schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 20 140 | details stringlengths 56 37.2k | severity stringlengths 2 92 | affected stringlengths 88 7.07k | references stringlengths 139 4.72k | database_specific stringlengths 131 185 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-g36h-4jr6-qmm9 | 2023-05-10T00:38:15Z | 2023-04-26T15:30:21Z | null | ['CVE-2022-25273'] | Improper input validation in Drupal core | Drupal core's form API has a vulnerability where certain contributed or custom modules' forms may be vulnerable to improper input validation. This could allow an attacker to inject disallowed values or overwrite data. Affected forms are uncommon, but in certain cases an attacker could alter critical or sensitive data.
... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '9.2.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.3.0'}, {'fixed': '9.3.12'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25273'}, {'type': 'PACKAGE', 'url': 'https://github.com/drupal/core'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2022-008'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-26T19:41:46Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rrm6-wvj7-cwh2 | 2023-04-21T20:24:21Z | 2023-04-21T20:24:21Z | null | ['CVE-2023-30608'] | sqlparse contains a regular expression that is vulnerable to Regular Expression Denial of Service | ### Impact
The SQL parser contains a regular expression that is vulnerable to [ReDoS](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS) (Regular Expression Denial of Service). The vulnerability may lead to Denial of Service (DoS).
### Patches
This issues has been fixed in sqlparse 0... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'sqlparse'}, 'ecosystem_specific': {'affected_functions': ['sqlparse.keywords.SQL_REGEX', 'sqlparse.lexer.Lexer']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.15'}, {'fixed': '0.4.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/andialbrecht/sqlparse/security/advisories/GHSA-rrm6-wvj7-cwh2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30608'}, {'type': 'WEB', 'url': 'https://github.com/andialbrecht/sqlparse/commit/c457abd5f097dd13fb21543381e7cfafe7d31cfb'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-1333'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-21T20:24:21Z', 'nvd_published_at': None} |
1.4.0 | GHSA-v5hq-cqqr-6w4g | 2023-04-12T22:21:03Z | 2023-04-12T18:30:37Z | null | ['CVE-2023-30513'] | Jenkins Kubernetes Plugin does not properly mask credentials | Multiple Jenkins plugins do not properly mask (i.e., replace with asterisks) credentials printed in the build log from Pipeline steps like sh and bat, when both of the following conditions are met:
- The credentials are printed in build steps executing on an agent (typically inside a node block).
- Push mode for dura... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.csanchez.jenkins.plugins:kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3910.ve59cec5e33ea'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30513'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-04-12/#SECURITY-3075'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/04/13/3'}] | {'cwe_ids': ['CWE-319'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-12T22:21:03Z', 'nvd_published_at': '2023-04-12T18:15:00Z'} |
1.4.0 | GHSA-p26g-97m4-6q7c | 2023-04-18T22:19:57Z | 2023-04-18T22:19:57Z | null | ['CVE-2023-26049'] | Eclipse Jetty's cookie parsing of quoted values can exfiltrate values from other cookies | Nonstandard cookie parsing in Jetty may allow an attacker to smuggle cookies within other cookies, or otherwise perform unintended behavior by tampering with the cookie parsing mechanism.
If Jetty sees a cookie VALUE that starts with `"` (double quote), it will continue to read the cookie string until it sees a closin... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.4.51.v20230217'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.... | [{'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-p26g-97m4-6q7c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26049'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/pull/9339'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/je... | {'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-04-18T22:19:57Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6wrf-mxfj-pf5p | 2023-04-05T23:15:38Z | 2023-04-04T21:11:24Z | null | ['CVE-2023-28842'] | Docker Swarm encrypted overlay network with a single endpoint is unauthenticated | [Moby](https://mobyproject.org/) is an open source container framework developed by Docker Inc. that is distributed as Docker, Mirantis Container Runtime, and various other downstream projects/products. The Moby daemon component (`dockerd`), which is developed as [moby/moby](https://github.com/moby/moby) is commonly re... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/docker/docker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.0'}, {'fixed': '20.10.24'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/docker/docker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '23.0.0'}, {'fixed': '23.... | [{'type': 'WEB', 'url': 'https://github.com/moby/libnetwork/security/advisories/GHSA-gvm4-2qqg-m333'}, {'type': 'WEB', 'url': 'https://github.com/moby/moby/security/advisories/GHSA-232p-vwff-86mp'}, {'type': 'WEB', 'url': 'https://github.com/moby/moby/security/advisories/GHSA-33pg-m6jh-5237'}, {'type': 'WEB', 'url': 'h... | {'cwe_ids': ['CWE-420', 'CWE-636'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-04T21:11:24Z', 'nvd_published_at': '2023-04-04T22:15:00Z'} |
1.4.0 | GHSA-f8vr-r385-rh5r | 2023-05-01T21:22:01Z | 2023-04-11T15:30:30Z | null | ['CVE-2023-26964'] | h2 vulnerable to denial of service | Hyper is an HTTP library for Rust and h2 is an HTTP 2.0 client & server implementation for Rust. An issue was discovered in h2 v0.2.4 when processing header frames. It incorrectly processes the HTTP2 `RST_STREAM` frames by not always releasing the memory immediately upon receiving the reset frame, leading to stream sta... | [] | [{'package': {'ecosystem': 'crates.io', 'name': 'h2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.17'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26964'}, {'type': 'WEB', 'url': 'https://github.com/hyperium/h2/issues/621'}, {'type': 'WEB', 'url': 'https://github.com/hyperium/hyper/issues/2877'}, {'type': 'WEB', 'url': 'https://github.com/hyperium/h2/pull/668'}, {'type': 'PACKAGE', 'url': 'ht... | {'cwe_ids': ['CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-11T21:47:01Z', 'nvd_published_at': '2023-04-11T14:15:00Z'} |
1.4.0 | GHSA-pj76-75cm-3552 | 2023-05-05T20:34:09Z | 2023-04-28T15:30:18Z | null | ['CVE-2023-28473'] | Authenication bypass | Concrete CMS (previously concrete5) before 9.2 is vulnerable to possible Auth bypass in the jobs section. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28473'}, {'type': 'WEB', 'url': 'https://concretecms.com'}, {'type': 'WEB', 'url': 'https://www.concretecms.org/about/project-news/security/concrete-cms-security-advisory-2023-04-20'}] | {'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-05-01T13:44:37Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c23v-vqw5-52c5 | 2023-04-28T19:50:13Z | 2023-04-19T21:30:26Z | null | ['CVE-2023-29922'] | PowerJob vulnerable to Incorrect Access Control via the create user/save interface. | PowerJob V4.3.1 is vulnerable to Incorrect Access Control via the create user/save interface. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'tech.powerjob:powerjob'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29922'}, {'type': 'WEB', 'url': 'https://github.com/PowerJob/PowerJob/issues/585'}, {'type': 'PACKAGE', 'url': 'https://github.com/PowerJob/PowerJob'}] | {'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-20T19:52:30Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mjw9-3f9f-jq2w | 2023-04-28T22:05:58Z | 2023-04-20T22:15:35Z | null | ['CVE-2023-29522'] | XWiki Platform vulnerable to code injection from view right on XWiki.ClassSheet | ### Impact
Any user with view rights can execute arbitrary script macros including Groovy and Python macros that allow remote code execution including unrestricted read and write access to all wiki contents. The attack works by opening a non-existing page with a name crafted to contain a dangerous payload.
For instan... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-xclass-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0-rc-1'}, {'fixed': '14.4.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-xclass-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events... | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-mjw9-3f9f-jq2w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29522'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/d7e56185376641ee5d66477c6b2791ca8e85cfee'}, {'type': 'PACKAGE... | {'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-20T22:15:35Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h9h3-jx58-6hqq | 2023-04-10T16:39:20Z | 2023-04-02T21:30:17Z | null | ['CVE-2023-28679'] | Jenkins Mashup Portlets Plugin vulnerable to stored cross-site scripting | Jenkins Mashup Portlets Plugin 1.1.2 and earlier provides the "Generic JS Portlet" feature that lets a user populate a portlet using a custom JavaScript expression.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by authenticated attackers with Overall/Read permission. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'javagh.jenkins:mashup-portlets-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28679'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-03-21/#SECURITY-2813'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-10T16:39:20Z', 'nvd_published_at': '2023-04-02T21:15:00Z'} |
1.4.0 | GHSA-6w4m-2xhg-2658 | 2023-04-26T17:39:58Z | 2023-04-26T17:39:58Z | null | ['CVE-2022-37454'] | Buffer overflow in sponge queue functions | ### Impact
The Keccak sponge function interface accepts partial inputs to be absorbed and partial outputs to be squeezed. A buffer can overflow when partial data with some specific sizes are queued, where at least one of them has a length of 2^32 - 200 bytes or more.
### Patches
Yes, see commit [fdc6fef0](https://gi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pysha3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sha3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/XKCP/XKCP/security/advisories/GHSA-6w4m-2xhg-2658'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37454'}, {'type': 'WEB', 'url': 'https://github.com/XKCP/XKCP/issues/105'}, {'type': 'WEB', 'url': 'https://github.com/johanns/sha3/issues/17'}, {'type'... | {'cwe_ids': ['CWE-190'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-26T17:39:58Z', 'nvd_published_at': '2022-10-21T06:15:00Z'} |
1.4.0 | GHSA-f6xp-59jq-r35c | 2023-04-10T22:51:35Z | 2023-04-04T15:30:28Z | null | ['CVE-2020-19278'] | Phachon mm-wiki Cross Site Request Forgery vulnerability | Cross Site Request Forgery vulnerability found in Phachon mm-wiki v.0.1.2 allows a remote attacker to execute arbitrary code via the system/user/save parameter. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/phachon/mm-wiki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-19278'}, {'type': 'WEB', 'url': 'https://github.com/phachon/mm-wiki/issues/68'}, {'type': 'PACKAGE', 'url': 'https://github.com/phachon/mm-wiki'}, {'type': 'WEB', 'url': 'https://imgur.com/EABvnwz'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-10T22:51:35Z', 'nvd_published_at': '2023-04-04T15:15:00Z'} |
1.4.0 | GHSA-4h2q-84w7-4mhx | 2023-04-13T16:47:25Z | 2023-04-13T12:30:35Z | null | ['CVE-2023-2021'] | nilsteampassnet/teampass vulnerable to stored cross-site scripting (XSS) | nilsteampassnet/teampass prior to 3.0.3 is vulnerable to stored cross-site scripting (XSS) in the description parameter of a folder. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'nilsteampassnet/teampass'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2021'}, {'type': 'WEB', 'url': 'https://github.com/nilsteampassnet/teampass/commit/77c541a0151841d1f4ceb0a84ca391e1b526d58d'}, {'type': 'PACKAGE', 'url': 'https://github.com/nilsteampassnet/TeamPass'}, {'type': 'WEB', 'url': 'https://huntr.dev/boun... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-13T16:47:25Z', 'nvd_published_at': '2023-04-13T12:15:00Z'} |
1.4.0 | GHSA-3hjg-cghv-22ww | 2023-04-28T19:57:45Z | 2023-04-20T22:04:49Z | null | ['CVE-2023-29519'] | org.xwiki.platform:xwiki-platform-attachment-ui vulnerable to Code Injection | ### Impact
A registered user can perform remote code execution leading to privilege escalation by injecting the proper code in the "property" field of an attachment selector, as a gadget of their own dashboard. Note that the vulnerability does not impact comments of a wiki.
### Patches
The vulnerability has been patch... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-attachment-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0-rc-1'}, {'fixed': '13.10.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-attachment-ui'}, 'ranges': [{'type': 'ECOSYSTEM... | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-3hjg-cghv-22ww'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29519'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/5e8725b4272cd3e5be09d3ca84273be2da6869c1'}, {'type': 'PACKAGE... | {'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-20T22:04:49Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pxvg-2qj5-37jq | 2023-04-11T21:48:01Z | 2023-04-11T21:48:01Z | null | [] | Nokogiri updates packaged libxml2 to v2.10.4 to resolve multiple CVEs | ### Summary
Nokogiri v1.14.3 upgrades the packaged version of its dependency libxml2 to [v2.10.4](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.10.4) from v2.10.3.
libxml2 v2.10.4 addresses the following known vulnerabilities:
- [CVE-2023-29469](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29469): ... | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.14.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-pxvg-2qj5-37jq'}, {'type': 'WEB', 'url': 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28484'}, {'type': 'WEB', 'url': 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29469'}, {'type': 'PACKAGE', 'url': 'http... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-11T21:48:01Z', 'nvd_published_at': None} |
1.4.0 | GHSA-32qq-m9fh-f74w | 2023-04-14T20:31:15Z | 2023-04-05T15:30:24Z | null | ['CVE-2023-25330'] | MyBatis-Plus vulnerable to SQL injection via TenantPlugin | MyBatis-Plus below 3.5.3.1 is vulnerable to SQL injection via the tenant ID value. This may allow remote attackers to execute arbitrary SQL commands. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.baomidou:mybatis-plus'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 3.5.3.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25330'}, {'type': 'WEB', 'url': 'https://github.com/FCncdn/MybatisPlusTenantPluginSQLInjection-POC/blob/master/Readme.en.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/baomidou/mybatis-plus'}] | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-05T21:13:04Z', 'nvd_published_at': '2023-04-05T14:15:00Z'} |
1.4.0 | GHSA-2wjp-w7g7-h63q | 2023-04-06T15:07:52Z | 2023-04-05T18:30:18Z | null | ['CVE-2023-1883'] | thorsten/phpmyfaq vulnerable to improper access control | thorsten/phpmyfaq prior to 3.1.12 is vulnerable to improper access control when FAQ News is marked as inactive in settings and have comments enabled, allowing comments to be posted on inactive FAQs. This has been fixed in 3.1.12. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.12'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1883'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/db77df888178766987398597d4f153831c62a503'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpMyFAQ'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/2f1e417d-... | {'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-06T15:07:52Z', 'nvd_published_at': '2023-04-05T17:15:00Z'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.