.modules.api.controller.SystemApiController`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg-boot-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34603'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/issues/4984'}, {'type': 'PACKAGE', 'url': 'https://github.com/jeecgboot/jeecg-boot'}] | {'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-19T22:46:38Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8qxh-2gh8-r923 | 2023-06-12T18:34:26Z | 2023-06-12T18:34:26Z | null | [] | cheqd-node subject to Cosmos SDK "Barberry" vulnerability | ### Impact
This [vulnerability dubbed "Barberry" affects the Cosmos SDK framework](https://forum.cosmos.network/t/cosmos-sdk-security-advisory-barberry/10825) used by `cheqd-node` as base.
It impacts the way Cosmos SDK handles vesting accounts, and can therefore be a high-impact vulnerability for any network running t... | [] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/cheqd/cheqd-node'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/cheqd/cheqd-node/security/advisories/GHSA-8qxh-2gh8-r923'}, {'type': 'WEB', 'url': 'https://forum.cosmos.network/t/cosmos-sdk-security-advisory-barberry/10825'}, {'type': 'PACKAGE', 'url': 'https://github.com/cheqd/cheqd-node'}, {'type': 'WEB', 'url': 'https://github.com/cosm... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-12T18:34:26Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3qqg-pgqq-3695 | 2023-06-09T22:51:19Z | 2023-06-09T22:51:19Z | null | ['CVE-2023-34239'] | Gradio vulnerable to arbitrary file read and proxying of arbitrary URLs | ### Impact
There are two separate security vulnerabilities here: (1) a security vulnerability that allows users to read arbitrary files on the machines that are running shared Gradio apps (2) the ability of users to use machines that are sharing Gradio apps to proxy arbitrary URLs
### Patches
Both problems have been s... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'gradio'}, 'ecosystem_specific': {'affected_functions': ['gradio.blocks.Blocks.from_config', 'gradio.blocks.Blocks.render']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.34.0'}]}], 'database_specific': {'last_known_affected_version_range': '<=... | [{'type': 'WEB', 'url': 'https://github.com/gradio-app/gradio/security/advisories/GHSA-3qqg-pgqq-3695'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34239'}, {'type': 'WEB', 'url': 'https://github.com/gradio-app/gradio/pull/4370'}, {'type': 'WEB', 'url': 'https://github.com/gradio-app/gradio/... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T22:51:19Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pm73-x2h5-cmj3 | 2023-07-05T17:16:47Z | 2023-06-23T09:30:17Z | null | ['CVE-2023-31469'] | Apache StreamPipes Improper Privilege Management vulnerability | A REST interface in Apache StreamPipes (versions 0.69.0 to 0.91.0) was not properly restricted to admin-only access. This allowed a non-admin user with valid login credentials to elevate privileges beyond the initially assigned roles.
The issue is resolved by upgrading to StreamPipes 0.92.0.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.streampipes:streampipes-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.69.0'}, {'fixed': '0.92.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-31469'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/streampipes'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/c4y8kf9bzpf36v4bottfmd8tc9cxo19m'}] | {'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-23T21:44:46Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h87r-f4vc-mchv | 2023-06-06T01:51:09Z | 2023-06-06T01:51:09Z | null | [] | PocketMine-MP vulnerable to improperly checked dropped item count leading to server crash | ### Impact
In 4.18.0, the network handling of inventories was completely revamped. Due to this, a bug was introduced which allowed players to request that the server drop more of an item than they had available in their hotbar.
This did not lead to any duplication issues, but instead led to a server crash, and is beli... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pocketmine/pocketmine-mp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.18.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-h87r-f4vc-mchv'}, {'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/commit/58974765a68f63a9968a7ff3a06f584ff2ee08d2'}, {'type': 'PACKAGE', 'url': 'https://github.com/pmmp/PocketMine-MP'}, {'type': 'WEB', 'url': 'https://... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T01:51:09Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9766-v29c-4vm7 | 2023-07-06T16:02:24Z | 2023-06-27T12:30:42Z | null | ['CVE-2023-34395'] | Apache Airflow ODBC Provider Argument Injection vulnerability | Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability in Apache Software Foundation Apache Airflow ODBC Provider.
In OdbcHook, A privilege escalation vulnerability exists in a system due to controllable ODBC driver parameters that allow the loading of arbitrary dynamic-link li... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow-providers-odbc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34395'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/31713'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/commit/2844dad1c762f5c7dd1271866d3661bf66657300'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airf... | {'cwe_ids': ['CWE-88'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:26:04Z', 'nvd_published_at': None} |
1.4.0 | GHSA-66gv-5m8q-rrjc | 2023-06-27T20:18:52Z | 2023-06-14T15:30:38Z | null | ['CVE-2023-34614'] | jsonij vulnerable to stack exhaustion | An issue was discovered jmarsden/jsonij through 0.5.2 allows attackers to cause a denial of service or other unspecified impacts via crafted objects that deeply nested structures. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'cc.plural:jsonij'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.5.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34614'}, {'type': 'PACKAGE', 'url': 'https://bitbucket.org/jmarsden/jsonij'}, {'type': 'WEB', 'url': 'https://bitbucket.org/jmarsden/jsonij/issues/7/stack-overflow-error-caused-by-jsonij'}] | {'cwe_ids': ['CWE-400', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T20:49:08Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x234-mg7q-m8g8 | 2023-06-22T19:59:47Z | 2023-06-22T19:59:47Z | null | ['CVE-2023-35159'] | XWiki Platform vulnerable to reflected cross-site scripting via xredirect parameter in deletespace template | ### Impact
Users are able to forge an URL with a payload allowing to inject Javascript in the page (XSS).
It's possible to exploit the deletespace template to perform a XSS, e.g. by using URL such as:
> xwiki/bin/deletespace/Sandbox/?xredirect=javascript:alert(document.domain)
This vulnerability exists since XWiki 3.... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web-templates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.4-milestone-1'}, {'fixed': '14.10.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web-templates'}, 'ranges': [{'type': 'ECO... | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-x234-mg7q-m8g8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35159'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/5c20ff5e3bdea50f1053fe99a27e011b8d0e4b34'}, {'type': 'PACKAGE... | {'cwe_ids': ['CWE-79', 'CWE-87'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-22T19:59:47Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qfh9-8p57-mjjj | 2023-06-12T18:55:56Z | 2023-06-12T15:30:28Z | null | ['CVE-2023-33290'] | git-url-parse crate vulnerable to Regular Expression Denial of Service | The git-url-parse crate through 0.4.4 for Rust allows Regular Expression Denial of Service (ReDos) via a crafted URL to `normalize_url` in `lib.rs`, a similar issue to CVE-2023-32758 (Python). | [] | [{'package': {'ecosystem': 'crates.io', 'name': 'git-url-parse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.4.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-33290'}, {'type': 'WEB', 'url': 'https://github.com/tjtelan/git-url-parse-rs/issues/51'}, {'type': 'PACKAGE', 'url': 'https://github.com/tjtelan/git-url-parse-rs'}, {'type': 'WEB', 'url': 'https://github.com/tjtelan/git-url-parse-rs/blob/main/src/l... | {'cwe_ids': ['CWE-1333'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-12T18:55:56Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4xm7-5q79-3fch | 2023-06-22T20:00:00Z | 2023-06-22T20:00:00Z | null | ['CVE-2023-35161'] | XWiki Platform vulnerable to reflected cross-site scripting via xredirect parameter in DeleteApplication page | ### Impact
Users are able to forge an URL with a payload allowing to inject Javascript in the page (XSS).
It's possible to exploit the DeleteApplication page to perform a XSS, e.g. by using URL such as:
> xwiki/bin/view/AppWithinMinutes/DeleteApplication?appName=Menu&resolve=true&xredirect=javascript:alert(document.do... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-appwithinminutes-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.2-milestone-1'}, {'fixed': '14.10.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-appwithinminutes-ui'}, 'ranges': [{... | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-4xm7-5q79-3fch'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35161'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/8f5a889b7cd140770e54f5b4195d88058790e305'}, {'type': 'PACKAGE... | {'cwe_ids': ['CWE-79', 'CWE-87'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-22T20:00:00Z', 'nvd_published_at': None} |
1.4.0 | GHSA-g3hh-q55f-9g3w | 2023-06-09T22:42:22Z | 2023-06-08T15:30:20Z | null | ['CVE-2023-3163'] | RuoYi Uncontrolled Resource Consumption vulnerability | A vulnerability was found in y_project RuoYi up to 4.7.7. It has been classified as problematic. Affected is the function filterKeyword. The manipulation of the argument value leads to resource consumption. VDB-231090 is the identifier assigned to this vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.ruoyi:ruoyi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.7.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3163'}, {'type': 'PACKAGE', 'url': 'https://gitee.com/y_project/RuoYi'}, {'type': 'WEB', 'url': 'https://gitee.com/y_project/RuoYi/issues/I78DOR'}, {'type': 'WEB', 'url': 'https://vuldb.com/?ctiid.231090'}, {'type': 'WEB', 'url': 'https://vuldb.com... | {'cwe_ids': ['CWE-400', 'CWE-89'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T22:42:22Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fm68-j7ww-h9xf | 2023-06-30T20:41:57Z | 2023-06-30T20:41:57Z | null | ['CVE-2023-36470'] | XWiki Platform vulnerable to Code Injection in icon themes | ### Impact
By either creating a new or editing an existing document with an icon set, an attacker can inject XWiki syntax and Velocity code that is executed with programming rights and thus allows remote code execution. There are different attack vectors, the simplest is the Velocity code in the icon set's HTML or XWik... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-icon-default'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.2-milestone-1'}, {'fixed': '14.10.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-icon-script'}, 'ranges': [{'type': 'ECOSYS... | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-fm68-j7ww-h9xf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36470'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/46b542854978e9caa687a5c2b8817b8b17877d94'}, {'type': 'WEB', '... | {'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:41:57Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fp7h-f9f5-x4q7 | 2023-06-20T16:44:35Z | 2023-06-20T16:44:35Z | null | ['CVE-2023-34464'] | XWiki vulnerable to stored cross-site scripting via any wiki document and the displaycontent/rendercontent template | ### Impact
Any user who can edit a document in a wiki like the user profile can create a stored XSS attack by putting plain HTML code into that document and then tricking another user to visit that document with the `displaycontent` or `rendercontent` template and plain output syntax. For example, edit any document wi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.1'}, {'fixed': '14.4.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web-templates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{... | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-fp7h-f9f5-x4q7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34464'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/53e8292a31ec70fba5e1d705a4ac443658b9e6df'}, {'type': 'PACKAGE... | {'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-20T16:44:35Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xc8m-28vv-4pjc | 2023-06-30T20:33:26Z | 2023-06-16T09:30:24Z | null | ['CVE-2023-2431'] | Kubelet vulnerable to bypass of seccomp profile enforcement | A security issue was discovered in Kubelet that allows pods to bypass the seccomp profile enforcement. Pods that use localhost type for seccomp profile but specify an empty profile field, are affected by this issue. In this scenario, this vulnerability allows the pod to run in unconfined (seccomp disabled) mode. This b... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.24.14'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.25.0'}, {'fixed': '1.25.10'}]}]}, {'packag... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2431'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/118690'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/pull/117020'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/pull/117116'}... | {'cwe_ids': ['CWE-1287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-16T19:42:18Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pqwh-c2f3-vxmq | 2023-06-09T19:31:54Z | 2023-06-09T19:31:54Z | null | ['CVE-2021-32742'] | Untrusted data fed into `Data.init(base32Encoded:)` can result in exposing server memory and/or crash | ### Impact
A bug in the `Data.init(base32Encoded:)` function opens up the potential for exposing server memory and/or crashing the server (Denial of Service) for applications where untrusted data can end up in said function. Vapor does not currently use this function itself so this only impact applications that use the... | [] | [{'package': {'ecosystem': 'purl-type:swift', 'name': 'github.com/vapor/vapor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.47.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/vapor/vapor/security/advisories/GHSA-pqwh-c2f3-vxmq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32742'}, {'type': 'PACKAGE', 'url': 'https://github.com/vapor/vapor'}, {'type': 'WEB', 'url': 'https://github.com/vapor/vapor/releases/tag/4.47.2'}] | {'cwe_ids': ['CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T19:31:54Z', 'nvd_published_at': '2021-07-09T14:15:00Z'} |
1.4.0 | GHSA-gc34-5v43-h7v8 | 2023-06-22T20:04:01Z | 2023-06-13T18:30:40Z | null | ['CVE-2023-3224'] | nuxt Code Injection vulnerability | he Nuxt dev server between versions 3.4.0 and 3.4.3 is vulnerable to code injection when it is exposed publicly. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'nuxt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.4.0'}, {'fixed': '3.4.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3224'}, {'type': 'WEB', 'url': 'https://github.com/nuxt/nuxt/issues/21694'}, {'type': 'WEB', 'url': 'https://github.com/nuxt/nuxt/commit/65a8f4eb3ef1b249a95fd59e323835a96428baff'}, {'type': 'WEB', 'url': 'https://github.com/nuxt/nuxt/commit/72ba53e... | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-21T22:09:01Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f4m6-x2xj-jc7w | 2023-06-16T19:50:28Z | 2023-06-16T15:30:19Z | null | ['CVE-2023-35783'] | ke_search (aka Faceted Search) vulnerable to Cross-Site Scripting | The ke_search (aka Faceted Search) extension before 4.0.3, 4.1.x through 4.6.x before 4.6.6, and 5.x before 5.0.2 for TYPO3 allows XSS via indexed data. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'tpwd/ke_search'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'tpwd/ke_search'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.6.6'}]}]}, {... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35783'}, {'type': 'WEB', 'url': 'https://github.com/tpwd/ke_search/commit/14fa0703c2469e04eb398be4ae6268ec6ad6e720'}, {'type': 'WEB', 'url': 'https://github.com/tpwd/ke_search/commit/b0f05d7e7e207bc0d5051bd96f3ff43c5c3658c6'}, {'type': 'WEB', 'url'... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-16T19:50:28Z', 'nvd_published_at': None} |
1.4.0 | GHSA-chw4-88xc-79w6 | 2023-06-16T17:47:20Z | 2023-06-09T03:30:24Z | null | ['CVE-2023-3173'] | Froxlor vulnerable to Improper Restriction of Excessive Authentication Attempts | Improper Restriction of Excessive Authentication Attempts in GitHub repository froxlor/froxlor prior to 2.0.20. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'froxlor/froxlor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.20'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3173'}, {'type': 'WEB', 'url': 'https://github.com/froxlor/froxlor/commit/464216072456efb35b4541c58e7016463dfbd9a6'}, {'type': 'PACKAGE', 'url': 'https://github.com/froxlor/froxlor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/4d715f76-950d... | {'cwe_ids': ['CWE-307'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T22:41:26Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qmw8-x364-xxxm | 2023-06-16T17:46:37Z | 2023-06-10T09:30:16Z | null | ['CVE-2023-3191'] | Teampass Cross-site Scripting vulnerability | In versions of nilsteampassnet/teampass prior to 3.0.9 some user input was not properly sanitized which may have lead to stored cross-site scripting (XSS) vectors in the application. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'nilsteampassnet/teampass'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3191'}, {'type': 'WEB', 'url': 'https://github.com/nilsteampassnet/teampass/commit/241dbd4159a5d63b55af426464d30dbb53925705'}, {'type': 'PACKAGE', 'url': 'https://github.com/nilsteampassnet/teampass'}, {'type': 'WEB', 'url': 'https://huntr.dev/boun... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-12T18:00:47Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mwxj-g7fw-7hc8 | 2023-06-26T16:33:58Z | 2023-06-22T19:59:33Z | null | ['CVE-2023-35158'] | XWiki Platform vulnerable to reflected cross-site scripting via xredirect parameter in restore template | ### Impact
Users are able to forge an URL with a payload allowing to inject Javascript in the page (XSS).
It's possible to exploit the restore template to perform a XSS, e.g. by using URL such as:
> /xwiki/bin/view/XWiki/Main?xpage=restore&showBatch=true&xredirect=javascript:alert(document.domain)
This vulnerability ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-flamingo-skin-resources'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.4-rc-1'}, {'fixed': '14.10.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-flamingo-skin-resources'}, 'ranges': [... | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-mwxj-g7fw-7hc8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35158'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/d5472100606c8355ed44ada273e91df91f682738'}, {'type': 'PACKAGE... | {'cwe_ids': ['CWE-87'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-22T19:59:33Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x49m-3cw7-gq5q | 2023-06-26T16:31:23Z | 2023-06-23T21:44:35Z | null | ['CVE-2023-35932'] | jcvi vulnerable to Configuration Injection due to unsanitized user input | ### Summary
A configuration injection happens when user input is considered by the application in an unsanitized format and can reach the configuration file. A malicious user may craft a special payload that may lead to a command injection.
### PoC
The vulnerable code snippet is [/jcvi/apps/base.py#LL2227C1-L2228C41]... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'jcvi'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/tanghaibao/jcvi/security/advisories/GHSA-x49m-3cw7-gq5q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35932'}, {'type': 'PACKAGE', 'url': 'https://github.com/tanghaibao/jcvi'}, {'type': 'WEB', 'url': 'https://github.com/tanghaibao/jcvi/blob/cede6c6... | {'cwe_ids': ['CWE-1284', 'CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-23T21:44:35Z', 'nvd_published_at': None} |
1.4.0 | GHSA-v4f4-23wc-99mh | 2023-07-10T19:06:13Z | 2023-06-30T21:30:26Z | null | ['CVE-2023-31543'] | pipreqs vulnerable to Dependency Confusion | A dependency confusion in pipreqs v0.3.0 to v0.4.11 allows attackers to execute arbitrary code via uploading a crafted PyPI package to the chosen repository server. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pipreqs'}, 'ecosystem_specific': {'affected_functions': ['pipreqs.pipreqs.get_import_local', 'pipreqs.pipreqs.init']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.0'}, {'fixed': '0.4.12'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-31543'}, {'type': 'WEB', 'url': 'https://github.com/bndr/pipreqs/pull/364'}, {'type': 'WEB', 'url': 'https://github.com/bndr/pipreqs/commit/3f5964fcb90ec6eb6df46d78e651a1b73538d0ba'}, {'type': 'WEB', 'url': 'https://gist.github.com/adeadfed/ccc8344... | {'cwe_ids': ['CWE-427'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T22:12:37Z', 'nvd_published_at': None} |
1.4.0 | GHSA-r6ww-5963-7r95 | 2023-06-09T19:33:16Z | 2023-06-09T19:33:16Z | null | ['CVE-2022-24777'] | Denial of Service via reachable assertion | A grpc-swift server is vulnerable to a denial of service attack via a reachable assertion. This was due to incorrect logic when handling `GOAWAY` frames.
The attack is low-effort: it takes very little resources to construct and send the required sequence of frames. The impact on availability is high as the server will... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'purl-type:swift', 'name': 'https://github.com/grpc/grpc-swift.git'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/grpc/grpc-swift/security/advisories/GHSA-r6ww-5963-7r95'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24777'}, {'type': 'WEB', 'url': 'https://github.com/grpc/grpc-swift/commit/858f977f2a51fca2292f384cf7a108dc2e73a3bd'}, {'type': 'PACKAGE', 'url': ... | {'cwe_ids': ['CWE-617'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T19:33:16Z', 'nvd_published_at': '2022-03-25T17:15:00Z'} |
1.4.0 | GHSA-42qm-8v8m-m78c | 2023-06-01T19:10:40Z | 2023-06-01T19:10:40Z | null | [] | PocketMine MP vulnerable to uncontrolled resource consumption via mismatched type of 'InventoryTransactionPacket' | ### Impact
A "mismatch" type `InventoryTransactionPacket` is sent by the client to request a resync of all currently open inventories.
Since PocketMine-MP does not rate-limit these "mismatch" transactions, and the syncing of inventories is not deferred until, e.g. the end of the current tick, they can be used as a ver... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pocketmine/pocketmine-mp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.18.0-ALPHA2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-42qm-8v8m-m78c'}, {'type': 'PACKAGE', 'url': 'https://github.com/pmmp/PocketMine-MP'}, {'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/blob/4.18.0-ALPHA2/changelogs/4.18-alpha.md#4180-ALPHA2'}] | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-01T19:10:40Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c6f8-8r25-c4gc | 2023-06-09T22:52:01Z | 2023-06-09T22:52:01Z | null | ['CVE-2023-34238'] | Gatsby develop server has Local File Inclusion vulnerability | ### Impact
The Gatsby framework prior to versions 4.25.7 and 5.9.1 contain a Local File Inclusion vulnerability in the `__file-code-frame` and `__original-stack-frame` paths, exposed when running the Gatsby develop server (`gatsby develop`).
The following steps can be used to reproduce the vulnerability:
```
# Creat... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'gatsby'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.25.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.25.6'}}, {'package': {'ecosystem': 'npm', 'name': 'gatsby'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introd... | [{'type': 'WEB', 'url': 'https://github.com/gatsbyjs/gatsby/security/advisories/GHSA-c6f8-8r25-c4gc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34238'}, {'type': 'WEB', 'url': 'https://github.com/gatsbyjs/gatsby/commit/ae5a654eb346b2e7a9d341b809b2f82d34c0f17c'}, {'type': 'WEB', 'url': 'htt... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T22:52:01Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5cpq-8wj7-hf2v | 2023-06-02T17:13:10Z | 2023-06-02T17:13:10Z | null | [] | Vulnerable OpenSSL included in cryptography wheels | pyca/cryptography's wheels include a statically linked copy of OpenSSL. The versions of OpenSSL included in cryptography 0.5-40.0.2 are vulnerable to a security issue. More details about the vulnerability itself can be found in https://www.openssl.org/news/secadv/20230530.txt.
If you are building cryptography source (... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'cryptography'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.5'}, {'fixed': '41.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 40.0.2'}}] | [{'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/security/advisories/GHSA-5cpq-8wj7-hf2v'}, {'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/commit/8708245ccdeaff21d65eea68a4f8d2a7c5949a22'}, {'type': 'WEB', 'url': 'https://cryptography.io/en/latest/changelog/#v41-0-0'}, {'type': 'PACKAGE', 'ur... | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-02T17:13:10Z', 'nvd_published_at': None} |
1.4.0 | GHSA-88q2-h5g3-p4pg | 2023-06-14T17:01:16Z | 2023-06-14T17:01:16Z | null | ['CVE-2023-24897'] | .NET Remote Code Execution Vulnerability | # Microsoft Security Advisory CVE-2023-24897: .NET Remote Code Execution Vulnerability
## <a name="executive-summary"></a>Executive summary
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 7.0 and .NET 6.0. This advisory also provides guidance on what developers can d... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Runtime.win-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.5'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NetCore.App.Run... | [{'type': 'WEB', 'url': 'https://github.com/dotnet/runtime/security/advisories/GHSA-88q2-h5g3-p4pg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24897'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/260'}, {'type': 'PACKAGE', 'url': 'https://github.com/dotnet/runtim... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T17:01:16Z', 'nvd_published_at': None} |
1.4.0 | GHSA-96xv-rmwj-6p9w | 2023-06-16T19:36:39Z | 2023-06-16T19:36:39Z | null | ['CVE-2023-34252'] | Grav Server-side Template Injection (SSTI) via Twig Default Filters | Hi,
actually we have sent the bug report to [security@getgrav.org](mailto:security@getgrav.org) on 27th March 2023 and on 10th April 2023.
# Grav Server-side Template Injection (SSTI) via Insufficient Validation in filterFilter
## Summary:
| **Product** | Grav CMS |... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'getgrav/grav'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.42'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/getgrav/grav/security/advisories/GHSA-96xv-rmwj-6p9w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34252'}, {'type': 'WEB', 'url': 'https://github.com/getgrav/grav/commit/244758d4383034fe4cd292d41e477177870b65ec'}, {'type': 'WEB', 'url': 'https://g... | {'cwe_ids': ['CWE-1336', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-16T19:36:39Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7xqx-xwg9-jx34 | 2023-06-27T22:22:11Z | 2023-06-20T15:31:08Z | null | ['CVE-2020-20697'] | NodCMS Cross Site Scripting vulnerability | Cross Site Scripting vulnerability in khodakhah NodCMS v.3.0 allows an attacker with administrative privileges to execute arbitrary code and gain access to sensitive information via a crafted script to the address parameter. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'khodakhah/nodcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-20697'}, {'type': 'WEB', 'url': 'https://github.com/khodakhah/nodcms/issues/41'}, {'type': 'PACKAGE', 'url': 'https://github.com/khodakhah/nodcms'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-21T22:10:00Z', 'nvd_published_at': None} |
1.4.0 | GHSA-49mv-vfcp-8gg9 | 2023-06-30T20:23:28Z | 2023-06-22T21:30:49Z | null | ['CVE-2023-35132'] | Moodle vulnerable to SQL Injection | A limited SQL injection risk was identified on the Mnet SSO access control page. This flaw affects Moodle versions 4.2, 4.1 to 4.1.3, 4.0 to 4.0.8, 3.11 to 3.11.14, 3.9 to 3.9.21 and earlier unsupported versions. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.1'}]}], 'versions': ['4.2.0']}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fi... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35132'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7A72KX4WU6GK2CX4TKYFGFASPKOEOJFC/'}, {'type': 'WEB', 'ur... | {'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-23T21:38:31Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f9jf-4cp4-4fq5 | 2023-06-16T19:35:56Z | 2023-06-16T19:35:56Z | null | ['CVE-2023-34251'] | Grav Server Side Template Injection (SSTI) vulnerability | ### Summary
I found an RCE(Remote Code Execution) by SSTI in the admin screen.
### Details
Remote Code Execution is possible by embedding malicious PHP code on the administrator screen by a user with page editing privileges.
### PoC
1. Log in to the administrator screen and access the edit screen of the default page ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'getgrav/grav'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.42'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/getgrav/grav/security/advisories/GHSA-f9jf-4cp4-4fq5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34251'}, {'type': 'WEB', 'url': 'https://github.com/getgrav/grav/commit/244758d4383034fe4cd292d41e477177870b65ec'}, {'type': 'WEB', 'url': 'https://g... | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-16T19:35:56Z', 'nvd_published_at': None} |
1.4.0 | GHSA-g3jr-6vj4-3x82 | 2023-06-09T22:18:39Z | 2023-06-04T12:30:18Z | null | ['CVE-2023-3095'] | TeamPass vulnerable to Improper Access Control | Improper Access Control in GitHub repository nilsteampassnet/teampass prior to 3.0.9. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'nilsteampassnet/teampass'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3095'}, {'type': 'WEB', 'url': 'https://github.com/nilsteampassnet/teampass/commit/774985f62f080715774604927fba2cb6ef701612'}, {'type': 'PACKAGE', 'url': 'https://github.com/nilsteampassnet/teampass'}, {'type': 'WEB', 'url': 'https://huntr.dev/boun... | {'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T02:06:40Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9rp6-23gf-4c3h | 2023-06-06T18:50:28Z | 2023-06-06T16:39:57Z | null | ['CVE-2022-46165'] | syncthing vulnerable to Cross-site Scripting (XSS) in Web GUI | ## Impact
1. A compromised instance with shared folders could sync malicious files which contain arbitrary HTML and JavaScript in the name.
If the owner of another device looks over the shared folder settings and moves the mouse over the latest sync, a script could be executed to change settings for shared folders or ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/syncthing/syncthing'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.23.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/syncthing/syncthing/security/advisories/GHSA-9rp6-23gf-4c3h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46165'}, {'type': 'WEB', 'url': 'https://github.com/syncthing/syncthing/commit/73c52eafb6566435dffd979c3c49562b6d5a4238'}, {'type': 'WEB', 'ur... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T16:39:57Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xxp4-mf4h-6cwm | 2023-06-30T20:21:55Z | 2023-06-22T21:30:49Z | null | ['CVE-2023-35133'] | Moodle vulnerable to Server Side Request Forgery | An issue in the logic used to check 0.0.0.0 against the cURL blocked hosts lists resulted in an SSRF risk. This flaw affects Moodle versions 4.2, 4.1 to 4.1.3, 4.0 to 4.0.8, 3.11 to 3.11.14, 3.9 to 3.9.21 and earlier unsupported versions. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.1'}]}], 'versions': ['4.2.0']}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fi... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35133'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7A72KX4WU6GK2CX4TKYFGFASPKOEOJFC/'}, {'type': 'WEB', 'ur... | {'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-23T21:38:44Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7px2-3c2p-q4v4 | 2023-06-30T20:38:36Z | 2023-06-30T06:30:14Z | null | ['CVE-2023-26135'] | flatnest Prototype Pollution vulnerability | All versions of the package flatnest are vulnerable to Prototype Pollution via the `nest()` function in `flatnest/nest.js` file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'flatnest'}, 'ecosystem_specific': {'affected_functions': ['flatnest.nest']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26135'}, {'type': 'WEB', 'url': 'https://github.com/brycebaril/node-flatnest/issues/4'}, {'type': 'PACKAGE', 'url': 'https://github.com/brycebaril/node-flatnest'}, {'type': 'WEB', 'url': 'https://github.com/brycebaril/node-flatnest/blob/b7d97ec64a0... | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:38:36Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7q8c-49f4-4c8q | 2023-06-27T19:50:27Z | 2023-06-19T03:30:18Z | null | ['CVE-2023-35839'] | Solon vulnerable to deserialization of untrusted data | Solon before 2.3.3 allows Deserialization of Untrusted Data. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.noear:solon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35839'}, {'type': 'WEB', 'url': 'https://github.com/noear/solon/issues/145'}, {'type': 'PACKAGE', 'url': 'https://github.com/noear/solon'}, {'type': 'WEB', 'url': 'https://github.com/noear/solon/compare/v2.3.2...v2.3.3'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-20T16:09:20Z', 'nvd_published_at': None} |
1.4.0 | GHSA-r8xc-xxh3-q5x3 | 2023-06-30T20:27:58Z | 2023-06-22T19:59:55Z | null | ['CVE-2023-35160'] | XWiki Platform vulnerable to reflected cross-site scripting via back and xcontinue parameters in resubmit template | ### Impact
Users are able to forge an URL with a payload allowing to inject Javascript in the page (XSS).
It's possible to exploit the resubmit template to perform a XSS, e.g. by using URL such as:
> xwiki/bin/view/XWiki/Main?xpage=resubmit&resubmit=javascript:alert(document.domain)&xback=javascript:alert(document.do... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web-templates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5-milestone-2'}, {'fixed': '14.10.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web-templates'}, 'ranges': [{'type': 'ECO... | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-r8xc-xxh3-q5x3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35160'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/dbc92dcdace33823ffd1e1591617006cb5fc6a7f'}, {'type': 'PACKAGE... | {'cwe_ids': ['CWE-79', 'CWE-87'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-22T19:59:55Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x32c-59v5-h7fg | 2023-06-14T21:14:49Z | 2023-06-14T15:30:39Z | null | ['CVE-2023-34540'] | Langchain OS Command Injection vulnerability | Langchain 0.0.171 is vulnerable to Arbitrary Code Execution via command injection in the `jira.run()` command | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'langchain'}, 'ecosystem_specific': {'affected_functions': ['langchain.utilities.jira.JiraAPIWrapper.run']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.225'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34540'}, {'type': 'WEB', 'url': 'https://github.com/hwchase17/langchain/issues/4833'}, {'type': 'WEB', 'url': 'https://github.com/langchain-ai/langchain/issues/4833'}, {'type': 'WEB', 'url': 'https://github.com/langchain-ai/langchain/pull/6992'}, {... | {'cwe_ids': ['CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T21:02:46Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5fp6-4xw3-xqq3 | 2023-06-23T13:56:28Z | 2023-06-12T18:37:31Z | null | [] | @keystone-6/core's bundled cuid package known to be insecure | ### Summary
The `cuid` package used by `@keystone-6/*` and upstream dependencies is deprecated and [marked as insecure by the author](https://github.com/paralleldrive/cuid#status-deprecated-due-to-security-use-cuid2-instead).
As reported by the author
> Cuid and other k-sortable and non-cryptographic ids (Ulid, Object... | [] | [{'package': {'ecosystem': 'npm', 'name': '@keystone-6/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.3.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/security/advisories/GHSA-5fp6-4xw3-xqq3'}, {'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/issues/8282#issuecomment-1586019823'}, {'type': 'PACKAGE', 'url': 'https://github.com/keystonejs/keystone'}, {'type': 'WEB', 'url': 'https://github.co... | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-06-12T18:37:31Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rm8v-mxj3-5rmq | 2023-06-14T17:24:36Z | 2023-06-14T17:24:36Z | null | [] | github.com/lestrrat-go/jwx vulnerable to Potential Padding Oracle Attack | ### Summary
Decrypting AES-CBC encrypted JWE has Potential Padding Oracle Attack Vulnerability.
### Details
On [v2.0.10](https://github.com/lestrrat-go/jwx/releases/tag/v2.0.10), decrypting AES-CBC encrypted JWE may return an error "failed to generate plaintext from decrypted blocks: invalid padding":
https://githu... | [] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/lestrrat-go/jwx/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.10'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/lestrrat-go/jwx'}, 'ranges': [... | [{'type': 'WEB', 'url': 'https://github.com/lestrrat-go/jwx/security/advisories/GHSA-rm8v-mxj3-5rmq'}, {'type': 'WEB', 'url': 'https://github.com/lestrrat-go/jwx/commit/6c41e3822485fc7e11dd70b4b0524b075d66b103'}, {'type': 'WEB', 'url': 'https://github.com/lestrrat-go/jwx/commit/d9ddbc8e5009cfdd8c28413390b67afa7f576dd6'... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-14T17:24:36Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6w63-h3fj-q4vw | 2023-06-06T17:33:13Z | 2023-06-06T17:33:13Z | null | ['CVE-2023-34104'] | fast-xml-parser vulnerable to Regex Injection via Doctype Entities | ### Impact
"fast-xml-parser" allows special characters in entity names, which are not escaped or sanitized. Since the entity name is used for creating a regex for searching and replacing entities in the XML body, an attacker can abuse it for DoS attacks. By crafting an entity name that results in an intentionally bad p... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'fast-xml-parser'}, 'ecosystem_specific': {'affected_functions': ['fast-xml-parser.XMLParser']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/NaturalIntelligence/fast-xml-parser/security/advisories/GHSA-6w63-h3fj-q4vw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-34104'}, {'type': 'WEB', 'url': 'https://github.com/NaturalIntelligence/fast-xml-parser/commit/39b0e050bb909e8499478657f84a307... | {'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T17:33:13Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8rc9-vxjh-qjf2 | 2023-06-26T16:32:12Z | 2023-06-20T16:36:18Z | null | ['CVE-2023-35163'] | Vega's validators able to submit duplicate transactions | A vulnerability exists that allows a malicious validator to trick the Vega network into re-processing past Ethereum events from Vega’s Ethereum bridge. For example, a deposit to the collateral bridge for 100USDT that credits a party’s general account on Vega, can be re-processed 50 times resulting in 5000USDT in that p... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:C/C:H/I:L/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'code.vegaprotocol.io/vega'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.71.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/vegaprotocol/vega/security/advisories/GHSA-8rc9-vxjh-qjf2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-35163'}, {'type': 'WEB', 'url': 'https://github.com/vegaprotocol/vega/commit/56b09bf57af8cd9eca5996252d86f469a3e34c68'}, {'type': 'PACKAGE', 'ur... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-20T16:36:18Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vpxf-q44g-w34w | 2023-07-03T18:38:23Z | 2023-06-30T20:36:55Z | null | ['CVE-2023-36815'] | Sealos billing system permission control defect | ### Summary
There is a permission flaw in the Sealos billing system, which allows users to control the recharge resource account. sealos. io/v1/Payment, resulting in the ability to recharge any amount of 1 RMB.
### Details
The reason is that sealos is in arrears. Egg pain, we can't create a terminal anymore. Let's c... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/labring/sealos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.2.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/labring/sealos/security/advisories/GHSA-vpxf-q44g-w34w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-36815'}, {'type': 'PACKAGE', 'url': 'https://github.com/labring/sealos'}] | {'cwe_ids': ['CWE-287', 'CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:36:55Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c6fv-3jm9-6r8f | 2023-06-09T16:52:12Z | 2023-06-03T09:30:16Z | null | ['CVE-2023-3083'] | TeamPass vulnerable to stored Cross-site Scripting | Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.9. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'nilsteampassnet/teampass'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-3083'}, {'type': 'WEB', 'url': 'https://github.com/nilsteampassnet/teampass/commit/79731553fa305d45dabb7a227f3074d56d7c94c1'}, {'type': 'PACKAGE', 'url': 'https://github.com/nilsteampassnet/teampass'}, {'type': 'WEB', 'url': 'https://huntr.dev/boun... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-06T02:05:23Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6449-vf6p-9hfp | 2023-01-24T18:05:48Z | 2023-01-16T00:30:24Z | null | ['CVE-2023-0312'] | thorsten/phpmyfaq is vulnerable to cross-site scripting (XSS) | Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.10. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0312'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/65d419ca04111ee2612ae81cdd59753654cfe18a'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpMyFAQ'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/f50ec8d1-... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-19T11:47:51Z', 'nvd_published_at': '2023-01-15T22:15:00Z'} |
1.4.0 | GHSA-rw83-v3pw-m362 | 2023-02-07T23:25:27Z | 2023-01-30T06:30:27Z | 2023-02-01T20:04:51Z | [] | Withdrawn: safeurl-python contains Server-Side Request Forgery | ## Withdrawn
This advisory has been withdrawn as a duplicate of [GHSA-jgh8-vchw-q3g7](https://github.com/advisories/GHSA-jgh8-vchw-q3g7).
## Original Description
isInList in the safeurl-python package before 1.2 for Python has an insufficiently restrictive regular expression for external domains, leading to SSRF. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'safeurl-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/IncludeSecurity/safeurl-python/security/advisories/GHSA-jgh8-vchw-q3g7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24622'}, {'type': 'PACKAGE', 'url': 'https://github.com/IncludeSecurity/safeurl-python'}] | {'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-01T20:04:51Z', 'nvd_published_at': '2023-01-30T05:15:00Z'} |
1.4.0 | GHSA-w7w4-qjgg-372x | 2023-02-07T21:22:10Z | 2023-01-30T00:30:35Z | null | ['CVE-2023-0566'] | Froxlor contains Static Code Injection | Static Code Injection in GitHub repository froxlor/froxlor prior to 2.0.10. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'froxlor/froxlor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0566'}, {'type': 'WEB', 'url': 'https://github.com/froxlor/froxlor/commit/bd5b99dc1c06f594b9563d459a50bf3b32504876'}, {'type': 'PACKAGE', 'url': 'https://github.com/Froxlor/Froxlor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8339e4f1-d430... | {'cwe_ids': ['CWE-79', 'CWE-96'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-01T01:38:29Z', 'nvd_published_at': '2023-01-29T22:15:00Z'} |
1.4.0 | GHSA-8r5j-22j5-w4cm | 2023-02-08T17:57:31Z | 2023-01-20T18:30:22Z | null | ['CVE-2021-26642'] | XpressEngine vulnerable to Unrestricted Upload of File with Dangerous Type | When uploading an image file to a bulletin board developed with XpressEngine, a vulnerability in which an arbitrary file can be uploaded due to insufficient verification of the file. A remote attacker can use this vulnerability to execute arbitrary code on the server where the bulletin board is running. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'xpressengine/xpressengine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.15'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26642'}, {'type': 'WEB', 'url': 'https://github.com/xpressengine/xpressengine/issues/1366'}, {'type': 'WEB', 'url': 'https://boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=67125'}] | {'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T17:57:31Z', 'nvd_published_at': '2023-01-20T17:15:00Z'} |
1.4.0 | GHSA-3hc7-2xcc-7p8f | 2023-01-12T23:44:02Z | 2023-01-07T21:30:40Z | null | ['CVE-2020-36645'] | Squalor SQL Injection vulnerability | A vulnerability, which was classified as critical, was found in square squalor. This affects an unknown part. The manipulation leads to sql injection. Upgrading to version v0.0.0 is able to address this issue. The name of the patch is f6f0a47cc344711042eb0970cb423e6950ba3f93. It is recommended to upgrade the affected c... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/square/squalor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36645'}, {'type': 'WEB', 'url': 'https://github.com/square/squalor/pull/76'}, {'type': 'WEB', 'url': 'https://github.com/square/squalor/commit/f6f0a47cc344711042eb0970cb423e6950ba3f93'}, {'type': 'PACKAGE', 'url': 'https://github.com/square/squalor... | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-12T23:44:02Z', 'nvd_published_at': '2023-01-07T19:15:00Z'} |
1.4.0 | GHSA-9f2c-xxfm-32mj | 2023-01-11T18:58:40Z | 2023-01-11T06:30:20Z | 2023-01-11T18:58:40Z | [] | Duplicate of GHSA-4xh4-v2pq-jvhm | ## Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of [GHSA-4xh4-v2pq-jvhm](https://github.com/advisories/GHSA-4xh4-v2pq-jvhm). This link is maintained to preserve external references.
## Original Description
The personnummer implementation before 3.0.3 for Dart mishandles numbers in wh... | [] | [{'package': {'ecosystem': 'Pub', 'name': 'personnummer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/personnummer/dart/security/advisories/GHSA-4xh4-v2pq-jvhm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22963'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4xh4-v2pq-jvhm'}] | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-01-11T18:58:40Z', 'nvd_published_at': '2023-01-11T06:15:00Z'} |
1.4.0 | GHSA-f976-24hc-mjvr | 2023-01-27T01:02:10Z | 2023-01-26T21:30:18Z | null | ['CVE-2023-24444'] | Session fixation vulnerability in Jenkins OpenID Plugin | Jenkins OpenID Plugin 2.4 and earlier does not invalidate the previous session on login. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:openid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24444'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2996'}] | {'cwe_ids': ['CWE-384'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:02:10Z', 'nvd_published_at': '2023-01-26T21:18:00Z'} |
1.4.0 | GHSA-rqv2-275x-2jq5 | 2023-02-10T00:21:49Z | 2023-01-18T18:19:21Z | null | ['CVE-2022-44572'] | Denial of service via multipart parsing in Rack | There is a denial of service vulnerability in the multipart parsing component of Rack. This vulnerability has been assigned the CVE identifier CVE-2022-44572.
Versions Affected: >= 2.0.0 Not affected: None. Fixed Versions: 2.0.9.2, 2.1.4.2, 2.2.6.1, 3.0.0.1
Impact
Carefully crafted input can cause RFC2183 multipart b... | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.9.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0.0'}, {'fixed': '2.1.4.2'}]}]}, {'package': {'eco... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-44572'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1639882'}, {'type': 'PACKAGE', 'url': 'https://github.com/rack/rack'}, {'type': 'WEB', 'url': 'https://github.com/rack/rack/releases/tag/v3.0.4.1'}, {'type': 'WEB', 'url': 'https://gith... | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-01-18T18:19:21Z', 'nvd_published_at': '2023-02-09T20:15:00Z'} |
1.4.0 | GHSA-vxmh-p52j-h33m | 2023-02-03T20:46:07Z | 2023-01-26T21:30:18Z | null | ['CVE-2023-24424'] | Session fixation vulnerability in Jenkins OpenId Connect Authentication Plugin | Jenkins OpenId Connect Authentication Plugin 2.4 and earlier does not invalidate the previous session on login. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:oic-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24424'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2978'}] | {'cwe_ids': ['CWE-384'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:06:14Z', 'nvd_published_at': '2023-01-26T21:18:00Z'} |
1.4.0 | GHSA-8hcf-2m4v-f2rq | 2023-01-24T20:29:47Z | 2023-01-16T12:30:18Z | null | ['CVE-2016-15020'] | SQL Injection in liftkit/database | A vulnerability was found in liftkit database up to 2.13.1. It has been classified as critical. This affects the function processOrderBy of the file src/Query/Query.php. The manipulation leads to sql injection. Upgrading to version 2.13.2 is able to address this issue. The name of the patch is 42ec8f2b22e0b0b98fb5b4444... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'liftkit/database'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.13.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-15020'}, {'type': 'WEB', 'url': 'https://github.com/liftkit/database/commit/42ec8f2b22e0b0b98fb5b4444ed451c1b21d125a'}, {'type': 'PACKAGE', 'url': 'https://github.com/liftkit/database'}, {'type': 'WEB', 'url': 'https://github.com/liftkit/database/r... | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-24T20:29:47Z', 'nvd_published_at': '2023-01-16T11:15:00Z'} |
1.4.0 | GHSA-7mc4-jp4f-v2j2 | 2023-01-25T22:03:13Z | 2023-01-14T09:30:23Z | null | ['CVE-2023-0298'] | Improper Authorization in grumpydictator/firefly-iii | Improper Authorization in GitHub repository firefly-iii/firefly-iii prior to 5.8.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'grumpydictator/firefly-iii'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.8.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0298'}, {'type': 'WEB', 'url': 'https://github.com/firefly-iii/firefly-iii/commit/db0500dcf0d4f1990fc7a377ef0d56c3884fcaa4'}, {'type': 'PACKAGE', 'url': 'https://github.com/firefly-iii/firefly-iii'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounti... | {'cwe_ids': ['CWE-285', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-25T22:03:13Z', 'nvd_published_at': '2023-01-14T08:15:00Z'} |
1.4.0 | GHSA-cxvp-3frm-3876 | 2023-01-24T18:52:56Z | 2023-01-16T12:30:18Z | null | ['CVE-2022-41703'] | Apache Superset's SQL Alchemy connector vulnerable to SQL Injection | A vulnerability in the SQL Alchemy connector of Apache Superset allows an authenticated user with read access to a specific database to add subqueries to the WHERE and HAVING fields referencing tables on the same database that the user should not have access to, despite the user having the feature flag "ALLOW_ADHOC_SUB... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'versions': ['2.0.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41703'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/superset'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/g7jjw0okxjk5y57pbbxy19ydw42kqcos'}] | {'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-20T23:17:15Z', 'nvd_published_at': '2023-01-16T11:15:00Z'} |
1.4.0 | GHSA-579w-22j4-4749 | 2023-08-18T21:11:49Z | 2023-01-18T18:21:12Z | null | ['CVE-2022-44566'] | Denial of Service Vulnerability in ActiveRecord's PostgreSQL adapter | There is a potential denial of service vulnerability present in ActiveRecord’s PostgreSQL adapter.
This has been assigned the CVE identifier CVE-2022-44566.
Versions Affected: All. Not affected: None. Fixed Versions: 5.2.8.15 (Rails LTS, which is a paid service and not part of the rubygem), 6.1.7.1, 7.0.4.1
Impact:
... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.1.7.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ecosystem_specific': {'affected_functions': ['']}... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-44566'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/4f44aa9d514e701ada92b5cf08beccf566eeaebf'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/82bcdc011e2ff674e7dd8fd8cee3a831c908d29b'}, {'type': 'WEB', 'url': 'htt... | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-18T18:21:12Z', 'nvd_published_at': '2023-02-09T20:15:00Z'} |
1.4.0 | GHSA-v9mp-j8g7-2q6m | 2023-02-08T21:51:47Z | 2023-01-30T06:30:27Z | null | ['CVE-2023-24623'] | Paranoidhttp Server-Side Request Forgery vulnerability | Paranoidhttp before 0.3.0 allows SSRF because [::] is equivalent to the 127.0.0.1 address, but does not match the filter for private addresses. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/hakobe/paranoidhttp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24623'}, {'type': 'WEB', 'url': 'https://github.com/hakobe/paranoidhttp/commit/07f671da14ce63a80f4e52432b32e8d178d75fd3'}, {'type': 'PACKAGE', 'url': 'https://github.com/hakobe/paranoidhttp'}, {'type': 'WEB', 'url': 'https://github.com/hakobe/paran... | {'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T21:51:47Z', 'nvd_published_at': '2023-01-30T05:15:00Z'} |
1.4.0 | GHSA-jmj6-p2j9-68cp | 2023-01-25T21:37:25Z | 2023-01-13T06:30:22Z | null | ['CVE-2022-3143'] | Wildfly-elytron possibly vulnerable to timing attacks via use of unsafe comparator | wildfly-elytron: possible timing attacks via use of unsafe comparator. A flaw was found in Wildfly-elytron. Wildfly-elytron uses `java.util.Arrays.equals` in several places, which is unsafe and vulnerable to timing attacks. To compare values securely, use `java.security.MessageDigest.isEqual` instead. This flaw allows ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.wildfly.security:wildfly-elytron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.15.Final'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.wildfly.security:wildfly-elytron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduc... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3143'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2022-3143'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2124682'}, {'type': 'PACKAGE', 'url': 'https://github.com/wildfly-security/wildfly-elytron'}... | {'cwe_ids': ['CWE-203', 'CWE-208'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-13T21:32:28Z', 'nvd_published_at': '2023-01-13T06:15:00Z'} |
1.4.0 | GHSA-gqx8-hxmv-c4v4 | 2023-01-24T23:29:03Z | 2023-01-09T21:56:09Z | null | ['CVE-2023-22478'] | KubePi may allow unauthorized access to system API | ### Summary
Unauthorized access refers to the ability to bypass the system's preset permission settings to access some API interfaces. The attack exploits a flaw in how online applications handle routing permissions.
### Affected Version
<= v1.6.3
### Patches
The vulnerability has been fixed in v1.6.4.
https://githu... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/KubeOperator/kubepi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.6.3'}}] | [{'type': 'WEB', 'url': 'https://github.com/1Panel-dev/KubePi/security/advisories/GHSA-gqx8-hxmv-c4v4'}, {'type': 'WEB', 'url': 'https://github.com/KubeOperator/KubePi/security/advisories/GHSA-gqx8-hxmv-c4v4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22478'}, {'type': 'WEB', 'url': 'https... | {'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T21:56:09Z', 'nvd_published_at': '2023-01-14T01:15:00Z'} |
1.4.0 | GHSA-ggj9-6x8j-49w9 | 2023-01-10T00:40:56Z | 2023-01-01T18:30:22Z | null | ['CVE-2010-10002'] | SimpleSAMLphp simplesamlphp-module-openid | A vulnerability classified as problematic has been found in SimpleSAMLphp simplesamlphp-module-openid. Affected is an unknown function of the file `templates/consumer.php` of the component `OpenID Handler`. The manipulation of the argument `AuthState` leads to cross site scripting. It is possible to launch the attack r... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'simplesamlphp/simplesamlphp-module-openid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-10002'}, {'type': 'WEB', 'url': 'https://github.com/simplesamlphp/simplesamlphp-module-openid/commit/d652d41ccaf8c45d5707e741c0c5d82a2365a9a3'}, {'type': 'PACKAGE', 'url': 'https://github.com/simplesamlphp/simplesamlphp-module-openid'}, {'type': 'W... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-10T00:40:56Z', 'nvd_published_at': '2023-01-01T17:15:00Z'} |
1.4.0 | GHSA-76qj-9gwh-pvv3 | 2023-02-06T16:45:45Z | 2023-01-26T21:30:19Z | null | ['CVE-2023-24422'] | Sandbox bypass in Jenkins Script Security Plugin | A sandbox bypass vulnerability involving map constructors in Jenkins Script Security Plugin 1228.vd93135a_2fb_25 and earlier allows attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:script-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1229.v4880b'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24422'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/script-security-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-3016'}] | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:05:51Z', 'nvd_published_at': '2023-01-26T21:18:00Z'} |
1.4.0 | GHSA-7m37-cx35-qgmr | 2023-01-11T23:47:54Z | 2023-01-04T18:31:00Z | null | ['CVE-2022-48216'] | Uniswap Universal Router Incorrect Authorization vulnerability | Uniswap Universal Router before 1.1.0 mishandles reentrancy. This would have allowed theft of funds. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': '@uniswap/universal-router'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-48216'}, {'type': 'WEB', 'url': 'https://github.com/Uniswap/universal-router/pull/189'}, {'type': 'WEB', 'url': 'https://github.com/Uniswap/universal-router/commit/d82c6685ef566d9b280651c99f4b93a8454c08a8'}, {'type': 'PACKAGE', 'url': 'https://gith... | {'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-11T23:47:54Z', 'nvd_published_at': '2023-01-04T16:15:00Z'} |
1.4.0 | GHSA-9c64-x3cx-vgmm | 2023-01-23T20:35:23Z | 2023-01-23T15:30:33Z | null | ['CVE-2023-0438'] | Cross-Site Request Forgery in modoboa | Cross-Site Request Forgery (CSRF) in GitHub repository modoboa/modoboa prior to 2.0.4. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'modoboa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0438'}, {'type': 'WEB', 'url': 'https://github.com/modoboa/modoboa/commit/38d778cc71e370216e067d054ce0169ad83078c8'}, {'type': 'PACKAGE', 'url': 'https://github.com/modoboa/modoboa'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/07a5b61b-306d... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-23T20:35:23Z', 'nvd_published_at': '2023-01-23T14:15:00Z'} |
1.4.0 | GHSA-g5vm-525q-r66c | 2023-02-01T01:37:19Z | 2023-01-18T21:30:21Z | null | ['CVE-2023-0242'] | Velociraptor vulnerable to Missing Authorization | Rapid7 Velociraptor allows users to be created with different privileges on the server. Administrators are generally allowed to run any command on the server including writing arbitrary files. However, lower privilege users are generally forbidden from writing or modifying files on the server. The VQL copy() function a... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'www.velocidex.com/golang/velociraptor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.7-5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-0242'}, {'type': 'WEB', 'url': 'https://docs.velociraptor.app/announcements/2023-cves/#:~:text=to%20upgrade%20clients.-,CVE%2D2023%2D0242,-Insufficient%20Permission%20Check'}, {'type': 'PACKAGE', 'url': 'https://github.com/Velocidex/velociraptor'}] | {'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-01T01:37:19Z', 'nvd_published_at': '2023-01-18T21:15:00Z'} |
1.4.0 | GHSA-9445-4cr6-336r | 2023-06-26T22:33:39Z | 2023-01-18T18:21:23Z | null | ['CVE-2023-22797'] | Open Redirect Vulnerability in Action Pack | There is a vulnerability in Action Controller’s redirect_to. This vulnerability has been assigned the CVE identifier CVE-2023-22797.
Versions Affected: >= 7.0.0 Not affected: < 7.0.0 Fixed Versions: 7.0.4.1
Impact
There is a possible open redirect when using the redirect_to helper with untrusted user input.
Vulnera... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22797'}, {'type': 'WEB', 'url': 'https://discuss.rubyonrails.org/t/cve-2023-22799-possible-redos-based-dos-vulnerability-in-globalid/82127'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/r... | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-18T18:21:23Z', 'nvd_published_at': '2023-02-09T20:15:00Z'} |
1.4.0 | GHSA-6j27-3xfw-cj2w | 2023-02-06T16:41:08Z | 2023-01-26T21:30:18Z | null | ['CVE-2023-24438'] | Missing permissions check in Jenkins JIRA Pipeline Steps Plugin | A missing permission check in Jenkins JIRA Pipeline Steps Plugin 2.0.165.v8846cf59f3db and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:jira-steps'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.165.v8846cf59f3db'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-24438'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2786'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T01:08:29Z', 'nvd_published_at': '2023-01-26T21:18:00Z'} |
1.4.0 | GHSA-9mjx-wfqp-j5ph | 2023-01-10T21:42:15Z | 2023-01-04T18:30:59Z | null | ['CVE-2022-25926'] | window-control vulnerable to Command Injection due to improper input sanitization | window-control is an npm package that provides tools to manage window focus. Versions before 1.4.5 are vulnerable to Command Injection via the `sendKeys` function due to improper input sanitization. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'window-control'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25926'}, {'type': 'WEB', 'url': 'https://github.com/bruno-robert/window-control/commit/075c854534a749d887655a906759f5a7eee95173'}, {'type': 'PACKAGE', 'url': 'https://github.com/bruno-robert/window-control'}, {'type': 'WEB', 'url': 'https://github.... | {'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-06T21:39:16Z', 'nvd_published_at': '2023-01-04T18:15:00Z'} |
1.4.0 | GHSA-wqqv-jcfr-9f5g | 2023-01-09T20:07:27Z | 2023-01-09T20:07:27Z | null | [] | PocketMine-MP has improperly handled dye colour IDs in banner NBT, leading to server crash | ### Impact
`DyeColorIdMap->fromId()` did not account for the possibility that it might be given invalid input. This means that an undefined offset error would occur whenever this happened.
This code is indirectly called during [`Banner->deserializeCompoundTag()`](https://github.com/pmmp/PocketMine-MP/blob/38d6284671e8... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pocketmine/pocketmine-mp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.8.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-wqqv-jcfr-9f5g'}, {'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/commit/08b9495bce2d65a6d1d3eeb76e484499a00765eb'}, {'type': 'PACKAGE', 'url': 'https://github.com/pmmp/PocketMine-MP'}, {'type': 'WEB', 'url': 'https://... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T20:07:27Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wxgh-8gmr-3qh3 | 2023-01-12T23:43:03Z | 2023-01-07T18:30:20Z | null | ['CVE-2021-4306'] | terminal-kit Inefficient Regular Expression Complexity vulnerability | A vulnerability classified as problematic has been found in cronvel terminal-kit up to 2.1.7. Affected is an unknown function. The manipulation leads to inefficient regular expression complexity. Upgrading to version 2.1.8 can address this issue. The name of the patch is a2e446cc3927b559d0281683feb9b821e83b758c. It is ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'terminal-kit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4306'}, {'type': 'WEB', 'url': 'https://github.com/cronvel/terminal-kit/commit/a2e446cc3927b559d0281683feb9b821e83b758c'}, {'type': 'PACKAGE', 'url': 'https://github.com/cronvel/terminal-kit'}, {'type': 'WEB', 'url': 'https://github.com/cronvel/ter... | {'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-12T23:43:03Z', 'nvd_published_at': '2023-01-07T17:15:00Z'} |
1.4.0 | GHSA-xj9v-6q2f-vqhx | 2023-01-13T17:15:16Z | 2023-01-09T06:30:26Z | null | ['CVE-2022-25890'] | wifey vulnerable to Command Injection due to improper input sanitization | All versions of the package wifey are vulnerable to Command Injection via the `connect()` function due to improper input sanitization. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'wifey'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25890'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-WIFEY-3175615'}] | {'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T21:56:33Z', 'nvd_published_at': '2023-01-09T05:15:00Z'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.