schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
20
140
details
stringlengths
56
37.2k
severity
stringlengths
2
92
affected
stringlengths
88
7.07k
references
stringlengths
139
4.72k
database_specific
stringlengths
131
185
1.4.0
GHSA-g36h-4jr6-qmm9
2023-05-10T00:38:15Z
2023-04-26T15:30:21Z
null
['CVE-2022-25273']
Improper input validation in Drupal core
Drupal core's form API has a vulnerability where certain contributed or custom modules' forms may be vulnerable to improper input validation. This could allow an attacker to inject disallowed values or overwrite data. Affected forms are uncommon, but in certain cases an attacker could alter critical or sensitive data. ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '9.2.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.3.0'}, {'fixed': '9.3.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25273'}, {'type': 'PACKAGE', 'url': 'https://github.com/drupal/core'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2022-008'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-26T19:41:46Z', 'nvd_published_at': None}
1.4.0
GHSA-rrm6-wvj7-cwh2
2023-04-21T20:24:21Z
2023-04-21T20:24:21Z
null
['CVE-2023-30608']
sqlparse contains a regular expression that is vulnerable to Regular Expression Denial of Service
### Impact The SQL parser contains a regular expression that is vulnerable to [ReDoS](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS) (Regular Expression Denial of Service). The vulnerability may lead to Denial of Service (DoS). ### Patches This issues has been fixed in sqlparse 0...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'sqlparse'}, 'ecosystem_specific': {'affected_functions': ['sqlparse.keywords.SQL_REGEX', 'sqlparse.lexer.Lexer']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.15'}, {'fixed': '0.4.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/andialbrecht/sqlparse/security/advisories/GHSA-rrm6-wvj7-cwh2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30608'}, {'type': 'WEB', 'url': 'https://github.com/andialbrecht/sqlparse/commit/c457abd5f097dd13fb21543381e7cfafe7d31cfb'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-1333'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-21T20:24:21Z', 'nvd_published_at': None}
1.4.0
GHSA-v5hq-cqqr-6w4g
2023-04-12T22:21:03Z
2023-04-12T18:30:37Z
null
['CVE-2023-30513']
Jenkins Kubernetes Plugin does not properly mask credentials
Multiple Jenkins plugins do not properly mask (i.e., replace with asterisks) credentials printed in the build log from Pipeline steps like sh and bat, when both of the following conditions are met: - The credentials are printed in build steps executing on an agent (typically inside a node block). - Push mode for dura...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.csanchez.jenkins.plugins:kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3910.ve59cec5e33ea'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-30513'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-04-12/#SECURITY-3075'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2023/04/13/3'}]
{'cwe_ids': ['CWE-319'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-12T22:21:03Z', 'nvd_published_at': '2023-04-12T18:15:00Z'}
1.4.0
GHSA-p26g-97m4-6q7c
2023-04-18T22:19:57Z
2023-04-18T22:19:57Z
null
['CVE-2023-26049']
Eclipse Jetty's cookie parsing of quoted values can exfiltrate values from other cookies
Nonstandard cookie parsing in Jetty may allow an attacker to smuggle cookies within other cookies, or otherwise perform unintended behavior by tampering with the cookie parsing mechanism. If Jetty sees a cookie VALUE that starts with `"` (double quote), it will continue to read the cookie string until it sees a closin...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.4.51.v20230217'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10....
[{'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-p26g-97m4-6q7c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26049'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/pull/9339'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/je...
{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-04-18T22:19:57Z', 'nvd_published_at': None}
1.4.0
GHSA-6wrf-mxfj-pf5p
2023-04-05T23:15:38Z
2023-04-04T21:11:24Z
null
['CVE-2023-28842']
Docker Swarm encrypted overlay network with a single endpoint is unauthenticated
[Moby](https://mobyproject.org/) is an open source container framework developed by Docker Inc. that is distributed as Docker, Mirantis Container Runtime, and various other downstream projects/products. The Moby daemon component (`dockerd`), which is developed as [moby/moby](https://github.com/moby/moby) is commonly re...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/docker/docker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.0'}, {'fixed': '20.10.24'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/docker/docker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '23.0.0'}, {'fixed': '23....
[{'type': 'WEB', 'url': 'https://github.com/moby/libnetwork/security/advisories/GHSA-gvm4-2qqg-m333'}, {'type': 'WEB', 'url': 'https://github.com/moby/moby/security/advisories/GHSA-232p-vwff-86mp'}, {'type': 'WEB', 'url': 'https://github.com/moby/moby/security/advisories/GHSA-33pg-m6jh-5237'}, {'type': 'WEB', 'url': 'h...
{'cwe_ids': ['CWE-420', 'CWE-636'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-04T21:11:24Z', 'nvd_published_at': '2023-04-04T22:15:00Z'}
1.4.0
GHSA-f8vr-r385-rh5r
2023-05-01T21:22:01Z
2023-04-11T15:30:30Z
null
['CVE-2023-26964']
h2 vulnerable to denial of service
Hyper is an HTTP library for Rust and h2 is an HTTP 2.0 client & server implementation for Rust. An issue was discovered in h2 v0.2.4 when processing header frames. It incorrectly processes the HTTP2 `RST_STREAM` frames by not always releasing the memory immediately upon receiving the reset frame, leading to stream sta...
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'h2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.17'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-26964'}, {'type': 'WEB', 'url': 'https://github.com/hyperium/h2/issues/621'}, {'type': 'WEB', 'url': 'https://github.com/hyperium/hyper/issues/2877'}, {'type': 'WEB', 'url': 'https://github.com/hyperium/h2/pull/668'}, {'type': 'PACKAGE', 'url': 'ht...
{'cwe_ids': ['CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-11T21:47:01Z', 'nvd_published_at': '2023-04-11T14:15:00Z'}
1.4.0
GHSA-pj76-75cm-3552
2023-05-05T20:34:09Z
2023-04-28T15:30:18Z
null
['CVE-2023-28473']
Authenication bypass
Concrete CMS (previously concrete5) before 9.2 is vulnerable to possible Auth bypass in the jobs section.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28473'}, {'type': 'WEB', 'url': 'https://concretecms.com'}, {'type': 'WEB', 'url': 'https://www.concretecms.org/about/project-news/security/concrete-cms-security-advisory-2023-04-20'}]
{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-05-01T13:44:37Z', 'nvd_published_at': None}
1.4.0
GHSA-c23v-vqw5-52c5
2023-04-28T19:50:13Z
2023-04-19T21:30:26Z
null
['CVE-2023-29922']
PowerJob vulnerable to Incorrect Access Control via the create user/save interface.
PowerJob V4.3.1 is vulnerable to Incorrect Access Control via the create user/save interface.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'tech.powerjob:powerjob'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29922'}, {'type': 'WEB', 'url': 'https://github.com/PowerJob/PowerJob/issues/585'}, {'type': 'PACKAGE', 'url': 'https://github.com/PowerJob/PowerJob'}]
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-20T19:52:30Z', 'nvd_published_at': None}
1.4.0
GHSA-mjw9-3f9f-jq2w
2023-04-28T22:05:58Z
2023-04-20T22:15:35Z
null
['CVE-2023-29522']
XWiki Platform vulnerable to code injection from view right on XWiki.ClassSheet
### Impact Any user with view rights can execute arbitrary script macros including Groovy and Python macros that allow remote code execution including unrestricted read and write access to all wiki contents. The attack works by opening a non-existing page with a name crafted to contain a dangerous payload. For instan...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-xclass-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0-rc-1'}, {'fixed': '14.4.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-xclass-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events...
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-mjw9-3f9f-jq2w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29522'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/d7e56185376641ee5d66477c6b2791ca8e85cfee'}, {'type': 'PACKAGE...
{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-20T22:15:35Z', 'nvd_published_at': None}
1.4.0
GHSA-h9h3-jx58-6hqq
2023-04-10T16:39:20Z
2023-04-02T21:30:17Z
null
['CVE-2023-28679']
Jenkins Mashup Portlets Plugin vulnerable to stored cross-site scripting
Jenkins Mashup Portlets Plugin 1.1.2 and earlier provides the "Generic JS Portlet" feature that lets a user populate a portlet using a custom JavaScript expression. This results in a stored cross-site scripting (XSS) vulnerability exploitable by authenticated attackers with Overall/Read permission.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'javagh.jenkins:mashup-portlets-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-28679'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2023-03-21/#SECURITY-2813'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-10T16:39:20Z', 'nvd_published_at': '2023-04-02T21:15:00Z'}
1.4.0
GHSA-6w4m-2xhg-2658
2023-04-26T17:39:58Z
2023-04-26T17:39:58Z
null
['CVE-2022-37454']
Buffer overflow in sponge queue functions
### Impact The Keccak sponge function interface accepts partial inputs to be absorbed and partial outputs to be squeezed. A buffer can overflow when partial data with some specific sizes are queued, where at least one of them has a length of 2^32 - 200 bytes or more. ### Patches Yes, see commit [fdc6fef0](https://gi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pysha3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sha3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/XKCP/XKCP/security/advisories/GHSA-6w4m-2xhg-2658'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37454'}, {'type': 'WEB', 'url': 'https://github.com/XKCP/XKCP/issues/105'}, {'type': 'WEB', 'url': 'https://github.com/johanns/sha3/issues/17'}, {'type'...
{'cwe_ids': ['CWE-190'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-26T17:39:58Z', 'nvd_published_at': '2022-10-21T06:15:00Z'}
1.4.0
GHSA-f6xp-59jq-r35c
2023-04-10T22:51:35Z
2023-04-04T15:30:28Z
null
['CVE-2020-19278']
Phachon mm-wiki Cross Site Request Forgery vulnerability
Cross Site Request Forgery vulnerability found in Phachon mm-wiki v.0.1.2 allows a remote attacker to execute arbitrary code via the system/user/save parameter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/phachon/mm-wiki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-19278'}, {'type': 'WEB', 'url': 'https://github.com/phachon/mm-wiki/issues/68'}, {'type': 'PACKAGE', 'url': 'https://github.com/phachon/mm-wiki'}, {'type': 'WEB', 'url': 'https://imgur.com/EABvnwz'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-10T22:51:35Z', 'nvd_published_at': '2023-04-04T15:15:00Z'}
1.4.0
GHSA-4h2q-84w7-4mhx
2023-04-13T16:47:25Z
2023-04-13T12:30:35Z
null
['CVE-2023-2021']
nilsteampassnet/teampass vulnerable to stored cross-site scripting (XSS)
nilsteampassnet/teampass prior to 3.0.3 is vulnerable to stored cross-site scripting (XSS) in the description parameter of a folder.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'nilsteampassnet/teampass'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-2021'}, {'type': 'WEB', 'url': 'https://github.com/nilsteampassnet/teampass/commit/77c541a0151841d1f4ceb0a84ca391e1b526d58d'}, {'type': 'PACKAGE', 'url': 'https://github.com/nilsteampassnet/TeamPass'}, {'type': 'WEB', 'url': 'https://huntr.dev/boun...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-13T16:47:25Z', 'nvd_published_at': '2023-04-13T12:15:00Z'}
1.4.0
GHSA-3hjg-cghv-22ww
2023-04-28T19:57:45Z
2023-04-20T22:04:49Z
null
['CVE-2023-29519']
org.xwiki.platform:xwiki-platform-attachment-ui vulnerable to Code Injection
### Impact A registered user can perform remote code execution leading to privilege escalation by injecting the proper code in the "property" field of an attachment selector, as a gadget of their own dashboard. Note that the vulnerability does not impact comments of a wiki. ### Patches The vulnerability has been patch...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-attachment-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0-rc-1'}, {'fixed': '13.10.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-attachment-ui'}, 'ranges': [{'type': 'ECOSYSTEM...
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-3hjg-cghv-22ww'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-29519'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/5e8725b4272cd3e5be09d3ca84273be2da6869c1'}, {'type': 'PACKAGE...
{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-20T22:04:49Z', 'nvd_published_at': None}
1.4.0
GHSA-pxvg-2qj5-37jq
2023-04-11T21:48:01Z
2023-04-11T21:48:01Z
null
[]
Nokogiri updates packaged libxml2 to v2.10.4 to resolve multiple CVEs
### Summary Nokogiri v1.14.3 upgrades the packaged version of its dependency libxml2 to [v2.10.4](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.10.4) from v2.10.3. libxml2 v2.10.4 addresses the following known vulnerabilities: - [CVE-2023-29469](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29469): ...
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.14.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-pxvg-2qj5-37jq'}, {'type': 'WEB', 'url': 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28484'}, {'type': 'WEB', 'url': 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29469'}, {'type': 'PACKAGE', 'url': 'http...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-11T21:48:01Z', 'nvd_published_at': None}
1.4.0
GHSA-32qq-m9fh-f74w
2023-04-14T20:31:15Z
2023-04-05T15:30:24Z
null
['CVE-2023-25330']
MyBatis-Plus vulnerable to SQL injection via TenantPlugin
MyBatis-Plus below 3.5.3.1 is vulnerable to SQL injection via the tenant ID value. This may allow remote attackers to execute arbitrary SQL commands.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.baomidou:mybatis-plus'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 3.5.3.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-25330'}, {'type': 'WEB', 'url': 'https://github.com/FCncdn/MybatisPlusTenantPluginSQLInjection-POC/blob/master/Readme.en.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/baomidou/mybatis-plus'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-04-05T21:13:04Z', 'nvd_published_at': '2023-04-05T14:15:00Z'}
1.4.0
GHSA-2wjp-w7g7-h63q
2023-04-06T15:07:52Z
2023-04-05T18:30:18Z
null
['CVE-2023-1883']
thorsten/phpmyfaq vulnerable to improper access control
thorsten/phpmyfaq prior to 3.1.12 is vulnerable to improper access control when FAQ News is marked as inactive in settings and have comments enabled, allowing comments to be posted on inactive FAQs. This has been fixed in 3.1.12.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-1883'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/db77df888178766987398597d4f153831c62a503'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpMyFAQ'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/2f1e417d-...
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-06T15:07:52Z', 'nvd_published_at': '2023-04-05T17:15:00Z'}