diff --git "a/benchmark_v2/task3_temporal_generalization/val.jsonl" "b/benchmark_v2/task3_temporal_generalization/val.jsonl" new file mode 100644--- /dev/null +++ "b/benchmark_v2/task3_temporal_generalization/val.jsonl" @@ -0,0 +1,1776 @@ +{"id": "baf200c5a1a21c1df6c7", "text": "CVE: CVE-2022-0514\n\n[{'lang': 'en', 'value': 'Business Logic Errors in GitHub repository crater-invoice/crater prior to 6.0.5.'}]\n\nFix commit: Fix tax per item issue & check currency key", "cve_id": "CVE-2022-0514", "title": "CVE-2022-0514", "source": "cvefixes", "timestamp": "2022-03-21", "split": "val"} +{"id": "544d3407726d8196f18d", "text": "CVE: CVE-2022-1276\n\n[{'lang': 'en', 'value': 'Out-of-bounds Read in mrb_get_args in GitHub repository mruby/mruby prior to 3.2. Possible arbitrary code execution if being exploited.'}]\n\nFix commit: codegen.c: need to pack argument when `n==13` too.\n\nBecause we have extra 2 arguments coming (kw and rhs).", "cve_id": "CVE-2022-1276", "title": "CVE-2022-1276", "source": "cvefixes", "timestamp": "2022-04-10", "split": "val"} +{"id": "2b5f5bbc1559a29e1b95", "text": "CVE: CVE-2022-2301\n\n[{'lang': 'en', 'value': 'Buffer Over-read in GitHub repository hpjansson/chafa prior to 1.10.3.'}]\n\nFix commit: XwdLoader: Fix buffer over-read and improve general robustness\n\nThis commit fixes a buffer over-read that could occur due to g_ntohl()\nevaluating its argument more than once if at least one of the following\nis true:\n\n* Build target is not x86.\n* __OPTIMIZE__ is not set during compilation (e.g. -O0 was used).\n\nIt also improves robustness more generally and fixes an", "cve_id": "CVE-2022-2301", "title": "CVE-2022-2301", "source": "cvefixes", "timestamp": "2022-07-04", "split": "val"} +{"id": "a46b911fdd7f6ab61963", "text": "CVE: CVE-2022-0665\n\n[{'lang': 'en', 'value': 'Path Traversal in GitHub repository pimcore/pimcore prior to 10.3.2.'}]\n\nFix commit: [Admin] Translations - use session for file import to prevent path traversal - Merge PR #11498", "cve_id": "CVE-2022-0665", "title": "CVE-2022-0665", "source": "cvefixes", "timestamp": "2022-02-22", "split": "val"} +{"id": "a1fb46f9e5e692add9af", "text": "CVE: CVE-2022-31307\n\n[{'lang': 'en', 'value': 'Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_string_offset at src/njs_string.c.'}]\n\nFix commit: Fixed Array.prototype.lastIndexOf() with unicode string as \"this\".\n\nPreviously, when lastIndexOf() was called with unicode string as \"this\"\nargument and a negative \"fromIndex\" argument null-pointer dererence\nmight occur because njs_string_offset() was called with invalid index\nvalue whereas njs_string_offset() sh", "cve_id": "CVE-2022-31307", "title": "CVE-2022-31307", "source": "cvefixes", "timestamp": "2022-06-21", "split": "val"} +{"id": "00137ecb5687c68d5a3f", "text": "CVE: CVE-2022-29222\n\n[{'lang': 'en', 'value': \"Pion DTLS is a Go implementation of Datagram Transport Layer Security. Prior to version 2.1.5, a DTLS Client could provide a Certificate that it doesn't posses the private key for and Pion DTLS wouldn't reject it. This issue affects users that are using Client certificates only. The connection itself is still secure. The Certificate provided by clients can't be trusted when using a Pion DTLS server prior to version 2.1.5. Users should upgrade to ver", "cve_id": "CVE-2022-29222", "title": "CVE-2022-29222", "source": "cvefixes", "timestamp": "2022-05-21", "split": "val"} +{"id": "7a91111a02951cd4ebbb", "text": "CVE: CVE-2022-0664\n\n[{'lang': 'en', 'value': 'Use of Hard-coded Cryptographic Key in Go github.com/gravitl/netmaker prior to 0.8.5,0.9.4,0.10.0,0.10.1.'}]\n\nFix commit: hotfix 2", "cve_id": "CVE-2022-0664", "title": "CVE-2022-0664", "source": "cvefixes", "timestamp": "2022-02-18", "split": "val"} +{"id": "CVE-2023-38606", "text": "Apple Multiple Products Kernel Unspecified Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, tvOS, and watchOS contain an unspecified vulnerability allowing an app to modify a sensitive kernel state.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-38606", "title": "Apple Multiple Products Kernel Unspecified Vulnerability", "source": "cisa_kev", "timestamp": "2023-07-26", "split": "val"} +{"id": "e897fd9abc0dc6392987", "text": "CVE: CVE-2022-23068\n\n[{'lang': 'en', 'value': 'ToolJet versions v0.6.0 to v1.10.2 are vulnerable to HTML injection where an attacker can inject malicious code inside the first name and last name field while inviting a new user which will be reflected in the invitational e-mail.'}]\n\nFix commit: Feature: Add data transfer object layer to validate and sanitize user inputs (#2694)\n\n* add sanitize-html to be used with dto\r\n\r\n* add dto for controllers\r\n\r\n* add vaalidation to check token not empty\r\n\r\n*", "cve_id": "CVE-2022-23068", "title": "CVE-2022-23068", "source": "cvefixes", "timestamp": "2022-05-18", "split": "val"} +{"id": "c8891732879786fc9ef7", "text": "CVE: CVE-2022-25839\n\n[{'lang': 'en', 'value': 'The package url-js before 2.1.0 are vulnerable to Improper Input Validation due to improper parsing, which makes it is possible for the hostname to be spoofed. http://\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\localhost and http://localhost are the same URL. However, the hostname is not parsed as localhost, and the backslash is reflected as it is.'}]\n\nFix commit: Fix potential vulnerability for \"http://\\\\\\\\localhost\"", "cve_id": "CVE-2022-25839", "title": "CVE-2022-25839", "source": "cvefixes", "timestamp": "2022-03-11", "split": "val"} +{"id": "c25ac1fc2865b7bcbe4e", "text": "CVE: CVE-2022-23588\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a denial of service by altering a `SavedModel` such that Grappler optimizer would attempt to build a tensor using a reference `dtype`. This would result in a crash due to a `CHECK`-fail in the `Tensor` constructor as reference types are not allowed. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3", "cve_id": "CVE-2022-23588", "title": "CVE-2022-23588", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val"} +{"id": "664a366740ba8b088c44", "text": "CVE: CVE-2022-24710\n\n[{'lang': 'en', 'value': 'Weblate is a copyleft software web-based continuous localization system. Versions prior to 4.11 do not properly neutralize user input used in user name and language fields. Due to this improper neutralization it is possible to perform cross-site scripting via these fields. The issues were fixed in the 4.11 release. Users unable to upgrade are advised to add their own neutralize logic.'}]\n\nFix commit: js: Add missing escaping to username completion", "cve_id": "CVE-2022-24710", "title": "CVE-2022-24710", "source": "cvefixes", "timestamp": "2022-02-25", "split": "val"} +{"id": "CVE-2023-29360", "text": "Microsoft Streaming Service Untrusted Pointer Dereference Vulnerability\n\nAffected: Microsoft Streaming Service\n\nMicrosoft Streaming Service contains an untrusted pointer dereference vulnerability that allows for privilege escalation, enabling a local attacker to gain SYSTEM privileges.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-822\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-29360", "title": "Microsoft Streaming Service Untrusted Pointer Dereference Vulnerability", "source": "cisa_kev", "timestamp": "2024-02-29", "split": "val"} +{"id": "ee3808cfce4382232e3a", "text": "CVE: CVE-2022-32547\n\n[{'lang': 'en', 'value': \"In ImageMagick, there is load of misaligned address for type 'double', which requires 8 byte alignment and for type 'float', which requires 4 byte alignment at MagickCore/property.c. Whenever crafted or untrusted input is processed by ImageMagick, this causes a negative impact to application availability or other problems related to undefined behavior.\"}]\n\nFix commit: https://github.com/ImageMagick/ImageMagick/pull/5034", "cve_id": "CVE-2022-32547", "title": "CVE-2022-32547", "source": "cvefixes", "timestamp": "2022-06-16", "split": "val"} +{"id": "22d3e709504dd81ff4a7", "text": "[Unknown] Electron CVE-2022-35954 Delimiter Injection Vulnerability in exportVariable\n\n## Describe the summary:\nThe Electron Website provides a set of packages to make creating actions easier. The `core.exportVariable` function uses a well known delimiter that attackers can use to break out of that specific variable and assign values to other arbitrary variables. Workflows that write untrusted values to the `GITHUB_ENV` file may cause the path or other environment variables to be modified withou", "cve_id": "CVE-2022-35954", "title": "Electron CVE-2022-35954 Delimiter Injection Vulnerability in exportVariable (Unknown)", "source": "hackerone", "timestamp": "2022-12-14", "split": "val"} +{"id": "CVE-2022-41328", "text": "Fortinet FortiOS Path Traversal Vulnerability\n\nAffected: Fortinet FortiOS\n\nFortinet FortiOS contains a path traversal vulnerability that may allow a local privileged attacker to read and write files via crafted CLI commands.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-22\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-41328", "title": "Fortinet FortiOS Path Traversal Vulnerability", "source": "cisa_kev", "timestamp": "2023-03-14", "split": "val"} +{"id": "116f73519898477af2db", "text": "CVE: CVE-2022-31136\n\n[{'lang': 'en', 'value': 'Bookwyrm is an open source social reading and reviewing program. Versions of Bookwyrm prior to 0.4.1 did not properly sanitize html being rendered to users. Unprivileged users are able to inject scripts into user profiles, book descriptions, and statuses. These vulnerabilities may be exploited as cross site scripting attacks on users viewing these fields. Users are advised to upgrade to version 0.4.1. There are no known workarounds for this issue.'}", "cve_id": "CVE-2022-31136", "title": "CVE-2022-31136", "source": "cvefixes", "timestamp": "2022-07-07", "split": "val"} +{"id": "b062bc7f2d40b1d685ff", "text": "CVE: CVE-2022-1106\n\n[{'lang': 'en', 'value': 'use after free in mrb_vm_exec in GitHub repository mruby/mruby prior to 3.2.'}]\n\nFix commit: vm.c: vm.c: stack may be reallocated in functions calls; aaa28a5\n\n`mrb_range_new()` also calls VM recursively.", "cve_id": "CVE-2022-1106", "title": "CVE-2022-1106", "source": "cvefixes", "timestamp": "2022-03-27", "split": "val"} +{"id": "b336b49caf8dfd50315a", "text": "CVE: CVE-2022-0824\n\n[{'lang': 'en', 'value': 'Improper Access Control to Remote Code Execution in GitHub repository webmin/webmin prior to 1.990.'}]\n\nFix commit: Foreign module may need a check", "cve_id": "CVE-2022-0824", "title": "CVE-2022-0824", "source": "cvefixes", "timestamp": "2022-03-02", "split": "val"} +{"id": "dfbdea7ca43d37b5d3eb", "text": "CVE: CVE-2022-21670\n\n[{'lang': 'en', 'value': 'markdown-it is a Markdown parser. Prior to version 1.3.2, special patterns with length greater than 50 thousand characterss could slow down the parser significantly. Users should upgrade to version 12.3.2 to receive a patch. There are no known workarounds aside from upgrading.'}]\n\nFix commit: Fix possible ReDOS in newline rule.\n\nCo-authored-by: MakeNowJust ", "cve_id": "CVE-2022-21670", "title": "CVE-2022-21670", "source": "cvefixes", "timestamp": "2022-01-10", "split": "val"} +{"id": "654804e1ab0b78314b77", "text": "[Stack Overflow] CVE-2022-35260: .netrc parser out-of-bounds access\n\nOriginal Report:https://hackerone.com/reports/1721098\n\n## Impact\n\nIf a malicious user can provide a custom netrc file to an application or otherwise affect its contents, this flaw could be used as denial-of-service.", "cve_id": "CVE-2022-35260", "title": "CVE-2022-35260: .netrc parser out-of-bounds access (Stack Overflow)", "source": "hackerone", "timestamp": "2022-12-03", "split": "val"} +{"id": "5bdebcd4e370833ecc72", "text": "CVE: CVE-2022-23308\n\n[{'lang': 'en', 'value': 'valid.c in libxml2 before 2.9.13 has a use-after-free of ID and IDREF attributes.'}]\n\nFix commit: [CVE-2022-23308] Use-after-free of ID and IDREF attributes\n\nIf a document is parsed with XML_PARSE_DTDVALID and without\nXML_PARSE_NOENT, the value of ID attributes has to be normalized after\npotentially expanding entities in xmlRemoveID. Otherwise, later calls\nto xmlGetID can return a pointer to previously freed memory.\n\nID attributes which are empty or", "cve_id": "CVE-2022-23308", "title": "CVE-2022-23308", "source": "cvefixes", "timestamp": "2022-02-26", "split": "val"} +{"id": "1e65f6f482189b40883d", "text": "CVE: CVE-2022-29369\n\n[{'lang': 'en', 'value': 'Nginx NJS v0.7.2 was discovered to contain a segmentation violation via njs_lvlhsh_bucket_find at njs_lvlhsh.c.'}]\n\nFix commit: Fixed njs_vmcode_interpreter() when \"toString\" conversion fails.\n\nPreviously, while interpreting a user function, njs_vmcode_interpreter()\nmight return prematurely when an error happens. This is not correct\nbecause the current frame has to be unwound (or exception caught)\nfirst.\n\nThe fix is exit through only 5 appropriate", "cve_id": "CVE-2022-29369", "title": "CVE-2022-29369", "source": "cvefixes", "timestamp": "2022-05-12", "split": "val"} +{"id": "464ec44e33d30c53b87c", "text": "CVE: CVE-2022-24193\n\n[{'lang': 'en', 'value': 'CasaOS before v0.2.7 was discovered to contain a command injection vulnerability.'}]\n\nFix commit: Apply multilingual support", "cve_id": "CVE-2022-24193", "title": "CVE-2022-24193", "source": "cvefixes", "timestamp": "2022-03-10", "split": "val"} +{"id": "33b6604544b62a5513f8", "text": "CVE: CVE-2022-24792\n\n[{'lang': 'en', 'value': 'PJSIP is a free and open source multimedia communication library written in C. A denial-of-service vulnerability affects applications on a 32-bit systems that use PJSIP versions 2.12 and prior to play/read invalid WAV files. The vulnerability occurs when reading WAV file data chunks with length greater than 31-bit integers. The vulnerability does not affect 64-bit apps and should not affect apps that only plays trusted WAV files. A patch is availabl", "cve_id": "CVE-2022-24792", "title": "CVE-2022-24792", "source": "cvefixes", "timestamp": "2022-04-25", "split": "val"} +{"id": "08fab36c9db3197f286c", "text": "CVE: CVE-2022-36752\n\n[{'lang': 'en', 'value': 'png2webp v1.0.4 was discovered to contain an out-of-bounds write via the function w2p. This vulnerability is exploitable via a crafted png file.'}]\n\nFix commit: v1.0.5: fix buffer overrun when reading bad WebPs", "cve_id": "CVE-2022-36752", "title": "CVE-2022-36752", "source": "cvefixes", "timestamp": "2022-07-28", "split": "val"} +{"id": "284f8ae1f656f928790e", "text": "CVE: CVE-2022-1061\n\n[{'lang': 'en', 'value': 'Heap Buffer Overflow in parseDragons in GitHub repository radareorg/radare2 prior to 5.6.8.'}]\n\nFix commit: Fix oobread in symbols header parsing ##bin", "cve_id": "CVE-2022-1061", "title": "CVE-2022-1061", "source": "cvefixes", "timestamp": "2022-03-24", "split": "val"} +{"id": "f339f122ac945545d74f", "text": "[Unknown] (CVE-2023-32003) fs.mkdtemp() and fs.mkdtempSync() are missing getValidatedPath() checks\n\nhttps://hackerone.com/reports/2037887\n\nhttps://nodejs.org/en/blog/vulnerability/august-2023-security-releases#fsmkdtemp-and-fsmkdtempsync-are-missing-getvalidatedpath-checks-lowcve-2023-32003\n\nPatch was provided.\n\n## Impact\n\nSee reports", "cve_id": "CVE-2023-32003", "title": "(CVE-2023-32003) fs.mkdtemp() and fs.mkdtempSync() are missing getValidatedPath() checks (Unknown)", "source": "hackerone", "timestamp": "2023-10-07", "split": "val"} +{"id": "5463b4fc2de8faaf8260", "text": "CVE: CVE-2022-24708\n\n[{'lang': 'en', 'value': 'Anuko Time Tracker is an open source, web-based time tracking application written in PHP. ttUser.class.php in Time Tracker versions prior to 1.20.0.5646 was not escaping primary group name for display. Because of that, it was possible for a logged in user to modify primary group name with elements of JavaScript. Such script could then be executed in user browser on subsequent requests on pages where primary group name was displayed. This is vulnerab", "cve_id": "CVE-2022-24708", "title": "CVE-2022-24708", "source": "cvefixes", "timestamp": "2022-02-24", "split": "val"} +{"id": "cfba3c9b2796b71b59d8", "text": "CVE: CVE-2022-1619\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in function cmdline_erase_chars in GitHub repository vim/vim prior to 8.2.4899. This vulnerabilities are capable of crashing software, modify memory, and possible remote execution'}]\n\nFix commit: patch 8.2.4899: with latin1 encoding CTRL-W might go before the cmdline\n\nProblem: With latin1 encoding CTRL-W might go before the start of the\n command line.\nSolution: Check already being at the start of the command", "cve_id": "CVE-2022-1619", "title": "CVE-2022-1619", "source": "cvefixes", "timestamp": "2022-05-08", "split": "val"} +{"id": "61e3f8cd17d76fd5997f", "text": "[Unknown] CVE-2023-36617: ReDoS vulnerability in URI (Ruby)\n\nI made a report at https://hackerone.com/reports/1958260 .\n\nhttps://www.ruby-lang.org/en/news/2023/06/29/redos-in-uri-CVE-2023-36617/\n\n> A ReDoS issue was discovered in the URI component through 0.12.1 for Ruby. The URI parser mishandles invalid URLs that have specific characters. There is an increase in execution time for parsing strings to URI objects with rfc2396_parser.rb and rfc3986_parser.rb.\n\n> NOTE: this issue exists because of", "cve_id": "CVE-2023-36617", "title": "CVE-2023-36617: ReDoS vulnerability in URI (Ruby) (Unknown)", "source": "hackerone", "timestamp": "2023-08-15", "split": "val"} +{"id": "de742fdc9f7002c578b1", "text": "CVE: CVE-2022-21655\n\n[{'lang': 'en', 'value': 'Envoy is an open source edge and service proxy, designed for cloud-native applications. The envoy common router will segfault if an internal redirect selects a route configured with direct response or redirect actions. This will result in a denial of service. As a workaround turn off internal redirects if direct response entries are configured on the same listener.'}]\n\nFix commit: CVE-2022-21655\n\nCrash with direct_response\n\nSigned-off-by: Yan Avlaso", "cve_id": "CVE-2022-21655", "title": "CVE-2022-21655", "source": "cvefixes", "timestamp": "2022-02-22", "split": "val"} +{"id": "5d2ca3544c1156cb75f4", "text": "CVE: CVE-2022-0913\n\n[{'lang': 'en', 'value': 'Integer Overflow or Wraparound in GitHub repository microweber/microweber prior to 1.3.'}]\n\nFix commit: checkout shipping address validation - max chars allowed", "cve_id": "CVE-2022-0913", "title": "CVE-2022-0913", "source": "cvefixes", "timestamp": "2022-03-11", "split": "val"} +{"id": "2047a97c6f761122e9ba", "text": "CVE: CVE-2022-0377\n\n[{'lang': 'en', 'value': 'Users of the LearnPress WordPress plugin before 4.1.5 can upload an image as a profile avatar after the registration. After this process the user crops and saves the image. Then a \"POST\" request that contains user supplied name of the image is sent to the server for renaming and cropping of the image. As a result of this request, the name of the user-supplied image is changed with a MD5 value. This process can be conducted only when type of the image", "cve_id": "CVE-2022-0377", "title": "CVE-2022-0377", "source": "cvefixes", "timestamp": "2022-02-28", "split": "val"} +{"id": "3119e9a1ea9bcdf301a7", "text": "CVE: CVE-2022-25352\n\n[{'lang': 'en', 'value': 'The package libnested before 1.5.2 are vulnerable to Prototype Pollution via the set function in index.js. **Note:** This vulnerability derives from an incomplete fix for [CVE-2020-28283](https://security.snyk.io/vuln/SNYK-JS-LIBNESTED-1054930)'}]\n\nFix commit: better fix for prototype pollution vulnerability\n\ncheers Idan Digmi of Snyk Security", "cve_id": "CVE-2022-25352", "title": "CVE-2022-25352", "source": "cvefixes", "timestamp": "2022-03-17", "split": "val"} +{"id": "CVE-2022-43939", "text": "Hitachi Vantara Pentaho BA Server Authorization Bypass Vulnerability\n\nAffected: Hitachi Vantara Pentaho Business Analytics (BA) Server\n\nHitachi Vantara Pentaho BA Server contains a use of non-canonical URL paths for authorization decisions vulnerability that enables an attacker to bypass authorization.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE", "cve_id": "CVE-2022-43939", "title": "Hitachi Vantara Pentaho BA Server Authorization Bypass Vulnerability", "source": "cisa_kev", "timestamp": "2025-03-03", "split": "val"} +{"id": "CVE-2022-41033", "text": "Microsoft Windows COM+ Event System Service Privilege Escalation Vulnerability\n\nAffected: Microsoft Windows COM+ Event System Service\n\nMicrosoft Windows COM+ Event System Service contains an unspecified vulnerability that allows for privilege escalation.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-843\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-41033", "title": "Microsoft Windows COM+ Event System Service Privilege Escalation Vulnerability", "source": "cisa_kev", "timestamp": "2022-10-11", "split": "val"} +{"id": "7d14edccca8fce892c75", "text": "CVE: CVE-2022-0565\n\n[{'lang': 'en', 'value': 'Exposure of Sensitive Information to an Unauthorized Actor in Packagist pimcore/pimcore prior to 10.3.1.'}]\n\nFix commit: Svg sanitization (#11386)\n\n* setting up the svg saniziter on logo and assets upload\r\n\r\n* more detailed exception message\r\n\r\n* changed to mime type check instead of file extension\r\n\r\n* adding the sanitization to \"Upload new version\"\r\n\r\n* refactor to sanitize on preAdd/preUpdate, rollback AssetController.php\r\n\r\n* fix resource|string,", "cve_id": "CVE-2022-0565", "title": "CVE-2022-0565", "source": "cvefixes", "timestamp": "2022-02-14", "split": "val"} +{"id": "CVE-2023-6345", "text": "Google Skia Integer Overflow Vulnerability\n\nAffected: Google Chromium Skia\n\nGoogle Chromium Skia contains an integer overflow vulnerability that allows a remote attacker, who has compromised the renderer process, to potentially perform a sandbox escape via a malicious file. This vulnerability affects Google Chrome and ChromeOS, Android, Flutter, and possibly other products.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailabl", "cve_id": "CVE-2023-6345", "title": "Google Skia Integer Overflow Vulnerability", "source": "cisa_kev", "timestamp": "2023-11-30", "split": "val"} +{"id": "e6e672dd7b3a809bd081", "text": "CVE: CVE-2022-24780\n\n[{'lang': 'en', 'value': 'Combodo iTop is a web based IT Service Management tool. In versions prior to 2.7.6 and 3.0.0, users of the iTop user portal can send TWIG code to the server by forging specific http queries, and execute arbitrary code on the server using http server user privileges. This issue is fixed in versions 2.7.6 and 3.0.0. There are currently no known workarounds.'}]\n\nFix commit: N°4384 Security hardening", "cve_id": "CVE-2022-24780", "title": "CVE-2022-24780", "source": "cvefixes", "timestamp": "2022-04-05", "split": "val"} +{"id": "303ce36f4e646e53cf88", "text": "CVE: CVE-2022-21649\n\n[{'lang': 'en', 'value': 'Convos is an open source multi-user chat that runs in a web browser. Characters starting with \"https://\" in the chat window create an tag. Stored XSS vulnerability using onfocus and autofocus occurs because escaping exists for \"<\" or \">\" but escaping for double quotes does not exist. Through this vulnerability, an attacker is capable to execute malicious scripts. Users are advised to update as soon as possible.'}]\n\nFix commit: Fix XSS vulnerabil", "cve_id": "CVE-2022-21649", "title": "CVE-2022-21649", "source": "cvefixes", "timestamp": "2022-01-04", "split": "val"} +{"id": "0ee58835c8635c1e6aec", "text": "CVE: CVE-2022-23072\n\n[{'lang': 'en', 'value': \"In Recipes, versions 1.0.5 through 1.2.5 are vulnerable to Stored Cross-Site Scripting (XSS), in “Add to Cart” functionality. When a victim accesses the food list page, then adds a new Food with a malicious javascript payload in the ‘Name’ parameter and clicks on the Add to Shopping Cart icon, an XSS payload will trigger. A low privileged attacker will have the victim's API key and can lead to admin's account takeover.\"}]\n\nFix commit: improved outpu", "cve_id": "CVE-2022-23072", "title": "CVE-2022-23072", "source": "cvefixes", "timestamp": "2022-06-21", "split": "val"} +{"id": "f91798d8be2093460196", "text": "CVE: CVE-2022-29694\n\n[{'lang': 'en', 'value': 'Unicorn Engine v2.0.0-rc7 and below was discovered to contain a NULL pointer dereference via qemu_ram_free.'}]\n\nFix commit: Fix crash when mapping a big memory and calling uc_close", "cve_id": "CVE-2022-29694", "title": "CVE-2022-29694", "source": "cvefixes", "timestamp": "2022-06-02", "split": "val"} +{"id": "95a2697e7a5a148fe9fa", "text": "CVE: CVE-2022-31059\n\n[{'lang': 'en', 'value': 'Discourse Calendar is a calendar plugin for Discourse, an open-source messaging app. Prior to version 1.0.1, parsing and rendering of Event names can be susceptible to cross-site scripting (XSS) attacks. This vulnerability only affects sites which have modified or disabled Discourse’s default Content Security Policy. This issue is patched in version 1.0.1 of the Discourse Calendar plugin. As a workaround, ensure that the Content Security Policy is", "cve_id": "CVE-2022-31059", "title": "CVE-2022-31059", "source": "cvefixes", "timestamp": "2022-06-14", "split": "val"} +{"id": "d45d6ddd702401971be6", "text": "CVE: CVE-2022-23126\n\n[{'lang': 'en', 'value': 'TeslaMate before 1.25.1 (when using the default Docker configuration) allows attackers to open doors of Tesla vehicles, start Keyless Driving, and interfere with vehicle operation en route. This occurs because an attacker can leverage Grafana login access to obtain a token for Tesla API calls.'}]\n\nFix commit: Disable anonymous login to Grafana", "cve_id": "CVE-2022-23126", "title": "CVE-2022-23126", "source": "cvefixes", "timestamp": "2022-01-24", "split": "val"} +{"id": "bbb53f82e9703850b37f", "text": "CVE: CVE-2022-31153\n\n[{'lang': 'en', 'value': \"OpenZeppelin Contracts for Cairo is a library for contract development written in Cairo for StarkNet, a decentralized ZK Rollup. Version 0.2.0 is vulnerable to an error that renders account contracts unusable on live networks. This issue affects all accounts (vanilla and ethereum flavors) in the v0.2.0 release of OpenZeppelin Contracts for Cairo, which are not whitelisted on StarkNet mainnet. Only goerli deployments of v0.2.0 accounts are affected.", "cve_id": "CVE-2022-31153", "title": "CVE-2022-31153", "source": "cvefixes", "timestamp": "2022-07-15", "split": "val"} +{"id": "34257d61733134753a12", "text": "CVE: CVE-2022-24739\n\n[{'lang': 'en', 'value': 'alltube is an html front end for youtube-dl. On releases prior to 3.0.3, an attacker could craft a special HTML page to trigger either an open redirect attack or a Server-Side Request Forgery attack (depending on how AllTube is configured). The impact is mitigated by the fact the SSRF attack is only possible when the `stream` option is enabled in the configuration. (This option is disabled by default.) 3.0.3 contains a fix for this vulnerability.'}]", "cve_id": "CVE-2022-24739", "title": "CVE-2022-24739", "source": "cvefixes", "timestamp": "2022-03-08", "split": "val"} +{"id": "d65841ced5d919dfa598", "text": "CVE: CVE-2022-23586\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a denial of service by altering a `SavedModel` such that assertions in `function.cc` would be falsified and crash the Python interpreter. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: Eliminate debug", "cve_id": "CVE-2022-23586", "title": "CVE-2022-23586", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val"} +{"id": "3c934f079f345565574f", "text": "CVE: CVE-2022-29213\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the `tf.compat.v1.signal.rfft2d` and `tf.compat.v1.signal.rfft3d` lack input validation and under certain condition can result in crashes (due to `CHECK`-failures). Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.'}]\n\nFix commit: Merge pull request #55274 from yongtang:55263-tf.signal.rfft2d\n\nPiperOrigin-RevId: 4367366", "cve_id": "CVE-2022-29213", "title": "CVE-2022-29213", "source": "cvefixes", "timestamp": "2022-05-21", "split": "val"} +{"id": "795bc1aeed04806f96a6", "text": "CVE: CVE-2022-29204\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.UnsortedSegmentJoin` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. The code assumes `num_segments` is a positive scalar but there is no validation. Since this value is used to allocate the output tensor, a negative valu", "cve_id": "CVE-2022-29204", "title": "CVE-2022-29204", "source": "cvefixes", "timestamp": "2022-05-20", "split": "val"} +{"id": "f83f4776ce90206ea756", "text": "CVE: CVE-2022-31099\n\n[{'lang': 'en', 'value': 'rulex is a new, portable, regular expression language. When parsing untrusted rulex expressions, the stack may overflow, possibly enabling a Denial of Service attack. This happens when parsing an expression with several hundred levels of nesting, causing the process to abort immediately. This is a security concern for you, if your service parses untrusted rulex expressions (expressions provided by an untrusted user), and your service becomes unavail", "cve_id": "CVE-2022-31099", "title": "CVE-2022-31099", "source": "cvefixes", "timestamp": "2022-06-27", "split": "val"} +{"id": "CVE-2023-28205", "text": "Apple Multiple Products WebKit Use-After-Free Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, and Safari WebKit contain a use-after-free vulnerability that leads to code execution when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-416", "cve_id": "CVE-2023-28205", "title": "Apple Multiple Products WebKit Use-After-Free Vulnerability", "source": "cisa_kev", "timestamp": "2023-04-10", "split": "val"} +{"id": "051fa0abaa424b0b0b7b", "text": "CVE: CVE-2022-1907\n\n[{'lang': 'en', 'value': 'Buffer Over-read in GitHub repository bfabiszewski/libmobi prior to 0.11.'}]\n\nFix commit: Fix boundary checking error in markup search, that could cause buffer over-read with corrupt input", "cve_id": "CVE-2022-1907", "title": "CVE-2022-1907", "source": "cvefixes", "timestamp": "2022-05-27", "split": "val"} +{"id": "CVE-2022-37055", "text": "D-Link Routers Buffer Overflow Vulnerability\n\nAffected: D-Link Routers\n\nD-Link Routers contains a buffer overflow vulnerability that has a high impact on confidentiality, integrity, and availability. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unava", "cve_id": "CVE-2022-37055", "title": "D-Link Routers Buffer Overflow Vulnerability", "source": "cisa_kev", "timestamp": "2025-12-08", "split": "val"} +{"id": "d0f93a9fa64907eb9d92", "text": "CVE: CVE-2022-24777\n\n[{'lang': 'en', 'value': 'grpc-swift is the Swift language implementation of gRPC, a remote procedure call (RPC) framework. Prior to version 1.7.2, a grpc-swift server is vulnerable to a denial of service attack via a reachable assertion. This is due to incorrect logic when handling GOAWAY frames. The attack is low-effort: it takes very little resources to construct and send the required sequence of frames. The impact on availability is high as the server will crash, droppin", "cve_id": "CVE-2022-24777", "title": "CVE-2022-24777", "source": "cvefixes", "timestamp": "2022-03-25", "split": "val"} +{"id": "3805092db9ea11550f8b", "text": "CVE: CVE-2022-21729\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The implementation of `UnravelIndex` is vulnerable to a division by zero caused by an integer overflow bug. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: Fix integer overflow leading to divide by zero error in Unravel index ke", "cve_id": "CVE-2022-21729", "title": "CVE-2022-21729", "source": "cvefixes", "timestamp": "2022-02-03", "split": "val"} +{"id": "84196a90a908854b97be", "text": "CVE: CVE-2022-22143\n\n[{'lang': 'en', 'value': 'The package convict before 6.2.2 are vulnerable to Prototype Pollution via the convict function due to missing validation of parentKey. **Note:** This vulnerability derives from an incomplete fix of another [vulnerability](https://security.snyk.io/vuln/SNYK-JS-CONVICT-1062508)'}]\n\nFix commit: More complete fix against prototype pollution\n\nfirst addressed in https://github.com/mozilla/node-convict/pull/384", "cve_id": "CVE-2022-22143", "title": "CVE-2022-22143", "source": "cvefixes", "timestamp": "2022-05-01", "split": "val"} +{"id": "be15271055530865119d", "text": "CVE: CVE-2022-1285\n\n[{'lang': 'en', 'value': 'Server-Side Request Forgery (SSRF) in GitHub repository gogs/gogs prior to 0.12.8.'}]\n\nFix commit: webhook: revalidate local hostname before each delivery (#6988)", "cve_id": "CVE-2022-1285", "title": "CVE-2022-1285", "source": "cvefixes", "timestamp": "2022-06-01", "split": "val"} +{"id": "CVE-2022-22071", "text": "Qualcomm Multiple Chipsets Use-After-Free Vulnerability\n\nAffected: Qualcomm Multiple Chipsets\n\nMultiple Qualcomm chipsets contain a use-after-free vulnerability when process shell memory is freed using IOCTL munmap call and process initialization is in progress.\n\nRequired Action: Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-22071", "title": "Qualcomm Multiple Chipsets Use-After-Free Vulnerability", "source": "cisa_kev", "timestamp": "2023-12-05", "split": "val"} +{"id": "0c19a7714cb09c5f3cc8", "text": "[Information Exposure Through Sent Data] CVE-2022-27779: cookie for trailing dot TLD\n\n## Summary:\nIn CVE-2014-3620 curl prevents cookies from being set for Top Level Domains (TLDs). According to the advisory, curl's \"cookie parser has no Public Suffix awareness\", but it will \"reject TLDs from being allowed\". However, a cookie can still be set for a TLD + trailing dot. \n\nA trailing dot after a TLD is considered legal and curl will send the http://example.com. to http://example.com\n\n## Steps To Re", "cve_id": "CVE-2022-27779", "title": "CVE-2022-27779: cookie for trailing dot TLD (Information Exposure Through Sent Data)", "source": "hackerone", "timestamp": "2022-05-11", "split": "val"} +{"id": "eee6d69eae2e2a3f906d", "text": "CVE: CVE-2022-0413\n\n[{'lang': 'en', 'value': 'Use After Free in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.4253: using freed memory when substitute with function call\n\nProblem: Using freed memory when substitute uses a recursive function call.\nSolution: Make a copy of the substitute text.", "cve_id": "CVE-2022-0413", "title": "CVE-2022-0413", "source": "cvefixes", "timestamp": "2022-01-30", "split": "val"} +{"id": "ba5d54cb832e68d88dbf", "text": "CVE: CVE-2022-1283\n\n[{'lang': 'en', 'value': 'NULL Pointer Dereference in r_bin_ne_get_entrypoints function in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability allows attackers to cause a denial of service (application crash).'}]\n\nFix commit: Fix null deref in the ne parser ##crash\n\n* Reported by @hmsec via huntr.dev\n* Reproducer: nepoc00\n* BountyID: bfeb8fb8-644d-4587-80d4-cb704c404013", "cve_id": "CVE-2022-1283", "title": "CVE-2022-1283", "source": "cvefixes", "timestamp": "2022-04-08", "split": "val"} +{"id": "67add96d8ab4deed90bd", "text": "[Allocation of Resources Without Limits or Throttling] [curl] CVE-2023-38039: HTTP header allocation DOS\n\nHello reporting for CVE-2023-38039 which has been fixed in the latest release of curl today.\nLink to original report : #2072338\n\nThanks for your help, if there's anything else you need from me I'll happily share.\nHave a nice day !\n\n## Impact\n\nDOS/overloading of user's system through malicious HTTP server interaction with curl's header parsing.", "cve_id": "CVE-2023-38039", "title": "[curl] CVE-2023-38039: HTTP header allocation DOS (Allocation of Resources Without Limits or Throttling)", "source": "hackerone", "timestamp": "2023-09-27", "split": "val"} +{"id": "CVE-2023-38203", "text": "Adobe ColdFusion Deserialization of Untrusted Data Vulnerability\n\nAffected: Adobe ColdFusion\n\nAdobe ColdFusion contains a deserialization of untrusted data vulnerability that allows for code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-38203", "title": "Adobe ColdFusion Deserialization of Untrusted Data Vulnerability", "source": "cisa_kev", "timestamp": "2024-01-08", "split": "val"} +{"id": "2932605f2c069711d73d", "text": "CVE: CVE-2022-24953\n\n[{'lang': 'en', 'value': 'The Crypt_GPG extension before 1.6.7 for PHP does not prevent additional options in GPG calls, which presents a risk for certain environments and GPG versions.'}]\n\nFix commit: Insert the end-of-options marker before operation arguments.\n\nThis marker stops the parsing of additional options during external\ncalls to GPG. This behavior is unintended but its security impact is\ndependent on the environment and the GPG version in use.", "cve_id": "CVE-2022-24953", "title": "CVE-2022-24953", "source": "cvefixes", "timestamp": "2022-02-17", "split": "val"} +{"id": "1a42e6d3177c0d936de9", "text": "[HTTP Request Smuggling] CVE-2022-32213 bypass via obs-fold mechanic\n\n## Summary\nThe fix for CVE-2022-32213 can be bypass using an obs-fold, which Node's http parser supports\n\n## Proof-Of-Concept\n`````\nconst http = require('http');\n\nhttp.createServer((request, response) => {\n let body = [];\n request.on('error', (err) => {\n response.end(\"error while reading body: \" + err)\n}).on('data', (chunk) => {\n body.push(chunk);\n}).on('end', () => {\n body = Buffer.concat(body).toString();\n\n res", "cve_id": "CVE-2022-32213", "title": "CVE-2022-32213 bypass via obs-fold mechanic (HTTP Request Smuggling)", "source": "hackerone", "timestamp": "2022-10-26", "split": "val"} +{"id": "50f5d22df98a17fbadd9", "text": "CVE: CVE-2022-1411\n\n[{'lang': 'en', 'value': \"Unrestructed file upload in GitHub repository yetiforcecompany/yetiforcecrm prior to 6.4.0. Attacker can send malicious files to the victims is able to retrieve the stored data from the web application without that data being made safe to render in the browser and steals victim's cookie leads to account takeover.\"}]\n\nFix commit: Added validation to pasted files to the wysiwyg editor", "cve_id": "CVE-2022-1411", "title": "CVE-2022-1411", "source": "cvefixes", "timestamp": "2022-05-05", "split": "val"} +{"id": "094215b4345e90ea6b29", "text": "CVE: CVE-2022-0508\n\n[{'lang': 'en', 'value': 'Server-Side Request Forgery (SSRF) in GitHub repository chocobozzz/peertube prior to f33e515991a32885622b217bf2ed1d1b0d9d6832'}]\n\nFix commit: Correctly check import target URL IP", "cve_id": "CVE-2022-0508", "title": "CVE-2022-0508", "source": "cvefixes", "timestamp": "2022-02-08", "split": "val"} +{"id": "CVE-2023-32049", "text": "Microsoft Windows Defender SmartScreen Security Feature Bypass Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Defender SmartScreen contains a security feature bypass vulnerability that allows an attacker to bypass the Open File - Security Warning prompt.\n\nRequired Action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-32049", "title": "Microsoft Windows Defender SmartScreen Security Feature Bypass Vulnerability", "source": "cisa_kev", "timestamp": "2023-07-11", "split": "val"} +{"id": "CVE-2022-1388", "text": "F5 BIG-IP Missing Authentication Vulnerability\n\nAffected: F5 BIG-IP\n\nF5 BIG-IP contains a missing authentication in critical function vulnerability which can allow for remote code execution, creation or deletion of files, or disabling services.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-306\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-1388", "title": "F5 BIG-IP Missing Authentication Vulnerability", "source": "cisa_kev", "timestamp": "2022-05-10", "split": "val"} +{"id": "333dc2a25461774eb00d", "text": "CVE: CVE-2022-0821\n\n[{'lang': 'en', 'value': 'Improper Authorization in GitHub repository orchardcms/orchardcore prior to 1.3.0.'}]\n\nFix commit: Fix missing permission checks and encoding. (#11344)", "cve_id": "CVE-2022-0821", "title": "CVE-2022-0821", "source": "cvefixes", "timestamp": "2022-03-11", "split": "val"} +{"id": "CVE-2022-22965", "text": "Spring Framework JDK 9+ Remote Code Execution Vulnerability\n\nAffected: VMware Spring Framework\n\nSpring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-94\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-22965", "title": "Spring Framework JDK 9+ Remote Code Execution Vulnerability", "source": "cisa_kev", "timestamp": "2022-04-04", "split": "val"} +{"id": "6311a41e501552029d91", "text": "CVE: CVE-2022-21221\n\n[{'lang': 'en', 'value': 'The package github.com/valyala/fasthttp before 1.34.0 are vulnerable to Directory Traversal via the ServeFile function, due to improper sanitization. It is possible to be exploited by using a backslash %5c character in the path. **Note:** This security issue impacts Windows users only.'}]\n\nFix commit: Warn about unsafe ServeFile usage (#1228)\n\nSee: https://github.com/valyala/fasthttp/issues/1226", "cve_id": "CVE-2022-21221", "title": "CVE-2022-21221", "source": "cvefixes", "timestamp": "2022-03-17", "split": "val"} +{"id": "113f2df9b0c776212bab", "text": "CVE: CVE-2022-0338\n\n[{'lang': 'en', 'value': 'Improper Privilege Management in Conda loguru prior to 0.5.3.'}]\n\nFix commit: Document several security considerations and best practices", "cve_id": "CVE-2022-0338", "title": "CVE-2022-0338", "source": "cvefixes", "timestamp": "2022-01-25", "split": "val"} +{"id": "c969891c856af4cdb3dc", "text": "CVE: CVE-2022-31624\n\n[{'lang': 'en', 'value': 'MariaDB Server before 10.7 is vulnerable to Denial of Service. While executing the plugin/server_audit/server_audit.c method log_statement_ex, the held lock lock_bigbuffer is not released correctly, which allows local users to trigger a denial of service due to the deadlock.'}]\n\nFix commit: MDEV-26556 An improper locking bug(s) due to unreleased lock.\n\nGet rid of the global big_buffer.", "cve_id": "CVE-2022-31624", "title": "CVE-2022-31624", "source": "cvefixes", "timestamp": "2022-05-25", "split": "val"} +{"id": "9d8e57a2b7f3de3ca903", "text": "CVE: CVE-2022-30503\n\n[{'lang': 'en', 'value': 'Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_set_number at src/njs_value.h.'}]\n\nFix commit: Fixed Array.prototype.fill() for typed-arrays.\n\nThis closes #478 issue on Github.", "cve_id": "CVE-2022-30503", "title": "CVE-2022-30503", "source": "cvefixes", "timestamp": "2022-06-02", "split": "val"} +{"id": "097c2ae832aaf1e89229", "text": "CVE: CVE-2022-1191\n\n[{'lang': 'en', 'value': 'SSRF on index.php/cobrowse/proxycss/ in GitHub repository livehelperchat/livehelperchat prior to 3.96.'}]\n\nFix commit: Harden to avoid SSRF", "cve_id": "CVE-2022-1191", "title": "CVE-2022-1191", "source": "cvefixes", "timestamp": "2022-03-31", "split": "val"} +{"id": "48cd23b6fc1261dd889c", "text": "CVE: CVE-2022-23559\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite model that would cause an integer overflow in embedding lookup operations. Both `embedding_size` and `lookup_size` are products of values provided by the user. Hence, a malicious user could trigger overflows in the multiplication. In certain scenarios, this can then result in heap OOB read/write. Users are advised to upgrade to a patched version.'}]\n\nFix commit:", "cve_id": "CVE-2022-23559", "title": "CVE-2022-23559", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val"} +{"id": "56fa2753305881ae60c7", "text": "CVE: CVE-2022-23620\n\n[{'lang': 'en', 'value': 'XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions AbstractSxExportURLFactoryActionHandler#processSx does not escape anything from SSX document references when serializing it on filesystem, it is possible to for the HTML export process to contain reference elements containing filesystem syntax like \"../\", \"./\". or \"/\" in general. The referenced elements are not properly escap", "cve_id": "CVE-2022-23620", "title": "CVE-2022-23620", "source": "cvefixes", "timestamp": "2022-02-09", "split": "val"} +{"id": "83dd2e078d46c6bf7203", "text": "CVE: CVE-2022-24772\n\n[{'lang': 'en', 'value': 'Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code does not check for tailing garbage bytes after decoding a `DigestInfo` ASN.1 structure. This can allow padding bytes to be removed and garbage data added to forge a signature when a low public exponent is being used. The issue has been addressed in `node-forge` version 1.3.0. There", "cve_id": "CVE-2022-24772", "title": "CVE-2022-24772", "source": "cvefixes", "timestamp": "2022-03-18", "split": "val"} +{"id": "197f2112888ca9f3dcb5", "text": "CVE: CVE-2022-21144\n\n[{'lang': 'en', 'value': \"This affects all versions of package libxmljs. When invoking the libxmljs.parseXml function with a non-buffer argument the V8 code will attempt invoking the .toString method of the argument. If the argument's toString value is not a Function object V8 will crash.\"}]\n\nFix commit: Ensure parseXml/parseHtml input is string or buffer (#594)", "cve_id": "CVE-2022-21144", "title": "CVE-2022-21144", "source": "cvefixes", "timestamp": "2022-05-01", "split": "val"} +{"id": "CVE-2023-42917", "text": "Apple Multiple Products WebKit Memory Corruption Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, and Safari WebKit contain a memory corruption vulnerability that leads to code execution when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.\n\nRequired Action: Apply remediations or mitigations per vendor instr", "cve_id": "CVE-2023-42917", "title": "Apple Multiple Products WebKit Memory Corruption Vulnerability", "source": "cisa_kev", "timestamp": "2023-12-04", "split": "val"} +{"id": "5446da1a2c2b7861ff10", "text": "CVE: CVE-2022-0676\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.4.'}]\n\nFix commit: Fix heap buffer overflow in dyldcache parser ##crash\n\n* Reported by: Lazymio via huntr.dev\n* Reproducer: dyldovf", "cve_id": "CVE-2022-0676", "title": "CVE-2022-0676", "source": "cvefixes", "timestamp": "2022-02-22", "split": "val"} +{"id": "50c030e04ee24e3681b0", "text": "CVE: CVE-2022-23559\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite model that would cause an integer overflow in embedding lookup operations. Both `embedding_size` and `lookup_size` are products of values provided by the user. Hence, a malicious user could trigger overflows in the multiplication. In certain scenarios, this can then result in heap OOB read/write. Users are advised to upgrade to a patched version.'}]\n\nFix commit:", "cve_id": "CVE-2022-23559", "title": "CVE-2022-23559", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val"} +{"id": "09c596457f5db3940a35", "text": "CVE: CVE-2022-0472\n\n[{'lang': 'en', 'value': 'Unrestricted Upload of File with Dangerous Type in Packagist jsdecena/laracom prior to v2.0.9.'}]\n\nFix commit: Fix vulnerability report from hunter.dev", "cve_id": "CVE-2022-0472", "title": "CVE-2022-0472", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val"} +{"id": "3d36dae617351ba881fa", "text": "CVE: CVE-2022-0481\n\n[{'lang': 'en', 'value': 'NULL Pointer Dereference in Homebrew mruby prior to 3.2.'}]\n\nFix commit: codegen.c: fixed a bug in hash code generation with `!val`.", "cve_id": "CVE-2022-0481", "title": "CVE-2022-0481", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val"} +{"id": "45f9f24276772be1553f", "text": "CVE: CVE-2022-23586\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a denial of service by altering a `SavedModel` such that assertions in `function.cc` would be falsified and crash the Python interpreter. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: Eliminate `CHEC", "cve_id": "CVE-2022-23586", "title": "CVE-2022-23586", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val"} +{"id": "bb20940384c531be00c7", "text": "CVE: CVE-2022-27311\n\n[{'lang': 'en', 'value': 'Gibbon v3.4.4 and below allows attackers to execute a Server-Side Request Forgery (SSRF) via a crafted URL.'}]\n\nFix commit: Ensure we raise if the root domain changed and it was not an expected behavior", "cve_id": "CVE-2022-27311", "title": "CVE-2022-27311", "source": "cvefixes", "timestamp": "2022-04-25", "split": "val"} +{"id": "fa3208397f72f6b59976", "text": "CVE: CVE-2022-29693\n\n[{'lang': 'en', 'value': 'Unicorn Engine v2.0.0-rc7 and below was discovered to contain a memory leak via the function uc_close at /my/unicorn/uc.c.'}]\n\nFix commit: Merge pull request #1587 from liyansong2018/dev\n\nFix https://github.com/unicorn-engine/unicorn/issues/1586", "cve_id": "CVE-2022-29693", "title": "CVE-2022-29693", "source": "cvefixes", "timestamp": "2022-06-02", "split": "val"} +{"id": "9aa5f1b6a7da08a77a00", "text": "[Cross-site Scripting (XSS) - Generic] UXss on brave browser via scan QR Code\n\n## Summary:\n\nI found UXss in your browser, and executed Xss on all open domains.\nbefore that I want to tell you a little, that I've found a vulnerability like this in Microsoft Edge :\nhttps://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-23258\n\nOppo browser : (Private/no disclosure)\n\nand now i found it in your application\n\n## Products affected: \n\n * Android 13, Brave browser version 1.48.164, Brave Nig", "cve_id": "CVE-2022-23258", "title": "UXss on brave browser via scan QR Code (Cross-site Scripting (XSS) - Generic)", "source": "hackerone", "timestamp": "2023-04-11", "split": "val"} +{"id": "21f57413575265d85d69", "text": "CVE: CVE-2022-1592\n\n[{'lang': 'en', 'value': 'Server-Side Request Forgery in scout in GitHub repository clinical-genomics/scout prior to v4.42. An attacker could make the application perform arbitrary requests to fishing steal cookie, request to private area, or lead to xss...'}]\n\nFix commit: Protect remote_cors from Server-Side Request Forgery (#3326)\n\n* Protect remote_cors from Server-Side Request Forgery\r\n\r\n* Improved code and added test\r\n\r\n* Fix a couple of comments in a test", "cve_id": "CVE-2022-1592", "title": "CVE-2022-1592", "source": "cvefixes", "timestamp": "2022-05-05", "split": "val"} +{"id": "574d1e12eda553447fdb", "text": "CVE: CVE-2022-0554\n\n[{'lang': 'en', 'value': 'Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.4327: may end up with no current buffer\n\nProblem: May end up with no current buffer.\nSolution: When deleting the current buffer to not pick a quickfix buffer as\n the new current buffer.", "cve_id": "CVE-2022-0554", "title": "CVE-2022-0554", "source": "cvefixes", "timestamp": "2022-02-10", "split": "val"} +{"id": "8214167dbebc0059a93b", "text": "CVE: CVE-2022-22116\n\n[{'lang': 'en', 'value': 'In Directus, versions 9.0.0-alpha.4 through 9.4.1 are vulnerable to stored Cross-Site Scripting (XSS) vulnerability via SVG file upload in media upload functionality. A low privileged attacker can inject arbitrary javascript code which will be executed in a victim’s browser when they open the image URL.'}]\n\nFix commit: Add Content-Security-Policy header by default (#10776)", "cve_id": "CVE-2022-22116", "title": "CVE-2022-22116", "source": "cvefixes", "timestamp": "2022-01-10", "split": "val"} +{"id": "e36e979ff666f58e45bc", "text": "CVE: CVE-2022-1629\n\n[{'lang': 'en', 'value': 'Buffer Over-read in function find_next_quote in GitHub repository vim/vim prior to 8.2.4925. This vulnerabilities are capable of crashing software, Modify Memory, and possible remote execution'}]\n\nFix commit: patch 8.2.4925: trailing backslash may cause reading past end of line\n\nProblem: Trailing backslash may cause reading past end of line.\nSolution: Check for NUL after backslash.", "cve_id": "CVE-2022-1629", "title": "CVE-2022-1629", "source": "cvefixes", "timestamp": "2022-05-10", "split": "val"} +{"id": "e5d3028e56a540749d7d", "text": "CVE: CVE-2022-1344\n\n[{'lang': 'en', 'value': \"Stored XSS due to no sanitization in the filename in GitHub repository causefx/organizr prior to 2.1.1810. This allows attackers to execute malicious scripts in the user's browser and it can lead to session hijacking, sensitive data exposure, and worse.\"}]\n\nFix commit: added sanitizeUserString and sanitizeEmail functions\nadded sanitize to uploaded image names\nadded sanitize to tabs, categories, users and bookmarks\nremoved svg files from approved imag", "cve_id": "CVE-2022-1344", "title": "CVE-2022-1344", "source": "cvefixes", "timestamp": "2022-04-13", "split": "val"} +{"id": "1087810edbe10c53a87f", "text": "CVE: CVE-2022-24279\n\n[{'lang': 'en', 'value': 'The package madlib-object-utils before 0.1.8 are vulnerable to Prototype Pollution via the setValue method, as it allows an attacker to merge object prototypes into it. *Note:* This vulnerability derives from an incomplete fix of [CVE-2020-7701](https://security.snyk.io/vuln/SNYK-JS-MADLIBOBJECTUTILS-598676)'}]\n\nFix commit: fix(set-value): prototype pollution", "cve_id": "CVE-2022-24279", "title": "CVE-2022-24279", "source": "cvefixes", "timestamp": "2022-04-15", "split": "val"} +{"id": "CVE-2022-21445", "text": "Oracle ADF Faces Deserialization of Untrusted Data Vulnerability\n\nAffected: Oracle ADF Faces\n\nOracle ADF Faces library, included with Oracle JDeveloper Distribution, contains a deserialization of untrusted data vulnerability leading to unauthenticated remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-21445", "title": "Oracle ADF Faces Deserialization of Untrusted Data Vulnerability", "source": "cisa_kev", "timestamp": "2024-09-18", "split": "val"} +{"id": "77417774d3fb7b7210a6", "text": "CVE: CVE-2022-0731\n\n[{'lang': 'en', 'value': 'Improper Access Control (IDOR) in GitHub repository dolibarr/dolibarr prior to 16.0.'}]\n\nFix commit: FIX #hunterb812ea22-0c02-46fe-b89f-04519dfb1ebd", "cve_id": "CVE-2022-0731", "title": "CVE-2022-0731", "source": "cvefixes", "timestamp": "2022-02-23", "split": "val"} +{"id": "CVE-2023-25717", "text": "Multiple Ruckus Wireless Products CSRF and RCE Vulnerability\n\nAffected: Ruckus Wireless Multiple Products\n\nRuckus Wireless Access Point (AP) software contains an unspecified vulnerability in the web services component. If the web services component is enabled on the AP, an attacker can perform cross-site request forgery (CSRF) or remote code execution (RCE). This vulnerability impacts Ruckus ZoneDirector, SmartZone, and Solo APs.\n\nRequired Action: Apply updates per vendor instructions or disconn", "cve_id": "CVE-2023-25717", "title": "Multiple Ruckus Wireless Products CSRF and RCE Vulnerability", "source": "cisa_kev", "timestamp": "2023-05-12", "split": "val"} +{"id": "bc7b35deab2b070295b4", "text": "CVE: CVE-2022-35861\n\n[{'lang': 'en', 'value': 'pyenv 1.2.24 through 2.3.2 allows local users to gain privileges via a .python-version file in the current working directory. An attacker can craft a Python version string in .python-version to execute shims under their control. (Shims are executables that pass a command along to a specific version of pyenv. The version string is used to construct the path to the command, and there is no validation of whether the version specified is a valid version", "cve_id": "CVE-2022-35861", "title": "CVE-2022-35861", "source": "cvefixes", "timestamp": "2022-07-17", "split": "val"} +{"id": "dcc02eeba77bbc5da7d6", "text": "CVE: CVE-2022-31088\n\n[{'lang': 'en', 'value': 'LDAP Account Manager (LAM) is a webfrontend for managing entries (e.g. users, groups, DHCP settings) stored in an LDAP directory. In versions prior to 8.0 the user name field at login could be used to enumerate LDAP data. This is only the case for LDAP search configuration. This issue has been fixed in version 8.0.'}]\n\nFix commit: Merge pull request from GHSA-r387-grjx-qgvw\n\nFixes", "cve_id": "CVE-2022-31088", "title": "CVE-2022-31088", "source": "cvefixes", "timestamp": "2022-06-27", "split": "val"} +{"id": "9338d5f9d2db87f36884", "text": "CVE: CVE-2022-0518\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.2.'}]\n\nFix commit: Fix oobread segfault in java arith8.class ##crash\n\n* Reported by Cen Zhang via huntr.dev", "cve_id": "CVE-2022-0518", "title": "CVE-2022-0518", "source": "cvefixes", "timestamp": "2022-02-08", "split": "val"} +{"id": "aff7ed61b561aa244b36", "text": "CVE: CVE-2022-0382\n\n[{'lang': 'en', 'value': \"An information leak flaw was found due to uninitialized memory in the Linux kernel's TIPC protocol subsystem, in the way a user sends a TIPC datagram to one or more destinations. This flaw allows a local user to read some kernel memory. This issue is limited to no more than 7 bytes, and the user cannot control what is read. This flaw affects the Linux kernel versions prior to 5.17-rc1.\"}]\n\nFix commit: net ticp:fix a kernel-infoleak in __tipc_sendmsg(", "cve_id": "CVE-2022-0382", "title": "CVE-2022-0382", "source": "cvefixes", "timestamp": "2022-02-11", "split": "val"} +{"id": "335f3deaa12e20e7e724", "text": "CVE: CVE-2022-23061\n\n[{'lang': 'en', 'value': 'In Shopizer versions 2.0 to 2.17.0 a regular admin can permanently delete a superadmin (although this cannot happen according to the documentation) via Insecure Direct Object Reference (IDOR) vulnerability.'}]\n\nFix commit: working version 3.0.alpha", "cve_id": "CVE-2022-23061", "title": "CVE-2022-23061", "source": "cvefixes", "timestamp": "2022-05-01", "split": "val"} +{"id": "ee6f2eb15c865ad3e546", "text": "CVE: CVE-2022-27114\n\n[{'lang': 'en', 'value': \"There is a vulnerability in htmldoc 1.9.16. In image_load_jpeg function image.cxx when it calls malloc,'img->width' and 'img->height' they are large enough to cause an integer overflow. So, the malloc function may return a heap blosmaller than the expected size, and it will cause a buffer overflow/Address boundary error in the jpeg_read_scanlines function.\"}]\n\nFix commit: Fix a potential integer overflow bug in the JPEG and PNG loaders (Issue #471)", "cve_id": "CVE-2022-27114", "title": "CVE-2022-27114", "source": "cvefixes", "timestamp": "2022-05-09", "split": "val"} +{"id": "CVE-2022-27518", "text": "Citrix Application Delivery Controller (ADC) and Gateway Authentication Bypass Vulnerability\n\nAffected: Citrix Application Delivery Controller (ADC) and Gateway\n\nCitrix Application Delivery Controller (ADC) and Gateway, when configured with SAML SP or IdP configuration, contain an authentication bypass vulnerability that allows an attacker to execute code as administrator.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-664\n\n[Source: CISA Known Exploited Vulnerabilities Cat", "cve_id": "CVE-2022-27518", "title": "Citrix Application Delivery Controller (ADC) and Gateway Authentication Bypass Vulnerability", "source": "cisa_kev", "timestamp": "2022-12-13", "split": "val"} +{"id": "7c1bcc183ce6c22402b3", "text": "CVE: CVE-2022-1044\n\n[{'lang': 'en', 'value': 'Sensitive Data Exposure Due To Insecure Storage Of Profile Image in GitHub repository polonel/trudesk prior to v1.2.1.'}]\n\nFix commit: fix(uploads): removal of EXIF data on profile picture uploads", "cve_id": "CVE-2022-1044", "title": "CVE-2022-1044", "source": "cvefixes", "timestamp": "2022-05-12", "split": "val"} +{"id": "d339f7bc64ae896a0f32", "text": "CVE: CVE-2022-2129\n\n[{'lang': 'en', 'value': 'Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.5126: substitute may overrun destination buffer\n\nProblem: Substitute may overrun destination buffer.\nSolution: Disallow switching buffers in a substitute expression.", "cve_id": "CVE-2022-2129", "title": "CVE-2022-2129", "source": "cvefixes", "timestamp": "2022-06-19", "split": "val"} +{"id": "c6987e82ae7a32165290", "text": "CVE: CVE-2022-23583\n\n[{'lang': 'en', 'value': \"Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a denial of service by altering a `SavedModel` such that any binary op would trigger `CHECK` failures. This occurs when the protobuf part corresponding to the tensor arguments is modified such that the `dtype` no longer matches the `dtype` expected by the op. In that case, calling the templated binary operator for the binary op would receive corrupted data, due to th", "cve_id": "CVE-2022-23583", "title": "CVE-2022-23583", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val"} +{"id": "ad1fb37df683fb9931be", "text": "CVE: CVE-2022-1177\n\n[{'lang': 'en', 'value': 'Accounting User Can Download Patient Reports in openemr in GitHub repository openemr/openemr prior to 6.1.0.'}]\n\nFix commit: limit access to reports for front and back office (#4893)\n\n* add acl report check to custom report\r\n\r\n* remove report and notes access for accountants and front office on install\r\n\r\n* revert change to administrators\r\n\r\n* adjust install and upgrade\r\n\r\n* reorder case in shiftAcl\r\n\r\n* add alter acls to template\r\n\r\n* review fixes,", "cve_id": "CVE-2022-1177", "title": "CVE-2022-1177", "source": "cvefixes", "timestamp": "2022-03-30", "split": "val"} +{"id": "fe43cbde20fb876ff26e", "text": "CVE: CVE-2022-0273\n\n[{'lang': 'en', 'value': 'Improper Access Control in Pypi calibreweb prior to 0.6.16.'}]\n\nFix commit: Prevent creating a public shelf without permission", "cve_id": "CVE-2022-0273", "title": "CVE-2022-0273", "source": "cvefixes", "timestamp": "2022-01-30", "split": "val"} +{"id": "60414643cf9ac031d884", "text": "CVE: CVE-2022-25258\n\n[{'lang': 'en', 'value': 'An issue was discovered in drivers/usb/gadget/composite.c in the Linux kernel before 5.16.10. The USB Gadget subsystem lacks certain validation of interface OS descriptor requests (ones with a large array index and ones associated with NULL function pointer retrieval). Memory corruption might occur.'}]\n\nFix commit: USB: gadget: validate interface OS descriptor requests\n\nStall the control endpoint in case provided index exceeds array size of\nMAX_CONF", "cve_id": "CVE-2022-25258", "title": "CVE-2022-25258", "source": "cvefixes", "timestamp": "2022-02-16", "split": "val"} +{"id": "81299e057c796b12ec67", "text": "CVE: CVE-2022-0504\n\n[{'lang': 'en', 'value': 'Generation of Error Message Containing Sensitive Information in Packagist microweber/microweber prior to 1.2.11.'}]\n\nFix commit: update", "cve_id": "CVE-2022-0504", "title": "CVE-2022-0504", "source": "cvefixes", "timestamp": "2022-02-08", "split": "val"} +{"id": "a88f257857671243ebfe", "text": "[Cross-Site Request Forgery (CSRF)] CVE-2023-49920: Apache Airflow: Missing CSRF protection on DAG/trigger\n\nDuring my testing, I've found that there is no CSRF protection in dag/trigger. If a user is logged in to his airflow account & has the permission to trigger a dag then an attacker can trick the user to run a dag unintentionally by the user.\n\nApache Airflow, version 2.7.0 through 2.7.3, has a vulnerability that allows an attacker to trigger a DAG in a GET request without CSRF validation. As", "cve_id": "CVE-2023-49920", "title": "CVE-2023-49920: Apache Airflow: Missing CSRF protection on DAG/trigger (Cross-Site Request Forgery (CSRF))", "source": "hackerone", "timestamp": "2024-01-09", "split": "val"} +{"id": "ffc1926f83a46b4c1d74", "text": "[CRLF Injection] CVE-2022-35948: CRLF Injection in Nodejs ‘undici’ via Content-Type\n\nundici library should be protects HTTP headers from CRLF injection vulnerabilities. However, CRLF injection exists in the ‘content-type’ header of undici.request api.\n\n## Impact\n\n```=< undici@5.8.0``` users are vulnerable to CRLF Injection on headers when using unsanitized input as request headers, more specifically, inside the content-type header.\n\nExample:\n```import { request } from 'undici'\n\nconst unsanitized", "cve_id": "CVE-2022-35948", "title": "CVE-2022-35948: CRLF Injection in Nodejs ‘undici’ via Content-Type (CRLF Injection)", "source": "hackerone", "timestamp": "2022-09-23", "split": "val"} +{"id": "3377570ca01d8a60072b", "text": "CVE: CVE-2022-2207\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.5162: reading before the start of the line with BS in Replace mode\n\nProblem: Reading before the start of the line with BS in Replace mode.\nSolution: Check the cursor column is more than zero.", "cve_id": "CVE-2022-2207", "title": "CVE-2022-2207", "source": "cvefixes", "timestamp": "2022-06-27", "split": "val"} +{"id": "0a7fa4b1ebf2e401c5a7", "text": "CVE: CVE-2022-0278\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in Packagist microweber/microweber prior to 1.2.11.'}]\n\nFix commit: xss on contact form fix", "cve_id": "CVE-2022-0278", "title": "CVE-2022-0278", "source": "cvefixes", "timestamp": "2022-01-20", "split": "val"} +{"id": "cdfca13184df6b49e3e8", "text": "CVE: CVE-2022-0204\n\n[{'lang': 'en', 'value': 'A heap overflow vulnerability was found in bluez in versions prior to 5.63. An attacker with local network access could pass specially crafted files causing an application to halt or crash, leading to a denial of service.'}]\n\nFix commit: shared/gatt-server: Fix heap overflow when appending prepare writes\n\nThe code shall check if the prepare writes would append more the\nallowed maximum attribute length.\n\nFixes https://github.com/bluez/bluez/security/a", "cve_id": "CVE-2022-0204", "title": "CVE-2022-0204", "source": "cvefixes", "timestamp": "2022-03-10", "split": "val"} +{"id": "CVE-2022-21971", "text": "Microsoft Windows Runtime Remote Code Execution Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Runtime contains an unspecified vulnerability that allows for remote code execution.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-824\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-21971", "title": "Microsoft Windows Runtime Remote Code Execution Vulnerability", "source": "cisa_kev", "timestamp": "2022-08-18", "split": "val"} +{"id": "c550c29db39dcf37123d", "text": "CVE: CVE-2022-0522\n\n[{'lang': 'en', 'value': 'Access of Memory Location Before Start of Buffer in NPM radare2.js prior to 5.6.2.'}]\n\nFix commit: Fix negative index in anal.arm64.cs ##crash\n\n* Reported by Cen Zhang via huntr.dev", "cve_id": "CVE-2022-0522", "title": "CVE-2022-0522", "source": "cvefixes", "timestamp": "2022-02-08", "split": "val"} +{"id": "b3b5b9aa52a5abb47079", "text": "CVE: CVE-2022-31106\n\n[{'lang': 'en', 'value': 'Underscore.deep is a collection of Underscore mixins that operate on nested objects. Versions of `underscore.deep` prior to version 0.5.3 are vulnerable to a prototype pollution vulnerability. An attacker can craft a malicious payload and pass it to `deepFromFlat`, which would pollute any future Objects created. Any users that have `deepFromFlat` or `deepPick` (due to its dependency on `deepFromFlat`) in their code should upgrade to version 0.5.3 as", "cve_id": "CVE-2022-31106", "title": "CVE-2022-31106", "source": "cvefixes", "timestamp": "2022-06-28", "split": "val"} +{"id": "952a542cc245cdea4eaf", "text": "CVE: CVE-2022-36009\n\n[{'lang': 'en', 'value': 'gomatrixserverlib is a Go library for matrix protocol federation. Dendrite is a Matrix homeserver written in Go, an alternative to Synapse. The power level parsing within gomatrixserverlib was failing to parse the `\"events_default\"` key of the `m.room.power_levels` event, defaulting the event default power level to zero in all cases. Power levels are the matrix terminology for user access level. In rooms where the `\"events_default\"` power level had", "cve_id": "CVE-2022-36009", "title": "CVE-2022-36009", "source": "cvefixes", "timestamp": "2022-08-19", "split": "val"} +{"id": "34bb65cd35f20f26f129", "text": "CVE: CVE-2022-29190\n\n[{'lang': 'en', 'value': 'Pion DTLS is a Go implementation of Datagram Transport Layer Security. Prior to version 2.1.4, an attacker can send packets that sends Pion DTLS into an infinite loop when processing. Version 2.1.4 contains a patch for this issue. There are currently no known workarounds available.'}]\n\nFix commit: Don't attempt to append zero length fragments\n\nBefore the fragmentBuffer would process zero length fragments. Since\nthey are zero length the append would", "cve_id": "CVE-2022-29190", "title": "CVE-2022-29190", "source": "cvefixes", "timestamp": "2022-05-21", "split": "val"} +{"id": "cdc2ffa861021ca149ea", "text": "[Improper Access Control - Generic] Unauthorized access\n\nHello Gents,\nI would like to report an issue where attackers are able to:\n1. List `about.gitlab.com` GS bucket.\n2. Access all resales through https://about.gitlab.com/all-releases.xml & https://about.gitlab.com/security-releases.xml, which contains undisclosed HackerOne reports.\n> For Example:\n```\n

This vulnerability has been discovered internally by the GitLab team.

", "cve_id": "CVE-2022-1351", "title": "CVE-2022-1351", "source": "cvefixes", "timestamp": "2022-04-14", "split": "val"} +{"id": "72ae769a65b59371eddc", "text": "CVE: CVE-2022-2818\n\n[{'lang': 'en', 'value': 'Authentication Bypass by Primary Weakness in GitHub repository cockpit-hq/cockpit prior to 2.2.2.'}]\n\nFix commit: Fix exposing 2FA secret in JWT token on login", "cve_id": "CVE-2022-2818", "title": "CVE-2022-2818", "source": "cvefixes", "timestamp": "2022-08-15", "split": "val"} +{"id": "e7ab06c0608af49b64de", "text": "CVE: CVE-2022-23559\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite model that would cause an integer overflow in embedding lookup operations. Both `embedding_size` and `lookup_size` are products of values provided by the user. Hence, a malicious user could trigger overflows in the multiplication. In certain scenarios, this can then result in heap OOB read/write. Users are advised to upgrade to a patched version.'}]\n\nFix commit:", "cve_id": "CVE-2022-23559", "title": "CVE-2022-23559", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val"} +{"id": "1e2cf9483ac0aebe6cf5", "text": "CVE: CVE-2022-23592\n\n[{'lang': 'en', 'value': \"Tensorflow is an Open Source Machine Learning Framework. TensorFlow's type inference can cause a heap out of bounds read as the bounds checking is done in a `DCHECK` (which is a no-op during production). An attacker can control the `input_idx` variable such that `ix` would be larger than the number of values in `node_t.args`. The fix will be included in TensorFlow 2.8.0. This is the only affected version.\"}]\n\nFix commit: Handle invalid inputs instea", "cve_id": "CVE-2022-23592", "title": "CVE-2022-23592", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val"} +{"id": "65f58797c4c5b270770c", "text": "CVE: CVE-2022-23935\n\n[{'lang': 'en', 'value': 'lib/Image/ExifTool.pm in ExifTool before 12.38 mishandles a $file =~ /\\\\|$/ check, leading to command injection.'}]\n\nFix commit: Update to 12.38", "cve_id": "CVE-2022-23935", "title": "CVE-2022-23935", "source": "cvefixes", "timestamp": "2022-01-25", "split": "val"} +{"id": "c62d0d2ec6b574a0bac6", "text": "CVE: CVE-2022-31042\n\n[{'lang': 'en', 'value': 'Guzzle is an open source PHP HTTP client. In affected versions the `Cookie` headers on requests are sensitive information. On making a request using the `https` scheme to a server which responds with a redirect to a URI with the `http` scheme, or on making a request to a server which responds with a redirect to a a URI to a different host, we should not forward the `Cookie` header on. Prior to this fix, only cookies that were managed by our cookie m", "cve_id": "CVE-2022-31042", "title": "CVE-2022-31042", "source": "cvefixes", "timestamp": "2022-06-10", "split": "val"} +{"id": "52fa4b9fa813b4f8fab2", "text": "CVE: CVE-2022-0726\n\n[{'lang': 'en', 'value': 'Improper Authorization in GitHub repository chocobozzz/peertube prior to 4.1.0.'}]\n\nFix commit: Check video privacy when creating comments/rates", "cve_id": "CVE-2022-0726", "title": "CVE-2022-0726", "source": "cvefixes", "timestamp": "2022-02-23", "split": "val"} +{"id": "fd87fbb553bdc15cb260", "text": "CVE: CVE-2022-0960\n\n[{'lang': 'en', 'value': 'Stored XSS viva .properties file upload in GitHub repository star7th/showdoc prior to 2.10.4.'}]\n\nFix commit: file upload bug", "cve_id": "CVE-2022-0960", "title": "CVE-2022-0960", "source": "cvefixes", "timestamp": "2022-03-14", "split": "val"} +{"id": "294e2583dd11fda007d9", "text": "CVE: CVE-2022-21678\n\n[{'lang': 'en', 'value': \"Discourse is an open source discussion platform. Prior to version 2.8.0.beta11 in the `tests-passed` branch, version 2.8.0.beta11 in the `beta` branch, and version 2.7.13 in the `stable` branch, the bios of users who made their profiles private were still visible in the `` tags on their users' pages. The problem is patched in `tests-passed` version 2.8.0.beta11, `beta` version 2.8.0.beta11, and `stable` version 2.7.13 of Discourse.\"}]\n\nFix com", "cve_id": "CVE-2022-21678", "title": "CVE-2022-21678", "source": "cvefixes", "timestamp": "2022-01-13", "split": "val"} +{"id": "2e3ede3df805014a5902", "text": "[Cross-site Scripting (XSS) - Reflected] XSS DUE TO CVE-2022-38463 in https://████████\n\n**Description:**\nDuring my research, I found one of the host running ServiceNow vulnerable to CVE-2022-38463 . ServiceNow through San Diego Patch 4b and Patch 6 allows reflected XSS in the logout functionality.\n\n## Impact\n\nAttacker is able to steal victims cookies, redirect victim to attacker controlled domain, and perform various malicious activities.\n\n## System Host(s)\n███\n\n## Affected Product(s) and Versio", "cve_id": "CVE-2022-38463", "title": "XSS DUE TO CVE-2022-38463 in https://████████ (Cross-site Scripting (XSS) - Reflected)", "source": "hackerone", "timestamp": "2022-09-14", "split": "val"} +{"id": "CVE-2023-4966", "text": "Citrix NetScaler ADC and NetScaler Gateway Buffer Overflow Vulnerability\n\nAffected: Citrix NetScaler ADC and NetScaler Gateway\n\nCitrix NetScaler ADC and NetScaler Gateway contain a buffer overflow vulnerability that allows for sensitive information disclosure when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server.\n\nRequired Action: Apply mitigations and kill all active and persistent sessions per vendor instructions [https://www.netscaler.com/blog/new", "cve_id": "CVE-2023-4966", "title": "Citrix NetScaler ADC and NetScaler Gateway Buffer Overflow Vulnerability", "source": "cisa_kev", "timestamp": "2023-10-18", "split": "val"} +{"id": "e4f953f2429dea210a75", "text": "CVE: CVE-2022-0272\n\n[{'lang': 'en', 'value': 'Improper Restriction of XML External Entity Reference in GitHub repository detekt/detekt prior to 1.20.0.'}]\n\nFix commit: Parse Baseline in a secure way (#4499)", "cve_id": "CVE-2022-0272", "title": "CVE-2022-0272", "source": "cvefixes", "timestamp": "2022-04-21", "split": "val"} +{"id": "CVE-2023-41991", "text": "Apple Multiple Products Improper Certificate Validation Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, and watchOS contain an improper certificate validation vulnerability that can allow a malicious app to bypass signature validation.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-295\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-41991", "title": "Apple Multiple Products Improper Certificate Validation Vulnerability", "source": "cisa_kev", "timestamp": "2023-09-25", "split": "val"} +{"id": "168ad749e6419a88a45c", "text": "CVE: CVE-2022-24300\n\n[{'lang': 'en', 'value': 'Minetest before 5.4.0 allows attackers to add or modify arbitrary meta fields of the same item stack as saved user input, aka ItemStack meta injection.'}]\n\nFix commit: Sanitize ItemStack meta text", "cve_id": "CVE-2022-24300", "title": "CVE-2022-24300", "source": "cvefixes", "timestamp": "2022-02-02", "split": "val"} +{"id": "72f2f341129c43966659", "text": "CVE: CVE-2022-0970\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository getgrav/grav prior to 1.7.31.'}]\n\nFix commit: Added XSS check for uploaded SVG files before they get stored", "cve_id": "CVE-2022-0970", "title": "CVE-2022-0970", "source": "cvefixes", "timestamp": "2022-03-15", "split": "val"} +{"id": "d3bdecdd3316fdf42068", "text": "CVE: CVE-2022-0226\n\n[{'lang': 'en', 'value': 'livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF)'}]\n\nFix commit: Missing csfr check", "cve_id": "CVE-2022-0226", "title": "CVE-2022-0226", "source": "cvefixes", "timestamp": "2022-01-14", "split": "val"} +{"id": "2aca2f2b36bb259063d6", "text": "CVE: CVE-2022-2923\n\n[{'lang': 'en', 'value': 'NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0240.'}]\n\nFix commit: patch 9.0.0240: crash when using \":mkspell\" with an empty .dic file\n\nProblem: Crash when using \":mkspell\" with an empty .dic file.\nSolution: Check for an empty word tree.", "cve_id": "CVE-2022-2923", "title": "CVE-2022-2923", "source": "cvefixes", "timestamp": "2022-08-22", "split": "val"} +{"id": "109f10c26954f4a4a236", "text": "CVE: CVE-2022-0521\n\n[{'lang': 'en', 'value': 'Access of Memory Location After End of Buffer in GitHub repository radareorg/radare2 prior to 5.6.2.'}]\n\nFix commit: Improve boundary checks to fix oobread segfaults ##crash\n\n* Reported by Cen Zhang via huntr.dev\n* Reproducer: bins/fuzzed/javaoob-havoc.class", "cve_id": "CVE-2022-0521", "title": "CVE-2022-0521", "source": "cvefixes", "timestamp": "2022-02-08", "split": "val"} +{"id": "4d3922414a012e2eed88", "text": "CVE: CVE-2022-33105\n\n[{'lang': 'en', 'value': 'Redis v7.0 was discovered to contain a memory leak via the component streamGetEdgeID.'}]\n\nFix commit: Fix memory leak in streamGetEdgeID (#10753)\n\nsi is initialized by streamIteratorStart(), we should call\r\nstreamIteratorStop() on it when done.\r\n\r\nregression introduced in #9127 (redis 7.0)", "cve_id": "CVE-2022-33105", "title": "CVE-2022-33105", "source": "cvefixes", "timestamp": "2022-06-23", "split": "val"} +{"id": "8bfdf94f18411fd2e5d4", "text": "CVE: CVE-2022-1733\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.4968.'}]\n\nFix commit: patch 8.2.4968: reading past end of the line when C-indenting\n\nProblem: Reading past end of the line when C-indenting.\nSolution: Check for NUL.", "cve_id": "CVE-2022-1733", "title": "CVE-2022-1733", "source": "cvefixes", "timestamp": "2022-05-17", "split": "val"} +{"id": "e851d8383c7dc1170db9", "text": "CVE: CVE-2022-31082\n\n[{'lang': 'en', 'value': 'GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. glpi-inventory-plugin is a plugin for GLPI to handle inventory management. In affected versions a SQL injection can be made using package deployment tasks. This issue has been resolved in version 1.0.2. Users are advised to upgrade. Users unable to upgrade should delete the `front/deploypackage.public.php` file", "cve_id": "CVE-2022-31082", "title": "CVE-2022-31082", "source": "cvefixes", "timestamp": "2022-06-27", "split": "val"} +{"id": "890e00def9705eb7fb07", "text": "[CRLF Injection] CRLF Injection in Nodejs ‘undici’ via host\n\nSummary: \nundici library should be protects HTTP headers from CRLF injection vulnerabilities. However, CRLF injection exists in the ‘host’ header of undici.request api.\nDescription:\nlike https://hackerone.com/reports/1664019\nSource code:\nlib/core/request.js:296\n\n```javascript\nfunction processHeader (request, key, val) {\n if (val && (typeof val === 'object' && !Array.isArray(val))) {\n throw new InvalidArgumentError(`invalid ${key} h", "cve_id": "CVE-2023-23936", "title": "CRLF Injection in Nodejs ‘undici’ via host (CRLF Injection)", "source": "hackerone", "timestamp": "2023-03-29", "split": "val"} +{"id": "b7fc23e8d7a359d195ee", "text": "CVE: CVE-2022-0654\n\n[{'lang': 'en', 'value': 'Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository fgribreau/node-request-retry prior to 7.0.0.'}]\n\nFix commit: Prevent Cookie & Authorization Headers from being forwarded when the URL redirects to another domain (information leak) #137", "cve_id": "CVE-2022-0654", "title": "CVE-2022-0654", "source": "cvefixes", "timestamp": "2022-02-23", "split": "val"} +{"id": "0a1d566090735155fb7f", "text": "CVE: CVE-2022-31098\n\n[{'lang': 'en', 'value': \"Weave GitOps is a simple open source developer platform for people who want cloud native applications, without needing Kubernetes expertise. A vulnerability in the logging of Weave GitOps could allow an authenticated remote attacker to view sensitive cluster configurations, aka KubeConfg, of registered Kubernetes clusters, including the service account tokens in plain text from Weave GitOps's pod logs on the management cluster. An unauthorized remot", "cve_id": "CVE-2022-31098", "title": "CVE-2022-31098", "source": "cvefixes", "timestamp": "2022-06-27", "split": "val"} +{"id": "0d82b274e1182d0322a7", "text": "CVE: CVE-2022-23576\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The implementation of `OpLevelCostEstimator::CalculateOutputSize` is vulnerable to an integer overflow if an attacker can create an operation which would involve tensors with large enough number of elements. We can have a large enough number of dimensions in `output_shape.dim()` or just a small number of dimensions being large enough to cause an overflow in the multiplication. The fix will be", "cve_id": "CVE-2022-23576", "title": "CVE-2022-23576", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val"} +{"id": "29c6482e5f65d554e4a9", "text": "CVE: CVE-2022-21722\n\n[{'lang': 'en', 'value': 'PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In version 2.11.1 and prior, there are various cases where it is possible that certain incoming RTP/RTCP packets can potentially cause out-of-bound read access. This issue affects all users that use PJMEDIA and accept incoming RTP/RTCP. A patch is available as a commit in the `master", "cve_id": "CVE-2022-21722", "title": "CVE-2022-21722", "source": "cvefixes", "timestamp": "2022-01-27", "split": "val"} +{"id": "45c01c0bfe288f87c5a2", "text": "[Expected Behavior Violation] CVE-2023-28322: more POST-after-PUT confusion\n\n## Summary:\nCVE-2022-32221 fixes is insufficient.\nIn CVE-2022-32221, only CURLOPT_POST was corrected.\nHowever, CURLOPT_POST is not necessarily used when sending data with the POST method.\nCURLOPT_POST is not used in the CURLOPT_POSTFIELDS usage example on the official website.\n```\nCURL *curl = curl_easy_init();\nif(curl) {\n const char *data = \"data to send\";\n \n curl_easy_setopt(curl, CURLOPT_URL, \"https://example.com\")", "cve_id": "CVE-2022-32221", "title": "CVE-2023-28322: more POST-after-PUT confusion (Expected Behavior Violation)", "source": "hackerone", "timestamp": "2023-05-18", "split": "val"} +{"id": "CVE-2022-0609", "text": "Google Chromium Animation Use-After-Free Vulnerability\n\nAffected: Google Chromium Animation\n\nGoogle Chromium Animation contains a use-after-free vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Ex", "cve_id": "CVE-2022-0609", "title": "Google Chromium Animation Use-After-Free Vulnerability", "source": "cisa_kev", "timestamp": "2022-02-15", "split": "val"} +{"id": "CVE-2023-33010", "text": "Zyxel Multiple Firewalls Buffer Overflow Vulnerability\n\nAffected: Zyxel Multiple Firewalls\n\nZyxel ATP, USG FLEX, USG FLEX 50(W), USG20(W)-VPN, VPN, and ZyWALL/USG firewalls contain a buffer overflow vulnerability in the ID processing function that could allow an unauthenticated attacker to cause denial-of-service (DoS) conditions and remote code execution on an affected device.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-120\n\n[Source: CISA Known Exploited Vulnerabilitie", "cve_id": "CVE-2023-33010", "title": "Zyxel Multiple Firewalls Buffer Overflow Vulnerability", "source": "cisa_kev", "timestamp": "2023-06-05", "split": "val"} +{"id": "adc570b82b06232ddc9d", "text": "CVE: CVE-2022-23608\n\n[{'lang': 'en', 'value': 'PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions up to and including 2.11.1 when in a dialog set (or forking) scenario, a hash key shared by multiple UAC dialogs can potentially be prematurely freed when one of the dialogs is destroyed . The issue may cause a dialog set to be registered in the hash table multiple times", "cve_id": "CVE-2022-23608", "title": "CVE-2022-23608", "source": "cvefixes", "timestamp": "2022-02-22", "split": "val"} +{"id": "7ff7d15324de1cf862b1", "text": "CVE: CVE-2022-1715\n\n[{'lang': 'en', 'value': 'Account Takeover in GitHub repository neorazorx/facturascripts prior to 2022.07.'}]\n\nFix commit: Fixed string comparison to avoid automatic cast during database password check.\n------\nCorregida la comparación de cadenas para evitar cast automático durante la comprobación de la contraseña de la basew de datos.", "cve_id": "CVE-2022-1715", "title": "CVE-2022-1715", "source": "cvefixes", "timestamp": "2022-05-13", "split": "val"} +{"id": "a5498f5431f7126bb3cb", "text": "CVE: CVE-2022-0213\n\n[{'lang': 'en', 'value': 'vim is vulnerable to Heap-based Buffer Overflow'}]\n\nFix commit: patch 8.2.4074: going over the end of NameBuff\n\nProblem: Going over the end of NameBuff.\nSolution: Check length when appending a space.", "cve_id": "CVE-2022-0213", "title": "CVE-2022-0213", "source": "cvefixes", "timestamp": "2022-01-14", "split": "val"} +{"id": "CVE-2023-36846", "text": "Juniper Junos OS SRX Series Missing Authentication for Critical Function Vulnerability\n\nAffected: Juniper Junos OS\n\nJuniper Junos OS on SRX Series contains a missing authentication for critical function vulnerability that allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity. With a specific request to user.php that doesn't require authentication, an attacker is able to upload arbitrary files via J-Web, leading to a loss of integrity for a certain", "cve_id": "CVE-2023-36846", "title": "Juniper Junos OS SRX Series Missing Authentication for Critical Function Vulnerability", "source": "cisa_kev", "timestamp": "2023-11-13", "split": "val"} +{"id": "CVE-2022-44877", "text": "CWP Control Web Panel OS Command Injection Vulnerability\n\nAffected: CWP Control Web Panel\n\nCWP Control Web Panel (formerly CentOS Web Panel) contains an OS command injection vulnerability that allows remote attackers to execute commands via shell metacharacters in the login parameter.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-78\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-44877", "title": "CWP Control Web Panel OS Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2023-01-17", "split": "val"} +{"id": "0cd7ff4ffe8f17eedcee", "text": "CVE: CVE-2022-21736\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The implementation of `SparseTensorSliceDataset` has an undefined behavior: under certain condition it can be made to dereference a `nullptr` value. The 3 input arguments to `SparseTensorSliceDataset` represent a sparse tensor. However, there are some preconditions that these arguments must satisfy but these are not validated in the implementation. The fix will be included in TensorFlow 2.8.0.", "cve_id": "CVE-2022-21736", "title": "CVE-2022-21736", "source": "cvefixes", "timestamp": "2022-02-03", "split": "val"} +{"id": "1365073c591fe4dacd5e", "text": "CVE: CVE-2022-21652\n\n[{'lang': 'en', 'value': \"Shopware is an open source e-commerce software platform. In affected versions shopware would not invalidate a user session in the event of a password change. With version 5.7.7 the session validation was adjusted, so that sessions created prior to the latest password change of a customer account can't be used to login with said account. This also means, that upon a password change, all existing sessions for a given customer account are automatically", "cve_id": "CVE-2022-21652", "title": "CVE-2022-21652", "source": "cvefixes", "timestamp": "2022-01-05", "split": "val"} +{"id": "76b92a81c01deae84f4b", "text": "CVE: CVE-2022-2549\n\n[{'lang': 'en', 'value': 'NULL Pointer Dereference in GitHub repository gpac/gpac prior to v2.1.0-DEV.'}]\n\nFix commit: fixed #2232", "cve_id": "CVE-2022-2549", "title": "CVE-2022-2549", "source": "cvefixes", "timestamp": "2022-07-27", "split": "val"} +{"id": "cc2cc14ced02cd68dfcf", "text": "CVE: CVE-2022-24841\n\n[{'lang': 'en', 'value': 'fleetdm/fleet is an open source device management, built on osquery. All versions of fleet making use of the teams feature are affected by this authorization bypass issue. Fleet instances without teams, or with teams but without restricted team accounts are not affected. In affected versions a team admin can erroneously add themselves as admin, maintainer or observer on other teams. Users are advised to upgrade to version 4.13. There are no known wo", "cve_id": "CVE-2022-24841", "title": "CVE-2022-24841", "source": "cvefixes", "timestamp": "2022-04-18", "split": "val"} +{"id": "CVE-2022-41080", "text": "Microsoft Exchange Server Privilege Escalation Vulnerability\n\nAffected: Microsoft Exchange Server\n\nMicrosoft Exchange Server contains an unspecified vulnerability that allows for privilege escalation. This vulnerability is chainable with CVE-2022-41082, which allows for remote code execution.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-41080", "title": "Microsoft Exchange Server Privilege Escalation Vulnerability", "source": "cisa_kev", "timestamp": "2023-01-10", "split": "val"} +{"id": "8d5ecd04fb3e5d291f6a", "text": "CVE: CVE-2022-2816\n\n[{'lang': 'en', 'value': 'Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.0212.'}]\n\nFix commit: patch 9.0.0212: invalid memory access when compiling :unlet\n\nProblem: Invalid memory access when compiling :unlet.\nSolution: Don't read past the end of the line.", "cve_id": "CVE-2022-2816", "title": "CVE-2022-2816", "source": "cvefixes", "timestamp": "2022-08-15", "split": "val"} +{"id": "a4e6ddbc5b6f6699eb6a", "text": "CVE: CVE-2022-0443\n\n[{'lang': 'en', 'value': 'Use After Free in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.4281: using freed memory with :lopen and :bwipe\n\nProblem: Using freed memory with :lopen and :bwipe.\nSolution: Do not use a wiped out buffer.", "cve_id": "CVE-2022-0443", "title": "CVE-2022-0443", "source": "cvefixes", "timestamp": "2022-02-02", "split": "val"} +{"id": "CVE-2022-21999", "text": "Microsoft Windows Print Spooler Privilege Escalation Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Print Spooler contains an unspecified vulnerability which can allow for privilege escalation.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-40, CWE-1386\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-21999", "title": "Microsoft Windows Print Spooler Privilege Escalation Vulnerability", "source": "cisa_kev", "timestamp": "2022-03-25", "split": "val"} +{"id": "a568a11a631cdacec868", "text": "CVE: CVE-2022-24772\n\n[{'lang': 'en', 'value': 'Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code does not check for tailing garbage bytes after decoding a `DigestInfo` ASN.1 structure. This can allow padding bytes to be removed and garbage data added to forge a signature when a low public exponent is being used. The issue has been addressed in `node-forge` version 1.3.0. There", "cve_id": "CVE-2022-24772", "title": "CVE-2022-24772", "source": "cvefixes", "timestamp": "2022-03-18", "split": "val"} +{"id": "edc1659d5611c42ab9e4", "text": "CVE: CVE-2022-29162\n\n[{'lang': 'en', 'value': \"runc is a CLI tool for spawning and running containers on Linux according to the OCI specification. A bug was found in runc prior to version 1.1.2 where `runc exec --cap` created processes with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during execve(2). This bug did not affect the container securi", "cve_id": "CVE-2022-29162", "title": "CVE-2022-29162", "source": "cvefixes", "timestamp": "2022-05-17", "split": "val"} +{"id": "848dc2be9251b7f8acf9", "text": "CVE: CVE-2022-0929\n\n[{'lang': 'en', 'value': 'XSS on dynamic_text module in GitHub repository microweber/microweber prior to 1.2.11.'}]\n\nFix commit: Update build-and-upload.yml", "cve_id": "CVE-2022-0929", "title": "CVE-2022-0929", "source": "cvefixes", "timestamp": "2022-03-12", "split": "val"} +{"id": "db568f0175f2fef1d9cf", "text": "CVE: CVE-2022-0691\n\n[{'lang': 'en', 'value': 'Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.9.'}]\n\nFix commit: [fix] Strip all control characters from the beginning of the URL", "cve_id": "CVE-2022-0691", "title": "CVE-2022-0691", "source": "cvefixes", "timestamp": "2022-02-21", "split": "val"} +{"id": "2a1878ddca09607fa9aa", "text": "CVE: CVE-2022-1537\n\n[{'lang': 'en', 'value': \"file.copy operations in GruntJS are vulnerable to a TOCTOU race condition leading to arbitrary file write in GitHub repository gruntjs/grunt prior to 1.5.3. This vulnerability is capable of arbitrary file writes which can lead to local privilege escalation to the GruntJS user if a lower-privileged user has write access to both source and destination directories as the lower-privileged user can create a symlink to the GruntJS user's .bashrc file or re", "cve_id": "CVE-2022-1537", "title": "CVE-2022-1537", "source": "cvefixes", "timestamp": "2022-05-10", "split": "val"} +{"id": "5d4cd22fa27f09d6f503", "text": "CVE: CVE-2022-31005\n\n[{'lang': 'en', 'value': 'Vapor is an HTTP web framework for Swift. Users of Vapor prior to version 4.60.3 with FileMiddleware enabled are vulnerable to an integer overflow vulnerability that can crash the application. Version 4.60.3 contains a patch for this issue. As a workaround, disable FileMiddleware and serve via a Content Delivery Network.'}]\n\nFix commit: Merge pull request from GHSA-vj2m-9f5j-mpr5\n\n* Add failing test for crash\n\n* Bounds check the range and add a coup", "cve_id": "CVE-2022-31005", "title": "CVE-2022-31005", "source": "cvefixes", "timestamp": "2022-05-31", "split": "val"} +{"id": "CVE-2023-36036", "text": "Microsoft Windows Cloud Files Mini Filter Driver Privilege Escalation Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Cloud Files Mini Filter Driver contains a privilege escalation vulnerability that could allow an attacker to gain SYSTEM privileges.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-122\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-36036", "title": "Microsoft Windows Cloud Files Mini Filter Driver Privilege Escalation Vulnerability", "source": "cisa_kev", "timestamp": "2023-11-14", "split": "val"} +{"id": "3ea3ad131eb8df300c69", "text": "CVE: CVE-2022-21687\n\n[{'lang': 'en', 'value': \"gh-ost is a triggerless online schema migration solution for MySQL. Versions prior to 1.1.3 are subject to an arbitrary file read vulnerability. The attacker must have access to the target host or trick an administrator into executing a malicious gh-ost command on a host running gh-ost, plus network access from host running gh-ost to the attack's malicious MySQL server. The `-database` parameter does not properly sanitize user input which can lead t", "cve_id": "CVE-2022-21687", "title": "CVE-2022-21687", "source": "cvefixes", "timestamp": "2022-02-01", "split": "val"} +{"id": "a5811960730ac43a9558", "text": "CVE: CVE-2022-29968\n\n[{'lang': 'en', 'value': 'An issue was discovered in the Linux kernel through 5.17.5. io_rw_init_file in fs/io_uring.c lacks initialization of kiocb->private.'}]\n\nFix commit: io_uring: fix uninitialized field in rw io_kiocb\n\nio_rw_init_file does not initialize kiocb->private, so when iocb_bio_iopoll\nreads kiocb->private it can contain uninitialized data.\n\nFixes: 3e08773c3841 (\"block: switch polling to be bio based\")\nSigned-off-by: Joseph Ravichandran \nSigned-o", "cve_id": "CVE-2022-29968", "title": "CVE-2022-29968", "source": "cvefixes", "timestamp": "2022-05-02", "split": "val"} +{"id": "9dc93672dbf3d82fb4c3", "text": "CVE: CVE-2022-29777\n\n[{'lang': 'en', 'value': 'Onlyoffice Document Server v6.0.0 and below and Core 6.1.0.26 and below were discovered to contain a heap overflow via the component DesktopEditor/fontengine/fontconverter/FontFileBase.h.'}]\n\nFix commit: Fix 34, 35, 37", "cve_id": "CVE-2022-29777", "title": "CVE-2022-29777", "source": "cvefixes", "timestamp": "2022-06-02", "split": "val"} +{"id": "0ec3273b4dc75d1a64cd", "text": "CVE: CVE-2022-23589\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. Under certain scenarios, Grappler component of TensorFlow can trigger a null pointer dereference. There are 2 places where this can occur, for the same malicious alteration of a `SavedModel` file (fixing the first one would trigger the same dereference in the second place). First, during constant folding, the `GraphDef` might not have the required nodes for the binary operation. If a node is m", "cve_id": "CVE-2022-23589", "title": "CVE-2022-23589", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val"} +{"id": "1b3e6dd15c344b356911", "text": "CVE: CVE-2022-1720\n\n[{'lang': 'en', 'value': 'Buffer Over-read in function grab_file_name in GitHub repository vim/vim prior to 8.2.4956. This vulnerability is capable of crashing the software, memory modification, and possible remote execution.'}]\n\nFix commit: patch 8.2.4956: reading past end of line with \"gf\" in Visual block mode\n\nProblem: Reading past end of line with \"gf\" in Visual block mode.\nSolution: Do not include the NUL in the length.", "cve_id": "CVE-2022-1720", "title": "CVE-2022-1720", "source": "cvefixes", "timestamp": "2022-06-20", "split": "val"} +{"id": "63476c475011e33a4f4e", "text": "CVE: CVE-2022-1244\n\n[{'lang': 'en', 'value': 'heap-buffer-overflow in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of inducing denial of service.'}]\n\nFix commit: Fix oobread in dyldcache ##crash\n\n* Reported by @hdthky via huntr.dev\n* Reproducers: poc1\n* BountyID: 8ae2c61a-2220-47a5-bfe8-fe6d41ab1f82", "cve_id": "CVE-2022-1244", "title": "CVE-2022-1244", "source": "cvefixes", "timestamp": "2022-04-05", "split": "val"} +{"id": "04c675fd1628b0677511", "text": "CVE: CVE-2022-31108\n\n[{'lang': 'en', 'value': 'Mermaid is a JavaScript based diagramming and charting tool that uses Markdown-inspired text definitions and a renderer to create and modify complex diagrams. An attacker is able to inject arbitrary `CSS` into the generated graph allowing them to change the styling of elements outside of the generated graph, and potentially exfiltrate sensitive information by using specially crafted `CSS` selectors. The following example shows how an attacker can ex", "cve_id": "CVE-2022-31108", "title": "CVE-2022-31108", "source": "cvefixes", "timestamp": "2022-06-28", "split": "val"} +{"id": "f7c8eefd2d1d0a976a0a", "text": "[Path Traversal] Path traversal through path stored in Uint8Array in Node.js 20\n\nVarious `node:fs` functions allow specifying paths as either strings or `Uint8Array` objects. In Node.js environments, the `Buffer` class extends the `Uint8Array` class. Node.js prevents path traversal through strings (see CVE-2023-30584) and `Buffer` objects (see CVE-2023-32004), but not through non-`Buffer` `Uint8Array` objects.\n\nThis is distinct from CVE-2023-32004 ([report 2038134](https://hackerone.com/reports/", "cve_id": "CVE-2023-32004", "title": "Path traversal through path stored in Uint8Array in Node.js 20 (Path Traversal)", "source": "hackerone", "timestamp": "2024-01-20", "split": "val"} +{"id": "1c68f4a17e9fa34e0b20", "text": "CVE: CVE-2022-0772\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository librenms/librenms prior to 22.2.2.'}]\n\nFix commit: Resolved XSS issue from alert rule list modal (#13805)", "cve_id": "CVE-2022-0772", "title": "CVE-2022-0772", "source": "cvefixes", "timestamp": "2022-02-27", "split": "val"} +{"id": "3d7222683feb1dda6dbe", "text": "CVE: CVE-2022-31030\n\n[{'lang': 'en', 'value': 'containerd is an open source container runtime. A bug was found in the containerd\\'s CRI implementation where programs inside a container can cause the containerd daemon to consume memory without bound during invocation of the `ExecSync` API. This can cause containerd to consume all available memory on the computer, denying service to other legitimate workloads. Kubernetes and crictl can both be configured to use containerd\\'s CRI implementation; `E", "cve_id": "CVE-2022-31030", "title": "CVE-2022-31030", "source": "cvefixes", "timestamp": "2022-06-09", "split": "val"} +{"id": "9f18e7649e5c3dd4df8d", "text": "CVE: CVE-2022-24065\n\n[{'lang': 'en', 'value': 'The package cookiecutter before 2.1.1 are vulnerable to Command Injection via hg argument injection. When calling the cookiecutter function from Python code with the checkout parameter, it is passed to the hg checkout command in a way that additional flags can be set. The additional flags can be used to perform a command injection.'}]\n\nFix commit: Merge pull request #1689 from cookiecutter/sanitize-mercurial-checkout\n\nSanitize Mercurial branch infor", "cve_id": "CVE-2022-24065", "title": "CVE-2022-24065", "source": "cvefixes", "timestamp": "2022-06-08", "split": "val"} +{"id": "3033d50ed599119a5b48", "text": "CVE: CVE-2022-0936\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository autolab/autolab prior to 2.8.0.'}]\n\nFix commit: Force download of attachments (#1490)\n\n* Rubocop fix\r\n\r\n* resolve merge\r\n\r\n* restore gemfile\r\n\r\n* restore nl", "cve_id": "CVE-2022-0936", "title": "CVE-2022-0936", "source": "cvefixes", "timestamp": "2022-04-11", "split": "val"} +{"id": "3ec7d73bcf9d5262fcf1", "text": "[Cross-site Scripting (XSS) - Reflected] CVE-2023-24488 xss on https://██████/\n\n**Description:**\n\n\n## References\n\n## Impact\n\nmalicios js inejction , cookie stealing\n\n## System Host(s)\n█████████\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\nCVE-2023-24488\n\n## Steps to Reproduce\n1. `https://█████/oauth/idp/logout?post_logout_redirect_uri=%0d%0a%0d%0a`\n\n## Suggested Mitigation/Remediation Actions", "cve_id": "CVE-2023-24488", "title": "CVE-2023-24488 xss on https://██████/ (Cross-site Scripting (XSS) - Reflected)", "source": "hackerone", "timestamp": "2023-09-08", "split": "val"} +{"id": "9264dc0286f0ffe98a97", "text": "CVE: CVE-2022-31022\n\n[{'lang': 'en', 'value': 'Bleve is a text indexing library for go. Bleve includes HTTP utilities under bleve/http package, that are used by its sample application. These HTTP methods pave way for exploitation of a node’s filesystem where the bleve index resides, if the user has used bleve’s own HTTP (bleve/http) handlers for exposing the access to the indexes. For instance, the CreateIndexHandler (`http/index_create.go`) and DeleteIndexHandler (`http/index_delete.go`) enable", "cve_id": "CVE-2022-31022", "title": "CVE-2022-31022", "source": "cvefixes", "timestamp": "2022-06-01", "split": "val"} +{"id": "b3f4e772ec5127352f82", "text": "CVE: CVE-2022-21733\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The implementation of `StringNGrams` can be used to trigger a denial of service attack by causing an out of memory condition after an integer overflow. We are missing a validation on `pad_witdh` and that result in computing a negative value for `ngram_width` which is later used to allocate parts of the output. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on", "cve_id": "CVE-2022-21733", "title": "CVE-2022-21733", "source": "cvefixes", "timestamp": "2022-02-03", "split": "val"} +{"id": "CVE-2022-42827", "text": "Apple iOS and iPadOS Out-of-Bounds Write Vulnerability\n\nAffected: Apple iOS and iPadOS\n\nApple iOS and iPadOS kernel contain an out-of-bounds write vulnerability which can allow an application to perform code execution with kernel privileges.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-20, CWE-787\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-42827", "title": "Apple iOS and iPadOS Out-of-Bounds Write Vulnerability", "source": "cisa_kev", "timestamp": "2022-10-25", "split": "val"} +{"id": "CVE-2023-42824", "text": "Apple iOS and iPadOS Kernel Privilege Escalation Vulnerability\n\nAffected: Apple iOS and iPadOS\n\nApple iOS and iPadOS contain an unspecified vulnerability that allows for local privilege escalation.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-42824", "title": "Apple iOS and iPadOS Kernel Privilege Escalation Vulnerability", "source": "cisa_kev", "timestamp": "2023-10-05", "split": "val"} +{"id": "a89ac02fbead6c30fe84", "text": "CVE: CVE-2022-23574\n\n[{'lang': 'en', 'value': \"Tensorflow is an Open Source Machine Learning Framework. There is a typo in TensorFlow's `SpecializeType` which results in heap OOB read/write. Due to a typo, `arg` is initialized to the `i`th mutable argument in a loop where the loop index is `j`. Hence it is possible to assign to `arg` from outside the vector of arguments. Since this is a mutable proto value, it allows both read and write to outside of bounds data. The fix will be included in Tens", "cve_id": "CVE-2022-23574", "title": "CVE-2022-23574", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val"} +{"id": "57d816de7ea7c73b660d", "text": "CVE: CVE-2022-1714\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash.'}]\n\nFix commit: Fix 4 byte oobread in msp430 disassembler ##crash\n\n* Only crashes with asan builds\n* Add missing =SN register\n* Reported by cnitlrt via huntrdev\n* BountyID: 1c22055b-b01", "cve_id": "CVE-2022-1714", "title": "CVE-2022-1714", "source": "cvefixes", "timestamp": "2022-05-13", "split": "val"} +{"id": "1ae4312229243bc1cef3", "text": "CVE: CVE-2022-1782\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Generic in GitHub repository erudika/para prior to v1.45.11.'}]\n\nFix commit: added option to escape HTML when compiling Mustache templates", "cve_id": "CVE-2022-1782", "title": "CVE-2022-1782", "source": "cvefixes", "timestamp": "2022-05-18", "split": "val"} +{"id": "CVE-2023-21715", "text": "Microsoft Office Publisher Security Feature Bypass Vulnerability\n\nAffected: Microsoft Office\n\nMicrosoft Office Publisher contains a security feature bypass vulnerability that allows for a local, authenticated attack on a targeted system.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-863\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-21715", "title": "Microsoft Office Publisher Security Feature Bypass Vulnerability", "source": "cisa_kev", "timestamp": "2023-02-14", "split": "val"} +{"id": "ea2d9e6f26d519add801", "text": "CVE: CVE-2022-0179\n\n[{'lang': 'en', 'value': 'snipe-it is vulnerable to Improper Access Control'}]\n\nFix commit: Merge pull request #10498 from Haxatron/master\n\nFix access control", "cve_id": "CVE-2022-0179", "title": "CVE-2022-0179", "source": "cvefixes", "timestamp": "2022-01-12", "split": "val"} +{"id": "26c06bbeb60712aec2b1", "text": "CVE: CVE-2022-24301\n\n[{'lang': 'en', 'value': \"In Minetest before 5.4.0, players can add or subtract items from a different player's inventory.\"}]\n\nFix commit: Prevent players accessing inventories of other players (#10341)", "cve_id": "CVE-2022-24301", "title": "CVE-2022-24301", "source": "cvefixes", "timestamp": "2022-02-02", "split": "val"} +{"id": "31c3c36881397b99cafd", "text": "CVE: CVE-2022-2279\n\n[{'lang': 'en', 'value': 'NULL Pointer Dereference in GitHub repository bfabiszewski/libmobi prior to 0.11.'}]\n\nFix commit: Fix undefined behavior when passing null to strdup", "cve_id": "CVE-2022-2279", "title": "CVE-2022-2279", "source": "cvefixes", "timestamp": "2022-07-01", "split": "val"} +{"id": "9de547c0d7039a9b84e0", "text": "[Cross-Site Request Forgery (CSRF)] 0-day Cross Origin Request Forgery vulnerability in Grafana 8.x .\n\n## Disclaimer\n\nTo triage, please note that this is still a 0-day that was alerted to Grafana already, in order to make sure the client is safe I report this issue now, please make sure to not spread it further or leak it, as the best interest is to let you be aware and safer from any potential attacks in the meantime.\n\n## Description\n\n@jub0bs and I have found a cross-origin request forgery atta", "cve_id": "CVE-2022-21703", "title": "0-day Cross Origin Request Forgery vulnerability in Grafana 8.x . (Cross-Site Request Forgery (CSRF))", "source": "hackerone", "timestamp": "2022-03-16", "split": "val"} +{"id": "b5e8590e45ae2c0ad66c", "text": "[Code Injection] Command Injection using malicious hostname in expanded proxycommand\n\nUsing the ProxyCommand or the ProxyJump feature enables users to exploit\nunchecked hostname syntax on the client, which enables to inject malicious code\ninto the command of the above-mentioned features through the hostname parameter.\n\nUser interaction is required to exploit this issue.\n\nAdvisory from libssh: https://www.libssh.org/security/advisories/CVE-2023-6004.txt\n\nAdvisory from OpenSSH which also suffered", "cve_id": "CVE-2023-6004", "title": "Command Injection using malicious hostname in expanded proxycommand (Code Injection)", "source": "hackerone", "timestamp": "2024-02-28", "split": "val"} +{"id": "cd5038584fc57e226561", "text": "CVE: CVE-2022-24766\n\n[{'lang': 'en', 'value': \"mitmproxy is an interactive, SSL/TLS-capable intercepting proxy. In mitmproxy 7.0.4 and below, a malicious client or server is able to perform HTTP request smuggling attacks through mitmproxy. This means that a malicious client/server could smuggle a request/response through mitmproxy as part of another request/response's HTTP message body. While mitmproxy would only see one request, the target server would see multiple requests. A smuggled request", "cve_id": "CVE-2022-24766", "title": "CVE-2022-24766", "source": "cvefixes", "timestamp": "2022-03-21", "split": "val"} +{"id": "eadf0f5232ca35cb7e8a", "text": "CVE: CVE-2022-31124\n\n[{'lang': 'en', 'value': \"openssh_key_parser is an open source Python package providing utilities to parse and pack OpenSSH private and public key files. In versions prior to 0.0.6 if a field of a key is shorter than it is declared to be, the parser raises an error with a message containing the raw field value. An attacker able to modify the declared length of a key's sensitive field can thus expose the raw value of that field. Users are advised to upgrade to version 0.0.6,", "cve_id": "CVE-2022-31124", "title": "CVE-2022-31124", "source": "cvefixes", "timestamp": "2022-07-06", "split": "val"} +{"id": "50d86e03602485e0b0ce", "text": "CVE: CVE-2022-21802\n\n[{'lang': 'en', 'value': 'The package grapesjs before 0.19.5 are vulnerable to Cross-site Scripting (XSS) due to an improper sanitization of the class name in Selector Manager.'}]\n\nFix commit: Protect Selector Manager views from XSS. Closes #4411", "cve_id": "CVE-2022-21802", "title": "CVE-2022-21802", "source": "cvefixes", "timestamp": "2022-07-25", "split": "val"} +{"id": "3a01de15be917dd5467f", "text": "CVE: CVE-2022-1699\n\n[{'lang': 'en', 'value': 'Uncontrolled Resource Consumption in GitHub repository causefx/organizr prior to 2.1.2000. This vulnerability can be abused by doing a DDoS attack for which genuine users will not able to access resources/applications.'}]\n\nFix commit: fix more lengths of user inputs", "cve_id": "CVE-2022-1699", "title": "CVE-2022-1699", "source": "cvefixes", "timestamp": "2022-05-12", "split": "val"} +{"id": "4b31a2206c9fd1bbc548", "text": "CVE: CVE-2022-2284\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.'}]\n\nFix commit: patch 9.0.0017: accessing memory beyond the end of the line\n\nProblem: Accessing memory beyond the end of the line.\nSolution: Stop Visual mode when closing a window.", "cve_id": "CVE-2022-2284", "title": "CVE-2022-2284", "source": "cvefixes", "timestamp": "2022-07-02", "split": "val"} +{"id": "CVE-2022-22960", "text": "VMware Multiple Products Privilege Escalation Vulnerability\n\nAffected: VMware Multiple Products\n\nVMware Workspace ONE Access, Identity Manager and vRealize Automation contain a privilege escalation vulnerability due to improper permissions in support scripts.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-250\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-22960", "title": "VMware Multiple Products Privilege Escalation Vulnerability", "source": "cisa_kev", "timestamp": "2022-04-15", "split": "val"} +{"id": "9a309ad2969b826d0fbd", "text": "[Open Redirect] CVE-2022-45402: Apache Airflow: Open redirect during login\n\nIn Apache Airflow versions prior to 2.4.3, there was an open redirect in the webserver's `/login` endpoint.\n\nmy initial email to `security@apache.org`:\n```\nHi,\n\nIn Apache Airflow, there is a parameter \"next\" on the Login page. And after a successful login, we're redirected to this parameter's value. \nI see there are some preventions for the open redirect bug. However, I can bypass these preventions using \"/\\google.com\"", "cve_id": "CVE-2022-45402", "title": "CVE-2022-45402: Apache Airflow: Open redirect during login (Open Redirect)", "source": "hackerone", "timestamp": "2022-12-01", "split": "val"} +{"id": "7463404a665dcf7b62ab", "text": "CVE: CVE-2022-27243\n\n[{'lang': 'en', 'value': 'An issue was discovered in MISP before 2.4.156. app/View/Users/terms.ctp allows Local File Inclusion via the custom terms file setting.'}]\n\nFix commit: fix: [security] lfi via custom terms file setting, as reported by Ianis BERNARD - NATO Cyber Security Centre", "cve_id": "CVE-2022-27243", "title": "CVE-2022-27243", "source": "cvefixes", "timestamp": "2022-03-18", "split": "val"} +{"id": "ff017988cd7e88bd510b", "text": "CVE: CVE-2022-37451\n\n[{'lang': 'en', 'value': 'Exim before 4.96 has an invalid free in pam_converse in auths/call_pam.c because store_free is not used after store_malloc.'}]\n\nFix commit: Fix PAM auth. Bug 2813", "cve_id": "CVE-2022-37451", "title": "CVE-2022-37451", "source": "cvefixes", "timestamp": "2022-08-06", "split": "val"} +{"id": "13ba88fd76e4d8c13bae", "text": "CVE: CVE-2022-1289\n\n[{'lang': 'en', 'value': 'A denial of service vulnerability was found in tildearrow Furnace. It has been classified as problematic. This is due to an incomplete fix of CVE-2022-1211. It is possible to initiate the attack remotely but it requires user interaction. The issue got fixed with the patch 0eb02422d5161767e9983bdaa5c429762d3477ce.'}]\n\nFix commit: fix possible pattern crash\n\nissue #325", "cve_id": "CVE-2022-1289", "title": "CVE-2022-1289", "source": "cvefixes", "timestamp": "2022-04-10", "split": "val"} +{"id": "5c2a9b998ce53b1f8bf9", "text": "CVE: CVE-2022-24753\n\n[{'lang': 'en', 'value': 'Stripe CLI is a command-line tool for the Stripe eCommerce platform. A vulnerability in Stripe CLI exists on Windows when certain commands are run in a directory where an attacker has planted files. The commands are `stripe login`, `stripe config -e`, `stripe community`, and `stripe open`. MacOS and Linux are unaffected. An attacker who successfully exploits the vulnerability can run arbitrary code in the context of the current user. The update addr", "cve_id": "CVE-2022-24753", "title": "CVE-2022-24753", "source": "cvefixes", "timestamp": "2022-03-09", "split": "val"} +{"id": "608f54696381f0f63cbc", "text": "CVE: CVE-2022-1237\n\n[{'lang': 'en', 'value': 'Improper Validation of Array Index in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is heap overflow and may be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html).'}]\n\nFix commit: Fix oobread segfaults in the NE bin parser ##crash\n\n* Reported by @han0nly via huntr.dev\n* Reproducers: seed1 seed2\n* BountyID: ad3c9c4c-76e7-40c8-bd4a-c095acd8bb40", "cve_id": "CVE-2022-1237", "title": "CVE-2022-1237", "source": "cvefixes", "timestamp": "2022-04-06", "split": "val"} +{"id": "bc640b61ca4ac216da8f", "text": "[Improper Access Control - Generic] DNS rebinding in --inspect (insufficient fix of CVE-2022-32212 affecting macOS devices)\n\nThe fix for CVE-2022-32212, covered the cases for routable IP addresses, however, there exists a specific behavior on macOS devices when handling the `http://0.0.0.0` URL that allows an attacker-controlled DNS server to bypass the DNS rebinding protection by resolving hosts in the `.local` domain.\n\n[Original HackerOne report](https://hackerone.com/reports/1632921)\n\n[Node.j", "cve_id": "CVE-2022-32212", "title": "DNS rebinding in --inspect (insufficient fix of CVE-2022-32212 affecting macOS devices) (Improper Access Control - Generic)", "source": "hackerone", "timestamp": "2023-01-12", "split": "val"} +{"id": "CVE-2023-35311", "text": "Microsoft Outlook Security Feature Bypass Vulnerability\n\nAffected: Microsoft Outlook\n\nMicrosoft Outlook contains a security feature bypass vulnerability that allows an attacker to bypass the Microsoft Outlook Security Notice prompt.\n\nRequired Action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.\n\nCWE(s): CWE-367\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-35311", "title": "Microsoft Outlook Security Feature Bypass Vulnerability", "source": "cisa_kev", "timestamp": "2023-07-11", "split": "val"} +{"id": "bc1c30eed665268f3003", "text": "CVE: CVE-2022-0690\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Reflected in Packagist microweber/microweber prior to 1.2.11.'}]\n\nFix commit: update", "cve_id": "CVE-2022-0690", "title": "CVE-2022-0690", "source": "cvefixes", "timestamp": "2022-02-19", "split": "val"} +{"id": "d306120dc163cb1e6969", "text": "CVE: CVE-2022-35978\n\n[{'lang': 'en', 'value': \"Minetest is a free open-source voxel game engine with easy modding and game creation. In **single player**, a mod can set a global setting that controls the Lua script loaded to display the main menu. The script is then loaded as soon as the game session is exited. The Lua environment the menu runs in is not sandboxed and can directly interfere with the user's system. There are currently no known workarounds.\"}]\n\nFix commit: Protect a few more setti", "cve_id": "CVE-2022-35978", "title": "CVE-2022-35978", "source": "cvefixes", "timestamp": "2022-08-15", "split": "val"} +{"id": "26121d7bfdf4bf3570c8", "text": "CVE: CVE-2022-0268\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in Packagist getgrav/grav prior to 1.7.28.'}]\n\nFix commit: Fixed XSS check not detecting escaped `:`", "cve_id": "CVE-2022-0268", "title": "CVE-2022-0268", "source": "cvefixes", "timestamp": "2022-01-25", "split": "val"} +{"id": "CVE-2022-41223", "text": "Mitel MiVoice Connect Code Injection Vulnerability\n\nAffected: Mitel MiVoice Connect\n\nThe Director component in Mitel MiVoice Connect allows an authenticated attacker with internal network access to execute code within the context of the application.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-94\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-41223", "title": "Mitel MiVoice Connect Code Injection Vulnerability", "source": "cisa_kev", "timestamp": "2023-02-21", "split": "val"} +{"id": "9026a6f80303b6eef6d2", "text": "CVE: CVE-2022-24829\n\n[{'lang': 'en', 'value': 'Garden is an automation platform for Kubernetes development and testing. In versions prior to 0.12.39 multiple endpoints did not require authentication. In some operating modes this allows for an attacker to gain access to the application erroneously. The configuration is leaked through the /api endpoint on the local server that is responsible for serving the Garden dashboard. At the moment, this server is accessible to 0.0.0.0 which makes it access", "cve_id": "CVE-2022-24829", "title": "CVE-2022-24829", "source": "cvefixes", "timestamp": "2022-04-11", "split": "val"} +{"id": "5751ff5abbb5858d9c67", "text": "CVE: CVE-2022-31038\n\n[{'lang': 'en', 'value': \"Gogs is an open source self-hosted Git service. In versions of gogs prior to 0.12.9 `DisplayName` does not filter characters input from users, which leads to an XSS vulnerability when directly displayed in the issue list. This issue has been resolved in commit 155cae1d which sanitizes `DisplayName` prior to display to the user. All users of gogs are advised to upgrade. Users unable to upgrade should check their users' display names for malicious cha", "cve_id": "CVE-2022-31038", "title": "CVE-2022-31038", "source": "cvefixes", "timestamp": "2022-06-09", "split": "val"} +{"id": "fb91c36ad30274ba0d77", "text": "CVE: CVE-2022-1769\n\n[{'lang': 'en', 'value': 'Buffer Over-read in GitHub repository vim/vim prior to 8.2.4974.'}]\n\nFix commit: patch 8.2.4974: \":so\" command may read after end of buffer\n\nProblem: \":so\" command may read after end of buffer.\nSolution: Compute length of text properly.", "cve_id": "CVE-2022-1769", "title": "CVE-2022-1769", "source": "cvefixes", "timestamp": "2022-05-17", "split": "val"} +{"id": "61d4ee98cca2d25b0c02", "text": "CVE: CVE-2022-23581\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The Grappler optimizer in TensorFlow can be used to cause a denial of service by altering a `SavedModel` such that `IsSimplifiableReshape` would trigger `CHECK` failures. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: Eliminate", "cve_id": "CVE-2022-23581", "title": "CVE-2022-23581", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val"} +{"id": "1e576ac33dd7b0e63c3b", "text": "CVE: CVE-2022-1155\n\n[{'lang': 'en', 'value': 'Old sessions are not blocked by the login enable function. in GitHub repository snipe/snipe-it prior to 5.3.10.'}]\n\nFix commit: Logout user when their activated status is switched to off\n\nSigned-off-by: snipe ", "cve_id": "CVE-2022-1155", "title": "CVE-2022-1155", "source": "cvefixes", "timestamp": "2022-03-30", "split": "val"} +{"id": "27b23f5d207e3fb9725e", "text": "CVE: CVE-2022-25875\n\n[{'lang': 'en', 'value': 'The package svelte before 3.49.0 are vulnerable to Cross-site Scripting (XSS) due to improper input sanitization and to improper escape of attributes when using objects during SSR (Server-Side Rendering). Exploiting this vulnerability is possible via objects with a custom toString() function.'}]\n\nFix commit: [fix] harden attribute escaping during ssr (#7530)", "cve_id": "CVE-2022-25875", "title": "CVE-2022-25875", "source": "cvefixes", "timestamp": "2022-07-12", "split": "val"} +{"id": "736c5e458cf51b4097f9", "text": "CVE: CVE-2022-2128\n\n[{'lang': 'en', 'value': 'Unrestricted Upload of File with Dangerous Type in GitHub repository polonel/trudesk prior to 1.2.4.'}]\n\nFix commit: fix(attachments): file type security fix", "cve_id": "CVE-2022-2128", "title": "CVE-2022-2128", "source": "cvefixes", "timestamp": "2022-06-20", "split": "val"} +{"id": "64ae6d204df89e0fe990", "text": "CVE: CVE-2022-2027\n\n[{'lang': 'en', 'value': 'Improper Neutralization of Formula Elements in a CSV File in GitHub repository kromitgmbh/titra prior to 0.77.0.'}]\n\nFix commit: 🔒 fixes three critical stored XSS vulnerabilities thanks @saharshtapi for reporting this\n🔒 fixes a formula injection vulnerability in the Excel export functionality thanks @saharshtapi for reprorting this\n❗️this is an important security release, we recommend to migrate asap, all titra versions below version 0.77.0 are consi", "cve_id": "CVE-2022-2027", "title": "CVE-2022-2027", "source": "cvefixes", "timestamp": "2022-06-09", "split": "val"} +{"id": "d9eac5db7b2f7a5b73fa", "text": "CVE: CVE-2022-24833\n\n[{'lang': 'en', 'value': \"PrivateBin is minimalist, open source online pastebin clone where the server has zero knowledge of pasted data. In PrivateBin < v1.4.0 a cross-site scripting (XSS) vulnerability was found. The vulnerability is present in all versions from v0.21 of the project, which was at the time still called ZeroBin. The issue is caused by the fact that SVGs can contain JavaScript. This can allow an attacker to execute code, if the user opens a paste with a speci", "cve_id": "CVE-2022-24833", "title": "CVE-2022-24833", "source": "cvefixes", "timestamp": "2022-04-11", "split": "val"} +{"id": "2f5b77a8f6e5f0c7dbf9", "text": "CVE: CVE-2022-1441\n\n[{'lang': 'en', 'value': 'MP4Box is a component of GPAC-2.0.0, which is a widely-used third-party package on RPM Fusion. When MP4Box tries to parse a MP4 file, it calls the function `diST_box_read()` to read from video. In this function, it allocates a buffer `str` with fixed length. However, content read from `bs` is controllable by user, so is the length, which causes a buffer overflow.'}]\n\nFix commit: fixed #2175", "cve_id": "CVE-2022-1441", "title": "CVE-2022-1441", "source": "cvefixes", "timestamp": "2022-04-25", "split": "val"} +{"id": "6a93bd47bde882a10426", "text": "CVE: CVE-2022-24761\n\n[{'lang': 'en', 'value': \"Waitress is a Web Server Gateway Interface server for Python 2 and 3. When using Waitress versions 2.1.0 and prior behind a proxy that does not properly validate the incoming HTTP request matches the RFC7230 standard, Waitress and the frontend proxy may disagree on where one request starts and where it ends. This would allow requests to be smuggled via the front-end proxy to waitress and later behavior. There are two classes of vulnerability that ma", "cve_id": "CVE-2022-24761", "title": "CVE-2022-24761", "source": "cvefixes", "timestamp": "2022-03-17", "split": "val"} +{"id": "710d89d8bd0e85239fd0", "text": "CVE: CVE-2022-23606\n\n[{'lang': 'en', 'value': 'Envoy is an open source edge and service proxy, designed for cloud-native applications. When a cluster is deleted via Cluster Discovery Service (CDS) all idle connections established to endpoints in that cluster are disconnected. A recursion was introduced in the procedure of disconnecting idle connections that can lead to stack exhaustion and abnormal process termination when a cluster has a large number of idle connections. This infinite recursion", "cve_id": "CVE-2022-23606", "title": "CVE-2022-23606", "source": "cvefixes", "timestamp": "2022-02-22", "split": "val"} +{"id": "8fa84c8b8b34612aa7db", "text": "CVE: CVE-2022-23581\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The Grappler optimizer in TensorFlow can be used to cause a denial of service by altering a `SavedModel` such that `IsSimplifiableReshape` would trigger `CHECK` failures. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: Make `IsS", "cve_id": "CVE-2022-23581", "title": "CVE-2022-23581", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val"} +{"id": "151b94f8532265fd857f", "text": "CVE: CVE-2022-31185\n\n[{'lang': 'en', 'value': \"mprweb is a hosting platform for the makedeb Package Repository. Email addresses were found to not have been hidden, even if a user had clicked the `Hide Email Address` checkbox on their account page, or during signup. This could lead to an account's email being leaked, which may be problematic if your email needs to remain private for any reason. Users hosting their own mprweb instance will need to upgrade to the latest commit to get this fixed. Us", "cve_id": "CVE-2022-31185", "title": "CVE-2022-31185", "source": "cvefixes", "timestamp": "2022-08-01", "split": "val"} +{"id": "CVE-2023-22952", "text": "Multiple SugarCRM Products Remote Code Execution Vulnerability\n\nAffected: SugarCRM Multiple Products\n\nMultiple SugarCRM products contain a remote code execution vulnerability in the EmailTemplates. Using a specially crafted request, custom PHP code can be injected through the EmailTemplates.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-20\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-22952", "title": "Multiple SugarCRM Products Remote Code Execution Vulnerability", "source": "cisa_kev", "timestamp": "2023-02-02", "split": "val"} +{"id": "CVE-2023-0386", "text": "Linux Kernel Improper Ownership Management Vulnerability\n\nAffected: Linux Kernel\n\nLinux Kernel contains an improper ownership management vulnerability, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel’s OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system.\n\nRequired Action: Apply mitigations per vendor instruct", "cve_id": "CVE-2023-0386", "title": "Linux Kernel Improper Ownership Management Vulnerability", "source": "cisa_kev", "timestamp": "2025-06-17", "split": "val"} +{"id": "d6f813035263dc2e2395", "text": "CVE: CVE-2022-0777\n\n[{'lang': 'en', 'value': 'Weak Password Recovery Mechanism for Forgotten Password in GitHub repository microweber/microweber prior to 1.3.'}]\n\nFix commit: forgot password add throttle", "cve_id": "CVE-2022-0777", "title": "CVE-2022-0777", "source": "cvefixes", "timestamp": "2022-03-01", "split": "val"} +{"id": "3a2c2d841bfbc2d23e70", "text": "CVE: CVE-2022-28805\n\n[{'lang': 'en', 'value': 'singlevar in lparser.c in Lua from (including) 5.4.0 up to (excluding) 5.4.4 lacks a certain luaK_exp2anyregup call, leading to a heap-based buffer over-read that might affect a system that compiles untrusted Lua code.'}]\n\nFix commit: Bug: Lua can generate wrong code when _ENV is ", "cve_id": "CVE-2022-28805", "title": "CVE-2022-28805", "source": "cvefixes", "timestamp": "2022-04-08", "split": "val"} +{"id": "3c022a1ec54bb08bcba0", "text": "CVE: CVE-2022-1674\n\n[{'lang': 'en', 'value': 'NULL Pointer Dereference in function vim_regexec_string at regexp.c:2733 in GitHub repository vim/vim prior to 8.2.4938. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2733 allows attackers to cause a denial of service (application crash) via a crafted input.'}]\n\nFix commit: patch 8.2.4938: crash when matching buffer with invalid pattern\n\nProblem: Crash when matching buffer with invalid pattern.\nSolution: Check for NULL regp", "cve_id": "CVE-2022-1674", "title": "CVE-2022-1674", "source": "cvefixes", "timestamp": "2022-05-12", "split": "val"} +{"id": "4ce03a82d16734045157", "text": "CVE: CVE-2022-25044\n\n[{'lang': 'en', 'value': 'Espruino 2v11.251 was discovered to contain a stack buffer overflow via src/jsvar.c in jsvNewFromString.'}]\n\nFix commit: Fix potential corruption issue caused by `delete [].__proto__` (fix #2142)", "cve_id": "CVE-2022-25044", "title": "CVE-2022-25044", "source": "cvefixes", "timestamp": "2022-03-05", "split": "val"} +{"id": "1d25226f3ae4dcebe02f", "text": "CVE: CVE-2022-2345\n\n[{'lang': 'en', 'value': 'Use After Free in GitHub repository vim/vim prior to 9.0.0046.'}]\n\nFix commit: patch 9.0.0047: using freed memory with recursive substitute\n\nProblem: Using freed memory with recursive substitute.\nSolution: Always make a copy for reg_prev_sub.", "cve_id": "CVE-2022-2345", "title": "CVE-2022-2345", "source": "cvefixes", "timestamp": "2022-07-08", "split": "val"} +{"id": "8a7f9ddb51d833d60ade", "text": "CVE: CVE-2022-29211\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.histogram_fixed_width` is vulnerable to a crash when the values array contain `Not a Number` (`NaN`) elements. The implementation assumes that all floating point operations are defined and then converts a floating point result to an integer index. If `values` contains `NaN` then the result of the division is still `", "cve_id": "CVE-2022-29211", "title": "CVE-2022-29211", "source": "cvefixes", "timestamp": "2022-05-21", "split": "val"} +{"id": "2182634042e5c2dcc8ce", "text": "CVE: CVE-2022-32201\n\n[{'lang': 'en', 'value': 'In libjpeg 1.63, there is a NULL pointer dereference in Component::SubXOf in component.hpp.'}]\n\nFix commit: Added a check whether all components in a scan are actually present.", "cve_id": "CVE-2022-32201", "title": "CVE-2022-32201", "source": "cvefixes", "timestamp": "2022-06-02", "split": "val"} +{"id": "54d202070af94d6d5fb9", "text": "CVE: CVE-2022-29710\n\n[{'lang': 'en', 'value': 'A cross-site scripting (XSS) vulnerability in uploadConfirm.php of LimeSurvey v5.3.9 and below allows attackers to execute arbitrary web scripts or HTML via a crafted plugin.'}]\n\nFix commit: Fixed issue: [security] Minor XSS issue in plugin overview - reported by Podalirius (podalirius.net/en/)", "cve_id": "CVE-2022-29710", "title": "CVE-2022-29710", "source": "cvefixes", "timestamp": "2022-05-25", "split": "val"} +{"id": "12410a656258ca1f09e2", "text": "CVE: CVE-2022-23614\n\n[{'lang': 'en', 'value': 'Twig is an open source template language for PHP. When in a sandbox mode, the `arrow` parameter of the `sort` filter must be a closure to avoid attackers being able to run arbitrary PHP functions. In affected versions this constraint was not properly enforced and could lead to code injection of arbitrary PHP code. Patched versions now disallow calling non Closure in the `sort` filter as is the case for some other filters. Users are advised to upgrad", "cve_id": "CVE-2022-23614", "title": "CVE-2022-23614", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val"} +{"id": "011f2c92d2d361cd1535", "text": "[Improper Access Control - Generic] CVE-2023-40611: Apache Airflow Dag Runs Broken Access Control Vulnerability\n\n##Description:\n\nApache Airflow, versions before 2.7.1, is affected by a vulnerability that allows authenticated and DAG-view authorized Users to modify some DAG run detail values when submitting notes. This could have them alter details such as configuration parameters, start date, etc.\n\nUsers should upgrade to version 2.7.1 or later which has removed the vulnerability.\n\n##Vulnerabili", "cve_id": "CVE-2023-40611", "title": "CVE-2023-40611: Apache Airflow Dag Runs Broken Access Control Vulnerability (Improper Access Control - Generic)", "source": "hackerone", "timestamp": "2023-10-27", "split": "val"} +{"id": "f160c18c71b4c4fbfc3e", "text": "CVE: CVE-2022-1810\n\n[{'lang': 'en', 'value': 'Improper Access Control in GitHub repository publify/publify prior to 9.2.9.'}]\n\nFix commit: Use only the main id parameter to find Article to update", "cve_id": "CVE-2022-1810", "title": "CVE-2022-1810", "source": "cvefixes", "timestamp": "2022-05-23", "split": "val"} +{"id": "CVE-2022-22706", "text": "Arm Mali GPU Kernel Driver Unspecified Vulnerability\n\nAffected: Arm Mali Graphics Processing Unit (GPU)\n\nArm Mali GPU Kernel Driver contains an unspecified vulnerability that allows a non-privileged user to achieve write access to read-only memory pages.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-119\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-22706", "title": "Arm Mali GPU Kernel Driver Unspecified Vulnerability", "source": "cisa_kev", "timestamp": "2023-03-30", "split": "val"} +{"id": "daa5032fe2aa84cea38b", "text": "CVE: CVE-2022-31091\n\n[{'lang': 'en', 'value': 'Guzzle, an extensible PHP HTTP client. `Authorization` and `Cookie` headers on requests are sensitive information. In affected versions on making a request which responds with a redirect to a URI with a different port, if we choose to follow it, we should remove the `Authorization` and `Cookie` headers from the request, before containing. Previously, we would only consider a change in host or scheme. Affected Guzzle 7 users should upgrade to Guzzle", "cve_id": "CVE-2022-31091", "title": "CVE-2022-31091", "source": "cvefixes", "timestamp": "2022-06-27", "split": "val"} +{"id": "34abd4d980fa47a5d6bc", "text": "[Use After Free] CVE-2022-43552: HTTP Proxy deny use-after-free\n\nIssue(s) reported by Trail of Bits. This is either one or two issues.\n\n## Summary:\n\n`./src/curl 0 -x0:80 telnet:/[j-u][j-u]//0 -m 01`\n`./src/curl 0 -x0:80 smb:/[j-u][j-u]//0 -m 01`\n\nBoth command line ends up having libcurl access and use already freed heap-memory. For read and write.\n\n## Steps To Reproduce:\n\nSee above, run with valgrind for full report.\n\nI have a local HTTP server on localhost host port 80 that will send back a 502", "cve_id": "CVE-2022-43552", "title": "CVE-2022-43552: HTTP Proxy deny use-after-free (Use After Free)", "source": "hackerone", "timestamp": "2022-12-26", "split": "val"} +{"id": "CVE-2023-32435", "text": "Apple Multiple Products WebKit Memory Corruption Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, and Safari WebKit contain a memory corruption vulnerability that leads to code execution when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CW", "cve_id": "CVE-2023-32435", "title": "Apple Multiple Products WebKit Memory Corruption Vulnerability", "source": "cisa_kev", "timestamp": "2023-06-23", "split": "val"} +{"id": "a3fd00cd89e640360dd1", "text": "CVE: CVE-2022-1544\n\n[{'lang': 'en', 'value': 'Formula Injection/CSV Injection due to Improper Neutralization of Formula Elements in CSV File in GitHub repository luyadev/yii-helpers prior to 1.2.1. Successful exploitation can lead to impacts such as client-sided command injection, code execution, or remote ex-filtration of contained confidential data.'}]\n\nFix commit: Merge pull request #7 from luyadev/csv-sanitizer\n\nCsv sanitizer", "cve_id": "CVE-2022-1544", "title": "CVE-2022-1544", "source": "cvefixes", "timestamp": "2022-05-01", "split": "val"} +{"id": "3b6de3dc9dafd5bb5d8c", "text": "CVE: CVE-2022-24739\n\n[{'lang': 'en', 'value': 'alltube is an html front end for youtube-dl. On releases prior to 3.0.3, an attacker could craft a special HTML page to trigger either an open redirect attack or a Server-Side Request Forgery attack (depending on how AllTube is configured). The impact is mitigated by the fact the SSRF attack is only possible when the `stream` option is enabled in the configuration. (This option is disabled by default.) 3.0.3 contains a fix for this vulnerability.'}]", "cve_id": "CVE-2022-24739", "title": "CVE-2022-24739", "source": "cvefixes", "timestamp": "2022-03-08", "split": "val"} +{"id": "60f6e560d5aa51990348", "text": "CVE: CVE-2022-24786\n\n[{'lang': 'en', 'value': 'PJSIP is a free and open source multimedia communication library written in C. PJSIP versions 2.12 and prior do not parse incoming RTCP feedback RPSI (Reference Picture Selection Indication) packet, but any app that directly uses pjmedia_rtcp_fb_parse_rpsi() will be affected. A patch is available in the `master` branch of the `pjsip/pjproject` GitHub repository. There are currently no known workarounds.'}]\n\nFix commit: Merge pull request from GHSA-v", "cve_id": "CVE-2022-24786", "title": "CVE-2022-24786", "source": "cvefixes", "timestamp": "2022-04-06", "split": "val"} +{"id": "6ec2cee887eb79b018f9", "text": "[Insufficiently Protected Credentials] CVE-2022-27776: Auth/cookie leak on redirect\n\n## Summary:\ncurl/libcurl can be coaxed to leak Authorization / Cookie headers by redirecting request to http:// URL on the same host. Successful exploitation requires that the attacker can either Man-in-the-Middle the connection or can access the traffic at the recipient side (for example by redirecting to a non-privileged port such as 9999 on the same host).\n\n## Steps To Reproduce:\n\n1. Configure for example Apa", "cve_id": "CVE-2022-27774", "title": "CVE-2022-27776: Auth/cookie leak on redirect (Insufficiently Protected Credentials)", "source": "hackerone", "timestamp": "2022-04-29", "split": "val"} +{"id": "50709744c91d70d1b513", "text": "CVE: CVE-2022-23558\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite model that would cause an integer overflow in `TfLiteIntArrayCreate`. The `TfLiteIntArrayGetSizeInBytes` returns an `int` instead of a `size_t. An attacker can control model inputs such that `computed_size` overflows the size of `int` datatype. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3,", "cve_id": "CVE-2022-23558", "title": "CVE-2022-23558", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val"} +{"id": "CVE-2022-26925", "text": "Microsoft Windows LSA Spoofing Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Local Security Authority (LSA) contains a spoofing vulnerability where an attacker can coerce the domain controller to authenticate to the attacker using NTLM.\n\nRequired Action: Apply remediation actions outlined in CISA guidance [https://www.cisa.gov/guidance-applying-june-microsoft-patch].\n\nCWE(s): CWE-306\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-26925", "title": "Microsoft Windows LSA Spoofing Vulnerability", "source": "cisa_kev", "timestamp": "2022-07-01", "split": "val"} +{"id": "CVE-2023-41064", "text": "Apple iOS, iPadOS, and macOS ImageIO Buffer Overflow Vulnerability\n\nAffected: Apple iOS, iPadOS, and macOS\n\nApple iOS, iPadOS, and macOS contain a buffer overflow vulnerability in ImageIO when processing a maliciously crafted image, which may lead to code execution. This vulnerability was chained with CVE-2023-41061.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-120\n\n[Source: CISA Known Exploited Vulnera", "cve_id": "CVE-2023-41064", "title": "Apple iOS, iPadOS, and macOS ImageIO Buffer Overflow Vulnerability", "source": "cisa_kev", "timestamp": "2023-09-11", "split": "val"} +{"id": "024ee216ec85fff74232", "text": "[Deserialization of Untrusted Data] [CVE-2023-27531] Possible Deserialization of Untrusted Data vulnerability in Kredis JSON\n\nI made a report and patch at https://hackerone.com/reports/1702859 .\n\nhttps://discuss.rubyonrails.org/t/cve-2023-27531-possible-deserialization-of-untrusted-data-vulnerability-in-kredis-json/82467\n\n> There is a deserialization of untrusted data vulnerability in the Kredis JSON deserialization code. This vulnerability has been assigned the CVE identifier CVE-2023-27531.\n\n#", "cve_id": "CVE-2023-27531", "title": "[CVE-2023-27531] Possible Deserialization of Untrusted Data vulnerability in Kredis JSON (Deserialization of Untrusted Data)", "source": "hackerone", "timestamp": "2023-08-15", "split": "val"} +{"id": "CVE-2023-29298", "text": "Adobe ColdFusion Improper Access Control Vulnerability\n\nAffected: Adobe ColdFusion\n\nAdobe ColdFusion contains an improper access control vulnerability that allows for a security feature bypass.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-284\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-29298", "title": "Adobe ColdFusion Improper Access Control Vulnerability", "source": "cisa_kev", "timestamp": "2023-07-20", "split": "val"} +{"id": "08df4e937d612b59e12b", "text": "CVE: CVE-2022-0263\n\n[{'lang': 'en', 'value': 'Unrestricted Upload of File with Dangerous Type in Packagist pimcore/pimcore prior to 10.2.7.'}]\n\nFix commit: [Settings] Validate SVG uploads for branding", "cve_id": "CVE-2022-0263", "title": "CVE-2022-0263", "source": "cvefixes", "timestamp": "2022-01-18", "split": "val"} +{"id": "CVE-2022-2586", "text": "Linux Kernel Use-After-Free Vulnerability\n\nAffected: Linux Kernel\n\nLinux Kernel contains a use-after-free vulnerability in the nft_object, allowing local attackers to escalate privileges. \n\nRequired Action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-2586", "title": "Linux Kernel Use-After-Free Vulnerability", "source": "cisa_kev", "timestamp": "2024-06-26", "split": "val"} +{"id": "CVE-2023-48788", "text": "Fortinet FortiClient EMS SQL Injection Vulnerability\n\nAffected: Fortinet FortiClient EMS\n\nFortinet FortiClient EMS contains a SQL injection vulnerability that allows an unauthenticated attacker to execute commands as SYSTEM via specifically crafted requests.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-89\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-48788", "title": "Fortinet FortiClient EMS SQL Injection Vulnerability", "source": "cisa_kev", "timestamp": "2024-03-25", "split": "val"} +{"id": "6256152a180e512620e5", "text": "[Business Logic Errors] CVE-2022-27775: Bad local IPv6 connection reuse\n\n## Summary:\nCurl doesn't consider IPv6 address zone index when doing connection reuse. if connection exists to specific IPv6 address (and other conditions for connection reuse are fulfilled) it will be reused for connections regardless of the zone index.\n\n## Steps To Reproduce:\n\n 1.Set up a fake server: `echo -ne 'HTTP/1.1 200 OK\\r\\nContent-Length: 6\\r\\n\\r\\nHello\\n' | nc -6 -v -l -p 9999`\n 2. curl \"http://[ipv6addr]:9999", "cve_id": "CVE-2022-27775", "title": "CVE-2022-27775: Bad local IPv6 connection reuse (Business Logic Errors)", "source": "hackerone", "timestamp": "2022-04-27", "split": "val"} +{"id": "CVE-2023-21839", "text": "Oracle WebLogic Server Unspecified Vulnerability\n\nAffected: Oracle WebLogic Server\n\nOracle WebLogic Server contains an unspecified vulnerability that allows an unauthenticated attacker with network access via T3, IIOP, to compromise Oracle WebLogic Server.\n\nRequired Action: Apply updates per vendor instructions.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-21839", "title": "Oracle WebLogic Server Unspecified Vulnerability", "source": "cisa_kev", "timestamp": "2023-05-01", "split": "val"} +{"id": "45426d32f25c3079d950", "text": "CVE: CVE-2022-29368\n\n[{'lang': 'en', 'value': 'Moddable commit before 135aa9a4a6a9b49b60aa730ebc3bcc6247d75c45 was discovered to contain an out-of-bounds read via the function fxUint8Getter at /moddable/xs/sources/xsDataView.c.'}]\n\nFix commit: XS: #896", "cve_id": "CVE-2022-29368", "title": "CVE-2022-29368", "source": "cvefixes", "timestamp": "2022-05-12", "split": "val"} +{"id": "60b33ca5a52f46b28c11", "text": "CVE: CVE-2022-0245\n\n[{'lang': 'en', 'value': 'Cross-Site Request Forgery (CSRF) in GitHub repository livehelperchat/livehelperchat prior to 2.0.'}]\n\nFix commit: CSRF tokens", "cve_id": "CVE-2022-0245", "title": "CVE-2022-0245", "source": "cvefixes", "timestamp": "2022-01-18", "split": "val"} +{"id": "CVE-2022-26923", "text": "Microsoft Active Directory Domain Services Privilege Escalation Vulnerability\n\nAffected: Microsoft Active Directory\n\nAn authenticated user could manipulate attributes on computer accounts they own or manage, and acquire a certificate from Active Directory Certificate Services that would allow for privilege escalation to SYSTEM.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-295\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-26923", "title": "Microsoft Active Directory Domain Services Privilege Escalation Vulnerability", "source": "cisa_kev", "timestamp": "2022-08-18", "split": "val"} +{"id": "c1accea15ae4ca1c4ba9", "text": "CVE: CVE-2022-24977\n\n[{'lang': 'en', 'value': 'ImpressCMS before 1.4.2 allows unauthenticated remote code execution via ...../// directory traversal in origName or imageName, leading to unsafe interaction with the CKEditor processImage.php script. The payload may be placed in PHP_SESSION_UPLOAD_PROGRESS when the PHP installation supports upload_progress.'}]\n\nFix commit: Prevents using submitted filenames with ../ for controller (#812)\n\n* Prevents using submitted filenames with ../ for controller", "cve_id": "CVE-2022-24977", "title": "CVE-2022-24977", "source": "cvefixes", "timestamp": "2022-02-14", "split": "val"} +{"id": "CVE-2023-41992", "text": "Apple Multiple Products Kernel Privilege Escalation Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, and watchOS contain an unspecified vulnerability that allows for local privilege escalation.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-754\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-41992", "title": "Apple Multiple Products Kernel Privilege Escalation Vulnerability", "source": "cisa_kev", "timestamp": "2023-09-25", "split": "val"} +{"id": "c2a431032c22e28bd244", "text": "CVE: CVE-2022-25319\n\n[{'lang': 'en', 'value': 'An issue was discovered in Cerebrate through 1.4. Endpoints could be open even when not enabled.'}]\n\nFix commit: fix: [security] open endpoints should only be open when enabled\n\n- as reported by Dawid Czarnecki from Zigrin Security", "cve_id": "CVE-2022-25319", "title": "CVE-2022-25319", "source": "cvefixes", "timestamp": "2022-02-18", "split": "val"} +{"id": "21d371eb54e7d45aecd9", "text": "CVE: CVE-2022-23078\n\n[{'lang': 'en', 'value': 'In habitica versions v4.119.0 through v4.232.2 are vulnerable to open redirect via the login page.'}]\n\nFix commit: fix(login): catch double-slash exploit", "cve_id": "CVE-2022-23078", "title": "CVE-2022-23078", "source": "cvefixes", "timestamp": "2022-06-22", "split": "val"} +{"id": "CVE-2023-32434", "text": "Apple Multiple Products Integer Overflow Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS. iPadOS, macOS, and watchOS contain an integer overflow vulnerability that could allow an application to execute code with kernel privileges.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-190\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-32434", "title": "Apple Multiple Products Integer Overflow Vulnerability", "source": "cisa_kev", "timestamp": "2023-06-23", "split": "val"} +{"id": "afa7d3f17ffa9736cce0", "text": "CVE: CVE-2022-31112\n\n[{'lang': 'en', 'value': 'Parse Server is an open source backend that can be deployed to any infrastructure that can run Node.js. In affected versions parse Server LiveQuery does not remove protected fields in classes, passing them to the client. The LiveQueryController now removes protected fields from the client response. Users are advised to upgrade. Users unable t upgrade should use `Parse.Cloud.afterLiveQueryEvent` to manually remove protected fields.'}]\n\nFix commit: fi", "cve_id": "CVE-2022-31112", "title": "CVE-2022-31112", "source": "cvefixes", "timestamp": "2022-06-30", "split": "val"} +{"id": "bd79fb88d84b3f6ff9e4", "text": "[Allocation of Resources Without Limits or Throttling] CVE-2023-23916: HTTP multi-header compression denial of service\n\n## Summary:\nA server can send an HTTP response with many occurrences of Transfer-Encoding and/or Content-Encoding headers. Each listed encoding allocates a buffer. The number of encodings listed within each header is already bounded but the number of headers is not, allowing an HTTP response to consume all available memory.\n\n## Steps To Reproduce:\nUsing the curl test environmen", "cve_id": "CVE-2023-23916", "title": "CVE-2023-23916: HTTP multi-header compression denial of service (Allocation of Resources Without Limits or Throttling)", "source": "hackerone", "timestamp": "2023-02-20", "split": "val"} +{"id": "637c886486c6f55685fb", "text": "CVE: CVE-2022-24865\n\n[{'lang': 'en', 'value': \"HumHub is an Open Source Enterprise Social Network. In affected versions users who are forced to change their password by an administrator may retrieve other users' data. This issue has been resolved by commit `eb83de20`. It is recommended that the HumHub is upgraded to 1.11.0, 1.10.4 or 1.9.4. There are no known workarounds for this issue.\"}]\n\nFix commit: Fix must change password (#5638)\n\n* Fix must change password\r\n\r\n* Update CHANGELOG.md (#5638)", "cve_id": "CVE-2022-24865", "title": "CVE-2022-24865", "source": "cvefixes", "timestamp": "2022-04-20", "split": "val"} +{"id": "7da217c0aa78b92891af", "text": "CVE: CVE-2022-24762\n\n[{'lang': 'en', 'value': 'sysend.js is a library that allows a user to send messages between pages that are open in the same browser. Users that use cross-origin communication may have their communications intercepted. Impact is limited by the communication occurring in the same browser. This issue has been patched in sysend.js version 1.10.0. The only currently known workaround is to avoid sending communications that a user does not want to have intercepted via sysend messa", "cve_id": "CVE-2022-24762", "title": "CVE-2022-24762", "source": "cvefixes", "timestamp": "2022-03-14", "split": "val"} +{"id": "f7c8eefd2d1d0a976a0a", "text": "[Path Traversal] Path traversal through path stored in Uint8Array in Node.js 20\n\nVarious `node:fs` functions allow specifying paths as either strings or `Uint8Array` objects. In Node.js environments, the `Buffer` class extends the `Uint8Array` class. Node.js prevents path traversal through strings (see CVE-2023-30584) and `Buffer` objects (see CVE-2023-32004), but not through non-`Buffer` `Uint8Array` objects.\n\nThis is distinct from CVE-2023-32004 ([report 2038134](https://hackerone.com/reports/", "cve_id": "CVE-2023-30584", "title": "Path traversal through path stored in Uint8Array in Node.js 20 (Path Traversal)", "source": "hackerone", "timestamp": "2024-01-20", "split": "val"} +{"id": "d90c8333d75c6692e7b3", "text": "CVE: CVE-2022-0579\n\n[{'lang': 'en', 'value': 'Improper Privilege Management in Packagist snipe/snipe-it prior to 5.3.9.'}]\n\nFix commit: Merge pull request #10665 from snipe/fixes/adds_gate_to_supplier_view\n\nAdds gate to supplier", "cve_id": "CVE-2022-0579", "title": "CVE-2022-0579", "source": "cvefixes", "timestamp": "2022-02-14", "split": "val"} +{"id": "0836569fe5deb770b1e4", "text": "CVE: CVE-2022-1774\n\n[{'lang': 'en', 'value': 'Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository jgraph/drawio prior to 18.0.7.'}]\n\nFix commit: 18.0.7 release", "cve_id": "CVE-2022-1774", "title": "CVE-2022-1774", "source": "cvefixes", "timestamp": "2022-05-18", "split": "val"} +{"id": "9f23f995c0ad08d30db2", "text": "CVE: CVE-2022-24746\n\n[{'lang': 'en', 'value': 'Shopware is an open commerce platform based on the Symfony php Framework and the Vue javascript framework. In affected versions it is possible to inject code via the voucher code form. This issue has been patched in version 6.4.8.1. There are no known workarounds for this issue.'}]\n\nFix commit: NEXT-19276 - Add filtering to promotion and product codes", "cve_id": "CVE-2022-24746", "title": "CVE-2022-24746", "source": "cvefixes", "timestamp": "2022-03-09", "split": "val"} +{"id": "64f74cf0dd894508efaf", "text": "CVE: CVE-2022-0768\n\n[{'lang': 'en', 'value': 'Server-Side Request Forgery (SSRF) in GitHub repository rudloff/alltube prior to 3.0.2.'}]\n\nFix commit: Merge branch 'hotfix/3.0.2'", "cve_id": "CVE-2022-0768", "title": "CVE-2022-0768", "source": "cvefixes", "timestamp": "2022-02-28", "split": "val"} +{"id": "23b29b31b470a2a1fe9f", "text": "CVE: CVE-2022-24899\n\n[{'lang': 'en', 'value': 'Contao is a powerful open source CMS that allows you to create professional websites and scalable web applications. In versions of Contao prior to 4.13.3 it is possible to inject code into the canonical tag. As a workaround users may disable canonical tags in the root page settings.'}]\n\nFix commit: Merge pull request from GHSA-m8x6-6r63-qvj2", "cve_id": "CVE-2022-24899", "title": "CVE-2022-24899", "source": "cvefixes", "timestamp": "2022-05-06", "split": "val"} +{"id": "7f0c9ce109e6d17a56c8", "text": "[Uncontrolled Resource Consumption] [CVE-2023-22799] Possible ReDoS based DoS vulnerability in GlobalID\n\nI made a report and patch at https://hackerone.com/reports/1696752.\n\nhttps://discuss.rubyonrails.org/t/cve-2023-22799-possible-redos-based-dos-vulnerability-in-globalid/82127\n> There is a possible DoS vulnerability in the model name parsing section of the GlobalID gem. Carefully crafted input can cause the regular expression engine to take an unexpected amount of time. All users running an af", "cve_id": "CVE-2023-22799", "title": "[CVE-2023-22799] Possible ReDoS based DoS vulnerability in GlobalID (Uncontrolled Resource Consumption)", "source": "hackerone", "timestamp": "2023-07-27", "split": "val"} +{"id": "b006b00d3e2e0500e82e", "text": "CVE: CVE-2022-1427\n\n[{'lang': 'en', 'value': 'Out-of-bounds Read in mrb_obj_is_kind_of in in GitHub repository mruby/mruby prior to 3.2. # Impact: Possible arbitrary code execution if being exploited.'}]\n\nFix commit: vm.c: check if target_class is NULL (when prepended).", "cve_id": "CVE-2022-1427", "title": "CVE-2022-1427", "source": "cvefixes", "timestamp": "2022-04-23", "split": "val"} +{"id": "ac11775c779e0834abb9", "text": "CVE: CVE-2022-0893\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.4.0.'}]\n\nFix commit: [Admin] Security - Add handler to enable Content Security Policy (#11447)\n\n* [Admin] Security - Add handler to enable Content Security Policy\r\n\r\n* [Admin] Security - Add handler to enable Content Security Policy\r\n\r\n* [Admin] Security - Add handler to enable Content Security Policy - fix document preview\r\n\r\n* [Admin] Security - Add handler to enab", "cve_id": "CVE-2022-0893", "title": "CVE-2022-0893", "source": "cvefixes", "timestamp": "2022-03-15", "split": "val"} +{"id": "03ae89bdf0075d8bea62", "text": "CVE: CVE-2022-1898\n\n[{'lang': 'en', 'value': 'Use After Free in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.5024: using freed memory with \"]d\"\n\nProblem: Using freed memory with \"]d\".\nSolution: Copy the pattern before searching.", "cve_id": "CVE-2022-1898", "title": "CVE-2022-1898", "source": "cvefixes", "timestamp": "2022-05-27", "split": "val"} +{"id": "CVE-2022-22265", "text": "Samsung Mobile Devices Use-After-Free Vulnerability\n\nAffected: Samsung Mobile Devices\n\nSamsung devices with selected Exynos chipsets contain a use-after-free vulnerability that allows malicious memory write and code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-703\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-22265", "title": "Samsung Mobile Devices Use-After-Free Vulnerability", "source": "cisa_kev", "timestamp": "2023-09-18", "split": "val"} +{"id": "fdf9f224210172a24bb1", "text": "CVE: CVE-2022-23059\n\n[{'lang': 'en', 'value': 'A Stored Cross Site Scripting (XSS) vulnerability exists in Shopizer versions 2.0 through 2.17.0 via the “Manage Images” tab, which allows an attacker to upload a SVG file containing malicious JavaScript code.'}]\n\nFix commit: working version 3.0.alpha", "cve_id": "CVE-2022-23059", "title": "CVE-2022-23059", "source": "cvefixes", "timestamp": "2022-03-29", "split": "val"} +{"id": "a210612af25a3e1e0099", "text": "CVE: CVE-2022-1243\n\n[{'lang': 'en', 'value': 'CRHTLF can lead to invalid protocol extraction potentially leading to XSS in GitHub repository medialize/uri.js prior to 1.19.11.'}]\n\nFix commit: fix(parse): handle CR,LF,TAB\n\nreported by @haxatron via huntr.dev", "cve_id": "CVE-2022-1243", "title": "CVE-2022-1243", "source": "cvefixes", "timestamp": "2022-04-05", "split": "val"} +{"id": "efa8017ca147333e2fbd", "text": "CVE: CVE-2022-31306\n\n[{'lang': 'en', 'value': 'Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_array_convert_to_slow_array at src/njs_array.c.'}]\n\nFix commit: Fixed Object.defineProperty() when a recursive descriptor is provided.\n\nThis closes #481 issue on Github.", "cve_id": "CVE-2022-31306", "title": "CVE-2022-31306", "source": "cvefixes", "timestamp": "2022-06-21", "split": "val"} +{"id": "ba42687fae57afd2ad72", "text": "CVE: CVE-2022-21685\n\n[{'lang': 'en', 'value': \"Frontier is Substrate's Ethereum compatibility layer. Prior to commit number `8a93fdc6c9f4eb1d2f2a11b7ff1d12d70bf5a664`, a bug in Frontier's MODEXP precompile implementation can cause an integer underflow in certain conditions. This will cause a node crash for debug builds. For release builds (and production WebAssembly binaries), the impact is limited as it can only cause a normal EVM out-of-gas. Users who do not use MODEXP precompile in their runt", "cve_id": "CVE-2022-21685", "title": "CVE-2022-21685", "source": "cvefixes", "timestamp": "2022-01-14", "split": "val"} +{"id": "f1b68d6bf349c21859cf", "text": "CVE: CVE-2022-21680\n\n[{'lang': 'en', 'value': 'Marked is a markdown parser and compiler. Prior to version 4.0.10, the regular expression `block.def` may cause catastrophic backtracking against some strings and lead to a regular expression denial of service (ReDoS). Anyone who runs untrusted markdown through a vulnerable version of marked and does not use a worker with a time limit may be affected. This issue is patched in version 4.0.10. As a workaround, avoid running untrusted markdown through", "cve_id": "CVE-2022-21680", "title": "CVE-2022-21680", "source": "cvefixes", "timestamp": "2022-01-14", "split": "val"} +{"id": "d7c7c2e5b1bd535257e1", "text": "[Uncontrolled Resource Consumption] CVE-2024-27351: Potential regular expression denial-of-service in django.utils.text.Truncator.words()\n\n# TL;DR\n\n**CVE-2024-27351**: Potential regular expression denial-of-service in `django.utils.text.Truncator.words()`\n\n# Details:\n\n`django.utils.text.Truncator.words()` method (with `html=True`) and `truncatewords_html` template filter were subject to a potential regular expression denial-of-service attack using a suitably crafted string (follow up to CVE-2019", "cve_id": "CVE-2023-43665", "title": "CVE-2024-27351: Potential regular expression denial-of-service in django.utils.text.Truncator.words() (Uncontrolled Resource Consumption)", "source": "hackerone", "timestamp": "2024-04-28", "split": "val"} +{"id": "819de41c82c3fd721516", "text": "CVE: CVE-2022-1897\n\n[{'lang': 'en', 'value': 'Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.5023: substitute overwrites allocated buffer\n\nProblem: Substitute overwrites allocated buffer.\nSolution: Disallow undo when in a substitute command.", "cve_id": "CVE-2022-1897", "title": "CVE-2022-1897", "source": "cvefixes", "timestamp": "2022-05-27", "split": "val"} +{"id": "ea2030b1dcaf6be48726", "text": "CVE: CVE-2022-24871\n\n[{'lang': 'en', 'value': 'Shopware is an open commerce platform based on Symfony Framework and Vue. In affected versions an attacker can abuse the Admin SDK functionality on the server to read or update internal resources. Users are advised to update to the current version 6.4.10.1. For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. There are no known workarounds for this issue.'}]\n\nFix commit: NEXT-21034 - Dont restore", "cve_id": "CVE-2022-24871", "title": "CVE-2022-24871", "source": "cvefixes", "timestamp": "2022-04-20", "split": "val"} +{"id": "CVE-2023-22527", "text": "Atlassian Confluence Data Center and Server Template Injection Vulnerability\n\nAffected: Atlassian Confluence Data Center and Server\n\nAtlassian Confluence Data Center and Server contain an unauthenticated OGNL template injection vulnerability that can lead to remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-74\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-22527", "title": "Atlassian Confluence Data Center and Server Template Injection Vulnerability", "source": "cisa_kev", "timestamp": "2024-01-24", "split": "val"} +{"id": "682923f595ccdd79f1b1", "text": "CVE: CVE-2022-27158\n\n[{'lang': 'en', 'value': 'pearweb < 1.32 suffers from Deserialization of Untrusted Data.'}]\n\nFix commit: Be cautious about what can be unserialized", "cve_id": "CVE-2022-27158", "title": "CVE-2022-27158", "source": "cvefixes", "timestamp": "2022-04-15", "split": "val"} +{"id": "23d11a587a6c6fc75793", "text": "[Expected Behavior Violation] CVE-2022-32221: POST following PUT confusion\n\n## Summary:\nThe bug I submitted at https://github.com/curl/curl/issues/9507 can have at least a few unintended security issues:\n- Information Disclosure: this bug causes an HTTP PUT to occur when the user intends for an HTTP POST to occur. The user, who intended an HTTP POST, expects the POSTed information to come from CURLOPT_POSTFIELDS. However, as an HTTP PUT is performed instead, the data that is PUT comes from a buf", "cve_id": "CVE-2022-32221", "title": "CVE-2022-32221: POST following PUT confusion (Expected Behavior Violation)", "source": "hackerone", "timestamp": "2022-11-26", "split": "val"} +{"id": "d9799ad84b997c975658", "text": "CVE: CVE-2022-36007\n\n[{'lang': 'en', 'value': 'Venice is a Clojure inspired sandboxed Lisp dialect with excellent Java interoperability. A partial path traversal issue exists within the functions `load-file` and `load-resource`. These functions can be limited to load files from a list of load paths. Assuming Venice has been configured with the load paths: `[ \"/Users/foo/resources\" ]` When passing **relative** paths to these two vulnerable functions everything is fine: `(load-resource \"test.png\")", "cve_id": "CVE-2022-36007", "title": "CVE-2022-36007", "source": "cvefixes", "timestamp": "2022-08-15", "split": "val"} +{"id": "a774ed10978bfeea9673", "text": "CVE: CVE-2022-31092\n\n[{'lang': 'en', 'value': \"Pimcore is an Open Source Data & Experience Management Platform. Pimcore offers developers listing classes to make querying data easier. This listing classes also allow to order or group the results based on one or more columns which should be quoted by default. The actual issue is that quoting is not done properly in both cases, so there's the theoretical possibility to inject custom SQL if the developer is using this methods with input data and no", "cve_id": "CVE-2022-31092", "title": "CVE-2022-31092", "source": "cvefixes", "timestamp": "2022-06-27", "split": "val"} +{"id": "07d7210efd01c67d3555", "text": "CVE: CVE-2022-1808\n\n[{'lang': 'en', 'value': 'Execution with Unnecessary Privileges in GitHub repository polonel/trudesk prior to 1.2.3.'}]\n\nFix commit: fix(core): verify user exists", "cve_id": "CVE-2022-1808", "title": "CVE-2022-1808", "source": "cvefixes", "timestamp": "2022-05-31", "split": "val"} +{"id": "3dc99079c85d9536dadb", "text": "CVE: CVE-2022-29528\n\n[{'lang': 'en', 'value': 'An issue was discovered in MISP before 2.4.158. PHAR deserialization can occur.'}]\n\nFix commit: fix: [security] Sanitise paths for several file interactions\n\n- remove :// anywhere we don't expect a protocol to be supplied\n- remove phar:// in certauth plugin's fetcher\n\n- as reported by Dawid Czarnecki of Zigrin Security", "cve_id": "CVE-2022-29528", "title": "CVE-2022-29528", "source": "cvefixes", "timestamp": "2022-04-20", "split": "val"} +{"id": "581437bada02bb445c69", "text": "CVE: CVE-2022-0831\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.3.3.'}]\n\nFix commit: escaping 'key' custom property field in elements", "cve_id": "CVE-2022-0831", "title": "CVE-2022-0831", "source": "cvefixes", "timestamp": "2022-03-04", "split": "val"} +{"id": "CVE-2023-28204", "text": "Apple Multiple Products WebKit Out-of-Bounds Read Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, tvOS, watchOS, and Safari WebKit contain an out-of-bounds read vulnerability that may disclose sensitive information when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.\n\nRequired Action: Apply updates per ven", "cve_id": "CVE-2023-28204", "title": "Apple Multiple Products WebKit Out-of-Bounds Read Vulnerability", "source": "cisa_kev", "timestamp": "2023-05-22", "split": "val"} +{"id": "f6eb684167873042f97d", "text": "CVE: CVE-2022-23603\n\n[{'lang': 'en', 'value': 'iTunesRPC-Remastered is a discord rich presence application for use with iTunes & Apple Music. In code before commit 24f43aa user input is not properly sanitized and code injection is possible. Users are advised to upgrade as soon as is possible. There are no known workarounds for this issue.'}]\n\nFix commit: Merge pull request from GHSA-3xpp-rhqx-cw96\n\nsec fix", "cve_id": "CVE-2022-23603", "title": "CVE-2022-23603", "source": "cvefixes", "timestamp": "2022-02-01", "split": "val"} +{"id": "34682a4c9281637984aa", "text": "CVE: CVE-2022-21710\n\n[{'lang': 'en', 'value': 'ShortDescription is a MediaWiki extension that provides local short description support. A cross-site scripting (XSS) vulnerability exists in versions prior to 2.3.4. On a wiki that has the ShortDescription enabled, XSS can be triggered on any page or the page with the action=info parameter, which displays the shortdesc property. This is achieved using the wikitext `{{SHORTDESC:<img src=x onerror=alert()>}}`. This issue has a patch in version", "cve_id": "CVE-2022-21710", "title": "CVE-2022-21710", "source": "cvefixes", "timestamp": "2022-01-24", "split": "val"} +{"id": "2dc66368db6085fbfc85", "text": "CVE: CVE-2022-1160\n\n[{'lang': 'en', 'value': 'heap buffer overflow in get_one_sourceline in GitHub repository vim/vim prior to 8.2.4647.'}]\n\nFix commit: patch 8.2.4647: \"source\" can read past end of copied line\n\nProblem: \"source\" can read past end of copied line.\nSolution: Add a terminating NUL.", "cve_id": "CVE-2022-1160", "title": "CVE-2022-1160", "source": "cvefixes", "timestamp": "2022-03-30", "split": "val"} +{"id": "26c37c7fd94e12078df4", "text": "CVE: CVE-2022-21710\n\n[{'lang': 'en', 'value': 'ShortDescription is a MediaWiki extension that provides local short description support. A cross-site scripting (XSS) vulnerability exists in versions prior to 2.3.4. On a wiki that has the ShortDescription enabled, XSS can be triggered on any page or the page with the action=info parameter, which displays the shortdesc property. This is achieved using the wikitext `{{SHORTDESC:<img src=x onerror=alert()>}}`. This issue has a patch in version", "cve_id": "CVE-2022-21710", "title": "CVE-2022-21710", "source": "cvefixes", "timestamp": "2022-01-24", "split": "val"} +{"id": "CVE-2023-1671", "text": "Sophos Web Appliance Command Injection Vulnerability\n\nAffected: Sophos Web Appliance\n\nSophos Web Appliance contains a command injection vulnerability in the warn-proceed handler that allows for remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-77\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-1671", "title": "Sophos Web Appliance Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2023-11-16", "split": "val"} +{"id": "6fc6f723fa28eba62cab", "text": "CVE: CVE-2022-0266\n\n[{'lang': 'en', 'value': 'Authorization Bypass Through User-Controlled Key in Packagist remdex/livehelperchat prior to 3.92v.'}]\n\nFix commit: Display logic should match backand logic", "cve_id": "CVE-2022-0266", "title": "CVE-2022-0266", "source": "cvefixes", "timestamp": "2022-01-19", "split": "val"} +{"id": "6a7a17e67046bda6f24e", "text": "CVE: CVE-2022-0524\n\n[{'lang': 'en', 'value': 'Business Logic Errors in GitHub repository publify/publify prior to 9.2.7.'}]\n\nFix commit: Fix setting the article password from the Admin\n\nThe password field was present in the form, but not accepted by the\ncontroller. This change adds password to the list of accepted fields.", "cve_id": "CVE-2022-0524", "title": "CVE-2022-0524", "source": "cvefixes", "timestamp": "2022-02-08", "split": "val"} +{"id": "514c85e1e2d5b156ab11", "text": "CVE: CVE-2022-0631\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in Homebrew mruby prior to 3.2.'}]\n\nFix commit: vm.c: packed arguments length may be zero for `send` method.", "cve_id": "CVE-2022-0631", "title": "CVE-2022-0631", "source": "cvefixes", "timestamp": "2022-02-18", "split": "val"} +{"id": "d18393d9663fa391b0f1", "text": "CVE: CVE-2022-0990\n\n[{'lang': 'en', 'value': 'Server-Side Request Forgery (SSRF) in GitHub repository janeczku/calibre-web prior to 0.6.18.'}]\n\nFix commit: Better epub cover parsing with multiple cover-image items\nCode cosmetics\nrenamed variables\nrefactored xml page generation\nrefactored prepare author", "cve_id": "CVE-2022-0990", "title": "CVE-2022-0990", "source": "cvefixes", "timestamp": "2022-04-04", "split": "val"} +{"id": "47307c0c18eee629a197", "text": "CVE: CVE-2022-23584\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a use after free behavior when decoding PNG images. After `png::CommonFreeDecode(&decode)` gets called, the values of `decode.width` and `decode.height` are in an unspecified state. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supp", "cve_id": "CVE-2022-23584", "title": "CVE-2022-23584", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val"} +{"id": "5b4fff542cf71ea9d46f", "text": "CVE: CVE-2022-2553\n\n[{'lang': 'en', 'value': 'The authfile directive in the booth config file is ignored, preventing use of authentication in communications from node to node. As a result, nodes that do not have the correct authentication key are not prevented from communicating with other nodes in the cluster.'}]\n\nFix commit: Revert \"Refactor: main: substitute is_auth_req macro\"\n\nThis reverts commit da79b8ba28ad4837a0fee13e5f8fb6f89fe0e24c.\n\nauthfile != authkey\n\nSigned-off-by: Jan Friesse ", "cve_id": "CVE-2022-0315", "title": "CVE-2022-0315", "source": "cvefixes", "timestamp": "2022-03-24", "split": "val"} +{"id": "CVE-2023-21237", "text": "Android Pixel Information Disclosure Vulnerability \n\nAffected: Android Pixel\n\nAndroid Pixel contains a vulnerability in the Framework component, where the UI may be misleading or insufficient, providing a means to hide a foreground service notification. This could enable a local attacker to disclose sensitive information.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-200\n\n[Source: CISA Known Exploited Vu", "cve_id": "CVE-2023-21237", "title": "Android Pixel Information Disclosure Vulnerability ", "source": "cisa_kev", "timestamp": "2024-03-05", "split": "val"} +{"id": "7e897a9faecb5585a817", "text": "CVE: CVE-2022-1770\n\n[{'lang': 'en', 'value': 'Improper Privilege Management in GitHub repository polonel/trudesk prior to 1.2.2.'}]\n\nFix commit: refactor(core): apiv2 route enhancements", "cve_id": "CVE-2022-1770", "title": "CVE-2022-1770", "source": "cvefixes", "timestamp": "2022-05-20", "split": "val"} +{"id": "f2660650cc4f8c47fb22", "text": "CVE: CVE-2022-2126\n\n[{'lang': 'en', 'value': 'Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.5123: using invalid index when looking for spell suggestions\n\nProblem: Using invalid index when looking for spell suggestions.\nSolution: Do not decrement the index when it is zero.", "cve_id": "CVE-2022-2126", "title": "CVE-2022-2126", "source": "cvefixes", "timestamp": "2022-06-19", "split": "val"} +{"id": "bdb7559bde78dffcb944", "text": "CVE: CVE-2022-31116\n\n[{'lang': 'en', 'value': \"UltraJSON is a fast JSON encoder and decoder written in pure C with bindings for Python 3.7+. Affected versions were found to improperly decode certain characters. JSON strings that contain escaped surrogate characters not part of a proper surrogate pair were decoded incorrectly. Besides corrupting strings, this allowed for potential key confusion and value overwriting in dictionaries. All users parsing JSON from untrusted sources are vulnerable. Fr", "cve_id": "CVE-2022-31116", "title": "CVE-2022-31116", "source": "cvefixes", "timestamp": "2022-07-05", "split": "val"} +{"id": "98b04f5591ca99ea2f3e", "text": "CVE: CVE-2022-0282\n\n[{'lang': 'en', 'value': 'Code Injection in Packagist microweber/microweber prior to 1.2.11.'}]\n\nFix commit: fix comments xss", "cve_id": "CVE-2022-0282", "title": "CVE-2022-0282", "source": "cvefixes", "timestamp": "2022-01-20", "split": "val"} +{"id": "7fc365d10488ec071df4", "text": "CVE: CVE-2022-31111\n\n[{'lang': 'en', 'value': \"Frontier is Substrate's Ethereum compatibility layer. In affected versions the truncation done when converting between EVM balance type and Substrate balance type was incorrectly implemented. This leads to possible discrepancy between appeared EVM transfer value and actual Substrate value transferred. It is recommended that an emergency upgrade to be planned and EVM execution temporarily paused in the mean time. The issue is patched in Frontier mast", "cve_id": "CVE-2022-31111", "title": "CVE-2022-31111", "source": "cvefixes", "timestamp": "2022-07-06", "split": "val"} +{"id": "c267401cc18ec58e0643", "text": "CVE: CVE-2022-25317\n\n[{'lang': 'en', 'value': 'An issue was discovered in Cerebrate through 1.4. genericForm allows reflected XSS in form descriptions via a user-controlled description.'}]\n\nFix commit: fix: [security] genericForm reflected XSS in form descriptions for user controlled descriptions\n\n- accessible via the MISP local tool setting change\n- sanitise the description\n\n- as reported by Dawid Czarnecki from Zigrin Security", "cve_id": "CVE-2022-25317", "title": "CVE-2022-25317", "source": "cvefixes", "timestamp": "2022-02-18", "split": "val"} +{"id": "d7b48b1086de47e3075b", "text": "CVE: CVE-2022-21667\n\n[{'lang': 'en', 'value': \"soketi is an open-source WebSockets server. There is an unhandled case when reading POST requests which results in the server crashing if it could not read the body of a request. In the event that a POST request is sent to any endpoint of the server with an empty body, even unauthenticated with the Pusher Protocol, it will crash the server. All users that run the server are affected by this vulnerability and it's highly recommended to upgrade to the", "cve_id": "CVE-2022-21667", "title": "CVE-2022-21667", "source": "cvefixes", "timestamp": "2022-01-10", "split": "val"} +{"id": "8389923a6515d0efa85e", "text": "CVE: CVE-2022-1721\n\n[{'lang': 'en', 'value': 'Path Traversal in WellKnownServlet in GitHub repository jgraph/drawio prior to 18.0.5. Read local files of the web application.'}]\n\nFix commit: Limit wellknown servlet to serve single file", "cve_id": "CVE-2022-1721", "title": "CVE-2022-1721", "source": "cvefixes", "timestamp": "2022-05-16", "split": "val"} +{"id": "5e5e859eebc6fb00d506", "text": "CVE: CVE-2022-31048\n\n[{'lang': 'en', 'value': 'TYPO3 is an open source web content management system. Prior to versions 8.7.47 ELTS, 9.5.34 ELTS, 10.4.29, and 11.5.11, the Form Designer backend module of the Form Framework is vulnerable to cross-site scripting. A valid backend user account with access to the form module is needed to exploit this vulnerability. TYPO3 versions 8.7.47 ELTS, 9.5.34 ELTS, 10.4.29, and 11.5.11 contain a fix for the problem.'}]\n\nFix commit: [SECURITY] Ensure text previ", "cve_id": "CVE-2022-31048", "title": "CVE-2022-31048", "source": "cvefixes", "timestamp": "2022-06-14", "split": "val"} +{"id": "17f53a1bb0f1e963ea1a", "text": "CVE: CVE-2022-24959\n\n[{'lang': 'en', 'value': 'An issue was discovered in the Linux kernel before 5.16.5. There is a memory leak in yam_siocdevprivate in drivers/net/hamradio/yam.c.'}]\n\nFix commit: yam: fix a memory leak in yam_siocdevprivate()\n\nym needs to be free when ym->cmd != SIOCYAMSMCS.\n\nFixes: 0781168e23a2 (\"yam: fix a missing-check bug\")\nSigned-off-by: Hangyu Hua \nSigned-off-by: David S. Miller ", "cve_id": "CVE-2022-24959", "title": "CVE-2022-24959", "source": "cvefixes", "timestamp": "2022-02-11", "split": "val"} +{"id": "dbff4bf731e8865bf4ae", "text": "CVE: CVE-2022-32983\n\n[{'lang': 'en', 'value': 'Knot Resolver through 5.5.1 may allow DNS cache poisoning when there is an attempt to limit forwarding actions by filters.'}]\n\nFix commit: policy docs: warn about filters and forwarding\n\nWe've been notified about possibility of \"cache poisoning\" this way,\nso let's document this drawback to make the expectations clearer.", "cve_id": "CVE-2022-32983", "title": "CVE-2022-32983", "source": "cvefixes", "timestamp": "2022-06-20", "split": "val"} +{"id": "7eaa852f97981f9b2ad5", "text": "CVE: CVE-2022-24811\n\n[{'lang': 'en', 'value': 'Combodi iTop is a web based IT Service Management tool. Prior to versions 2.7.6 and 3.0.0, cross-site scripting is possible for scripts outside of script tags when displaying HTML attachments. This issue is fixed in versions 2.7.6 and 3.0.0. There are currently no known workarounds.'}]\n\nFix commit: N°4129 - Security hardening", "cve_id": "CVE-2022-24811", "title": "CVE-2022-24811", "source": "cvefixes", "timestamp": "2022-04-05", "split": "val"} +{"id": "1199ab314d45f3fc860c", "text": "CVE: CVE-2022-31124\n\n[{'lang': 'en', 'value': \"openssh_key_parser is an open source Python package providing utilities to parse and pack OpenSSH private and public key files. In versions prior to 0.0.6 if a field of a key is shorter than it is declared to be, the parser raises an error with a message containing the raw field value. An attacker able to modify the declared length of a key's sensitive field can thus expose the raw value of that field. Users are advised to upgrade to version 0.0.6,", "cve_id": "CVE-2022-31124", "title": "CVE-2022-31124", "source": "cvefixes", "timestamp": "2022-07-06", "split": "val"} +{"id": "5fb7d0145eec66159bea", "text": "CVE: CVE-2022-1775\n\n[{'lang': 'en', 'value': 'Weak Password Requirements in GitHub repository polonel/trudesk prior to 1.2.2.'}]\n\nFix commit: refactor(accounts): password security enhancements", "cve_id": "CVE-2022-1775", "title": "CVE-2022-1775", "source": "cvefixes", "timestamp": "2022-05-20", "split": "val"} +{"id": "CVE-2022-4135", "text": "Google Chromium GPU Heap Buffer Overflow Vulnerability\n\nAffected: Google Chromium GPU\n\nGoogle Chromium GPU contains a heap buffer overflow vulnerability that allows a remote attacker, who has compromised the renderer process, to potentially perform a sandbox escape via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply updates per vendor instructions.\n\nC", "cve_id": "CVE-2022-4135", "title": "Google Chromium GPU Heap Buffer Overflow Vulnerability", "source": "cisa_kev", "timestamp": "2022-11-28", "split": "val"} +{"id": "7284c11f02ced09df650", "text": "CVE: CVE-2022-1439\n\n[{'lang': 'en', 'value': 'Reflected XSS on demo.microweber.org/demo/module/ in GitHub repository microweber/microweber prior to 1.2.15. Execute Arbitrary JavaScript as the attacked user. It\\'s the only payload I found working, you might need to press \"tab\" but there is probably a paylaod that runs without user interaction.'}]\n\nFix commit: update", "cve_id": "CVE-2022-1439", "title": "CVE-2022-1439", "source": "cvefixes", "timestamp": "2022-04-22", "split": "val"} +{"id": "809b8f7ecb45e7717477", "text": "CVE: CVE-2022-0132\n\n[{'lang': 'en', 'value': 'peertube is vulnerable to Server-Side Request Forgery (SSRF)'}]\n\nFix commit: Prevent video import on non unicast ips", "cve_id": "CVE-2022-0132", "title": "CVE-2022-0132", "source": "cvefixes", "timestamp": "2022-01-10", "split": "val"} +{"id": "52bac6bab70e87e5d639", "text": "CVE: CVE-2022-0319\n\n[{'lang': 'en', 'value': 'Out-of-bounds Read in vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.4154: ml_get error when exchanging windows in Visual mode\n\nProblem: ml_get error when exchanging windows in Visual mode.\nSolution: Correct end of Visual area when entering another buffer.", "cve_id": "CVE-2022-0319", "title": "CVE-2022-0319", "source": "cvefixes", "timestamp": "2022-01-21", "split": "val"} +{"id": "5af13407b2aa8ffe46fd", "text": "CVE: CVE-2022-31138\n\n[{'lang': 'en', 'value': 'mailcow is a mailserver suite. Prior to mailcow-dockerized version 2022-06a, an extended privilege vulnerability can be exploited by manipulating the custom parameters regexmess, skipmess, regexflag, delete2foldersonly, delete2foldersbutnot, regextrans2, pipemess, or maxlinelengthcmd to execute arbitrary code. Users should update their mailcow instances with the `update.sh` script in the mailcow root directory to 2022-06a or newer to receive a patch", "cve_id": "CVE-2022-31138", "title": "CVE-2022-31138", "source": "cvefixes", "timestamp": "2022-07-11", "split": "val"} +{"id": "c7f184b4387123949919", "text": "CVE: CVE-2022-23625\n\n[{'lang': 'en', 'value': \"Wire-ios is a messaging application using the wire protocol on apple's ios platform. In versions prior to 3.95 malformed resource identifiers may render the iOS Wire Client completely unusable by causing it to repeatedly crash on launch. These malformed resource identifiers can be generated and sent between Wire users. The root cause lies in [wireapp/wire-ios-transport](https://github.com/wireapp/wire-ios-transport), where code responsible for remov", "cve_id": "CVE-2022-23625", "title": "CVE-2022-23625", "source": "cvefixes", "timestamp": "2022-03-11", "split": "val"} +{"id": "c048da80448876cb1d1d", "text": "CVE: CVE-2022-21651\n\n[{'lang': 'en', 'value': 'Shopware is an open source e-commerce software platform. An open redirect vulnerability has been discovered. Users may be arbitrary redirected due to incomplete URL handling in the shopware router. This issue has been resolved in version 5.7.7. There is no workaround and users are advised to upgrade as soon as possible.'}]\n\nFix commit: SW-26435 - Improve routing", "cve_id": "CVE-2022-21651", "title": "CVE-2022-21651", "source": "cvefixes", "timestamp": "2022-01-05", "split": "val"} +{"id": "b64f054e72374b1052b8", "text": "CVE: CVE-2022-1432\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Generic in GitHub repository octoprint/octoprint prior to 1.8.0.'}]\n\nFix commit: 🔒️ Fix XSS in webcam stream test", "cve_id": "CVE-2022-1432", "title": "CVE-2022-1432", "source": "cvefixes", "timestamp": "2022-05-18", "split": "val"} +{"id": "6942c7dc1dad22f6023a", "text": "CVE: CVE-2022-0084\n\n[{'lang': 'en', 'value': 'A flaw was found in XNIO, specifically in the notifyReadClosed method. The issue revealed this method was logging a message to another expected end. This flaw allows an attacker to send flawed requests to a server, possibly causing log contention-related performance concerns or an unwanted disk fill-up.'}]\n\nFix commit: Merge pull request #291 from OrangeDog/patch-1", "cve_id": "CVE-2022-0084", "title": "CVE-2022-0084", "source": "cvefixes", "timestamp": "2022-08-26", "split": "val"} +{"id": "c00ee71261f1a5da8df9", "text": "CVE: CVE-2022-24375\n\n[{'lang': 'en', 'value': 'The package node-opcua before 2.74.0 are vulnerable to Denial of Service (DoS) when bypassing the limitations for excessive memory consumption by sending multiple CloseSession requests with the deleteSubscription parameter equal to False.'}]\n\nFix commit: server: fix Subscription.modify assert", "cve_id": "CVE-2022-24375", "title": "CVE-2022-24375", "source": "cvefixes", "timestamp": "2022-08-24", "split": "val"} +{"id": "9a4474b950194bf853cd", "text": "CVE: CVE-2022-0685\n\n[{'lang': 'en', 'value': 'Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4418.'}]\n\nFix commit: patch 8.2.4418: crash when using special multi-byte character\n\nProblem: Crash when using special multi-byte character.\nSolution: Don't use isalpha() for an arbitrary character.", "cve_id": "CVE-2022-0685", "title": "CVE-2022-0685", "source": "cvefixes", "timestamp": "2022-02-20", "split": "val"} +{"id": "00322214ea2a9f14188d", "text": "CVE: CVE-2022-0743\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository getgrav/grav prior to 1.7.31.'}]\n\nFix commit: Fixed entity sanitization for XSS detection", "cve_id": "CVE-2022-0743", "title": "CVE-2022-0743", "source": "cvefixes", "timestamp": "2022-02-28", "split": "val"} +{"id": "8edc3adb7e2c56993496", "text": "CVE: CVE-2022-31110\n\n[{'lang': 'en', 'value': 'RSSHub is an open source, extensible RSS feed generator. In commits prior to 5c4177441417 passing some special values to the `filter` and `filterout` parameters can cause an abnormally high CPU. This results in an impact on the performance of the servers and RSSHub services which may lead to a denial of service. This issue has been fixed in commit 5c4177441417 and all users are advised to upgrade. There are no known workarounds for this issue.'}]\n\nF", "cve_id": "CVE-2022-31110", "title": "CVE-2022-31110", "source": "cvefixes", "timestamp": "2022-06-29", "split": "val"} +{"id": "f362fc205f684e2f1ba0", "text": "CVE: CVE-2022-31148\n\n[{'lang': 'en', 'value': 'Shopware is an open source e-commerce software. In versions from 5.7.0 a persistent cross site scripting (XSS) vulnerability exists in the customer module. Users are recommend to update to the current version 5.7.14. You can get the update to 5.7.14 regularly via the Auto-Updater or directly via the download overview. There are no known workarounds for this issue.'}]\n\nFix commit: SW-26866 - Add test for marketing core class", "cve_id": "CVE-2022-31148", "title": "CVE-2022-31148", "source": "cvefixes", "timestamp": "2022-08-01", "split": "val"} +{"id": "49f9e54aa964e659f1d0", "text": "CVE: CVE-2022-2365\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository zadam/trilium prior to 0.53.3.'}]\n\nFix commit: fix note title escaping in export dialog", "cve_id": "CVE-2022-2365", "title": "CVE-2022-2365", "source": "cvefixes", "timestamp": "2022-07-10", "split": "val"} +{"id": "fe77adca32441c606957", "text": "CVE: CVE-2022-23624\n\n[{'lang': 'en', 'value': 'Frourio-express is a minimal full stack framework, for TypeScript. Frourio-express users who uses frourio-express version prior to v0.26.0 and integration with class-validator through `validators/` folder are subject to a input validation vulnerability. Validators do not work properly for request bodies and queries in specific situations and some input is not validated at all. Users are advised to update frourio to v0.26.0 or later and to install `c", "cve_id": "CVE-2022-23624", "title": "CVE-2022-23624", "source": "cvefixes", "timestamp": "2022-02-07", "split": "val"} +{"id": "55b2683f8b86531de25d", "text": "CVE: CVE-2022-29529\n\n[{'lang': 'en', 'value': 'An issue was discovered in MISP before 2.4.158. There is stored XSS via the LinOTP login field.'}]\n\nFix commit: fix: [security] XSS in LinOTP login field fixed\n\n- fixed a stored XSS in the LinOTP login\n- also fixed invalid calls to check MISP settings from a javascript scope\n\n- as reported by Dawid Czarnecki of Zigrin Security", "cve_id": "CVE-2022-29529", "title": "CVE-2022-29529", "source": "cvefixes", "timestamp": "2022-04-20", "split": "val"} +{"id": "7a6b26502d132ffb0f6a", "text": "CVE: CVE-2022-32074\n\n[{'lang': 'en', 'value': 'A stored cross-site scripting (XSS) vulnerability in the component audit/class.audit.php of osTicket-plugins - Storage-FS before commit a7842d494889fd5533d13deb3c6a7789768795ae allows attackers to execute arbitrary web scripts or HTML via a crafted SVG file.'}]\n\nFix commit: Merge pull request #229 from JediKev/security/latest-security-patches-05-2022\n\nReviewed-By: JediKev , aydreeihn ", "cve_id": "CVE-2022-32074", "title": "CVE-2022-32074", "source": "cvefixes", "timestamp": "2022-07-13", "split": "val"} +{"id": "93ead886332a9a61ec15", "text": "CVE: CVE-2022-21732\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The implementation of `ThreadPoolHandle` can be used to trigger a denial of service attack by allocating too much memory. This is because the `num_threads` argument is only checked to not be negative, but there is no upper bound on its value. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these a", "cve_id": "CVE-2022-21732", "title": "CVE-2022-21732", "source": "cvefixes", "timestamp": "2022-02-03", "split": "val"} +{"id": "398f4f5233c34487593b", "text": "CVE: CVE-2022-1886\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.5016: access before start of text with a put command\n\nProblem: Access before start of text with a put command.\nSolution: Check the length is more than zero.", "cve_id": "CVE-2022-1886", "title": "CVE-2022-1886", "source": "cvefixes", "timestamp": "2022-05-26", "split": "val"} +{"id": "ffbf334d524abbd2f02a", "text": "CVE: CVE-2022-34133\n\n[{'lang': 'en', 'value': 'Benjamin BALET Jorani v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the Comment parameter at application/controllers/Leaves.php.'}]\n\nFix commit: BF:Persistent XSS fix #369", "cve_id": "CVE-2022-34133", "title": "CVE-2022-34133", "source": "cvefixes", "timestamp": "2022-06-28", "split": "val"} +{"id": "4d072d2085b789d8ac4c", "text": "CVE: CVE-2022-0956\n\n[{'lang': 'en', 'value': 'Stored XSS via File Upload in GitHub repository star7th/showdoc prior to v.2.10.4.'}]\n\nFix commit: file upload bug", "cve_id": "CVE-2022-0956", "title": "CVE-2022-0956", "source": "cvefixes", "timestamp": "2022-03-15", "split": "val"} +{"id": "eaf56a0417cdbea6e747", "text": "CVE: CVE-2022-2889\n\n[{'lang': 'en', 'value': 'Use After Free in GitHub repository vim/vim prior to 9.0.0225.'}]\n\nFix commit: patch 9.0.0225: using freed memory with multiple line breaks in expression\n\nProblem: Using freed memory with multiple line breaks in expression.\nSolution: Free eval_tofree later.", "cve_id": "CVE-2022-2889", "title": "CVE-2022-2889", "source": "cvefixes", "timestamp": "2022-08-19", "split": "val"} +{"id": "9166cf28a4b49e78be2c", "text": "[Improper Certificate Validation] CVE-2023-28321: IDN wildcard match\n\nOriginal Report:https://hackerone.com/reports/1950627\n\n## Impact\n\nImproper Validation of Certificate with Host Mismatch.", "cve_id": "CVE-2023-28321", "title": "CVE-2023-28321: IDN wildcard match (Improper Certificate Validation)", "source": "hackerone", "timestamp": "2023-06-25", "split": "val"} +{"id": "6b43fe61bb53d25eb373", "text": "[Cryptographic Issues - Generic] Node 18 reads openssl.cnf from /home/iojs/build/... upon startup on MacOS\n\n> NOTE! Thanks for submitting a report! Please replace *all* the [square] sections below with the pertinent details. Remember, the more detail you provide, the easier it is for us to triage and respond quickly, so be sure to take your time filling out the report!\n\n**Summary:**\n\nSimilar to https://hackerone.com/reports/1623175 it looks like in Node 18 and later, when it starts \n it attempts", "cve_id": "CVE-2022-32222", "title": "Node 18 reads openssl.cnf from /home/iojs/build/... upon startup on MacOS (Cryptographic Issues - Generic)", "source": "hackerone", "timestamp": "2022-10-26", "split": "val"} +{"id": "fd053047c2fad2a6a31d", "text": "CVE: CVE-2022-1928\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository go-gitea/gitea prior to 1.16.9.'}]\n\nFix commit: Fix raw endpoint PDF file headers (#19825)", "cve_id": "CVE-2022-1928", "title": "CVE-2022-1928", "source": "cvefixes", "timestamp": "2022-05-29", "split": "val"} +{"id": "927eda45e2589aad91fa", "text": "CVE: CVE-2022-24903\n\n[{'lang': 'en', 'value': 'Rsyslog is a rocket-fast system for log processing. Modules for TCP syslog reception have a potential heap buffer overflow when octet-counted framing is used. This can result in a segfault or some other malfunction. As of our understanding, this vulnerability can not be used for remote code execution. But there may still be a slight chance for experts to do that. The bug occurs when the octet count is read. While there is a check for the maximum num", "cve_id": "CVE-2022-24903", "title": "CVE-2022-24903", "source": "cvefixes", "timestamp": "2022-05-06", "split": "val"} +{"id": "7afa47c5ffc4b7e2b595", "text": "CVE: CVE-2022-28049\n\n[{'lang': 'en', 'value': 'NGINX NJS 0.7.2 was discovered to contain a NULL pointer dereference via the component njs_vmcode_array at /src/njs_vmcode.c.'}]\n\nFix commit: Fixed allocation of large array literals.\n\nPreviously, allocation of large array literals may result in\nnull-pointer dereference. The reason is that njs_array_alloc() may\nreturn a slow array when size is large enough, but the instruction\ncode assumes that array is always flat.\n\nThe fix is to check fast_array f", "cve_id": "CVE-2022-28049", "title": "CVE-2022-28049", "source": "cvefixes", "timestamp": "2022-04-15", "split": "val"} +{"id": "b035391e978a9a5d8a74", "text": "CVE: CVE-2022-0133\n\n[{'lang': 'en', 'value': 'peertube is vulnerable to Improper Access Control'}]\n\nFix commit: Prevent caption listing of private videos", "cve_id": "CVE-2022-0133", "title": "CVE-2022-0133", "source": "cvefixes", "timestamp": "2022-01-10", "split": "val"} +{"id": "b8b7953c119cd4a69c3a", "text": "CVE: CVE-2022-21735\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The implementation of `FractionalMaxPool` can be made to crash a TensorFlow process via a division by 0. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: Fix potential divide by zero error when executing FractionalMaxPool, when p", "cve_id": "CVE-2022-21735", "title": "CVE-2022-21735", "source": "cvefixes", "timestamp": "2022-02-03", "split": "val"} +{"id": "4333c3169518bde19ece", "text": "CVE: CVE-2022-34749\n\n[{'lang': 'en', 'value': 'In mistune through 2.0.2, support of inline markup is implemented by using regular expressions that can involve a high amount of backtracking on certain edge cases. This behavior is commonly named catastrophic backtracking.'}]\n\nFix commit: Fix asteris emphasis regex CVE-2022-34749", "cve_id": "CVE-2022-34749", "title": "CVE-2022-34749", "source": "cvefixes", "timestamp": "2022-07-25", "split": "val"} +{"id": "CVE-2023-28206", "text": "Apple iOS, iPadOS, and macOS IOSurfaceAccelerator Out-of-Bounds Write Vulnerability\n\nAffected: Apple iOS, iPadOS, and macOS\n\nApple iOS, iPadOS, and macOS IOSurfaceAccelerator contain an out-of-bounds write vulnerability that allows an app to execute code with kernel privileges.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-787\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-28206", "title": "Apple iOS, iPadOS, and macOS IOSurfaceAccelerator Out-of-Bounds Write Vulnerability", "source": "cisa_kev", "timestamp": "2023-04-10", "split": "val"} +{"id": "6c62f3e2f2238e84616b", "text": "CVE: CVE-2022-28959\n\n[{'lang': 'en', 'value': 'Multiple cross-site scripting (XSS) vulnerabilities in the component /spip.php of Spip Web Framework v3.1.13 and below allows attackers to execute arbitrary web scripts or HTML.'}]\n\nFix commit: _oups donc (aka un base64_encode ca fait pas de mal)", "cve_id": "CVE-2022-28959", "title": "CVE-2022-28959", "source": "cvefixes", "timestamp": "2022-05-19", "split": "val"} +{"id": "CVE-2022-1040", "text": "Sophos Firewall Authentication Bypass Vulnerability\n\nAffected: Sophos Firewall\n\nAn authentication bypass vulnerability in User Portal and Webadmin of Sophos Firewall allows for remote code execution.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-158\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-1040", "title": "Sophos Firewall Authentication Bypass Vulnerability", "source": "cisa_kev", "timestamp": "2022-03-31", "split": "val"} +{"id": "CVE-2022-22947", "text": "VMware Spring Cloud Gateway Code Injection Vulnerability\n\nAffected: VMware Spring Cloud Gateway\n\nSpring Cloud Gateway applications are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed and unsecured.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-94\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-22947", "title": "VMware Spring Cloud Gateway Code Injection Vulnerability", "source": "cisa_kev", "timestamp": "2022-05-16", "split": "val"} +{"id": "1075aa0df07a2c38d916", "text": "CVE: CVE-2022-2342\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository outline/outline prior to v0.64.4.'}]\n\nFix commit: 0.64.4", "cve_id": "CVE-2022-2342", "title": "CVE-2022-2342", "source": "cvefixes", "timestamp": "2022-07-07", "split": "val"} +{"id": "72e750a26781a7f7e964", "text": "[Allocation of Resources Without Limits or Throttling] CVE-2022-32206: HTTP compression denial of service\n\ncurl supports \"chained\" HTTP compression algorithms, meaning that a server response can be compressed multiple times and potentially with different algorithms. The number of acceptable \"links\" in this \"decompression chain\" was unbounded, allowing a malicious server to insert a virtually unlimited number of compression steps.\n\nThe use of such a decompression chain could result in a \"malloc b", "cve_id": "CVE-2022-32206", "title": "CVE-2022-32206: HTTP compression denial of service (Allocation of Resources Without Limits or Throttling)", "source": "hackerone", "timestamp": "2022-06-27", "split": "val"} +{"id": "bf5f2bf47f7d3b9c05ea", "text": "CVE: CVE-2022-2252\n\n[{'lang': 'en', 'value': 'Open Redirect in GitHub repository microweber/microweber prior to 1.2.19.'}]\n\nFix commit: update", "cve_id": "CVE-2022-2252", "title": "CVE-2022-2252", "source": "cvefixes", "timestamp": "2022-06-29", "split": "val"} +{"id": "47efc956818ef69c8a86", "text": "CVE: CVE-2022-2287\n\n[{'lang': 'en', 'value': 'Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.'}]\n\nFix commit: patch 9.0.0021: invalid memory access when adding word to spell word list\n\nProblem: Invalid memory access when adding word with a control character to\n the internal spell word list.\nSolution: Disallow adding a word with control characters or a trailing\n slash.", "cve_id": "CVE-2022-2287", "title": "CVE-2022-2287", "source": "cvefixes", "timestamp": "2022-07-02", "split": "val"} +{"id": "CVE-2023-20273", "text": "Cisco IOS XE Web UI Command Injection Vulnerability\n\nAffected: Cisco Cisco IOS XE Web UI\n\nCisco IOS XE contains a command injection vulnerability in the web user interface. When chained with CVE-2023-20198, the attacker can leverage the new local user to elevate privilege to root and write the implant to the file system. Cisco identified CVE-2023-20273 as the vulnerability exploited to deploy the implant. CVE-2021-1435, previously associated with the exploitation events, is no longer believed to", "cve_id": "CVE-2023-20273", "title": "Cisco IOS XE Web UI Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2023-10-23", "split": "val"} +{"id": "61a07748bcc28f4ea974", "text": "[Improper Input Validation] CVE-2023-25692: Apache Airflow Google Provider: Google Cloud Sql Provider Denial Of Service and Remote Command Execution\n\n## 0x01 Environment\n\n- airflow 2.5.1\n- apache-airflow-providers-google 8.8.0\n- Build with docker compose\n\n## 0x02 Reproduction Steps\n### 2.1 Create a malicious Google Cloud SQL Database connection\nCreate the following Google Cloud SQL Database connection named **aaa** under the Admin->Connections menu.Among them, Host, Schema, Login, and Port are", "cve_id": "CVE-2023-25692", "title": "CVE-2023-25692: Apache Airflow Google Provider: Google Cloud Sql Provider Denial Of Service and Remote Command Execution (Improper Input Validation)", "source": "hackerone", "timestamp": "2023-04-16", "split": "val"} +{"id": "848a629cd7b3e39b691a", "text": "CVE: CVE-2022-1053\n\n[{'lang': 'en', 'value': 'Keylime does not enforce that the agent registrar data is the same when the tenant uses it for validation of the EK and identity quote and the verifier for validating the integrity quote. This allows an attacker to use one AK, EK pair from a real TPM to pass EK validation and give the verifier an AK of a software TPM. A successful attack breaks the entire chain of trust because a not validated AK is used by the verifier. This issue is worse if the va", "cve_id": "CVE-2022-1053", "title": "CVE-2022-1053", "source": "cvefixes", "timestamp": "2022-05-06", "split": "val"} +{"id": "CVE-2023-4211", "text": "Arm Mali GPU Kernel Driver Use-After-Free Vulnerability\n\nAffected: Arm Mali GPU Kernel Driver\n\nArm Mali GPU Kernel Driver contains a use-after-free vulnerability that allows a local, non-privileged user to make improper GPU memory processing operations to gain access to already freed memory.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-4211", "title": "Arm Mali GPU Kernel Driver Use-After-Free Vulnerability", "source": "cisa_kev", "timestamp": "2023-10-03", "split": "val"} +{"id": "8ca0cb336dcde83260ea", "text": "CVE: CVE-2022-26530\n\n[{'lang': 'en', 'value': 'swaylock before 1.6 allows attackers to trigger a crash and achieve unlocked access to a Wayland compositor.'}]\n\nFix commit: Add support for ext-session-lock-v1\n\nThis is a new protocol to lock the session [1]. It should be more\nreliable than layer-shell + input-inhibitor.\n\n[1]: https://gitlab.freedesktop.org/wayland/wayland-protocols/-/merge_requests/131", "cve_id": "CVE-2022-26530", "title": "CVE-2022-26530", "source": "cvefixes", "timestamp": "2022-04-03", "split": "val"} +{"id": "29e88bf9d924c59521e0", "text": "CVE: CVE-2022-36007\n\n[{'lang': 'en', 'value': 'Venice is a Clojure inspired sandboxed Lisp dialect with excellent Java interoperability. A partial path traversal issue exists within the functions `load-file` and `load-resource`. These functions can be limited to load files from a list of load paths. Assuming Venice has been configured with the load paths: `[ \"/Users/foo/resources\" ]` When passing **relative** paths to these two vulnerable functions everything is fine: `(load-resource \"test.png\")", "cve_id": "CVE-2022-36007", "title": "CVE-2022-36007", "source": "cvefixes", "timestamp": "2022-08-15", "split": "val"} +{"id": "97d0fc5b25e095bd0e81", "text": "[Cleartext Transmission of Sensitive Information] CVE-2022-30115: HSTS bypass via trailing dot\n\nAdvisory: https://curl.se/docs/CVE-2022-30115.html\n\nOriginal Report: https://hackerone.com/reports/1557449\n\n## Impact\n\nHSTS bypass", "cve_id": "CVE-2022-30115", "title": "CVE-2022-30115: HSTS bypass via trailing dot (Cleartext Transmission of Sensitive Information)", "source": "hackerone", "timestamp": "2022-06-11", "split": "val"} +{"id": "577bdf6b5f689910afb3", "text": "[Cross-site Scripting (XSS) - Generic] CVE-2022-23519: Rails::Html::SafeListSanitizer vulnerable to XSS when certain tags are allowed (math+style || svg+style)\n\nThe following is from: https://hackerone.com/reports/1656627\n\n## Intro\n\nThe Rails HTML sanitzier allows to set certain combinations of tags in it's allow list that are not properly handled. \nSimilar to the report [1530898](https://hackerone.com/reports/1530898), which identified the combination`select` and `style` as vulnerable,\nmy fuzz", "cve_id": "CVE-2022-23519", "title": "CVE-2022-23519: Rails::Html::SafeListSanitizer vulnerable to XSS when certain tags are allowed (math+style || svg+style) (Cross-site Scripting (XSS) - Generic)", "source": "hackerone", "timestamp": "2023-01-04", "split": "val"} +{"id": "776247c30c713947e827", "text": "CVE: CVE-2022-31113\n\n[{'lang': 'en', 'value': \"Canarytokens is an open source tool which helps track activity and actions on your network. A Cross-Site Scripting vulnerability was identified in the history page of triggered Canarytokens. This permits an attacker who recognised an HTTP-based Canarytoken (a URL) to execute Javascript in the Canarytoken's history page (domain: canarytokens.org) when the history page is later visited by the Canarytoken's creator. This vulnerability could be used to", "cve_id": "CVE-2022-31113", "title": "CVE-2022-31113", "source": "cvefixes", "timestamp": "2022-07-01", "split": "val"} +{"id": "08e19b8132b08acc4623", "text": "CVE: CVE-2022-21666\n\n[{'lang': 'en', 'value': 'Useful Simple Open-Source CMS (USOC) is a content management system (CMS) for programmers. Versions prior to Pb2.4Bfx3 allowed Sql injection in usersearch.php only for users with administrative privileges. Users should replace the file `admin/pages/useredit.php` with a newer version. USOC version Pb2.4Bfx3 contains a fixed version of `admin/pages/useredit.php`.'}]\n\nFix commit: Update usersearch.php", "cve_id": "CVE-2022-21666", "title": "CVE-2022-21666", "source": "cvefixes", "timestamp": "2022-01-10", "split": "val"} +{"id": "9c67d6aba8c2f9ece764", "text": "CVE: CVE-2022-0121\n\n[{'lang': 'en', 'value': 'hoppscotch is vulnerable to Exposure of Sensitive Information to an Unauthorized Actor'}]\n\nFix commit: fix: apply sandbox to HTML preview iframe", "cve_id": "CVE-2022-0121", "title": "CVE-2022-0121", "source": "cvefixes", "timestamp": "2022-01-06", "split": "val"} +{"id": "9eb5cecfe35f979f68d1", "text": "CVE: CVE-2022-0378\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Reflected in Packagist microweber/microweber prior to 1.2.11.'}]\n\nFix commit: fix xss on module api call in value parameters", "cve_id": "CVE-2022-0378", "title": "CVE-2022-0378", "source": "cvefixes", "timestamp": "2022-01-26", "split": "val"} +{"id": "bdf4e8238a8edaebb2d2", "text": "[Insufficiently Protected Credentials] CVE-2022-27774: Credential leak on redirect\n\n## Summary:\ncurl/libcurl can be coaxed to leak user credentials to third-party host by issuing HTTP redirect to ftp:// URL.\n\n## Steps To Reproduce:\n\n 1. Configure for example Apache2 on `firstsite.tld` to perform redirect with mod_rewrite:\n ```\n RewriteCond %{HTTP_USER_AGENT} \"^curl/\"\n RewriteRule ^/redirectpoc ftp://secondsite.tld:9999 [R=301,L]\n ```\n 2. Capture credentials at `secondsite.tld` fo", "cve_id": "CVE-2022-27774", "title": "CVE-2022-27774: Credential leak on redirect (Insufficiently Protected Credentials)", "source": "hackerone", "timestamp": "2022-04-29", "split": "val"} +{"id": "0bee8248cd8225b984dc", "text": "CVE: CVE-2022-29242\n\n[{'lang': 'en', 'value': 'GOST engine is a reference implementation of the Russian GOST crypto algorithms for OpenSSL. TLS clients using GOST engine when ciphersuite `TLS_GOSTR341112_256_WITH_KUZNYECHIK_CTR_OMAC` is agreed and the server uses 512 bit GOST secret keys are vulnerable to buffer overflow. GOST engine version 3.0.1 contains a patch for this issue. Disabling ciphersuite `TLS_GOSTR341112_256_WITH_KUZNYECHIK_CTR_OMAC` is a possible workaround.'}]\n\nFix commit: Fix bu", "cve_id": "CVE-2022-29242", "title": "CVE-2022-29242", "source": "cvefixes", "timestamp": "2022-05-24", "split": "val"} +{"id": "CVE-2022-3075", "text": "Google Chromium Mojo Insufficient Data Validation Vulnerability\n\nAffected: Google Chromium Mojo\n\nGoogle Chromium Mojo contains an insufficient data validation vulnerability that allows a remote attacker, who has compromised the renderer process, to potentially perform a sandbox escape via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply updates per ven", "cve_id": "CVE-2022-3075", "title": "Google Chromium Mojo Insufficient Data Validation Vulnerability", "source": "cisa_kev", "timestamp": "2022-09-08", "split": "val"} +{"id": "2d5cc4e879d616e6bff4", "text": "CVE: CVE-2022-0219\n\n[{'lang': 'en', 'value': 'Improper Restriction of XML External Entity Reference in GitHub repository skylot/jadx prior to 1.3.2.'}]\n\nFix commit: fix: use secure xml parser for process manifest", "cve_id": "CVE-2022-0219", "title": "CVE-2022-0219", "source": "cvefixes", "timestamp": "2022-01-20", "split": "val"} +{"id": "544982fab797f9e6c7d1", "text": "CVE: CVE-2022-0501\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Reflected in Packagist ptrofimov/beanstalk_console prior to 1.7.12.'}]\n\nFix commit: Sanitize input", "cve_id": "CVE-2022-0501", "title": "CVE-2022-0501", "source": "cvefixes", "timestamp": "2022-02-05", "split": "val"} +{"id": "f91de431c7b5c384932f", "text": "CVE: CVE-2022-2598\n\n[{'lang': 'en', 'value': 'Undefined Behavior for Input to API in GitHub repository vim/vim prior to 9.0.0100.'}]\n\nFix commit: patch 9.0.0101: invalid memory access in diff mode with \"dp\" and undo\n\nProblem: Invalid memory access in diff mode with \"dp\" and undo.\nSolution: Make sure the line number does not go below one.", "cve_id": "CVE-2022-2598", "title": "CVE-2022-2598", "source": "cvefixes", "timestamp": "2022-08-01", "split": "val"} +{"id": "0059447d640072a0980b", "text": "[Improper Access Control - Generic] CVE-2023-30587 Process-based permissions can be bypassed with the \"inspector\" module.\n\n[https://hackerone.com/reports/1962701](https://hackerone.com/reports/1962701) Restrictions set with the new process based permission flag can by bypassed with the built-in inspector module.\n\n## Impact\n\nPermission Model is a mechanism for restricting access to specific resources during execution. This bypasses those restrictions.", "cve_id": "CVE-2023-30587", "title": "CVE-2023-30587 Process-based permissions can be bypassed with the \"inspector\" module. (Improper Access Control - Generic)", "source": "hackerone", "timestamp": "2023-09-30", "split": "val"} +{"id": "5b4644147fdd23ff4257", "text": "CVE: CVE-2022-2344\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0045.'}]\n\nFix commit: patch 9.0.0046: reading past end of completion with duplicate match\n\nProblem: Reading past end of completion with duplicate match.\nSolution: Check string length", "cve_id": "CVE-2022-2344", "title": "CVE-2022-2344", "source": "cvefixes", "timestamp": "2022-07-08", "split": "val"} +{"id": "fe257e704e476dade48d", "text": "CVE: CVE-2022-29255\n\n[{'lang': 'en', 'value': 'Vyper is a Pythonic Smart Contract Language for the ethereum virtual machine. In versions prior to 0.3.4 when a calling an external contract with no return value, the contract address (including side effects) could be evaluated twice. This may result in incorrect outcomes for contracts. This issue has been addressed in v0.3.4.'}]\n\nFix commit: Merge pull request from GHSA-4v9q-cgpw-cf38\n\nin external call codegen, when `extcodesize` is called on the t", "cve_id": "CVE-2022-29255", "title": "CVE-2022-29255", "source": "cvefixes", "timestamp": "2022-06-09", "split": "val"} +{"id": "0940628e037be20866d7", "text": "CVE: CVE-2022-24739\n\n[{'lang': 'en', 'value': 'alltube is an html front end for youtube-dl. On releases prior to 3.0.3, an attacker could craft a special HTML page to trigger either an open redirect attack or a Server-Side Request Forgery attack (depending on how AllTube is configured). The impact is mitigated by the fact the SSRF attack is only possible when the `stream` option is enabled in the configuration. (This option is disabled by default.) 3.0.3 contains a fix for this vulnerability.'}]", "cve_id": "CVE-2022-24739", "title": "CVE-2022-24739", "source": "cvefixes", "timestamp": "2022-03-08", "split": "val"} +{"id": "1eb25c382356db9e5dd8", "text": "CVE: CVE-2022-29173\n\n[{'lang': 'en', 'value': 'go-tuf is a Go implementation of The Update Framework (TUF). go-tuf does not correctly implement the client workflow for updating the metadata files for roles other than the root role. Specifically, checks for rollback attacks are not implemented correctly meaning an attacker can cause clients to install software that is older than the software which the client previously knew to be available, and may include software with known vulnerabilities. In", "cve_id": "CVE-2022-29173", "title": "CVE-2022-29173", "source": "cvefixes", "timestamp": "2022-05-05", "split": "val"} +{"id": "CVE-2023-32046", "text": "Microsoft Windows MSHTML Platform Privilege Escalation Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows MSHTML Platform contains an unspecified vulnerability that allows for privilege escalation.\n\nRequired Action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-32046", "title": "Microsoft Windows MSHTML Platform Privilege Escalation Vulnerability", "source": "cisa_kev", "timestamp": "2023-07-11", "split": "val"} +{"id": "8fa91f8a217b71b5ce93", "text": "CVE: CVE-2022-23060\n\n[{'lang': 'en', 'value': 'A Stored Cross Site Scripting (XSS) vulnerability exists in Shopizer versions 2.0 through 2.17.0, where a privileged user (attacker) can inject malicious JavaScript in the filename under the “Manage files” tab'}]\n\nFix commit: working version 3.0.alpha", "cve_id": "CVE-2022-23060", "title": "CVE-2022-23060", "source": "cvefixes", "timestamp": "2022-05-01", "split": "val"} +{"id": "e2cc3353444523d6a028", "text": "CVE: CVE-2022-28545\n\n[{'lang': 'en', 'value': 'FUDforum 3.1.1 is vulnerable to Stored XSS.'}]\n\nFix commit: Fix XSS vulnerability reported by ptsecurity.com (attacker tries to send mail to an administrator\non a server that does not have a mail server configured).", "cve_id": "CVE-2022-28545", "title": "CVE-2022-28545", "source": "cvefixes", "timestamp": "2022-05-06", "split": "val"} +{"id": "34d066e9c4217d3c4752", "text": "CVE: CVE-2022-0277\n\n[{'lang': 'en', 'value': 'Improper Access Control in Packagist microweber/microweber prior to 1.2.11.'}]\n\nFix commit: search_authors only admins", "cve_id": "CVE-2022-0277", "title": "CVE-2022-0277", "source": "cvefixes", "timestamp": "2022-01-20", "split": "val"} +{"id": "4427b21778132b7019f3", "text": "CVE: CVE-2022-23057\n\n[{'lang': 'en', 'value': 'In ERPNext, versions v12.0.9--v13.0.3 are vulnerable to Stored Cross-Site-Scripting (XSS), due to user input not being validated properly. A low privileged attacker could inject arbitrary code into input fields when editing his profile.'}]\n\nFix commit: feat: frappe.whitelist for class methods", "cve_id": "CVE-2022-23057", "title": "CVE-2022-23057", "source": "cvefixes", "timestamp": "2022-06-22", "split": "val"} +{"id": "f5cd613b70521fc1bac4", "text": "CVE: CVE-2022-27463\n\n[{'lang': 'en', 'value': 'Open redirect vulnerability in objects/login.json.php in WWBN AVideo through 11.6, allows attackers to arbitrarily redirect users from a crafted url to the login page.'}]\n\nFix commit: Open Redirect fix, thanks Max Boll", "cve_id": "CVE-2022-27463", "title": "CVE-2022-27463", "source": "cvefixes", "timestamp": "2022-04-05", "split": "val"} +{"id": "2561d3c72fca0ca2b8eb", "text": "[Allocation of Resources Without Limits or Throttling] CVE-2022-32206: HTTP compression denial of service\n\n## Summary:\nCurl does not prevent resource consumption when processing certain header types, but keeps on allocating more and more resources until the application terminates (or the system crashes, see below).\n\nThe attack vectors include (at least):\n- Sending many `Transfer-Encoding`with repeated encodings such as \"gzip,gzip,gzip,...\"\n- if `CURLOPT_ACCEPT_ENCODING` is set sending many `Cont", "cve_id": "CVE-2022-32206", "title": "CVE-2022-32206: HTTP compression denial of service (Allocation of Resources Without Limits or Throttling)", "source": "hackerone", "timestamp": "2022-06-27", "split": "val"} +{"id": "8f7647530e602b8c5cf8", "text": "CVE: CVE-2022-0318\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.4151: reading beyond the end of a line\n\nProblem: Reading beyond the end of a line.\nSolution: For block insert only use the offset for correcting the length.", "cve_id": "CVE-2022-0318", "title": "CVE-2022-0318", "source": "cvefixes", "timestamp": "2022-01-21", "split": "val"} +{"id": "2d23b21042e947f04320", "text": "CVE: CVE-2022-31085\n\n[{'lang': 'en', 'value': 'LDAP Account Manager (LAM) is a webfrontend for managing entries (e.g. users, groups, DHCP settings) stored in an LDAP directory. In versions prior to 8.0 the session files include the LDAP user name and password in clear text if the PHP OpenSSL extension is not installed or encryption is disabled by configuration. This issue has been fixed in version 8.0. Users unable to upgrade should install the PHP OpenSSL extension and make sure session encrypt", "cve_id": "CVE-2022-31085", "title": "CVE-2022-31085", "source": "cvefixes", "timestamp": "2022-06-27", "split": "val"} +{"id": "CVE-2023-43208", "text": "NextGen Healthcare Mirth Connect Deserialization of Untrusted Data Vulnerability\n\nAffected: NextGen Healthcare Mirth Connect\n\nNextGen Healthcare Mirth Connect contains a deserialization of untrusted data vulnerability that allows for unauthenticated remote code execution via a specially crafted request.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploited Vu", "cve_id": "CVE-2023-43208", "title": "NextGen Healthcare Mirth Connect Deserialization of Untrusted Data Vulnerability", "source": "cisa_kev", "timestamp": "2024-05-20", "split": "val"} +{"id": "87ad0a478f40a825623d", "text": "CVE: CVE-2022-25321\n\n[{'lang': 'en', 'value': 'An issue was discovered in Cerebrate through 1.4. XSS could occur in the bookmarks component.'}]\n\nFix commit: fix: [settings:settingField] Enforce sanitization of input fields\n\n- As reported by Dawid Czarnecki from Zigrin Security", "cve_id": "CVE-2022-25321", "title": "CVE-2022-25321", "source": "cvefixes", "timestamp": "2022-02-18", "split": "val"} +{"id": "52654b96472fa952d287", "text": "[Cross-site Scripting (XSS) - Reflected] Reflected XSS via Moodle on ███ [CVE-2022-35653]\n\nHi Security Team\nI found an xss vulnerability on your website [CVE-2022-35653]\nRefrence : https://vulners.com/nuclei/NUCLEI:CVE-2022-35653\nif you wanna test this :\n```\nid: CVE-2022-35653\n\ninfo:\n name: Moodle LTI module Reflected - Cross-Site Scripting\n author: iamnoooob,pdresearch\n severity: medium\n description: |\n A reflected XSS issue was identified in the LTI module of Moodle. The vulnerability", "cve_id": "CVE-2022-35653", "title": "Reflected XSS via Moodle on ███ [CVE-2022-35653] (Cross-site Scripting (XSS) - Reflected)", "source": "hackerone", "timestamp": "2024-05-03", "split": "val"} +{"id": "89b301e9eb7eb10d4bea", "text": "CVE: CVE-2022-23633\n\n[{'lang': 'en', 'value': 'Action Pack is a framework for handling and responding to web requests. Under certain circumstances response bodies will not be closed. In the event a response is *not* notified of a `close`, `ActionDispatch::Executor` will not know to reset thread local state for the next request. This can lead to data being leaked to subsequent requests.This has been fixed in Rails 7.0.2.1, 6.1.4.5, 6.0.4.5, and 5.2.6.1. Upgrading is highly recommended, but to wor", "cve_id": "CVE-2022-23633", "title": "CVE-2022-23633", "source": "cvefixes", "timestamp": "2022-02-11", "split": "val"} +{"id": "07922641c8f9db9a19ad", "text": "CVE: CVE-2022-21706\n\n[{'lang': 'en', 'value': \"Zulip is an open-source team collaboration tool with topic-based threading. Zulip Server version 2.0.0 and above are vulnerable to insufficient access control with multi-use invitations. A Zulip Server deployment which hosts multiple organizations is vulnerable to an attack where an invitation created in one organization (potentially as a role with elevated permissions) can be used to join any other organization. This bypasses any restrictions on re", "cve_id": "CVE-2022-21706", "title": "CVE-2022-21706", "source": "cvefixes", "timestamp": "2022-02-26", "split": "val"} +{"id": "b7b3da818bbb1b9f0e53", "text": "CVE: CVE-2022-24793\n\n[{'lang': 'en', 'value': \"PJSIP is a free and open source multimedia communication library written in C. A buffer overflow vulnerability in versions 2.12 and prior affects applications that uses PJSIP DNS resolution. It doesn't affect PJSIP users who utilize an external resolver. A patch is available in the `master` branch of the `pjsip/pjproject` GitHub repository. A workaround is to disable DNS resolution in PJSIP config (by setting `nameserver_count` to zero) or use an ex", "cve_id": "CVE-2022-24793", "title": "CVE-2022-24793", "source": "cvefixes", "timestamp": "2022-04-06", "split": "val"} +{"id": "CVE-2022-26871", "text": "Trend Micro Apex Central Arbitrary File Upload Vulnerability\n\nAffected: Trend Micro Apex Central\n\nAn arbitrary file upload vulnerability in Trend Micro Apex Central could allow for remote code execution.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-184\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-26871", "title": "Trend Micro Apex Central Arbitrary File Upload Vulnerability", "source": "cisa_kev", "timestamp": "2022-03-31", "split": "val"} +{"id": "3efbabef005d954c3389", "text": "CVE: CVE-2022-1382\n\n[{'lang': 'en', 'value': 'NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of making the radare2 crash, thus affecting the availability of the system.'}]\n\nFix commit: Fix null deref in ne parser ##crash\n\n* Reported by @cnitlrt via huntr.dev\n* BountyID: d8b6d239-6d7b-4783-b26b-5be848c01aa1/\n* Reproducer: nenull", "cve_id": "CVE-2022-1382", "title": "CVE-2022-1382", "source": "cvefixes", "timestamp": "2022-04-18", "split": "val"} +{"id": "CVE-2022-22948", "text": "VMware vCenter Server Incorrect Default File Permissions Vulnerability \n\nAffected: VMware vCenter Server\n\nVMware vCenter Server contains an incorrect default file permissions vulnerability that allows a remote, privileged attacker to gain access to sensitive information.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-276\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-22948", "title": "VMware vCenter Server Incorrect Default File Permissions Vulnerability ", "source": "cisa_kev", "timestamp": "2024-07-17", "split": "val"} +{"id": "a71932e286273a74be94", "text": "CVE: CVE-2022-0614\n\n[{'lang': 'en', 'value': 'Use of Out-of-range Pointer Offset in Homebrew mruby prior to 3.2.'}]\n\nFix commit: vm.c: should check type before hash access.\n\nSince the operand of double splat (`**`) may not be a hash, simple\nassertion (previous code since d42a64e) was not enough for this case.", "cve_id": "CVE-2022-0614", "title": "CVE-2022-0614", "source": "cvefixes", "timestamp": "2022-02-16", "split": "val"} +{"id": "CVE-2022-43769", "text": "Hitachi Vantara Pentaho BA Server Special Element Injection Vulnerability\n\nAffected: Hitachi Vantara Pentaho Business Analytics (BA) Server\n\nHitachi Vantara Pentaho BA Server contains a special element injection vulnerability that allows an attacker to inject Spring templates into properties files, allowing for arbitrary command execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mit", "cve_id": "CVE-2022-43769", "title": "Hitachi Vantara Pentaho BA Server Special Element Injection Vulnerability", "source": "cisa_kev", "timestamp": "2025-03-03", "split": "val"} +{"id": "CVE-2023-48365", "text": "Qlik Sense HTTP Tunneling Vulnerability\n\nAffected: Qlik Sense\n\nQlik Sense contains an HTTP tunneling vulnerability that allows an attacker to escalate privileges and execute HTTP requests on the backend server hosting the software.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-444\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-48365", "title": "Qlik Sense HTTP Tunneling Vulnerability", "source": "cisa_kev", "timestamp": "2025-01-13", "split": "val"} +{"id": "CVE-2022-34713", "text": "Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability\n\nAffected: Microsoft Windows\n\nA remote code execution vulnerability exists when Microsoft Windows MSDT is called using the URL protocol from a calling application.\n\nRequired Action: Apply updates per vendor instructions.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-34713", "title": "Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability", "source": "cisa_kev", "timestamp": "2022-08-09", "split": "val"} +{"id": "d2e035b308e1cdbec441", "text": "[Business Logic Errors] CVE-2022-27782: TLS and SSH connection too eager reuse\n\n## Summary:\nCurl fails to consider some security related options when reusing TLS connections. For example:\n\n# TLS\nCURLOPT_SSL_OPTIONS\nCURLOPT_PROXY_SSL_OPTIONS\nCURLOPT_CRLFILE\nCURLOPT_PROXY_CRLFILE\nCURLOPT_TLSAUTH_TYPE\nCURLOPT_TLSAUTH_USERNAME\nCURLOPT_TLSAUTH_PASSWORD\nCURLOPT_PROXY_TLSAUTH_TYPE\nCURLOPT_PROXY_TLSAUTH_USERNAME\nCURLOPT_PROXY_TLSAUTH_PASSWORD\n\nAs a result for example TLS connection with lower security", "cve_id": "CVE-2022-27782", "title": "CVE-2022-27782: TLS and SSH connection too eager reuse (Business Logic Errors)", "source": "hackerone", "timestamp": "2022-05-12", "split": "val"} +{"id": "7131403e412b23667895", "text": "CVE: CVE-2022-0624\n\n[{'lang': 'en', 'value': 'Authorization Bypass Through User-Controlled Key in GitHub repository ionicabizau/parse-path prior to 5.0.0.'}]\n\nFix commit: Refactor the codebase to make it more secure", "cve_id": "CVE-2022-0624", "title": "CVE-2022-0624", "source": "cvefixes", "timestamp": "2022-06-28", "split": "val"} +{"id": "4930d421e1822c41e152", "text": "CVE: CVE-2022-24795\n\n[{'lang': 'en', 'value': 'yajl-ruby is a C binding to the YAJL JSON parsing and generation library. The 1.x branch and the 2.x branch of `yajl` contain an integer overflow which leads to subsequent heap memory corruption when dealing with large (~2GB) inputs. The reallocation logic at `yajl_buf.c#L64` may result in the `need` 32bit integer wrapping to 0 when `need` approaches a value of 0x80000000 (i.e. ~2GB of data), which results in a reallocation of buf->alloc into a smal", "cve_id": "CVE-2022-24795", "title": "CVE-2022-24795", "source": "cvefixes", "timestamp": "2022-04-05", "split": "val"} +{"id": "CVE-2022-27593", "text": "QNAP Photo Station Externally Controlled Reference Vulnerability\n\nAffected: QNAP Photo Station\n\nCertain QNAP NAS running Photo Station with internet exposure contain an externally controlled reference to a resource vulnerability which can allow an attacker to modify system files. This vulnerability was observed being utilized in a Deadbolt ransomware campaign.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-610\n\n[Source: CISA Known Exploited Vulnerabiliti", "cve_id": "CVE-2022-27593", "title": "QNAP Photo Station Externally Controlled Reference Vulnerability", "source": "cisa_kev", "timestamp": "2022-09-08", "split": "val"} +{"id": "CVE-2022-23748", "text": "Dante Discovery Process Control Vulnerability\n\nAffected: Audinate Dante Discovery\n\nDante Discovery contains a process control vulnerability in mDNSResponder.exe that all allows for a DLL sideloading attack. A local attacker can leverage this vulnerability in the Dante Application Library to execute arbitrary code.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-114\n\n[Source: CISA Known Exploited Vulnerabil", "cve_id": "CVE-2022-23748", "title": "Dante Discovery Process Control Vulnerability", "source": "cisa_kev", "timestamp": "2025-02-06", "split": "val"} +{"id": "CVE-2023-25280", "text": "D-Link DIR-820 Router OS Command Injection Vulnerability\n\nAffected: D-Link DIR-820 Router\n\nD-Link DIR-820 routers contain an OS command injection vulnerability that allows a remote, unauthenticated attacker to escalate privileges to root via a crafted payload with the ping_addr parameter to ping.ccp.\n\nRequired Action: The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product.\n\nCWE(s): CWE-78\n\n[Source: CISA Known Exploited Vulnerabi", "cve_id": "CVE-2023-25280", "title": "D-Link DIR-820 Router OS Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2024-09-30", "split": "val"} +{"id": "3b3be8698ef8c5ab3cec", "text": "CVE: CVE-2022-23591\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The `GraphDef` format in TensorFlow does not allow self recursive functions. The runtime assumes that this invariant is satisfied. However, a `GraphDef` containing a fragment such as the following can be consumed when loading a `SavedModel`. This would result in a stack overflow during execution as resolving each `NodeDef` means resolving the function itself and its nodes. The fix will be incl", "cve_id": "CVE-2022-23591", "title": "CVE-2022-23591", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val"} +{"id": "9ee0d48b1dd3fb41252b", "text": "CVE: CVE-2022-24875\n\n[{'lang': 'en', 'value': 'The CVEProject/cve-services is an open source project used to operate the CVE services api. In versions up to and including 1.1.1 the `org.conroller.js` code would erroneously log user secrets. This has been resolved in commit `46d98f2b` and should be available in subsequent versions of the software. Users of the software are advised to manually apply the `46d98f2b` commit or to update when a new version becomes available. As a workaround users shou", "cve_id": "CVE-2022-24875", "title": "CVE-2022-24875", "source": "cvefixes", "timestamp": "2022-04-21", "split": "val"} +{"id": "87f640cefe1f49d0aab2", "text": "CVE: CVE-2022-24912\n\n[{'lang': 'en', 'value': 'The package github.com/runatlantis/atlantis/server/controllers/events before 0.19.7 are vulnerable to Timing Attack in the webhook event validator code, which does not use a constant-time comparison function to validate the webhook secret. It can allow an attacker to recover this secret as an attacker and then forge webhook events.'}]\n\nFix commit: fix: use constant time comparison of webhook secret in gitlab event validator (#2392)", "cve_id": "CVE-2022-24912", "title": "CVE-2022-24912", "source": "cvefixes", "timestamp": "2022-07-29", "split": "val"} +{"id": "d7d63570e1b782985948", "text": "CVE: CVE-2022-0155\n\n[{'lang': 'en', 'value': 'follow-redirects is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor'}]\n\nFix commit: Drop Cookie header across domains.\n\nFixes https://github.com/follow-redirects/follow-redirects/issues/183", "cve_id": "CVE-2022-0155", "title": "CVE-2022-0155", "source": "cvefixes", "timestamp": "2022-01-10", "split": "val"} +{"id": "5b9ee070a9dbb855fa8c", "text": "CVE: CVE-2022-0966\n\n[{'lang': 'en', 'value': 'Stored XSS via File Upload in star7th/showdoc in GitHub repository star7th/showdoc prior to 2.4.10.'}]\n\nFix commit: Upload file vulnerability", "cve_id": "CVE-2022-0966", "title": "CVE-2022-0966", "source": "cvefixes", "timestamp": "2022-03-15", "split": "val"} +{"id": "CVE-2022-22674", "text": "Apple macOS Out-of-Bounds Read Vulnerability\n\nAffected: Apple macOS\n\nmacOS Monterey contains an out-of-bounds read vulnerability that could allow an application to read kernel memory.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-20, CWE-125\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-22674", "title": "Apple macOS Out-of-Bounds Read Vulnerability", "source": "cisa_kev", "timestamp": "2022-04-04", "split": "val"} +{"id": "fc8330e0ffc15652fe59", "text": "[Uncontrolled Resource Consumption] CVE-2023-46695: Potential denial of service vulnerability in UsernameField on Windows\n\nIn Django versions before 4.2.7, 4.1.13, and 3.2.23, I sent a POST request to the admin login page using Burp Suite, editing the request to send over 1 million invalid unicode characters to my local web server running Django. (I used: \"¾\")\nAfter submitting, a single request took 4.4 seconds on average.\nWhen I sent 20 concurrent requests, then I got 60 second wait times, and", "cve_id": "CVE-2023-46695", "title": "CVE-2023-46695: Potential denial of service vulnerability in UsernameField on Windows (Uncontrolled Resource Consumption)", "source": "hackerone", "timestamp": "2023-11-29", "split": "val"} +{"id": "bd44dd05d2c5a0b2ac29", "text": "CVE: CVE-2022-31127\n\n[{'lang': 'en', 'value': 'NextAuth.js is a complete open source authentication solution for Next.js applications. An attacker can pass a compromised input to the e-mail [signin endpoint](https://next-auth.js.org/getting-started/rest-api#post-apiauthsigninprovider) that contains some malicious HTML, tricking the e-mail server to send it to the user, so they can perform a phishing attack. Eg.: `balazs@email.com, Before signing in, claim your money", "cve_id": "CVE-2022-31127", "title": "CVE-2022-31127", "source": "cvefixes", "timestamp": "2022-07-06", "split": "val"} +{"id": "a20bd34d984ee52068cc", "text": "CVE: CVE-2022-1997\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository francoisjacquet/rosariosis prior to 9.0.'}]\n\nFix commit: Fix stored XSS security issue: remove inline JS from URL in PreparePHP_SELF.fnc.php", "cve_id": "CVE-2022-1997", "title": "CVE-2022-1997", "source": "cvefixes", "timestamp": "2022-06-08", "split": "val"} +{"id": "53c18118bf599a0e11b1", "text": "CVE: CVE-2022-1698\n\n[{'lang': 'en', 'value': 'Allowing long password leads to denial of service in GitHub repository causefx/organizr prior to 2.1.2000. This vulnerability can be abused by doing a DDoS attack for which genuine users will not able to access resources/applications.'}]\n\nFix commit: fix more lengths of user inputs", "cve_id": "CVE-2022-1698", "title": "CVE-2022-1698", "source": "cvefixes", "timestamp": "2022-05-12", "split": "val"} +{"id": "983f771b1521ca676e87", "text": "CVE: CVE-2022-0763\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository microweber/microweber prior to 1.3.'}]\n\nFix commit: add xss clean to create media dir method", "cve_id": "CVE-2022-0763", "title": "CVE-2022-0763", "source": "cvefixes", "timestamp": "2022-02-26", "split": "val"} +{"id": "c9a9785cf513c286bce6", "text": "CVE: CVE-2022-1908\n\n[{'lang': 'en', 'value': 'Buffer Over-read in GitHub repository bfabiszewski/libmobi prior to 0.11.'}]\n\nFix commit: Fix boundary checking error in markup search, that could cause buffer over-read with corrupt input", "cve_id": "CVE-2022-1908", "title": "CVE-2022-1908", "source": "cvefixes", "timestamp": "2022-05-27", "split": "val"} +{"id": "868de3d5c6c221e2e2d8", "text": "CVE: CVE-2022-0896\n\n[{'lang': 'en', 'value': 'Improper Neutralization of Special Elements Used in a Template Engine in GitHub repository microweber/microweber prior to 1.3.'}]\n\nFix commit: Update AdminCommentController.php", "cve_id": "CVE-2022-0896", "title": "CVE-2022-0896", "source": "cvefixes", "timestamp": "2022-03-09", "split": "val"} +{"id": "dea0a21490332841635c", "text": "CVE: CVE-2022-21681\n\n[{'lang': 'en', 'value': 'Marked is a markdown parser and compiler. Prior to version 4.0.10, the regular expression `inline.reflinkSearch` may cause catastrophic backtracking against some strings and lead to a denial of service (DoS). Anyone who runs untrusted markdown through a vulnerable version of marked and does not use a worker with a time limit may be affected. This issue is patched in version 4.0.10. As a workaround, avoid running untrusted markdown through marked or", "cve_id": "CVE-2022-21681", "title": "CVE-2022-21681", "source": "cvefixes", "timestamp": "2022-01-14", "split": "val"} +{"id": "5f15c1b45a51e1f71d8c", "text": "CVE: CVE-2022-1616\n\n[{'lang': 'en', 'value': 'Use after free in append_command in GitHub repository vim/vim prior to 8.2.4895. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution'}]\n\nFix commit: patch 8.2.4895: buffer overflow with invalid command with composing chars\n\nProblem: Buffer overflow with invalid command with composing chars.\nSolution: Check that the whole character fits in the buffer.", "cve_id": "CVE-2022-1616", "title": "CVE-2022-1616", "source": "cvefixes", "timestamp": "2022-05-07", "split": "val"} +{"id": "124008a14d1998e1e2ef", "text": "CVE: CVE-2022-36123\n\n[{'lang': 'en', 'value': 'The Linux kernel before 5.18.13 lacks a certain clear operation for the block starting symbol (.bss). This allows Xen PV guest OS users to cause a denial of service or gain privileges.'}]\n\nFix commit: Merge tag 'x86_urgent_for_v5.19_rc6' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip\n\nPull x86 fixes from Borislav Petkov:\n\n - Prepare for and clear .brk early in order to address XenPV guests\n failures where the hypervisor verifies page tab", "cve_id": "CVE-2022-36123", "title": "CVE-2022-36123", "source": "cvefixes", "timestamp": "2022-07-29", "split": "val"} +{"id": "1975aa8cdcaeddfb25bf", "text": "CVE: CVE-2022-0196\n\n[{'lang': 'en', 'value': 'phoronix-test-suite is vulnerable to Cross-Site Request Forgery (CSRF)'}]\n\nFix commit: phoromatic: Some additional input sanitization and starting on some CSRF token handling", "cve_id": "CVE-2022-0196", "title": "CVE-2022-0196", "source": "cvefixes", "timestamp": "2022-01-13", "split": "val"} +{"id": "9d06e64e3011d7c7e57e", "text": "CVE: CVE-2022-24728\n\n[{'lang': 'en', 'value': 'CKEditor4 is an open source what-you-see-is-what-you-get HTML editor. A vulnerability has been discovered in the core HTML processing module and may affect all plugins used by CKEditor 4 prior to version 4.18.0. The vulnerability allows someone to inject malformed HTML bypassing content sanitization, which could result in executing JavaScript code. This problem has been patched in version 4.18.0. There are currently no known workarounds.'}]\n\nFix com", "cve_id": "CVE-2022-24728", "title": "CVE-2022-24728", "source": "cvefixes", "timestamp": "2022-03-16", "split": "val"} +{"id": "4749a4a2ecc2d2bbf6f5", "text": "CVE: CVE-2022-29577\n\n[{'lang': 'en', 'value': 'OWASP AntiSamy before 1.6.7 allows XSS via HTML tag smuggling on STYLE content with crafted input. The output serializer does not properly encode the supposed Cascading Style Sheets (CSS) content. NOTE: this issue exists because of an incomplete fix for CVE-2022-28367.'}]\n\nFix commit: Fix child node removal on style tag processing", "cve_id": "CVE-2022-29577", "title": "CVE-2022-29577", "source": "cvefixes", "timestamp": "2022-04-21", "split": "val"} +{"id": "3f2cd1931d1c888e69f8", "text": "CVE: CVE-2022-0820\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository orchardcms/orchardcore prior to 1.3.0.'}]\n\nFix commit: Fix missing permission checks and encoding. (#11344)", "cve_id": "CVE-2022-0820", "title": "CVE-2022-0820", "source": "cvefixes", "timestamp": "2022-03-11", "split": "val"} +{"id": "e34bd6d36e7c5e957852", "text": "CVE: CVE-2022-2216\n\n[{'lang': 'en', 'value': 'Server-Side Request Forgery (SSRF) in GitHub repository ionicabizau/parse-url prior to 7.0.0.'}]\n\nFix commit: Refactor codebase, upgrade dependencies", "cve_id": "CVE-2022-2216", "title": "CVE-2022-2216", "source": "cvefixes", "timestamp": "2022-06-27", "split": "val"} +{"id": "0d03368c77c93731785d", "text": "CVE: CVE-2022-0928\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository microweber/microweber prior to 1.2.12.'}]\n\nFix commit: upgrade taxes to laravel routers", "cve_id": "CVE-2022-0928", "title": "CVE-2022-0928", "source": "cvefixes", "timestamp": "2022-03-11", "split": "val"} +{"id": "07b437d9f63d09635e33", "text": "CVE: CVE-2022-29186\n\n[{'lang': 'en', 'value': \"Rundeck is an open source automation service with a web console, command line tools and a WebAPI. Rundeck community and rundeck-enterprise docker images contained a pre-generated SSH keypair. If the id_rsa.pub public key of the keypair was copied to authorized_keys files on remote host, those hosts would allow access to anyone with the exposed private credentials. This misconfiguration only impacts Rundeck Docker instances of PagerDuty® Process Aut", "cve_id": "CVE-2022-29186", "title": "CVE-2022-29186", "source": "cvefixes", "timestamp": "2022-05-20", "split": "val"} +{"id": "CVE-2023-21529", "text": "Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability\n\nAffected: Microsoft Exchange Server\n\nMicrosoft Exchange Server contains a deserialization of untrusted data that allows an authenticated attacker to achieve remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploited Vulnerabiliti", "cve_id": "CVE-2023-21529", "title": "Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability", "source": "cisa_kev", "timestamp": "2026-04-13", "split": "val"} +{"id": "9bea22eddf29c0cf8e76", "text": "[Authentication Bypass by Primary Weakness] CVE-2023-27535: FTP too eager connection reuse\n\n## Summary:\nlibcurl FTP(S) protocol will reuse connection even if different `CURLOPT_FTP_ACCOUNT` (libcurl) or `--ftp-account` (curl) is specified for different connections and the server requests account authentication via reply code `332`. It appears that `STRING_FTP_ALTERNATIVE_TO_USER ` (libcurl) or `--ftp-alternative-to-user` (curl) is also affected and should also result in caching being refused.\n\n#", "cve_id": "CVE-2023-27535", "title": "CVE-2023-27535: FTP too eager connection reuse (Authentication Bypass by Primary Weakness)", "source": "hackerone", "timestamp": "2023-03-22", "split": "val"} +{"id": "fb0acace8fd69fab4be7", "text": "CVE: CVE-2022-0525\n\n[{'lang': 'en', 'value': 'Out-of-bounds Read in Homebrew mruby prior to 3.2.'}]\n\nFix commit: codegen.c: stack position may be wrong on assignments.\n\nWhen `[]=` access includes keyword arguments.", "cve_id": "CVE-2022-0525", "title": "CVE-2022-0525", "source": "cvefixes", "timestamp": "2022-02-09", "split": "val"} +{"id": "fd1933d517bbdcfcfe7d", "text": "CVE: CVE-2022-2522\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0061.'}]\n\nFix commit: patch 9.0.0061: ml_get error with nested autocommand\n\nProblem: ml_get error with nested autocommand.\nSolution: Also check line numbers for a nested autocommand. (closes #10761)", "cve_id": "CVE-2022-2522", "title": "CVE-2022-2522", "source": "cvefixes", "timestamp": "2022-07-25", "split": "val"} +{"id": "480b9707c1aeafc815f5", "text": "CVE: CVE-2022-0520\n\n[{'lang': 'en', 'value': 'Use After Free in NPM radare2.js prior to 5.6.2.'}]\n\nFix commit: Fix bins/*/rep8 - UAF crash in pyc parser ##crash\n\n* Reported by Cen Zhang via huntr.dev", "cve_id": "CVE-2022-0520", "title": "CVE-2022-0520", "source": "cvefixes", "timestamp": "2022-02-08", "split": "val"} +{"id": "495695ca02ec069b92b6", "text": "CVE: CVE-2022-31169\n\n[{'lang': 'en', 'value': \"Wasmtime is a standalone runtime for WebAssembly. There is a bug in Wasmtime's code generator, Cranelift, for AArch64 targets where constant divisors can result in incorrect division results at runtime. This affects Wasmtime prior to version 0.38.2 and Cranelift prior to 0.85.2. This issue only affects the AArch64 platform. Other platforms are not affected. The translation rules for constants did not take into account whether sign or zero-extension", "cve_id": "CVE-2022-31169", "title": "CVE-2022-31169", "source": "cvefixes", "timestamp": "2022-07-22", "split": "val"} +{"id": "cacf44032b3acfdee83b", "text": "[Improper Access Control - Generic] Adobe ColdFusion Access Control Bypass - CVE-2023-38205\n\n**Description:**\nHi team,\nThe subdomain https://████ is with adobe ColdFusion vulnerable with CVE-2023-38205.\nThis vulnerability is a bypass path created for CVE-2023-29298.\n\n## References\n\nhttps://www.rapid7.com/blog/post/2023/07/19/cve-2023-38205-adobe-coldfusion-access-control-bypass-fixed/\n\n## Impact\n\nIf an attacker accesses a URL path of /hax/..CFIDE/wizards/common/utils.cfc the access control can b", "cve_id": "CVE-2023-38205", "title": "Adobe ColdFusion Access Control Bypass - CVE-2023-38205 (Improper Access Control - Generic)", "source": "hackerone", "timestamp": "2023-12-21", "split": "val"} +{"id": "506f9e42897d1b874103", "text": "CVE: CVE-2022-1045\n\n[{'lang': 'en', 'value': 'Stored XSS viva .svg file upload in GitHub repository polonel/trudesk prior to v1.2.0.'}]\n\nFix commit: fix(tickets): disable uploading .svg as an attachment", "cve_id": "CVE-2022-1045", "title": "CVE-2022-1045", "source": "cvefixes", "timestamp": "2022-04-11", "split": "val"} +{"id": "5b8f521b323d8e2465e4", "text": "CVE: CVE-2022-29172\n\n[{'lang': 'en', 'value': \"Auth0 is an authentication broker that supports both social and enterprise identity providers, including Active Directory, LDAP, Google Apps, and Salesforce. In versions before `11.33.0`, when the “additional signup fieldsâ€? feature [is configured](https://github.com/auth0/lock#additional-sign-up-fields), a malicious actor can inject invalidated HTML code into these additional fields, which is then stored in the service `user_metdata` payload (us", "cve_id": "CVE-2022-29172", "title": "CVE-2022-29172", "source": "cvefixes", "timestamp": "2022-05-05", "split": "val"} +{"id": "53d4b434551edd24c654", "text": "CVE: CVE-2022-31043\n\n[{'lang': 'en', 'value': \"Guzzle is an open source PHP HTTP client. In affected versions `Authorization` headers on requests are sensitive information. On making a request using the `https` scheme to a server which responds with a redirect to a URI with the `http` scheme, we should not forward the `Authorization` header on. This is much the same as to how we don't forward on the header if the host changes. Prior to this fix, `https` to `http` downgrades did not result in the", "cve_id": "CVE-2022-31043", "title": "CVE-2022-31043", "source": "cvefixes", "timestamp": "2022-06-10", "split": "val"} +{"id": "2150761cef7cb011805d", "text": "CVE: CVE-2022-0964\n\n[{'lang': 'en', 'value': 'Stored XSS viva .webmv file upload in GitHub repository star7th/showdoc prior to 2.10.4.'}]\n\nFix commit: Upload file vulnerability", "cve_id": "CVE-2022-0964", "title": "CVE-2022-0964", "source": "cvefixes", "timestamp": "2022-03-15", "split": "val"} +{"id": "fe57ca9652be68339dd2", "text": "[Cleartext Transmission of Sensitive Information] CVE-2023-23915: HSTS amnesia with --parallel\n\n## Summary:\ncurl overwrites HSTS cache entries if requests are performed in parallel.\n\n## Steps To Reproduce:\n\n 1. `curl --parallel --hsts hsts.txt https://site1.tld https://site2.tld https://site3.tld`\n\nOnly one of the sites contacted will have entry in `hsts.txt` afterwards. Non-TLS connection to the other sites will not protected by TLS.\n\n## Impact\n\nRequest performed over insecure channels unexpe", "cve_id": "CVE-2023-23915", "title": "CVE-2023-23915: HSTS amnesia with --parallel (Cleartext Transmission of Sensitive Information)", "source": "hackerone", "timestamp": "2023-02-15", "split": "val"} +{"id": "508379ebc061763b60d4", "text": "CVE: CVE-2022-23634\n\n[{'lang': 'en', 'value': \"Puma is a Ruby/Rack web server built for parallelism. Prior to `puma` version `5.6.2`, `puma` may not always call `close` on the response body. Rails, prior to version `7.0.2.2`, depended on the response body being closed in order for its `CurrentAttributes` implementation to work correctly. The combination of these two behaviors (Puma not closing the body + Rails' Executor implementation) causes information leakage. This problem is fixed in Puma ve", "cve_id": "CVE-2022-23634", "title": "CVE-2022-23634", "source": "cvefixes", "timestamp": "2022-02-11", "split": "val"} +{"id": "9964dbdf0328ec6cc75d", "text": "CVE: CVE-2022-24448\n\n[{'lang': 'en', 'value': 'An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descriptor.'}]\n\nFix commit: Revert \"NFSv4: Handle the special Linux file open access mode\"\n\nThis reverts commit 44942b4e457beda00981f616402a1a", "cve_id": "CVE-2022-24448", "title": "CVE-2022-24448", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val"} +{"id": "57af2e9425d95ac2ed35", "text": "CVE: CVE-2022-31094\n\n[{'lang': 'en', 'value': 'ScratchTools is a web extension designed to make interacting with the Scratch programming language community (Scratching) easier. In affected versions anybody who uses the Recently Viewed Projects feature is vulnerable to having their account taken over if they view a project that tries to. The issue is that if a user visits a project that includes Javascript in the title, then when the Recently Viewed Projects feature displays it, it could run the", "cve_id": "CVE-2022-31094", "title": "CVE-2022-31094", "source": "cvefixes", "timestamp": "2022-06-27", "split": "val"} +{"id": "ca9661f5eafde1e46c0f", "text": "CVE: CVE-2022-1734\n\n[{'lang': 'en', 'value': 'A flaw in Linux Kernel found in nfcmrvl_nci_unregister_dev() in drivers/nfc/nfcmrvl/main.c can lead to use after free both read or write when non synchronized between cleanup routine and firmware download routine.'}]\n\nFix commit: nfc: nfcmrvl: main: reorder destructive operations in nfcmrvl_nci_unregister_dev to avoid bugs\n\nThere are destructive operations such as nfcmrvl_fw_dnld_abort and\ngpio_free in nfcmrvl_nci_unregister_dev. The resources such a", "cve_id": "CVE-2022-1734", "title": "CVE-2022-1734", "source": "cvefixes", "timestamp": "2022-05-18", "split": "val"} +{"id": "a5087fbb65d05c191c0f", "text": "CVE: CVE-2022-25297\n\n[{'lang': 'en', 'value': 'This affects the package drogonframework/drogon before 1.7.5. The unsafe handling of file names during upload using HttpFile::save() method may enable attackers to write files to arbitrary locations outside the designated target folder.'}]\n\nFix commit: Prevent malformed upload path causing arbitrary write (#1174)", "cve_id": "CVE-2022-25297", "title": "CVE-2022-25297", "source": "cvefixes", "timestamp": "2022-02-21", "split": "val"} +{"id": "c9b705efef6a7597787c", "text": "[Improper Authentication - Generic] CVE-2022-22576: OAUTH2 bearer bypass in connection re-use\n\n## Summary:\nA cached connection authenticated with the OAUTH2 mechanisms can be reused by a subsequent request even if the bearer is not correct.\nThis affects SASL-enabled protcols: SMPTP(S), IMAP(S), POP3(S) and LDAP(S) (openldap only).\n\nAn application that can be accessed by more than one user (such as a webmail server) would be affected by this flaw.\n\n## Steps To Reproduce:\n`curl 'imap://server:port", "cve_id": "CVE-2022-22576", "title": "CVE-2022-22576: OAUTH2 bearer bypass in connection re-use (Improper Authentication - Generic)", "source": "hackerone", "timestamp": "2022-04-29", "split": "val"} +{"id": "e870697b7d48ea6b20b0", "text": "CVE: CVE-2022-29379\n\n[{'lang': 'en', 'value': '** DISPUTED ** Nginx NJS v0.7.3 was discovered to contain a stack overflow in the function njs_default_module_loader at /src/njs/src/njs_module.c. NOTE: multiple third parties dispute this report, e.g., the behavior is only found in unreleased development code that was not part of the 0.7.2, 0.7.3, or 0.7.4 release.'}]\n\nFix commit: Fixed typo while calculating module path length.\n\nThe issue was introduced in 77c398f26d7e (not released yet).", "cve_id": "CVE-2022-29379", "title": "CVE-2022-29379", "source": "cvefixes", "timestamp": "2022-05-25", "split": "val"} +{"id": "731b9b3c788b4b38b1a3", "text": "CVE: CVE-2022-35949\n\n[{'lang': 'en', 'value': 'undici is an HTTP/1.1 client, written from scratch for Node.js.`undici` is vulnerable to SSRF (Server-side Request Forgery) when an application takes in **user input** into the `path/pathname` option of `undici.request`. If a user specifies a URL such as `http://127.0.0.1` or `//127.0.0.1` ```js const undici = require(\"undici\") undici.request({origin: \"http://example.com\", pathname: \"//127.0.0.1\"}) ``` Instead of processing the request as `http://ex", "cve_id": "CVE-2022-35949", "title": "CVE-2022-35949", "source": "cvefixes", "timestamp": "2022-08-12", "split": "val"} +{"id": "CVE-2023-41990", "text": "Apple Multiple Products Code Execution Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, tvOS, and watchOS contain an unspecified vulnerability that allows for code execution when processing a font file.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-41990", "title": "Apple Multiple Products Code Execution Vulnerability", "source": "cisa_kev", "timestamp": "2024-01-08", "split": "val"} +{"id": "CVE-2022-40799", "text": "D-Link DNR-322L Download of Code Without Integrity Check Vulnerability\n\nAffected: D-Link DNR-322L\n\nD-Link DNR-322L contains a download of code without integrity check vulnerability that could allow an authenticated attacker to execute OS level commands on the device. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud", "cve_id": "CVE-2022-40799", "title": "D-Link DNR-322L Download of Code Without Integrity Check Vulnerability", "source": "cisa_kev", "timestamp": "2025-08-05", "split": "val"} +{"id": "dac79bf056aef5518943", "text": "CVE: CVE-2022-1851\n\n[{'lang': 'en', 'value': 'Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.5013: after text formatting cursor may be in an invalid position\n\nProblem: After text formatting the cursor may be in an invalid position.\nSolution: Correct the cursor position after formatting.", "cve_id": "CVE-2022-1851", "title": "CVE-2022-1851", "source": "cvefixes", "timestamp": "2022-05-25", "split": "val"} +{"id": "e9ac12985d35f715f564", "text": "CVE: CVE-2022-28451\n\n[{'lang': 'en', 'value': 'nopCommerce 4.50.1 is vulnerable to Directory Traversal via the backup file in the Maintenance feature.'}]\n\nFix commit: Fixed a possible issue with database backup filenames", "cve_id": "CVE-2022-28451", "title": "CVE-2022-28451", "source": "cvefixes", "timestamp": "2022-05-02", "split": "val"} +{"id": "aa02ba49a8196b360d06", "text": "CVE: CVE-2022-23619\n\n[{'lang': 'en', 'value': 'XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions it\\'s possible to guess if a user has an account on the wiki by using the \"Forgot your password\" form, even if the wiki is closed to guest users. This problem has been patched on XWiki 12.10.9, 13.4.1 and 13.6RC1. Users are advised yo update. There are no known workarounds for this issue.'}]\n\nFix commit: XWIKI-18787: Authenti", "cve_id": "CVE-2022-23619", "title": "CVE-2022-23619", "source": "cvefixes", "timestamp": "2022-02-09", "split": "val"} +{"id": "6ec2cee887eb79b018f9", "text": "[Insufficiently Protected Credentials] CVE-2022-27776: Auth/cookie leak on redirect\n\n## Summary:\ncurl/libcurl can be coaxed to leak Authorization / Cookie headers by redirecting request to http:// URL on the same host. Successful exploitation requires that the attacker can either Man-in-the-Middle the connection or can access the traffic at the recipient side (for example by redirecting to a non-privileged port such as 9999 on the same host).\n\n## Steps To Reproduce:\n\n1. Configure for example Apa", "cve_id": "CVE-2022-27776", "title": "CVE-2022-27776: Auth/cookie leak on redirect (Insufficiently Protected Credentials)", "source": "hackerone", "timestamp": "2022-04-29", "split": "val"} +{"id": "8e77093108c597902835", "text": "CVE: CVE-2022-1296\n\n[{'lang': 'en', 'value': 'Out-of-bounds read in `r_bin_ne_get_relocs` function in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability may allow attackers to read sensitive information or cause a crash.'}]\n\nFix commit: Fix oobread in NE parser ##crash\n\n* Reported by @hmsec via huntr.dev\n* Reproducer: necrash\n* BountyID: 52b57274-0e1a-4d61-ab29-1373b555fea0/", "cve_id": "CVE-2022-1296", "title": "CVE-2022-1296", "source": "cvefixes", "timestamp": "2022-04-11", "split": "val"} +{"id": "8967aa9330a648170427", "text": "CVE: CVE-2022-31147\n\n[{'lang': 'en', 'value': 'The jQuery Validation Plugin (jquery-validation) provides drop-in validation for forms. Versions of jquery-validation prior to 1.19.5 are vulnerable to regular expression denial of service (ReDoS) when an attacker is able to supply arbitrary input to the url2 method. This is due to an incomplete fix for CVE-2021-43306. Users should upgrade to version 1.19.5 to receive a patch.'}]\n\nFix commit: Merge pull request from GHSA-ffmh-x56j-9rc3\n\n(cherry pick", "cve_id": "CVE-2022-31147", "title": "CVE-2022-31147", "source": "cvefixes", "timestamp": "2022-07-14", "split": "val"} +{"id": "CVE-2023-0669", "text": "Fortra GoAnywhere MFT Remote Code Execution Vulnerability\n\nAffected: Fortra GoAnywhere MFT\n\nFortra (formerly, HelpSystems) GoAnywhere MFT contains a pre-authentication remote code execution vulnerability in the License Response Servlet due to deserializing an attacker-controlled object.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-0669", "title": "Fortra GoAnywhere MFT Remote Code Execution Vulnerability", "source": "cisa_kev", "timestamp": "2023-02-10", "split": "val"} +{"id": "00485d73fa40bffccfb2", "text": "CVE: CVE-2022-0753\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Reflected in GitHub repository hestiacp/hestiacp prior to 1.5.9.'}]\n\nFix commit: Fix XXS issues (#2432)\n\n* XSS patches\r\n\r\n* Reslove XSS vulnrebilty\r\n\r\n* Resolve XSS vulnrebility\r\n\r\n* Prevent showing edit form from non exsiting records\r\n\r\n* Improve error handling message\r\n\r\nCreate a function\r\n\r\n* Make sure $user from $_SESSION is escapeshellarg\r\n\r\nPrevent double escapeshellarg in Edit/web/index\r\n\r\n* Enable translateable er", "cve_id": "CVE-2022-0753", "title": "CVE-2022-0753", "source": "cvefixes", "timestamp": "2022-03-03", "split": "val"} +{"id": "8cefd040920e428ca450", "text": "CVE: CVE-2022-22110\n\n[{'lang': 'en', 'value': 'In Daybyday CRM, versions 1.1 through 2.2.0 enforce weak password requirements in the user update functionality. A user with privileges to update his password could change it to a weak password, such as those with a length of a single character. This may allow an attacker to brute-force users’ passwords with minimal to no computational effort.'}]\n\nFix commit: password change requires 6 on update, and only allowed users can see calendar", "cve_id": "CVE-2022-22110", "title": "CVE-2022-22110", "source": "cvefixes", "timestamp": "2022-01-05", "split": "val"} +{"id": "48bc6f806a72a7fb0470", "text": "CVE: CVE-2022-0523\n\n[{'lang': 'en', 'value': 'Expired Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.2.'}]\n\nFix commit: Fix UAF in pyc parser ##crash\n\n* Reported by Cen Zhang via huntr.dev\n* Reproducer: bins/fuzzed/harep2.pyc", "cve_id": "CVE-2022-0523", "title": "CVE-2022-0523", "source": "cvefixes", "timestamp": "2022-02-08", "split": "val"} +{"id": "a1e0e128bebef0297cc9", "text": "CVE: CVE-2022-2820\n\n[{'lang': 'en', 'value': 'Improper Access Control in GitHub repository namelessmc/nameless prior to v2.0.2.'}]\n\nFix commit: Rework user sessions system (#3000)\n\nCo-authored-by: samerton ", "cve_id": "CVE-2022-2820", "title": "CVE-2022-2820", "source": "cvefixes", "timestamp": "2022-08-15", "split": "val"} +{"id": "11079f3c55a582d534b0", "text": "CVE: CVE-2022-1996\n\n[{'lang': 'en', 'value': 'Authorization Bypass Through User-Controlled Key in GitHub repository emicklei/go-restful prior to v3.8.0.'}]\n\nFix commit: use exact matching of allowed domain entries, issue #489 (#493)\n\n* use exact matching of allowed domain entries, issue #489\r\n\r\n* update doc, add testcases from PR conversation\r\n\r\n* introduce AllowedDomainFunc #489\r\n\r\n* more tests, fix doc\r\n\r\n* lowercase origin before checking cors", "cve_id": "CVE-2022-1996", "title": "CVE-2022-1996", "source": "cvefixes", "timestamp": "2022-06-08", "split": "val"} +{"id": "d0096e2356ed80760435", "text": "CVE: CVE-2022-0393\n\n[{'lang': 'en', 'value': 'Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.4233: crash when recording and using Select mode\n\nProblem: Crash when recording and using Select mode.\nSolution: When deleting the last recorded character check there is something\n to delete.", "cve_id": "CVE-2022-0393", "title": "CVE-2022-0393", "source": "cvefixes", "timestamp": "2022-01-28", "split": "val"} +{"id": "892cf255453fa21f6723", "text": "CVE: CVE-2022-31025\n\n[{'lang': 'en', 'value': 'Discourse is an open source platform for community discussion. Prior to version 2.8.4 on the `stable` branch and 2.9.0beta5 on the `beta` and `tests-passed` branches, inviting users on sites that use single sign-on could bypass the `must_approve_users` check and invites by staff are always approved automatically. The issue is patched in Discourse version 2.8.4 on the `stable` branch and version `2.9.0.beta5` on the `beta` and `tests-passed` branches", "cve_id": "CVE-2022-31025", "title": "CVE-2022-31025", "source": "cvefixes", "timestamp": "2022-06-07", "split": "val"} +{"id": "88737addda14f294651f", "text": "CVE: CVE-2022-21675\n\n[{'lang': 'en', 'value': 'Bytecode Viewer (BCV) is a Java/Android reverse engineering suite. Versions of the package prior to 2.11.0 are vulnerable to Arbitrary File Write via Archive Extraction (AKA \"Zip Slip\"). The vulnerability is exploited using a specially crafted archive that holds directory traversal filenames (e.g. ../../evil.exe). The Zip Slip vulnerability can affect numerous archive formats, including zip, jar, tar, war, cpio, apk, rar and 7z. The attacker can the", "cve_id": "CVE-2022-21675", "title": "CVE-2022-21675", "source": "cvefixes", "timestamp": "2022-01-12", "split": "val"} +{"id": "cd47f0444ae6f8b76052", "text": "CVE: CVE-2022-0379\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in Packagist microweber/microweber prior to 1.2.11.'}]\n\nFix commit: update", "cve_id": "CVE-2022-0379", "title": "CVE-2022-0379", "source": "cvefixes", "timestamp": "2022-01-26", "split": "val"} +{"id": "6e61ddd660b1196a0e65", "text": "CVE: CVE-2022-1353\n\n[{'lang': 'en', 'value': 'A vulnerability was found in the pfkey_register function in net/key/af_key.c in the Linux kernel. This flaw allows a local, unprivileged user to gain access to kernel memory, leading to a system crash or a leak of internal kernel information.'}]\n\nFix commit: af_key: add __GFP_ZERO flag for compose_sadb_supported in function pfkey_register\n\nAdd __GFP_ZERO flag for compose_sadb_supported in function pfkey_register\nto initialize the buffer of supp_skb t", "cve_id": "CVE-2022-1353", "title": "CVE-2022-1353", "source": "cvefixes", "timestamp": "2022-04-29", "split": "val"} +{"id": "7855e34ae1509624ac33", "text": "CVE: CVE-2022-0506\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in Packagist microweber/microweber prior to 1.2.11.'}]\n\nFix commit: add css middleware", "cve_id": "CVE-2022-0506", "title": "CVE-2022-0506", "source": "cvefixes", "timestamp": "2022-02-08", "split": "val"} +{"id": "CVE-2022-4262", "text": "Google Chromium V8 Type Confusion Vulnerability\n\nAffected: Google Chromium V8\n\nGoogle Chromium V8 Engine contains a type confusion vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-122, CWE-843\n\n[Source: CISA Known Exploit", "cve_id": "CVE-2022-4262", "title": "Google Chromium V8 Type Confusion Vulnerability", "source": "cisa_kev", "timestamp": "2022-12-05", "split": "val"} +{"id": "CVE-2022-26486", "text": "Mozilla Firefox Use-After-Free Vulnerability\n\nAffected: Mozilla Firefox\n\nMozilla Firefox contains a use-after-free vulnerability in WebGPU IPC Framework which can be exploited to perform arbitrary code execution.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-26486", "title": "Mozilla Firefox Use-After-Free Vulnerability", "source": "cisa_kev", "timestamp": "2022-03-07", "split": "val"} +{"id": "CVE-2023-32373", "text": "Apple Multiple Products WebKit Use-After-Free Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, tvOS, watchOS, and Safari WebKit contain a use-after-free vulnerability that leads to code execution when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.\n\nRequired Action: Apply updates per vendor instructions.\n\nC", "cve_id": "CVE-2023-32373", "title": "Apple Multiple Products WebKit Use-After-Free Vulnerability", "source": "cisa_kev", "timestamp": "2023-05-22", "split": "val"} +{"id": "6d4cf986fbc4eb93a571", "text": "CVE: CVE-2022-23593\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The `simplifyBroadcast` function in the MLIR-TFRT infrastructure in TensorFlow is vulnerable to a segfault (hence, denial of service), if called with scalar shapes. If all shapes are scalar, then `maxRank` is 0, so we build an empty `SmallVector`. The fix will be included in TensorFlow 2.8.0. This is the only affected version.'}]\n\nFix commit: Avoid Segfault for scalar shapes.\n\nCalling tensor::", "cve_id": "CVE-2022-23593", "title": "CVE-2022-23593", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val"} +{"id": "CVE-2023-33106", "text": "Qualcomm Multiple Chipsets Use of Out-of-Range Pointer Offset Vulnerability\n\nAffected: Qualcomm Multiple Chipsets\n\nMultiple Qualcomm chipsets contain a use of out-of-range pointer offset vulnerability due to memory corruption in Graphics while submitting a large list of sync points in an AUX command to the IOCTL_KGSL_GPU_AUX_COMMAND.\n\nRequired Action: Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable.\n\nCWE(s)", "cve_id": "CVE-2023-33106", "title": "Qualcomm Multiple Chipsets Use of Out-of-Range Pointer Offset Vulnerability", "source": "cisa_kev", "timestamp": "2023-12-05", "split": "val"} +{"id": "2e5e5f57fa63abf2a4dc", "text": "CVE: CVE-2022-31051\n\n[{'lang': 'en', 'value': 'semantic-release is an open source npm package for automated version management and package publishing. In affected versions secrets that would normally be masked by semantic-release can be accidentally disclosed if they contain characters that are excluded from uri encoding by `encodeURI`. Occurrence is further limited to execution contexts where push access to the related repository is not available without modifying the repository url to inject c", "cve_id": "CVE-2022-31051", "title": "CVE-2022-31051", "source": "cvefixes", "timestamp": "2022-06-09", "split": "val"} +{"id": "673e9e816d88a2678e53", "text": "CVE: CVE-2022-1440\n\n[{'lang': 'en', 'value': 'Command Injection vulnerability in git-interface@2.1.1 in GitHub repository yarkeev/git-interface prior to 2.1.2. If both are provided by user input, then the use of a `--upload-pack` command-line argument feature of git is also supported for `git clone`, which would then allow for any operating system command to be spawned by the attacker.'}]\n\nFix commit: fix potential vulnerability with git clone", "cve_id": "CVE-2022-1440", "title": "CVE-2022-1440", "source": "cvefixes", "timestamp": "2022-04-22", "split": "val"} +{"id": "e23ecac0c93e4c819c7e", "text": "CVE: CVE-2022-2286\n\n[{'lang': 'en', 'value': 'Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.'}]\n\nFix commit: patch 9.0.0020: with some completion reading past end of string\n\nProblem: With some completion reading past end of string.\nSolution: Check the length of the string.", "cve_id": "CVE-2022-2286", "title": "CVE-2022-2286", "source": "cvefixes", "timestamp": "2022-07-02", "split": "val"} +{"id": "4202bb1c20507ba42cc9", "text": "CVE: CVE-2022-1213\n\n[{'lang': 'en', 'value': 'SSRF filter bypass port 80, 433 in GitHub repository livehelperchat/livehelperchat prior to 3.67v. An attacker could make the application perform arbitrary requests, bypass CVE-2022-1191'}]\n\nFix commit: fix #1752", "cve_id": "CVE-2022-1213", "title": "CVE-2022-1213", "source": "cvefixes", "timestamp": "2022-04-05", "split": "val"} +{"id": "394661dafd62f97e5ae4", "text": "CVE: CVE-2022-1784\n\n[{'lang': 'en', 'value': 'Server-Side Request Forgery (SSRF) in GitHub repository jgraph/drawio prior to 18.0.8.'}]\n\nFix commit: 18.0.7 release", "cve_id": "CVE-2022-1784", "title": "CVE-2022-1784", "source": "cvefixes", "timestamp": "2022-05-20", "split": "val"} +{"id": "32a2c9433311a7da6930", "text": "CVE: CVE-2022-22107\n\n[{'lang': 'en', 'value': 'In Daybyday CRM, versions 2.0.0 through 2.2.0 are vulnerable to Missing Authorization. An attacker that has the lowest privileges account (employee type user), can view the appointments of all users in the system including administrators. However, this type of user is not authorized to view the calendar at all.'}]\n\nFix commit: password change requires 6 on update, and only allowed users can see calendar", "cve_id": "CVE-2022-22107", "title": "CVE-2022-22107", "source": "cvefixes", "timestamp": "2022-01-05", "split": "val"} +{"id": "836323cf215a782024d5", "text": "CVE: CVE-2022-24437\n\n[{'lang': 'en', 'value': 'The package git-pull-or-clone before 2.0.2 are vulnerable to Command Injection due to the use of the --upload-pack feature of git which is also supported for git clone. The source includes the use of the secure child process API spawn(). However, the outpath parameter passed to it may be a command-line argument to the git clone command and result in arbitrary command injection.'}]\n\nFix commit: fix: fix command injection vector", "cve_id": "CVE-2022-24437", "title": "CVE-2022-24437", "source": "cvefixes", "timestamp": "2022-05-01", "split": "val"} +{"id": "bc96a276c40937a8a4dd", "text": "CVE: CVE-2022-0932\n\n[{'lang': 'en', 'value': 'Improper Authorization in GitHub repository saleor/saleor prior to 3.1.2.'}]\n\nFix commit: Require manage orders for fetching `user.orders` (#9128)\n\n* Require manage orders for fetching customer.orders\r\n\r\n* Update changelog\r\n\r\nCo-authored-by: Marcin Gębala <5421321+maarcingebala@users.noreply.github.com>", "cve_id": "CVE-2022-0932", "title": "CVE-2022-0932", "source": "cvefixes", "timestamp": "2022-03-11", "split": "val"} +{"id": "d5e14169f73d1c18cc8c", "text": "CVE: CVE-2022-0622\n\n[{'lang': 'en', 'value': 'Generation of Error Message Containing Sensitive Information in Packagist snipe/snipe-it prior to 5.3.11.'}]\n\nFix commit: Added usleep :(\n\nSigned-off-by: snipe ", "cve_id": "CVE-2022-0622", "title": "CVE-2022-0622", "source": "cvefixes", "timestamp": "2022-02-17", "split": "val"} +{"id": "22ba2019b40bf43a9bb0", "text": "CVE: CVE-2022-23582\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a denial of service by altering a `SavedModel` such that `TensorByteSize` would trigger `CHECK` failures. `TensorShape` constructor throws a `CHECK`-fail if shape is partial or has a number of elements that would overflow the size of an `int`. The `PartialTensorShape` constructor instead does not cause a `CHECK`-abort if the shape is partial, which is exactly what th", "cve_id": "CVE-2022-23582", "title": "CVE-2022-23582", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val"} +{"id": "9c98f39a49c7dc12e8c2", "text": "CVE: CVE-2022-1754\n\n[{'lang': 'en', 'value': 'Integer Overflow or Wraparound in GitHub repository polonel/trudesk prior to 1.2.2.'}]\n\nFix commit: fix(account): security fix", "cve_id": "CVE-2022-1754", "title": "CVE-2022-1754", "source": "cvefixes", "timestamp": "2022-05-20", "split": "val"} +{"id": "64964d59c175c2b4ae20", "text": "[Code Injection] CVE-2022-21831: Possible code injection vulnerability in Rails / Active Storage\n\nOriginal report: https://hackerone.com/reports/1154034\nRails advisory: https://discuss.rubyonrails.org/t/cve-2022-21831-possible-code-injection-vulnerability-in-rails-active-storage/80199\nBlogpost: https://blog.convisoappsec.com/en/cve-2022-21831-overview-of-the-security-issues-we-found-in-railss-image-processing-api/\n\nIf the report is eligible for a bounty, please split it equally between me and @r", "cve_id": "CVE-2022-21831", "title": "CVE-2022-21831: Possible code injection vulnerability in Rails / Active Storage (Code Injection)", "source": "hackerone", "timestamp": "2022-09-10", "split": "val"} +{"id": "371465c0ff9ca16f4fea", "text": "CVE: CVE-2022-21189\n\n[{'lang': 'en', 'value': 'The package dexie before 3.2.2, from 4.0.0-alpha.1 and before 4.0.0-alpha.3 are vulnerable to Prototype Pollution in the Dexie.setByKeyPath(obj, keyPath, value) function which does not properly check the keys being set (like __proto__ or constructor). This can allow an attacker to add/modify properties of the Object.prototype leading to prototype pollution vulnerability. **Note:** This vulnerability can occur in multiple ways, for example when modif", "cve_id": "CVE-2022-21189", "title": "CVE-2022-21189", "source": "cvefixes", "timestamp": "2022-05-01", "split": "val"} +{"id": "3fb25796e1cc6d472413", "text": "CVE: CVE-2022-21671\n\n[{'lang': 'en', 'value': \"@replit/crosis is a JavaScript client that speaks Replit's container protocol. A vulnerability that involves exposure of sensitive information exists in versions prior to 7.3.1. When using this library as a way to programmatically communicate with Replit in a standalone fashion, if there are multiple failed attempts to contact Replit through a WebSocket, the library will attempt to communicate using a fallback poll-based proxy. The URL of the proxy", "cve_id": "CVE-2022-21671", "title": "CVE-2022-21671", "source": "cvefixes", "timestamp": "2022-01-11", "split": "val"} +{"id": "bbca8d57f39fcc1825b8", "text": "CVE: CVE-2022-29810\n\n[{'lang': 'en', 'value': 'The Hashicorp go-getter library before 1.5.11 does not redact an SSH key from a URL query parameter.'}]\n\nFix commit: Redact SSH key from URL query parameter\n\nSigned-off-by: Guilherme Macedo ", "cve_id": "CVE-2022-29810", "title": "CVE-2022-29810", "source": "cvefixes", "timestamp": "2022-04-27", "split": "val"} +{"id": "97aebfa479f0da06290c", "text": "CVE: CVE-2022-28368\n\n[{'lang': 'en', 'value': 'Dompdf 1.2.1 allows remote code execution via a .php file in the src:url field of an @font-face Cascading Style Sheets (CSS) statement (within an HTML input file).'}]\n\nFix commit: Match installed font filename extension to type\n\nfixes #2598", "cve_id": "CVE-2022-28368", "title": "CVE-2022-28368", "source": "cvefixes", "timestamp": "2022-04-03", "split": "val"} +{"id": "21b0f7d8908ceb2acd9c", "text": "[Insufficiently Protected Credentials] CVE-2022-27774: Credential leak on redirect\n\n## Summary:\nCurl can be coaxed to leak user credentials to third-party host by issuing HTTP redirect to ftp:// URL.\n\n## Steps To Reproduce:\n\n 1. Configure for example Apache2 on `firstsite.tld` to perform redirect with mod_rewrite:\n ```\n RewriteCond %{HTTP_USER_AGENT} \"^curl/\"\n RewriteRule ^/redirectpoc ftp://secondsite.tld:9999 [R=301,L]\n ```\n 2. Capture credentials at `secondsite.tld` for exampl", "cve_id": "CVE-2022-27774", "title": "CVE-2022-27774: Credential leak on redirect (Insufficiently Protected Credentials)", "source": "hackerone", "timestamp": "2022-04-27", "split": "val"} +{"id": "cbaca5b60caedcf516e0", "text": "[Cleartext Transmission of Sensitive Information] CVE-2022-43551: Another HSTS bypass via IDN\n\n## Summary:\nI found an issue similar to CVE-2022-42916 again.\nSince the phenomenon is the same, I will describe the same as last time.\n\nHSTS checks are bypassed if any character in the IDN convert(Nameprep) to a '.'\nfor example\"。\"(UTF-8:E38082).\nI think there are other characters that become \".(UTF-8:2E)\" as a result of converting with IDN.\n\nThis is because the host name before IDN conversion is used w", "cve_id": "CVE-2022-43551", "title": "CVE-2022-43551: Another HSTS bypass via IDN (Cleartext Transmission of Sensitive Information)", "source": "hackerone", "timestamp": "2022-12-21", "split": "val"} +{"id": "833d06b474bbe0004b85", "text": "CVE: CVE-2022-35153\n\n[{'lang': 'en', 'value': 'FusionPBX 5.0.1 was discovered to contain a command injection vulnerability via /fax/fax_send.php.'}]\n\nFix commit: Add escapeshellarg to the variables used in the command line.", "cve_id": "CVE-2022-35153", "title": "CVE-2022-35153", "source": "cvefixes", "timestamp": "2022-08-18", "split": "val"} +{"id": "3324d0a7667fe8730de4", "text": "CVE: CVE-2022-0890\n\n[{'lang': 'en', 'value': 'NULL Pointer Dereference in GitHub repository mruby/mruby prior to 3.2.'}]\n\nFix commit: fiber.c: should pack 15+ arguments in an array.", "cve_id": "CVE-2022-0890", "title": "CVE-2022-0890", "source": "cvefixes", "timestamp": "2022-03-10", "split": "val"} +{"id": "CVE-2023-7028", "text": "GitLab Community and Enterprise Editions Improper Access Control Vulnerability\n\nAffected: GitLab GitLab CE/EE\n\nGitLab Community and Enterprise Editions contain an improper access control vulnerability. This allows an attacker to trigger password reset emails to be sent to an unverified email address to ultimately facilitate an account takeover.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-284\n\n[Source:", "cve_id": "CVE-2023-7028", "title": "GitLab Community and Enterprise Editions Improper Access Control Vulnerability", "source": "cisa_kev", "timestamp": "2024-05-01", "split": "val"} +{"id": "8e80a3724e0a38bd738a", "text": "CVE: CVE-2022-31081\n\n[{'lang': 'en', 'value': \"HTTP::Daemon is a simple http server class written in perl. Versions prior to 6.15 are subject to a vulnerability which could potentially be exploited to gain privileged access to APIs or poison intermediate caches. It is uncertain how large the risks are, most Perl based applications are served on top of Nginx or Apache, not on the `HTTP::Daemon`. This library is commonly used for local development and tests. Users are advised to update to resolve", "cve_id": "CVE-2022-31081", "title": "CVE-2022-31081", "source": "cvefixes", "timestamp": "2022-06-27", "split": "val"} +{"id": "03fb3165cb248fda2e53", "text": "CVE: CVE-2022-1650\n\n[{'lang': 'en', 'value': 'Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository eventsource/eventsource prior to v2.0.2.'}]\n\nFix commit: fix: strip sensitive headers on redirect to different origin", "cve_id": "CVE-2022-1650", "title": "CVE-2022-1650", "source": "cvefixes", "timestamp": "2022-05-12", "split": "val"} +{"id": "568c69fa6f262439282c", "text": "CVE: CVE-2022-23065\n\n[{'lang': 'en', 'value': 'In Vendure versions 0.1.0-alpha.2 to 1.5.1 are affected by Stored XSS vulnerability, where an attacker having catalog permission can upload a SVG file that contains malicious JavaScript into the “Assets” tab. The uploaded file will affect administrators as well as regular users.'}]\n\nFix commit: fix(asset-server-plugin): Fix svg XSS vulnerability\n\nIt was discovered that a malicious SVG file containing javascript could be executed when opening the\nsou", "cve_id": "CVE-2022-23065", "title": "CVE-2022-23065", "source": "cvefixes", "timestamp": "2022-05-02", "split": "val"} +{"id": "bb5ad11562e514518204", "text": "CVE: CVE-2022-23611\n\n[{'lang': 'en', 'value': 'iTunesRPC-Remastered is a Discord Rich Presence for iTunes on Windows utility. In affected versions iTunesRPC-Remastered did not properly sanitize image file paths leading to OS level command injection. This issue has been patched in commit cdcd48b. Users are advised to upgrade.'}]\n\nFix commit: small fix", "cve_id": "CVE-2022-23611", "title": "CVE-2022-23611", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val"} +{"id": "CVE-2022-36804", "text": "Atlassian Bitbucket Server and Data Center Command Injection Vulnerability\n\nAffected: Atlassian Bitbucket Server and Data Center\n\nMultiple API endpoints of Atlassian Bitbucket Server and Data Center contain a command injection vulnerability where an attacker with access to a public Bitbucket repository, or with read permissions to a private one, can execute code by sending a malicious HTTP request.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-78, CWE-88, CWE-158\n\n[Source", "cve_id": "CVE-2022-36804", "title": "Atlassian Bitbucket Server and Data Center Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2022-09-30", "split": "val"} +{"id": "9fbda01109b377ada822", "text": "[Business Logic Errors] CVE-2023-27533: TELNET option IAC injection\n\ncurl supports communicating using the TELNET protocol and as a part of this it offers users to pass on user name and \"telnet options\" for the server negotiation.\n\nDue to lack of proper input scrubbing and without it being the documented functionality, curl would pass on user name and telnet options to the server as provided. This could allow users to pass in carefully crafted content that pass on content or do option negotiatio", "cve_id": "CVE-2023-27533", "title": "CVE-2023-27533: TELNET option IAC injection (Business Logic Errors)", "source": "hackerone", "timestamp": "2023-03-20", "split": "val"} +{"id": "e737f2c847e43ab5ee01", "text": "CVE: CVE-2022-31055\n\n[{'lang': 'en', 'value': 'kCTF is a Kubernetes-based infrastructure for capture the flag (CTF) competitions. Prior to version 1.6.0, the kctf cluster set-src-ip-ranges was broken and allowed traffic from any IP. The problem has been patched in v1.6.0. As a workaround, those who want to test challenges privately can mark them as `public: false` and use `kctf chal debug port-forward` to connect.'}]\n\nFix commit: Fix src ranges (#371)\n\n* only delete the deployment on ip range up", "cve_id": "CVE-2022-31055", "title": "CVE-2022-31055", "source": "cvefixes", "timestamp": "2022-06-13", "split": "val"} +{"id": "4a8147387248a006e321", "text": "CVE: CVE-2022-31019\n\n[{'lang': 'en', 'value': 'Vapor is a server-side Swift HTTP web framework. When using automatic content decoding an attacker can craft a request body that can make the server crash with the following request: `curl -d \"array[_0][0][array][_0][0][array]$(for f in $(seq 1100); do echo -n \\'[_0][0][array]\\'; done)[string][_0]=hello%20world\" http://localhost:8080/foo`. The issue is unbounded, attacker controlled stack growth which will at some point lead to a stack overflow and", "cve_id": "CVE-2022-31019", "title": "CVE-2022-31019", "source": "cvefixes", "timestamp": "2022-06-09", "split": "val"} +{"id": "d37f9fd85554a449521a", "text": "CVE: CVE-2022-24949\n\n[{'lang': 'en', 'value': 'A privilege escalation to root exists in Eternal Terminal prior to version 6.2.0. This is due to the combination of a race condition, buffer overflow, and logic bug all in PipeSocketHandler::listen().'}]\n\nFix commit: red fixes (#468)\n\n* red fixes\r\n\r\n* remove magic number", "cve_id": "CVE-2022-24949", "title": "CVE-2022-24949", "source": "cvefixes", "timestamp": "2022-08-16", "split": "val"} +{"id": "CVE-2023-4863", "text": "Google Chromium WebP Heap-Based Buffer Overflow Vulnerability\n\nAffected: Google Chromium WebP\n\nGoogle Chromium WebP contains a heap-based buffer overflow vulnerability that allows a remote attacker to perform an out-of-bounds memory write via a crafted HTML page. This vulnerability can affect applications that use the WebP Codec.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-787\n\n[Source: CISA Known Expl", "cve_id": "CVE-2023-4863", "title": "Google Chromium WebP Heap-Based Buffer Overflow Vulnerability", "source": "cisa_kev", "timestamp": "2023-09-13", "split": "val"} +{"id": "82307cc845d4d6d6c991", "text": "CVE: CVE-2022-0860\n\n[{'lang': 'en', 'value': 'Improper Authorization in GitHub repository cobbler/cobbler prior to 3.3.2.'}]\n\nFix commit: Merge pull request from GHSA-mcg6-h362-cmq5\n\nSecurity: Fix CVE-2022-0860", "cve_id": "CVE-2022-0860", "title": "CVE-2022-0860", "source": "cvefixes", "timestamp": "2022-03-11", "split": "val"} +{"id": "CVE-2022-26485", "text": "Mozilla Firefox Use-After-Free Vulnerability\n\nAffected: Mozilla Firefox\n\nMozilla Firefox contains a use-after-free vulnerability in XSLT parameter processing which can be exploited to perform arbitrary code execution.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-26485", "title": "Mozilla Firefox Use-After-Free Vulnerability", "source": "cisa_kev", "timestamp": "2022-03-07", "split": "val"} +{"id": "6a194376224b6f2a6672", "text": "CVE: CVE-2022-0409\n\n[{'lang': 'en', 'value': 'Unrestricted Upload of File with Dangerous Type in Packagist showdoc/showdoc prior to 2.10.2.'}]\n\nFix commit: File upload vulnerability", "cve_id": "CVE-2022-0409", "title": "CVE-2022-0409", "source": "cvefixes", "timestamp": "2022-02-19", "split": "val"} +{"id": "2d642adad68cfacfa671", "text": "CVE: CVE-2022-0965\n\n[{'lang': 'en', 'value': 'Stored XSS viva .ofd file upload in GitHub repository star7th/showdoc prior to 2.10.4.'}]\n\nFix commit: Upload file vulnerability", "cve_id": "CVE-2022-0965", "title": "CVE-2022-0965", "source": "cvefixes", "timestamp": "2022-03-15", "split": "val"} +{"id": "a094d325b58581baf2b4", "text": "CVE: CVE-2022-1711\n\n[{'lang': 'en', 'value': 'Server-Side Request Forgery (SSRF) in GitHub repository jgraph/drawio prior to 18.0.5.'}]\n\nFix commit: Adds isLinkLocalAddress() to address checks", "cve_id": "CVE-2022-1711", "title": "CVE-2022-1711", "source": "cvefixes", "timestamp": "2022-05-17", "split": "val"} +{"id": "1d2272adcdffc38e0883", "text": "CVE: CVE-2022-27816\n\n[{'lang': 'en', 'value': 'SWHKD 1.1.5 unsafely uses the /tmp/swhks.pid pathname. There can be data loss or a denial of service.'}]\n\nFix commit: [patch] CVE-2022-27816", "cve_id": "CVE-2022-27816", "title": "CVE-2022-27816", "source": "cvefixes", "timestamp": "2022-03-30", "split": "val"} +{"id": "27369b220b78760bd0c3", "text": "CVE: CVE-2022-1620\n\n[{'lang': 'en', 'value': 'NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 in GitHub repository vim/vim prior to 8.2.4901. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 allows attackers to cause a denial of service (application crash) via a crafted input.'}]\n\nFix commit: patch 8.2.4901: NULL pointer access when using invalid pattern\n\nProblem: NULL pointer access when using invalid pattern.\nSolution: Check for failed rege", "cve_id": "CVE-2022-1620", "title": "CVE-2022-1620", "source": "cvefixes", "timestamp": "2022-05-08", "split": "val"} +{"id": "CVE-2023-33107", "text": "Qualcomm Multiple Chipsets Integer Overflow Vulnerability\n\nAffected: Qualcomm Multiple Chipsets\n\nMultiple Qualcomm chipsets contain an integer overflow vulnerability due to memory corruption in Graphics Linux while assigning shared virtual memory region during IOCTL call.\n\nRequired Action: Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable.\n\nCWE(s): CWE-190\n\n[Source: CISA Known Exploited Vulnerabilities Catalo", "cve_id": "CVE-2023-33107", "title": "Qualcomm Multiple Chipsets Integer Overflow Vulnerability", "source": "cisa_kev", "timestamp": "2023-12-05", "split": "val"} +{"id": "3b9f4177655ef562b0b5", "text": "[Unknown] [CVE-2023-27539] Possible Denial of Service Vulnerability in Rack’s header parsing\n\nI made a report and patch at https://hackerone.com/reports/1887373 .\n\nhttps://discuss.rubyonrails.org/t/cve-2023-27539-possible-denial-of-service-vulnerability-in-racks-header-parsing/82466\n\n> There is a denial of service vulnerability in the header parsing component of Rack. This vulnerability has been assigned the CVE identifier CVE-2023-27539.\n\n## Impact\n\n> Carefully crafted input can cause header pa", "cve_id": "CVE-2023-27539", "title": "[CVE-2023-27539] Possible Denial of Service Vulnerability in Rack’s header parsing (Unknown)", "source": "hackerone", "timestamp": "2023-08-15", "split": "val"} +{"id": "8c4ff036e34d03562b8b", "text": "CVE: CVE-2022-24375\n\n[{'lang': 'en', 'value': 'The package node-opcua before 2.74.0 are vulnerable to Denial of Service (DoS) when bypassing the limitations for excessive memory consumption by sending multiple CloseSession requests with the deleteSubscription parameter equal to False.'}]\n\nFix commit: server: use ServiceFault on request error", "cve_id": "CVE-2022-24375", "title": "CVE-2022-24375", "source": "cvefixes", "timestamp": "2022-08-24", "split": "val"} +{"id": "CVE-2023-35674", "text": "Android Framework Privilege Escalation Vulnerability\n\nAffected: Android Framework\n\nAndroid Framework contains an unspecified vulnerability that allows for privilege escalation.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-35674", "title": "Android Framework Privilege Escalation Vulnerability", "source": "cisa_kev", "timestamp": "2023-09-13", "split": "val"} +{"id": "9bef098190eed0b5c48f", "text": "CVE: CVE-2022-0611\n\n[{'lang': 'en', 'value': 'Improper Privilege Management in Packagist snipe/snipe-it prior to 5.3.11.'}]\n\nFix commit: Merge pull request #10672 from snipe/fixes/missing_gates_for_maintenances\n\nAdded Asset edit/delete gates to maintenances", "cve_id": "CVE-2022-0611", "title": "CVE-2022-0611", "source": "cvefixes", "timestamp": "2022-02-16", "split": "val"} +{"id": "CVE-2023-26369", "text": "Adobe Acrobat and Reader Out-of-Bounds Write Vulnerability\n\nAffected: Adobe Acrobat and Reader\n\nAdobe Acrobat and Reader contains an out-of-bounds write vulnerability that allows for code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-787\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-26369", "title": "Adobe Acrobat and Reader Out-of-Bounds Write Vulnerability", "source": "cisa_kev", "timestamp": "2023-09-14", "split": "val"} +{"id": "CVE-2022-26352", "text": "dotCMS Unrestricted Upload of File Vulnerability\n\nAffected: dotCMS dotCMS\n\ndotCMS ContentResource API contains an unrestricted upload of file with a dangerous type vulnerability that allows for directory traversal, in which the file is saved outside of the intended storage location. Exploitation allows for remote code execution.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-22, CWE-138\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-26352", "title": "dotCMS Unrestricted Upload of File Vulnerability", "source": "cisa_kev", "timestamp": "2022-08-25", "split": "val"} +{"id": "8536bf78352de196dae5", "text": "CVE: CVE-2022-1511\n\n[{'lang': 'en', 'value': 'Improper Access Control in GitHub repository snipe/snipe-it prior to 5.4.4.'}]\n\nFix commit: Added access gate to the requested assets index\n\nSigned-off-by: snipe ", "cve_id": "CVE-2022-1511", "title": "CVE-2022-1511", "source": "cvefixes", "timestamp": "2022-04-28", "split": "val"} +{"id": "d873e2bd722dc47b6b00", "text": "CVE: CVE-2022-23572\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. Under certain scenarios, TensorFlow can fail to specialize a type during shape inference. This case is covered by the `DCHECK` function however, `DCHECK` is a no-op in production builds and an assertion failure in debug builds. In the first case execution proceeds to the `ValueOrDie` line. This results in an assertion failure as `ret` contains an error `Status`, not a value. In the second case", "cve_id": "CVE-2022-23572", "title": "CVE-2022-23572", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val"} +{"id": "60abab30b70062e93ef9", "text": "CVE: CVE-2022-1034\n\n[{'lang': 'en', 'value': 'There is a Unrestricted Upload of File vulnerability in ShowDoc v2.10.3 in GitHub repository star7th/showdoc prior to 2.10.4.'}]\n\nFix commit: Security update / 安全性更新", "cve_id": "CVE-2022-1034", "title": "CVE-2022-1034", "source": "cvefixes", "timestamp": "2022-03-22", "split": "val"} +{"id": "b8a29e3c1e1f61344b80", "text": "CVE: CVE-2022-31142\n\n[{'lang': 'en', 'value': '@fastify/bearer-auth is a Fastify plugin to require bearer Authorization headers. @fastify/bearer-auth prior to versions 7.0.2 and 8.0.1 does not securely use crypto.timingSafeEqual. A malicious attacker could estimate the length of one valid bearer token. According to the corresponding RFC 6750, the bearer token has only base64 valid characters, reducing the range of characters for a brute force attack. Version 7.0.2 and 8.0.1 of @fastify/bearer-au", "cve_id": "CVE-2022-31142", "title": "CVE-2022-31142", "source": "cvefixes", "timestamp": "2022-07-14", "split": "val"} +{"id": "c542ebe29ed9dd7a80ca", "text": "CVE: CVE-2022-25139\n\n[{'lang': 'en', 'value': 'njs through 0.7.0, used in NGINX, was discovered to contain a heap use-after-free in njs_await_fulfilled.'}]\n\nFix commit: Fixed recursive async function calls.\n\nPreviously, PromiseCapability record was stored (function->context)\ndirectly in function object during a function invocation. This is\nnot correct, because PromiseCapability record should be linked to\ncurrent execution context. As a result, function->context is\noverwritten with consecutive", "cve_id": "CVE-2022-25139", "title": "CVE-2022-25139", "source": "cvefixes", "timestamp": "2022-02-14", "split": "val"} +{"id": "1dc7dab1d291bfcb9c05", "text": "CVE: CVE-2022-0526\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository chatwoot/chatwoot prior to 2.2.0.'}]\n\nFix commit: fix: Render valid urls only in custom attributes (#3921)", "cve_id": "CVE-2022-0526", "title": "CVE-2022-0526", "source": "cvefixes", "timestamp": "2022-02-09", "split": "val"} +{"id": "59ecbce590ca95f675d0", "text": "CVE: CVE-2022-0721\n\n[{'lang': 'en', 'value': 'Insertion of Sensitive Information Into Debugging Code in GitHub repository microweber/microweber prior to 1.3.'}]\n\nFix commit: Update Handler.php", "cve_id": "CVE-2022-0721", "title": "CVE-2022-0721", "source": "cvefixes", "timestamp": "2022-02-23", "split": "val"} +{"id": "feaf28fef83333f1fe64", "text": "[Improper Synchronization] CVE-2023-28320: siglongjmp race condition\n\n## Summary:\nIf the system has no POSIX or Windows threading support, `USE_ALARM_TIMEOUT` codepath will be used in `lib/hostip.c`. If two threads will perform DNS resolving, a wrong register context can be used on the signal handler`siglongjmp` call if DNS timeout occurs. Typically this results in segmentation fault, but depending on platform specifics other impacts might be possible (but unlikely).\n\nThe documentation warns ag", "cve_id": "CVE-2023-28320", "title": "CVE-2023-28320: siglongjmp race condition (Improper Synchronization)", "source": "hackerone", "timestamp": "2023-05-17", "split": "val"} +{"id": "ab0e89e8f75e32a566dc", "text": "CVE: CVE-2022-23589\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. Under certain scenarios, Grappler component of TensorFlow can trigger a null pointer dereference. There are 2 places where this can occur, for the same malicious alteration of a `SavedModel` file (fixing the first one would trigger the same dereference in the second place). First, during constant folding, the `GraphDef` might not have the required nodes for the binary operation. If a node is m", "cve_id": "CVE-2022-23589", "title": "CVE-2022-23589", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val"} +{"id": "4582dc2006a90ade39e9", "text": "CVE: CVE-2022-31009\n\n[{'lang': 'en', 'value': 'wire-ios is an iOS client for the Wire secure messaging application. Invalid accent colors of Wire communication partners may render the iOS Wire Client partially unusable by causing it to crash multiple times on launch. These invalid accent colors can be used by and sent between Wire users. The root cause was an unnecessary assert statement when converting an integer value into the corresponding enum value, causing an exception instead of a fallbac", "cve_id": "CVE-2022-31009", "title": "CVE-2022-31009", "source": "cvefixes", "timestamp": "2022-06-23", "split": "val"} +{"id": "9018030ea754680bd46e", "text": "CVE: CVE-2022-21668\n\n[{'lang': 'en', 'value': \"pipenv is a Python development workflow tool. Starting with version 2018.10.9 and prior to version 2022.1.8, a flaw in pipenv's parsing of requirements files allows an attacker to insert a specially crafted string inside a comment anywhere within a requirements.txt file, which will cause victims who use pipenv to install the requirements file to download dependencies from a package index server controlled by the attacker. By embedding malicious code", "cve_id": "CVE-2022-21668", "title": "CVE-2022-21668", "source": "cvefixes", "timestamp": "2022-01-10", "split": "val"} +{"id": "CVE-2022-24816", "text": "OSGeo GeoServer JAI-EXT Code Injection Vulnerability\n\nAffected: OSGeo JAI-EXT\n\nOSGeo GeoServer JAI-EXT contains a code injection vulnerability that, when programs use jt-jiffle and allow Jiffle script to be provided via network request, could allow remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-94\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-24816", "title": "OSGeo GeoServer JAI-EXT Code Injection Vulnerability", "source": "cisa_kev", "timestamp": "2024-06-26", "split": "val"} +{"id": "019d1b4cb41a6559dc8c", "text": "CVE: CVE-2022-1530\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) in GitHub repository livehelperchat/livehelperchat prior to 3.99v. The attacker can execute malicious JavaScript on the application.'}]\n\nFix commit: 3.99v", "cve_id": "CVE-2022-1530", "title": "CVE-2022-1530", "source": "cvefixes", "timestamp": "2022-04-29", "split": "val"} +{"id": "7b8d9b76818f9d03d314", "text": "CVE: CVE-2022-26874\n\n[{'lang': 'en', 'value': 'lib/Horde/Mime/Viewer/Ooo.php in Horde Mime_Viewer before 2.2.4 allows XSS via an OpenOffice document, leading to account takeover in Horde Groupware Webmail Edition. This occurs after XSLT rendering.'}]\n\nFix commit: [jan] Fix XSS vulnerability in Open Document mime viewer with different code path (Reported by: Mahdi Pasche ).", "cve_id": "CVE-2022-26874", "title": "CVE-2022-26874", "source": "cvefixes", "timestamp": "2022-03-11", "split": "val"} +{"id": "77d40f35cded9385cb51", "text": "[HTTP Request Smuggling] Request Smuggling in Apache Tomcat (Important, CVE-2023-45648)\n\nApache Tomcat supports Trailer Section. However, we found that in version prior than 11.0.0-M11, 10.1.13, 9.0.80, 8.5.93, Apache Tomcat cannot properly parse the trailer section if there's no colon in the trailer header's line. It will skip the following lines until the last line with a valid colon-separated key-value header pair, which can be leveraged to perform HTTP request smuggling.\n\nIf we send the foll", "cve_id": "CVE-2023-45648", "title": "Request Smuggling in Apache Tomcat (Important, CVE-2023-45648) (HTTP Request Smuggling)", "source": "hackerone", "timestamp": "2024-02-07", "split": "val"} +{"id": "5ae074b93debd9c62101", "text": "CVE: CVE-2022-23080\n\n[{'lang': 'en', 'value': 'In directus versions v9.0.0-beta.2 through 9.6.0 are vulnerable to server-side request forgery (SSRF) in the media upload functionality which allows a low privileged user to perform internal network port scans.'}]\n\nFix commit: Add support for import ip deny list (#12025)\n\n* Add support for import ip deny list\r\n\r\n* Fix typo", "cve_id": "CVE-2022-23080", "title": "CVE-2022-23080", "source": "cvefixes", "timestamp": "2022-06-22", "split": "val"} +{"id": "f66e3b526de7a26d4bf5", "text": "CVE: CVE-2022-27819\n\n[{'lang': 'en', 'value': 'SWHKD 1.1.5 allows unsafe parsing via the -c option. An information leak might occur but there is a simple denial of service (memory exhaustion) upon an attempt to parse a large or infinite file (such as a block or character device).'}]\n\nFix commit: [patch] CVE-2022-27819", "cve_id": "CVE-2022-27819", "title": "CVE-2022-27819", "source": "cvefixes", "timestamp": "2022-04-07", "split": "val"} +{"id": "CVE-2022-39197", "text": "Fortra Cobalt Strike Teamserver Cross-Site Scripting (XSS) Vulnerability\n\nAffected: Fortra Cobalt Strike\n\nFortra Cobalt Strike contains a cross-site scripting (XSS) vulnerability in Teamserver that would allow an attacker to set a malformed username in the Beacon configuration, allowing them to execute code remotely.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-20, CWE-79\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-39197", "title": "Fortra Cobalt Strike Teamserver Cross-Site Scripting (XSS) Vulnerability", "source": "cisa_kev", "timestamp": "2023-03-30", "split": "val"} +{"id": "38c682443d0695641b55", "text": "CVE: CVE-2022-2849\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0220.'}]\n\nFix commit: patch 9.0.0220: invalid memory access with for loop over NULL string\n\nProblem: Invalid memory access with for loop over NULL string.\nSolution: Make sure mb_ptr2len() consistently returns zero for NUL.", "cve_id": "CVE-2022-2849", "title": "CVE-2022-2849", "source": "cvefixes", "timestamp": "2022-08-17", "split": "val"} +{"id": "ee08f92d3b35626483fa", "text": "CVE: CVE-2022-1172\n\n[{'lang': 'en', 'value': 'Null Pointer Dereference Caused Segmentation Fault in GitHub repository gpac/gpac prior to 2.1.0-DEV.'}]\n\nFix commit: fixed #2153", "cve_id": "CVE-2022-1172", "title": "CVE-2022-1172", "source": "cvefixes", "timestamp": "2022-03-30", "split": "val"} +{"id": "CVE-2023-6548", "text": "Citrix NetScaler ADC and NetScaler Gateway Code Injection Vulnerability\n\nAffected: Citrix NetScaler ADC and NetScaler Gateway\n\nCitrix NetScaler ADC and NetScaler Gateway contain a code injection vulnerability that allows for authenticated remote code execution on the management interface with access to NSIP, CLIP, or SNIP.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-94\n\n[Source: CISA Known Exploited Vu", "cve_id": "CVE-2023-6548", "title": "Citrix NetScaler ADC and NetScaler Gateway Code Injection Vulnerability", "source": "cisa_kev", "timestamp": "2024-01-17", "split": "val"} +{"id": "CVE-2022-35914", "text": "Teclib GLPI Remote Code Execution Vulnerability\n\nAffected: Teclib GLPI\n\nTeclib GLPI contains a remote code execution vulnerability in the third-party library, htmlawed.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-74\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-35914", "title": "Teclib GLPI Remote Code Execution Vulnerability", "source": "cisa_kev", "timestamp": "2023-03-07", "split": "val"} +{"id": "e0bf6f8588ec611b9aa0", "text": "CVE: CVE-2022-2756\n\n[{'lang': 'en', 'value': 'Server-Side Request Forgery (SSRF) in GitHub repository kareadita/kavita prior to 0.5.4.1.'}]\n\nFix commit: v0.5.4.1 - Security Hotfix (#1414)\n\n* Updated our security file with our Huntr.\r\n\r\n* Fixed a security vulnerability where through the API, an unauthorized user could delete/modify reading lists that did not belong to them.\r\n\r\nFixed a bug where when creating a reading list with the name of another users, the API would throw an exception (but read", "cve_id": "CVE-2022-2756", "title": "CVE-2022-2756", "source": "cvefixes", "timestamp": "2022-08-10", "split": "val"} +{"id": "c56e76bd755366895e84", "text": "CVE: CVE-2022-32202\n\n[{'lang': 'en', 'value': 'In libjpeg 1.63, there is a NULL pointer dereference in LineBuffer::FetchRegion in linebuffer.cpp.'}]\n\nFix commit: Fixed a NULL-pointer access in the line-based reconstruction process\nin case no valid scan was found and no data is present.", "cve_id": "CVE-2022-32202", "title": "CVE-2022-32202", "source": "cvefixes", "timestamp": "2022-06-02", "split": "val"} +{"id": "f059f2b73f5b5efe6d2a", "text": "CVE: CVE-2022-30592\n\n[{'lang': 'en', 'value': 'liblsquic/lsquic_qenc_hdl.c in LiteSpeed QUIC (aka LSQUIC) before 3.1.0 mishandles MAX_TABLE_CAPACITY.'}]\n\nFix commit: Release 3.1.0", "cve_id": "CVE-2022-30592", "title": "CVE-2022-30592", "source": "cvefixes", "timestamp": "2022-05-11", "split": "val"} +{"id": "8d7031f4039779929d0d", "text": "CVE: CVE-2022-24748\n\n[{'lang': 'en', 'value': 'Shopware is an open commerce platform based on the Symfony php Framework and the Vue javascript framework. In versions prior to 6.4.8.2 it is possible to modify customers and to create orders without App Permission. This issue is a result of improper api route checking. Users are advised to upgrade to version 6.4.8.2. There are no known workarounds.'}]\n\nFix commit: NEXT-20305 - Secure proxy route to switch customer with ACL", "cve_id": "CVE-2022-24748", "title": "CVE-2022-24748", "source": "cvefixes", "timestamp": "2022-03-09", "split": "val"} +{"id": "9ab8992eef9d2b41ac65", "text": "CVE: CVE-2022-35924\n\n[{'lang': 'en', 'value': 'NextAuth.js is a complete open source authentication solution for Next.js applications. `next-auth` users who are using the `EmailProvider` either in versions before `4.10.3` or `3.29.10` are affected. If an attacker could forge a request that sent a comma-separated list of emails (eg.: `attacker@attacker.com,victim@victim.com`) to the sign-in endpoint, NextAuth.js would send emails to both the attacker and the victim\\'s e-mail addresses. The attack", "cve_id": "CVE-2022-35924", "title": "CVE-2022-35924", "source": "cvefixes", "timestamp": "2022-08-02", "split": "val"} +{"id": "d7ec1524780a79d5b2ab", "text": "CVE: CVE-2022-29191\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.GetSessionTensor` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.'}]\n\nFix commit: Fix tf.raw_ops.GetSessionTensor vulnerability with invalid handle.", "cve_id": "CVE-2022-29191", "title": "CVE-2022-29191", "source": "cvefixes", "timestamp": "2022-05-20", "split": "val"} +{"id": "d727a9aba44374a674f4", "text": "CVE: CVE-2022-31564\n\n[{'lang': 'en', 'value': 'The woduq1414/munhak-moa repository before 2022-05-03 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.'}]\n\nFix commit: # Absolute Path Traversal due to incorrect use of `send_file` call\n\nA path traversal attack (also known as directory traversal) aims to access files and directories that are stored outside the web root folder. By manipulating variables that reference files with “dot-dot-slash (../)” seq", "cve_id": "CVE-2022-31564", "title": "CVE-2022-31564", "source": "cvefixes", "timestamp": "2022-07-11", "split": "val"} +{"id": "e395f7169b136ca5d6f7", "text": "CVE: CVE-2022-0588\n\n[{'lang': 'en', 'value': 'Exposure of Sensitive Information to an Unauthorized Actor in Packagist librenms/librenms prior to 22.2.0.'}]\n\nFix commit: Moved some pages to be within admin route (#13782)\n\n* Moved plugin admin pages to be within admin route\r\n* Wrap html transports page in admin check\r\n* Moved Port group controller to be admin protected\r\n* fixed tests", "cve_id": "CVE-2022-0588", "title": "CVE-2022-0588", "source": "cvefixes", "timestamp": "2022-02-15", "split": "val"} +{"id": "4a77545dce9261f8ebf3", "text": "CVE: CVE-2022-21208\n\n[{'lang': 'en', 'value': 'The package node-opcua before 2.74.0 are vulnerable to Denial of Service (DoS) due to a missing limitation on the number of received chunks - per single session or in total for all concurrent sessions. An attacker can exploit this vulnerability by sending an unlimited number of huge chunks (e.g. 2GB each) without sending the Final closing chunk.'}]\n\nFix commit: PacketAssembler add chunksize verification & refactor", "cve_id": "CVE-2022-21208", "title": "CVE-2022-21208", "source": "cvefixes", "timestamp": "2022-08-23", "split": "val"} +{"id": "e25c298c2e6cbef74bac", "text": "CVE: CVE-2022-31087\n\n[{'lang': 'en', 'value': 'LDAP Account Manager (LAM) is a webfrontend for managing entries (e.g. users, groups, DHCP settings) stored in an LDAP directory. In versions prior to 8.0 the tmp directory, which is accessible by /lam/tmp/, allows interpretation of .php (and .php5/.php4/.phpt/etc) files. An attacker capable of writing files under www-data privileges can write a web-shell into this directory, and gain a Code Execution on the host. This issue has been fixed in versio", "cve_id": "CVE-2022-31087", "title": "CVE-2022-31087", "source": "cvefixes", "timestamp": "2022-06-27", "split": "val"} +{"id": "CVE-2023-36584", "text": "Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Mark of the Web (MOTW) contains a security feature bypass vulnerability resulting in a limited loss of integrity and availability of security features.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-36584", "title": "Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability", "source": "cisa_kev", "timestamp": "2023-11-16", "split": "val"} +{"id": "0977daca55286532e281", "text": "[Path Traversal] CVE-2023-27534: SFTP path ~ resolving discrepancy\n\n## Summary:\nlibcurl `Curl_getworkingpath` function resolves `~` as remote users' home directory. This routine behaves in an undocumented way for `sftp` protocol. In particular it is said that `/~/` is converted to remote user's home directory (*1), while this isn't how the function actually behaves. This can lead to unexpected final path for the `sftp` access, and allow an attacker with partial path access to gain access to unte", "cve_id": "CVE-2023-27534", "title": "CVE-2023-27534: SFTP path ~ resolving discrepancy (Path Traversal)", "source": "hackerone", "timestamp": "2023-03-22", "split": "val"} +{"id": "CVE-2022-40139", "text": "Trend Micro Apex One and Apex One as a Service Improper Validation Vulnerability\n\nAffected: Trend Micro Apex One and Apex One as a Service\n\nTrend Micro Apex One and Apex One as a Service contain an improper validation of rollback mechanism components that could lead to remote code execution.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-353, CWE-641\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-40139", "title": "Trend Micro Apex One and Apex One as a Service Improper Validation Vulnerability", "source": "cisa_kev", "timestamp": "2022-09-15", "split": "val"} +{"id": "0ff83700229000ca4036", "text": "CVE: CVE-2022-2626\n\n[{'lang': 'en', 'value': 'Incorrect Privilege Assignment in GitHub repository hestiacp/hestiacp prior to 1.6.6.'}]\n\nFix commit: Fix security issues in v-add-web-domain-redirect + Sync up main with release (#2814)\n\n* Fix v-add-web-domain-redirect\r\n\r\n* Remove sudo permission admin group on new setups\r\n\r\nWe delete the group before install anyway\r\n\r\n* Block \"sudo\" from\r\n\r\n* Add missing slash\r\n\r\n* Update changelog\r\n\r\n* Update versions", "cve_id": "CVE-2022-2626", "title": "CVE-2022-2626", "source": "cvefixes", "timestamp": "2022-08-05", "split": "val"} +{"id": "CVE-2023-41266", "text": "Qlik Sense Path Traversal Vulnerability\n\nAffected: Qlik Sense\n\nQlik Sense contains a path traversal vulnerability that allows a remote, unauthenticated attacker to create an anonymous session by sending maliciously crafted HTTP requests. This anonymous session could allow the attacker to send further requests to unauthorized endpoints.\n\nRequired Action: Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable.\n\nRans", "cve_id": "CVE-2023-41266", "title": "Qlik Sense Path Traversal Vulnerability", "source": "cisa_kev", "timestamp": "2023-12-07", "split": "val"} +{"id": "CVE-2023-44221", "text": "SonicWall SMA100 Appliances OS Command Injection Vulnerability\n\nAffected: SonicWall SMA100 Appliances\n\nSonicWall SMA100 appliances contain an OS command injection vulnerability in the SSL-VPN management interface that allows a remote, authenticated attacker with administrative privilege to inject arbitrary commands as a 'nobody' user.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigati", "cve_id": "CVE-2023-44221", "title": "SonicWall SMA100 Appliances OS Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2025-05-01", "split": "val"} +{"id": "e90a30948cdd3261792e", "text": "CVE: CVE-2022-23617\n\n[{'lang': 'en', 'value': 'XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions any user with edit right can copy the content of a page it does not have access to by using it as template of a new page. This issue has been patched in XWiki 13.2CR1 and 12.10.6. Users are advised to update. There are no known workarounds for this issue.'}]\n\nFix commit: XWIKI-18430: Wrong handling of template documents\n* imp", "cve_id": "CVE-2022-23617", "title": "CVE-2022-23617", "source": "cvefixes", "timestamp": "2022-02-09", "split": "val"} +{"id": "68ac59b96c6b793520e4", "text": "CVE: CVE-2022-1022\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository chatwoot/chatwoot prior to 2.5.0.'}]\n\nFix commit: chore: Sanitize html content (#4498)", "cve_id": "CVE-2022-1022", "title": "CVE-2022-1022", "source": "cvefixes", "timestamp": "2022-04-21", "split": "val"} +{"id": "b3f18560189f6bae3fb4", "text": "CVE: CVE-2022-29204\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.UnsortedSegmentJoin` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. The code assumes `num_segments` is a positive scalar but there is no validation. Since this value is used to allocate the output tensor, a negative valu", "cve_id": "CVE-2022-29204", "title": "CVE-2022-29204", "source": "cvefixes", "timestamp": "2022-05-20", "split": "val"} +{"id": "8b05d940523f738cc590", "text": "[Use After Free] CVE-2023-28319: UAF in SSH sha256 fingerprint check\n\nlibcurl offers a feature to verify an SSH server's public key using a SHA 256\nhash. When this check fails, libcurl would free the memory for the fingerprint\nbefore it returns an error message containing the (now freed) hash.\n\nAffected versions: curl 7.81.0 to and including 8.0.1\nNot affected versions: curl < 7.81.0 and curl >= 8.1.0\n\nThe original submission can be found here: https://hackerone.com/reports/1913733\n\n## Impact\n\nT", "cve_id": "CVE-2023-28319", "title": "CVE-2023-28319: UAF in SSH sha256 fingerprint check (Use After Free)", "source": "hackerone", "timestamp": "2023-06-25", "split": "val"} +{"id": "CVE-2023-33009", "text": "Zyxel Multiple Firewalls Buffer Overflow Vulnerability\n\nAffected: Zyxel Multiple Firewalls\n\nZyxel ATP, USG FLEX, USG FLEX 50(W), USG20(W)-VPN, VPN, and ZyWALL/USG firewalls contain a buffer overflow vulnerability in the notification function that could allow an unauthenticated attacker to cause denial-of-service (DoS) conditions and remote code execution on an affected device.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-120\n\n[Source: CISA Known Exploited Vulnerabilities", "cve_id": "CVE-2023-33009", "title": "Zyxel Multiple Firewalls Buffer Overflow Vulnerability", "source": "cisa_kev", "timestamp": "2023-06-05", "split": "val"} +{"id": "5a380b35e3fe21fabd8f", "text": "CVE: CVE-2022-25851\n\n[{'lang': 'en', 'value': 'The package jpeg-js before 0.4.4 are vulnerable to Denial of Service (DoS) where a particular piece of input will cause to enter an infinite loop and never return.'}]\n\nFix commit: fix: validate sampling factors (#106)", "cve_id": "CVE-2022-25851", "title": "CVE-2022-25851", "source": "cvefixes", "timestamp": "2022-06-10", "split": "val"} +{"id": "3095b69f91d2d8255da6", "text": "[Time-of-check Time-of-use (TOCTOU) Race Condition] [curl] CVE-2023-32001: fopen race condition\n\nHello, I'm reporting for CVE-2023-32001 on curl which was resolved in last Wednesday's curl release.\n\n### Vulnerability explanation: \nAs we can see in the following curl code (line 59-61 https://github.com/curl/curl/blob/fb802b521af997230b65174a559f5c419520e142/lib/fopen.c ): \n```C\n if(stat(filename, &sb) == -1 || !S_ISREG(sb.st_mode)) {\n /* a non-regular file, fallback to direct fopen() */\n *", "cve_id": "CVE-2023-32001", "title": "[curl] CVE-2023-32001: fopen race condition (Time-of-check Time-of-use (TOCTOU) Race Condition)", "source": "hackerone", "timestamp": "2023-07-27", "split": "val"} +{"id": "CVE-2023-38205", "text": "Adobe ColdFusion Improper Access Control Vulnerability\n\nAffected: Adobe ColdFusion\n\nAdobe ColdFusion contains an improper access control vulnerability that allows for a security feature bypass.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-284\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-38205", "title": "Adobe ColdFusion Improper Access Control Vulnerability", "source": "cisa_kev", "timestamp": "2023-07-20", "split": "val"} +{"id": "20646db3ecc0c6913933", "text": "CVE: CVE-2022-0762\n\n[{'lang': 'en', 'value': 'Business Logic Errors in GitHub repository microweber/microweber prior to 1.3.'}]\n\nFix commit: check product is deleted before add to cart", "cve_id": "CVE-2022-0762", "title": "CVE-2022-0762", "source": "cvefixes", "timestamp": "2022-02-26", "split": "val"} +{"id": "10876fb1237f37aceab8", "text": "CVE: CVE-2022-0392\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim prior to 8.2.'}]\n\nFix commit: patch 8.2.4218: illegal memory access with bracketed paste in Ex mode\n\nProblem: Illegal memory access with bracketed paste in Ex mode.\nSolution: Reserve space for the trailing NUL.", "cve_id": "CVE-2022-0392", "title": "CVE-2022-0392", "source": "cvefixes", "timestamp": "2022-01-28", "split": "val"} +{"id": "91feb8294fabe91bb408", "text": "CVE: CVE-2022-30688\n\n[{'lang': 'en', 'value': 'needrestart 0.8 through 3.5 before 3.6 is prone to local privilege escalation. Regexes to detect the Perl, Python, and Ruby interpreters are not anchored, allowing a local user to escalate privileges when needrestart tries to detect if interpreters are using old source files.'}]\n\nFix commit: [Interp] CVE-2022-30688: Anchor interpreter regex to prevent local privilege escalation (reported by Jakub Wilk).", "cve_id": "CVE-2022-30688", "title": "CVE-2022-30688", "source": "cvefixes", "timestamp": "2022-05-17", "split": "val"} +{"id": "5f5b525c46862f44ba83", "text": "CVE: CVE-2022-2065\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository neorazorx/facturascripts prior to 2022.06.'}]\n\nFix commit: Force to download SVG files to prevent security problems.\n------\nForzamos a descargar los archivos SVG para evitar problemas de seguridad.", "cve_id": "CVE-2022-2065", "title": "CVE-2022-2065", "source": "cvefixes", "timestamp": "2022-06-13", "split": "val"} +{"id": "2904c3b7c25bd465c02d", "text": "CVE: CVE-2022-24801\n\n[{'lang': 'en', 'value': \"Twisted is an event-based framework for internet applications, supporting Python 3.6+. Prior to version 22.4.0rc1, the Twisted Web HTTP 1.1 server, located in the `twisted.web.http` module, parsed several HTTP request constructs more leniently than permitted by RFC 7230. This non-conformant parsing can lead to desync if requests pass through multiple HTTP parsers, potentially resulting in HTTP request smuggling. Users who may be affected use Twisted", "cve_id": "CVE-2022-24801", "title": "CVE-2022-24801", "source": "cvefixes", "timestamp": "2022-04-04", "split": "val"} +{"id": "5b7b2d125a17d4cc2b23", "text": "CVE: CVE-2022-0951\n\n[{'lang': 'en', 'value': 'File Upload Restriction Bypass leading to Stored XSS Vulnerability in GitHub repository star7th/showdoc prior to 2.10.4.'}]\n\nFix commit: file upload bug", "cve_id": "CVE-2022-0951", "title": "CVE-2022-0951", "source": "cvefixes", "timestamp": "2022-03-15", "split": "val"} +{"id": "CVE-2023-24489", "text": "Citrix Content Collaboration ShareFile Improper Access Control Vulnerability\n\nAffected: Citrix Content Collaboration\n\nCitrix Content Collaboration contains an improper access control vulnerability that could allow an unauthenticated attacker to remotely compromise customer-managed ShareFile storage zones controllers.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-284\n\n[Source: CISA Known Exploited Vulnera", "cve_id": "CVE-2023-24489", "title": "Citrix Content Collaboration ShareFile Improper Access Control Vulnerability", "source": "cisa_kev", "timestamp": "2023-08-16", "split": "val"} +{"id": "CVE-2023-36802", "text": "Microsoft Streaming Service Proxy Privilege Escalation Vulnerability\n\nAffected: Microsoft Streaming Service Proxy\n\nMicrosoft Streaming Service Proxy contains an unspecified vulnerability that allows for privilege escalation.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-36802", "title": "Microsoft Streaming Service Proxy Privilege Escalation Vulnerability", "source": "cisa_kev", "timestamp": "2023-09-12", "split": "val"} +{"id": "965c780b61c4e1e975cc", "text": "CVE: CVE-2022-0776\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - DOM in GitHub repository hakimel/reveal.js prior to 4.3.0.'}]\n\nFix commit: Fix DOM XSS", "cve_id": "CVE-2022-0776", "title": "CVE-2022-0776", "source": "cvefixes", "timestamp": "2022-03-01", "split": "val"} +{"id": "8b3bc765b241567eea86", "text": "[Uncontrolled Resource Consumption] [CVE-2022-44571] Possible Denial of Service Vulnerability in Rack Content-Disposition parsing\n\nI made a report and patch at https://hackerone.com/reports/1675235\n\nhttps://discuss.rubyonrails.org/t/cve-2022-44571-possible-denial-of-service-vulnerability-in-rack-content-disposition-parsing/82126\n\n> There is a denial of service vulnerability in the Content-Disposition parsing component of Rack. This vulnerability has been assigned the CVE identifier CVE-2022-4457", "cve_id": "CVE-2022-44571", "title": "[CVE-2022-44571] Possible Denial of Service Vulnerability in Rack Content-Disposition parsing (Uncontrolled Resource Consumption)", "source": "hackerone", "timestamp": "2023-07-27", "split": "val"} +{"id": "ef0e23688274e79ac478", "text": "CVE: CVE-2022-26490\n\n[{'lang': 'en', 'value': 'st21nfca_connectivity_event_received in drivers/nfc/st21nfca/se.c in the Linux kernel through 5.16.12 has EVT_TRANSACTION buffer overflows because of untrusted length parameters.'}]\n\nFix commit: nfc: st21nfca: Fix potential buffer overflows in EVT_TRANSACTION\n\nIt appears that there are some buffer overflows in EVT_TRANSACTION.\nThis happens because the length parameters that are passed to memcpy\ncome directly from skb->data and are not guarded in any", "cve_id": "CVE-2022-26490", "title": "CVE-2022-26490", "source": "cvefixes", "timestamp": "2022-03-06", "split": "val"} +{"id": "5602243675f0740965f3", "text": "CVE: CVE-2022-0829\n\n[{'lang': 'en', 'value': 'Improper Authorization in GitHub repository webmin/webmin prior to 1.990.'}]\n\nFix commit: Add missing permissions check when saving allowed cron users", "cve_id": "CVE-2022-0829", "title": "CVE-2022-0829", "source": "cvefixes", "timestamp": "2022-03-02", "split": "val"} +{"id": "bb4ba53b0ea25ee7aa83", "text": "CVE: CVE-2022-2264\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.'}]\n\nFix commit: patch 9.0.0011: reading beyond the end of the line with put command\n\nProblem: Reading beyond the end of the line with put command.\nSolution: Adjust the end mark position.", "cve_id": "CVE-2022-2264", "title": "CVE-2022-2264", "source": "cvefixes", "timestamp": "2022-07-01", "split": "val"} +{"id": "27577ccca11ebe5fa297", "text": "CVE: CVE-2022-27008\n\n[{'lang': 'en', 'value': 'nginx njs 0.7.2 is vulnerable to Buffer Overflow. Type confused in Array.prototype.concat() when a slow array appended element is fast array.'}]\n\nFix commit: Fixed Array.prototype.concat() when \"this\" is a slow array.\n\nPreviously, when the current appended element is fast array the \"this\"\narray was expected to always be a fast array also. This may not be the\ncase when the previous appended element was not fast thus converting\nthe \"this\" array to a", "cve_id": "CVE-2022-27008", "title": "CVE-2022-27008", "source": "cvefixes", "timestamp": "2022-04-14", "split": "val"} +{"id": "CVE-2022-0543", "text": "Debian-specific Redis Server Lua Sandbox Escape Vulnerability\n\nAffected: Redis Debian-specific Redis Servers\n\nRedis is prone to a (Debian-specific) Lua sandbox escape, which could result in remote code execution.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-862\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-0543", "title": "Debian-specific Redis Server Lua Sandbox Escape Vulnerability", "source": "cisa_kev", "timestamp": "2022-03-28", "split": "val"} +{"id": "eeef9152f9527b1dd8f5", "text": "CVE: CVE-2022-29532\n\n[{'lang': 'en', 'value': 'An issue was discovered in MISP before 2.4.158. There is XSS in the cerebrate view if one administrator puts a javascript: URL in the URL field, and another administrator clicks on it.'}]\n\nFix commit: fix: [security] XSS in cerebrate view\n\n- low probability XSS in the cerebrate view's URL field\n- a malicious administrator could set a javascript: url\n- another administrator would have to click the suspicious looking URL to be affected\n\n- As reported", "cve_id": "CVE-2022-29532", "title": "CVE-2022-29532", "source": "cvefixes", "timestamp": "2022-04-20", "split": "val"} +{"id": "762152664ca1c287bf79", "text": "CVE: CVE-2022-31623\n\n[{'lang': 'en', 'value': 'MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_compress.cc, when an error occurs (i.e., going to the err label) while executing the method create_worker_threads, the held lock thd->ctrl_mutex is not released correctly, which allows local users to trigger a denial of service due to the deadlock.'}]\n\nFix commit: MDEV-26561 mariabackup release locks\n\nThe previous threads locked need to be released too.\n\nThis occu", "cve_id": "CVE-2022-31623", "title": "CVE-2022-31623", "source": "cvefixes", "timestamp": "2022-05-25", "split": "val"} +{"id": "8e144cff917cad98e496", "text": "CVE: CVE-2022-21678\n\n[{'lang': 'en', 'value': \"Discourse is an open source discussion platform. Prior to version 2.8.0.beta11 in the `tests-passed` branch, version 2.8.0.beta11 in the `beta` branch, and version 2.7.13 in the `stable` branch, the bios of users who made their profiles private were still visible in the `` tags on their users' pages. The problem is patched in `tests-passed` version 2.8.0.beta11, `beta` version 2.8.0.beta11, and `stable` version 2.7.13 of Discourse.\"}]\n\nFix com", "cve_id": "CVE-2022-21678", "title": "CVE-2022-21678", "source": "cvefixes", "timestamp": "2022-01-13", "split": "val"} +{"id": "0db89995fcff37187a6c", "text": "CVE: CVE-2022-22114\n\n[{'lang': 'en', 'value': 'In Teedy, versions v1.5 through v1.9 are vulnerable to Reflected Cross-Site Scripting (XSS). The “search term\" search functionality is not sufficiently sanitized while displaying the results of the search, which can be leveraged to inject arbitrary scripts. These scripts are executed in a victim’s browser when they enter the crafted URL. In the worst case, the victim who inadvertently triggers the attack is a highly privileged administrator. The inj", "cve_id": "CVE-2022-22114", "title": "CVE-2022-22114", "source": "cvefixes", "timestamp": "2022-01-10", "split": "val"} +{"id": "71f91e455d3c39cec751", "text": "CVE: CVE-2022-23837\n\n[{'lang': 'en', 'value': 'In api.rb in Sidekiq before 5.2.10 and 6.4.0, there is no limit on the number of days when requesting stats for the graph. This overloads the system, affecting the Web UI, and makes it unavailable to users.'}]\n\nFix commit: Validate `days` parameter to avoid possible DoS in Web UI\n\nThank you to Sergey Shpakov of http://tutum.space for reporting.", "cve_id": "CVE-2022-23837", "title": "CVE-2022-23837", "source": "cvefixes", "timestamp": "2022-01-21", "split": "val"} +{"id": "7efc0bf0fb5c358a8fbd", "text": "CVE: CVE-2022-34835\n\n[{'lang': 'en', 'value': 'In Das U-Boot through 2022.07-rc5, an integer signedness error and resultant stack-based buffer overflow in the \"i2c md\" command enables the corruption of the return address pointer of the do_i2c_md function.'}]\n\nFix commit: i2c: fix stack buffer overflow vulnerability in i2c md command\n\nWhen running \"i2c md 0 0 80000100\", the function do_i2c_md parses the\nlength into an unsigned int variable named length. The value is then\nmoved to a signed variabl", "cve_id": "CVE-2022-34835", "title": "CVE-2022-34835", "source": "cvefixes", "timestamp": "2022-06-30", "split": "val"} +{"id": "ded43d9798d15422eb3e", "text": "CVE: CVE-2022-21739\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The implementation of `QuantizedMaxPool` has an undefined behavior where user controlled inputs can trigger a reference binding to null pointer. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: Fix nullptr exception in QuantizedM", "cve_id": "CVE-2022-21739", "title": "CVE-2022-21739", "source": "cvefixes", "timestamp": "2022-02-03", "split": "val"} +{"id": "4290bfe58573cc358c3a", "text": "CVE: CVE-2022-0587\n\n[{'lang': 'en', 'value': 'Improper Authorization in Packagist librenms/librenms prior to 22.2.0.'}]\n\nFix commit: Moved some pages to be within admin route (#13782)\n\n* Moved plugin admin pages to be within admin route\r\n* Wrap html transports page in admin check\r\n* Moved Port group controller to be admin protected\r\n* fixed tests", "cve_id": "CVE-2022-0587", "title": "CVE-2022-0587", "source": "cvefixes", "timestamp": "2022-02-15", "split": "val"} +{"id": "27f9833ac394c4eac825", "text": "CVE: CVE-2022-24781\n\n[{'lang': 'en', 'value': 'Geon is a board game based on solving questions about the Pythagorean Theorem. Malicious users can obtain the uuid from other users, spoof that uuid through the browser console and become co-owners of the target session. This issue is patched in version 1.1.0. No known workaround exists.'}]\n\nFix commit: Corrigido saida de usuarios crash do backend se o client manda algo que não seja do tipo string e implementação inicial de contador de usuarios cone", "cve_id": "CVE-2022-24781", "title": "CVE-2022-24781", "source": "cvefixes", "timestamp": "2022-03-24", "split": "val"} +{"id": "521c7010e43d09e295a6", "text": "CVE: CVE-2022-29207\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, multiple TensorFlow operations misbehave in eager mode when the resource handle provided to them is invalid. In graph mode, it would have been impossible to perform these API calls, but migration to TF 2.x eager mode opened up this vulnerability. If the resource handle is empty, then a reference is bound to a null pointer inside TensorFlow c", "cve_id": "CVE-2022-29207", "title": "CVE-2022-29207", "source": "cvefixes", "timestamp": "2022-05-20", "split": "val"} +{"id": "2b89767432a95a665b31", "text": "CVE: CVE-2022-0727\n\n[{'lang': 'en', 'value': 'Improper Access Control in GitHub repository chocobozzz/peertube prior to 4.1.0.'}]\n\nFix commit: Check video privacy when creating comments/rates", "cve_id": "CVE-2022-0727", "title": "CVE-2022-0727", "source": "cvefixes", "timestamp": "2022-02-23", "split": "val"} +{"id": "367342c5bf29bfa20af3", "text": "[Deserialization of Untrusted Data] CVE-2023-46132\n\n# Long summary\n\n\n\nIn order to create a signature on a big chunk of data such as a block, the data needs to be \"compressed\" first to the input size of the signature algorithm.\n\nIn Fabric's case, we use a hash function which compressed a Fabric block from arbitrary size to a 32 byte string.\n\n \n\nIn order to understand the problem we need to be more specific: The block structure has three parts to it: (1) Header, (2) Transactions, and (3) Metadata", "cve_id": "CVE-2023-46132", "title": "CVE-2023-46132 (Deserialization of Untrusted Data)", "source": "hackerone", "timestamp": "2024-01-08", "split": "val"} +{"id": "CVE-2022-42856", "text": "Apple iOS Type Confusion Vulnerability\n\nAffected: Apple iOS\n\nApple iOS contains a type confusion vulnerability when processing maliciously crafted web content leading to code execution.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-843\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-42856", "title": "Apple iOS Type Confusion Vulnerability", "source": "cisa_kev", "timestamp": "2022-12-14", "split": "val"} +{"id": "451ec2d422e34f6d1c0b", "text": "CVE: CVE-2022-1730\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository jgraph/drawio prior to 18.0.4.'}]\n\nFix commit: 18.0.4 release", "cve_id": "CVE-2022-1730", "title": "CVE-2022-1730", "source": "cvefixes", "timestamp": "2022-05-19", "split": "val"} +{"id": "91db9e86e05d3ae6684d", "text": "CVE: CVE-2022-29209\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the macros that TensorFlow uses for writing assertions (e.g., `CHECK_LT`, `CHECK_GT`, etc.) have an incorrect logic when comparing `size_t` and `int` values. Due to type conversion rules, several of the macros would trigger incorrectly. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.'}]\n\nFix commit: Merge pull request", "cve_id": "CVE-2022-29209", "title": "CVE-2022-29209", "source": "cvefixes", "timestamp": "2022-05-21", "split": "val"} +{"id": "c220b509596e943fca47", "text": "CVE: CVE-2022-31168\n\n[{'lang': 'en', 'value': 'Zulip is an open source team chat tool. Due to an incorrect authorization check in Zulip Server 5.4 and earlier, a member of an organization could craft an API call that grants organization administrator privileges to one of their bots. The vulnerability is fixed in Zulip Server 5.5. Members who don’t own any bots, and lack permission to create them, can’t exploit the vulnerability. As a workaround for the vulnerability, an organization administ", "cve_id": "CVE-2022-31168", "title": "CVE-2022-31168", "source": "cvefixes", "timestamp": "2022-07-22", "split": "val"} +{"id": "CVE-2023-47246", "text": "SysAid Server Path Traversal Vulnerability\n\nAffected: SysAid SysAid Server\n\nSysAid Server (on-premises version) contains a path traversal vulnerability that leads to code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-22\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-47246", "title": "SysAid Server Path Traversal Vulnerability", "source": "cisa_kev", "timestamp": "2023-11-13", "split": "val"} +{"id": "3ab7f3b5be51d53f20d2", "text": "CVE: CVE-2022-0666\n\n[{'lang': 'en', 'value': 'CRLF Injection leads to Stack Trace Exposure due to lack of filtering at https://demo.microweber.org/ in Packagist microweber/microweber prior to 1.2.11.'}]\n\nFix commit: Update UrlManager.php", "cve_id": "CVE-2022-0666", "title": "CVE-2022-0666", "source": "cvefixes", "timestamp": "2022-02-18", "split": "val"} +{"id": "662697559cf4f6ce0088", "text": "CVE: CVE-2022-29248\n\n[{'lang': 'en', 'value': \"Guzzle is a PHP HTTP client. Guzzle prior to versions 6.5.6 and 7.4.3 contains a vulnerability with the cookie middleware. The vulnerability is that it is not checked if the cookie domain equals the domain of the server which sets the cookie via the Set-Cookie header, allowing a malicious server to set cookies for unrelated domains. The cookie middleware is disabled by default, so most library consumers will not be affected by this issue. Only those", "cve_id": "CVE-2022-29248", "title": "CVE-2022-29248", "source": "cvefixes", "timestamp": "2022-05-25", "split": "val"} +{"id": "dca309f609c4c00d07f8", "text": "CVE: CVE-2022-0764\n\n[{'lang': 'en', 'value': 'Arbitrary Command Injection in GitHub repository strapi/strapi prior to 4.1.0.'}]\n\nFix commit: Merge pull request #12649 from strapi/cli-security\n\nupdate execa commands", "cve_id": "CVE-2022-0764", "title": "CVE-2022-0764", "source": "cvefixes", "timestamp": "2022-02-26", "split": "val"} +{"id": "dbc69674fbf7d304da6c", "text": "CVE: CVE-2022-31052\n\n[{'lang': 'en', 'value': \"Synapse is an open source home server implementation for the Matrix chat network. In versions prior to 1.61.1 URL previews of some web pages can exhaust the available stack space for the Synapse process due to unbounded recursion. This is sometimes recoverable and leads to an error for the request causing the problem, but in other cases the Synapse process may crash altogether. It is possible to exploit this maliciously, either by malicious users on", "cve_id": "CVE-2022-31052", "title": "CVE-2022-31052", "source": "cvefixes", "timestamp": "2022-06-28", "split": "val"} +{"id": "8b7ebc870483d867d2ab", "text": "[Information Exposure Through Sent Data] CVE-2022-27779: cookie for trailing dot TLD\n\nPublished Advisory: https://curl.se/docs/CVE-2022-27779.html\n\nOriginal Report: https://hackerone.com/reports/1553301\n\n## Impact\n\nThis can allow arbitrary sites to set cookies that then would get sent to a different and unrelated site or domain. (ie. conduct session fixation attacks.)", "cve_id": "CVE-2022-27779", "title": "CVE-2022-27779: cookie for trailing dot TLD (Information Exposure Through Sent Data)", "source": "hackerone", "timestamp": "2022-06-11", "split": "val"} +{"id": "c6ef34e551cf4a865f4a", "text": "CVE: CVE-2022-0597\n\n[{'lang': 'en', 'value': 'Open Redirect in Packagist microweber/microweber prior to 1.2.11.'}]\n\nFix commit: Merge branch 'dev' of https://github.com/microweber/microweber into dev", "cve_id": "CVE-2022-0597", "title": "CVE-2022-0597", "source": "cvefixes", "timestamp": "2022-02-15", "split": "val"} +{"id": "CVE-2023-23529", "text": "Apple Multiple Products WebKit Type Confusion Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, MacOS, Safari and iPadOS WebKit contain a type confusion vulnerability that leads to code execution when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-843", "cve_id": "CVE-2023-23529", "title": "Apple Multiple Products WebKit Type Confusion Vulnerability", "source": "cisa_kev", "timestamp": "2023-02-14", "split": "val"} +{"id": "b9365b3a895546d43a15", "text": "CVE: CVE-2022-1021\n\n[{'lang': 'en', 'value': 'Insecure Storage of Sensitive Information in GitHub repository chatwoot/chatwoot prior to 2.6.0.'}]\n\nFix commit: fix: Referer URL validation (#4309)\n\nFixes #354", "cve_id": "CVE-2022-1021", "title": "CVE-2022-1021", "source": "cvefixes", "timestamp": "2022-08-19", "split": "val"} +{"id": "32e09159031c558e5bbf", "text": "CVE: CVE-2022-1035\n\n[{'lang': 'en', 'value': 'Segmentation Fault caused by MP4Box -lsr in GitHub repository gpac/gpac prior to 2.1.0-DEV.'}]\n\nFix commit: fixed #2146", "cve_id": "CVE-2022-1035", "title": "CVE-2022-1035", "source": "cvefixes", "timestamp": "2022-03-21", "split": "val"} +{"id": "f07b1a77ca2d50220210", "text": "CVE: CVE-2022-0868\n\n[{'lang': 'en', 'value': 'Open Redirect in GitHub repository medialize/uri.js prior to 1.19.10.'}]\n\nFix commit: fix(parse): handle excessive colons in scheme delimiter\n\nreported by @huydoppa via huntr.dev", "cve_id": "CVE-2022-0868", "title": "CVE-2022-0868", "source": "cvefixes", "timestamp": "2022-03-06", "split": "val"} +{"id": "2ca479fdac66b3234abd", "text": "CVE: CVE-2022-0767\n\n[{'lang': 'en', 'value': 'Server-Side Request Forgery (SSRF) in GitHub repository janeczku/calibre-web prior to 0.6.17.'}]\n\nFix commit: Don't allow redirects on cover uploads, catch more addresses which resolve to localhost", "cve_id": "CVE-2022-0767", "title": "CVE-2022-0767", "source": "cvefixes", "timestamp": "2022-03-07", "split": "val"} +{"id": "CVE-2022-2856", "text": "Google Chromium Intents Insufficient Input Validation Vulnerability\n\nAffected: Google Chromium Intents\n\nGoogle Chromium Intents contains an insufficient validation of untrusted input vulnerability that allows a remote attacker to browse to a malicious website via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s):", "cve_id": "CVE-2022-2856", "title": "Google Chromium Intents Insufficient Input Validation Vulnerability", "source": "cisa_kev", "timestamp": "2022-08-18", "split": "val"} +{"id": "9f5d5338c46a773d5f46", "text": "CVE: CVE-2022-24122\n\n[{'lang': 'en', 'value': 'kernel/ucount.c in the Linux kernel 5.14 through 5.16.4, when unprivileged user namespaces are enabled, allows a use-after-free and privilege escalation because a ucounts object can outlive its namespace.'}]\n\nFix commit: ucount: Make get_ucount a safe get_user replacement\n\nWhen the ucount code was refactored to create get_ucount it was missed\nthat some of the contexts in which a rlimit is kept elevated can be\nthe only reference to the user/ucount i", "cve_id": "CVE-2022-24122", "title": "CVE-2022-24122", "source": "cvefixes", "timestamp": "2022-01-29", "split": "val"} +{"id": "CVE-2022-24086", "text": "Adobe Commerce and Magento Open Source Improper Input Validation Vulnerability\n\nAffected: Adobe Commerce and Magento Open Source\n\nAdobe Commerce and Magento Open Source contain an improper input validation vulnerability which can allow for arbitrary code execution.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-20\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-24086", "title": "Adobe Commerce and Magento Open Source Improper Input Validation Vulnerability", "source": "cisa_kev", "timestamp": "2022-02-15", "split": "val"} +{"id": "8669289dc0e6d21219e6", "text": "CVE: CVE-2022-31072\n\n[{'lang': 'en', 'value': 'Octokit is a Ruby toolkit for the GitHub API. Versions 4.23.0 and 4.24.0 of the octokit gem were published containing world-writeable files. Specifically, the gem was packed with files having their permissions set to `-rw-rw-rw-` (i.e. 0666) instead of `rw-r--r--` (i.e. 0644). This means everyone who is not the owner (Group and Public) with access to the instance where this release had been installed could modify the world-writable files from this g", "cve_id": "CVE-2022-31072", "title": "CVE-2022-31072", "source": "cvefixes", "timestamp": "2022-06-15", "split": "val"} +{"id": "505a2457a98c2b094eb7", "text": "CVE: CVE-2022-23613\n\n[{'lang': 'en', 'value': 'xrdp is an open source remote desktop protocol (RDP) server. In affected versions an integer underflow leading to a heap overflow in the sesman server allows any unauthenticated attacker which is able to locally access a sesman server to execute code as root. This vulnerability has been patched in version 0.9.18.1 and above. Users are advised to upgrade. There are no known workarounds.'}]\n\nFix commit: Merge pull request from GHSA-8h98-h426-xf32\n\nAdd", "cve_id": "CVE-2022-23613", "title": "CVE-2022-23613", "source": "cvefixes", "timestamp": "2022-02-07", "split": "val"} +{"id": "b479fc29f54711c1b2b5", "text": "CVE: CVE-2022-0375\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in Packagist remdex/livehelperchat prior to 3.93v.'}]\n\nFix commit: fx #1734", "cve_id": "CVE-2022-0375", "title": "CVE-2022-0375", "source": "cvefixes", "timestamp": "2022-01-26", "split": "val"} +{"id": "f053e41150d0d5855f1c", "text": "[Uncontrolled Resource Consumption] [CVE-2022-44572] Possible Denial of Service Vulnerability in Rack’s RFC2183 boundary parsing\n\nI reported at https://hackerone.com/reports/1639882\n\nhttps://discuss.rubyonrails.org/t/cve-2022-44572-possible-denial-of-service-vulnerability-in-racks-rfc2183-boundary-parsing/82124\n> There is a denial of service vulnerability in the multipart parsing component of Rack. This vulnerability has been assigned the CVE identifier CVE-2022-44572.\n> Carefully crafted input", "cve_id": "CVE-2022-44572", "title": "[CVE-2022-44572] Possible Denial of Service Vulnerability in Rack’s RFC2183 boundary parsing (Uncontrolled Resource Consumption)", "source": "hackerone", "timestamp": "2023-07-27", "split": "val"} +{"id": "4265e3774730a042728e", "text": "CVE: CVE-2022-0713\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.4.'}]\n\nFix commit: Fix oobread in macho core symbolication ##crash\n\n* Reported by @cnitlrt via huntr.dev", "cve_id": "CVE-2022-0713", "title": "CVE-2022-0713", "source": "cvefixes", "timestamp": "2022-02-22", "split": "val"} +{"id": "9857fe54a2e8f76f0267", "text": "CVE: CVE-2022-1453\n\n[{'lang': 'en', 'value': 'The RSVPMaker plugin for WordPress is vulnerable to unauthenticated SQL Injection due to missing SQL escaping and parameterization on user supplied data passed to a SQL query in the rsvpmaker-util.php file. This makes it possible for unauthenticated attackers to steal sensitive information from the database in versions up to and including 9.2.5.'}]\n\nFix commit: fixes for sql injection, card testing", "cve_id": "CVE-2022-1453", "title": "CVE-2022-1453", "source": "cvefixes", "timestamp": "2022-05-10", "split": "val"} +{"id": "b22351a5e01adaa63ba3", "text": "CVE: CVE-2022-0417\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.4245: \":retab 0\" may cause illegal memory access\n\nProblem: \":retab 0\" may cause illegal memory access.\nSolution: Limit the value of 'tabstop' to 10000.", "cve_id": "CVE-2022-0417", "title": "CVE-2022-0417", "source": "cvefixes", "timestamp": "2022-02-01", "split": "val"} +{"id": "e3a20a016e66f9aa6a9e", "text": "CVE: CVE-2022-0145\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository forkcms/forkcms prior to 5.11.1.'}]\n\nFix commit: Fix xss though the description in the info.xml file of a theme or module", "cve_id": "CVE-2022-0145", "title": "CVE-2022-0145", "source": "cvefixes", "timestamp": "2022-03-24", "split": "val"} +{"id": "ea3a914e707ba9098dc1", "text": "CVE: CVE-2022-24782\n\n[{'lang': 'en', 'value': \"Discourse is an open source discussion platform. Versions 2.8.2 and prior in the `stable` branch, 2.9.0.beta3 and prior in the `beta` branch, and 2.9.0.beta3 and prior in the `tests-passed` branch are vulnerable to a data leak. Users can request an export of their own activity. Sometimes, due to category settings, they may have category membership for a secure category. The name of this secure category is shown to the user in the export. The same th", "cve_id": "CVE-2022-24782", "title": "CVE-2022-24782", "source": "cvefixes", "timestamp": "2022-03-24", "split": "val"} +{"id": "de43c459b253c1a81511", "text": "CVE: CVE-2022-23568\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The implementation of `AddManySparseToTensorsMap` is vulnerable to an integer overflow which results in a `CHECK`-fail when building new `TensorShape` objects (so, an assert failure based denial of service). We are missing some validation on the shapes of the input tensors as well as directly constructing a large `TensorShape` with user-provided dimensions. The fix will be included in TensorFl", "cve_id": "CVE-2022-23568", "title": "CVE-2022-23568", "source": "cvefixes", "timestamp": "2022-02-03", "split": "val"} +{"id": "90f057d3f7d8bbe415ba", "text": "CVE: CVE-2022-24863\n\n[{'lang': 'en', 'value': 'http-swagger is an open source wrapper to automatically generate RESTful API documentation with Swagger 2.0. In versions of http-swagger prior to 1.2.6 an attacker may perform a denial of service attack consisting of memory exhaustion on the host system. The cause of the memory exhaustion is down to improper handling of http methods. Users are advised to upgrade. Users unable to upgrade may to restrict the path prefix to the \"GET\" method as a workar", "cve_id": "CVE-2022-24863", "title": "CVE-2022-24863", "source": "cvefixes", "timestamp": "2022-04-18", "split": "val"} +{"id": "9525310ef03694fcdd43", "text": "CVE: CVE-2022-24788\n\n[{'lang': 'en', 'value': 'Vyper is a pythonic Smart Contract Language for the ethereum virtual machine. Versions of vyper prior to 0.3.2 suffer from a potential buffer overrun. Importing a function from a JSON interface which returns `bytes` generates bytecode which does not clamp bytes length, potentially resulting in a buffer overrun. Users are advised to upgrade. There are no known workarounds for this issue.'}]\n\nFix commit: Merge pull request from GHSA-j2x6-9323-fp7h\n\nTh", "cve_id": "CVE-2022-24788", "title": "CVE-2022-24788", "source": "cvefixes", "timestamp": "2022-04-13", "split": "val"} +{"id": "3a4b94ad8facb139db28", "text": "CVE: CVE-2022-24884\n\n[{'lang': 'en', 'value': 'ecdsautils is a tiny collection of programs used for ECDSA (keygen, sign, verify). `ecdsa_verify_[prepare_]legacy()` does not check whether the signature values `r` and `s` are non-zero. A signature consisting only of zeroes is always considered valid, making it trivial to forge signatures. Requiring multiple signatures from different public keys does not mitigate the issue: `ecdsa_verify_list_legacy()` will accept an arbitrary number of such forged", "cve_id": "CVE-2022-24884", "title": "CVE-2022-24884", "source": "cvefixes", "timestamp": "2022-05-06", "split": "val"} +{"id": "f41c9beb873bd598ee58", "text": "CVE: CVE-2022-24868\n\n[{'lang': 'en', 'value': 'GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In versions prior to 10.0.0 one can exploit a lack of sanitization on SVG file uploads and inject javascript into their user avatar. As a result any user viewing the avatar will be subject to a cross site scripting attack. Users of GLPI are advised to upgrade. Users unable to upgrade should disallow SVG avatars.", "cve_id": "CVE-2022-24868", "title": "CVE-2022-24868", "source": "cvefixes", "timestamp": "2022-04-21", "split": "val"} +{"id": "dc49ae890b3d6894874a", "text": "CVE: CVE-2022-2580\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0102.'}]\n\nFix commit: patch 9.0.0104: going beyond allocated memory when evaluating string constant\n\nProblem: Going beyond allocated memory when evaluating string constant.\nSolution: Properly skip over form.", "cve_id": "CVE-2022-2580", "title": "CVE-2022-2580", "source": "cvefixes", "timestamp": "2022-08-01", "split": "val"} +{"id": "88e0d5f7408167aab11b", "text": "CVE: CVE-2022-29180\n\n[{'lang': 'en', 'value': \"A vulnerability in which attackers could forge HTTP requests to manipulate the `charm` data directory to access or delete anything on the server. This has been patched and is available in release [v0.12.1](https://github.com/charmbracelet/charm/releases/tag/v0.12.1). We recommend that all users running self-hosted `charm` instances update immediately. This vulnerability was found in-house and we haven't been notified of any potential exploiters. ###", "cve_id": "CVE-2022-29180", "title": "CVE-2022-29180", "source": "cvefixes", "timestamp": "2022-05-07", "split": "val"} +{"id": "f4b891c06c14a923561e", "text": "CVE: CVE-2022-0240\n\n[{'lang': 'en', 'value': 'mruby is vulnerable to NULL Pointer Dereference'}]\n\nFix commit: class.c: add `obj->c` check before `prepare_singleton_class()`.", "cve_id": "CVE-2022-0240", "title": "CVE-2022-0240", "source": "cvefixes", "timestamp": "2022-01-17", "split": "val"} +{"id": "955299e530fcd939f0d3", "text": "CVE: CVE-2022-21683\n\n[{'lang': 'en', 'value': 'Wagtail is a Django based content management system focused on flexibility and user experience. When notifications for new replies in comment threads are sent, they are sent to all users who have replied or commented anywhere on the site, rather than only in the relevant threads. This means that a user could listen in to new comment replies on pages they have not have editing access to, as long as they have left a comment or reply somewhere on the s", "cve_id": "CVE-2022-21683", "title": "CVE-2022-21683", "source": "cvefixes", "timestamp": "2022-01-18", "split": "val"} +{"id": "c6481b4913d249e79496", "text": "CVE: CVE-2022-1722\n\n[{'lang': 'en', 'value': \"SSRF in editor's proxy via IPv6 link-local address in GitHub repository jgraph/drawio prior to 18.0.5. SSRF to internal link-local IPv6 addresses\"}]\n\nFix commit: Adds isLinkLocalAddress() to address checks", "cve_id": "CVE-2022-1722", "title": "CVE-2022-1722", "source": "cvefixes", "timestamp": "2022-05-16", "split": "val"} +{"id": "CVE-2023-7024", "text": "Google Chromium WebRTC Heap Buffer Overflow Vulnerability\n\nAffected: Google Chromium WebRTC\n\nGoogle Chromium WebRTC, an open-source project providing web browsers with real-time communication, contains a heap buffer overflow vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could impact web browsers using WebRTC, including but not limited to Google Chrome.\n\nRequired Action: Apply mitigations per vendor instructions or d", "cve_id": "CVE-2023-7024", "title": "Google Chromium WebRTC Heap Buffer Overflow Vulnerability", "source": "cisa_kev", "timestamp": "2024-01-02", "split": "val"} +{"id": "e082392d05e4bcad792a", "text": "CVE: CVE-2022-31549\n\n[{'lang': 'en', 'value': 'The olmax99/helm-flask-celery repository before 2022-05-25 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.'}]\n\nFix commit: Merge pull request #2 from porcupineyhairs/FixPathInjection\n\nFix Path Traversal Vulnerability", "cve_id": "CVE-2022-31549", "title": "CVE-2022-31549", "source": "cvefixes", "timestamp": "2022-07-11", "split": "val"} +{"id": "04594e9bfaeaecd6d37b", "text": "CVE: CVE-2022-0451\n\n[{'lang': 'en', 'value': 'Dart SDK contains the HTTPClient in dart:io library whcih includes authorization headers when handling cross origin redirects. These headers may be explicitly set and contain sensitive information. By default, HttpClient handles redirection logic. If a request is sent to example.com with authorization header and it redirects to an attackers site, they might not expect attacker site to receive authorization header. We recommend updating the Dart SDK t", "cve_id": "CVE-2022-0451", "title": "CVE-2022-0451", "source": "cvefixes", "timestamp": "2022-02-18", "split": "val"} +{"id": "03b5caaf176593f4d7aa", "text": "CVE: CVE-2022-30292\n\n[{'lang': 'en', 'value': 'Heap-based buffer overflow in sqbaselib.cpp in SQUIRREL 3.2 due to lack of a certain sq_reservestack call.'}]\n\nFix commit: fix in thread.call", "cve_id": "CVE-2022-30292", "title": "CVE-2022-30292", "source": "cvefixes", "timestamp": "2022-05-04", "split": "val"} +{"id": "CVE-2022-32917", "text": "Apple iOS, iPadOS, and macOS Remote Code Execution Vulnerability\n\nAffected: Apple iOS, iPadOS, and macOS\n\nApple kernel, which is included in iOS, iPadOS, and macOS, contains an unspecified vulnerability where an application may be able to execute code with kernel privileges.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-20, CWE-787\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-32917", "title": "Apple iOS, iPadOS, and macOS Remote Code Execution Vulnerability", "source": "cisa_kev", "timestamp": "2022-09-14", "split": "val"} +{"id": "2441fb416c9df66e000d", "text": "CVE: CVE-2022-29164\n\n[{'lang': 'en', 'value': 'Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. In affected versions an attacker can create a workflow which produces a HTML artifact containing an HTML file that contains a script which uses XHR calls to interact with the Argo Server API. The attacker emails the deep-link to the artifact to their victim. The victim opens the link, the script starts running. As the script has access to", "cve_id": "CVE-2022-29164", "title": "CVE-2022-29164", "source": "cvefixes", "timestamp": "2022-05-06", "split": "val"} +{"id": "a2928745a067eaf6f3c0", "text": "CVE: CVE-2022-0939\n\n[{'lang': 'en', 'value': 'Server-Side Request Forgery (SSRF) in GitHub repository janeczku/calibre-web prior to 0.6.18.'}]\n\nFix commit: Better epub cover parsing with multiple cover-image items\nCode cosmetics\nrenamed variables\nrefactored xml page generation\nrefactored prepare author", "cve_id": "CVE-2022-0939", "title": "CVE-2022-0939", "source": "cvefixes", "timestamp": "2022-04-04", "split": "val"} +{"id": "c9ba795ffb9c00b684ae", "text": "CVE: CVE-2022-0632\n\n[{'lang': 'en', 'value': 'NULL Pointer Dereference in Homebrew mruby prior to 3.2.'}]\n\nFix commit: codegen.c: adjust stack position for `OP_SUPER` instruction.", "cve_id": "CVE-2022-0632", "title": "CVE-2022-0632", "source": "cvefixes", "timestamp": "2022-02-19", "split": "val"} +{"id": "CVE-2023-41179", "text": "Trend Micro Apex One and Worry-Free Business Security Remote Code Execution Vulnerability\n\nAffected: Trend Micro Apex One and Worry-Free Business Security\n\nTrend Micro Apex One and Worry-Free Business Security contain an unspecified vulnerability in the third-party anti-virus uninstaller that could allow an attacker to manipulate the module to conduct remote code execution. An attacker must first obtain administrative console access on the target system in order to exploit this vulnerability.\n\nR", "cve_id": "CVE-2023-41179", "title": "Trend Micro Apex One and Worry-Free Business Security Remote Code Execution Vulnerability", "source": "cisa_kev", "timestamp": "2023-09-21", "split": "val"} +{"id": "74f318cb28658b705f69", "text": "[Uncontrolled Resource Consumption] CVE-2023-28755: ReDoS vulnerability in URI\n\nOriginal report on the Ruby program: https://hackerone.com/reports/1444501\nAdvisort: https://www.ruby-lang.org/en/news/2023/03/28/redos-in-uri-cve-2023-28755/\nNIST entry: https://nvd.nist.gov/vuln/detail/CVE-2023-28755\nCVSS: 7.5 high `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H` as listed by NIST but frankly I disagree with the `UI:N` part, I won't mind the extra 2k if you go with NIST but it didn't feel right not", "cve_id": "CVE-2023-28755", "title": "CVE-2023-28755: ReDoS vulnerability in URI (Uncontrolled Resource Consumption)", "source": "hackerone", "timestamp": "2023-04-26", "split": "val"} +{"id": "8a7ebb179f285d065758", "text": "CVE: CVE-2022-25761\n\n[{'lang': 'en', 'value': 'The package open62541/open62541 before 1.2.5, from 1.3-rc1 and before 1.3.1 are vulnerable to Denial of Service (DoS) due to a missing limitation on the number of received chunks - per single session or in total for all concurrent sessions. An attacker can exploit this vulnerability by sending an unlimited number of huge chunks (e.g. 2GB each) without sending the Final closing chunk.'}]\n\nFix commit: fix(plugin): Add default limits for chunks and mes", "cve_id": "CVE-2022-25761", "title": "CVE-2022-25761", "source": "cvefixes", "timestamp": "2022-08-23", "split": "val"} +{"id": "29e59b5a924213ed37f9", "text": "CVE: CVE-2022-2015\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository jgraph/drawio prior to 19.0.2.'}]\n\nFix commit: 19.0.2 release", "cve_id": "CVE-2022-2015", "title": "CVE-2022-2015", "source": "cvefixes", "timestamp": "2022-06-09", "split": "val"} +{"id": "c002fd4467610355da52", "text": "CVE: CVE-2022-25865\n\n[{'lang': 'en', 'value': 'The package workspace-tools before 0.18.4 are vulnerable to Command Injection via git argument injection. When calling the fetchRemoteBranch(remote: string, remoteBranch: string, cwd: string) function, both the remote and remoteBranch parameters are passed to the git fetch subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.'}]\n\nFix commit: Fix git fetch - addresses a potential securi", "cve_id": "CVE-2022-25865", "title": "CVE-2022-25865", "source": "cvefixes", "timestamp": "2022-05-13", "split": "val"} +{"id": "5698614d3806d33d8efc", "text": "CVE: CVE-2022-24881\n\n[{'lang': 'en', 'value': 'Ballcat Codegen provides the function of online editing code to generate templates. In versions prior to 1.0.0.beta.2, attackers can implement remote code execution through malicious code injection of the template engine. This happens because Velocity and freemarker templates are introduced but input verification is not done. The fault is rectified in version 1.0.0.beta.2.'}]\n\nFix commit: :lock: 修改模板引擎的默认安全策略,以防止RCE", "cve_id": "CVE-2022-24881", "title": "CVE-2022-24881", "source": "cvefixes", "timestamp": "2022-04-26", "split": "val"} +{"id": "50f73c0cde165aeb7994", "text": "CVE: CVE-2022-2183\n\n[{'lang': 'en', 'value': 'Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.5151: reading beyond the end of the line with lisp indenting\n\nProblem: Reading beyond the end of the line with lisp indenting.\nSolution: Avoid going over the NUL at the end of the line.", "cve_id": "CVE-2022-2183", "title": "CVE-2022-2183", "source": "cvefixes", "timestamp": "2022-06-23", "split": "val"} +{"id": "CVE-2023-45249", "text": "Acronis Cyber Infrastructure (ACI) Insecure Default Password Vulnerability\n\nAffected: Acronis Cyber Infrastructure (ACI)\n\nAcronis Cyber Infrastructure (ACI) allows an unauthenticated user to execute commands remotely due to the use of default passwords.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-1393\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-45249", "title": "Acronis Cyber Infrastructure (ACI) Insecure Default Password Vulnerability", "source": "cisa_kev", "timestamp": "2024-07-29", "split": "val"} +{"id": "CVE-2023-22515", "text": "Atlassian Confluence Data Center and Server Broken Access Control Vulnerability\n\nAffected: Atlassian Confluence Data Center and Server\n\nAtlassian Confluence Data Center and Server contains a broken access control vulnerability that allows an attacker to create unauthorized Confluence administrator accounts and access Confluence.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. Check all affected Confluence instances for", "cve_id": "CVE-2023-22515", "title": "Atlassian Confluence Data Center and Server Broken Access Control Vulnerability", "source": "cisa_kev", "timestamp": "2023-10-05", "split": "val"} +{"id": "5ae8eb1b6078a601b2c5", "text": "CVE: CVE-2022-22111\n\n[{'lang': 'en', 'value': 'In DayByDay CRM, version 2.2.0 is vulnerable to missing authorization. Any application user in the application who has update user permission enabled is able to change the password of other users, including the administrator’s. This allows the attacker to gain access to the highest privileged user in the application.'}]\n\nFix commit: ensure only admin and owner can change role, and password, unless it is yourself", "cve_id": "CVE-2022-22111", "title": "CVE-2022-22111", "source": "cvefixes", "timestamp": "2022-01-05", "split": "val"} +{"id": "9820c7be59aa9a7cf5c7", "text": "CVE: CVE-2022-1365\n\n[{'lang': 'en', 'value': 'Exposure of Private Personal Information to an Unauthorized Actor in GitHub repository lquixada/cross-fetch prior to 3.1.5.'}]\n\nFix commit: chore: updated node-fetch version to 2.6.7 (#124)\n\n* chore: updated node-fetch version to 2.6.7\r\n\r\n* build: use node 16.x instead of 15.x", "cve_id": "CVE-2022-1365", "title": "CVE-2022-1365", "source": "cvefixes", "timestamp": "2022-04-15", "split": "val"} +{"id": "5203cfbab71c46ebdfd3", "text": "CVE: CVE-2022-2821\n\n[{'lang': 'en', 'value': 'Missing Critical Step in Authentication in GitHub repository namelessmc/nameless prior to v2.0.2.'}]\n\nFix commit: Add ability to rate limit via Validate class (#2998)", "cve_id": "CVE-2022-2821", "title": "CVE-2022-2821", "source": "cvefixes", "timestamp": "2022-08-15", "split": "val"} +{"id": "562b77f9a8762adbddf4", "text": "CVE: CVE-2022-33981\n\n[{'lang': 'en', 'value': 'drivers/block/floppy.c in the Linux kernel before 5.17.6 is vulnerable to a denial of service, because of a concurrency use-after-free flaw after deallocating raw_cmd in the raw_cmd_ioctl function.'}]\n\nFix commit: floppy: disable FDRAWCMD by default\n\nMinh Yuan reported a concurrency use-after-free issue in the floppy code\nbetween raw_cmd_ioctl and seek_interrupt.\n\n[ It turns out this has been around, and that others have reported the\n KASAN splats", "cve_id": "CVE-2022-33981", "title": "CVE-2022-33981", "source": "cvefixes", "timestamp": "2022-06-18", "split": "val"} +{"id": "b8fd2961eae68d51f86c", "text": "CVE: CVE-2022-24802\n\n[{'lang': 'en', 'value': 'deepmerge-ts is a typescript library providing functionality to deep merging of javascript objects. deepmerge-ts is vulnerable to Prototype Pollution via file deepmerge.ts, function defaultMergeRecords(). This issue has been patched in version 4.0.2. There are no known workarounds for this issue.'}]\n\nFix commit: Merge pull request #86 from RebeccaStevens/security/prototype-pollution", "cve_id": "CVE-2022-24802", "title": "CVE-2022-24802", "source": "cvefixes", "timestamp": "2022-04-01", "split": "val"} +{"id": "13a043ff529fd5d07186", "text": "CVE: CVE-2022-27475\n\n[{'lang': 'en', 'value': 'Cross site scripting (XSS) vulnerability in tramyardg hotel-mgmt-system, allows attackers to execute arbitrary code when when /admin.php is loaded.'}]\n\nFix commit: + sanitize xss function", "cve_id": "CVE-2022-27475", "title": "CVE-2022-27475", "source": "cvefixes", "timestamp": "2022-04-13", "split": "val"} +{"id": "CVE-2022-24521", "text": "Microsoft Windows CLFS Driver Privilege Escalation Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Common Log File System (CLFS) Driver contains an unspecified vulnerability that allows for privilege escalation.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-787, CWE-1285\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-24521", "title": "Microsoft Windows CLFS Driver Privilege Escalation Vulnerability", "source": "cisa_kev", "timestamp": "2022-04-13", "split": "val"} +{"id": "27a36f6992aa0a042e87", "text": "CVE: CVE-2022-23618\n\n[{'lang': 'en', 'value': 'XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions there is no protection against URL redirection to untrusted sites, in particular some well known parameters (xredirect) can be used to perform url redirections. This problem has been patched in XWiki 12.10.7 and XWiki 13.3RC1. Users are advised to update. There are no known workarounds for this issue.'}]\n\nFix commit: XWIKI-10", "cve_id": "CVE-2022-23618", "title": "CVE-2022-23618", "source": "cvefixes", "timestamp": "2022-02-09", "split": "val"} +{"id": "bade8831c72bb490d877", "text": "CVE: CVE-2022-0285\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in Packagist pimcore/pimcore prior to 10.2.9.'}]\n\nFix commit: [Thumbnails] Escape group text properly", "cve_id": "CVE-2022-0285", "title": "CVE-2022-0285", "source": "cvefixes", "timestamp": "2022-01-20", "split": "val"} +{"id": "a4d06bd1b8bf59254da6", "text": "CVE: CVE-2022-21728\n\n[{'lang': 'en', 'value': \"Tensorflow is an Open Source Machine Learning Framework. The implementation of shape inference for `ReverseSequence` does not fully validate the value of `batch_dim` and can result in a heap OOB read. There is a check to make sure the value of `batch_dim` does not go over the rank of the input, but there is no check for negative values. Negative dimensions are allowed in some cases to mimic Python's negative indexing (i.e., indexing from the end of", "cve_id": "CVE-2022-21728", "title": "CVE-2022-21728", "source": "cvefixes", "timestamp": "2022-02-03", "split": "val"} +{"id": "9c06c885441b630fd227", "text": "[Cleartext Transmission of Sensitive Information] CVE-2022-43551: Another HSTS bypass via IDN\n\nOriginal Report:https://hackerone.com/reports/1755083\n\n## Impact\n\nHSTS bypass.", "cve_id": "CVE-2022-43551", "title": "CVE-2022-43551: Another HSTS bypass via IDN (Cleartext Transmission of Sensitive Information)", "source": "hackerone", "timestamp": "2023-02-03", "split": "val"} +{"id": "CVE-2023-2033", "text": "Google Chromium V8 Type Confusion Vulnerability\n\nAffected: Google Chromium V8\n\nGoogle Chromium V8 Engine contains a type confusion vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-843\n\n[Source: CISA Known Exploited Vulner", "cve_id": "CVE-2023-2033", "title": "Google Chromium V8 Type Confusion Vulnerability", "source": "cisa_kev", "timestamp": "2023-04-17", "split": "val"} +{"id": "b3cf9bbf347ab8467edb", "text": "[Code Injection] ██████████ vulnerable to CVE-2022-22954\n\nI found that one of the targets belongs to **DOD** vulnerable to **CVE-2022-22954** where an attacker may be able to execute any malicious code like escalating Remote code execution is also possible \n\n**Technical Summary:**\n\nCVE-2022-22954 is a server-side template injection vulnerability in the VMware Workspace ONE Access and Identity Manager. This vulnerability was assigned a CVSSv3 score of 9.8. An unauthenticated attacker with network", "cve_id": "CVE-2022-22954", "title": "██████████ vulnerable to CVE-2022-22954 (Code Injection)", "source": "hackerone", "timestamp": "2022-04-29", "split": "val"} +{"id": "CVE-2023-45727", "text": "North Grid Proself Improper Restriction of XML External Entity (XXE) Reference Vulnerability\n\nAffected: North Grid Proself\n\nNorth Grid Proself Enterprise/Standard, Gateway, and Mail Sanitize contain an improper restriction of XML External Entity (XXE) reference vulnerability, which could allow a remote, unauthenticated attacker to conduct an XXE attack.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-611", "cve_id": "CVE-2023-45727", "title": "North Grid Proself Improper Restriction of XML External Entity (XXE) Reference Vulnerability", "source": "cisa_kev", "timestamp": "2024-12-03", "split": "val"} +{"id": "2fea3ce8f3647a8a28e7", "text": "[External Control of File Name or Path] CVE-2023-38546: cookie injection with none file\n\nWhen `curl_easy_duphandle()` is used to duplicate an easy handle it is possible to inject cookies \ninto that duplicated handle if a file `none` exists in the current working directory.\n\n## PoC / Steps to reproduce:\n1. Open 2 terminals\n1. compile F2699218\n1. in terminal 1: \n `nc -l -p 8888 127.0.0.1`\n1. in terminal 2: \n\t* `echo -e \"127.0.0.1\\tTRUE\\t/\\tFALSE\\t0\\tname\\tvalue\" > none`\n\t* `/path/to/poc_cookie", "cve_id": "CVE-2023-38546", "title": "CVE-2023-38546: cookie injection with none file (External Control of File Name or Path)", "source": "hackerone", "timestamp": "2023-10-11", "split": "val"} +{"id": "fc5c14940986552f4cf0", "text": "CVE: CVE-2022-23220\n\n[{'lang': 'en', 'value': 'USBView 2.1 before 2.2 allows some local users (e.g., ones logged in via SSH) to execute arbitrary code as root because certain Polkit settings (e.g., allow_any=yes) for pkexec disable the authentication requirement. Code execution can, for example, use the --gtk-module option. This affects Ubuntu, Debian, and Gentoo.'}]\n\nFix commit: org.freedesktop.pkexec.usbview.policy: fix a local root privilege escalation issue via pkexec (CVE-2022-23220).\n\nThe", "cve_id": "CVE-2022-23220", "title": "CVE-2022-23220", "source": "cvefixes", "timestamp": "2022-01-21", "split": "val"} +{"id": "648ec913030bb7b14bcd", "text": "CVE: CVE-2022-27651\n\n[{'lang': 'en', 'value': 'A flaw was found in buildah where containers were incorrectly started with non-empty default permissions. A bug was found in Moby (Docker Engine) where containers were incorrectly started with non-empty inheritable Linux process capabilities, enabling an attacker with access to programs with inheritable file capabilities to elevate those capabilities to the permitted set when execve(2) runs. This has the potential to impact confidentiality and integ", "cve_id": "CVE-2022-27651", "title": "CVE-2022-27651", "source": "cvefixes", "timestamp": "2022-04-04", "split": "val"} +{"id": "3690e9799be328c13fcf", "text": "CVE: CVE-2022-31142\n\n[{'lang': 'en', 'value': '@fastify/bearer-auth is a Fastify plugin to require bearer Authorization headers. @fastify/bearer-auth prior to versions 7.0.2 and 8.0.1 does not securely use crypto.timingSafeEqual. A malicious attacker could estimate the length of one valid bearer token. According to the corresponding RFC 6750, the bearer token has only base64 valid characters, reducing the range of characters for a brute force attack. Version 7.0.2 and 8.0.1 of @fastify/bearer-au", "cve_id": "CVE-2022-31142", "title": "CVE-2022-31142", "source": "cvefixes", "timestamp": "2022-07-14", "split": "val"} +{"id": "023c252a6b35cbf3fd6b", "text": "[Heap Overflow] CVE-2023-38545: socks5 heap buffer overflow\n\n# Summary:\n\nThe SOCKS5 state machine can be manipulated by a remote attacker to overflow heap memory if four conditions are met:\n\n1. The request is made via socks5h.\n2. The state machine's negotiation buffer is smaller than ~65k.\n3. The SOCKS server's \"hello\" reply is delayed.\n4. The attacker sets a final destination hostname larger than the negotiation\nbuffer.\n\nlibcurl is supposed to disable SOCKS5 remote hostname resolution for hostn", "cve_id": "CVE-2023-38545", "title": "CVE-2023-38545: socks5 heap buffer overflow (Heap Overflow)", "source": "hackerone", "timestamp": "2023-10-11", "split": "val"} +{"id": "CVE-2023-43770", "text": "Roundcube Webmail Persistent Cross-Site Scripting (XSS) Vulnerability\n\nAffected: Roundcube Webmail\n\nRoundcube Webmail contains a persistent cross-site scripting (XSS) vulnerability that can lead to information disclosure via malicious link references in plain/text messages.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-79\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-43770", "title": "Roundcube Webmail Persistent Cross-Site Scripting (XSS) Vulnerability", "source": "cisa_kev", "timestamp": "2024-02-12", "split": "val"} +{"id": "CVE-2023-35078", "text": "Ivanti Endpoint Manager Mobile Authentication Bypass Vulnerability\n\nAffected: Ivanti Endpoint Manager Mobile (EPMM)\n\nIvanti Endpoint Manager Mobile (EPMM, previously branded MobileIron Core) contains an authentication bypass vulnerability that allows unauthenticated access to specific API paths. An attacker with access to these API paths can access personally identifiable information (PII) such as names, phone numbers, and other mobile device details for users on a vulnerable system. An attacker", "cve_id": "CVE-2023-35078", "title": "Ivanti Endpoint Manager Mobile Authentication Bypass Vulnerability", "source": "cisa_kev", "timestamp": "2023-07-25", "split": "val"} +{"id": "6fd5b6c84b43a88a10d9", "text": "CVE: CVE-2022-0558\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in Packagist microweber/microweber prior to 1.2.11.'}]\n\nFix commit: xss fix on tagging module", "cve_id": "CVE-2022-0558", "title": "CVE-2022-0558", "source": "cvefixes", "timestamp": "2022-02-10", "split": "val"} +{"id": "040877aa689a3f1e8933", "text": "CVE: CVE-2022-0596\n\n[{'lang': 'en', 'value': 'Business Logic Errors in Packagist microweber/microweber prior to 1.2.11.'}]\n\nFix commit: Update AdminMakeInstall.php", "cve_id": "CVE-2022-0596", "title": "CVE-2022-0596", "source": "cvefixes", "timestamp": "2022-02-15", "split": "val"} +{"id": "b457e9c8b96fed985852", "text": "CVE: CVE-2022-0509\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in Packagist pimcore/pimcore prior to 10.3.1.'}]\n\nFix commit: [Admin] Website Settings - Escape grid values properly", "cve_id": "CVE-2022-0509", "title": "CVE-2022-0509", "source": "cvefixes", "timestamp": "2022-02-08", "split": "val"} +{"id": "96e09aefa5cd61a9a977", "text": "CVE: CVE-2022-24803\n\n[{'lang': 'en', 'value': 'Asciidoctor-include-ext is Asciidoctor’s standard include processor reimplemented as an extension. Versions prior to 0.4.0, when used to render user-supplied input in AsciiDoc markup, may allow an attacker to execute arbitrary system commands on the host operating system. This attack is possible even when `allow-uri-read` is disabled! The problem has been patched in the referenced commits.'}]\n\nFix commit: Fix command injection vulnerability\n\nReporte", "cve_id": "CVE-2022-24803", "title": "CVE-2022-24803", "source": "cvefixes", "timestamp": "2022-04-01", "split": "val"} +{"id": "a1e89429383892c5fdd5", "text": "[Unknown] ReDoS (Rails::Html::PermitScrubber.scrub_attribute)\n\nI reported at https://hackerone.com/reports/1684163\n\nhttps://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-5x79-w82f-gw8w\n\n> Certain configurations of rails-html-sanitizer < 1.4.4 use an inefficient regular expression that is susceptible to excessive backtracking when attempting to sanitize certain SVG attributes. This may lead to a denial of service through CPU resource consumption.\n\nIt seems that the same problem", "cve_id": "CVE-2022-23514", "title": "ReDoS (Rails::Html::PermitScrubber.scrub_attribute) (Unknown)", "source": "hackerone", "timestamp": "2022-12-14", "split": "val"} +{"id": "ba977310988c2823d341", "text": "CVE: CVE-2022-1785\n\n[{'lang': 'en', 'value': 'Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.4977.'}]\n\nFix commit: patch 8.2.4977: memory access error when substitute expression changes window\n\nProblem: Memory access error when substitute expression changes window.\nSolution: Disallow changing window in substitute expression.", "cve_id": "CVE-2022-1785", "title": "CVE-2022-1785", "source": "cvefixes", "timestamp": "2022-05-19", "split": "val"} +{"id": "1062dfb33f1d534ea9d5", "text": "CVE: CVE-2022-2289\n\n[{'lang': 'en', 'value': 'Use After Free in GitHub repository vim/vim prior to 9.0.'}]\n\nFix commit: patch 9.0.0026: accessing freed memory with diff put\n\nProblem: Accessing freed memory with diff put.\nSolution: Bail out when diff pointer is no longer valid.", "cve_id": "CVE-2022-2289", "title": "CVE-2022-2289", "source": "cvefixes", "timestamp": "2022-07-03", "split": "val"} +{"id": "dbf0d21c67f543a96afc", "text": "CVE: CVE-2022-1947\n\n[{'lang': 'en', 'value': 'Use of Incorrect Operator in GitHub repository polonel/trudesk prior to 1.2.3.'}]\n\nFix commit: fix(messages): invalid permissions", "cve_id": "CVE-2022-1947", "title": "CVE-2022-1947", "source": "cvefixes", "timestamp": "2022-05-31", "split": "val"} +{"id": "f689c0f008fbb91c3f9e", "text": "CVE: CVE-2022-23599\n\n[{'lang': 'en', 'value': \"Products.ATContentTypes are the core content types for Plone 2.1 - 4.3. Versions of Plone that are dependent on Products.ATContentTypes prior to version 3.0.6 are vulnerable to reflected cross site scripting and open redirect when an attacker can get a compromised version of the image_view_fullscreen page in a cache, for example in Varnish. The technique is known as cache poisoning. Any later visitor can get redirected when clicking on a link on thi", "cve_id": "CVE-2022-23599", "title": "CVE-2022-23599", "source": "cvefixes", "timestamp": "2022-01-28", "split": "val"} +{"id": "8e6d0060b1d6a02bcf9e", "text": "CVE: CVE-2022-1154\n\n[{'lang': 'en', 'value': 'Use after free in utf_ptr2char in GitHub repository vim/vim prior to 8.2.4646.'}]\n\nFix commit: patch 8.2.4646: using buffer line after it has been freed\n\nProblem: Using buffer line after it has been freed in old regexp engine.\nSolution: After getting mark get the line again.", "cve_id": "CVE-2022-1154", "title": "CVE-2022-1154", "source": "cvefixes", "timestamp": "2022-03-30", "split": "val"} +{"id": "314d5a7d85f5b75cd247", "text": "CVE: CVE-2022-24752\n\n[{'lang': 'en', 'value': 'SyliusGridBundle is a package of generic data grids for Symfony applications. Prior to versions 1.10.1 and 1.11-rc2, values added at the end of query sorting were passed directly to the database. The maintainers do not know if this could lead to direct SQL injections but took steps to remediate the vulnerability. The issue is fixed in versions 1.10.1 and 1.11-rc2. As a workaround, overwrite the`Sylius\\\\Component\\\\Grid\\\\Sorting\\\\Sorter.php` class and", "cve_id": "CVE-2022-24752", "title": "CVE-2022-24752", "source": "cvefixes", "timestamp": "2022-03-15", "split": "val"} +{"id": "577a6c36ca63175c3e4d", "text": "CVE: CVE-2022-0912\n\n[{'lang': 'en', 'value': 'Unrestricted Upload of File with Dangerous Type in GitHub repository microweber/microweber prior to 1.2.11.'}]\n\nFix commit: update", "cve_id": "CVE-2022-0912", "title": "CVE-2022-0912", "source": "cvefixes", "timestamp": "2022-03-11", "split": "val"} +{"id": "e7c394c6dcc5a7b2446b", "text": "CVE: CVE-2022-0602\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - DOM in GitHub repository tastyigniter/tastyigniter prior to 3.3.0.'}]\n\nFix commit: Minor fixes\n\nSigned-off-by: Sam Poyigi <6567634+sampoyigi@users.noreply.github.com>", "cve_id": "CVE-2022-0602", "title": "CVE-2022-0602", "source": "cvefixes", "timestamp": "2022-04-05", "split": "val"} +{"id": "42a2774f3de808950d5d", "text": "CVE: CVE-2022-1444\n\n[{'lang': 'en', 'value': 'heap-use-after-free in GitHub repository radareorg/radare2 prior to 5.7.0. This vulnerability is capable of inducing denial of service.'}]\n\nFix commit: Redo minor cleanup in new_rbtree", "cve_id": "CVE-2022-1444", "title": "CVE-2022-1444", "source": "cvefixes", "timestamp": "2022-04-23", "split": "val"} +{"id": "14a5ad9844567cf0cd25", "text": "CVE: CVE-2022-1825\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Reflected in GitHub repository collectiveaccess/providence prior to 1.8.'}]\n\nFix commit: Print potential XSS in error message handler", "cve_id": "CVE-2022-1825", "title": "CVE-2022-1825", "source": "cvefixes", "timestamp": "2022-05-23", "split": "val"} +{"id": "CVE-2023-3519", "text": "Citrix NetScaler ADC and NetScaler Gateway Code Injection Vulnerability\n\nAffected: Citrix NetScaler ADC and NetScaler Gateway\n\nCitrix NetScaler ADC and NetScaler Gateway contains a code injection vulnerability that allows for unauthenticated remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-94\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-3519", "title": "Citrix NetScaler ADC and NetScaler Gateway Code Injection Vulnerability", "source": "cisa_kev", "timestamp": "2023-07-19", "split": "val"} +{"id": "3ba236ff32b777329c23", "text": "CVE: CVE-2022-29531\n\n[{'lang': 'en', 'value': 'An issue was discovered in MISP before 2.4.158. There is stored XSS in the event graph via a tag name.'}]\n\nFix commit: fix: [security] stored XSS fixed in event graph\n\n- unsanitised javascript insertion of tag name in the filters\n\n- as reported by Dawid Czarnecki of Zigrin Security on behalf of the Luxembourg Army", "cve_id": "CVE-2022-29531", "title": "CVE-2022-29531", "source": "cvefixes", "timestamp": "2022-04-20", "split": "val"} +{"id": "CVE-2022-41082", "text": "Microsoft Exchange Server Remote Code Execution Vulnerability\n\nAffected: Microsoft Exchange Server\n\nMicrosoft Exchange Server contains an unspecified vulnerability that allows for authenticated remote code execution. Dubbed \"ProxyNotShell,\" this vulnerability is chainable with CVE-2022-41040 which allows for the remote code execution.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-41082", "title": "Microsoft Exchange Server Remote Code Execution Vulnerability", "source": "cisa_kev", "timestamp": "2022-09-30", "split": "val"} +{"id": "8e0423e9e24476931dc1", "text": "CVE: CVE-2022-1032\n\n[{'lang': 'en', 'value': 'Insecure deserialization of not validated module file in GitHub repository crater-invoice/crater prior to 6.0.6.'}]\n\nFix commit: Module upload validation (#857)\n\nhttps://huntr.dev/bounties/cb9a0393-be34-4021-a06c-00c7791c7622/", "cve_id": "CVE-2022-1032", "title": "CVE-2022-1032", "source": "cvefixes", "timestamp": "2022-03-29", "split": "val"} +{"id": "f574ce2e9ea80a7c65b8", "text": "CVE: CVE-2022-0560\n\n[{'lang': 'en', 'value': 'Open Redirect in Packagist microweber/microweber prior to 1.2.11.'}]\n\nFix commit: update", "cve_id": "CVE-2022-0560", "title": "CVE-2022-0560", "source": "cvefixes", "timestamp": "2022-02-11", "split": "val"} +{"id": "02f353c41a4a1ed3c8f7", "text": "[Business Logic Errors] CVE-2023-27534: SFTP path ~ resolving discrepancy\n\ncurl supports SFTP transfers. curl's SFTP implementation offers a special feature in the path component of URLs: a tilde (~) character as the first path element in the path to denotes a path relative to the user's home directory. This is supported because of wording in the once proposed to-become RFC draft that was to dictate how SFTP URLs work.\n\nDue to a bug, the handling of the tilde in SFTP path did however not only re", "cve_id": "CVE-2023-27534", "title": "CVE-2023-27534: SFTP path ~ resolving discrepancy (Business Logic Errors)", "source": "hackerone", "timestamp": "2023-03-20", "split": "val"} +{"id": "4aeb8334818a3bf55cda", "text": "[Unknown] (CVE-2023-32006) Permissions policies can impersonate other modules in using module.constructor.createRequire()\n\nhttps://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-impersonate-other-modules-in-using-moduleconstructorcreaterequire-mediumcve-2023-32006\n\nhttps://hackerone.com/reports/2043807\n\nPatch was provided about maintainer opted for different approach.\n\n## Impact\n\nsee reports", "cve_id": "CVE-2023-32006", "title": "(CVE-2023-32006) Permissions policies can impersonate other modules in using module.constructor.createRequire() (Unknown)", "source": "hackerone", "timestamp": "2023-10-08", "split": "val"} +{"id": "fe52c13cf47ee06e4885", "text": "CVE: CVE-2022-24791\n\n[{'lang': 'en', 'value': 'Wasmtime is a standalone JIT-style runtime for WebAssembly, using Cranelift. There is a use after free vulnerability in Wasmtime when both running Wasm that uses externrefs and enabling epoch interruption in Wasmtime. If you are not explicitly enabling epoch interruption (it is disabled by default) then you are not affected. If you are explicitly disabling the Wasm reference types proposal (it is enabled by default) then you are also not affected. T", "cve_id": "CVE-2022-24791", "title": "CVE-2022-24791", "source": "cvefixes", "timestamp": "2022-03-31", "split": "val"} +{"id": "cf433fb6b00d41d32e16", "text": "CVE: CVE-2022-21122\n\n[{'lang': 'en', 'value': \"The package metacalc before 0.0.2 are vulnerable to Arbitrary Code Execution when it exposes JavaScript's Math class to the v8 context. As the Math class is exposed to user-land, it can be used to get access to JavaScript's Function constructor.\"}]\n\nFix commit: Prevent arbitrary js code execution\n\nPR-URL: https://github.com/metarhia/metacalc/pull/16", "cve_id": "CVE-2022-21122", "title": "CVE-2022-21122", "source": "cvefixes", "timestamp": "2022-06-08", "split": "val"} +{"id": "5b64c9c4f976565c3b90", "text": "CVE: CVE-2022-35153\n\n[{'lang': 'en', 'value': 'FusionPBX 5.0.1 was discovered to contain a command injection vulnerability via /fax/fax_send.php.'}]\n\nFix commit: Security use escapeshellarg", "cve_id": "CVE-2022-35153", "title": "CVE-2022-35153", "source": "cvefixes", "timestamp": "2022-08-18", "split": "val"} +{"id": "CVE-2023-2533", "text": "PaperCut NG/MF Cross-Site Request Forgery (CSRF) Vulnerability\n\nAffected: PaperCut NG/MF\n\nPaperCut NG/MF contains a cross-site request forgery (CSRF) vulnerability, which, under specific conditions, could potentially enable an attacker to alter security settings or execute arbitrary code. \n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-352\n\n[Source", "cve_id": "CVE-2023-2533", "title": "PaperCut NG/MF Cross-Site Request Forgery (CSRF) Vulnerability", "source": "cisa_kev", "timestamp": "2025-07-28", "split": "val"} +{"id": "CVE-2023-21674", "text": "Microsoft Windows Advanced Local Procedure Call (ALPC) Privilege Escalation Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Advanced Local Procedure Call (ALPC) contains an unspecified vulnerability that allows for privilege escalation.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-21674", "title": "Microsoft Windows Advanced Local Procedure Call (ALPC) Privilege Escalation Vulnerability", "source": "cisa_kev", "timestamp": "2023-01-10", "split": "val"} +{"id": "92660f909479edf3350b", "text": "CVE: CVE-2022-1850\n\n[{'lang': 'en', 'value': 'Path Traversal in GitHub repository filegator/filegator prior to 7.8.0.'}]\n\nFix commit: path traversal fix", "cve_id": "CVE-2022-1850", "title": "CVE-2022-1850", "source": "cvefixes", "timestamp": "2022-05-24", "split": "val"} +{"id": "7cb8cc7eb5c39f003ea4", "text": "CVE: CVE-2022-21646\n\n[{'lang': 'en', 'value': 'SpiceDB is a database system for managing security-critical application permissions. Any user making use of a wildcard relationship under the right hand branch of an `exclusion` or within an `intersection` operation will see `Lookup`/`LookupResources` return a resource as \"accessible\" if it is *not* accessible by virtue of the inclusion of the wildcard in the intersection or the right side of the exclusion. In `v1.3.0`, the wildcard is ignored entir", "cve_id": "CVE-2022-21646", "title": "CVE-2022-21646", "source": "cvefixes", "timestamp": "2022-01-11", "split": "val"} +{"id": "6524d7338e81806322b2", "text": "CVE: CVE-2022-24822\n\n[{'lang': 'en', 'value': 'Podium is a library for building micro frontends. @podium/layout is a module for building a Podium layout server, and @podium/proxy is a module for proxying HTTP requests from a layout server to a podlet server. In @podium/layout prior to version 4.6.110 and @podium/proxy prior to version 4.2.74, an attacker using the `Trailer` header as part of the request against proxy endpoints has the ability to take down the server. All Podium layouts that incl", "cve_id": "CVE-2022-24822", "title": "CVE-2022-24822", "source": "cvefixes", "timestamp": "2022-04-06", "split": "val"} +{"id": "9bb916212632ca43c780", "text": "CVE: CVE-2022-2550\n\n[{'lang': 'en', 'value': 'OS Command Injection in GitHub repository hestiacp/hestiacp prior to 1.6.5.'}]\n\nFix commit: fix DokuWiki shell issue\n\nUNTESTED as of writing; reported by https://huntr.dev/users/redstarp2/", "cve_id": "CVE-2022-2550", "title": "CVE-2022-2550", "source": "cvefixes", "timestamp": "2022-07-27", "split": "val"} +{"id": "9255273ee06c43de8555", "text": "CVE: CVE-2022-0432\n\n[{'lang': 'en', 'value': 'Prototype Pollution in GitHub repository mastodon/mastodon prior to 3.5.0.'}]\n\nFix commit: Fixed prototype pollution bug and only allow trusted origin (#17420)", "cve_id": "CVE-2022-0432", "title": "CVE-2022-0432", "source": "cvefixes", "timestamp": "2022-02-02", "split": "val"} +{"id": "e91557c46bb31467bd53", "text": "[Cross-site Scripting (XSS) - Generic] CVE-2022-23520: Incomplete fix for CVE-2022-32209 (XSS in Rails::Html::Sanitizer under certain configurations)\n\nThe following is from: https://hackerone.com/reports/1654310\n\nWhile building a PoC for CVE-2022-32209, I noticed that I could not fix my vulnerable application by updating https://github.com/rails/rails-html-sanitizer from 1.4.2 to 1.4.3 even though the Hackerone report about this vulnerability suggested that this should fix it (see here: https://", "cve_id": "CVE-2022-23520", "title": "CVE-2022-23520: Incomplete fix for CVE-2022-32209 (XSS in Rails::Html::Sanitizer under certain configurations) (Cross-site Scripting (XSS) - Generic)", "source": "hackerone", "timestamp": "2023-01-04", "split": "val"} +{"id": "a27e188d5a62aa82cf58", "text": "CVE: CVE-2022-23058\n\n[{'lang': 'en', 'value': 'ERPNext in versions v12.0.9-v13.0.3 are affected by a stored XSS vulnerability that allows low privileged users to store malicious scripts in the ‘username’ field in ‘my settings’ which can lead to full account takeover.'}]\n\nFix commit: feat: frappe.whitelist for class methods", "cve_id": "CVE-2022-23058", "title": "CVE-2022-23058", "source": "cvefixes", "timestamp": "2022-06-22", "split": "val"} +{"id": "b9165e548837c6a41473", "text": "CVE: CVE-2022-24066\n\n[{'lang': 'en', 'value': \"The package simple-git before 3.5.0 are vulnerable to Command Injection due to an incomplete fix of [CVE-2022-24433](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-2421199) which only patches against the git fetch attack vector. A similar use of the --upload-pack feature of git is also supported for git clone, which the prior fix didn't cover.\"}]\n\nFix commit: Prevent use of `--upload-pack` as a command in `git.clone` to avoid potential accidental c", "cve_id": "CVE-2022-24066", "title": "CVE-2022-24066", "source": "cvefixes", "timestamp": "2022-04-01", "split": "val"} +{"id": "9e804fce5c9cef09d0fa", "text": "CVE: CVE-2022-0088\n\n[{'lang': 'en', 'value': 'Cross-Site Request Forgery (CSRF) in GitHub repository yourls/yourls prior to 1.8.3.'}]\n\nFix commit: Add nonce to the logout link (#3264)\n\n* Add nonce to the logout link\r\n* Add tests for cookies being set or reset\r\n* More tests: check nonces are different for different actions & users\r\n\r\nFixes #3170", "cve_id": "CVE-2022-0088", "title": "CVE-2022-0088", "source": "cvefixes", "timestamp": "2022-04-03", "split": "val"} +{"id": "f8e6924a1ccd6f388bf8", "text": "CVE: CVE-2022-1931\n\n[{'lang': 'en', 'value': 'Incorrect Synchronization in GitHub repository polonel/trudesk prior to 1.2.3.'}]\n\nFix commit: fix(messages): validation check", "cve_id": "CVE-2022-1931", "title": "CVE-2022-1931", "source": "cvefixes", "timestamp": "2022-05-31", "split": "val"} +{"id": "e398b60ecb8455fc63e9", "text": "CVE: CVE-2022-29205\n\n[{'lang': 'en', 'value': \"TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, there is a potential for segfault / denial of service in TensorFlow by calling `tf.compat.v1.*` ops which don't yet have support for quantized types, which was added after migration to TensorFlow 2.x. In these scenarios, since the kernel is missing, a `nullptr` value is passed to `ParseDimensionValue` for the `py_value` argument. Then, this", "cve_id": "CVE-2022-29205", "title": "CVE-2022-29205", "source": "cvefixes", "timestamp": "2022-05-20", "split": "val"} +{"id": "7402d9d9fd36a341997a", "text": "CVE: CVE-2022-29184\n\n[{'lang': 'en', 'value': 'GoCD is a continuous delivery server. In GoCD versions prior to 22.1.0, it is possible for existing authenticated users who have permissions to edit or create pipeline materials or pipeline configuration repositories to get remote code execution capability on the GoCD server via configuring a malicious branch name which abuses Mercurial hooks/aliases to exploit a command injection weakness. An attacker would require access to an account with existin", "cve_id": "CVE-2022-29184", "title": "CVE-2022-29184", "source": "cvefixes", "timestamp": "2022-05-20", "split": "val"} +{"id": "627274b26f7d55c0c342", "text": "[Unknown] [CVE-2023-38546] cookie injection with none file\n\nhttps://hackerone.com/reports/2148242\n\n## Impact\n\ncookie injection into a program using libcurl, if several conditions are met", "cve_id": "CVE-2023-38546", "title": "[CVE-2023-38546] cookie injection with none file (Unknown)", "source": "hackerone", "timestamp": "2023-11-23", "split": "val"} +{"id": "098eb5b628805ae74853", "text": "CVE: CVE-2022-2845\n\n[{'lang': 'en', 'value': 'Buffer Over-read in GitHub repository vim/vim prior to 9.0.0218.'}]\n\nFix commit: patch 9.0.0218: reading before the start of the line\n\nProblem: Reading before the start of the line.\nSolution: When displaying \"$\" check the column is not negative.", "cve_id": "CVE-2022-2845", "title": "CVE-2022-2845", "source": "cvefixes", "timestamp": "2022-08-17", "split": "val"} +{"id": "f8613c2d96727aa2e7ff", "text": "CVE: CVE-2022-0387\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in Packagist remdex/livehelperchat prior to 3.93v.'}]\n\nFix commit: fix", "cve_id": "CVE-2022-0387", "title": "CVE-2022-0387", "source": "cvefixes", "timestamp": "2022-01-27", "split": "val"} +{"id": "95cb6116ed09d436e6a5", "text": "CVE: CVE-2022-0755\n\n[{'lang': 'en', 'value': 'Improper Access Control in GitHub repository salesagility/suitecrm prior to 7.12.5.'}]\n\nFix commit: SuiteCRM 7.12.5 Release", "cve_id": "CVE-2022-0755", "title": "CVE-2022-0755", "source": "cvefixes", "timestamp": "2022-03-07", "split": "val"} +{"id": "e0f0e1ecba9c7cb064dd", "text": "CVE: CVE-2022-29784\n\n[{'lang': 'en', 'value': 'PublicCMS V4.0.202204.a and below contains an information leak via the component /views/directive/sys/SysConfigDataDirective.java.'}]\n\nFix commit: 安全漏洞修复 感谢 姜洋-长亭科技", "cve_id": "CVE-2022-29784", "title": "CVE-2022-29784", "source": "cvefixes", "timestamp": "2022-06-03", "split": "val"} +{"id": "CVE-2023-36844", "text": "Juniper Junos OS EX Series PHP External Variable Modification Vulnerability\n\nAffected: Juniper Junos OS\n\nJuniper Junos OS on EX Series contains a PHP external variable modification vulnerability that allows an unauthenticated, network-based attacker to control certain, important environment variables. Using a crafted request an attacker is able to modify certain PHP environment variables, leading to partial loss of integrity, which may allow chaining to other vulnerabilities.\n\nRequired Action: A", "cve_id": "CVE-2023-36844", "title": "Juniper Junos OS EX Series PHP External Variable Modification Vulnerability", "source": "cisa_kev", "timestamp": "2023-11-13", "split": "val"} +{"id": "12af25fc40719869170f", "text": "CVE: CVE-2022-23652\n\n[{'lang': 'en', 'value': 'capsule-proxy is a reverse proxy for Capsule Operator which provides multi-tenancy in Kubernetes. In versions prior to 0.2.1 an attacker with a proper authentication mechanism may use a malicious `Connection` header to start a privilege escalation attack towards the Kubernetes API Server. This vulnerability allows for an exploit of the `cluster-admin` Role bound to `capsule-proxy`. There are no known workarounds for this issue.'}]\n\nFix commit: bug:", "cve_id": "CVE-2022-23652", "title": "CVE-2022-23652", "source": "cvefixes", "timestamp": "2022-02-22", "split": "val"} +{"id": "b0e3a18a4a78683877f0", "text": "CVE: CVE-2022-23064\n\n[{'lang': 'en', 'value': 'In Snipe-IT, versions v3.0-alpha to v5.3.7 are vulnerable to Host Header Injection. By sending a specially crafted host header in the reset password request, it is possible to send password reset links to users which once clicked lead to an attacker controlled server and thus leading to password reset token leak. This leads to account take over.'}]\n\nFix commit: Force UrlGenerator's Root URL to be the base of APP_URL unless overriden\n(For v5)", "cve_id": "CVE-2022-23064", "title": "CVE-2022-23064", "source": "cvefixes", "timestamp": "2022-05-02", "split": "val"} +{"id": "CVE-2022-38028", "text": "Microsoft Windows Print Spooler Privilege Escalation Vulnerability \n\nAffected: Microsoft Windows\n\nMicrosoft Windows Print Spooler service contains a privilege escalation vulnerability. An attacker may modify a JavaScript constraints file and execute it with SYSTEM-level permissions.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. \n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-38028", "title": "Microsoft Windows Print Spooler Privilege Escalation Vulnerability ", "source": "cisa_kev", "timestamp": "2024-04-23", "split": "val"} +{"id": "793d62cf20e9a48eaf70", "text": "CVE: CVE-2022-24830\n\n[{'lang': 'en', 'value': 'OpenClinica is an open source software for Electronic Data Capture (EDC) and Clinical Data Management (CDM). OpenClinica prior to version 3.16 is vulnerable to path traversal in multiple endpoints, leading to arbitrary file read/write, and potential remote code execution. There are no known workarounds. This issue has been patched and users are recommended to upgrade.'}]\n\nFix commit: OC-17139: code changes after code review", "cve_id": "CVE-2022-24830", "title": "CVE-2022-24830", "source": "cvefixes", "timestamp": "2022-05-14", "split": "val"} +{"id": "CVE-2022-41125", "text": "Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Cryptographic Next Generation (CNG) Key Isolation Service contains an unspecified vulnerability that allows an attacker to gain SYSTEM-level privileges.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-787\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-41125", "title": "Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability", "source": "cisa_kev", "timestamp": "2022-11-08", "split": "val"} +{"id": "9079494316fa40baa6fd", "text": "CVE: CVE-2022-23073\n\n[{'lang': 'en', 'value': \"In Recipes, versions 1.0.5 through 1.2.5 are vulnerable to Stored Cross-Site Scripting (XSS), in copy to clipboard functionality. When a victim accesses the food list page, then adds a new Food with a malicious javascript payload in the ‘Name’ parameter and clicks on the clipboard icon, an XSS payload will trigger. A low privileged attacker will have the victim's API key and can lead to admin's account takeover.\"}]\n\nFix commit: improved output sanit", "cve_id": "CVE-2022-23073", "title": "CVE-2022-23073", "source": "cvefixes", "timestamp": "2022-06-21", "split": "val"} +{"id": "0f9258b0845bce132d66", "text": "CVE: CVE-2022-31100\n\n[{'lang': 'en', 'value': 'rulex is a new, portable, regular expression language. When parsing untrusted rulex expressions, rulex may crash, possibly enabling a Denial of Service attack. This happens when the expression contains a multi-byte UTF-8 code point in a string literal or after a backslash, because rulex tries to slice into the code point and panics as a result. This is a security concern for you, if your service parses untrusted rulex expressions (expressions provid", "cve_id": "CVE-2022-31100", "title": "CVE-2022-31100", "source": "cvefixes", "timestamp": "2022-06-27", "split": "val"} +{"id": "d362e488332fd05058d8", "text": "CVE: CVE-2022-0954\n\n[{'lang': 'en', 'value': \"Multiple Stored Cross-site Scripting (XSS) Vulnerabilities in Shop's Other Settings, Shop's Autorespond E-mail Settings and Shops' Payments Methods in GitHub repository microweber/microweber prior to 1.2.11.\"}]\n\nFix commit: Update SaveOptionApiController.php", "cve_id": "CVE-2022-0954", "title": "CVE-2022-0954", "source": "cvefixes", "timestamp": "2022-03-15", "split": "val"} +{"id": "CVE-2022-3038", "text": "Google Chromium Network Service Use-After-Free Vulnerability\n\nAffected: Google Chromium Network Service\n\nGoogle Chromium Network Service contains a use-after-free vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-416\n\n[Sou", "cve_id": "CVE-2022-3038", "title": "Google Chromium Network Service Use-After-Free Vulnerability", "source": "cisa_kev", "timestamp": "2023-03-30", "split": "val"} +{"id": "7543fa726dfed5a67513", "text": "CVE: CVE-2022-0746\n\n[{'lang': 'en', 'value': 'Business Logic Errors in GitHub repository dolibarr/dolibarr prior to 16.0.'}]\n\nFix commit: Fix #hunterb812ea22-0c02-46fe-b89f-04519dfb1ebd", "cve_id": "CVE-2022-0746", "title": "CVE-2022-0746", "source": "cvefixes", "timestamp": "2022-02-25", "split": "val"} +{"id": "4582bbb1a62c2ed5509b", "text": "CVE: CVE-2022-0848\n\n[{'lang': 'en', 'value': 'OS Command Injection in GitHub repository part-db/part-db prior to 0.5.11.'}]\n\nFix commit: Disallow uploading of potentially unsafe file extensions.", "cve_id": "CVE-2022-0848", "title": "CVE-2022-0848", "source": "cvefixes", "timestamp": "2022-03-04", "split": "val"} +{"id": "60d167df7349b2cab145", "text": "CVE: CVE-2022-26960\n\n[{'lang': 'en', 'value': 'connector.minimal.php in std42 elFinder through 2.1.60 is affected by path traversal. This allows unauthenticated remote attackers to read, write, and browse files outside the configured document root. This is due to improper handling of absolute file paths.'}]\n\nFix commit: [security:CVE-2022-26960] fix a path traversal issue\n\nFixed a paste traversal vulnerability. The problem was getting out of\nthe configured directory and allowing the hosting serv", "cve_id": "CVE-2022-26960", "title": "CVE-2022-26960", "source": "cvefixes", "timestamp": "2022-03-21", "split": "val"} +{"id": "430d2a8cb8c8f18b928a", "text": "CVE: CVE-2022-23651\n\n[{'lang': 'en', 'value': 'b2-sdk-python is a python library to access cloud storage provided by backblaze. Linux and Mac releases of the SDK version 1.14.0 and below contain a key disclosure vulnerability that, in certain conditions, can be exploited by local attackers through a time-of-check-time-of-use (TOCTOU) race condition. SDK users of the SqliteAccountInfo format are vulnerable while users of the InMemoryAccountInfo format are safe. The SqliteAccountInfo saves API key", "cve_id": "CVE-2022-23651", "title": "CVE-2022-23651", "source": "cvefixes", "timestamp": "2022-02-23", "split": "val"} +{"id": "63c96be7b661cfce4860", "text": "CVE: CVE-2022-29194\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.DeleteSessionTensor` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.'}]\n\nFix commit: Fix tf.raw_ops.DeleteSessionTensor vulnerability with invalid `h", "cve_id": "CVE-2022-29194", "title": "CVE-2022-29194", "source": "cvefixes", "timestamp": "2022-05-20", "split": "val"} +{"id": "b5d29ef7c000785012e7", "text": "CVE: CVE-2022-28044\n\n[{'lang': 'en', 'value': 'Irzip v0.640 was discovered to contain a heap memory corruption via the component lrzip.c:initialise_control.'}]\n\nFix commit: Fix control->suffix being deallocated as heap memory as reported by Pietro Borrello.", "cve_id": "CVE-2022-28044", "title": "CVE-2022-28044", "source": "cvefixes", "timestamp": "2022-04-15", "split": "val"} +{"id": "4d2ef2efa52e4b948475", "text": "CVE: CVE-2022-35922\n\n[{'lang': 'en', 'value': 'Rust-WebSocket is a WebSocket (RFC6455) library written in Rust. In versions prior to 0.26.5 untrusted websocket connections can cause an out-of-memory (OOM) process abort in a client or a server. The root cause of the issue is during dataframe parsing. Affected versions would allocate a buffer based on the declared dataframe size, which may come from an untrusted source. When `Vec::with_capacity` fails to allocate, the default Rust allocator will a", "cve_id": "CVE-2022-35922", "title": "CVE-2022-35922", "source": "cvefixes", "timestamp": "2022-08-01", "split": "val"} +{"id": "CVE-2022-32894", "text": "Apple iOS and macOS Out-of-Bounds Write Vulnerability\n\nAffected: Apple iOS and macOS\n\nApple iOS and macOS contain an out-of-bounds write vulnerability that could allow an application to execute code with kernel privileges.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-20, CWE-787\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-32894", "title": "Apple iOS and macOS Out-of-Bounds Write Vulnerability", "source": "cisa_kev", "timestamp": "2022-08-18", "split": "val"} +{"id": "3cf53754363db20cd464", "text": "CVE: CVE-2022-29196\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.Conv3DBackpropFilterV2` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. The code does not validate that the `filter_sizes` argument is a vector. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.'}]", "cve_id": "CVE-2022-29196", "title": "CVE-2022-29196", "source": "cvefixes", "timestamp": "2022-05-20", "split": "val"} +{"id": "7ceff8bc6f4bc49a8171", "text": "CVE: CVE-2022-29161\n\n[{'lang': 'en', 'value': 'XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. The XWiki Crypto API will generate X509 certificates signed by default using SHA1 with RSA, which is not considered safe anymore for use in certificate signatures, due to the risk of collisions with SHA1. The problem has been patched in XWiki version 13.10.6, 14.3.1 and 14.4-rc-1. Since then, the Crypto API will generate X509 certificates signed", "cve_id": "CVE-2022-29161", "title": "CVE-2022-29161", "source": "cvefixes", "timestamp": "2022-05-06", "split": "val"} +{"id": "eea6d5a92980a166ff45", "text": "CVE: CVE-2022-27007\n\n[{'lang': 'en', 'value': 'nginx njs 0.7.2 is affected suffers from Use-after-free in njs_function_frame_alloc() when it try to invoke from a restored frame saved with njs_function_frame_save().'}]\n\nFix commit: Fixed frame allocation from an awaited frame.\n\nnjs_function_frame_save() is used to save the awaited frame when \"await\"\ninstruction is encountered. The saving was done as a memcpy() of\nexisting runtime frame.\n\nnjs_function_frame_alloc() is used to alloc a new function", "cve_id": "CVE-2022-27007", "title": "CVE-2022-27007", "source": "cvefixes", "timestamp": "2022-04-14", "split": "val"} +{"id": "8b963342664a25ad2eb6", "text": "CVE: CVE-2022-31109\n\n[{'lang': 'en', 'value': 'laminas-diactoros is a PHP package containing implementations of the PSR-7 HTTP message interfaces and PSR-17 HTTP message factory interfaces. Applications that use Diactoros, and are either not behind a proxy, or can be accessed via untrusted proxies, can potentially have the host, protocol, and/or port of a `Laminas\\\\Diactoros\\\\Uri` instance associated with the incoming server request modified to reflect values from `X-Forwarded-*` headers. Such c", "cve_id": "CVE-2022-31109", "title": "CVE-2022-31109", "source": "cvefixes", "timestamp": "2022-08-01", "split": "val"} +{"id": "8b2b922777590f5aeb25", "text": "CVE: CVE-2022-31025\n\n[{'lang': 'en', 'value': 'Discourse is an open source platform for community discussion. Prior to version 2.8.4 on the `stable` branch and 2.9.0beta5 on the `beta` and `tests-passed` branches, inviting users on sites that use single sign-on could bypass the `must_approve_users` check and invites by staff are always approved automatically. The issue is patched in Discourse version 2.8.4 on the `stable` branch and version `2.9.0.beta5` on the `beta` and `tests-passed` branches", "cve_id": "CVE-2022-31025", "title": "CVE-2022-31025", "source": "cvefixes", "timestamp": "2022-06-07", "split": "val"} +{"id": "CVE-2022-40684", "text": "Fortinet Multiple Products Authentication Bypass Vulnerability\n\nAffected: Fortinet Multiple Products\n\nFortinet FortiOS, FortiProxy, and FortiSwitchManager contain an authentication bypass vulnerability that could allow an unauthenticated attacker to perform operations on the administrative interface via specially crafted HTTP or HTTPS requests.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-288\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-40684", "title": "Fortinet Multiple Products Authentication Bypass Vulnerability", "source": "cisa_kev", "timestamp": "2022-10-11", "split": "val"} +{"id": "f955f9c1cfbdd2d7037d", "text": "CVE: CVE-2022-25759\n\n[{'lang': 'en', 'value': 'The package convert-svg-core before 0.6.2 are vulnerable to Remote Code Injection via sending an SVG file containing the payload.'}]\n\nFix commit: Strip onload attribute from SVG input\n\nIn order to prevent a remote code injection, the `onload` attribute needs to be removed from the SVG input as Puppeteer/Chromium will execute any code within it which could potentially be malicious.\n\nFixes #81", "cve_id": "CVE-2022-25759", "title": "CVE-2022-25759", "source": "cvefixes", "timestamp": "2022-07-22", "split": "val"} +{"id": "c8968b61b70fa8e59bc1", "text": "CVE: CVE-2022-24898\n\n[{'lang': 'en', 'value': 'org.xwiki.commons:xwiki-commons-xml is a common module used by other XWiki top level projects. Starting in version 2.7 and prior to versions 12.10.10, 13.4.4, and 13.8-rc-1, it is possible for a script to access any file accessing to the user running XWiki application server with XML External Entity Injection through the XML script service. The problem has been patched in versions 12.10.10, 13.4.4, and 13.8-rc-1. There is no easy workaround for fixi", "cve_id": "CVE-2022-24898", "title": "CVE-2022-24898", "source": "cvefixes", "timestamp": "2022-04-28", "split": "val"} +{"id": "0b9e1a064242fddbc58b", "text": "CVE: CVE-2022-1735\n\n[{'lang': 'en', 'value': 'Classic Buffer Overflow in GitHub repository vim/vim prior to 8.2.4969.'}]\n\nFix commit: patch 8.2.4969: changing text in Visual mode may cause invalid memory access\n\nProblem: Changing text in Visual mode may cause invalid memory access.\nSolution: Check the Visual position after making a change.", "cve_id": "CVE-2022-1735", "title": "CVE-2022-1735", "source": "cvefixes", "timestamp": "2022-05-17", "split": "val"} +{"id": "CVE-2022-2294", "text": "WebRTC Heap Buffer Overflow Vulnerability\n\nAffected: WebRTC WebRTC\n\nWebRTC, an open-source project providing web browsers with real-time communication, contains a heap buffer overflow vulnerability that allows an attacker to perform shellcode execution. This vulnerability impacts web browsers using WebRTC including but not limited to Google Chrome.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-122\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-2294", "title": "WebRTC Heap Buffer Overflow Vulnerability", "source": "cisa_kev", "timestamp": "2022-08-25", "split": "val"} +{"id": "e7c56ffa3c1100f4e148", "text": "[Improper Certificate Validation] CVE-2023-28321: IDN wildcard match\n\n## Summary:\ncurl /libcurl uses wildcards for validation during TLS communication, even if the hostname is an IDN.\nEven if wildcards are present in the CN/SAN of the certificate, they must not be used to match if the hostname is an IDN.\nThis is described in [RFC-6125, section 6.4.3.][RFC]\n[RFC]: https://datatracker.ietf.org/doc/html/rfc6125#section-6.4.3\nYou probably know that.\nHowever, there was a problem with the implementati", "cve_id": "CVE-2023-28321", "title": "CVE-2023-28321: IDN wildcard match (Improper Certificate Validation)", "source": "hackerone", "timestamp": "2023-05-18", "split": "val"} +{"id": "5b788f480ae68288074b", "text": "CVE: CVE-2022-0414\n\n[{'lang': 'en', 'value': 'Business Logic Errors in Packagist dolibarr/dolibarr prior to 16.0.'}]\n\nFix commit: Fix #huntr76f3b405-9f5d-44b1-8434-b52b56ee395f", "cve_id": "CVE-2022-0414", "title": "CVE-2022-0414", "source": "cvefixes", "timestamp": "2022-01-31", "split": "val"} +{"id": "ca437c78a44e5eb08f12", "text": "[Double Free] CVE-2023-27537: HSTS double-free\n\nOriginal Report:https://hackerone.com/reports/1897203\n\n## Impact\n\nDouble-free", "cve_id": "CVE-2023-27537", "title": "CVE-2023-27537: HSTS double-free (Double Free)", "source": "hackerone", "timestamp": "2023-03-23", "split": "val"} +{"id": "c43f528da94ad425fb6d", "text": "CVE: CVE-2022-0351\n\n[{'lang': 'en', 'value': 'Access of Memory Location Before Start of Buffer in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.4206: condition with many \"(\" causes a crash\n\nProblem: Condition with many \"(\" causes a crash.\nSolution: Limit recursion to 1000.", "cve_id": "CVE-2022-0351", "title": "CVE-2022-0351", "source": "cvefixes", "timestamp": "2022-01-25", "split": "val"} +{"id": "CVE-2023-20109", "text": "Cisco IOS and IOS XE Group Encrypted Transport VPN Out-of-Bounds Write Vulnerability\n\nAffected: Cisco IOS and IOS XE\n\nCisco IOS and IOS XE contain an out-of-bounds write vulnerability in the Group Encrypted Transport VPN (GET VPN) feature that could allow an authenticated, remote attacker who has administrative control of either a group member or a key server to execute malicious code or cause a device to crash.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of th", "cve_id": "CVE-2023-20109", "title": "Cisco IOS and IOS XE Group Encrypted Transport VPN Out-of-Bounds Write Vulnerability", "source": "cisa_kev", "timestamp": "2023-10-10", "split": "val"} +{"id": "CVE-2023-38180", "text": "Microsoft .NET Core and Visual Studio Denial-of-Service Vulnerability\n\nAffected: Microsoft .NET Core and Visual Studio\n\nMicrosoft .NET Core and Visual Studio contain an unspecified vulnerability that allows for denial-of-service (DoS).\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-38180", "title": "Microsoft .NET Core and Visual Studio Denial-of-Service Vulnerability", "source": "cisa_kev", "timestamp": "2023-08-09", "split": "val"} +{"id": "b366b45ad6a0757adccb", "text": "CVE: CVE-2022-37452\n\n[{'lang': 'en', 'value': 'Exim before 4.95 has a heap-based buffer overflow for the alias list in host_name_lookup in host.c when sender_host_name is set.'}]\n\nFix commit: Fix host_name_lookup (Close 2747)\n\nThanks to Nico R for providing a reproducing configuration.\n\n host_lookup = *\n message_size_limit = ${if def:sender_host_name {32M}{32M}}\n acl_smtp_connect = acl_smtp_connect\n acl_smtp_rcpt = acl_smtp_rcpt", "cve_id": "CVE-2022-37452", "title": "CVE-2022-37452", "source": "cvefixes", "timestamp": "2022-08-07", "split": "val"} +{"id": "075391883f81411ca2e5", "text": "CVE: CVE-2022-23622\n\n[{'lang': 'en', 'value': 'XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions there is a cross site scripting (XSS) vector in the `registerinline.vm` template related to the `xredirect` hidden field. This template is only used in the following conditions: 1. The wiki must be open to registration for anyone. 2. The wiki must be closed to view for Guest users or more specifically the XWiki.Registration p", "cve_id": "CVE-2022-23622", "title": "CVE-2022-23622", "source": "cvefixes", "timestamp": "2022-02-09", "split": "val"} +{"id": "fbd3ce0f1ebd3469f782", "text": "CVE: CVE-2022-35411\n\n[{'lang': 'en', 'value': 'rpc.py through 0.6.0 allows Remote Code Execution because an unpickle occurs when the \"serializer: pickle\" HTTP header is sent. In other words, although JSON (not Pickle) is the default data format, an unauthenticated client can cause the data to be processed with unpickle.'}]\n\nFix commit: PickleSerializer is turned off by default", "cve_id": "CVE-2022-35411", "title": "CVE-2022-35411", "source": "cvefixes", "timestamp": "2022-07-08", "split": "val"} +{"id": "d1549d8f8b9af34a394f", "text": "CVE: CVE-2022-0577\n\n[{'lang': 'en', 'value': 'Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository scrapy/scrapy prior to 2.6.1.'}]\n\nFix commit: Merge pull request from GHSA-cjvr-mfj7-j4j8\n\n* Do not carry over cookies to a different domain on redirect\n\n* Cover the cookie-domain redirect fix in the release notes\n\n* Cover 1.8.2 in the release notes\n\n* Fix redirect Cookie handling when the cookie middleware is disabled\n\n* Update the 1.8.2 release date", "cve_id": "CVE-2022-0577", "title": "CVE-2022-0577", "source": "cvefixes", "timestamp": "2022-03-02", "split": "val"} +{"id": "64a100734b81b8d2809f", "text": "CVE: CVE-2022-1295\n\n[{'lang': 'en', 'value': 'Prototype Pollution in GitHub repository alvarotrigo/fullpage.js prior to 4.0.2.'}]\n\nFix commit: Merge pull request #4351 from alvarotrigo/dev\n\n- Fixed bug: jquery adaptor didnt work", "cve_id": "CVE-2022-1295", "title": "CVE-2022-1295", "source": "cvefixes", "timestamp": "2022-04-11", "split": "val"} +{"id": "CVE-2022-44698", "text": "Microsoft Defender SmartScreen Security Feature Bypass Vulnerability\n\nAffected: Microsoft Defender\n\nMicrosoft Defender SmartScreen contains a security feature bypass vulnerability that could allow an attacker to evade Mark of the Web (MOTW) defenses via a specially crafted malicious file.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-755\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-44698", "title": "Microsoft Defender SmartScreen Security Feature Bypass Vulnerability", "source": "cisa_kev", "timestamp": "2022-12-13", "split": "val"} +{"id": "e66ff53a2f5a72664259", "text": "[Code Injection] CVE-2023-5528: Insufficient input sanitization in in-tree storage plugin leads to privilege escalation on Windows nodes\n\nThis is an imported report from the email i have sent a month ago about a code injection vulnerability\nThe vulnerability was assigned as CVE-2023-5528\nAs a reference i have talked with Balaji from the k8 team.\nExcerpts from the email chain that might be relevant:\n\n\"Just a quick update to let you know that we were able to reproduce the issue and are working on", "cve_id": "CVE-2023-5528", "title": "CVE-2023-5528: Insufficient input sanitization in in-tree storage plugin leads to privilege escalation on Windows nodes (Code Injection)", "source": "hackerone", "timestamp": "2023-12-21", "split": "val"} +{"id": "38046cbc5122b17156df", "text": "CVE: CVE-2022-0752\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Generic in GitHub repository hestiacp/hestiacp prior to 1.5.9.'}]\n\nFix commit: Fix XXS issues (#2432)\n\n* XSS patches\r\n\r\n* Reslove XSS vulnrebilty\r\n\r\n* Resolve XSS vulnrebility\r\n\r\n* Prevent showing edit form from non exsiting records\r\n\r\n* Improve error handling message\r\n\r\nCreate a function\r\n\r\n* Make sure $user from $_SESSION is escapeshellarg\r\n\r\nPrevent double escapeshellarg in Edit/web/index\r\n\r\n* Enable translateable erro", "cve_id": "CVE-2022-0752", "title": "CVE-2022-0752", "source": "cvefixes", "timestamp": "2022-03-04", "split": "val"} +{"id": "045de302c113006270f1", "text": "CVE: CVE-2022-29192\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.QuantizeAndDequantizeV4Grad` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.'}]\n\nFix commit: Fix tf.raw_ops.QuantizeAndDequantizeV4Grad vulnerability", "cve_id": "CVE-2022-29192", "title": "CVE-2022-29192", "source": "cvefixes", "timestamp": "2022-05-20", "split": "val"} +{"id": "6c32e5f44c27935a5912", "text": "[Use After Free] CVE-2023-28319: UAF in SSH sha256 fingerprint check\n\n## Summary:\nThe fingerprint_b64 pointer is as parameter for failure logging after it is freed.\n\n## Steps To Reproduce:\n1. git clone https://github.com/curl/curl\n2. vim curl/lib/vssh/libssh2.c\n3. search for the string 'free(fingerprint_b64)' and note that fingerprint_b64 is used as parameter immediately after it is freed.\n\n## Supporting Material/References:\nThe following are the details of the code.\n\ngit commit a51f90ec0f741767", "cve_id": "CVE-2023-28319", "title": "CVE-2023-28319: UAF in SSH sha256 fingerprint check (Use After Free)", "source": "hackerone", "timestamp": "2023-05-24", "split": "val"} +{"id": "CVE-2023-46805", "text": "Ivanti Connect Secure and Policy Secure Authentication Bypass Vulnerability\n\nAffected: Ivanti Connect Secure and Policy Secure\n\nIvanti Connect Secure (ICS, formerly known as Pulse Connect Secure) and Ivanti Policy Secure gateways contain an authentication bypass vulnerability in the web component that allows an attacker to access restricted resources by bypassing control checks. This vulnerability can be leveraged in conjunction with CVE-2024-21887, a command injection vulnerability.\n\nRequired A", "cve_id": "CVE-2023-46805", "title": "Ivanti Connect Secure and Policy Secure Authentication Bypass Vulnerability", "source": "cisa_kev", "timestamp": "2024-01-10", "split": "val"} +{"id": "CVE-2023-28252", "text": "Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Common Log File System (CLFS) driver contains an unspecified vulnerability that allows for privilege escalation.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-122\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-28252", "title": "Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability", "source": "cisa_kev", "timestamp": "2023-04-11", "split": "val"} +{"id": "CVE-2023-29336", "text": "Microsoft Win32K Privilege Escalation Vulnerability\n\nAffected: Microsoft Win32k\n\nMicrosoft Win32k contains an unspecified vulnerability that allows for privilege escalation up to SYSTEM privileges.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-29336", "title": "Microsoft Win32K Privilege Escalation Vulnerability", "source": "cisa_kev", "timestamp": "2023-05-09", "split": "val"} +{"id": "279cd8f49235483ffd00", "text": "CVE: CVE-2022-1708\n\n[{'lang': 'en', 'value': 'A vulnerability was found in CRI-O that causes memory or disk space exhaustion on the node for anyone with access to the Kube API. The ExecSync request runs commands in a container and logs the output of the command. This output is then read by CRI-O after command execution, and it is read in a manner where the entire file corresponding to the output of the command is read in. Thus, if the output of the command is large it is possible to exhaust the", "cve_id": "CVE-2022-1708", "title": "CVE-2022-1708", "source": "cvefixes", "timestamp": "2022-06-07", "split": "val"} +{"id": "10bc49b6d05df1e13ad6", "text": "CVE: CVE-2022-25298\n\n[{'lang': 'en', 'value': 'This affects the package sprinfall/webcc before 0.3.0. It is possible to traverse directories to fetch arbitrary files from the server.'}]\n\nFix commit: fix static file serving security issue; fix url path encoding issue", "cve_id": "CVE-2022-25298", "title": "CVE-2022-25298", "source": "cvefixes", "timestamp": "2022-02-18", "split": "val"} +{"id": "6d130d1fbe4921442cc8", "text": "[Business Logic Errors] CVE-2022-27778: curl removes wrong file on error\n\n## Summary:\nCurl command has a logic flaw that results in removal of a wrong file when combining `--no-clobber` and `--remove-on-error` if the target file name exists and an error occurs.\n\n## Steps To Reproduce:\n 1. `echo \"important file\" > foo`\n 2. `echo -ne \"HTTP/1.1 200 OK\\r\\nContent-Length: 666\\r\\n\\r\\nHello\\n\" | nc -l -p 9999`\n 3. `curl -m 3 --no-clobber --remove-on-error --output foo http://testserver.tld:9999/`", "cve_id": "CVE-2022-27778", "title": "CVE-2022-27778: curl removes wrong file on error (Business Logic Errors)", "source": "hackerone", "timestamp": "2022-05-12", "split": "val"} +{"id": "b2ffc41389c8622e7b8b", "text": "CVE: CVE-2022-29199\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.LoadAndRemapMatrix does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. The code assumes `initializing_values` is a vector but there is no validation for this before accessing its value. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4", "cve_id": "CVE-2022-29199", "title": "CVE-2022-29199", "source": "cvefixes", "timestamp": "2022-05-20", "split": "val"} +{"id": "CVE-2023-42916", "text": "Apple Multiple Products WebKit Out-of-Bounds Read Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, and Safari WebKit contain an out-of-bounds read vulnerability that may disclose sensitive information when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.\n\nRequired Action: Apply remediations or mitigations pe", "cve_id": "CVE-2023-42916", "title": "Apple Multiple Products WebKit Out-of-Bounds Read Vulnerability", "source": "cisa_kev", "timestamp": "2023-12-04", "split": "val"} +{"id": "0c306c2c09f6bf4fabdb", "text": "CVE: CVE-2022-24828\n\n[{'lang': 'en', 'value': \"Composer is a dependency manager for the PHP programming language. Integrators using Composer code to call `VcsDriver::getFileContent` can have a code injection vulnerability if the user can control the `$file` or `$identifier` argument. This leads to a vulnerability on packagist.org for example where the composer.json's `readme` field can be used as a vector for injecting parameters into hg/Mercurial via the `$file` argument, or git via the `$ident", "cve_id": "CVE-2022-24828", "title": "CVE-2022-24828", "source": "cvefixes", "timestamp": "2022-04-13", "split": "val"} +{"id": "46ba6c9ad75c38dbab4f", "text": "CVE: CVE-2022-23567\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The implementations of `Sparse*Cwise*` ops are vulnerable to integer overflows. These can be used to trigger large allocations (so, OOM based denial of service) or `CHECK`-fails when building new `TensorShape` objects (so, assert failures based denial of service). We are missing some validation on the shapes of the input tensors as well as directly constructing a large `TensorShape` with user-", "cve_id": "CVE-2022-23567", "title": "CVE-2022-23567", "source": "cvefixes", "timestamp": "2022-02-03", "split": "val"} +{"id": "d55bbbd9b2a1039b6b08", "text": "CVE: CVE-2022-33127\n\n[{'lang': 'en', 'value': 'The function that calls the diff tool in Diffy 3.4.1 does not properly handle double quotes in a filename when run in a windows environment. This allows attackers to execute arbitrary commands via a crafted string.'}]\n\nFix commit: Remove windows specific exec. Open2.capture3 should work on all\nplatforms.", "cve_id": "CVE-2022-33127", "title": "CVE-2022-33127", "source": "cvefixes", "timestamp": "2022-06-23", "split": "val"} +{"id": "1bf7ee7ac141f8892804", "text": "CVE: CVE-2022-29188\n\n[{'lang': 'en', 'value': 'Smokescreen is an HTTP proxy. The primary use case for Smokescreen is to prevent server-side request forgery (SSRF) attacks in which external attackers leverage the behavior of applications to connect to or scan internal infrastructure. Smokescreen also offers an option to deny access to additional (e.g., external) URLs by way of a deny list. There was an issue in Smokescreen that made it possible to bypass the deny list feature by surrounding the h", "cve_id": "CVE-2022-29188", "title": "CVE-2022-29188", "source": "cvefixes", "timestamp": "2022-05-21", "split": "val"} +{"id": "CVE-2022-20701", "text": "Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability\n\nAffected: Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers\n\nA vulnerability in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code elevate privileges, execute arbitrary commands, bypass authentication and authorization protections, fetch and run unsigned software, or cause a denial of service (DoS).\n\nRequired", "cve_id": "CVE-2022-20701", "title": "Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability", "source": "cisa_kev", "timestamp": "2022-03-03", "split": "val"} +{"id": "7e4d769c2b09e146af22", "text": "CVE: CVE-2022-1173\n\n[{'lang': 'en', 'value': 'stored xss in GitHub repository getgrav/grav prior to 1.7.33.'}]\n\nFix commit: Fixed XSS check not detecting onX events without quotes", "cve_id": "CVE-2022-1173", "title": "CVE-2022-1173", "source": "cvefixes", "timestamp": "2022-04-26", "split": "val"} +{"id": "d290639d81dfc15f387a", "text": "CVE: CVE-2022-21724\n\n[{'lang': 'en', 'value': 'pgjdbc is the offical PostgreSQL JDBC Driver. A security hole was found in the jdbc driver for postgresql database while doing security research. The system using the postgresql library will be attacked when attacker control the jdbc url or properties. pgjdbc instantiates plugin instances based on class names provided via `authenticationPluginClassName`, `sslhostnameverifier`, `socketFactory`, `sslfactory`, `sslpasswordcallback` connection propertie", "cve_id": "CVE-2022-21724", "title": "CVE-2022-21724", "source": "cvefixes", "timestamp": "2022-02-02", "split": "val"} +{"id": "6e26abbb4200b1a59430", "text": "CVE: CVE-2022-31002\n\n[{'lang': 'en', 'value': 'Sofia-SIP is an open-source Session Initiation Protocol (SIP) User-Agent library. Prior to version 1.13.8, an attacker can send a message with evil sdp to FreeSWITCH, which may cause a crash. This type of crash may be caused by a URL ending with `%`. Version 1.13.8 contains a patch for this issue.'}]\n\nFix commit: Merge pull request from GHSA-g3x6-p824-x6hm\n\nFix Out-of-bound read in url_canonize2 and url_canonize3", "cve_id": "CVE-2022-31002", "title": "CVE-2022-31002", "source": "cvefixes", "timestamp": "2022-05-31", "split": "val"} +{"id": "CVE-2022-26501", "text": "Veeam Backup & Replication Remote Code Execution Vulnerability\n\nAffected: Veeam Backup & Replication\n\nThe Veeam Distribution Service in the Backup & Replication application allows unauthenticated users to access internal API functions. A remote attacker can send input to the internal API which may lead to uploading and executing of malicious code.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-306\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-26501", "title": "Veeam Backup & Replication Remote Code Execution Vulnerability", "source": "cisa_kev", "timestamp": "2022-12-13", "split": "val"} +{"id": "688525dd1781fa9ca8db", "text": "CVE: CVE-2022-0235\n\n[{'lang': 'en', 'value': 'node-fetch is vulnerable to Exposure of Sensitive Information to an Unauthorized Actor'}]\n\nFix commit: 3.1.1 release (#1451)", "cve_id": "CVE-2022-0235", "title": "CVE-2022-0235", "source": "cvefixes", "timestamp": "2022-01-16", "split": "val"} +{"id": "4e14629622be19713663", "text": "CVE: CVE-2022-34495\n\n[{'lang': 'en', 'value': 'rpmsg_probe in drivers/rpmsg/virtio_rpmsg_bus.c in the Linux kernel before 5.18.4 has a double free.'}]\n\nFix commit: rpmsg: virtio: Fix possible double free in rpmsg_probe()\n\nvch will be free in virtio_rpmsg_release_device() when\nrpmsg_ns_register_device() fails. There is no need to call kfree() again.\n\nFix this by changing error path from free_vch to free_ctrldev.\n\nFixes: c486682ae1e2 (\"rpmsg: virtio: Register the rpmsg_char device\")\nSigned-off-by:", "cve_id": "CVE-2022-34495", "title": "CVE-2022-34495", "source": "cvefixes", "timestamp": "2022-06-26", "split": "val"} +{"id": "CVE-2023-50224", "text": "TP-Link TL-WR841N Authentication Bypass by Spoofing Vulnerability\n\nAffected: TP-Link TL-WR841N\n\nTP-Link TL-WR841N contains an authentication bypass by spoofing vulnerability within the httpd service, which listens on TCP port 80 by default, leading to the disclose of stored credentials. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01", "cve_id": "CVE-2023-50224", "title": "TP-Link TL-WR841N Authentication Bypass by Spoofing Vulnerability", "source": "cisa_kev", "timestamp": "2025-09-03", "split": "val"} +{"id": "36c9de60c89adc889e0a", "text": "CVE: CVE-2022-24787\n\n[{'lang': 'en', 'value': 'Vyper is a Pythonic Smart Contract Language for the Ethereum Virtual Machine. In version 0.3.1 and prior, bytestrings can have dirty bytes in them, resulting in the word-for-word comparisons giving incorrect results. Even without dirty nonzero bytes, two bytestrings can compare to equal if one ends with `\"\\\\x00\"` because there is no comparison of the length. A patch is available and expected to be part of the 0.3.2 release. There are currently no kn", "cve_id": "CVE-2022-24787", "title": "CVE-2022-24787", "source": "cvefixes", "timestamp": "2022-04-04", "split": "val"} +{"id": "a1c9e00fd1a07947d4fb", "text": "CVE: CVE-2022-2182\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.5150: read past the end of the first line with \":0;'{\"\n\nProblem: Read past the end of the first line with \":0;'{\".\nSolution: When on line zero check the column is valid for line one.", "cve_id": "CVE-2022-2182", "title": "CVE-2022-2182", "source": "cvefixes", "timestamp": "2022-06-23", "split": "val"} +{"id": "ec97afdde888adf0f415", "text": "CVE: CVE-2022-23628\n\n[{'lang': 'en', 'value': \"OPA is an open source, general-purpose policy engine. Under certain conditions, pretty-printing an abstract syntax tree (AST) that contains synthetic nodes could change the logic of some statements by reordering array literals. Example of policies impacted are those that parse and compare web paths. **All of these** three conditions have to be met to create an adverse effect: 1. An AST of Rego had to be **created programmatically** such that it ends", "cve_id": "CVE-2022-23628", "title": "CVE-2022-23628", "source": "cvefixes", "timestamp": "2022-02-09", "split": "val"} +{"id": "e63937612958ce707fb8", "text": "CVE: CVE-2022-0527\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository chatwoot/chatwoot prior to 2.2.0.'}]\n\nFix commit: fix: Ongoing campaign URL validation (#3890)", "cve_id": "CVE-2022-0527", "title": "CVE-2022-0527", "source": "cvefixes", "timestamp": "2022-02-09", "split": "val"} +{"id": "99010601900ef3af47ba", "text": "CVE: CVE-2022-1231\n\n[{'lang': 'en', 'value': 'XSS via Embedded SVG in SVG Diagram Format in GitHub repository plantuml/plantuml prior to 1.2022.4. Stored XSS in the context of the diagram embedder. Depending on the actual context, this ranges from stealing secrets to account hijacking or even to code execution for example in desktop applications. Web based applications are the ones most affected. Since the SVG format allows clickable links in diagrams, it is commonly used in plugins for web base", "cve_id": "CVE-2022-1231", "title": "CVE-2022-1231", "source": "cvefixes", "timestamp": "2022-04-15", "split": "val"} +{"id": "e09f3ba67e9ad98b5393", "text": "CVE: CVE-2022-0580\n\n[{'lang': 'en', 'value': 'Improper Access Control in Packagist librenms/librenms prior to 22.2.0.'}]\n\nFix commit: Moved some pages to be within admin route (#13782)\n\n* Moved plugin admin pages to be within admin route\r\n* Wrap html transports page in admin check\r\n* Moved Port group controller to be admin protected\r\n* fixed tests", "cve_id": "CVE-2022-0580", "title": "CVE-2022-0580", "source": "cvefixes", "timestamp": "2022-02-14", "split": "val"} +{"id": "a2a2c5a2b19bdc2c30f5", "text": "CVE: CVE-2022-25850\n\n[{'lang': 'en', 'value': 'The package github.com/hoppscotch/proxyscotch before 1.0.0 are vulnerable to Server-side Request Forgery (SSRF) when interceptor mode is set to proxy. It occurs when an HTTP request is made by a backend server to an untrusted URL submitted by a user. It leads to a leakage of sensitive information from the server.'}]\n\nFix commit: feat: ability to have a blacklist of target urls for proxy to make calls to", "cve_id": "CVE-2022-25850", "title": "CVE-2022-25850", "source": "cvefixes", "timestamp": "2022-05-01", "split": "val"} +{"id": "a76826bca2ad048c3a02", "text": "CVE: CVE-2022-21741\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. ### Impact An attacker can craft a TFLite model that would trigger a division by zero in the implementation of depthwise convolutions. The parameters of the convolution can be user controlled and are also used within a division operation to determine the size of the padding that needs to be added before applying the convolution. There is no check before this division that the divisor is strict", "cve_id": "CVE-2022-21741", "title": "CVE-2022-21741", "source": "cvefixes", "timestamp": "2022-02-03", "split": "val"} +{"id": "67d808edd1d8de427351", "text": "CVE: CVE-2022-25303\n\n[{'lang': 'en', 'value': 'The package whoogle-search before 0.7.2 are vulnerable to Cross-site Scripting (XSS) via the query string parameter q. In the case where it does not contain the http string, it is used to build the error_message that is then rendered in the error.html template, using the [flask.render_template](https://flask.palletsprojects.com/en/2.1.x/api/flask.render_template) function. However, the error_message is rendered using the [| safe filter](https://jinj", "cve_id": "CVE-2022-25303", "title": "CVE-2022-25303", "source": "cvefixes", "timestamp": "2022-07-12", "split": "val"} +{"id": "a4b514bc0a4ba2959250", "text": "CVE: CVE-2022-32546\n\n[{'lang': 'en', 'value': \"A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned long' at coders/pcl.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior.\"}]\n\nFix commit: Fixes #4985: 4e+26 is outside the range of representable values of type 'unsigned long' at coders/pcl.c:299 (#4986)\n\n* fix Division by zero in XMe", "cve_id": "CVE-2022-32546", "title": "CVE-2022-32546", "source": "cvefixes", "timestamp": "2022-06-16", "split": "val"} +{"id": "c48b6c8ce5a5f7b33f34", "text": "CVE: CVE-2022-0368\n\n[{'lang': 'en', 'value': 'Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.4217: illegal memory access when undo makes Visual area invalid\n\nProblem: Illegal memory access when undo makes Visual area invalid.\nSolution: Correct the Visual area after undo.", "cve_id": "CVE-2022-0368", "title": "CVE-2022-0368", "source": "cvefixes", "timestamp": "2022-01-26", "split": "val"} +{"id": "d5360d36d1d881897a0f", "text": "CVE: CVE-2022-29780\n\n[{'lang': 'en', 'value': 'Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_array_prototype_sort at src/njs_array.c.'}]\n\nFix commit: Fixed Array.prototype.sort() when arr size is changed in a comparator.\n\nThis fixed #468 issue on Github.", "cve_id": "CVE-2022-29780", "title": "CVE-2022-29780", "source": "cvefixes", "timestamp": "2022-06-02", "split": "val"} +{"id": "93d676d7d8cc2034b7af", "text": "CVE: CVE-2022-31061\n\n[{'lang': 'en', 'value': 'GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. In affected versions there is a SQL injection vulnerability which is possible on login page. No user credentials are required to exploit this vulnerability. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.'}]\n\nFix commit: Merge pull request from GHSA-w2gc-v2gm-q7w", "cve_id": "CVE-2022-31061", "title": "CVE-2022-31061", "source": "cvefixes", "timestamp": "2022-06-28", "split": "val"} +{"id": "CVE-2023-21823", "text": "Microsoft Windows Graphic Component Privilege Escalation Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Graphic Component contains an unspecified vulnerability that allows for privilege escalation.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-190\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-21823", "title": "Microsoft Windows Graphic Component Privilege Escalation Vulnerability", "source": "cisa_kev", "timestamp": "2023-02-14", "split": "val"} +{"id": "dfbb5df2d4331387351e", "text": "CVE: CVE-2022-34035\n\n[{'lang': 'en', 'value': 'HTMLDoc v1.9.12 and below was discovered to contain a heap overflow via e_node htmldoc/htmldoc/html.cxx:588.'}]\n\nFix commit: Fix a crash bug with empty titles (Issue #425)", "cve_id": "CVE-2022-34035", "title": "CVE-2022-34035", "source": "cvefixes", "timestamp": "2022-07-18", "split": "val"} +{"id": "30ed7cbac685e0871f10", "text": "CVE: CVE-2022-0935\n\n[{'lang': 'en', 'value': 'Host Header injection in password Reset in GitHub repository livehelperchat/livehelperchat prior to 3.97.'}]\n\nFix commit: Migrate to static HTTP_HOST (#1754)\n\nStatic HTTP_HOST option and security section in update page.", "cve_id": "CVE-2022-0935", "title": "CVE-2022-0935", "source": "cvefixes", "timestamp": "2022-04-07", "split": "val"} +{"id": "CVE-2022-0185", "text": "Linux Kernel Heap-Based Buffer Overflow Vulnerability\n\nAffected: Linux Kernel\n\nLinux kernel contains a heap-based buffer overflow vulnerability in the legacy_parse_param function in the Filesystem Context functionality. This allows an attacker to open a filesystem that does not support the Filesystem Context API and ultimately escalate privileges.\n\nRequired Action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.\n\nCWE(s): CWE-190\n\n[Source: CISA", "cve_id": "CVE-2022-0185", "title": "Linux Kernel Heap-Based Buffer Overflow Vulnerability", "source": "cisa_kev", "timestamp": "2024-08-21", "split": "val"} +{"id": "a81c850b94a61a3f7e04", "text": "CVE: CVE-2022-23575\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The implementation of `OpLevelCostEstimator::CalculateTensorSize` is vulnerable to an integer overflow if an attacker can create an operation which would involve a tensor with large enough number of elements. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supp", "cve_id": "CVE-2022-23575", "title": "CVE-2022-23575", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val"} +{"id": "CVE-2023-36761", "text": "Microsoft Word Information Disclosure Vulnerability\n\nAffected: Microsoft Word\n\nMicrosoft Word contains an unspecified vulnerability that allows for information disclosure.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-668\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-36761", "title": "Microsoft Word Information Disclosure Vulnerability", "source": "cisa_kev", "timestamp": "2023-09-12", "split": "val"} +{"id": "42cc38696ae1648b0d56", "text": "CVE: CVE-2022-35928\n\n[{'lang': 'en', 'value': 'AES Crypt is a file encryption software for multiple platforms. AES Crypt for Linux built using the source on GitHub and having the version number 3.11 has a vulnerability with respect to reading user-provided passwords and confirmations via command-line prompts. Passwords lengths were not checked before being read. This vulnerability may lead to buffer overruns. This does _not_ affect source code found on aescrypt.com, nor is the vulnerability pres", "cve_id": "CVE-2022-35928", "title": "CVE-2022-35928", "source": "cvefixes", "timestamp": "2022-08-03", "split": "val"} +{"id": "ba2716ab71f662147f23", "text": "CVE: CVE-2022-29208\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.EditDistance` has incomplete validation. Users can pass negative values to cause a segmentation fault based denial of service. In multiple places throughout the code, one may compute an index for a write operation. However, the existing validation only checks against the upper bound of the array. Hence, it i", "cve_id": "CVE-2022-29208", "title": "CVE-2022-29208", "source": "cvefixes", "timestamp": "2022-05-20", "split": "val"} +{"id": "CVE-2023-33538", "text": "TP-Link Multiple Routers Command Injection Vulnerability\n\nAffected: TP-Link Multiple Routers\n\nTP-Link TL-WR940N V2/V4, TL-WR841N V8/V10, and TL-WR740N V1/V2 contain a command injection vulnerability via the component /userRpm/WlanNetworkRpm. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue u", "cve_id": "CVE-2023-33538", "title": "TP-Link Multiple Routers Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2025-06-16", "split": "val"} +{"id": "CVE-2022-21587", "text": "Oracle E-Business Suite Unspecified Vulnerability\n\nAffected: Oracle E-Business Suite\n\nOracle E-Business Suite contains an unspecified vulnerability that allows an unauthenticated attacker with network access via HTTP to compromise Oracle Web Applications Desktop Integrator.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-306\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-21587", "title": "Oracle E-Business Suite Unspecified Vulnerability", "source": "cisa_kev", "timestamp": "2023-02-02", "split": "val"} +{"id": "4f3ac2ec4e58cd8ab52e", "text": "CVE: CVE-2022-0819\n\n[{'lang': 'en', 'value': 'Code Injection in GitHub repository dolibarr/dolibarr prior to 15.0.1.'}]\n\nFix commit: Fix #hunterb03d4415-d4f9-48c8-9ae2-d3aa248027b5", "cve_id": "CVE-2022-0819", "title": "CVE-2022-0819", "source": "cvefixes", "timestamp": "2022-03-02", "split": "val"} +{"id": "6f6324891eefada07669", "text": "CVE: CVE-2022-1555\n\n[{'lang': 'en', 'value': 'DOM XSS in microweber ver 1.2.15 in GitHub repository microweber/microweber prior to 1.2.16. inject arbitrary js code, deface website, steal cookie...'}]\n\nFix commit: Update order_filtering.blade.php", "cve_id": "CVE-2022-1555", "title": "CVE-2022-1555", "source": "cvefixes", "timestamp": "2022-05-04", "split": "val"} +{"id": "bcc8ac641fd9dd1baf7c", "text": "CVE: CVE-2022-23577\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The implementation of `GetInitOp` is vulnerable to a crash caused by dereferencing a null pointer. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: Prevent null dereference read in `GetInitOp`.\n\nWe have a map of maps. We test tha", "cve_id": "CVE-2022-23577", "title": "CVE-2022-23577", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val"} +{"id": "CVE-2023-41061", "text": "Apple iOS, iPadOS, and watchOS Wallet Code Execution Vulnerability\n\nAffected: Apple iOS, iPadOS, and watchOS\n\nApple iOS, iPadOS, and watchOS contain an unspecified vulnerability due to a validation issue affecting Wallet in which a maliciously crafted attachment may result in code execution. This vulnerability was chained with CVE-2023-41064.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploite", "cve_id": "CVE-2023-41061", "title": "Apple iOS, iPadOS, and watchOS Wallet Code Execution Vulnerability", "source": "cisa_kev", "timestamp": "2023-09-11", "split": "val"} +{"id": "76476d6b8cf1c54d2b66", "text": "CVE: CVE-2022-28390\n\n[{'lang': 'en', 'value': 'ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.'}]\n\nFix commit: can: ems_usb: ems_usb_start_xmit(): fix double dev_kfree_skb() in error path\n\nThere is no need to call dev_kfree_skb() when usb_submit_urb() fails\nbeacause can_put_echo_skb() deletes the original skb and\ncan_free_echo_skb() deletes the cloned skb.\n\nLink: https://lore.kernel.org/all/20220228083639.38183-1-hbh25y@gmail.com\nFixes: 7", "cve_id": "CVE-2022-28390", "title": "CVE-2022-28390", "source": "cvefixes", "timestamp": "2022-04-03", "split": "val"} +{"id": "f94315d2efad05a0c911", "text": "CVE: CVE-2022-23993\n\n[{'lang': 'en', 'value': \"/usr/local/www/pkg.php in pfSense CE before 2.6.0 and pfSense Plus before 22.01 uses $_REQUEST['pkg_filter'] in a PHP echo call, causing XSS.\"}]\n\nFix commit: Clean up pkg filter text before use. Fixes #12725\n\nAlso remove unnecessary echos of the value.", "cve_id": "CVE-2022-23993", "title": "CVE-2022-23993", "source": "cvefixes", "timestamp": "2022-01-26", "split": "val"} +{"id": "015c19133a86ef777f8a", "text": "CVE: CVE-2022-29251\n\n[{'lang': 'en', 'value': 'XWiki Platform Flamingo Theme UI is a tool that allows customization and preview of any Flamingo-based skin. Starting with versions 6.2.4 and 6.3-rc-1, a possible cross-site scripting vector is present in the `FlamingoThemesCode.WebHomeSheet` wiki page related to the \"newThemeName\" form field. The issue is patched in versions 12.10.11, 14.0-rc-1, 13.4.7, and 13.10.3. The easiest available workaround is to edit the wiki page `FlamingoThemesCode.WebHo", "cve_id": "CVE-2022-29251", "title": "CVE-2022-29251", "source": "cvefixes", "timestamp": "2022-05-25", "split": "val"} +{"id": "ac75a391ff950fcedd9a", "text": "[Cleartext Transmission of Sensitive Information] CVE-2022-42916: HSTS bypass via IDN\n\nOriginal Report:https://hackerone.com/reports/1730660\n\n## Impact\n\nHSTS bypass.", "cve_id": "CVE-2022-42916", "title": "CVE-2022-42916: HSTS bypass via IDN (Cleartext Transmission of Sensitive Information)", "source": "hackerone", "timestamp": "2022-11-03", "split": "val"} +{"id": "dd8d51112c9cb21ec3ce", "text": "CVE: CVE-2022-23615\n\n[{'lang': 'en', 'value': 'XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions any user with SCRIPT right can save a document with the right of the current user which allow accessing API requiring programming right if the current user has programming right. This has been patched in XWiki 13.0. Users are advised to update to resolve this issue. The only known workaround is to limit SCRIPT access.'}]\n\nFix", "cve_id": "CVE-2022-23615", "title": "CVE-2022-23615", "source": "cvefixes", "timestamp": "2022-02-09", "split": "val"} +{"id": "c3b5a86b3f5182889769", "text": "CVE: CVE-2022-0361\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.4215: illegal memory access when copying lines in Visual mode\n\nProblem: Illegal memory access when copying lines in Visual mode.\nSolution: Adjust the Visual position after copying lines.", "cve_id": "CVE-2022-0361", "title": "CVE-2022-0361", "source": "cvefixes", "timestamp": "2022-01-26", "split": "val"} +{"id": "373b33edf628fd806bd2", "text": "CVE: CVE-2022-2980\n\n[{'lang': 'en', 'value': 'NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0259.'}]\n\nFix commit: patch 9.0.0259: crash with mouse click when not initialized\n\nProblem: Crash with mouse click when not initialized.\nSolution: Check TabPageIdxs[] is not NULL.", "cve_id": "CVE-2022-2980", "title": "CVE-2022-2980", "source": "cvefixes", "timestamp": "2022-08-25", "split": "val"} +{"id": "CVE-2023-34362", "text": "Progress MOVEit Transfer SQL Injection Vulnerability\n\nAffected: Progress MOVEit Transfer\n\nProgress MOVEit Transfer contains a SQL injection vulnerability that could allow an unauthenticated attacker to gain unauthorized access to MOVEit Transfer's database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database in addition to executing SQL statements that alter or delet", "cve_id": "CVE-2023-34362", "title": "Progress MOVEit Transfer SQL Injection Vulnerability", "source": "cisa_kev", "timestamp": "2023-06-02", "split": "val"} +{"id": "a4c5766ccf1db91f81c4", "text": "CVE: CVE-2022-23627\n\n[{'lang': 'en', 'value': \"ArchiSteamFarm (ASF) is a C# application with primary purpose of idling Steam cards from multiple accounts simultaneously. Due to a bug in ASF code, introduced in version V5.2.2.2, the program didn't adequately verify effective access of the user sending proxy (i.e. `[Bots]`) commands. In particular, a proxy-like command sent to bot `A` targeting bot `B` has incorrectly verified user's access against bot `A` - instead of bot `B`, to which the comman", "cve_id": "CVE-2022-23627", "title": "CVE-2022-23627", "source": "cvefixes", "timestamp": "2022-02-08", "split": "val"} +{"id": "e880183ba514aa74adba", "text": "[Information Disclosure] [Critical] Curl CVE-2023-38545 vulnerability code changes are disclosed on the internet\n\n## Summary:\nCurl CVE-2023-38545 vulnerability code changes are disclosed on the internet\n\n## Steps To Reproduce:\nTo replicate the issue, I have searched in the Bard about this vulnerability. It disclosed what this vulnerability is about, code changes made for this fix, who made these changes, commit details etc even though this information is not released yet on the internet. In addi", "cve_id": "CVE-2023-38545", "title": "[Critical] Curl CVE-2023-38545 vulnerability code changes are disclosed on the internet (Information Disclosure)", "source": "hackerone", "timestamp": "2023-10-16", "split": "val"} +{"id": "4aa603783db6a176cbac", "text": "CVE: CVE-2022-0370\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in Packagist remdex/livehelperchat prior to 3.93v.'}]\n\nFix commit: CSRF For personal theme", "cve_id": "CVE-2022-0370", "title": "CVE-2022-0370", "source": "cvefixes", "timestamp": "2022-01-27", "split": "val"} +{"id": "05cb6127a5b8d89c0e54", "text": "CVE: CVE-2022-23812\n\n[{'lang': 'en', 'value': 'This affects the package node-ipc from 10.1.1 and before 10.1.3. This package contains malicious code, that targets users with IP located in Russia or Belarus, and overwrites their files with a heart emoji. **Note**: from versions 11.0.0 onwards, instead of having malicious code directly in the source of this package, node-ipc imports the peacenotwar package that includes potentially undesired behavior. Malicious Code: **Note:** Don\\'t run it! js im", "cve_id": "CVE-2022-23812", "title": "CVE-2022-23812", "source": "cvefixes", "timestamp": "2022-03-16", "split": "val"} +{"id": "c29fda1f84202682a00a", "text": "CVE: CVE-2022-23597\n\n[{'lang': 'en', 'value': \"Element Desktop is a Matrix client for desktop platforms with Element Web at its core. Element Desktop before 1.9.7 is vulnerable to a remote program execution bug with user interaction. The exploit is non-trivial and requires clicking on a malicious link, followed by another button click. To the best of our knowledge, the vulnerability has never been exploited in the wild. If you are using Element Desktop < 1.9.7, we recommend upgrading at your ear", "cve_id": "CVE-2022-23597", "title": "CVE-2022-23597", "source": "cvefixes", "timestamp": "2022-02-01", "split": "val"} +{"id": "54d331920c60ec3159bd", "text": "CVE: CVE-2022-27157\n\n[{'lang': 'en', 'value': 'pearweb < 1.32 is suffers from a Weak Password Recovery Mechanism via include/users/passwordmanage.php.'}]\n\nFix commit: Be cautious about what can be unserialized", "cve_id": "CVE-2022-27157", "title": "CVE-2022-27157", "source": "cvefixes", "timestamp": "2022-04-15", "split": "val"} +{"id": "a950bf4ee8c43cd13fb7", "text": "CVE: CVE-2022-1992\n\n[{'lang': 'en', 'value': 'Path Traversal in GitHub repository gogs/gogs prior to 0.12.9.'}]\n\nFix commit: pathutil: check both styles of `os.PathSeparator` (#7020)", "cve_id": "CVE-2022-1992", "title": "CVE-2022-1992", "source": "cvefixes", "timestamp": "2022-06-09", "split": "val"} +{"id": "310b00314b4dd7459422", "text": "CVE: CVE-2022-31101\n\n[{'lang': 'en', 'value': \"prestashop/blockwishlist is a prestashop extension which adds a block containing the customer's wishlists. In affected versions an authenticated customer can perform SQL injection. This issue is fixed in version 2.1.1. Users are advised to upgrade. There are no known workarounds for this issue.\"}]\n\nFix commit: Merge pull request from GHSA-2jx3-5j9v-prpp\n\nValidate order by and order way", "cve_id": "CVE-2022-31101", "title": "CVE-2022-31101", "source": "cvefixes", "timestamp": "2022-06-27", "split": "val"} +{"id": "c7a8804410135c667328", "text": "CVE: CVE-2022-2862\n\n[{'lang': 'en', 'value': 'Use After Free in GitHub repository vim/vim prior to 9.0.0221.'}]\n\nFix commit: patch 9.0.0221: accessing freed memory if compiling nested function fails\n\nProblem: Accessing freed memory if compiling nested function fails.\nSolution: Mess up the variable name so that it won't be found.", "cve_id": "CVE-2022-2862", "title": "CVE-2022-2862", "source": "cvefixes", "timestamp": "2022-08-17", "split": "val"} +{"id": "786a7e0fd008def20525", "text": "CVE: CVE-2022-0269\n\n[{'lang': 'en', 'value': 'Cross-Site Request Forgery (CSRF) in Packagist yetiforce/yetiforce-crm prior to 6.3.0.'}]\n\nFix commit: Improved CSRF protection", "cve_id": "CVE-2022-0269", "title": "CVE-2022-0269", "source": "cvefixes", "timestamp": "2022-01-24", "split": "val"} +{"id": "2efae30399b8fccf24d1", "text": "CVE: CVE-2022-0274\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in NuGet OrchardCore.Application.Cms.Targets prior to 1.2.2.'}]\n\nFix commit: Fix localization and sanitization usages (#11034)", "cve_id": "CVE-2022-0274", "title": "CVE-2022-0274", "source": "cvefixes", "timestamp": "2022-01-19", "split": "val"} +{"id": "67210f5b2c906b1c625a", "text": "CVE: CVE-2022-29779\n\n[{'lang': 'en', 'value': 'Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_value_own_enumerate at src/njs_value.c.'}]\n\nFix commit: Fixed Array.prototype.slice() with slow \"this\" argument.\n\nPreviously, when \"this\" argument was not a fast array, but the \"deleted\" array\nwas a fast array, the \"deleted\" array may be left in uninitialized state if\n\"this\" argument had gaps.\n\nThis fix is to ensure that \"deleted\" is properly initialized.\n\nThis f", "cve_id": "CVE-2022-29779", "title": "CVE-2022-29779", "source": "cvefixes", "timestamp": "2022-06-02", "split": "val"} +{"id": "e96ad989e132deb9beba", "text": "CVE: CVE-2022-29202\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.ragged.constant` does not fully validate the input arguments. This results in a denial of service by consuming all available memory. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.'}]\n\nFix commit: Prevent denial of service in `tf.ragged.constant`\n\nFixes #55199\n\nPiperOrigin-RevId: 442029525", "cve_id": "CVE-2022-29202", "title": "CVE-2022-29202", "source": "cvefixes", "timestamp": "2022-05-20", "split": "val"} +{"id": "CVE-2023-37450", "text": "Apple Multiple Products WebKit Code Execution Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, and Safari WebKit contain an unspecified vulnerability that leads to code execution when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.\n\nRequired Action: Apply updates per vendor instructions or discontinue use o", "cve_id": "CVE-2023-37450", "title": "Apple Multiple Products WebKit Code Execution Vulnerability", "source": "cisa_kev", "timestamp": "2023-07-13", "split": "val"} +{"id": "1cb5c129ba7eb3488ed6", "text": "CVE: CVE-2022-24803\n\n[{'lang': 'en', 'value': 'Asciidoctor-include-ext is Asciidoctor’s standard include processor reimplemented as an extension. Versions prior to 0.4.0, when used to render user-supplied input in AsciiDoc markup, may allow an attacker to execute arbitrary system commands on the host operating system. This attack is possible even when `allow-uri-read` is disabled! The problem has been patched in the referenced commits.'}]\n\nFix commit: Make #read_lines code more robust, avoid usi", "cve_id": "CVE-2022-24803", "title": "CVE-2022-24803", "source": "cvefixes", "timestamp": "2022-04-01", "split": "val"} +{"id": "c3bf28eeacd875e99d7d", "text": "CVE: CVE-2022-35936\n\n[{'lang': 'en', 'value': \"Ethermint is an Ethereum library. In Ethermint running versions before `v0.17.2`, the contract `selfdestruct` invocation permanently removes the corresponding bytecode from the internal database storage. However, due to a bug in the `DeleteAccount`function, all contracts that used the identical bytecode (i.e shared the same `CodeHash`) will also stop working once one contract invokes `selfdestruct`, even though the other contracts did not invoke the", "cve_id": "CVE-2022-35936", "title": "CVE-2022-35936", "source": "cvefixes", "timestamp": "2022-08-05", "split": "val"} +{"id": "3e040cb62cffcb785504", "text": "[Cross-site Scripting (XSS) - DOM] [CVE-2023-23913] DOM Based Cross-site Scripting in rails-ujs for contenteditable HTML Elements\n\n# Summary\nOriginal report: https://hackerone.com/reports/1767802\n\n## Impact\n\nIf the specified malicious HTML clipboard content is provided to a `contenteditable` element, this could result in the arbitrary execution of javascript on the origin in question.", "cve_id": "CVE-2023-23913", "title": "[CVE-2023-23913] DOM Based Cross-site Scripting in rails-ujs for contenteditable HTML Elements (Cross-site Scripting (XSS) - DOM)", "source": "hackerone", "timestamp": "2023-09-07", "split": "val"} +{"id": "CVE-2023-2136", "text": "Google Chrome Skia Integer Overflow Vulnerability\n\nAffected: Google Chromium Skia\n\nGoogle Chromium Skia contains an integer overflow vulnerability that allows a remote attacker, who has compromised the renderer process, to potentially perform a sandbox escape via a crafted HTML page. This vulnerability affects Google Chrome and ChromeOS, Android, Flutter, and possibly other products.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-190\n\n[Source: CISA Known Exploited Vulnerab", "cve_id": "CVE-2023-2136", "title": "Google Chrome Skia Integer Overflow Vulnerability", "source": "cisa_kev", "timestamp": "2023-04-21", "split": "val"} +{"id": "CVE-2023-3079", "text": "Google Chromium V8 Type Confusion Vulnerability\n\nAffected: Google Chromium V8\n\nGoogle Chromium V8 Engine contains a type confusion vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-843\n\n[Source: CISA Known Exploited Vulner", "cve_id": "CVE-2023-3079", "title": "Google Chromium V8 Type Confusion Vulnerability", "source": "cisa_kev", "timestamp": "2023-06-07", "split": "val"} +{"id": "CVE-2022-42948", "text": "Fortra Cobalt Strike User Interface Remote Code Execution Vulnerability\n\nAffected: Fortra Cobalt Strike\n\nFortra Cobalt Strike User Interface contains an unspecified vulnerability rooted in Java Swing that may allow remote code execution.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-79, CWE-116\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-42948", "title": "Fortra Cobalt Strike User Interface Remote Code Execution Vulnerability", "source": "cisa_kev", "timestamp": "2023-03-30", "split": "val"} +{"id": "a8dd6aa0292871c3c736", "text": "CVE: CVE-2022-36879\n\n[{'lang': 'en', 'value': 'An issue was discovered in the Linux kernel through 5.18.14. xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice.'}]\n\nFix commit: xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup()\n\nxfrm_policy_lookup() will call xfrm_pol_hold_rcu() to get a refcount of\npols[0]. This refcount can be dropped in xfrm_expand_policies() when\nxfrm_expand_policies() return error. pols[0]'s refcount is balan", "cve_id": "CVE-2022-36879", "title": "CVE-2022-36879", "source": "cvefixes", "timestamp": "2022-07-27", "split": "val"} +{"id": "56c51e36a0bcfa9ddc9f", "text": "CVE: CVE-2022-24719\n\n[{'lang': 'en', 'value': 'Fluture-Node is a FP-style HTTP and streaming utils for Node based on Fluture. Using `followRedirects` or `followRedirectsWith` with any of the redirection strategies built into fluture-node 4.0.0 or 4.0.1, paired with a request that includes confidential headers such as Authorization or Cookie, exposes you to a vulnerability where, if the destination server were to redirect the request to a server on a third-party domain, or the same domain over un", "cve_id": "CVE-2022-24719", "title": "CVE-2022-24719", "source": "cvefixes", "timestamp": "2022-03-01", "split": "val"} +{"id": "bd78b7ae2f4c5286f24f", "text": "CVE: CVE-2022-32065\n\n[{'lang': 'en', 'value': 'An arbitrary file upload vulnerability in the background management module of RuoYi v4.7.3 and below allows attackers to execute arbitrary code via a crafted HTML file.'}]\n\nFix commit: 用户头像上传格式限制", "cve_id": "CVE-2022-32065", "title": "CVE-2022-32065", "source": "cvefixes", "timestamp": "2022-07-13", "split": "val"} +{"id": "CVE-2023-23397", "text": "Microsoft Office Outlook Privilege Escalation Vulnerability\n\nAffected: Microsoft Office\n\nMicrosoft Office Outlook contains a privilege escalation vulnerability that allows for a NTLM Relay attack against another service to authenticate as the user.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-294\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-23397", "title": "Microsoft Office Outlook Privilege Escalation Vulnerability", "source": "cisa_kev", "timestamp": "2023-03-14", "split": "val"} +{"id": "CVE-2022-48618", "text": "Apple Multiple Products Memory Corruption Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, tvOS, and watchOS contain a time-of-check/time-of-use (TOCTOU) memory corruption vulnerability that allows an attacker with read and write capabilities to bypass Pointer Authentication.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-367\n\n[Source: CISA Known Exploited Vulnerabilities Catalo", "cve_id": "CVE-2022-48618", "title": "Apple Multiple Products Memory Corruption Vulnerability", "source": "cisa_kev", "timestamp": "2024-01-31", "split": "val"} +{"id": "b458192a6cdc6c4c6871", "text": "CVE: CVE-2022-35213\n\n[{'lang': 'en', 'value': 'Ecommerce-CodeIgniter-Bootstrap before commit 56465f was discovered to contain a cross-site scripting (XSS) vulnerability via the function base_url() at /blog/blogpublish.php.'}]\n\nFix commit: hot fixes", "cve_id": "CVE-2022-35213", "title": "CVE-2022-35213", "source": "cvefixes", "timestamp": "2022-08-18", "split": "val"} +{"id": "8aea4702c1bd4d4d751d", "text": "CVE: CVE-2022-29181\n\n[{'lang': 'en', 'value': 'Nokogiri is an open source XML and HTML library for Ruby. Nokogiri prior to version 1.13.6 does not type-check all inputs into the XML and HTML4 SAX parsers, allowing specially crafted untrusted inputs to cause illegal memory access errors (segfault) or reads from unrelated memory. Version 1.13.6 contains a patch for this issue. As a workaround, ensure the untrusted input is a `String` by calling `#to_s` or equivalent.'}]\n\nFix commit: fix: {HTML4,XM", "cve_id": "CVE-2022-29181", "title": "CVE-2022-29181", "source": "cvefixes", "timestamp": "2022-05-20", "split": "val"} +{"id": "1b5796288683cb233dc7", "text": "CVE: CVE-2022-0711\n\n[{'lang': 'en', 'value': 'A flaw was found in the way HAProxy processed HTTP responses containing the \"Set-Cookie2\" header. This flaw could allow an attacker to send crafted HTTP response packets which lead to an infinite loop, eventually resulting in a denial of service condition. The highest threat from this vulnerability is availability.'}]\n\nFix commit: BUG/MAJOR: http/htx: prevent unbounded loop in http_manage_server_side_cookies\n\nEnsure calls to http_find_header() termin", "cve_id": "CVE-2022-0711", "title": "CVE-2022-0711", "source": "cvefixes", "timestamp": "2022-03-02", "split": "val"} +{"id": "2dd48c9ced3accb61745", "text": "CVE: CVE-2022-0855\n\n[{'lang': 'en', 'value': 'Improper Resolution of Path Equivalence in GitHub repository microweber-dev/whmcs_plugin prior to 0.0.4.'}]\n\nFix commit: update", "cve_id": "CVE-2022-0855", "title": "CVE-2022-0855", "source": "cvefixes", "timestamp": "2022-03-04", "split": "val"} +{"id": "CVE-2022-27925", "text": "Synacor Zimbra Collaboration Suite (ZCS) Arbitrary File Upload Vulnerability\n\nAffected: Synacor Zimbra Collaboration Suite (ZCS)\n\nSynacor Zimbra Collaboration Suite (ZCS) contains flaw in the mboximport functionality, allowing an authenticated attacker to upload arbitrary files to perform remote code execution. This vulnerability was chained with CVE-2022-37042 which allows for unauthenticated remote code execution.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE", "cve_id": "CVE-2022-27925", "title": "Synacor Zimbra Collaboration Suite (ZCS) Arbitrary File Upload Vulnerability", "source": "cisa_kev", "timestamp": "2022-08-11", "split": "val"} +{"id": "8cba5f0786e3c4de7d82", "text": "CVE: CVE-2022-1988\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Generic in GitHub repository neorazorx/facturascripts prior to 2022.09.'}]\n\nFix commit: - Añadida comprobación de html en descripción al test unitario del modelo cuenta.\n- Eliminado el test unitario de subcuenta por obsoleto. Se creará uno nuevo a continuación.", "cve_id": "CVE-2022-1988", "title": "CVE-2022-1988", "source": "cvefixes", "timestamp": "2022-06-03", "split": "val"} +{"id": "CVE-2022-26134", "text": "Atlassian Confluence Server and Data Center Remote Code Execution Vulnerability\n\nAffected: Atlassian Confluence Server/Data Center\n\nAtlassian Confluence Server and Data Center contain a remote code execution vulnerability that allows for an unauthenticated attacker to perform remote code execution.\n\nRequired Action: Immediately block all internet traffic to and from affected products AND apply the update per vendor instructions [https://confluence.atlassian.com/doc/confluence-security-advisory-2", "cve_id": "CVE-2022-26134", "title": "Atlassian Confluence Server and Data Center Remote Code Execution Vulnerability", "source": "cisa_kev", "timestamp": "2022-06-02", "split": "val"} +{"id": "cbaca5b60caedcf516e0", "text": "[Cleartext Transmission of Sensitive Information] CVE-2022-43551: Another HSTS bypass via IDN\n\n## Summary:\nI found an issue similar to CVE-2022-42916 again.\nSince the phenomenon is the same, I will describe the same as last time.\n\nHSTS checks are bypassed if any character in the IDN convert(Nameprep) to a '.'\nfor example\"。\"(UTF-8:E38082).\nI think there are other characters that become \".(UTF-8:2E)\" as a result of converting with IDN.\n\nThis is because the host name before IDN conversion is used w", "cve_id": "CVE-2022-42916", "title": "CVE-2022-43551: Another HSTS bypass via IDN (Cleartext Transmission of Sensitive Information)", "source": "hackerone", "timestamp": "2022-12-21", "split": "val"} +{"id": "62727638f213b9017c4b", "text": "CVE: CVE-2022-36123\n\n[{'lang': 'en', 'value': 'The Linux kernel before 5.18.13 lacks a certain clear operation for the block starting symbol (.bss). This allows Xen PV guest OS users to cause a denial of service or gain privileges.'}]\n\nFix commit: x86/xen: Use clear_bss() for Xen PV guests\n\nInstead of clearing the bss area in assembly code, use the clear_bss()\nfunction.\n\nThis requires to pass the start_info address as parameter to\nxen_start_kernel() in order to avoid the xen_start_info being zer", "cve_id": "CVE-2022-36123", "title": "CVE-2022-36123", "source": "cvefixes", "timestamp": "2022-07-29", "split": "val"} +{"id": "8f79cf7532b92a0df599", "text": "CVE: CVE-2022-1240\n\n[{'lang': 'en', 'value': 'Heap buffer overflow in libr/bin/format/mach0/mach0.c in GitHub repository radareorg/radare2 prior to 5.8.6. If address sanitizer is disabled during the compiling, the program should executes into the `r_str_ncpy` function. Therefore I think it is very likely to be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html).'}]\n\nFix commit: Fix oobread in the macho parser ##crash\n\n* Re", "cve_id": "CVE-2022-1240", "title": "CVE-2022-1240", "source": "cvefixes", "timestamp": "2022-04-06", "split": "val"} +{"id": "1d5cb4d71a21f6670732", "text": "CVE: CVE-2022-0660\n\n[{'lang': 'en', 'value': 'Generation of Error Message Containing Sensitive Information in Packagist microweber/microweber prior to 1.2.11.'}]\n\nFix commit: Update Comment.php", "cve_id": "CVE-2022-0660", "title": "CVE-2022-0660", "source": "cvefixes", "timestamp": "2022-02-18", "split": "val"} +{"id": "ec1a94ef5a57d9ae01f5", "text": "[Cross-site Scripting (XSS) - Reflected] Reflected XSS at https://██████/\n\n**Description:**\nThere exists a reflected XSS within the logout functionality of ServiceNow. This enables an unauthenticated remote attacker to execute arbitrary JavaScript.\n\n## References\n* https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1156793\n\n## Impact\n\nSteal cookies to account takeover.\n\n## System Host(s)\n█████\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\nCVE-2022-38463\n\n## Steps to", "cve_id": "CVE-2022-38463", "title": "Reflected XSS at https://██████/ (Cross-site Scripting (XSS) - Reflected)", "source": "hackerone", "timestamp": "2023-09-29", "split": "val"} +{"id": "CVE-2023-36884", "text": "Microsoft Windows Search Remote Code Execution Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Search contains an unspecified vulnerability that could allow an attacker to evade Mark of the Web (MOTW) defenses via a specially crafted malicious file, leading to remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-362\n\n[Source: CISA Known Exploited Vulnerabi", "cve_id": "CVE-2023-36884", "title": "Microsoft Windows Search Remote Code Execution Vulnerability", "source": "cisa_kev", "timestamp": "2023-07-17", "split": "val"} +{"id": "9cd32cff4741cb275264", "text": "CVE: CVE-2022-24869\n\n[{'lang': 'en', 'value': \"GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In versions prior to 10.0.0 one can use ticket's followups or setup login messages with a stylesheet link. This may allow for a cross site scripting attack vector. This issue is partially mitigated by cors security of browsers, though users are still advised to upgrade.\"}]\n\nFix commit: Merge pull request from GH", "cve_id": "CVE-2022-24869", "title": "CVE-2022-24869", "source": "cvefixes", "timestamp": "2022-04-21", "split": "val"} +{"id": "50226336dcc208f1062e", "text": "CVE: CVE-2022-1420\n\n[{'lang': 'en', 'value': 'Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4774.'}]\n\nFix commit: patch 8.2.4774: crash when using a number for lambda name\n\nProblem: Crash when using a number for lambda name.\nSolution: Check the type of the lambda reference.", "cve_id": "CVE-2022-1420", "title": "CVE-2022-1420", "source": "cvefixes", "timestamp": "2022-04-21", "split": "val"} +{"id": "CVE-2022-36537", "text": "ZK Framework AuUploader Unspecified Vulnerability\n\nAffected: ZK Framework AuUploader\n\nZK Framework AuUploader servlets contain an unspecified vulnerability that could allow an attacker to retrieve the content of a file located in the web context. The ZK Framework is an open-source Java framework. This vulnerability can impact multiple products, including but not limited to ConnectWise R1Soft Server Backup Manager.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s", "cve_id": "CVE-2022-36537", "title": "ZK Framework AuUploader Unspecified Vulnerability", "source": "cisa_kev", "timestamp": "2023-02-27", "split": "val"} +{"id": "9d9249878abf54f9a9a5", "text": "CVE: CVE-2022-24773\n\n[{'lang': 'en', 'value': 'Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code does not properly check `DigestInfo` for a proper ASN.1 structure. This can lead to successful verification with signatures that contain invalid structures but a valid digest. The issue has been addressed in `node-forge` version 1.3.0. There are currently no known workarounds.'}]", "cve_id": "CVE-2022-24773", "title": "CVE-2022-24773", "source": "cvefixes", "timestamp": "2022-03-18", "split": "val"} +{"id": "CVE-2023-33063", "text": "Qualcomm Multiple Chipsets Use-After-Free Vulnerability\n\nAffected: Qualcomm Multiple Chipsets\n\nMultiple Qualcomm chipsets contain a use-after-free vulnerability due to memory corruption in DSP Services during a remote call from HLOS to DSP.\n\nRequired Action: Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-33063", "title": "Qualcomm Multiple Chipsets Use-After-Free Vulnerability", "source": "cisa_kev", "timestamp": "2023-12-05", "split": "val"} +{"id": "488d1a19fd02c7715905", "text": "CVE: CVE-2022-23595\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. When building an XLA compilation cache, if default settings are used, TensorFlow triggers a null pointer dereference. In the default scenario, all devices are allowed, so `flr->config_proto` is `nullptr`. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supporte", "cve_id": "CVE-2022-23595", "title": "CVE-2022-23595", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val"} +{"id": "CVE-2022-20708", "text": "Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability\n\nAffected: Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers\n\nA vulnerability in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code elevate privileges, execute arbitrary commands, bypass authentication and authorization protections, fetch and run unsigned software, or cause a denial of service (DoS).\n\nRequired", "cve_id": "CVE-2022-20708", "title": "Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability", "source": "cisa_kev", "timestamp": "2022-03-03", "split": "val"} +{"id": "c4c63e5b6b0102656282", "text": "CVE: CVE-2022-25878\n\n[{'lang': 'en', 'value': 'The package protobufjs before 6.11.3 are vulnerable to Prototype Pollution which can allow an attacker to add/modify properties of the Object.prototype. This vulnerability can occur in multiple ways: 1. by providing untrusted user input to util.setProperty or to ReflectionObject.setParsedOption functions 2. by parsing/loading .proto files'}]\n\nFix commit: fix: do not let setProperty change the prototype (#1731)", "cve_id": "CVE-2022-25878", "title": "CVE-2022-25878", "source": "cvefixes", "timestamp": "2022-05-27", "split": "val"} +{"id": "21da46e224a6912d56e6", "text": "CVE: CVE-2022-0157\n\n[{'lang': 'en', 'value': \"phoronix-test-suite is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\"}]\n\nFix commit: phodevi: Input sanitization updates for Phoromatic Server\n\nAlso other code formatting / cleanups while reviewing the code...", "cve_id": "CVE-2022-0157", "title": "CVE-2022-0157", "source": "cvefixes", "timestamp": "2022-01-10", "split": "val"} +{"id": "3c6a6b982ba4bdd68af6", "text": "CVE: CVE-2022-2470\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Reflected in GitHub repository microweber/microweber prior to 1.2.21.'}]\n\nFix commit: update", "cve_id": "CVE-2022-2470", "title": "CVE-2022-2470", "source": "cvefixes", "timestamp": "2022-07-22", "split": "val"} +{"id": "b377c6f706e35cab5caa", "text": "CVE: CVE-2022-0906\n\n[{'lang': 'en', 'value': 'Unrestricted file upload leads to stored XSS in GitHub repository microweber/microweber prior to 1.1.12.'}]\n\nFix commit: update", "cve_id": "CVE-2022-0906", "title": "CVE-2022-0906", "source": "cvefixes", "timestamp": "2022-03-10", "split": "val"} +{"id": "7f7dc540d45a5970759f", "text": "CVE: CVE-2022-0405\n\n[{'lang': 'en', 'value': 'Improper Access Control in GitHub repository janeczku/calibre-web prior to 0.6.16.'}]\n\nFix commit: Kobo sync token is now also created if accessed from localhost(fixes #1990)\nCreate kobo sync token button is now \"unclicked\" after closing dialog\nAdditional localhost route is catched\nIf book format is deleted this also deletes the book synced to kobo status", "cve_id": "CVE-2022-0405", "title": "CVE-2022-0405", "source": "cvefixes", "timestamp": "2022-04-03", "split": "val"} +{"id": "5bfcc59494a327f4df92", "text": "CVE: CVE-2022-1723\n\n[{'lang': 'en', 'value': 'Server-Side Request Forgery (SSRF) in GitHub repository jgraph/drawio prior to 18.0.6.'}]\n\nFix commit: 18.0.6 release", "cve_id": "CVE-2022-1723", "title": "CVE-2022-1723", "source": "cvefixes", "timestamp": "2022-05-17", "split": "val"} +{"id": "3eb6f5eb123fceb0cdde", "text": "CVE: CVE-2022-29339\n\n[{'lang': 'en', 'value': 'In GPAC 2.1-DEV-rev87-g053aae8-master, function BS_ReadByte() in utils/bitstream.c has a failed assertion, which causes a Denial of Service. This vulnerability was fixed in commit 9ea93a2.'}]\n\nFix commit: fixed #2165", "cve_id": "CVE-2022-29339", "title": "CVE-2022-29339", "source": "cvefixes", "timestamp": "2022-05-05", "split": "val"} +{"id": "4078596d6b73edbc61cb", "text": "CVE: CVE-2022-1809\n\n[{'lang': 'en', 'value': 'Access of Uninitialized Pointer in GitHub repository radareorg/radare2 prior to 5.7.0.'}]\n\nFix commit: Fix crash in vtable analysis on UB ##crash\n\n* Reported by @greatergoodest via huntrdev\n* BountyID 0730a95e-c485-4ff2-9a5d-bb3abfda0b17\n* Reproducer: minified_crash", "cve_id": "CVE-2022-1809", "title": "CVE-2022-1809", "source": "cvefixes", "timestamp": "2022-05-21", "split": "val"} +{"id": "615ad71521876b729886", "text": "CVE: CVE-2022-1681\n\n[{'lang': 'en', 'value': 'Authentication Bypass Using an Alternate Path or Channel in GitHub repository requarks/wiki prior to 2.5.281. User can get root user permissions'}]\n\nFix commit: fix: prevent manage system assignment from manage groups permission", "cve_id": "CVE-2022-1681", "title": "CVE-2022-1681", "source": "cvefixes", "timestamp": "2022-05-12", "split": "val"} +{"id": "d5ba2bde67844cb829c6", "text": "CVE: CVE-2022-1796\n\n[{'lang': 'en', 'value': 'Use After Free in GitHub repository vim/vim prior to 8.2.4979.'}]\n\nFix commit: patch 8.2.4979: accessing freed memory when line is flushed\n\nProblem: Accessing freed memory when line is flushed.\nSolution: Make a copy of the pattern to search for.", "cve_id": "CVE-2022-1796", "title": "CVE-2022-1796", "source": "cvefixes", "timestamp": "2022-05-19", "split": "val"} +{"id": "CVE-2022-47966", "text": "Zoho ManageEngine Multiple Products Remote Code Execution Vulnerability\n\nAffected: Zoho ManageEngine\n\nMultiple Zoho ManageEngine products contain an unauthenticated remote code execution vulnerability due to the usage of an outdated third-party dependency, Apache Santuario.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-47966", "title": "Zoho ManageEngine Multiple Products Remote Code Execution Vulnerability", "source": "cisa_kev", "timestamp": "2023-01-23", "split": "val"} +{"id": "0901dc0853491ab78033", "text": "CVE: CVE-2022-1553\n\n[{'lang': 'en', 'value': 'Leaking password protected articles content due to improper access control in GitHub repository publify/publify prior to 9.2.8. Attackers can leverage this vulnerability to view the contents of any password-protected article present on the publify website, compromising confidentiality and integrity of users.'}]\n\nFix commit: Do not create article meta description for password-protected articles", "cve_id": "CVE-2022-1553", "title": "CVE-2022-1553", "source": "cvefixes", "timestamp": "2022-05-16", "split": "val"} +{"id": "6d11bad7afa3e54d46da", "text": "CVE: CVE-2022-31031\n\n[{'lang': 'en', 'value': 'PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions prior to and including 2.12.1 a stack buffer overflow vulnerability affects PJSIP users that use STUN in their applications, either by: setting a STUN server in their account/media config in PJSUA/PJSUA2 level, or directly using `pjlib-util/stun_simple` API. A patch is av", "cve_id": "CVE-2022-31031", "title": "CVE-2022-31031", "source": "cvefixes", "timestamp": "2022-06-09", "split": "val"} +{"id": "df74853d28a453f693e9", "text": "CVE: CVE-2022-24856\n\n[{'lang': 'en', 'value': 'FlyteConsole is the web user interface for the Flyte platform. FlyteConsole prior to version 0.52.0 is vulnerable to server-side request forgery (SSRF) when FlyteConsole is open to the general internet. An attacker can exploit any user of a vulnerable instance to access the internal metadata server or other unauthenticated URLs. Passing of headers to an unauthorized actor may occur. The patch for this issue deletes the entire `cors_proxy`, as this i", "cve_id": "CVE-2022-24856", "title": "CVE-2022-24856", "source": "cvefixes", "timestamp": "2022-05-17", "split": "val"} +{"id": "46b3d68ea3868cd871c3", "text": "CVE: CVE-2022-28085\n\n[{'lang': 'en', 'value': 'A flaw was found in htmldoc commit 31f7804. A heap buffer overflow in the function pdf_write_names in ps-pdf.cxx may lead to arbitrary code execution and Denial of Service (DoS).'}]\n\nFix commit: Call check_pages when writing links (Issue #480)", "cve_id": "CVE-2022-28085", "title": "CVE-2022-28085", "source": "cvefixes", "timestamp": "2022-04-27", "split": "val"} +{"id": "51b0d1c8a11cb923f345", "text": "CVE: CVE-2022-24880\n\n[{'lang': 'en', 'value': 'flask-session-captcha is a package which allows users to extend Flask by adding an image based captcha stored in a server side session. In versions prior to 1.2.1, he `captcha.validate()` function would return `None` if passed no value (e.g. by submitting an having an empty form). If implementing users were checking the return value to be **False**, the captcha verification check could be bypassed. Version 1.2.1 fixes the issue. Users can workaround", "cve_id": "CVE-2022-24880", "title": "CVE-2022-24880", "source": "cvefixes", "timestamp": "2022-04-25", "split": "val"} +{"id": "759424f9e8a16ee66c6f", "text": "CVE: CVE-2022-35919\n\n[{'lang': 'en', 'value': \"MinIO is a High Performance Object Storage released under GNU Affero General Public License v3.0. In affected versions all 'admin' users authorized for `admin:ServerUpdate` can selectively trigger an error that in response, returns the content of the path requested. Any normal OS system would allow access to contents at any arbitrary paths that are readable by MinIO process. Users are advised to upgrade. Users unable to upgrade may disable ServerUpd", "cve_id": "CVE-2022-35919", "title": "CVE-2022-35919", "source": "cvefixes", "timestamp": "2022-08-01", "split": "val"} +{"id": "d1d33c70613a12caa78a", "text": "CVE: CVE-2022-0323\n\n[{'lang': 'en', 'value': 'Improper Neutralization of Special Elements Used in a Template Engine in Packagist mustache/mustache prior to 2.14.1.'}]\n\nFix commit: Fix CVE-2022-0323 (improper neutralization of section names) \n\n- Fixes possible RCE when rendering untrusted user templates.\n- Remove unnecessary comments in generated source.", "cve_id": "CVE-2022-0323", "title": "CVE-2022-0323", "source": "cvefixes", "timestamp": "2022-01-21", "split": "val"} +{"id": "6a11378a672ce3ecd7b7", "text": "CVE: CVE-2022-25320\n\n[{'lang': 'en', 'value': 'An issue was discovered in Cerebrate through 1.4. Username enumeration could occur.'}]\n\nFix commit: fix: [security] user settings allow enumeration of usernames\n\n- as reported by Dawid Czarnecki from Zigrin Security", "cve_id": "CVE-2022-25320", "title": "CVE-2022-25320", "source": "cvefixes", "timestamp": "2022-02-18", "split": "val"} +{"id": "6c5b502cf7db693b5722", "text": "CVE: CVE-2022-23645\n\n[{'lang': 'en', 'value': \"swtpm is a libtpms-based TPM emulator with socket, character device, and Linux CUSE interface. Versions prior to 0.5.3, 0.6.2, and 0.7.1 are vulnerable to out-of-bounds read. A specially crafted header of swtpm's state, where the blobheader's hdrsize indicator has an invalid value, may cause an out-of-bounds access when the byte array representing the state of the TPM is accessed. This will likely crash swtpm or prevent it from starting since the st", "cve_id": "CVE-2022-23645", "title": "CVE-2022-23645", "source": "cvefixes", "timestamp": "2022-02-18", "split": "val"} +{"id": "22858225f5e7ec30fa5c", "text": "CVE: CVE-2022-0723\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Reflected in GitHub repository microweber/microweber prior to 1.2.11.'}]\n\nFix commit: update", "cve_id": "CVE-2022-0723", "title": "CVE-2022-0723", "source": "cvefixes", "timestamp": "2022-02-26", "split": "val"} +{"id": "CVE-2023-5217", "text": "Google Chromium libvpx Heap Buffer Overflow Vulnerability\n\nAffected: Google Chromium libvpx\n\nGoogle Chromium libvpx contains a heap buffer overflow vulnerability in vp8 encoding that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could impact web browsers using libvpx, including but not limited to Google Chrome.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", "cve_id": "CVE-2023-5217", "title": "Google Chromium libvpx Heap Buffer Overflow Vulnerability", "source": "cisa_kev", "timestamp": "2023-10-02", "split": "val"} +{"id": "99b2c767c7238e6271d6", "text": "[Unknown] CVE-2023-42663: Apache Airflow: Bypass permission verification to view task instances of other dags\n\nApache Airflow, versions before 2.7.2, has a vulnerability that allows an authorized user who has access to read specific DAGs only, to read information about task instances in other DAGs.\n\n#Steps to reproduce :\n1. Copy a User role, name it roleA, and remove the \"can read on DAGs\" \"can delete on DAGs\" \"can edit on DAGs\" permissions.Add \"can read on DAG:tutorial\" permissions\n{F2771458}", "cve_id": "CVE-2023-42663", "title": "CVE-2023-42663: Apache Airflow: Bypass permission verification to view task instances of other dags (Unknown)", "source": "hackerone", "timestamp": "2023-11-13", "split": "val"} +{"id": "0f449e4d3ec05611ee3a", "text": "CVE: CVE-2022-0355\n\n[{'lang': 'en', 'value': 'Exposure of Sensitive Information to an Unauthorized Actor in NPM simple-get prior to 4.0.1.'}]\n\nFix commit: Merge pull request #73 from ranjit-git/master", "cve_id": "CVE-2022-0355", "title": "CVE-2022-0355", "source": "cvefixes", "timestamp": "2022-01-26", "split": "val"} +{"id": "bd12d26ca397eade8b28", "text": "[Business Logic Errors] CVE-2023-27536: GSS delegation too eager connection re-use\n\nlibcurl would reuse a previously created connection even when the GSS delegation (CURLOPT_GSSAPI_DELEGATION) option had been changed that could have changed the user's permissions in a second transfer.\n\nlibcurl keeps previously used connections in a connection pool for subsequent transfers to reuse if one of them matches the setup. However, this GSS delegation setting was left out from the configuration match che", "cve_id": "CVE-2023-27536", "title": "CVE-2023-27536: GSS delegation too eager connection re-use (Business Logic Errors)", "source": "hackerone", "timestamp": "2023-03-20", "split": "val"} +{"id": "39ae773e9934415fed8c", "text": "CVE: CVE-2022-1587\n\n[{'lang': 'en', 'value': 'An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers.'}]\n\nFix commit: Fixed an issue affecting recursions in JIT", "cve_id": "CVE-2022-1587", "title": "CVE-2022-1587", "source": "cvefixes", "timestamp": "2022-05-16", "split": "val"} +{"id": "2292a7155145173bdf3d", "text": "CVE: CVE-2022-1238\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in libr/bin/format/ne/ne.c in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is heap overflow and may be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html).'}]\n\nFix commit: Fix another oobread segfault in the NE bin parser ##crash\n\n* Reported by @han0nly via huntr.dev\n* Reproducers: sample1 sample2 sample3\n* BountyID: 47422cdf", "cve_id": "CVE-2022-1238", "title": "CVE-2022-1238", "source": "cvefixes", "timestamp": "2022-04-06", "split": "val"} +{"id": "099e7e6ff284e6da3d8e", "text": "CVE: CVE-2022-0419\n\n[{'lang': 'en', 'value': 'NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.0.'}]\n\nFix commit: Fix null deref in xnu.kernelcache ##crash\n\n* Reported by @xshad3 via huntr.dev", "cve_id": "CVE-2022-0419", "title": "CVE-2022-0419", "source": "cvefixes", "timestamp": "2022-02-01", "split": "val"} +{"id": "CVE-2022-28810", "text": "Zoho ManageEngine ADSelfService Plus Remote Code Execution Vulnerability\n\nAffected: Zoho ManageEngine\n\nZoho ManageEngine ADSelfService Plus contains an unspecified vulnerability allowing for remote code execution when performing a password change or reset.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-78, CWE-259\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-28810", "title": "Zoho ManageEngine ADSelfService Plus Remote Code Execution Vulnerability", "source": "cisa_kev", "timestamp": "2023-03-07", "split": "val"} +{"id": "8d1896c4a0e5cc587cdd", "text": "[Insufficiently Protected Credentials] CVE-2022-27776: Auth/cookie leak on redirect\n\n## Summary:\nCurl can be coaxed to leak Authorisation / Cookie headers by redirecting request to http:// URL on the same host. Successful exploitation requires that the attacker can either Man-in-the-Middle the connection or can access the traffic at the recipient side (for example by redirecting to a non-privileged port such as 9999 on the same host).\n\n## Steps To Reproduce:\n\n1. Configure for example Apache2 to", "cve_id": "CVE-2022-27774", "title": "CVE-2022-27776: Auth/cookie leak on redirect (Insufficiently Protected Credentials)", "source": "hackerone", "timestamp": "2022-04-27", "split": "val"} +{"id": "e4344ea5dbcd404452ea", "text": "CVE: CVE-2022-23621\n\n[{'lang': 'en', 'value': 'XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions any user with SCRIPT right can read any file located in the XWiki WAR (for example xwiki.cfg and xwiki.properties) through XWiki#invokeServletAndReturnAsString as `$xwiki.invokeServletAndReturnAsString(\"/WEB-INF/xwiki.cfg\")`. This issue has been patched in XWiki versions 12.10.9, 13.4.3 and 13.7-rc-1. Users are advised to upd", "cve_id": "CVE-2022-23621", "title": "CVE-2022-23621", "source": "cvefixes", "timestamp": "2022-02-09", "split": "val"} +{"id": "55af3f24e50e437b4f44", "text": "[Business Logic Errors] CVE-2023-23914: HSTS ignored on multiple requests\n\ncurl's HSTS functionality fail when multiple URLs are requested serially.\n\nUsing its HSTS support, curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the URL. This HSTS mechanism would however suprisingly be ignored by subsequent transfers when done on the same command line because the state would not be properly carried on.\n\n## Impact\n\nBypass intended secur", "cve_id": "CVE-2023-23914", "title": "CVE-2023-23914: HSTS ignored on multiple requests (Business Logic Errors)", "source": "hackerone", "timestamp": "2023-02-24", "split": "val"} +{"id": "b7e134e536d00ea160cd", "text": "CVE: CVE-2022-2368\n\n[{'lang': 'en', 'value': 'Business Logic Errors in GitHub repository microweber/microweber prior to 1.2.20.'}]\n\nFix commit: update", "cve_id": "CVE-2022-2368", "title": "CVE-2022-2368", "source": "cvefixes", "timestamp": "2022-07-11", "split": "val"} +{"id": "efc50de17254f6b5392f", "text": "[Allocation of Resources Without Limits or Throttling] CVE-2022-32205: Set-Cookie denial of service\n\n## Summary:\nCurl fails to limit the number of cookies that can be set by a single host/domain. It can easily lead to a situation where constructing the request towards a host will end up consuming more than `DYN_HTTP_REQUEST` memory, leading to instant `CURLE_OUT_OF_MEMORY`.\n\nAny host in a given domain can target any other hosts in the same domain by using domain cookies. The attack works from bo", "cve_id": "CVE-2022-32205", "title": "CVE-2022-32205: Set-Cookie denial of service (Allocation of Resources Without Limits or Throttling)", "source": "hackerone", "timestamp": "2022-06-27", "split": "val"} +{"id": "CVE-2023-43000", "text": "Apple Multiple products Use-After-Free Vulnerability\n\nAffected: Apple Multiple Products\n\nApple macOS, iOS, iPadOS, and Safari 16.6 contain a use-after-free vulnerability due to the processing of maliciously crafted web content that may lead to memory corruption.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulne", "cve_id": "CVE-2023-43000", "title": "Apple Multiple products Use-After-Free Vulnerability", "source": "cisa_kev", "timestamp": "2026-03-05", "split": "val"} +{"id": "8cf000646f18267045fa", "text": "CVE: CVE-2022-24800\n\n[{'lang': 'en', 'value': 'October/System is the system module for October CMS, a self-hosted CMS platform based on the Laravel PHP Framework. Prior to versions 1.0.476, 1.1.12, and 2.2.15, when the developer allows the user to specify their own filename in the `fromData` method, an unauthenticated user can perform remote code execution (RCE) by exploiting a race condition in the temporary storage directory. This vulnerability affects plugins that expose the `October\\\\Rain\\\\D", "cve_id": "CVE-2022-24800", "title": "CVE-2022-24800", "source": "cvefixes", "timestamp": "2022-07-12", "split": "val"} +{"id": "f75507796e3e745ac1a3", "text": "CVE: CVE-2022-24429\n\n[{'lang': 'en', 'value': 'The package convert-svg-core before 0.6.3 are vulnerable to Arbitrary Code Injection when using a specially crafted SVG file. An attacker can read arbitrary files from the file system and then show the file content as a converted PNG file.'}]\n\nFix commit: Remove all disallowed SVG element attributes\n\nIn a further attempt to reduce remote code injection attack vectors, all attributes except for a set of allowed standard attributes are removed from th", "cve_id": "CVE-2022-24429", "title": "CVE-2022-24429", "source": "cvefixes", "timestamp": "2022-06-10", "split": "val"} +{"id": "084770ecd6343f4f16b5", "text": "CVE: CVE-2022-0638\n\n[{'lang': 'en', 'value': 'Cross-Site Request Forgery (CSRF) in Packagist microweber/microweber prior to 1.2.11.'}]\n\nFix commit: Update UserLogoutController.php", "cve_id": "CVE-2022-0638", "title": "CVE-2022-0638", "source": "cvefixes", "timestamp": "2022-02-17", "split": "val"} +{"id": "912c6954fe7f4b5ff253", "text": "CVE: CVE-2022-2036\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository francoisjacquet/rosariosis prior to 9.0.1.'}]\n\nFix commit: Fix stored XSS security issue: decode HTML entities from URL", "cve_id": "CVE-2022-2036", "title": "CVE-2022-2036", "source": "cvefixes", "timestamp": "2022-06-09", "split": "val"} +{"id": "85382ab096ac9da6f93b", "text": "CVE: CVE-2022-24822\n\n[{'lang': 'en', 'value': 'Podium is a library for building micro frontends. @podium/layout is a module for building a Podium layout server, and @podium/proxy is a module for proxying HTTP requests from a layout server to a podlet server. In @podium/layout prior to version 4.6.110 and @podium/proxy prior to version 4.2.74, an attacker using the `Trailer` header as part of the request against proxy endpoints has the ability to take down the server. All Podium layouts that incl", "cve_id": "CVE-2022-24822", "title": "CVE-2022-24822", "source": "cvefixes", "timestamp": "2022-04-06", "split": "val"} +{"id": "9a5c1986de981987b10b", "text": "CVE: CVE-2022-35917\n\n[{'lang': 'en', 'value': 'Solana Pay is a protocol and set of reference implementations that enable developers to incorporate decentralized payments into their apps and services. When a Solana Pay transaction is located using a reference key, it may be checked to represent a transfer of the desired amount to the recipient, using the supplied `validateTransfer` function. An edge case regarding this mechanism could cause the validation logic to validate multiple transfers. Thi", "cve_id": "CVE-2022-35917", "title": "CVE-2022-35917", "source": "cvefixes", "timestamp": "2022-08-01", "split": "val"} +{"id": "73a00989d7ea30689a93", "text": "CVE: CVE-2022-22109\n\n[{'lang': 'en', 'value': 'In Daybyday CRM, version 2.2.0 is vulnerable to Stored Cross-Site Scripting (XSS) vulnerability that allows low privileged application users to store malicious scripts in the title field of new tasks. These scripts are executed in a victim’s browser when they open the “/tasks” page to view all the tasks.'}]\n\nFix commit: fix xss for tasks index", "cve_id": "CVE-2022-22109", "title": "CVE-2022-22109", "source": "cvefixes", "timestamp": "2022-01-05", "split": "val"} +{"id": "1eee67e56de96578b9f1", "text": "CVE: CVE-2022-2304\n\n[{'lang': 'en', 'value': 'Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.'}]\n\nFix commit: patch 9.0.0035: spell dump may go beyond end of an array\n\nProblem: Spell dump may go beyond end of an array.\nSolution: Limit the word length.", "cve_id": "CVE-2022-2304", "title": "CVE-2022-2304", "source": "cvefixes", "timestamp": "2022-07-05", "split": "val"} +{"id": "1d5a266de95cfc3cb337", "text": "CVE: CVE-2022-21227\n\n[{'lang': 'en', 'value': 'The package sqlite3 before 5.0.3 are vulnerable to Denial of Service (DoS) which will invoke the toString function of the passed parameter. If passed an invalid Function object it will throw and crash the V8 engine.'}]\n\nFix commit: bug: fix segfault of invalid toString() object (#1450)\n\n* bug: verify toString() returns valid data\r\n* test: faulty toString test", "cve_id": "CVE-2022-21227", "title": "CVE-2022-21227", "source": "cvefixes", "timestamp": "2022-05-01", "split": "val"} +{"id": "d486f1a59cdc400579de", "text": "CVE: CVE-2022-28055\n\n[{'lang': 'en', 'value': 'Fusionpbx v4.4 and below contains a command injection vulnerability via the download email logs function.'}]\n\nFix commit: Remove email_logs download. (#6331)\n\n* Remove email_logs download.\r\n\r\nThis feature has a security risk that is being eliminated by removing the download feature.\r\n\r\n* Update email_logs.php", "cve_id": "CVE-2022-28055", "title": "CVE-2022-28055", "source": "cvefixes", "timestamp": "2022-05-04", "split": "val"} +{"id": "f6a48158da19a92bcb7b", "text": "CVE: CVE-2022-31173\n\n[{'lang': 'en', 'value': 'Juniper is a GraphQL server library for Rust. Affected versions of Juniper are vulnerable to uncontrolled recursion resulting in a program crash. This issue has been addressed in version 0.15.10. Users are advised to upgrade. Users unable to upgrade should limit the recursion depth manually.'}]\n\nFix commit: Merge pull request from GHSA-4rx6-g5vg-5f3j\n\n* Replace recursions with heap allocations\n\n* Some corrections [skip ci]\n\n* Add recursive nested fr", "cve_id": "CVE-2022-31173", "title": "CVE-2022-31173", "source": "cvefixes", "timestamp": "2022-08-01", "split": "val"} +{"id": "f9a69bce3966344dda32", "text": "CVE: CVE-2022-0170\n\n[{'lang': 'en', 'value': 'peertube is vulnerable to Improper Access Control'}]\n\nFix commit: Don't display comments of private/internal videos", "cve_id": "CVE-2022-0170", "title": "CVE-2022-0170", "source": "cvefixes", "timestamp": "2022-01-11", "split": "val"} +{"id": "CVE-2023-21492", "text": "Samsung Mobile Devices Insertion of Sensitive Information Into Log File Vulnerability\n\nAffected: Samsung Mobile Devices\n\nSamsung mobile devices running Android 11, 12, and 13 contain an insertion of sensitive information into log file vulnerability that allows a privileged, local attacker to conduct an address space layout randomization (ASLR) bypass.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-532\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-21492", "title": "Samsung Mobile Devices Insertion of Sensitive Information Into Log File Vulnerability", "source": "cisa_kev", "timestamp": "2023-05-19", "split": "val"} +{"id": "CVE-2023-36851", "text": "Juniper Junos OS SRX Series Missing Authentication for Critical Function Vulnerability\n\nAffected: Juniper Junos OS\n\nJuniper Junos OS on SRX Series contains a missing authentication for critical function vulnerability that allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity. With a specific request to webauth_operation.php that doesn't require authentication, an attacker is able to upload arbitrary files via J-Web, leading to a loss of integrity", "cve_id": "CVE-2023-36851", "title": "Juniper Junos OS SRX Series Missing Authentication for Critical Function Vulnerability", "source": "cisa_kev", "timestamp": "2023-11-13", "split": "val"} +{"id": "341e7d5d3fc127d901cc", "text": "CVE: CVE-2022-2016\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Reflected in GitHub repository neorazorx/facturascripts prior to 2022.1.'}]\n\nFix commit: Escaped the html of the balance fields before any other tests. Also added the corresponding unit test.\n------\nEscapado el html de los campos del balance antes de cualquier otro test. Añadido también el correspondiente test unitario.", "cve_id": "CVE-2022-2016", "title": "CVE-2022-2016", "source": "cvefixes", "timestamp": "2022-06-09", "split": "val"} +{"id": "ca38591c1ab7d7a9e55f", "text": "CVE: CVE-2022-24773\n\n[{'lang': 'en', 'value': 'Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. Prior to version 1.3.0, RSA PKCS#1 v1.5 signature verification code does not properly check `DigestInfo` for a proper ASN.1 structure. This can lead to successful verification with signatures that contain invalid structures but a valid digest. The issue has been addressed in `node-forge` version 1.3.0. There are currently no known workarounds.'}]", "cve_id": "CVE-2022-24773", "title": "CVE-2022-24773", "source": "cvefixes", "timestamp": "2022-03-18", "split": "val"} +{"id": "641357ee0426d52e2a98", "text": "CVE: CVE-2022-0512\n\n[{'lang': 'en', 'value': 'Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.6.'}]\n\nFix commit: [fix] Correctly handle userinfo containing the at sign", "cve_id": "CVE-2022-0512", "title": "CVE-2022-0512", "source": "cvefixes", "timestamp": "2022-02-14", "split": "val"} +{"id": "f3c9136ecea1c049437f", "text": "CVE: CVE-2022-32414\n\n[{'lang': 'en', 'value': 'Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_vmcode_interpreter at src/njs_vmcode.c.'}]\n\nFix commit: Fixed aggregation methods of Promise ctor with array-like object.\n\nPreviously, while iterating over an array-like object the methods may be\nresolved with INVALID values. INVALID value is a special internal type which\nshould never be visible by ordinary functions.\n\nThe fix is to ensure that absent elements ar", "cve_id": "CVE-2022-32414", "title": "CVE-2022-32414", "source": "cvefixes", "timestamp": "2022-06-21", "split": "val"} +{"id": "b1be894881b10f74f2d6", "text": "CVE: CVE-2022-25898\n\n[{'lang': 'en', 'value': 'The package jsrsasign before 10.5.25 are vulnerable to Improper Verification of Cryptographic Signature when JWS or JWT signature with non Base64URL encoding special characters or number escaped characters may be validated as valid by mistake. Workaround: Validate JWS or JWT signature if it has Base64URL and dot safe string before executing JWS.verify() or JWS.verifyJWT() method.'}]\n\nFix commit: CVE-2022-25898 Security fix in JWS and JWT validation", "cve_id": "CVE-2022-25898", "title": "CVE-2022-25898", "source": "cvefixes", "timestamp": "2022-07-01", "split": "val"} +{"id": "10f36ae14cb89e66e2aa", "text": "CVE: CVE-2022-29210\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. In version 2.8.0, the `TensorKey` hash function used total estimated `AllocatedBytes()`, which (a) is an estimate per tensor, and (b) is a very poor hash function for constants (e.g. `int32_t`). It also tried to access individual tensor bytes through `tensor.data()` of size `AllocatedBytes()`. This led to ASAN failures because the `AllocatedBytes()` is an estimate of total bytes allocated b", "cve_id": "CVE-2022-29210", "title": "CVE-2022-29210", "source": "cvefixes", "timestamp": "2022-05-21", "split": "val"} +{"id": "23b68b69bc9cf7fde6d5", "text": "CVE: CVE-2022-2014\n\n[{'lang': 'en', 'value': 'Code Injection in GitHub repository jgraph/drawio prior to 19.0.2.'}]\n\nFix commit: 19.0.2 release", "cve_id": "CVE-2022-2014", "title": "CVE-2022-2014", "source": "cvefixes", "timestamp": "2022-06-09", "split": "val"} +{"id": "5cff1538fd9d3658b917", "text": "CVE: CVE-2022-31121\n\n[{'lang': 'en', 'value': 'Hyperledger Fabric is a permissioned distributed ledger framework. In affected versions if a consensus client sends a malformed consensus request to an orderer it may crash the orderer node. A fix has been added in commit 0f1835949 which checks for missing consensus messages and returns an error to the consensus client should the message be missing. Users are advised to upgrade to versions 2.2.7 or v2.4.5. There are no known workarounds for this iss", "cve_id": "CVE-2022-31121", "title": "CVE-2022-31121", "source": "cvefixes", "timestamp": "2022-07-07", "split": "val"} +{"id": "df1a6dce44b89c6ee4d6", "text": "CVE: CVE-2022-29220\n\n[{'lang': 'en', 'value': 'github-action-merge-dependabot is an action that automatically approves and merges dependabot pull requests (PRs). Prior to version 3.2.0, github-action-merge-dependabot does not check if a commit created by dependabot is verified with the proper GPG key. There is just a check if the actor is set to `dependabot[bot]` to determine if the PR is a legit PR. Theoretically, an owner of a seemingly valid and legit action in the pipeline can check if the P", "cve_id": "CVE-2022-29220", "title": "CVE-2022-29220", "source": "cvefixes", "timestamp": "2022-05-31", "split": "val"} +{"id": "44a8ecaa2759f04b995f", "text": "CVE: CVE-2022-29256\n\n[{'lang': 'en', 'value': 'sharp is an application for Node.js image processing. Prior to version 0.30.5, there is a possible vulnerability in logic that is run only at `npm install` time when installing versions of `sharp` prior to the latest v0.30.5. If an attacker has the ability to set the value of the `PKG_CONFIG_PATH` environment variable in a build environment then they might be able to use this to inject an arbitrary command at `npm install` time. This is not part of", "cve_id": "CVE-2022-29256", "title": "CVE-2022-29256", "source": "cvefixes", "timestamp": "2022-05-25", "split": "val"} +{"id": "5cb1a7a3d87e685441b1", "text": "CVE: CVE-2022-27244\n\n[{'lang': 'en', 'value': 'An issue was discovered in MISP before 2.4.156. A malicious site administrator could store an XSS payload in the custom auth name. This would be executed each time the administrator modifies a user.'}]\n\nFix commit: fix: [security] stored XSS in the user add/edit forms\n\n- a malicious site administrator could store an XSS payload in the custom auth name which would be executed each time the administrator modifies a user\n\n- as reported by Ianis BERNARD", "cve_id": "CVE-2022-27244", "title": "CVE-2022-27244", "source": "cvefixes", "timestamp": "2022-03-18", "split": "val"} +{"id": "75beb9b7434366dcb8af", "text": "[Deserialization of Untrusted Data] CVE-2023-40195: Apache Airflow Spark Provider Deserialization Vulnerability RCE\n\nApache Airflow Spark Provider. After the malicious Spark server address is configured through the connections of the Airflow UI interface, attackers exploit malicious servers to manipulate pyspark clients through malicious deserialization data. So as to implement RCE attack on airflow server.\n\n##Vulnerability principle:\n\n1. Analyze spark principle: Spark protocol is based on RPC c", "cve_id": "CVE-2023-40195", "title": "CVE-2023-40195: Apache Airflow Spark Provider Deserialization Vulnerability RCE (Deserialization of Untrusted Data)", "source": "hackerone", "timestamp": "2023-09-08", "split": "val"} +{"id": "fda5f687db6fadfba6cd", "text": "CVE: CVE-2022-0729\n\n[{'lang': 'en', 'value': 'Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4440.'}]\n\nFix commit: patch 8.2.4440: crash with specific regexp pattern and string\n\nProblem: Crash with specific regexp pattern and string.\nSolution: Stop at the start of the string.", "cve_id": "CVE-2022-0729", "title": "CVE-2022-0729", "source": "cvefixes", "timestamp": "2022-02-23", "split": "val"} +{"id": "CVE-2022-3723", "text": "Google Chromium V8 Type Confusion Vulnerability\n\nAffected: Google Chromium V8\n\nGoogle Chromium V8 Engine contains a type confusion vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-122, CWE-843\n\n[Source: CISA Known Exploit", "cve_id": "CVE-2022-3723", "title": "Google Chromium V8 Type Confusion Vulnerability", "source": "cisa_kev", "timestamp": "2022-10-28", "split": "val"} +{"id": "a7de5450be6aabec6249", "text": "CVE: CVE-2022-0937\n\n[{'lang': 'en', 'value': 'Stored xss in showdoc through file upload in GitHub repository star7th/showdoc prior to 2.10.4.'}]\n\nFix commit: file upload bug", "cve_id": "CVE-2022-0937", "title": "CVE-2022-0937", "source": "cvefixes", "timestamp": "2022-03-14", "split": "val"} +{"id": "c59f987106fc6f0b945f", "text": "CVE: CVE-2022-34035\n\n[{'lang': 'en', 'value': 'HTMLDoc v1.9.12 and below was discovered to contain a heap overflow via e_node htmldoc/htmldoc/html.cxx:588.'}]\n\nFix commit: Fix a crash bug with bogus text (Issue #426)", "cve_id": "CVE-2022-34035", "title": "CVE-2022-34035", "source": "cvefixes", "timestamp": "2022-07-18", "split": "val"} +{"id": "116e03a05334ee8d0287", "text": "CVE: CVE-2022-0629\n\n[{'lang': 'en', 'value': 'Stack-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.4397: crash when using many composing characters in error message\n\nProblem: Crash when using many composing characters in error message.\nSolution: Use mb_cptr2char_adv() instead of mb_ptr2char_adv().", "cve_id": "CVE-2022-0629", "title": "CVE-2022-0629", "source": "cvefixes", "timestamp": "2022-02-17", "split": "val"} +{"id": "3612285dfde643c3ac8c", "text": "CVE: CVE-2022-29174\n\n[{'lang': 'en', 'value': 'countly-server is the server-side part of Countly, a product analytics solution. Prior to versions 22.03.7 and 21.11.4, a malicious actor who knows an account email address/username and full name specified in the database is capable of guessing the password reset token. The actor may use this information to reset the password and take over the account. The problem has been patched in Countly Server version 22.03.7 for servers using the new user inte", "cve_id": "CVE-2022-29174", "title": "CVE-2022-29174", "source": "cvefixes", "timestamp": "2022-05-17", "split": "val"} +{"id": "904aba0e52b5f3bf0ca8", "text": "CVE: CVE-2022-21716\n\n[{'lang': 'en', 'value': \"Twisted is an event-based framework for internet applications, supporting Python 3.6+. Prior to 22.2.0, Twisted SSH client and server implement is able to accept an infinite amount of data for the peer's SSH version identifier. This ends up with a buffer using all the available memory. The attach is a simple as `nc -rv localhost 22 < /dev/zero`. A patch is available in version 22.2.0. There are currently no known workarounds.\"}]\n\nFix commit: Update", "cve_id": "CVE-2022-21716", "title": "CVE-2022-21716", "source": "cvefixes", "timestamp": "2022-03-03", "split": "val"} +{"id": "64193d3a5217fed80880", "text": "[Business Logic Errors] CVE-2023-23915: HSTS amnesia with --parallel\n\ncurl's HSTS cache saving behaves wrongly when multiple URLs are requested in parallel.\n\nUsing its HSTS support, curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the URL. This HSTS mechanism would however surprisingly fail when multiple transfers are done in parallel as the HSTS cache file gets overwritten by the most recently completed transfer.\n\nA later HTTP-o", "cve_id": "CVE-2023-23915", "title": "CVE-2023-23915: HSTS amnesia with --parallel (Business Logic Errors)", "source": "hackerone", "timestamp": "2023-02-24", "split": "val"} +{"id": "CVE-2022-42475", "text": "Fortinet FortiOS Heap-Based Buffer Overflow Vulnerability\n\nAffected: Fortinet FortiOS\n\nMultiple versions of Fortinet FortiOS SSL-VPN contain a heap-based buffer overflow vulnerability which can allow an unauthenticated, remote attacker to execute arbitrary code or commands via specifically crafted requests.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-197\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-42475", "title": "Fortinet FortiOS Heap-Based Buffer Overflow Vulnerability", "source": "cisa_kev", "timestamp": "2022-12-13", "split": "val"} +{"id": "2d46ff91ea3d2b11b3a5", "text": "CVE: CVE-2022-24738\n\n[{'lang': 'en', 'value': 'Evmos is the Ethereum Virtual Machine (EVM) Hub on the Cosmos Network. In versions of evmos prior to 2.0.1 attackers are able to drain unclaimed funds from user addresses. To do this an attacker must create a new chain which does not enforce signature verification and connects it to the target evmos instance. The attacker can use this joined chain to transfer unclaimed funds. Users are advised to upgrade. There are no known workarounds for this issu", "cve_id": "CVE-2022-24738", "title": "CVE-2022-24738", "source": "cvefixes", "timestamp": "2022-03-07", "split": "val"} +{"id": "067ba8372f75dad8e8e7", "text": "[Uncontrolled Resource Consumption] [CVE-2022-44570] Possible Denial of Service Vulnerability in Rack’s Range header parsing\n\nI made a report and patch at https://hackerone.com/reports/1668717.\n\nhttps://discuss.rubyonrails.org/t/cve-2022-44570-possible-denial-of-service-vulnerability-in-racks-range-header-parsing/82125\n> There is a possible denial of service vulnerability in the Range header parsing component of Rack. This vulnerability has been assigned the CVE identifier CVE-2022-44570.\n>Caref", "cve_id": "CVE-2022-44570", "title": "[CVE-2022-44570] Possible Denial of Service Vulnerability in Rack’s Range header parsing (Uncontrolled Resource Consumption)", "source": "hackerone", "timestamp": "2023-07-27", "split": "val"} +{"id": "6ecce40f300f72a5d866", "text": "CVE: CVE-2022-24796\n\n[{'lang': 'en', 'value': 'RaspberryMatic is a free and open-source operating system for running a cloud-free smart-home using the homematicIP / HomeMatic hardware line of IoT devices. A Remote Code Execution (RCE) vulnerability in the file upload facility of the WebUI interface of RaspberryMatic exists. Missing input validation/sanitization in the file upload mechanism allows remote, unauthenticated attackers with network access to the WebUI interface to achieve arbitrary op", "cve_id": "CVE-2022-24796", "title": "CVE-2022-24796", "source": "cvefixes", "timestamp": "2022-03-31", "split": "val"} +{"id": "c7f56f8f40ac8ee5f6a1", "text": "CVE: CVE-2022-0085\n\n[{'lang': 'en', 'value': 'Server-Side Request Forgery (SSRF) in GitHub repository dompdf/dompdf prior to 2.0.0.'}]\n\nFix commit: Add a default context\n\n- creates a user agent\n- disables following redirects", "cve_id": "CVE-2022-0085", "title": "CVE-2022-0085", "source": "cvefixes", "timestamp": "2022-06-28", "split": "val"} +{"id": "b880f08760df55ab6e1b", "text": "CVE: CVE-2022-0224\n\n[{'lang': 'en', 'value': 'dolibarr is vulnerable to Improper Neutralization of Special Elements used in an SQL Command'}]\n\nFix commit: Fix #hunterf1d1ce3e-ca92-4c7b-b1b8-934e28eaa486\n\nConflicts:\n\ttest/phpunit/CodingPhpTest.php", "cve_id": "CVE-2022-0224", "title": "CVE-2022-0224", "source": "cvefixes", "timestamp": "2022-01-14", "split": "val"} +{"id": "7812541987d5a23df8d2", "text": "[Improper Input Validation] CVE-2022-35252: control code in cookie denial of service\n\n## Summary:\nI took a look at https://github.com/curl/curl/pull/9048/commits/d7bcbc7d8d4b6d972d3da12d54819169a19c287b (a sneak peek on a vulnerability to be announced tomorrow). My guess for that vulnerability is that since cookies are persistent, someone who can trick curl into storing cookies can store large amounts of cookies into curl cookie store, which will prevent curl from ever interacting with the serve", "cve_id": "CVE-2022-35252", "title": "CVE-2022-35252: control code in cookie denial of service (Improper Input Validation)", "source": "hackerone", "timestamp": "2022-08-31", "split": "val"} +{"id": "f3c754dee045d8c8fb65", "text": "CVE: CVE-2022-1934\n\n[{'lang': 'en', 'value': 'Use After Free in GitHub repository mruby/mruby prior to 3.2.'}]\n\nFix commit: vm.c (hash_new_from_regs): stack may be reallocated.", "cve_id": "CVE-2022-1934", "title": "CVE-2022-1934", "source": "cvefixes", "timestamp": "2022-05-31", "split": "val"} +{"id": "c5310572d0c2bcab7164", "text": "CVE: CVE-2022-2494\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository openemr/openemr prior to 7.0.0.'}]\n\nFix commit: bug fix d (#5368)", "cve_id": "CVE-2022-2494", "title": "CVE-2022-2494", "source": "cvefixes", "timestamp": "2022-07-22", "split": "val"} +{"id": "cb3eebc627c0852a93b1", "text": "CVE: CVE-2022-2824\n\n[{'lang': 'en', 'value': 'Improper Access Control in GitHub repository openemr/openemr prior to 7.0.0.1.'}]\n\nFix commit: bug fix and php8.1 fixes (#5664)\n\n* bug fix and php8.1 fixes\r\n\r\n* styling", "cve_id": "CVE-2022-2824", "title": "CVE-2022-2824", "source": "cvefixes", "timestamp": "2022-08-15", "split": "val"} +{"id": "6719bbf058f65a0291b6", "text": "CVE: CVE-2022-24884\n\n[{'lang': 'en', 'value': 'ecdsautils is a tiny collection of programs used for ECDSA (keygen, sign, verify). `ecdsa_verify_[prepare_]legacy()` does not check whether the signature values `r` and `s` are non-zero. A signature consisting only of zeroes is always considered valid, making it trivial to forge signatures. Requiring multiple signatures from different public keys does not mitigate the issue: `ecdsa_verify_list_legacy()` will accept an arbitrary number of such forged", "cve_id": "CVE-2022-24884", "title": "CVE-2022-24884", "source": "cvefixes", "timestamp": "2022-05-06", "split": "val"} +{"id": "CVE-2023-20118", "text": "Cisco Small Business RV Series Routers Command Injection Vulnerability\n\nAffected: Cisco Small Business RV Series Routers\n\nMultiple Cisco Small Business RV Series Routers contains a command injection vulnerability in the web-based management interface. Successful exploitation could allow an authenticated, remote attacker to gain root-level privileges and access unauthorized data.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services,", "cve_id": "CVE-2023-20118", "title": "Cisco Small Business RV Series Routers Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2025-03-03", "split": "val"} +{"id": "d8c89976e833ca1fe231", "text": "[Command Injection - Generic] CVE-2022-38362: Apache Airflow Docker Provider <3.0 RCE vulnerability in example dag\n\nApache Airflow Docker's Provider shipped with an example DAG that was vulnerable to (authenticated) remote code exploit of code on the Airflow worker host.\n\n##Vulnerability summary:\nIn DAG script of airflow 2.3.3, there is a command injection vulnerability (RCE) in the script (example_docker_copy_data.py of docker provider), which can obtain the permission of the operating system.", "cve_id": "CVE-2022-38362", "title": "CVE-2022-38362: Apache Airflow Docker Provider <3.0 RCE vulnerability in example dag (Command Injection - Generic)", "source": "hackerone", "timestamp": "2022-09-23", "split": "val"} +{"id": "CVE-2022-24682", "text": "Synacor Zimbra Collaborate Suite (ZCS) Cross-Site Scripting Vulnerability\n\nAffected: Synacor Zimbra Collaborate Suite (ZCS)\n\nSynacor Zimbra Collaboration Suite (ZCS) contains a cross-site scripting (XSS) vulnerability in the Calendar feature that allows an attacker to execute arbitrary code.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-79, CWE-116\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-24682", "title": "Synacor Zimbra Collaborate Suite (ZCS) Cross-Site Scripting Vulnerability", "source": "cisa_kev", "timestamp": "2022-02-25", "split": "val"} +{"id": "63ee3b7adf940d111e7e", "text": "CVE: CVE-2022-2959\n\n[{'lang': 'en', 'value': \"A race condition was found in the Linux kernel's watch queue due to a missing lock in pipe_resize_ring(). The specific flaw exists within the handling of pipe buffers. The issue results from the lack of proper locking when performing operations on an object. This flaw allows a local user to crash the system or escalate their privileges on the system.\"}]\n\nFix commit: pipe: Fix missing lock in pipe_resize_ring()\n\npipe_resize_ring() needs to take the pi", "cve_id": "CVE-2022-2959", "title": "CVE-2022-2959", "source": "cvefixes", "timestamp": "2022-08-25", "split": "val"} +{"id": "5831c7fa5e4e4d19e645", "text": "CVE: CVE-2022-28946\n\n[{'lang': 'en', 'value': 'An issue in the component ast/parser.go of Open Policy Agent v0.39.0 causes the application to incorrectly interpret every expression, causing a Denial of Service (DoS) via triggering out-of-range memory access.'}]\n\nFix commit: ast/parser: guard against invalid domains for \"some\" and \"every\" (#4548)\n\nThese would cause a runtime exception when attempting to parse\r\n\r\n some internal.member_2()\r\n\r\nThis is due to a technicality in how\r\n\r\n some x in", "cve_id": "CVE-2022-28946", "title": "CVE-2022-28946", "source": "cvefixes", "timestamp": "2022-05-19", "split": "val"} +{"id": "4f43cb327ee0cd705917", "text": "CVE: CVE-2022-23578\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. If a graph node is invalid, TensorFlow can leak memory in the implementation of `ImmutableExecutorState::Initialize`. Here, we set `item->kernel` to `nullptr` but it is a simple `OpKernel*` pointer so the memory that was previously allocated to it would leak. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow", "cve_id": "CVE-2022-23578", "title": "CVE-2022-23578", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val"} +{"id": "dfd8009c4106b6d494ec", "text": "CVE: CVE-2022-25907\n\n[{'lang': 'en', 'value': 'The package ts-deepmerge before 2.0.2 are vulnerable to Prototype Pollution due to missing sanitization of the merge function.'}]\n\nFix commit: prevent against prototype pollution", "cve_id": "CVE-2022-25907", "title": "CVE-2022-25907", "source": "cvefixes", "timestamp": "2022-08-09", "split": "val"} +{"id": "759a8ce2afcd0deb0a12", "text": "CVE: CVE-2022-31001\n\n[{'lang': 'en', 'value': 'Sofia-SIP is an open-source Session Initiation Protocol (SIP) User-Agent library. Prior to version 1.13.8, an attacker can send a message with evil sdp to FreeSWITCH, which may cause crash. This type of crash may be caused by `#define MATCH(s, m) (strncmp(s, m, n = sizeof(m) - 1) == 0)`, which will make `n` bigger and trigger out-of-bound access when `IS_NON_WS(s[n])`. Version 1.13.8 contains a patch for this issue.'}]\n\nFix commit: Merge pull reques", "cve_id": "CVE-2022-31001", "title": "CVE-2022-31001", "source": "cvefixes", "timestamp": "2022-05-31", "split": "val"} +{"id": "c1271947493c19316946", "text": "CVE: CVE-2022-0880\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository star7th/showdoc prior to 2.10.2.'}]\n\nFix commit: file upload bug", "cve_id": "CVE-2022-0880", "title": "CVE-2022-0880", "source": "cvefixes", "timestamp": "2022-03-12", "split": "val"} +{"id": "727b9f0297786aa4c28f", "text": "CVE: CVE-2022-0251\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.2.10.'}]\n\nFix commit: disallow html entity names on import - follow up to #11217", "cve_id": "CVE-2022-0251", "title": "CVE-2022-0251", "source": "cvefixes", "timestamp": "2022-01-26", "split": "val"} +{"id": "CVE-2023-20867", "text": "VMware Tools Authentication Bypass Vulnerability\n\nAffected: VMware Tools\n\nVMware Tools contains an authentication bypass vulnerability in the vgauth module. A fully compromised ESXi host can force VMware Tools to fail to authenticate host-to-guest operations, impacting the confidentiality and integrity of the guest virtual machine. An attacker must have root access over ESXi to exploit this vulnerability.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-287\n\n[Source: CISA Kn", "cve_id": "CVE-2023-20867", "title": "VMware Tools Authentication Bypass Vulnerability", "source": "cisa_kev", "timestamp": "2023-06-23", "split": "val"} +{"id": "87c111a59f588d33f139", "text": "CVE: CVE-2022-1163\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository mineweb/minewebcms prior to next.'}]\n\nFix commit: improv. fix xss with navbar", "cve_id": "CVE-2022-1163", "title": "CVE-2022-1163", "source": "cvefixes", "timestamp": "2022-03-30", "split": "val"} +{"id": "acd04f45d9a02b0b3a3f", "text": "CVE: CVE-2022-23602\n\n[{'lang': 'en', 'value': 'Nimforum is a lightweight alternative to Discourse written in Nim. In versions prior to 2.2.0 any forum user can create a new thread/post with an include referencing a file local to the host operating system. Nimforum will render the file if able. This can also be done silently by using NimForum\\'s post \"preview\" endpoint. Even if NimForum is running as a non-critical user, the forum.json secrets can be stolen. Version 2.2.0 of NimForum includes pat", "cve_id": "CVE-2022-23602", "title": "CVE-2022-23602", "source": "cvefixes", "timestamp": "2022-02-01", "split": "val"} +{"id": "e607b04c2141b0e51db5", "text": "CVE: CVE-2022-0832\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.3.3.'}]\n\nFix commit: escaping fields in SERP preview", "cve_id": "CVE-2022-0832", "title": "CVE-2022-0832", "source": "cvefixes", "timestamp": "2022-03-04", "split": "val"} +{"id": "ec371877fb728887f1d3", "text": "CVE: CVE-2022-1430\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - DOM in GitHub repository octoprint/octoprint prior to 1.8.0.'}]\n\nFix commit: 🔒️ Sanitize and validate login redirect\n\nFixes an XSS and an open redirect issue.", "cve_id": "CVE-2022-1430", "title": "CVE-2022-1430", "source": "cvefixes", "timestamp": "2022-05-18", "split": "val"} +{"id": "7c72b0a61caa5c1ddf4e", "text": "[Improper Input Validation] CVE-2022-35252: control code in cookie denial of service\n\nhttps://hackerone.com/reports/1613943\n\n## Impact\n\ncontrol code in cookie denial of service", "cve_id": "CVE-2022-35252", "title": "CVE-2022-35252: control code in cookie denial of service (Improper Input Validation)", "source": "hackerone", "timestamp": "2022-11-05", "split": "val"} +{"id": "d025c437e87ab3039ea6", "text": "CVE: CVE-2022-1379\n\n[{'lang': 'en', 'value': 'URL Restriction Bypass in GitHub repository plantuml/plantuml prior to V1.2022.5. An attacker can abuse this to bypass URL restrictions that are imposed by the different security profiles and achieve server side request forgery (SSRF). This allows accessing restricted internal resources/servers or sending requests to third party servers.'}]\n\nFix commit: Import version 1.2022.5", "cve_id": "CVE-2022-1379", "title": "CVE-2022-1379", "source": "cvefixes", "timestamp": "2022-05-14", "split": "val"} +{"id": "4fd4cad8d1509f99def6", "text": "CVE: CVE-2022-2495\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository microweber/microweber prior to 1.2.21.'}]\n\nFix commit: update", "cve_id": "CVE-2022-2495", "title": "CVE-2022-2495", "source": "cvefixes", "timestamp": "2022-07-22", "split": "val"} +{"id": "efc7ab2184c16deb14aa", "text": "CVE: CVE-2022-23082\n\n[{'lang': 'en', 'value': 'In CureKit versions v1.0.1 through v1.1.3 are vulnerable to path traversal as the function isFileOutsideDir fails to sanitize the user input which may lead to path traversal.'}]\n\nFix commit: Merge pull request from GHSA-fvf5-grm7-538p\n\nCureKit-ghsa-fvf5-grm7-538p adding trailing separator to base dir if …", "cve_id": "CVE-2022-23082", "title": "CVE-2022-23082", "source": "cvefixes", "timestamp": "2022-05-31", "split": "val"} +{"id": "e847354cd2dc4adee27d", "text": "[Code Injection] The `io.kubernetes.client.util.generic.dynamic.Dynamics` contains a code execution vulnerability due to SnakeYAML\n\n## Summary:\n\nIf the `io.kubernetes.client.util.generic.dynamic.Dynamics` is used to deserialize a `DynamicKubernetesObject `from untrusted YAML, an attacker can achieve code execution inside of the JVM.\n\nSince this is a part of the public API, down stream consumers can be using this API in a way that leaves them vulnerable. I have found no users of this class on Git", "cve_id": "CVE-2022-1471", "title": "The `io.kubernetes.client.util.generic.dynamic.Dynamics` contains a code execution vulnerability due to SnakeYAML (Code Injection)", "source": "hackerone", "timestamp": "2023-04-25", "split": "val"} +{"id": "08954ddb6d8f82bb4fb8", "text": "[Cleartext Transmission of Sensitive Information] CVE-2022-42916: HSTS bypass via IDN\n\n## Summary:\nHSTS checks are bypassed if any character in the IDN convert(Nameprep) to a '.'\nfor example\"。\"(UTF-8:E38082).\nI think there are other characters that become \".(UTF-8:2E)\" as a result of converting with IDN.\n\n'。(UTF-8:E38082)' is converted to '.' so it doesn't matter if it's last or not.\nSo the same thing happens with \"http://accounts.google.com。\" as well as \"http://accounts.google。com\".\n\n## Steps T", "cve_id": "CVE-2022-42916", "title": "CVE-2022-42916: HSTS bypass via IDN (Cleartext Transmission of Sensitive Information)", "source": "hackerone", "timestamp": "2022-10-27", "split": "val"} +{"id": "02c5e9e7a8855cd59cd2", "text": "[Server-Side Request Forgery (SSRF)] mail.acronis.com is vulnerable to zero day vulnerability CVE-2022-41040\n\nHello Acronis team,\n\nPlease run\n\ncurl -ksL -m5 -o /dev/null -I -w \"%{http_code}\" \"https://mail.acronis.com/autodiscover/autodiscover.json?Email=autodiscover/autodiscover.json@outlook.com&Protocol=ActiveSync\"\ncurl -ksL -m5 \"https://mail.acronis.com/autodiscover/autodiscover.json?Email=autodiscover/autodiscover.json@outlook.com&Protocol=ActiveSync\" | grep Protocol\n\n\nand get following outp", "cve_id": "CVE-2022-41040", "title": "mail.acronis.com is vulnerable to zero day vulnerability CVE-2022-41040 (Server-Side Request Forgery (SSRF))", "source": "hackerone", "timestamp": "2022-10-13", "split": "val"} +{"id": "bddf25519abb854daa5b", "text": "[Improper Input Validation] CVE-2022-27780: percent-encoded path separator in URL host\n\nAdvisory: https://curl.se/docs/CVE-2022-27780.html\n\nOriginal Report: https://hackerone.com/reports/1553841\n\n## Impact\n\nURL filter bypasses", "cve_id": "CVE-2022-27780", "title": "CVE-2022-27780: percent-encoded path separator in URL host (Improper Input Validation)", "source": "hackerone", "timestamp": "2022-06-11", "split": "val"} +{"id": "49c573c5d53bda3b1ac0", "text": "CVE: CVE-2022-0528\n\n[{'lang': 'en', 'value': 'Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository transloadit/uppy prior to 3.3.1.'}]\n\nFix commit: replace debug\n\nremove debug flag\ninstead add allowLocalUrls (COMPANION_ALLOW_LOCAL_URLS)\nwhich defaults to false\nthis fixes https://huntr.dev/bounties/8b060cc3-2420-468e-8293-b9216620175b/\n\nalso don't allow localhost for any providers getURLMeta", "cve_id": "CVE-2022-0528", "title": "CVE-2022-0528", "source": "cvefixes", "timestamp": "2022-03-03", "split": "val"} +{"id": "CVE-2022-29303", "text": "SolarView Compact Command Injection Vulnerability\n\nAffected: SolarView Compact\n\nSolarView Compact contains a command injection vulnerability due to improper validation of input values on the send test mail console of the product's web server.\n\nRequired Action: Apply updates per vendor instructions or discontinue use of the product if updates are unavailable.\n\nCWE(s): CWE-78\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-29303", "title": "SolarView Compact Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2023-07-13", "split": "val"} +{"id": "7254be1c24e89bae5c13", "text": "CVE: CVE-2022-2124\n\n[{'lang': 'en', 'value': 'Buffer Over-read in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.5120: searching for quotes may go over the end of the line\n\nProblem: Searching for quotes may go over the end of the line.\nSolution: Check for running into the NUL.", "cve_id": "CVE-2022-2124", "title": "CVE-2022-2124", "source": "cvefixes", "timestamp": "2022-06-19", "split": "val"} +{"id": "bbbae09b015d06fe17d0", "text": "CVE: CVE-2022-33146\n\n[{'lang': 'en', 'value': 'Open redirect vulnerability in web2py versions prior to 2.22.5 allows a remote attacker to redirect a user to an arbitrary web site and conduct a phishing attack by having a user to access a specially crafted URL.'}]\n\nFix commit: added validation of send attribute in admin", "cve_id": "CVE-2022-33146", "title": "CVE-2022-33146", "source": "cvefixes", "timestamp": "2022-06-27", "split": "val"} +{"id": "defa3d87b4c637005d33", "text": "CVE: CVE-2022-1504\n\n[{'lang': 'en', 'value': 'XSS in /demo/module/?module=HERE in GitHub repository microweber/microweber prior to 1.2.15. Typical impact of XSS attacks.'}]\n\nFix commit: update", "cve_id": "CVE-2022-1504", "title": "CVE-2022-1504", "source": "cvefixes", "timestamp": "2022-04-27", "split": "val"} +{"id": "CVE-2023-4762", "text": "Google Chromium V8 Type Confusion Vulnerability\n\nAffected: Google Chromium V8\n\nGoogle Chromium V8 contains a type confusion vulnerability that allows a remote attacker to execute code via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-84", "cve_id": "CVE-2023-4762", "title": "Google Chromium V8 Type Confusion Vulnerability", "source": "cisa_kev", "timestamp": "2024-02-06", "split": "val"} +{"id": "b49bca84b6b33c725ec1", "text": "CVE: CVE-2022-29788\n\n[{'lang': 'en', 'value': 'libmobi before v0.10 contains a NULL pointer dereference via the component mobi_buffer_getpointer. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted mobi file.'}]\n\nFix commit: Fix issue with corrupt files with tagvalues_count = 0 that caused null pointer dereference", "cve_id": "CVE-2022-29788", "title": "CVE-2022-29788", "source": "cvefixes", "timestamp": "2022-06-02", "split": "val"} +{"id": "7a672a245bef8abb3d4e", "text": "CVE: CVE-2022-0348\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in Packagist pimcore/pimcore prior to 10.2.'}]\n\nFix commit: added escape function to the icon field", "cve_id": "CVE-2022-0348", "title": "CVE-2022-0348", "source": "cvefixes", "timestamp": "2022-01-27", "split": "val"} +{"id": "96b54fd6a51dbd60a4b7", "text": "CVE: CVE-2022-23079\n\n[{'lang': 'en', 'value': 'In motor-admin versions 0.0.1 through 0.2.56 are vulnerable to host header injection in the password reset functionality where malicious actor can send fake password reset email to arbitrary victim.'}]\n\nFix commit: do not use request host in for devise", "cve_id": "CVE-2022-23079", "title": "CVE-2022-23079", "source": "cvefixes", "timestamp": "2022-06-22", "split": "val"} +{"id": "67a208ae5b1f11b4416a", "text": "CVE: CVE-2022-24861\n\n[{'lang': 'en', 'value': 'Databasir is a team-oriented relational database model document management platform. Databasir 1.01 has remote code execution vulnerability. JDBC drivers are not validated prior to use and may be provided by users of the system. This can lead to code execution by any basic user who has access to the system. Users are advised to upgrade. There are no known workarounds to this issue.'}]\n\nFix commit: fix some security bug (#103)\n\n* fix: use hard-code s", "cve_id": "CVE-2022-24861", "title": "CVE-2022-24861", "source": "cvefixes", "timestamp": "2022-04-20", "split": "val"} +{"id": "CVE-2023-38035", "text": "Ivanti Sentry Authentication Bypass Vulnerability\n\nAffected: Ivanti Sentry\n\nIvanti Sentry, formerly known as MobileIron Sentry, contains an authentication bypass vulnerability that may allow an attacker to bypass authentication controls on the administrative interface due to an insufficiently restrictive Apache HTTPD configuration.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-863\n\n[So", "cve_id": "CVE-2023-38035", "title": "Ivanti Sentry Authentication Bypass Vulnerability", "source": "cisa_kev", "timestamp": "2023-08-22", "split": "val"} +{"id": "CVE-2023-7101", "text": "Spreadsheet::ParseExcel Remote Code Execution Vulnerability\n\nAffected: Spreadsheet::ParseExcel Spreadsheet::ParseExcel\n\nSpreadsheet::ParseExcel contains a remote code execution vulnerability due to passing unvalidated input from a file into a string-type “eval”. Specifically, the issue stems from the evaluation of Number format strings within the Excel parsing logic.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE", "cve_id": "CVE-2023-7101", "title": "Spreadsheet::ParseExcel Remote Code Execution Vulnerability", "source": "cisa_kev", "timestamp": "2024-01-02", "split": "val"} +{"id": "def2c74a4626d9075702", "text": "CVE: CVE-2022-0961\n\n[{'lang': 'en', 'value': 'The microweber application allows large characters to insert in the input field \"post title\" which can allow attackers to cause a Denial of Service (DoS) via a crafted HTTP request. in GitHub repository microweber/microweber prior to 1.2.12.'}]\n\nFix commit: Update PostRequest.php", "cve_id": "CVE-2022-0961", "title": "CVE-2022-0961", "source": "cvefixes", "timestamp": "2022-03-15", "split": "val"} +{"id": "e3af071fafc50b56ff34", "text": "CVE: CVE-2022-24857\n\n[{'lang': 'en', 'value': \"django-mfa3 is a library that implements multi factor authentication for the django web framework. It achieves this by modifying the regular login view. Django however has a second login view for its admin area. This second login view was not modified, so the multi factor authentication can be bypassed. Users are affected if they have activated both django-mfa3 (< 0.5.0) and django.contrib.admin and have not taken any other measures to prevent users", "cve_id": "CVE-2022-24857", "title": "CVE-2022-24857", "source": "cvefixes", "timestamp": "2022-04-15", "split": "val"} +{"id": "CVE-2022-41091", "text": "Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Mark of the Web (MOTW) contains a security feature bypass vulnerability resulting in a limited loss of integrity and availability of security features.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-863\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-41091", "title": "Microsoft Windows Mark of the Web (MOTW) Security Feature Bypass Vulnerability", "source": "cisa_kev", "timestamp": "2022-11-08", "split": "val"} +{"id": "009996d50cb8b2144d18", "text": "CVE: CVE-2022-24876\n\n[{'lang': 'en', 'value': 'GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. Kanban is a GLPI view to display Projects, Tickets, Changes or Problems on a task board. In versions prior to 10.0.1 a user can exploit a cross site scripting vulnerability in Kanban by injecting HTML code in its user name. Users are advised to upgrade. There are no known workarounds for this issue.'}]\n\nFix comm", "cve_id": "CVE-2022-24876", "title": "CVE-2022-24876", "source": "cvefixes", "timestamp": "2022-06-09", "split": "val"} +{"id": "f22223c0cecc233d5b32", "text": "[Business Logic Errors] CVE-2022-32208: FTP-KRB bad message verification\n\n## Summary:\nlibcurl handles `gss_unwrap` `GSS_S_BAD_SIG` error incorrectly. This enables malicious attacker to inject arbitrary FTP server responses to GSSAPI protected FTP control connection and/or make the client consume unrelated heap memory as a FTP command response.\n\nThe defective `krb5_decode` function is as follows:\n ```\nstatic int\nkrb5_decode(void *app_data, void *buf, int len,\n int level UNUSED_PARAM,", "cve_id": "CVE-2022-32208", "title": "CVE-2022-32208: FTP-KRB bad message verification (Business Logic Errors)", "source": "hackerone", "timestamp": "2022-06-27", "split": "val"} +{"id": "5773d5c7b07071ce3b25", "text": "CVE: CVE-2022-0944\n\n[{'lang': 'en', 'value': 'Template injection in connection test endpoint leads to RCE in GitHub repository sqlpad/sqlpad prior to 6.10.1.'}]\n\nFix commit: Use mustache to process connection template (#1110)", "cve_id": "CVE-2022-0944", "title": "CVE-2022-0944", "source": "cvefixes", "timestamp": "2022-03-15", "split": "val"} +{"id": "93f5839934ae525b0140", "text": "CVE: CVE-2022-2946\n\n[{'lang': 'en', 'value': 'Use After Free in GitHub repository vim/vim prior to 9.0.0246.'}]\n\nFix commit: patch 9.0.0246: using freed memory when 'tagfunc' deletes the buffer\n\nProblem: Using freed memory when 'tagfunc' deletes the buffer.\nSolution: Make a copy of the tag name.", "cve_id": "CVE-2022-2946", "title": "CVE-2022-2946", "source": "cvefixes", "timestamp": "2022-08-23", "split": "val"} +{"id": "64ac7f2d164ba4f190ae", "text": "CVE: CVE-2022-1052\n\n[{'lang': 'en', 'value': 'Heap Buffer Overflow in iterate_chained_fixups in GitHub repository radareorg/radare2 prior to 5.6.6.'}]\n\nFix commit: Fix heap OOB read in macho.iterate_chained_fixups ##crash\n\n* Reported by peacock-doris via huntr.dev\r\n* Reproducer 'tests_65305'\r\n\r\nmrmacete:\r\n* Return early if segs_count is 0\r\n* Initialize segs_count also for reconstructed fixups\r\n\r\nCo-authored-by: pancake \r\nCo-authored-by: Francesco Tamagni ::Get in bitstream.hpp has an assertion failure that may cause denial of service. This is related to out-of-bounds array access during arithmetically coded lossless scan or arithmetically coded sequential scan.'}]\n\nFix commit: Added out-of-bounds checks for lossless symbol decoding and AC context\nindices. Worked around some gcc warnings. Bumped to 1.64.", "cve_id": "CVE-2022-31620", "title": "CVE-2022-31620", "source": "cvefixes", "timestamp": "2022-05-25", "split": "val"} +{"id": "680f41f829ff61822a05", "text": "CVE: CVE-2022-2218\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository ionicabizau/parse-url prior to 7.0.0.'}]\n\nFix commit: Refactor codebase, upgrade dependencies", "cve_id": "CVE-2022-2218", "title": "CVE-2022-2218", "source": "cvefixes", "timestamp": "2022-06-27", "split": "val"} +{"id": "0e56f1662672674094be", "text": "CVE: CVE-2022-1290\n\n[{'lang': 'en', 'value': 'Stored XSS in \"Name\", \"Group Name\" & \"Title\" in GitHub repository polonel/trudesk prior to v1.2.0. This allows attackers to execute malicious scripts in the user\\'s browser and it can lead to session hijacking, sensitive data exposure, and worse.'}]\n\nFix commit: chore(security): fix issue where html was allowed in some input fields", "cve_id": "CVE-2022-1290", "title": "CVE-2022-1290", "source": "cvefixes", "timestamp": "2022-04-10", "split": "val"} +{"id": "8567102bd13ee3dcfd1c", "text": "[HTTP Request Smuggling] CVE-2022-32213 - HTTP Request Smuggling Due to Flawed Parsing of Transfer-Encoding\n\nOriginal Report: https://hackerone.com/reports/1524555\n\n## Impact\n\nDepending on the specific web application, HRS can lead to cache poisoning, bypassing of security layers, stealing of credentials and so on.", "cve_id": "CVE-2022-32213", "title": "CVE-2022-32213 - HTTP Request Smuggling Due to Flawed Parsing of Transfer-Encoding (HTTP Request Smuggling)", "source": "hackerone", "timestamp": "2022-07-22", "split": "val"} +{"id": "bbe5c990749730672108", "text": "CVE: CVE-2022-24851\n\n[{'lang': 'en', 'value': 'LDAP Account Manager (LAM) is an open source web frontend for managing entries stored in an LDAP directory. The profile editor tool has an edit profile functionality, the parameters on this page are not properly sanitized and hence leads to stored XSS attacks. An authenticated user can store XSS payloads in the profiles, which gets triggered when any other user try to access the edit profile page. The pdf editor tool has an edit pdf profile function", "cve_id": "CVE-2022-24851", "title": "CVE-2022-24851", "source": "cvefixes", "timestamp": "2022-04-15", "split": "val"} +{"id": "e6919ad96998c5dac0ab", "text": "CVE: CVE-2022-23601\n\n[{'lang': 'en', 'value': 'Symfony is a PHP framework for web and console applications and a set of reusable PHP components. The Symfony form component provides a CSRF protection mechanism by using a random token injected in the form and using the session to store and control the token submitted by the user. When using the FrameworkBundle, this protection can be enabled or disabled with the configuration. If the configuration is not specified, by default, the mechanism is ena", "cve_id": "CVE-2022-23601", "title": "CVE-2022-23601", "source": "cvefixes", "timestamp": "2022-02-01", "split": "val"} +{"id": "649024918f601a4e9d22", "text": "CVE: CVE-2022-31071\n\n[{'lang': 'en', 'value': 'Octopoller is a micro gem for polling and retrying. Version 0.2.0 of the octopoller gem was published containing world-writeable files. Specifically, the gem was packed with files having their permissions set to `-rw-rw-rw-` (i.e. 0666) instead of `rw-r--r--` (i.e. 0644). This means everyone who is not the owner (Group and Public) with access to the instance where this release had been installed could modify the world-writable files from this gem. T", "cve_id": "CVE-2022-31071", "title": "CVE-2022-31071", "source": "cvefixes", "timestamp": "2022-06-15", "split": "val"} +{"id": "CVE-2022-20703", "text": "Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability\n\nAffected: Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers\n\nA vulnerability in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code elevate privileges, execute arbitrary commands, bypass authentication and authorization protections, fetch and run unsigned software, or cause a denial of service (DoS).\n\nRequired", "cve_id": "CVE-2022-20703", "title": "Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability", "source": "cisa_kev", "timestamp": "2022-03-03", "split": "val"} +{"id": "CVE-2022-1096", "text": "Google Chromium V8 Type Confusion Vulnerability\n\nAffected: Google Chromium V8\n\nGoogle Chromium V8 Engine contains a type confusion vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-843\n\n[Source: CISA Known Exploited Vulner", "cve_id": "CVE-2022-1096", "title": "Google Chromium V8 Type Confusion Vulnerability", "source": "cisa_kev", "timestamp": "2022-03-28", "split": "val"} +{"id": "03036f25c444426993b1", "text": "CVE: CVE-2022-1727\n\n[{'lang': 'en', 'value': 'Improper Input Validation in GitHub repository jgraph/drawio prior to 18.0.6.'}]\n\nFix commit: 18.0.4 release", "cve_id": "CVE-2022-1727", "title": "CVE-2022-1727", "source": "cvefixes", "timestamp": "2022-05-18", "split": "val"} +{"id": "555f8ad441439d69ad7c", "text": "CVE: CVE-2022-0822\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Reflected in GitHub repository orchardcms/orchardcore prior to 1.3.0.'}]\n\nFix commit: Fix missing permission checks and encoding. (#11344)", "cve_id": "CVE-2022-0822", "title": "CVE-2022-0822", "source": "cvefixes", "timestamp": "2022-03-11", "split": "val"} +{"id": "764eedb8ced6403502c7", "text": "CVE: CVE-2022-1987\n\n[{'lang': 'en', 'value': 'Buffer Over-read in GitHub repository bfabiszewski/libmobi prior to 0.11.'}]\n\nFix commit: Fix: index entry label not being zero-terminated with corrupt input", "cve_id": "CVE-2022-1987", "title": "CVE-2022-1987", "source": "cvefixes", "timestamp": "2022-06-03", "split": "val"} +{"id": "4abe5c98fdb6c30b4d79", "text": "CVE: CVE-2022-25896\n\n[{'lang': 'en', 'value': 'This affects the package passport before 0.6.0. When a user logs in or logs out, the session is regenerated instead of being closed.'}]\n\nFix commit: Regenerate session on login.", "cve_id": "CVE-2022-25896", "title": "CVE-2022-25896", "source": "cvefixes", "timestamp": "2022-07-01", "split": "val"} +{"id": "0fc3b8f1270cf0f44714", "text": "CVE: CVE-2022-31058\n\n[{'lang': 'en', 'value': 'Tuleap is a Free & Open Source Suite to improve management of software developments and collaboration. In versions prior to 13.9.99.95 Tuleap does not sanitize properly user inputs when constructing the SQL query to retrieve data for the tracker reports. An attacker with the capability to create a new tracker can execute arbitrary SQL queries. Users are advised to upgrade. There is no known workaround for this issue.'}]\n\nFix commit: request #27166:", "cve_id": "CVE-2022-31058", "title": "CVE-2022-31058", "source": "cvefixes", "timestamp": "2022-06-29", "split": "val"} +{"id": "CVE-2023-41265", "text": "Qlik Sense HTTP Tunneling Vulnerability\n\nAffected: Qlik Sense\n\nQlik Sense contains an HTTP tunneling vulnerability that allows an attacker to escalate privileges and execute HTTP requests on the backend server hosting the software.\n\nRequired Action: Apply remediations or mitigations per vendor instructions or discontinue use of the product if remediation or mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-444\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-41265", "title": "Qlik Sense HTTP Tunneling Vulnerability", "source": "cisa_kev", "timestamp": "2023-12-07", "split": "val"} +{"id": "9d31ca5a6f648dbbf7a9", "text": "CVE: CVE-2022-27815\n\n[{'lang': 'en', 'value': 'SWHKD 1.1.5 unsafely uses the /tmp/swhkd.pid pathname. There can be an information leak or denial of service.'}]\n\nFix commit: [patch] CVE-2022-27815", "cve_id": "CVE-2022-27815", "title": "CVE-2022-27815", "source": "cvefixes", "timestamp": "2022-03-30", "split": "val"} +{"id": "81f4019811faf330e542", "text": "CVE: CVE-2022-1682\n\n[{'lang': 'en', 'value': \"Reflected Xss using url based payload in GitHub repository neorazorx/facturascripts prior to 2022.07. Xss can use to steal user's cookies which lead to Account takeover or do any malicious activity in victim's browser\"}]\n\nFix commit: We check the url parameter of the link to ensure that it is a valid controller.\n------\nComprobamos el parámetro url del enlace para asegurar que sea un controlador válido.", "cve_id": "CVE-2022-1682", "title": "CVE-2022-1682", "source": "cvefixes", "timestamp": "2022-05-12", "split": "val"} +{"id": "72fcf2298e0972b767ec", "text": "CVE: CVE-2022-27311\n\n[{'lang': 'en', 'value': 'Gibbon v3.4.4 and below allows attackers to execute a Server-Side Request Forgery (SSRF) via a crafted URL.'}]\n\nFix commit: bump version, handle invalid API key DC", "cve_id": "CVE-2022-27311", "title": "CVE-2022-27311", "source": "cvefixes", "timestamp": "2022-04-25", "split": "val"} +{"id": "caff2f5e0fbff3d6a91a", "text": "CVE: CVE-2022-24768\n\n[{'lang': 'en', 'value': \"Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. All unpatched versions of Argo CD starting with 1.0.0 are vulnerable to an improper access control bug, allowing a malicious user to potentially escalate their privileges to admin-level. Versions starting with 0.8.0 and 0.5.0 contain limited versions of this issue. To perform exploits, an authorized Argo CD user must have push access to an Application's source git or Helm repo", "cve_id": "CVE-2022-24768", "title": "CVE-2022-24768", "source": "cvefixes", "timestamp": "2022-03-23", "split": "val"} +{"id": "719b58a8ad24cb22e11a", "text": "CVE: CVE-2022-0510\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Reflected in Packagist pimcore/pimcore prior to 10.3.1.'}]\n\nFix commit: [Admin] DataObject - Escape class definitions group properly", "cve_id": "CVE-2022-0510", "title": "CVE-2022-0510", "source": "cvefixes", "timestamp": "2022-02-08", "split": "val"} +{"id": "0254d7b4af645bd2c274", "text": "CVE: CVE-2022-1571\n\n[{'lang': 'en', 'value': \"Cross-site scripting - Reflected in Create Subaccount in GitHub repository neorazorx/facturascripts prior to 2022.07. This vulnerability can be arbitrarily executed javascript code to steal user'cookie, perform HTTP request, get content of `same origin` page, etc ...\"}]\n\nFix commit: Escaped html code from model fields to improve security.\n------\nEscapado el html de los campos del modelo para mejorar la seguridad.", "cve_id": "CVE-2022-1571", "title": "CVE-2022-1571", "source": "cvefixes", "timestamp": "2022-05-04", "split": "val"} +{"id": "7e0c40c145c10954a191", "text": "CVE: CVE-2022-1457\n\n[{'lang': 'en', 'value': \"Store XSS in title parameter executing at EditUser Page & EditProducto page in GitHub repository neorazorx/facturascripts prior to 2022.04. Cross-site scripting attacks can have devastating consequences. Code injected into a vulnerable application can exfiltrate data or install malware on the user's machine. Attackers can masquerade as authorized users via session cookies, allowing them to perform any action allowed by the user account.\"}]\n\nFix commi", "cve_id": "CVE-2022-1457", "title": "CVE-2022-1457", "source": "cvefixes", "timestamp": "2022-04-25", "split": "val"} +{"id": "44ae751d6e321760b3ae", "text": "CVE: CVE-2022-34134\n\n[{'lang': 'en', 'value': 'Benjamin BALET Jorani v1.0 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /application/controllers/Users.php.'}]\n\nFix commit: BF:security on users mgt with CSRF token fix #369", "cve_id": "CVE-2022-34134", "title": "CVE-2022-34134", "source": "cvefixes", "timestamp": "2022-06-28", "split": "val"} +{"id": "85271f7f5bd71129e26e", "text": "CVE: CVE-2022-0159\n\n[{'lang': 'en', 'value': \"orchardcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\"}]\n\nFix commit: Fix encoding issues (#11008)", "cve_id": "CVE-2022-0159", "title": "CVE-2022-0159", "source": "cvefixes", "timestamp": "2022-01-12", "split": "val"} +{"id": "9b93983958079e0ce678", "text": "CVE: CVE-2022-2318\n\n[{'lang': 'en', 'value': 'There are use-after-free vulnerabilities caused by timer handler in net/rose/rose_timer.c of linux that allow attackers to crash linux kernel without any privileges.'}]\n\nFix commit: net: rose: fix UAF bugs caused by timer handler\n\nThere are UAF bugs in rose_heartbeat_expiry(), rose_timer_expiry()\nand rose_idletimer_expiry(). The root cause is that del_timer()\ncould not stop the timer handler that is running and the refcount\nof sock is not managed pro", "cve_id": "CVE-2022-2318", "title": "CVE-2022-2318", "source": "cvefixes", "timestamp": "2022-07-06", "split": "val"} +{"id": "45c01c0bfe288f87c5a2", "text": "[Expected Behavior Violation] CVE-2023-28322: more POST-after-PUT confusion\n\n## Summary:\nCVE-2022-32221 fixes is insufficient.\nIn CVE-2022-32221, only CURLOPT_POST was corrected.\nHowever, CURLOPT_POST is not necessarily used when sending data with the POST method.\nCURLOPT_POST is not used in the CURLOPT_POSTFIELDS usage example on the official website.\n```\nCURL *curl = curl_easy_init();\nif(curl) {\n const char *data = \"data to send\";\n \n curl_easy_setopt(curl, CURLOPT_URL, \"https://example.com\")", "cve_id": "CVE-2023-28322", "title": "CVE-2023-28322: more POST-after-PUT confusion (Expected Behavior Violation)", "source": "hackerone", "timestamp": "2023-05-18", "split": "val"} +{"id": "898fe68faac57cd2be3b", "text": "CVE: CVE-2022-2796\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.4.'}]\n\nFix commit: [Admin] Translations - properly escape key on roweditor", "cve_id": "CVE-2022-2796", "title": "CVE-2022-2796", "source": "cvefixes", "timestamp": "2022-08-23", "split": "val"} +{"id": "255e9f709f5844f3eb1b", "text": "CVE: CVE-2022-2817\n\n[{'lang': 'en', 'value': 'Use After Free in GitHub repository vim/vim prior to 9.0.0213.'}]\n\nFix commit: patch 9.0.0213: using freed memory with error in assert argument\n\nProblem: Using freed memory with error in assert argument.\nSolution: Make a copy of the error.", "cve_id": "CVE-2022-2817", "title": "CVE-2022-2817", "source": "cvefixes", "timestamp": "2022-08-15", "split": "val"} +{"id": "8dbc89d91a8eb84ca279", "text": "CVE: CVE-2022-35930\n\n[{'lang': 'en', 'value': 'PolicyController is a utility used to enforce supply chain policy in Kubernetes clusters. In versions prior to 0.2.1 PolicyController will report a false positive, resulting in an admission when it should not be admitted when there is at least one attestation with a valid signature and there are NO attestations of the type being verified (--type defaults to \"custom\"). An example image that can be used to test this is `ghcr.io/distroless/static@sha25", "cve_id": "CVE-2022-35930", "title": "CVE-2022-35930", "source": "cvefixes", "timestamp": "2022-08-04", "split": "val"} +{"id": "c386738bed69a8cd08ea", "text": "CVE: CVE-2022-31050\n\n[{'lang': 'en', 'value': 'TYPO3 is an open source web content management system. Prior to versions 9.5.34 ELTS, 10.4.29, and 11.5.11, Admin Tool sessions initiated via the TYPO3 backend user interface had not been revoked even if the corresponding user account was degraded to lower permissions or disabled completely. This way, sessions in the admin tool theoretically could have been prolonged without any limit. TYPO3 versions 9.5.34 ELTS, 10.4.29, and 11.5.11 contain a fix f", "cve_id": "CVE-2022-31050", "title": "CVE-2022-31050", "source": "cvefixes", "timestamp": "2022-06-14", "split": "val"} +{"id": "95efcbc1cac2f1e5985a", "text": "CVE: CVE-2022-0938\n\n[{'lang': 'en', 'value': 'Stored XSS via file upload in GitHub repository star7th/showdoc prior to v2.10.4.'}]\n\nFix commit: Merge pull request #1628 from ajaysenr/master\n\nUpdate AttachmentModel.class.php", "cve_id": "CVE-2022-0938", "title": "CVE-2022-0938", "source": "cvefixes", "timestamp": "2022-03-14", "split": "val"} +{"id": "cd0ff277b21bbe94ae36", "text": "CVE: CVE-2022-27168\n\n[{'lang': 'en', 'value': 'Cross-site scripting vulnerability in LiteCart versions prior to 2.4.2 allows a remote attacker to inject an arbitrary script via unspecified vectors.'}]\n\nFix commit: * Escape HTML characters", "cve_id": "CVE-2022-27168", "title": "CVE-2022-27168", "source": "cvefixes", "timestamp": "2022-07-11", "split": "val"} +{"id": "e35f967af309d4e9a4a1", "text": "CVE: CVE-2022-1330\n\n[{'lang': 'en', 'value': 'stored xss due to unsantized anchor url in GitHub repository alvarotrigo/fullpage.js prior to 4.0.4. stored xss .'}]\n\nFix commit: Merge pull request #4360 from ranjit-git/ranjit-git-patch-1\n\nRanjit git patch 1", "cve_id": "CVE-2022-1330", "title": "CVE-2022-1330", "source": "cvefixes", "timestamp": "2022-04-12", "split": "val"} +{"id": "73a7f3e47504b4340260", "text": "CVE: CVE-2022-31060\n\n[{'lang': 'en', 'value': 'Discourse is an open-source discussion platform. Prior to version 2.8.4 in the `stable` branch and version `2.9.0.beta5` in the `beta` and `tests-passed` branches, banner topic data is exposed on login-required sites. This issue is patched in version 2.8.4 in the `stable` branch and version `2.9.0.beta5` in the `beta` and `tests-passed` branches of Discourse. As a workaround, one may disable banners.'}]\n\nFix commit: SECURITY: banner-info (#17071)", "cve_id": "CVE-2022-31060", "title": "CVE-2022-31060", "source": "cvefixes", "timestamp": "2022-06-14", "split": "val"} +{"id": "0dc863aa3046e6322ba4", "text": "CVE: CVE-2022-0572\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.4359: crash when repeatedly using :retab\n\nProblem: crash when repeatedly using :retab.\nSolution: Bail out when the line is getting too long.", "cve_id": "CVE-2022-0572", "title": "CVE-2022-0572", "source": "cvefixes", "timestamp": "2022-02-14", "split": "val"} +{"id": "8e54e3d0e7bafbb20759", "text": "[Double Free] CVE-2022-28738: Double free in Regexp compilation\n\nDue to a bug in the Regexp compilation process, creating a Regexp object with a crafted source string could cause the same memory to be freed twice. This is known as a “double free” vulnerability. Note that, in general, it is considered unsafe to create and use a Regexp object generated from untrusted input. In this case, however, following a comprehensive assessment, we treat this issue as a vulnerability.\n\npoc:\n```\nruby -e '/(\\\\x", "cve_id": "CVE-2022-28738", "title": "CVE-2022-28738: Double free in Regexp compilation (Double Free)", "source": "hackerone", "timestamp": "2022-05-28", "split": "val"} +{"id": "3729708a8fa739738f41", "text": "[Business Logic Errors] CVE-2022-32207: Unpreserved file permissions\n\n## Summary:\nCurl fails to preserve file permissions when writing:\n- `CURLOPT_COOKIEJAR` database\n- `CURLOPT_ALTSVC` database\n- `CURLOPT_HSTS` database\n\nInstead the permissions is always reset to 0666 & ~umask if the file is updated.\n\nAs a result a file that was before protected against read access by other users becomes other user readable (as long as umask doesn't have bit 2 set).\nOut of these files only the `CURLOPT_COOKIEJA", "cve_id": "CVE-2022-32207", "title": "CVE-2022-32207: Unpreserved file permissions (Business Logic Errors)", "source": "hackerone", "timestamp": "2022-06-27", "split": "val"} +{"id": "4d6b0d83eea56ac2e436", "text": "CVE: CVE-2022-24707\n\n[{'lang': 'en', 'value': 'Anuko Time Tracker is an open source, web-based time tracking application written in PHP. UNION SQL injection and time-based blind injection vulnerabilities existed in Time Tracker Puncher plugin in versions of anuko timetracker prior to 1.20.0.5642. This was happening because the Puncher plugin was reusing code from other places and was relying on an unsanitized date parameter in POST requests. Because the parameter was not checked, it was possible", "cve_id": "CVE-2022-24707", "title": "CVE-2022-24707", "source": "cvefixes", "timestamp": "2022-02-24", "split": "val"} +{"id": "effaf183c34b439e623a", "text": "CVE: CVE-2022-24737\n\n[{'lang': 'en', 'value': 'HTTPie is a command-line HTTP client. HTTPie has the practical concept of sessions, which help users to persistently store some of the state that belongs to the outgoing requests and incoming responses on the disk for further usage. Before 3.1.0, HTTPie didn‘t distinguish between cookies and hosts they belonged. This behavior resulted in the exposure of some cookies when there are redirects originating from the actual host to a third party website.", "cve_id": "CVE-2022-24737", "title": "CVE-2022-24737", "source": "cvefixes", "timestamp": "2022-03-07", "split": "val"} +{"id": "CVE-2023-5631", "text": "Roundcube Webmail Persistent Cross-Site Scripting (XSS) Vulnerability\n\nAffected: Roundcube Webmail\n\nRoundcube Webmail contains a persistent cross-site scripting (XSS) vulnerability that allows a remote attacker to run malicious JavaScript code.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-79\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-5631", "title": "Roundcube Webmail Persistent Cross-Site Scripting (XSS) Vulnerability", "source": "cisa_kev", "timestamp": "2023-10-26", "split": "val"} +{"id": "168a5dbcf813980453ef", "text": "CVE: CVE-2022-1752\n\n[{'lang': 'en', 'value': 'Unrestricted Upload of File with Dangerous Type in GitHub repository polonel/trudesk prior to 1.2.2.'}]\n\nFix commit: refactor(accounts): security enhancements", "cve_id": "CVE-2022-1752", "title": "CVE-2022-1752", "source": "cvefixes", "timestamp": "2022-05-21", "split": "val"} +{"id": "0b7ce8eff15daacc0fd3", "text": "[Unknown] Unrestricted File Upload on reddit.secure.force.com\n\n## Summary:\nReddit.secure.force.com is Reddit SalesForce instance. Attacker is able to send attachments of disallowed filetypes to this server. The attacker is able to send malicious documents such as CVE-2022-30190 Follina to the victim.\n\n## Impact:\nAttacker can send malicious files to whoever handles the form behind https://reddit.secure.force.com/adhelp\n\n## Steps To Reproduce:\n 1. Go to https://reddit.secure.force.com/adhelp \n 2", "cve_id": "CVE-2022-30190", "title": "Unrestricted File Upload on reddit.secure.force.com (Unknown)", "source": "hackerone", "timestamp": "2022-09-30", "split": "val"} +{"id": "90f5bcbfed6c024300a3", "text": "CVE: CVE-2022-23066\n\n[{'lang': 'en', 'value': 'In Solana rBPF versions 0.2.26 and 0.2.27 are affected by Incorrect Calculation which is caused by improper implementation of sdiv instruction. This can lead to the wrong execution path, resulting in huge loss in specific cases. For example, the result of a sdiv instruction may decide whether to transfer tokens or not. The vulnerability affects both integrity and may cause serious availability problems.'}]\n\nFix commit: jit: sign-extend the quotient", "cve_id": "CVE-2022-23066", "title": "CVE-2022-23066", "source": "cvefixes", "timestamp": "2022-05-09", "split": "val"} +{"id": "bead920423c61a1ed503", "text": "CVE: CVE-2022-2026\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository kromitgmbh/titra prior to 0.77.0.'}]\n\nFix commit: 🔒 fixes three critical stored XSS vulnerabilities thanks @saharshtapi for reporting this\n🔒 fixes a formula injection vulnerability in the Excel export functionality thanks @saharshtapi for reprorting this\n❗️this is an important security release, we recommend to migrate asap, all titra versions below version 0.77.0 are considered insecure for pro", "cve_id": "CVE-2022-2026", "title": "CVE-2022-2026", "source": "cvefixes", "timestamp": "2022-06-09", "split": "val"} +{"id": "752a99b6493f5bad56be", "text": "[Business Logic Errors] CVE-2022-27778: curl removes wrong file on error\n\n## Summary:\nCurl command has a logic flaw that results in removal of a wrong file when combining `--no-clobber` and `--remove-on-error` if the target file name exists and an error occurs.\n\n## Steps To Reproduce:\n 1. `echo \"important file\" > foo`\n 2. `echo -ne \"HTTP/1.1 200 OK\\r\\nContent-Length: 666\\r\\n\\r\\nHello\\n\" | nc -l -p 9999`\n 3. `curl -m 3 --no-clobber --remove-on-error --output foo http://testserver.tld:9999/`", "cve_id": "CVE-2022-27778", "title": "CVE-2022-27778: curl removes wrong file on error (Business Logic Errors)", "source": "hackerone", "timestamp": "2022-05-11", "split": "val"} +{"id": "4b3e5d661c081ee0ecd2", "text": "CVE: CVE-2022-0696\n\n[{'lang': 'en', 'value': 'NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.4428.'}]\n\nFix commit: patch 8.2.4428: crash when switching tabpage while in the cmdline window\n\nProblem: Crash when switching tabpage while in the cmdline window.\nSolution: Disallow switching tabpage when in the cmdline window.", "cve_id": "CVE-2022-0696", "title": "CVE-2022-0696", "source": "cvefixes", "timestamp": "2022-02-21", "split": "val"} +{"id": "50d1c28c7acbd7de7297", "text": "CVE: CVE-2022-1380\n\n[{'lang': 'en', 'value': 'Stored Cross Site Scripting vulnerability in Item name parameter in GitHub repository snipe/snipe-it prior to v5.4.3. The vulnerability is capable of stolen the user Cookie.'}]\n\nFix commit: Merge pull request #10942 from snipe/fixes/xss_user_requested\n\nFixes potential XSS vuln in user requestable results", "cve_id": "CVE-2022-1380", "title": "CVE-2022-1380", "source": "cvefixes", "timestamp": "2022-04-16", "split": "val"} +{"id": "CVE-2023-44487", "text": "HTTP/2 Rapid Reset Attack Vulnerability\n\nAffected: IETF HTTP/2\n\nHTTP/2 contains a rapid reset vulnerability that allows for a distributed denial-of-service attack (DDoS).\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-400\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-44487", "title": "HTTP/2 Rapid Reset Attack Vulnerability", "source": "cisa_kev", "timestamp": "2023-10-10", "split": "val"} +{"id": "ac2a50733c3818745772", "text": "CVE: CVE-2022-1806\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Reflected in GitHub repository rtxteam/rtx prior to checkpoint_2022-05-18.'}]\n\nFix commit: remove some cruft and implement a sanitizer for the client-supplied callback function name", "cve_id": "CVE-2022-1806", "title": "CVE-2022-1806", "source": "cvefixes", "timestamp": "2022-05-20", "split": "val"} +{"id": "fdf46962ecdf1feafab1", "text": "CVE: CVE-2022-23565\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. An attacker can trigger denial of service via assertion failure by altering a `SavedModel` on disk such that `AttrDef`s of some operation are duplicated. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: Remove a `DCHECK`-fail, lo", "cve_id": "CVE-2022-23565", "title": "CVE-2022-23565", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val"} +{"id": "CVE-2022-26143", "text": "MiCollab, MiVoice Business Express Access Control Vulnerability\n\nAffected: Mitel MiCollab, MiVoice Business Express\n\nA vulnerability has been identified in MiCollab and MiVoice Business Express that may allow a malicious actor to gain unauthorized access to sensitive information and services, cause performance degradations or a denial of service condition on the affected system.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-306, CWE-406\n\n[Source: CISA Known Exploited Vuln", "cve_id": "CVE-2022-26143", "title": "MiCollab, MiVoice Business Express Access Control Vulnerability", "source": "cisa_kev", "timestamp": "2022-03-25", "split": "val"} +{"id": "CVE-2022-41073", "text": "Microsoft Windows Print Spooler Privilege Escalation Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Print Spooler contains an unspecified vulnerability that allows an attacker to gain SYSTEM-level privileges.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-787\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-41073", "title": "Microsoft Windows Print Spooler Privilege Escalation Vulnerability", "source": "cisa_kev", "timestamp": "2022-11-08", "split": "val"} +{"id": "9890d854f0a880db142a", "text": "CVE: CVE-2022-2596\n\n[{'lang': 'en', 'value': 'Denial of Service in GitHub repository node-fetch/node-fetch prior to 3.2.10.'}]\n\nFix commit: fix: ReDoS referrer (#1611)\n\n* fix ReDoS referrer\r\n\r\n* Update src/utils/referrer.js\r\n\r\nEliminate regex and use string matcher\r\n\r\nCo-authored-by: Linus Unnebäck \r\n\r\nCo-authored-by: Khang. Võ Vĩ \r\nCo-authored-by: Linus Unnebäck ", "cve_id": "CVE-2022-2596", "title": "CVE-2022-2596", "source": "cvefixes", "timestamp": "2022-08-01", "split": "val"} +{"id": "CVE-2022-22620", "text": "Apple iOS, iPadOS, and macOS Webkit Use-After-Free Vulnerability\n\nAffected: Apple iOS, iPadOS, and macOS\n\nApple iOS, iPadOS, and macOS WebKit contain a use-after-free vulnerability that leads to code execution when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-41", "cve_id": "CVE-2022-22620", "title": "Apple iOS, iPadOS, and macOS Webkit Use-After-Free Vulnerability", "source": "cisa_kev", "timestamp": "2022-02-11", "split": "val"} +{"id": "ffeb309fdb20ab494143", "text": "CVE: CVE-2022-28389\n\n[{'lang': 'en', 'value': 'mcba_usb_start_xmit in drivers/net/can/usb/mcba_usb.c in the Linux kernel through 5.17.1 has a double free.'}]\n\nFix commit: can: mcba_usb: mcba_usb_start_xmit(): fix double dev_kfree_skb in error path\n\nThere is no need to call dev_kfree_skb() when usb_submit_urb() fails\nbecause can_put_echo_skb() deletes original skb and\ncan_free_echo_skb() deletes the cloned skb.\n\nFixes: 51f3baad7de9 (\"can: mcba_usb: Add support for Microchip CAN BUS Analyzer\")\nLin", "cve_id": "CVE-2022-28389", "title": "CVE-2022-28389", "source": "cvefixes", "timestamp": "2022-04-03", "split": "val"} +{"id": "e2397f8b82b2696d1960", "text": "[Improper Authorization] CVE-2023-47037: Airflow Broken Access Control Vulnerability\n\nHi IBB,\nApache Airflow, versions before 2.7.3, is affected by a vulnerability that allows authenticated and DAG-view authorized Users to modify some DAG run detail values when submitting notes. This could have them alter details such as configuration parameters, start date, etc. \n\n\nHere is the conversation between the security team of airflow.\n\n█████\n\nMore Details:\nhttps://lists.apache.org/thread/04y4vrw1t2xl03", "cve_id": "CVE-2023-47037", "title": "CVE-2023-47037: Airflow Broken Access Control Vulnerability (Improper Authorization)", "source": "hackerone", "timestamp": "2023-11-29", "split": "val"} +{"id": "6873da200b9921062850", "text": "CVE: CVE-2022-35929\n\n[{'lang': 'en', 'value': 'cosign is a container signing and verification utility. In versions prior to 1.10.1 cosign can report a false positive if any attestation exists. `cosign verify-attestation` used with the `--type` flag will report a false positive verification when there is at least one attestation with a valid signature and there are NO attestations of the type being verified (--type defaults to \"custom\"). This can happen when signing with a standard keypair and wi", "cve_id": "CVE-2022-35929", "title": "CVE-2022-35929", "source": "cvefixes", "timestamp": "2022-08-04", "split": "val"} +{"id": "02d0a4d0fdf919654199", "text": "CVE: CVE-2022-0845\n\n[{'lang': 'en', 'value': 'Code Injection in GitHub repository pytorchlightning/pytorch-lightning prior to 1.6.0.'}]\n\nFix commit: Replace `eval()` with `ast.literal_eval()` for security (#12212)\n\nCo-authored-by: Carlos Mocholi ", "cve_id": "CVE-2022-0845", "title": "CVE-2022-0845", "source": "cvefixes", "timestamp": "2022-03-05", "split": "val"} +{"id": "f5d3b1cfd24095ddd3d2", "text": "CVE: CVE-2022-34927\n\n[{'lang': 'en', 'value': 'MilkyTracker v1.03.00 was discovered to contain a stack overflow via the component LoaderXM::load. This vulnerability is triggered when the program is supplied a crafted XM module file.'}]\n\nFix commit: Fix possible stack corruption with XM instrument headers claiming a size of less than 4\n\nCloses #275", "cve_id": "CVE-2022-34927", "title": "CVE-2022-34927", "source": "cvefixes", "timestamp": "2022-08-03", "split": "val"} +{"id": "90be88c8d5b3a06ef277", "text": "CVE: CVE-2022-2231\n\n[{'lang': 'en', 'value': 'NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.5169: nested :source may use NULL pointer\n\nProblem: Nested :source may use NULL pointer.\nSolution: Do not use the NULL pointer.", "cve_id": "CVE-2022-2231", "title": "CVE-2022-2231", "source": "cvefixes", "timestamp": "2022-06-28", "split": "val"} +{"id": "ef723f1e203f4921e0d4", "text": "CVE: CVE-2022-0574\n\n[{'lang': 'en', 'value': 'Improper Access Control in GitHub repository publify/publify prior to 9.2.8.'}]\n\nFix commit: Do not allow comments on Article if not published", "cve_id": "CVE-2022-0574", "title": "CVE-2022-0574", "source": "cvefixes", "timestamp": "2022-05-16", "split": "val"} +{"id": "9f255dd4f13c8d85f120", "text": "CVE: CVE-2022-0570\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in Homebrew mruby prior to 3.2.'}]\n\nFix commit: codegen.c: fix a bug in `gen_values()`.\n\n- Fix limit handling that fails 15 arguments method calls.\n- Fix too early argument packing in arrays.", "cve_id": "CVE-2022-0570", "title": "CVE-2022-0570", "source": "cvefixes", "timestamp": "2022-02-14", "split": "val"} +{"id": "f64ca5def1001405eacb", "text": "CVE: CVE-2022-2871\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository notrinos/notrinoserp prior to 0.7.'}]\n\nFix commit: Prevent cross-site scripting(XSS) vulnerabilities.", "cve_id": "CVE-2022-2871", "title": "CVE-2022-2871", "source": "cvefixes", "timestamp": "2022-08-17", "split": "val"} +{"id": "e6fe3eff3985be9b827f", "text": "CVE: CVE-2022-29967\n\n[{'lang': 'en', 'value': 'static_compressed_inmemory_website_callback.c in Glewlwyd through 2.6.2 allows directory traversal.'}]\n\nFix commit: Fix file access check for directory traversal, and fix call for callback_static_file_uncompressed if header not set", "cve_id": "CVE-2022-29967", "title": "CVE-2022-29967", "source": "cvefixes", "timestamp": "2022-04-29", "split": "val"} +{"id": "8f270e545c0be1819b6f", "text": "CVE: CVE-2022-0401\n\n[{'lang': 'en', 'value': 'Path Traversal in NPM w-zip prior to 1.0.12.'}]\n\nFix commit: fix: change output to filename for Disclosure/DoS/RCE", "cve_id": "CVE-2022-0401", "title": "CVE-2022-0401", "source": "cvefixes", "timestamp": "2022-02-01", "split": "val"} +{"id": "CVE-2022-38181", "text": "Arm Mali GPU Kernel Driver Use-After-Free Vulnerability\n\nAffected: Arm Mali Graphics Processing Unit (GPU)\n\nArm Mali GPU Kernel Driver contains a use-after-free vulnerability that may allow a non-privileged user to gain root privilege and/or disclose information.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-38181", "title": "Arm Mali GPU Kernel Driver Use-After-Free Vulnerability", "source": "cisa_kev", "timestamp": "2023-03-30", "split": "val"} +{"id": "3efbcb8000c9552c576e", "text": "CVE: CVE-2022-2589\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Reflected in GitHub repository beancount/fava prior to 1.22.3.'}]\n\nFix commit: create tooltip contents in a xss-safe way", "cve_id": "CVE-2022-2589", "title": "CVE-2022-2589", "source": "cvefixes", "timestamp": "2022-08-01", "split": "val"} +{"id": "CVE-2022-26904", "text": "Microsoft Windows User Profile Service Privilege Escalation Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows User Profile Service contains an unspecified vulnerability that allows for privilege escalation.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-362\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-26904", "title": "Microsoft Windows User Profile Service Privilege Escalation Vulnerability", "source": "cisa_kev", "timestamp": "2022-04-25", "split": "val"} +{"id": "01e883b205eae8f88126", "text": "CVE: CVE-2022-1883\n\n[{'lang': 'en', 'value': 'SQL Injection in GitHub repository camptocamp/terraboard prior to 2.2.0.'}]\n\nFix commit: fix(db): possible sql injection on /search endpoint", "cve_id": "CVE-2022-1883", "title": "CVE-2022-1883", "source": "cvefixes", "timestamp": "2022-05-25", "split": "val"} +{"id": "CVE-2022-26258", "text": "D-Link DIR-820L Remote Code Execution Vulnerability\n\nAffected: D-Link DIR-820L\n\nD-Link DIR-820L contains an unspecified vulnerability in Device Name parameter in /lan.asp which allows for remote code execution.\n\nRequired Action: The impacted product is end-of-life and should be disconnected if still in use.\n\nCWE(s): CWE-78\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-26258", "title": "D-Link DIR-820L Remote Code Execution Vulnerability", "source": "cisa_kev", "timestamp": "2022-09-08", "split": "val"} +{"id": "4cf23793ccf6fd3a20a9", "text": "CVE: CVE-2022-23614\n\n[{'lang': 'en', 'value': 'Twig is an open source template language for PHP. When in a sandbox mode, the `arrow` parameter of the `sort` filter must be a closure to avoid attackers being able to run arbitrary PHP functions. In affected versions this constraint was not properly enforced and could lead to code injection of arbitrary PHP code. Patched versions now disallow calling non Closure in the `sort` filter as is the case for some other filters. Users are advised to upgrad", "cve_id": "CVE-2022-23614", "title": "CVE-2022-23614", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val"} +{"id": "CVE-2022-20821", "text": "Cisco IOS XR Open Port Vulnerability\n\nAffected: Cisco IOS XR\n\nCisco IOS XR software health check opens TCP port 6379 by default on activation. An attacker can connect to the Redis instance on the open port and allow access to the Redis instance that is running within the NOSi container.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-923\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-20821", "title": "Cisco IOS XR Open Port Vulnerability", "source": "cisa_kev", "timestamp": "2022-05-23", "split": "val"} +{"id": "ee5141883f314aca4d98", "text": "CVE: CVE-2022-29252\n\n[{'lang': 'en', 'value': 'XWiki Platform Wiki UI Main Wiki is a package for managing subwikis. Starting with version 5.3-milestone-2, XWiki Platform Wiki UI Main Wiki contains a possible cross-site scripting vector in the `WikiManager.JoinWiki ` wiki page related to the \"requestJoin\" field. The issue is patched in versions 12.10.11, 14.0-rc-1, 13.4.7, and 13.10.3. The easiest available workaround is to edit the wiki page `WikiManager.JoinWiki` (with wiki editor) according to", "cve_id": "CVE-2022-29252", "title": "CVE-2022-29252", "source": "cvefixes", "timestamp": "2022-05-25", "split": "val"} +{"id": "71c6646c6e4783e8a62e", "text": "CVE: CVE-2022-29197\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.UnsortedSegmentJoin` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. The code assumes `num_segments` is a scalar but there is no validation for this before accessing its value. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 cont", "cve_id": "CVE-2022-29197", "title": "CVE-2022-29197", "source": "cvefixes", "timestamp": "2022-05-20", "split": "val"} +{"id": "42cfd7f647364c461db2", "text": "CVE: CVE-2022-1706\n\n[{'lang': 'en', 'value': 'A vulnerability was found in Ignition where ignition configs are accessible from unprivileged containers in VMs running on VMware products. This issue is only relevant in user environments where the Ignition config contains secrets. The highest threat from this vulnerability is to data confidentiality. Possible workaround is to not put secrets in the Ignition config.'}]\n\nFix commit: Merge pull request #1350 from bgilbert/userdata\n\nDelete userdata fro", "cve_id": "CVE-2022-1706", "title": "CVE-2022-1706", "source": "cvefixes", "timestamp": "2022-05-17", "split": "val"} +{"id": "CVE-2022-23227", "text": "NUUO NVRmini2 Devices Missing Authentication Vulnerability \n\nAffected: NUUO NVRmini2 Devices\n\nNUUO NVRmini2 devices contain a missing authentication vulnerability that allows an unauthenticated attacker to upload an encrypted TAR archive, which can be abused to add arbitrary users. \n\nRequired Action: The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product.\n\nCWE(s): CWE-306\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-23227", "title": "NUUO NVRmini2 Devices Missing Authentication Vulnerability ", "source": "cisa_kev", "timestamp": "2024-12-18", "split": "val"} +{"id": "f61e5a5229e76953370b", "text": "CVE: CVE-2022-0962\n\n[{'lang': 'en', 'value': 'Stored XSS viva .webma file upload in GitHub repository star7th/showdoc prior to 2.10.4.'}]\n\nFix commit: Upload file vulnerability", "cve_id": "CVE-2022-0962", "title": "CVE-2022-0962", "source": "cvefixes", "timestamp": "2022-03-14", "split": "val"} +{"id": "5e736021f6d0cd77de33", "text": "CVE: CVE-2022-32546\n\n[{'lang': 'en', 'value': \"A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned long' at coders/pcl.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior.\"}]\n\nFix commit: https://github.com/ImageMagick/ImageMagick/pull/4986", "cve_id": "CVE-2022-32546", "title": "CVE-2022-32546", "source": "cvefixes", "timestamp": "2022-06-16", "split": "val"} +{"id": "20d7618490d07f803088", "text": "[Cleartext Transmission of Sensitive Information] CVE-2023-23914: curl HSTS ignored on multiple requests\n\n## Summary:\ncurl tool HSTS doesn't work correctly when performing multiple requests within a single invocation.\n\n## Steps To Reproduce:\n\n 1. `curl --hsts \"\" https://hsts.example.com http://hsts.example.com`\n\nThe second request will be performed over HTTP regardless if correct HSTS header is returned by the first request.\n\n## Impact\n\nRequest performed over insecure channels unexpectedly and", "cve_id": "CVE-2023-23914", "title": "CVE-2023-23914: curl HSTS ignored on multiple requests (Cleartext Transmission of Sensitive Information)", "source": "hackerone", "timestamp": "2023-02-15", "split": "val"} +{"id": "1e955502b4a47dad49ef", "text": "CVE: CVE-2022-31129\n\n[{'lang': 'en', 'value': 'moment is a JavaScript date library for parsing, validating, manipulating, and formatting dates. Affected versions of moment were found to use an inefficient parsing algorithm. Specifically using string-to-date parsing in moment (more specifically rfc2822 parsing, which is tried by default) has quadratic (N^2) complexity on specific inputs. Users may notice a noticeable slowdown is observed with inputs above 10k characters. Users who pass user-provi", "cve_id": "CVE-2022-31129", "title": "CVE-2022-31129", "source": "cvefixes", "timestamp": "2022-07-06", "split": "val"} +{"id": "03d471bcf8944b0350f6", "text": "CVE: CVE-2022-28388\n\n[{'lang': 'en', 'value': 'usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c in the Linux kernel through 5.17.1 has a double free.'}]\n\nFix commit: can: usb_8dev: usb_8dev_start_xmit(): fix double dev_kfree_skb() in error path\n\nThere is no need to call dev_kfree_skb() when usb_submit_urb() fails\nbecause can_put_echo_skb() deletes original skb and\ncan_free_echo_skb() deletes the cloned skb.\n\nFixes: 0024d8ad1639 (\"can: usb_8dev: Add support for USB2CAN interface from 8 devic", "cve_id": "CVE-2022-28388", "title": "CVE-2022-28388", "source": "cvefixes", "timestamp": "2022-04-03", "split": "val"} +{"id": "34072233ff4fee546d6c", "text": "CVE: CVE-2022-25854\n\n[{'lang': 'en', 'value': 'This affects the package @yaireo/tagify before 4.9.8. The package is used for rendering UI components inside the input or text fields, and an attacker can pass a malicious placeholder value to it to fire the XSS payload.'}]\n\nFix commit: fixes #989 - fix XSS", "cve_id": "CVE-2022-25854", "title": "CVE-2022-25854", "source": "cvefixes", "timestamp": "2022-04-29", "split": "val"} +{"id": "a871210bf122605bc8e6", "text": "CVE: CVE-2022-27245\n\n[{'lang': 'en', 'value': 'An issue was discovered in MISP before 2.4.156. app/Model/Server.php does not restrict generateServerSettings to the CLI. This could lead to SSRF.'}]\n\nFix commit: fix: [security] restrict setting to cli only. enabling this setting could allow potential ssrf attacks, as reported by Ianis BERNARD - NATO Cyber Security Centre", "cve_id": "CVE-2022-27245", "title": "CVE-2022-27245", "source": "cvefixes", "timestamp": "2022-03-18", "split": "val"} +{"id": "a4f81ac5278795cf8464", "text": "CVE: CVE-2022-0940\n\n[{'lang': 'en', 'value': 'Stored XSS due to Unrestricted File Upload in GitHub repository star7th/showdoc prior to v2.10.4.'}]\n\nFix commit: Merge pull request #1629 from ajaysenr/master\n\nUpdate AttachmentModel.class.php", "cve_id": "CVE-2022-0940", "title": "CVE-2022-0940", "source": "cvefixes", "timestamp": "2022-03-14", "split": "val"} +{"id": "CVE-2023-26083", "text": "Arm Mali GPU Kernel Driver Information Disclosure Vulnerability\n\nAffected: Arm Mali Graphics Processing Unit (GPU)\n\nArm Mali GPU Kernel Driver contains an information disclosure vulnerability that allows a non-privileged user to make valid GPU processing operations that expose sensitive kernel metadata.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-401\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-26083", "title": "Arm Mali GPU Kernel Driver Information Disclosure Vulnerability", "source": "cisa_kev", "timestamp": "2023-04-07", "split": "val"} +{"id": "CVE-2022-23131", "text": "Zabbix Frontend Authentication Bypass Vulnerability\n\nAffected: Zabbix Frontend\n\nUnsafe client-side session storage leading to authentication bypass/instance takeover via Zabbix Frontend with configured SAML.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-290\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-23131", "title": "Zabbix Frontend Authentication Bypass Vulnerability", "source": "cisa_kev", "timestamp": "2022-02-22", "split": "val"} +{"id": "382b7c508efcf3b9c3fb", "text": "CVE: CVE-2022-23626\n\n[{'lang': 'en', 'value': 'm1k1o/blog is a lightweight self-hosted facebook-styled PHP blog. Errors from functions `imagecreatefrom*` and `image*` have not been checked properly. Although PHP issued warnings and the upload function returned `false`, the original file (that could contain a malicious payload) was kept on the disk. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.'}]\n\nFix commit: check image create errors.", "cve_id": "CVE-2022-23626", "title": "CVE-2022-23626", "source": "cvefixes", "timestamp": "2022-02-08", "split": "val"} +{"id": "0d6e46af8385281ccb44", "text": "CVE: CVE-2022-0613\n\n[{'lang': 'en', 'value': 'Authorization Bypass Through User-Controlled Key in NPM urijs prior to 1.19.8.'}]\n\nFix commit: fix(parse): case insensitive scheme - #412", "cve_id": "CVE-2022-0613", "title": "CVE-2022-0613", "source": "cvefixes", "timestamp": "2022-02-16", "split": "val"} +{"id": "b5b49cc437c8d26486ed", "text": "CVE: CVE-2022-21676\n\n[{'lang': 'en', 'value': 'Engine.IO is the implementation of transport-based cross-browser/cross-device bi-directional communication layer for Socket.IO. A specially crafted HTTP request can trigger an uncaught exception on the Engine.IO server, thus killing the Node.js process. This impacts all the users of the `engine.io` package starting from version `4.0.0`, including those who uses depending packages like `socket.io`. Versions prior to `4.0.0` are not impacted. A fix ha", "cve_id": "CVE-2022-21676", "title": "CVE-2022-21676", "source": "cvefixes", "timestamp": "2022-01-12", "split": "val"} +{"id": "d44e2d6dc8a02ce90741", "text": "[HTTP Request Smuggling] HTTP Request Smuggling Due to Incorrect Parsing of Multi-line Transfer-Encoding (improper fix for CVE-2022-32215)\n\n**Summary:**\nDue to an incomplete fix for CVE-2022-32215, the `llhttp` parser in the `http` module in Node v16.16.0 and 18.7.0 still does not correctly handle multi-line Transfer-Encoding headers. This can lead to HTTP Request Smuggling (HRS).\n\n**Description:** [add more details about this vulnerability]\n\nWe have identified that the root issue of CVE-2022-3", "cve_id": "CVE-2022-32215", "title": "HTTP Request Smuggling Due to Incorrect Parsing of Multi-line Transfer-Encoding (improper fix for CVE-2022-32215) (HTTP Request Smuggling)", "source": "hackerone", "timestamp": "2022-10-26", "split": "val"} +{"id": "386bf5bd1576251332e1", "text": "CVE: CVE-2022-21723\n\n[{'lang': 'en', 'value': 'PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In versions 2.11.1 and prior, parsing an incoming SIP message that contains a malformed multipart can potentially cause out-of-bound read access. This issue affects all PJSIP users that accept SIP multipart. The patch is available as commit in the `master` branch. There are no known", "cve_id": "CVE-2022-21723", "title": "CVE-2022-21723", "source": "cvefixes", "timestamp": "2022-01-27", "split": "val"} +{"id": "e10774a468aafaf13965", "text": "CVE: CVE-2022-29254\n\n[{'lang': 'en', 'value': 'silverstripe-omnipay is a SilverStripe integration with Omnipay PHP payments library. For a subset of Omnipay gateways (those that use intermediary states like `isNotification()` or `isRedirect()`), if the payment identifier or success URL is exposed it is possible for payments to be prematurely marked as completed without payment being taken. This is mitigated by the fact that most payment gateways hide this information from users, however some iss", "cve_id": "CVE-2022-29254", "title": "CVE-2022-29254", "source": "cvefixes", "timestamp": "2022-06-09", "split": "val"} +{"id": "413daf3682023dc113e0", "text": "CVE: CVE-2022-1543\n\n[{'lang': 'en', 'value': 'Improper handling of Length parameter in GitHub repository erudika/scoold prior to 1.49.4. When the text size is large enough the service results in a momentary outage in a production environment. That can lead to memory corruption on the server.'}]\n\nFix commit: fixed profile name not limited in length", "cve_id": "CVE-2022-1543", "title": "CVE-2022-1543", "source": "cvefixes", "timestamp": "2022-04-29", "split": "val"} +{"id": "CVE-2022-24990", "text": "TerraMaster OS Remote Command Execution Vulnerability\n\nAffected: TerraMaster TerraMaster OS\n\nTerraMaster OS contains a remote command execution vulnerability that allows an unauthenticated user to execute commands on the target endpoint.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-306\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-24990", "title": "TerraMaster OS Remote Command Execution Vulnerability", "source": "cisa_kev", "timestamp": "2023-02-10", "split": "val"} +{"id": "20ed13b28d1054ccfc67", "text": "CVE: CVE-2022-1803\n\n[{'lang': 'en', 'value': 'Improper Restriction of Rendered UI Layers or Frames in GitHub repository polonel/trudesk prior to 1.2.2.'}]\n\nFix commit: fix(core): iframe security fix", "cve_id": "CVE-2022-1803", "title": "CVE-2022-1803", "source": "cvefixes", "timestamp": "2022-05-20", "split": "val"} +{"id": "3922f22858eb1088d5e9", "text": "CVE: CVE-2022-27470\n\n[{'lang': 'en', 'value': 'SDL_ttf v2.0.18 and below was discovered to contain an arbitrary memory write via the function TTF_RenderText_Solid(). This vulnerability is triggered via a crafted TTF file.'}]\n\nFix commit: More integer overflow (see bug #187)\nMake sure that 'width + alignment' doesn't overflow, otherwise\nit could create a SDL_Surface of 'width' but with wrong 'pitch'", "cve_id": "CVE-2022-27470", "title": "CVE-2022-27470", "source": "cvefixes", "timestamp": "2022-05-04", "split": "val"} +{"id": "d9cf09e8d65719a26cba", "text": "CVE: CVE-2022-1533\n\n[{'lang': 'en', 'value': 'Buffer Over-read in GitHub repository bfabiszewski/libmobi prior to 0.11. This vulnerability is capable of arbitrary code execution.'}]\n\nFix commit: Fix wrong boundary checks in inflections parser resulting in stack buffer over-read with corrupt input", "cve_id": "CVE-2022-1533", "title": "CVE-2022-1533", "source": "cvefixes", "timestamp": "2022-04-29", "split": "val"} +{"id": "97dba156728e58bfac1a", "text": "CVE: CVE-2022-23560\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite model that would allow limited reads and writes outside of arrays in TFLite. This exploits missing validation in the conversion from sparse tensors to dense tensors. The fix is included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. User", "cve_id": "CVE-2022-23560", "title": "CVE-2022-23560", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val"} +{"id": "cf17a86999dbb22ff3ec", "text": "CVE: CVE-2022-24838\n\n[{'lang': 'en', 'value': \"Nextcloud Calendar is a calendar application for the nextcloud framework. SMTP Command Injection in Appointment Emails via Newlines: as newlines and special characters are not sanitized in the email value in the JSON request, a malicious attacker can inject newlines to break out of the `RCPT TO: ` SMTP command and begin injecting arbitrary SMTP commands. It is recommended that Calendar is upgraded to 3.2.2. There are no workaro", "cve_id": "CVE-2022-24838", "title": "CVE-2022-24838", "source": "cvefixes", "timestamp": "2022-04-11", "split": "val"} +{"id": "CVE-2023-29552", "text": "Service Location Protocol (SLP) Denial-of-Service Vulnerability\n\nAffected: IETF Service Location Protocol (SLP)\n\nThe Service Location Protocol (SLP) contains a denial-of-service (DoS) vulnerability that could allow an unauthenticated, remote attacker to register services and use spoofed UDP traffic to conduct a denial-of-service (DoS) attack with a significant amplification factor.\n\nRequired Action: Apply mitigations per vendor instructions or disable SLP service or port 427/UDP on all systems r", "cve_id": "CVE-2023-29552", "title": "Service Location Protocol (SLP) Denial-of-Service Vulnerability", "source": "cisa_kev", "timestamp": "2023-11-08", "split": "val"} +{"id": "250e7135135e96e94595", "text": "CVE: CVE-2022-0139\n\n[{'lang': 'en', 'value': 'Use After Free in GitHub repository radareorg/radare2 prior to 5.6.0.'}]\n\nFix commit: Fix use-after-free in iobank rbtree usage ##io\n\n* See havoc4 bin for reproducer\n* Reported via huntr.dev by 'Cen Zhang'", "cve_id": "CVE-2022-0139", "title": "CVE-2022-0139", "source": "cvefixes", "timestamp": "2022-02-08", "split": "val"} +{"id": "CVE-2022-22587", "text": "Apple Memory Corruption Vulnerability\n\nAffected: Apple iOS and macOS\n\nApple IOMobileFrameBuffer contains a memory corruption vulnerability which can allow a malicious application to execute arbitrary code with kernel privileges.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-20, CWE-787\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-22587", "title": "Apple Memory Corruption Vulnerability", "source": "cisa_kev", "timestamp": "2022-01-28", "split": "val"} +{"id": "1fe72644746bdeed9343", "text": "CVE: CVE-2022-29216\n\n[{'lang': 'en', 'value': \"TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, TensorFlow's `saved_model_cli` tool is vulnerable to a code injection. This can be used to open a reverse shell. This code path was maintained for compatibility reasons as the maintainers had several test cases where numpy expressions were used as arguments. However, given that the tool is always run manually, the impact of this is still not", "cve_id": "CVE-2022-29216", "title": "CVE-2022-29216", "source": "cvefixes", "timestamp": "2022-05-21", "split": "val"} +{"id": "1dafca4e0b120e08ae6f", "text": "CVE: CVE-2022-22845\n\n[{'lang': 'en', 'value': \"QXIP SIPCAPTURE homer-app before 1.4.28 for HOMER 7.x has the same 167f0db2-f83e-4baa-9736-d56064a5b415 JWT secret key across different customers' installations.\"}]\n\nFix commit: added jwt generator.\n\nMany thanks to Omri Baso and Fabien Aunay for the report! Great job guys!", "cve_id": "CVE-2022-22845", "title": "CVE-2022-22845", "source": "cvefixes", "timestamp": "2022-01-10", "split": "val"} +{"id": "cb50ab881d7456c026d4", "text": "CVE: CVE-2022-1534\n\n[{'lang': 'en', 'value': 'Buffer Over-read at parse_rawml.c:1416 in GitHub repository bfabiszewski/libmobi prior to 0.11. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash.'}]\n\nFix commit: Fix array boundary check when parsing inflections which could result in buffer over-read with corrupt input", "cve_id": "CVE-2022-1534", "title": "CVE-2022-1534", "source": "cvefixes", "timestamp": "2022-04-29", "split": "val"} +{"id": "CVE-2023-28771", "text": "Zyxel Multiple Firewalls OS Command Injection Vulnerability\n\nAffected: Zyxel Multiple Firewalls\n\nZyxel ATP, USG FLEX, VPN, and ZyWALL/USG firewalls allow for improper error message handling which could allow an unauthenticated attacker to execute OS commands remotely by sending crafted packets to an affected device.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-78\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-28771", "title": "Zyxel Multiple Firewalls OS Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2023-05-31", "split": "val"} +{"id": "CVE-2022-22047", "text": "Microsoft Windows Client Server Runtime Subsystem (CSRSS) Privilege Escalation Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows CSRSS contains an unspecified vulnerability that allows for privilege escalation to SYSTEM privileges.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-426\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-22047", "title": "Microsoft Windows Client Server Runtime Subsystem (CSRSS) Privilege Escalation Vulnerability", "source": "cisa_kev", "timestamp": "2022-07-12", "split": "val"} +{"id": "CVE-2023-37580", "text": "Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting (XSS) Vulnerability\n\nAffected: Synacor Zimbra Collaboration Suite (ZCS)\n\nSynacor Zimbra Collaboration Suite (ZCS) contains a cross-site scripting vulnerability impacting the confidentiality and integrity of data.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-79\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-37580", "title": "Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting (XSS) Vulnerability", "source": "cisa_kev", "timestamp": "2023-07-27", "split": "val"} +{"id": "80dda33f0ac38a02050a", "text": "CVE: CVE-2022-27223\n\n[{'lang': 'en', 'value': 'In drivers/usb/gadget/udc/udc-xilinx.c in the Linux kernel before 5.16.12, the endpoint index is not validated and might be manipulated by the host for out-of-array access.'}]\n\nFix commit: USB: gadget: validate endpoint index for xilinx udc\n\nAssure that host may not manipulate the index to point\npast endpoint array.\n\nSigned-off-by: Szymon Heidrich \nCc: stable \nSigned-off-by: Greg Kroah-Hartman .returns_int128()` is not validated to fall within the bounds of `int128`. This issue can result in a misinterpretation of the integer value and lead to incorrect behavior. As of v0.3.0, `.returns_int128()` is validated in simple expressions, but not complex expressions. Users are advised to upgrade. There is no known work", "cve_id": "CVE-2022-24845", "title": "CVE-2022-24845", "source": "cvefixes", "timestamp": "2022-04-13", "split": "val"} +{"id": "2b3704ee216f3ac62428", "text": "[Allocation of Resources Without Limits or Throttling] CVE-2022-32205: Set-Cookie denial of service\n\nA malicious server can serve excessive amounts of Set-Cookie: headers in a HTTP response to curl and curl stores all of them. A sufficiently large amount of (big) cookies make subsequent HTTP requests to this, or other servers to which the cookies match, create requests that become larger than the threshold that curl uses internally to avoid sending crazy large requests (1048576 bytes) and instea", "cve_id": "CVE-2022-32205", "title": "CVE-2022-32205: Set-Cookie denial of service (Allocation of Resources Without Limits or Throttling)", "source": "hackerone", "timestamp": "2022-06-27", "split": "val"} +{"id": "7418ce64e7aa4e338f2e", "text": "CVE: CVE-2022-0178\n\n[{'lang': 'en', 'value': 'snipe-it is vulnerable to Improper Access Control'}]\n\nFix commit: Merge pull request #10504 from snipe/fixes/auth_controls_on_api_key_creation\n\nFixes auth controls on api key creation", "cve_id": "CVE-2022-0178", "title": "CVE-2022-0178", "source": "cvefixes", "timestamp": "2022-01-13", "split": "val"} +{"id": "bdbe583402dcedc444c2", "text": "CVE: CVE-2022-27950\n\n[{'lang': 'en', 'value': 'In drivers/hid/hid-elo.c in the Linux kernel before 5.16.11, a memory leak exists for a certain hid_parse error condition.'}]\n\nFix commit: HID: elo: fix memory leak in elo_probe\n\nWhen hid_parse() in elo_probe() fails, it forgets to call usb_put_dev to\ndecrease the refcount.\n\nFix this by adding usb_put_dev() in the error handling code of elo_probe().\n\nFixes: fbf42729d0e9 (\"HID: elo: update the reference count of the usb device structure\")\nReported-by", "cve_id": "CVE-2022-27950", "title": "CVE-2022-27950", "source": "cvefixes", "timestamp": "2022-03-28", "split": "val"} +{"id": "ed347aeb90f387deaf81", "text": "CVE: CVE-2022-30594\n\n[{'lang': 'en', 'value': 'The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag.'}]\n\nFix commit: ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE\n\nSetting PTRACE_O_SUSPEND_SECCOMP is supposed to be a highly privileged\noperation because it allows the tracee to completely bypass all seccomp\nfilters on kernels with CONFIG_CHECKPOINT_RESTOR", "cve_id": "CVE-2022-30594", "title": "CVE-2022-30594", "source": "cvefixes", "timestamp": "2022-05-12", "split": "val"} +{"id": "CVE-2022-30525", "text": "Zyxel Multiple Firewalls OS Command Injection Vulnerability\n\nAffected: Zyxel Multiple Firewalls\n\nA command injection vulnerability in the CGI program of some Zyxel firewall versions could allow an attacker to modify specific files and then execute some OS commands on a vulnerable device.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-78\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-30525", "title": "Zyxel Multiple Firewalls OS Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2022-05-16", "split": "val"} +{"id": "3485e6b3d22d83b71c64", "text": "CVE: CVE-2022-1236\n\n[{'lang': 'en', 'value': 'Weak Password Requirements in GitHub repository weseek/growi prior to v5.0.0.'}]\n\nFix commit: Merge pull request #5630 from weseek/imprv/extend-minimum-password-length\n\nfix: Displaying minimum length of password", "cve_id": "CVE-2022-1236", "title": "CVE-2022-1236", "source": "cvefixes", "timestamp": "2022-04-05", "split": "val"} +{"id": "b26f9326ae87a5c94ba9", "text": "CVE: CVE-2022-0943\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow occurs in vim in GitHub repository vim/vim prior to 8.2.4563.'}]\n\nFix commit: patch 8.2.4563: \"z=\" in Visual mode may go beyond the end of the line\n\nProblem: \"z=\" in Visual mode may go beyond the end of the line.\nSolution: Adjust \"badlen\".", "cve_id": "CVE-2022-0943", "title": "CVE-2022-0943", "source": "cvefixes", "timestamp": "2022-03-14", "split": "val"} +{"id": "98854b7052e025ddf940", "text": "CVE: CVE-2022-0174\n\n[{'lang': 'en', 'value': 'dolibarr is vulnerable to Business Logic Errors'}]\n\nFix commit: Fix error management", "cve_id": "CVE-2022-0174", "title": "CVE-2022-0174", "source": "cvefixes", "timestamp": "2022-01-10", "split": "val"} +{"id": "801a3f4f14c9960ddf32", "text": "CVE: CVE-2022-23649\n\n[{'lang': 'en', 'value': 'Cosign provides container signing, verification, and storage in an OCI registry for the sigstore project. Prior to version 1.5.2, Cosign can be manipulated to claim that an entry for a signature exists in the Rekor transparency log even if it doesn\\'t. This requires the attacker to have pull and push permissions for the signature in OCI. This can happen with both standard signing with a keypair and \"keyless signing\" with Fulcio. If an attacker has a", "cve_id": "CVE-2022-23649", "title": "CVE-2022-23649", "source": "cvefixes", "timestamp": "2022-02-18", "split": "val"} +{"id": "2329ef4432eba15ea053", "text": "CVE: CVE-2022-23581\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The Grappler optimizer in TensorFlow can be used to cause a denial of service by altering a `SavedModel` such that `IsSimplifiableReshape` would trigger `CHECK` failures. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: Remove `C", "cve_id": "CVE-2022-23581", "title": "CVE-2022-23581", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val"} +{"id": "CVE-2023-0266", "text": "Linux Kernel Use-After-Free Vulnerability\n\nAffected: Linux Kernel\n\nLinux kernel contains a use-after-free vulnerability that allows for privilege escalation to gain ring0 access from the system user.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-0266", "title": "Linux Kernel Use-After-Free Vulnerability", "source": "cisa_kev", "timestamp": "2023-03-30", "split": "val"} +{"id": "61b117e46bb42eee706d", "text": "CVE: CVE-2022-1253\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository strukturag/libde265 prior to and including 1.0.8. The fix is established in commit 8e89fe0e175d2870c39486fdd09250b230ec10b8 but does not yet belong to an official release.'}]\n\nFix commit: error on out-of-range cpb_cnt_minus1 (oss-fuzz issue 27590)", "cve_id": "CVE-2022-1253", "title": "CVE-2022-1253", "source": "cvefixes", "timestamp": "2022-04-06", "split": "val"} +{"id": "89b832f065747cde17f6", "text": "CVE: CVE-2022-1345\n\n[{'lang': 'en', 'value': \"Stored XSS viva .svg file upload in GitHub repository causefx/organizr prior to 2.1.1810. This allows attackers to execute malicious scripts in the user's browser and it can lead to session hijacking, sensitive data exposure, and worse.\"}]\n\nFix commit: added sanitizeUserString and sanitizeEmail functions\nadded sanitize to uploaded image names\nadded sanitize to tabs, categories, users and bookmarks\nremoved svg files from approved image lists", "cve_id": "CVE-2022-1345", "title": "CVE-2022-1345", "source": "cvefixes", "timestamp": "2022-04-13", "split": "val"} +{"id": "CVE-2022-32893", "text": "Apple iOS and macOS Out-of-Bounds Write Vulnerability\n\nAffected: Apple iOS and macOS\n\nApple iOS and macOS contain an out-of-bounds write vulnerability that could allow for remote code execution when processing malicious crafted web content.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-20, CWE-787\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-32893", "title": "Apple iOS and macOS Out-of-Bounds Write Vulnerability", "source": "cisa_kev", "timestamp": "2022-08-18", "split": "val"} +{"id": "6fc613bacf90d2de0ae0", "text": "CVE: CVE-2022-31145\n\n[{'lang': 'en', 'value': 'FlyteAdmin is the control plane for Flyte responsible for managing entities and administering workflow executions. In versions 1.1.30 and prior, authenticated users using an external identity provider can continue to use Access Tokens and ID Tokens even after they expire. Users who use FlyteAdmin as the OAuth2 Authorization Server are unaffected by this issue. A patch is available on the `master` branch of the repository. As a workaround, rotating s", "cve_id": "CVE-2022-31145", "title": "CVE-2022-31145", "source": "cvefixes", "timestamp": "2022-07-13", "split": "val"} +{"id": "667fafe90573b3cca42a", "text": "CVE: CVE-2022-29242\n\n[{'lang': 'en', 'value': 'GOST engine is a reference implementation of the Russian GOST crypto algorithms for OpenSSL. TLS clients using GOST engine when ciphersuite `TLS_GOSTR341112_256_WITH_KUZNYECHIK_CTR_OMAC` is agreed and the server uses 512 bit GOST secret keys are vulnerable to buffer overflow. GOST engine version 3.0.1 contains a patch for this issue. Disabling ciphersuite `TLS_GOSTR341112_256_WITH_KUZNYECHIK_CTR_OMAC` is a possible workaround.'}]\n\nFix commit: On unp", "cve_id": "CVE-2022-29242", "title": "CVE-2022-29242", "source": "cvefixes", "timestamp": "2022-05-24", "split": "val"} +{"id": "e91557c46bb31467bd53", "text": "[Cross-site Scripting (XSS) - Generic] CVE-2022-23520: Incomplete fix for CVE-2022-32209 (XSS in Rails::Html::Sanitizer under certain configurations)\n\nThe following is from: https://hackerone.com/reports/1654310\n\nWhile building a PoC for CVE-2022-32209, I noticed that I could not fix my vulnerable application by updating https://github.com/rails/rails-html-sanitizer from 1.4.2 to 1.4.3 even though the Hackerone report about this vulnerability suggested that this should fix it (see here: https://", "cve_id": "CVE-2022-32209", "title": "CVE-2022-23520: Incomplete fix for CVE-2022-32209 (XSS in Rails::Html::Sanitizer under certain configurations) (Cross-site Scripting (XSS) - Generic)", "source": "hackerone", "timestamp": "2023-01-04", "split": "val"} +{"id": "824d1c2274b56cc7569e", "text": "CVE: CVE-2022-22108\n\n[{'lang': 'en', 'value': 'In Daybyday CRM, versions 2.0.0 through 2.2.0 are vulnerable to Missing Authorization. An attacker that has the lowest privileges account (employee type user), can view the absences of all users in the system including administrators. This type of user is not authorized to view this kind of information.'}]\n\nFix commit: ensure only admin and owner can change role, and password, unless it is yourself", "cve_id": "CVE-2022-22108", "title": "CVE-2022-22108", "source": "cvefixes", "timestamp": "2022-01-05", "split": "val"} +{"id": "CVE-2023-34048", "text": "VMware vCenter Server Out-of-Bounds Write Vulnerability\n\nAffected: VMware vCenter Server\n\nVMware vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol that allows an attacker to conduct remote code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-787\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-34048", "title": "VMware vCenter Server Out-of-Bounds Write Vulnerability", "source": "cisa_kev", "timestamp": "2024-01-22", "split": "val"} +{"id": "3ab6d821d32b04fe2da0", "text": "[Improper Authentication - Generic] [nextcloud/server] Moment.js vulnerable to Inefficient Regular Expression Complexity\n\n## Describe the bugs: 🐛\nmoment is a lightweight JavaScript date library for parsing, validating, manipulating, and formatting dates. affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) via the preprocessRFC2822() function in from-string.js, when processing a very long crafted string (over 10k characters).\n\n**PoC:**\n```javascript\nmo", "cve_id": "CVE-2022-31129", "title": "[nextcloud/server] Moment.js vulnerable to Inefficient Regular Expression Complexity (Improper Authentication - Generic)", "source": "hackerone", "timestamp": "2022-12-09", "split": "val"} +{"id": "55e26f7708dff38db725", "text": "CVE: CVE-2022-2174\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Reflected in GitHub repository microweber/microweber prior to 1.2.18.'}]\n\nFix commit: update", "cve_id": "CVE-2022-2174", "title": "CVE-2022-2174", "source": "cvefixes", "timestamp": "2022-06-22", "split": "val"} +{"id": "108150f3d8ad55c6a48f", "text": "CVE: CVE-2022-2098\n\n[{'lang': 'en', 'value': 'Weak Password Requirements in GitHub repository kromitgmbh/titra prior to 0.78.1.'}]\n\nFix commit: 🔒 fixed further security vulnerabilities adding additional password validation\n💄 improved light and dark theme (thanks @thomas-kromit)", "cve_id": "CVE-2022-2098", "title": "CVE-2022-2098", "source": "cvefixes", "timestamp": "2022-06-16", "split": "val"} +{"id": "9aca647251d6b8f83fbf", "text": "CVE: CVE-2022-1000\n\n[{'lang': 'en', 'value': 'Path Traversal in GitHub repository prasathmani/tinyfilemanager prior to 2.4.7.'}]\n\nFix commit: apply fix to path traversal vulnerability (#718)\n\nCo-authored-by: João Maurício ", "cve_id": "CVE-2022-1000", "title": "CVE-2022-1000", "source": "cvefixes", "timestamp": "2022-03-17", "split": "val"} +{"id": "d7c25157ad42b68292e7", "text": "CVE: CVE-2022-2067\n\n[{'lang': 'en', 'value': 'SQL Injection in GitHub repository francoisjacquet/rosariosis prior to 9.0.'}]\n\nFix commit: Fix SQL injection escape DB identifier", "cve_id": "CVE-2022-2067", "title": "CVE-2022-2067", "source": "cvefixes", "timestamp": "2022-06-13", "split": "val"} +{"id": "cf963b04028bf00023d8", "text": "[Out-of-bounds Read] CVE-2022-35260: .netrc parser out-of-bounds access\n\n## Summary:\nCurl expects the .netrc file to have space characters. So if there is no space character, it will do an out-of-bounds read and a 1-byte out-of-bounds write.\nThis can happen multiple times depending on the state of the memory.\n\n## Steps To Reproduce:\n\n `curl --netrc-file .netrc test.local`\n\".netrc\" is attached.\nThe content is 'a' for 4095 bytes.\nDepending on memory conditions, even single-byte files can cause pr", "cve_id": "CVE-2022-35260", "title": "CVE-2022-35260: .netrc parser out-of-bounds access (Out-of-bounds Read)", "source": "hackerone", "timestamp": "2022-10-27", "split": "val"} +{"id": "CVE-2023-29492", "text": "Novi Survey Insecure Deserialization Vulnerability\n\nAffected: Novi Survey Novi Survey\n\nNovi Survey contains an insecure deserialization vulnerability that allows remote attackers to execute code on the server in the context of the service account.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-94\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-29492", "title": "Novi Survey Insecure Deserialization Vulnerability", "source": "cisa_kev", "timestamp": "2023-04-13", "split": "val"} +{"id": "e4d3006965c612982f59", "text": "CVE: CVE-2022-31026\n\n[{'lang': 'en', 'value': 'Trilogy is a client library for MySQL. When authenticating, a malicious server could return a specially crafted authentication packet, causing the client to read and return up to 12 bytes of data from an uninitialized variable in stack memory. Users of the trilogy gem should upgrade to version 2.1.1 This issue can be avoided by only connecting to trusted servers.'}]\n\nFix commit: Merge pull request from GHSA-5g4r-2qhx-vqfm\n\nVerify exact length of aut", "cve_id": "CVE-2022-31026", "title": "CVE-2022-31026", "source": "cvefixes", "timestamp": "2022-06-09", "split": "val"} +{"id": "6d1bc4cd42800ff7c014", "text": "CVE: CVE-2022-29582\n\n[{'lang': 'en', 'value': 'In the Linux kernel before 5.17.3, fs/io_uring.c has a use-after-free due to a race condition in io_uring timeouts. This can be triggered by a local user who has no access to any user namespace; however, the race condition perhaps can only be exploited infrequently.'}]\n\nFix commit: io_uring: fix race between timeout flush and removal\n\nio_flush_timeouts() assumes the timeout isn't in progress of triggering\nor being removed/canceled, so it uncondition", "cve_id": "CVE-2022-29582", "title": "CVE-2022-29582", "source": "cvefixes", "timestamp": "2022-04-22", "split": "val"} +{"id": "a8a09caf8ccb0fc238c9", "text": "CVE: CVE-2022-32547\n\n[{'lang': 'en', 'value': \"In ImageMagick, there is load of misaligned address for type 'double', which requires 8 byte alignment and for type 'float', which requires 4 byte alignment at MagickCore/property.c. Whenever crafted or untrusted input is processed by ImageMagick, this causes a negative impact to application availability or other problems related to undefined behavior.\"}]\n\nFix commit: fix #5033: runtime error: load of misaligned address (#5034)\n\n* fix Division by ze", "cve_id": "CVE-2022-32547", "title": "CVE-2022-32547", "source": "cvefixes", "timestamp": "2022-06-16", "split": "val"} +{"id": "f941e88231494a99e69d", "text": "CVE: CVE-2022-25299\n\n[{'lang': 'en', 'value': 'This affects the package cesanta/mongoose before 7.6. The unsafe handling of file names during upload using mg_http_upload() method may enable attackers to write files to arbitrary locations outside the designated target folder.'}]\n\nFix commit: Protect against the directory traversal in mg_upload()", "cve_id": "CVE-2022-25299", "title": "CVE-2022-25299", "source": "cvefixes", "timestamp": "2022-02-18", "split": "val"} +{"id": "01b8ec8bb80ae342970b", "text": "CVE: CVE-2022-0408\n\n[{'lang': 'en', 'value': 'Stack-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.4247: stack corruption when looking for spell suggestions\n\nProblem: Stack corruption when looking for spell suggestions.\nSolution: Prevent the depth increased too much. Add a five second time\n limit to finding suggestions.", "cve_id": "CVE-2022-0408", "title": "CVE-2022-0408", "source": "cvefixes", "timestamp": "2022-01-30", "split": "val"} +{"id": "e4fff38091f0d3b19d54", "text": "CVE: CVE-2022-31124\n\n[{'lang': 'en', 'value': \"openssh_key_parser is an open source Python package providing utilities to parse and pack OpenSSH private and public key files. In versions prior to 0.0.6 if a field of a key is shorter than it is declared to be, the parser raises an error with a message containing the raw field value. An attacker able to modify the declared length of a key's sensitive field can thus expose the raw value of that field. Users are advised to upgrade to version 0.0.6,", "cve_id": "CVE-2022-31124", "title": "CVE-2022-31124", "source": "cvefixes", "timestamp": "2022-07-06", "split": "val"} +{"id": "ea9dc159a1b6c6fd8bf0", "text": "CVE: CVE-2022-31063\n\n[{'lang': 'en', 'value': 'Tuleap is a Free & Open Source Suite to improve management of software developments and collaboration. In versions prior to 13.9.99.111 the title of a document is not properly escaped in the search result of MyDocmanSearch widget and in the administration page of the locked documents. A malicious user with the capability to create a document could force victim to execute uncontrolled code. Users are advised to upgrade. There are no known workarounds", "cve_id": "CVE-2022-31063", "title": "CVE-2022-31063", "source": "cvefixes", "timestamp": "2022-06-29", "split": "val"} +{"id": "8c44ed45ce15eddd6649", "text": "CVE: CVE-2022-21647\n\n[{'lang': 'en', 'value': 'CodeIgniter is an open source PHP full-stack web framework. Deserialization of Untrusted Data was found in the `old()` function in CodeIgniter4. Remote attackers may inject auto-loadable arbitrary objects with this vulnerability, and possibly execute existing PHP code on the server. We are aware of a working exploit, which can lead to SQL injection. Users are advised to upgrade to v4.1.6 or later. Users unable to upgrade as advised to not use the `o", "cve_id": "CVE-2022-21647", "title": "CVE-2022-21647", "source": "cvefixes", "timestamp": "2022-01-04", "split": "val"} +{"id": "CVE-2023-28461", "text": "Array Networks AG and vxAG ArrayOS Missing Authentication for Critical Function Vulnerability\n\nAffected: Array Networks AG/vxAG ArrayOS\n\nArray Networks AG and vxAG ArrayOS contain a missing authentication for critical function vulnerability that allows an attacker to read local files and execute code on the SSL VPN gateway.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-306\n\n[Source: C", "cve_id": "CVE-2023-28461", "title": "Array Networks AG and vxAG ArrayOS Missing Authentication for Critical Function Vulnerability", "source": "cisa_kev", "timestamp": "2024-11-25", "split": "val"} +{"id": "83ad5858d4415eb6d3aa", "text": "CVE: CVE-2022-25372\n\n[{'lang': 'en', 'value': 'Pritunl Client through 1.2.3019.52 on Windows allows local privilege escalation, related to an ACL entry for CREATOR OWNER in platform_windows.go.'}]\n\nFix commit: Update acl in service platform windows", "cve_id": "CVE-2022-25372", "title": "CVE-2022-25372", "source": "cvefixes", "timestamp": "2022-02-20", "split": "val"} +{"id": "CVE-2022-31199", "text": "Netwrix Auditor Insecure Object Deserialization Vulnerability\n\nAffected: Netwrix Auditor\n\nNetwrix Auditor User Activity Video Recording component contains an insecure objection deserialization vulnerability that allows an unauthenticated, remote attacker to execute code as the NT AUTHORITY\\SYSTEM user. Successful exploitation requires that the attacker is able to reach port 9004/TCP, which is commonly blocked by standard enterprise firewalling.\n\nRequired Action: Apply updates per vendor instruct", "cve_id": "CVE-2022-31199", "title": "Netwrix Auditor Insecure Object Deserialization Vulnerability", "source": "cisa_kev", "timestamp": "2023-07-11", "split": "val"} +{"id": "ae7fa344e0432e4ef3f2", "text": "CVE: CVE-2022-29212\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, certain TFLite models that were created using TFLite model converter would crash when loaded in the TFLite interpreter. The culprit is that during quantization the scale of values could be greater than 1 but code was always assuming sub-unit scaling. Thus, since code was calling `QuantizeMultiplierSmallerThanOneExp`, the `TFLITE_CHECK_LT` as", "cve_id": "CVE-2022-29212", "title": "CVE-2022-29212", "source": "cvefixes", "timestamp": "2022-05-21", "split": "val"} +{"id": "a7de21fbb0de1d8967a7", "text": "CVE: CVE-2022-24867\n\n[{'lang': 'en', 'value': 'GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. When you pass the config to the javascript, some entries are filtered out. The variable ldap_pass is not filtered and when you look at the source code of the rendered page, we can see the password for the root dn. Users are advised to upgrade. There is no known workaround for this issue.'}]\n\nFix commit: Do not e", "cve_id": "CVE-2022-24867", "title": "CVE-2022-24867", "source": "cvefixes", "timestamp": "2022-04-21", "split": "val"} +{"id": "86a3c0a235f5154eecb5", "text": "CVE: CVE-2022-35414\n\n[{'lang': 'en', 'value': 'softmmu/physmem.c in QEMU through 7.0.0 can perform an uninitialized read on the translate_fail path, leading to an io_readx or io_writex crash.'}]\n\nFix commit: target/loongarch: Clean up tlb when cpu reset\n\nWe should make sure that tlb is clean when cpu reset.\n\nSigned-off-by: Song Gao \nMessage-Id: <20220705070950.2364243-1-gaosong@loongson.cn>\nReviewed-by: Richard Henderson \nSigned-off-by: Richard", "cve_id": "CVE-2022-35414", "title": "CVE-2022-35414", "source": "cvefixes", "timestamp": "2022-07-11", "split": "val"} +{"id": "081ff65960e5b602cae5", "text": "CVE: CVE-2022-31003\n\n[{'lang': 'en', 'value': 'Sofia-SIP is an open-source Session Initiation Protocol (SIP) User-Agent library. Prior to version 1.13.8, when parsing each line of a sdp message, `rest = record + 2` will access the memory behind `\\\\0` and cause an out-of-bounds write. An attacker can send a message with evil sdp to FreeSWITCH, causing a crash or more serious consequence, such as remote code execution. Version 1.13.8 contains a patch for this issue.'}]\n\nFix commit: Merge pull requ", "cve_id": "CVE-2022-31003", "title": "CVE-2022-31003", "source": "cvefixes", "timestamp": "2022-05-31", "split": "val"} +{"id": "d65980a256b455411625", "text": "CVE: CVE-2022-0967\n\n[{'lang': 'en', 'value': 'Stored XSS via File Upload in star7th/showdoc in star7th/showdoc in GitHub repository star7th/showdoc prior to 2.10.4.'}]\n\nFix commit: Upload file vulnerability", "cve_id": "CVE-2022-0967", "title": "CVE-2022-0967", "source": "cvefixes", "timestamp": "2022-03-15", "split": "val"} +{"id": "3bf5846e53fe097e0619", "text": "CVE: CVE-2022-0712\n\n[{'lang': 'en', 'value': 'NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.4.'}]\n\nFix commit: Fix null deref in bin.symbols ##crash\n\n* Reported by cnitlrt via huntr.dev", "cve_id": "CVE-2022-0712", "title": "CVE-2022-0712", "source": "cvefixes", "timestamp": "2022-02-22", "split": "val"} +{"id": "CVE-2023-26360", "text": "Adobe ColdFusion Deserialization of Untrusted Data Vulnerability\n\nAffected: Adobe ColdFusion\n\nAdobe ColdFusion contains a deserialization of untrusted data vulnerability that allows for remote code execution.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-284\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-26360", "title": "Adobe ColdFusion Deserialization of Untrusted Data Vulnerability", "source": "cisa_kev", "timestamp": "2023-03-15", "split": "val"} +{"id": "CVE-2022-20699", "text": "Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability\n\nAffected: Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers\n\nA vulnerability in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code elevate privileges, execute arbitrary commands, bypass authentication and authorization protections, fetch and run unsigned software, or cause a denial of service (DoS).\n\nRequired", "cve_id": "CVE-2022-20699", "title": "Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability", "source": "cisa_kev", "timestamp": "2022-03-03", "split": "val"} +{"id": "CVE-2022-22954", "text": "VMware Workspace ONE Access and Identity Manager Server-Side Template Injection Vulnerability\n\nAffected: VMware Workspace ONE Access and Identity Manager\n\nVMware Workspace ONE Access and Identity Manager allow for remote code execution due to server-side template injection.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-94\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-22954", "title": "VMware Workspace ONE Access and Identity Manager Server-Side Template Injection Vulnerability", "source": "cisa_kev", "timestamp": "2022-04-14", "split": "val"} +{"id": "9ad3f2f2a439886599a9", "text": "CVE: CVE-2022-0719\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Reflected in GitHub repository microweber/microweber prior to 1.3.'}]\n\nFix commit: Update UrlManager.php", "cve_id": "CVE-2022-0719", "title": "CVE-2022-0719", "source": "cvefixes", "timestamp": "2022-02-23", "split": "val"} +{"id": "51822378693c768f9a96", "text": "CVE: CVE-2022-24900\n\n[{'lang': 'en', 'value': 'Piano LED Visualizer is software that allows LED lights to light up as a person plays a piano connected to a computer. Version 1.3 and prior are vulnerable to a path traversal attack. The `os.path.join` call is unsafe for use with untrusted input. When the `os.path.join` call encounters an absolute path, it ignores all the parameters it has encountered till that point and starts working with the new absolute path. Since the \"malicious\" parameter rep", "cve_id": "CVE-2022-24900", "title": "CVE-2022-24900", "source": "cvefixes", "timestamp": "2022-04-29", "split": "val"} +{"id": "1723215810fdca81029f", "text": "CVE: CVE-2022-0869\n\n[{'lang': 'en', 'value': 'Multiple Open Redirect in GitHub repository nitely/spirit prior to 0.12.3.'}]\n\nFix commit: fix unsafe redirect (#308)", "cve_id": "CVE-2022-0869", "title": "CVE-2022-0869", "source": "cvefixes", "timestamp": "2022-03-06", "split": "val"} +{"id": "907ef38ddbb22d304108", "text": "CVE: CVE-2022-31188\n\n[{'lang': 'en', 'value': 'CVAT is an opensource interactive video and image annotation tool for computer vision. Versions prior to 2.0.0 were found to be subject to a Server-side request forgery (SSRF) vulnerability. Validation has been added to urls used in the affected code path in version 2.0.0. Users are advised to upgrade. There are no known workarounds for this issue.'}]\n\nFix commit: Added validation for URLs which used as remote data source (#4387)", "cve_id": "CVE-2022-31188", "title": "CVE-2022-31188", "source": "cvefixes", "timestamp": "2022-08-01", "split": "val"} +{"id": "2460f8ad4303de984380", "text": "CVE: CVE-2022-21719\n\n[{'lang': 'en', 'value': 'GLPI is a free asset and IT management software package. All GLPI versions prior to 9.5.7 are vulnerable to reflected cross-site scripting. Version 9.5.7 contains a patch for this issue. There are no known workarounds.'}]\n\nFix commit: Merge pull request from GHSA-6cj4-g839-gj5j", "cve_id": "CVE-2022-21719", "title": "CVE-2022-21719", "source": "cvefixes", "timestamp": "2022-01-28", "split": "val"} +{"id": "0af3d242d1fce38b476a", "text": "CVE: CVE-2022-35923\n\n[{'lang': 'en', 'value': \"v8n is a javascript validation library. Versions of v8n prior to 1.5.1 were found to have an inefficient regular expression complexity in the `lowercase()` and `uppercase()` regex which could lead to a denial of service attack. In testing of the `lowercase()` function a payload of 'a' + 'a'.repeat(i) + 'A' with 32 leading characters took 29443 ms to execute. The same issue happens with uppercase(). Users are advised to upgrade. There are no known wo", "cve_id": "CVE-2022-35923", "title": "CVE-2022-35923", "source": "cvefixes", "timestamp": "2022-08-02", "split": "val"} +{"id": "a7cf36763985c5eba3f7", "text": "CVE: CVE-2022-1222\n\n[{'lang': 'en', 'value': 'Inf loop in GitHub repository gpac/gpac prior to 2.1.0-DEV.'}]\n\nFix commit: fixed #2159", "cve_id": "CVE-2022-1222", "title": "CVE-2022-1222", "source": "cvefixes", "timestamp": "2022-04-04", "split": "val"} +{"id": "b610cd7e072f79ede1ed", "text": "CVE: CVE-2022-0766\n\n[{'lang': 'en', 'value': 'Server-Side Request Forgery (SSRF) in GitHub repository janeczku/calibre-web prior to 0.6.17.'}]\n\nFix commit: Don't allow redirects on cover uploads, catch more addresses which resolve to localhost", "cve_id": "CVE-2022-0766", "title": "CVE-2022-0766", "source": "cvefixes", "timestamp": "2022-03-07", "split": "val"} +{"id": "CVE-2023-32315", "text": "Ignite Realtime Openfire Path Traversal Vulnerability\n\nAffected: Ignite Realtime Openfire\n\nIgnite Realtime Openfire contains a path traversal vulnerability that allows an unauthenticated attacker to access restricted pages in the Openfire Admin Console reserved for administrative users.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-22\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-32315", "title": "Ignite Realtime Openfire Path Traversal Vulnerability", "source": "cisa_kev", "timestamp": "2023-08-24", "split": "val"} +{"id": "d5354708a3ead99baf08", "text": "CVE: CVE-2022-24872\n\n[{'lang': 'en', 'value': 'Shopware is an open commerce platform based on Symfony Framework and Vue. Permissions set to sales channel context by admin-api are still usable within normal user session. Users are advised to update to the current version 6.4.10.1. For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. There are no known workarounds for this issue.'}]\n\nFix commit: NEXT-21034 - Dont restore permissions", "cve_id": "CVE-2022-24872", "title": "CVE-2022-24872", "source": "cvefixes", "timestamp": "2022-04-20", "split": "val"} +{"id": "CVE-2022-20700", "text": "Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability\n\nAffected: Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers\n\nA vulnerability in Cisco Small Business RV160, RV260, RV340, and RV345 Series Routers could allow an attacker to do any of the following: Execute arbitrary code elevate privileges, execute arbitrary commands, bypass authentication and authorization protections, fetch and run unsigned software, or cause a denial of service (DoS).\n\nRequired", "cve_id": "CVE-2022-20700", "title": "Cisco Small Business RV Series Routers Stack-based Buffer Overflow Vulnerability", "source": "cisa_kev", "timestamp": "2022-03-03", "split": "val"} +{"id": "8e3313b578eef3a73361", "text": "CVE: CVE-2022-25375\n\n[{'lang': 'en', 'value': 'An issue was discovered in drivers/usb/gadget/function/rndis.c in the Linux kernel before 5.16.10. The RNDIS USB gadget lacks validation of the size of the RNDIS_MSG_SET command. Attackers can obtain sensitive information from kernel memory.'}]\n\nFix commit: usb: gadget: rndis: check size of RNDIS_MSG_SET command\n\nCheck the size of the RNDIS_MSG_SET command given to us before\nattempting to respond to an invalid message size.\n\nReported-by: Szymon Heid", "cve_id": "CVE-2022-25375", "title": "CVE-2022-25375", "source": "cvefixes", "timestamp": "2022-02-20", "split": "val"} +{"id": "b4ee59952feb0680ff8d", "text": "CVE: CVE-2022-21738\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The implementation of `SparseCountSparseOutput` can be made to crash a TensorFlow process by an integer overflow whose result is then used in a memory allocation. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: Prevent crash due", "cve_id": "CVE-2022-21738", "title": "CVE-2022-21738", "source": "cvefixes", "timestamp": "2022-02-03", "split": "val"} +{"id": "d8f12c9af84b05e89afe", "text": "CVE: CVE-2022-1942\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.5043: can open a cmdline window from a substitute expression\n\nProblem: Can open a cmdline window from a substitute expression.\nSolution: Disallow opening a command line window when text or buffer is\n locked.", "cve_id": "CVE-2022-1942", "title": "CVE-2022-1942", "source": "cvefixes", "timestamp": "2022-05-31", "split": "val"} +{"id": "9f331a7b1c8ee35d4af4", "text": "CVE: CVE-2022-0515\n\n[{'lang': 'en', 'value': 'Cross-Site Request Forgery (CSRF) in GitHub repository crater-invoice/crater prior to 6.0.4.'}]\n\nFix commit: changed route method", "cve_id": "CVE-2022-0515", "title": "CVE-2022-0515", "source": "cvefixes", "timestamp": "2022-03-21", "split": "val"} +{"id": "c83e83d9facea2604f2c", "text": "CVE: CVE-2022-0430\n\n[{'lang': 'en', 'value': 'Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository httpie/httpie prior to 3.1.0.'}]\n\nFix commit: Implement new style cookies", "cve_id": "CVE-2022-0430", "title": "CVE-2022-0430", "source": "cvefixes", "timestamp": "2022-03-15", "split": "val"} +{"id": "e6978f200908099cd9c0", "text": "CVE: CVE-2022-1284\n\n[{'lang': 'en', 'value': 'heap-use-after-free in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of inducing denial of service.'}]\n\nFix commit: Fix UAF in `aaef` ##crash\n\n* Reported by @hdthky\n* Reproducer: uaf-aef\n* BountyID: e98ad92c-3a64-48fb-84d4-d13afdbcbdd7", "cve_id": "CVE-2022-1284", "title": "CVE-2022-1284", "source": "cvefixes", "timestamp": "2022-04-08", "split": "val"} +{"id": "CVE-2023-20963", "text": "Android Framework Privilege Escalation Vulnerability\n\nAffected: Android Framework\n\nAndroid Framework contains an unspecified vulnerability that allows for privilege escalation after updating an app to a higher Target SDK with no additional execution privileges needed.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-295\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-20963", "title": "Android Framework Privilege Escalation Vulnerability", "source": "cisa_kev", "timestamp": "2023-04-13", "split": "val"} +{"id": "2373c584178c891f85ad", "text": "CVE: CVE-2022-23596\n\n[{'lang': 'en', 'value': 'Junrar is an open source java RAR archive library. In affected versions A carefully crafted RAR archive can trigger an infinite loop while extracting said archive. The impact depends solely on how the application uses the library, and whether files can be provided by malignant users. The problem is patched in 7.4.1. There are no known workarounds and users are advised to upgrade as soon as possible.'}]\n\nFix commit: fix: invalid subheader type would", "cve_id": "CVE-2022-23596", "title": "CVE-2022-23596", "source": "cvefixes", "timestamp": "2022-02-01", "split": "val"} +{"id": "7c91ec78bc6f5973b220", "text": "CVE: CVE-2022-0265\n\n[{'lang': 'en', 'value': 'Improper Restriction of XML External Entity Reference in GitHub repository hazelcast/hazelcast in 5.1-BETA-1.'}]\n\nFix commit: Add helper method to XmlUtil to enable XXE protection in the SAXParserFactory and XMLInputFactory (#20407)", "cve_id": "CVE-2022-0265", "title": "CVE-2022-0265", "source": "cvefixes", "timestamp": "2022-03-03", "split": "val"} +{"id": "c81dcc241b42013db52c", "text": "CVE: CVE-2022-25358\n\n[{'lang': 'en', 'value': 'A ..%2F path traversal vulnerability exists in the path handler of awful-salmonella-tar before 0.0.4. Attackers can only list directories (not read files). This occurs because the safe-path? Scheme predicate is not used for directories.'}]\n\nFix commit: Fix path traversal vulnerability\n\nThis change fixes a path traversal vulnerability that would allow\nattackers to navigate through the filesystem of the server (provided\nexecute access to directories f", "cve_id": "CVE-2022-25358", "title": "CVE-2022-25358", "source": "cvefixes", "timestamp": "2022-02-18", "split": "val"} +{"id": "CVE-2022-48503", "text": "Apple Multiple Products Unspecified Vulnerability\n\nAffected: Apple Multiple Products\n\nApple macOS, iOS, tvOS, Safari, and watchOS contain an unspecified vulnerability in JavaScriptCore that when processing web content may lead to arbitrary code execution. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or", "cve_id": "CVE-2022-48503", "title": "Apple Multiple Products Unspecified Vulnerability", "source": "cisa_kev", "timestamp": "2025-10-20", "split": "val"} +{"id": "CVE-2022-22536", "text": "SAP Multiple Products HTTP Request Smuggling Vulnerability\n\nAffected: SAP Multiple Products\n\nSAP NetWeaver Application Server ABAP, SAP NetWeaver Application Server Java, ABAP Platform, SAP Content Server and SAP Web Dispatcher allow HTTP request smuggling. An unauthenticated attacker can prepend a victim's request with arbitrary data, allowing for function execution impersonating the victim or poisoning intermediary Web caches.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): C", "cve_id": "CVE-2022-22536", "title": "SAP Multiple Products HTTP Request Smuggling Vulnerability", "source": "cisa_kev", "timestamp": "2022-08-18", "split": "val"} +{"id": "cb191eeef4e2a322b0f4", "text": "CVE: CVE-2022-24750\n\n[{'lang': 'en', 'value': 'UltraVNC is a free and open source remote pc access software. A vulnerability has been found in versions prior to 1.3.8.0 in which the DSM plugin module, which allows a local authenticated user to achieve local privilege escalation (LPE) on a vulnerable system. The vulnerability has been fixed to allow loading of plugins from the installed directory. Affected users should upgrade their UltraVNC to 1.3.8.0. Users unable to upgrade should not install", "cve_id": "CVE-2022-24750", "title": "CVE-2022-24750", "source": "cvefixes", "timestamp": "2022-03-10", "split": "val"} +{"id": "36e2299c8ae252156bea", "text": "CVE: CVE-2022-2000\n\n[{'lang': 'en', 'value': 'Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.5063: error for a command may go over the end of IObuff\n\nProblem: Error for a command may go over the end of IObuff.\nSolution: Truncate the message.", "cve_id": "CVE-2022-2000", "title": "CVE-2022-2000", "source": "cvefixes", "timestamp": "2022-06-09", "split": "val"} +{"id": "CVE-2023-41763", "text": "Microsoft Skype for Business Privilege Escalation Vulnerability\n\nAffected: Microsoft Skype for Business\n\nMicrosoft Skype for Business contains an unspecified vulnerability that allows for privilege escalation.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-918\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-41763", "title": "Microsoft Skype for Business Privilege Escalation Vulnerability", "source": "cisa_kev", "timestamp": "2023-10-10", "split": "val"} +{"id": "48c257bdb4229396cf74", "text": "CVE: CVE-2022-31046\n\n[{'lang': 'en', 'value': 'TYPO3 is an open source web content management system. Prior to versions 7.6.57 ELTS, 8.7.47 ELTS, 9.5.34 ELTS, 10.4.29, and 11.5.11, the export functionality fails to limit the result set to allowed columns of a particular database table. This way, authenticated users can export internal details of database tables they already have access to. TYPO3 versions 7.6.57 ELTS, 8.7.47 ELTS, 9.5.34 ELTS, 10.4.29, 11.5.11 fix the problem described above. In", "cve_id": "CVE-2022-31046", "title": "CVE-2022-31046", "source": "cvefixes", "timestamp": "2022-06-14", "split": "val"} +{"id": "c52ac295eaf9e1e8bce6", "text": "CVE: CVE-2022-33068\n\n[{'lang': 'en', 'value': 'An integer overflow in the component hb-ot-shape-fallback.cc of Harfbuzz v4.3.0 allows attackers to cause a Denial of Service (DoS) via unspecified vectors.'}]\n\nFix commit: [sbix] Limit glyph extents\n\nFixes https://github.com/harfbuzz/harfbuzz/issues/3557", "cve_id": "CVE-2022-33068", "title": "CVE-2022-33068", "source": "cvefixes", "timestamp": "2022-06-23", "split": "val"} +{"id": "68bc553fe3cef9a170bf", "text": "CVE: CVE-2022-1033\n\n[{'lang': 'en', 'value': 'Unrestricted Upload of File with Dangerous Type in GitHub repository crater-invoice/crater prior to 6.0.6.'}]\n\nFix commit: Expense attachment validation fix (#855)\n\nhttps://huntr.dev/bounties/4d7d4fc9-e0cf-42d3-b89c-6ea57a769045/", "cve_id": "CVE-2022-1033", "title": "CVE-2022-1033", "source": "cvefixes", "timestamp": "2022-03-23", "split": "val"} +{"id": "954093f4ad0121ae4429", "text": "CVE: CVE-2022-29859\n\n[{'lang': 'en', 'value': 'component/common/network/dhcp/dhcps.c in ambiot amb1_sdk (aka SDK for Ameba1) before 2022-03-11 mishandles data structures for DHCP packet data.'}]\n\nFix commit: [dhcps] update dhcps", "cve_id": "CVE-2022-29859", "title": "CVE-2022-29859", "source": "cvefixes", "timestamp": "2022-04-27", "split": "val"} +{"id": "65816ffd21f992a2f48a", "text": "CVE: CVE-2022-31093\n\n[{'lang': 'en', 'value': 'NextAuth.js is a complete open source authentication solution for Next.js applications. In affected versions an attacker can send a request to an app using NextAuth.js with an invalid `callbackUrl` query parameter, which internally is converted to a `URL` object. The URL instantiation would fail due to a malformed URL being passed into the constructor, causing it to throw an unhandled error which led to the **API route handler timing out and logging", "cve_id": "CVE-2022-31093", "title": "CVE-2022-31093", "source": "cvefixes", "timestamp": "2022-06-27", "split": "val"} +{"id": "ca26d7cfd60eec979f05", "text": "CVE: CVE-2022-0436\n\n[{'lang': 'en', 'value': 'Path Traversal in GitHub repository gruntjs/grunt prior to 1.5.2.'}]\n\nFix commit: Update dependencies, tests...", "cve_id": "CVE-2022-0436", "title": "CVE-2022-0436", "source": "cvefixes", "timestamp": "2022-04-12", "split": "val"} +{"id": "CVE-2022-30333", "text": "RARLAB UnRAR Directory Traversal Vulnerability\n\nAffected: RARLAB UnRAR\n\nRARLAB UnRAR on Linux and UNIX contains a directory traversal vulnerability, allowing an attacker to write to files during an extract (unpack) operation.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-22, CWE-59\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-30333", "title": "RARLAB UnRAR Directory Traversal Vulnerability", "source": "cisa_kev", "timestamp": "2022-08-09", "split": "val"} +{"id": "dacdef0012d8bd119078", "text": "CVE: CVE-2022-24813\n\n[{'lang': 'en', 'value': \"CreateWiki is Miraheze's MediaWiki extension for requesting & creating wikis. Without the patch for this issue, anonymous comments can be made using Special:RequestWikiQueue when sent directly via POST. A patch for this issue is available in the `master` branch of CreateWiki's GitHub repository.\"}]\n\nFix commit: T9018: Add submission check for anonymous users POSTing", "cve_id": "CVE-2022-24813", "title": "CVE-2022-24813", "source": "cvefixes", "timestamp": "2022-04-04", "split": "val"} +{"id": "2ffa3d2e1ce4fab1ba83", "text": "CVE: CVE-2022-31137\n\n[{'lang': 'en', 'value': 'Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Versions prior to 6.1.1.0 are subject to a remote code execution vulnerability. System commands can be run remotely via the subprocess_execute function without processing the inputs received from the user in the /app/options.py file. Attackers need not be authenticated to exploit this vulnerability. Users are advised to upgrade. There are no known workarounds for", "cve_id": "CVE-2022-31137", "title": "CVE-2022-31137", "source": "cvefixes", "timestamp": "2022-07-08", "split": "val"} +{"id": "a180faec44128783128d", "text": "[Information Disclosure] CVE-2022-27775: Bad local IPv6 connection reuse\n\n## Summary:\ncurl/libcurl doesn't consider IPv6 address zone index when doing connection reuse. if connection exists to specific IPv6 address (and other conditions for connection reuse are fulfilled) it will be reused for connections regardless of the zone index.\n\n## Steps To Reproduce:\n\n 1. Set up a fake server: `echo -ne 'HTTP/1.1 200 OK\\r\\nContent-Length: 6\\r\\n\\r\\nHello\\n' | nc -6 -v -l -p 9999`\n 2. curl \"http://[ipv6a", "cve_id": "CVE-2022-27775", "title": "CVE-2022-27775: Bad local IPv6 connection reuse (Information Disclosure)", "source": "hackerone", "timestamp": "2022-04-29", "split": "val"} +{"id": "0371b2e1dcb9f86d8557", "text": "CVE: CVE-2022-25051\n\n[{'lang': 'en', 'value': 'An Off-by-one Error occurs in cmr113_decode of rtl_433 21.12 when decoding a crafted file.'}]\n\nFix commit: minor: Fix overflow in Clipsal-CMR113 and Somfy-IOHC reported by aug5t7", "cve_id": "CVE-2022-25051", "title": "CVE-2022-25051", "source": "cvefixes", "timestamp": "2022-03-02", "split": "val"} +{"id": "8a3bdeeb9be520069ac5", "text": "CVE: CVE-2022-0536\n\n[{'lang': 'en', 'value': 'Exposure of Sensitive Information to an Unauthorized Actor in NPM follow-redirects prior to 1.14.8.'}]\n\nFix commit: Drop confidential headers across schemes.", "cve_id": "CVE-2022-0536", "title": "CVE-2022-0536", "source": "cvefixes", "timestamp": "2022-02-09", "split": "val"} +{"id": "9b71b2d7b1d937bd8ad5", "text": "CVE: CVE-2022-21654\n\n[{'lang': 'en', 'value': \"Envoy is an open source edge and service proxy, designed for cloud-native applications. Envoy's tls allows re-use when some cert validation settings have changed from their default configuration. The only workaround for this issue is to ensure that default tls settings are used. Users are advised to upgrade.\"}]\n\nFix commit: CVE-2022-21654\n\ntls allows re-use when some cert validation settings have changed\n\nSigned-off-by: Yan Avlasov 12 (Issue #463)", "cve_id": "CVE-2022-0534", "title": "CVE-2022-0534", "source": "cvefixes", "timestamp": "2022-02-09", "split": "val"} +{"id": "68152050db4bf79184ae", "text": "[HTTP Request Smuggling] CVE-2022-32214 - HTTP Request Smuggling Due To Improper Delimiting of Header Fields\n\nOriginal Report: https://hackerone.com/reports/1524692\n\n## Impact\n\nDepending on the specific web application, HRS can lead to cache poisoning, bypassing of security layers, stealing of credentials and so on.", "cve_id": "CVE-2022-32214", "title": "CVE-2022-32214 - HTTP Request Smuggling Due To Improper Delimiting of Header Fields (HTTP Request Smuggling)", "source": "hackerone", "timestamp": "2022-07-22", "split": "val"} +{"id": "d572d3076b7743eb1475", "text": "CVE: CVE-2022-0930\n\n[{'lang': 'en', 'value': 'File upload filter bypass leading to stored XSS in GitHub repository microweber/microweber prior to 1.2.12.'}]\n\nFix commit: make plupload only allowed files", "cve_id": "CVE-2022-0930", "title": "CVE-2022-0930", "source": "cvefixes", "timestamp": "2022-03-12", "split": "val"} +{"id": "a7ef1a4517a09d4ab10d", "text": "CVE: CVE-2022-29216\n\n[{'lang': 'en', 'value': \"TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, TensorFlow's `saved_model_cli` tool is vulnerable to a code injection. This can be used to open a reverse shell. This code path was maintained for compatibility reasons as the maintainers had several test cases where numpy expressions were used as arguments. However, given that the tool is always run manually, the impact of this is still not", "cve_id": "CVE-2022-29216", "title": "CVE-2022-29216", "source": "cvefixes", "timestamp": "2022-05-21", "split": "val"} +{"id": "6a5ab9ea45e6ce9192ac", "text": "CVE: CVE-2022-1212\n\n[{'lang': 'en', 'value': 'Use-After-Free in str_escape in mruby/mruby in GitHub repository mruby/mruby prior to 3.2. Possible arbitrary code execution if being exploited.'}]\n\nFix commit: vm.c: create break object before clearing GC arena.\n\nOtherwise it possibly cause use-after-free.", "cve_id": "CVE-2022-1212", "title": "CVE-2022-1212", "source": "cvefixes", "timestamp": "2022-04-05", "split": "val"} +{"id": "2f142a9631ed939217cf", "text": "[Uncontrolled Resource Consumption] [CVE-2023-22796] Possible ReDoS based DoS vulnerability in Active Support’s underscore\n\nI reported at https://hackerone.com/reports/1681972\n\nhttps://discuss.rubyonrails.org/t/cve-2023-22796-possible-redos-based-dos-vulnerability-in-active-supports-underscore/82116\n> A specially crafted string passed to the underscore method can cause the regular expression engine to enter a state of catastrophic backtracking. This can cause the process to use large amounts of", "cve_id": "CVE-2023-22796", "title": "[CVE-2023-22796] Possible ReDoS based DoS vulnerability in Active Support’s underscore (Uncontrolled Resource Consumption)", "source": "hackerone", "timestamp": "2023-07-27", "split": "val"} +{"id": "CVE-2023-29357", "text": "Microsoft SharePoint Server Privilege Escalation Vulnerability\n\nAffected: Microsoft SharePoint Server\n\nMicrosoft SharePoint Server contains an unspecified vulnerability that allows an unauthenticated attacker, who has gained access to spoofed JWT authentication tokens, to use them for executing a network attack. This attack bypasses authentication, enabling the attacker to gain administrator privileges.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product", "cve_id": "CVE-2023-29357", "title": "Microsoft SharePoint Server Privilege Escalation Vulnerability", "source": "cisa_kev", "timestamp": "2024-01-10", "split": "val"} +{"id": "c6277e89f7c8efd1f424", "text": "CVE: CVE-2022-1233\n\n[{'lang': 'en', 'value': 'URL Confusion When Scheme Not Supplied in GitHub repository medialize/uri.js prior to 1.19.11.'}]\n\nFix commit: fix(parse): handle excessive slashes in scheme-relative URLs\n\nreported by @zeyu2001 via huntr.dev", "cve_id": "CVE-2022-1233", "title": "CVE-2022-1233", "source": "cvefixes", "timestamp": "2022-04-04", "split": "val"} +{"id": "4cb1487853de332c4501", "text": "CVE: CVE-2022-0686\n\n[{'lang': 'en', 'value': 'Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.8.'}]\n\nFix commit: [fix] Handle the case where the port is specified but empty", "cve_id": "CVE-2022-0686", "title": "CVE-2022-0686", "source": "cvefixes", "timestamp": "2022-02-20", "split": "val"} +{"id": "2af1e5f4b9e427ba225f", "text": "CVE: CVE-2022-0921\n\n[{'lang': 'en', 'value': 'Abusing Backup/Restore feature to achieve Remote Code Execution in GitHub repository microweber/microweber prior to 1.2.12.'}]\n\nFix commit: secure upgrade on php files upload", "cve_id": "CVE-2022-0921", "title": "CVE-2022-0921", "source": "cvefixes", "timestamp": "2022-03-11", "split": "val"} +{"id": "30118d590c57509a34a7", "text": "CVE: CVE-2022-23067\n\n[{'lang': 'en', 'value': 'ToolJet versions v0.5.0 to v1.2.2 are vulnerable to token leakage via Referer header that leads to account takeover . If the user opens the invite link/signup link and then clicks on any external links within the page, it leaks the password set token/signup token in the referer header. Using these tokens the attacker can access the user’s account.'}]\n\nFix commit: Fix token present in referrer header (#2413)", "cve_id": "CVE-2022-23067", "title": "CVE-2022-23067", "source": "cvefixes", "timestamp": "2022-05-18", "split": "val"} +{"id": "CVE-2022-35405", "text": "Zoho ManageEngine Multiple Products Remote Code Execution Vulnerability\n\nAffected: Zoho ManageEngine\n\nZoho ManageEngine PAM360, Password Manager Pro, and Access Manager Plus contain an unspecified vulnerability that allows for remote code execution.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-35405", "title": "Zoho ManageEngine Multiple Products Remote Code Execution Vulnerability", "source": "cisa_kev", "timestamp": "2022-09-22", "split": "val"} +{"id": "d7d47f9b26b88994fdc1", "text": "CVE: CVE-2022-0575\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in Packagist librenms/librenms prior to 22.2.0.'}]\n\nFix commit: XSS fix, cont. (#13776)\n\nhttps://huntr.dev/bounties/13951f51-deed-4a3d-8275-52306cc5a87d/", "cve_id": "CVE-2022-0575", "title": "CVE-2022-0575", "source": "cvefixes", "timestamp": "2022-02-14", "split": "val"} +{"id": "CVE-2023-41993", "text": "Apple Multiple Products WebKit Code Execution Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, and Safari WebKit contain an unspecified vulnerability that leads to code execution when processing maliciously crafted web content. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue u", "cve_id": "CVE-2023-41993", "title": "Apple Multiple Products WebKit Code Execution Vulnerability", "source": "cisa_kev", "timestamp": "2023-09-25", "split": "val"} +{"id": "CVE-2022-22963", "text": "VMware Tanzu Spring Cloud Function Remote Code Execution Vulnerability\n\nAffected: VMware Tanzu Spring Cloud\n\nWhen using routing functionality in VMware Tanzu's Spring Cloud Function, it is possible for a user to provide a specially crafted SpEL as a routing-expression that may result in remote code execution and access to local resources.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-94\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-22963", "title": "VMware Tanzu Spring Cloud Function Remote Code Execution Vulnerability", "source": "cisa_kev", "timestamp": "2022-08-25", "split": "val"} +{"id": "47c7b768a11bb7071ad2", "text": "CVE: CVE-2022-1621\n\n[{'lang': 'en', 'value': 'Heap buffer overflow in vim_strncpy find_word in GitHub repository vim/vim prior to 8.2.4919. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution'}]\n\nFix commit: patch 8.2.4919: can add invalid bytes with :spellgood\n\nProblem: Can add invalid bytes with :spellgood.\nSolution: Check for a valid word string.", "cve_id": "CVE-2022-1621", "title": "CVE-2022-1621", "source": "cvefixes", "timestamp": "2022-05-10", "split": "val"} +{"id": "CVE-2023-36845", "text": "Juniper Junos OS EX Series and SRX Series PHP External Variable Modification Vulnerability\n\nAffected: Juniper Junos OS\n\nJuniper Junos OS on EX Series and SRX Series contains a PHP external variable modification vulnerability that allows an unauthenticated, network-based attacker to control an important environment variable. Using a crafted request, which sets the variable PHPRC, an attacker is able to modify the PHP execution environment allowing the injection und execution of code.\n\nRequired Ac", "cve_id": "CVE-2023-36845", "title": "Juniper Junos OS EX Series and SRX Series PHP External Variable Modification Vulnerability", "source": "cisa_kev", "timestamp": "2023-11-13", "split": "val"} +{"id": "6bb05a4fd0b20ffc4761", "text": "CVE: CVE-2022-32200\n\n[{'lang': 'en', 'value': 'libdwarf 0.4.0 has a heap-based buffer over-read in _dwarf_check_string_valid in dwarf_util.c.'}]\n\nFix commit: Fixes vulnerability DW202205-001\nReports error instead of crashing the when reading\na specially crafted (corrupted) .debug_pubnames\nor .debug_pubtypes section.\n\tmodified: src/lib/libdwarf/dwarf_global.c", "cve_id": "CVE-2022-32200", "title": "CVE-2022-32200", "source": "cvefixes", "timestamp": "2022-06-02", "split": "val"} +{"id": "d2fc7029030b53dacf98", "text": "CVE: CVE-2022-35921\n\n[{'lang': 'en', 'value': \"fof/byobu is a private discussions extension for Flarum forum. Affected versions were found to not respect private discussion disablement by users. Users of Byobu should update the extension to version 1.1.7, where this has been patched. Users of Byobu with Flarum 1.0 or 1.1 should upgrade to Flarum 1.2 or later, or evaluate the impact this issue has on your forum's users and choose to disable the extension if needed. There are no workarounds for th", "cve_id": "CVE-2022-35921", "title": "CVE-2022-35921", "source": "cvefixes", "timestamp": "2022-08-01", "split": "val"} +{"id": "0f21969d102e821b5dec", "text": "CVE: CVE-2022-0578\n\n[{'lang': 'en', 'value': 'Code Injection in GitHub repository publify/publify prior to 9.2.8.'}]\n\nFix commit: Do not allow images in comments", "cve_id": "CVE-2022-0578", "title": "CVE-2022-0578", "source": "cvefixes", "timestamp": "2022-05-16", "split": "val"} +{"id": "CVE-2023-36025", "text": "Microsoft Windows SmartScreen Security Feature Bypass Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows SmartScreen contains a security feature bypass vulnerability that could allow an attacker to bypass Windows Defender SmartScreen checks and their associated prompts.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-36025", "title": "Microsoft Windows SmartScreen Security Feature Bypass Vulnerability", "source": "cisa_kev", "timestamp": "2023-11-14", "split": "val"} +{"id": "9ce947da195b7f38e772", "text": "CVE: CVE-2022-0372\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in Packagist bytefury/crater prior to 6.0.2.'}]\n\nFix commit: Unrestricted php file upload fix (#681)\n\nhttps://huntr.dev/bounties/d7453360-baca-4e56-985f-481275fa38db/", "cve_id": "CVE-2022-0372", "title": "CVE-2022-0372", "source": "cvefixes", "timestamp": "2022-01-27", "split": "val"} +{"id": "1fc493d420d577ab7b80", "text": "CVE: CVE-2022-21711\n\n[{'lang': 'en', 'value': 'elfspirit is an ELF static analysis and injection framework that parses, manipulates, and camouflages ELF files. When analyzing the ELF file format in versions prior to 1.1, there is an out-of-bounds read bug, which can lead to application crashes or information leakage. By constructing a special format ELF file, the information of any address can be leaked. elfspirit version 1.1 contains a patch for this issue.'}]\n\nFix commit: Fix #1 about out-of-b", "cve_id": "CVE-2022-21711", "title": "CVE-2022-21711", "source": "cvefixes", "timestamp": "2022-01-24", "split": "val"} +{"id": "18ad3ace092f34dad9c5", "text": "CVE: CVE-2022-31086\n\n[{'lang': 'en', 'value': 'LDAP Account Manager (LAM) is a webfrontend for managing entries (e.g. users, groups, DHCP settings) stored in an LDAP directory. In versions prior to 8.0 incorrect regular expressions allow to upload PHP scripts to config/templates/pdf. This vulnerability could lead to a Remote Code Execution if the /config/templates/pdf/ directory is accessible for remote users. This is not a default configuration of LAM. This issue has been fixed in version 8.0.", "cve_id": "CVE-2022-31086", "title": "CVE-2022-31086", "source": "cvefixes", "timestamp": "2022-06-27", "split": "val"} +{"id": "4a9d148588885be5fc8a", "text": "[Uncontrolled Resource Consumption] CVE-2022-27781: CERTINFO never-ending busy-loop\n\n## Summary:\nCurl is prone to a DoS attack in case the NSS TLS library is used and the CERTINFO option is enabled. Using maliciously crafted certificates on a server, an attacker can make curl run into an endless loop when connecting to the server. The bug is located in the following code segment (https://github.com/curl/curl/blob/master/lib/vtls/nss.c#L1014):\n\n```\n/* Count certificates in chain. */\nint i = 1;\nno", "cve_id": "CVE-2022-27781", "title": "CVE-2022-27781: CERTINFO never-ending busy-loop (Uncontrolled Resource Consumption)", "source": "hackerone", "timestamp": "2022-05-16", "split": "val"} +{"id": "bd919786a3e08ffeedc2", "text": "CVE: CVE-2022-2285\n\n[{'lang': 'en', 'value': 'Integer Overflow or Wraparound in GitHub repository vim/vim prior to 9.0.'}]\n\nFix commit: patch 9.0.0018: going over the end of the typahead\n\nProblem: Going over the end of the typahead.\nSolution: Put a NUL after the typeahead.", "cve_id": "CVE-2022-2285", "title": "CVE-2022-2285", "source": "cvefixes", "timestamp": "2022-07-02", "split": "val"} +{"id": "c7f4cce90039da2030a2", "text": "CVE: CVE-2022-2073\n\n[{'lang': 'en', 'value': 'Code Injection in GitHub repository getgrav/grav prior to 1.7.34.'}]\n\nFix commit: Fixed Twig `|filter()` allowing code execution", "cve_id": "CVE-2022-2073", "title": "CVE-2022-2073", "source": "cvefixes", "timestamp": "2022-06-29", "split": "val"} +{"id": "94c2659a0b83649bafd6", "text": "CVE: CVE-2022-1451\n\n[{'lang': 'en', 'value': 'Out-of-bounds Read in r_bin_java_constant_value_attr_new function in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end 2f the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. More details see [CWE-125: Out-of-bounds read](https://cwe.mitre.org/data/definitions/125.html).'}]\n\nFix commit: Fix oobread crash in java parser", "cve_id": "CVE-2022-1451", "title": "CVE-2022-1451", "source": "cvefixes", "timestamp": "2022-04-24", "split": "val"} +{"id": "CVE-2023-4911", "text": "GNU C Library Buffer Overflow Vulnerability\n\nAffected: GNU GNU C Library\n\nGNU C Library's dynamic loader ld.so contains a buffer overflow vulnerability when processing the GLIBC_TUNABLES environment variable, allowing a local attacker to execute code with elevated privileges.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-122\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-4911", "title": "GNU C Library Buffer Overflow Vulnerability", "source": "cisa_kev", "timestamp": "2023-11-21", "split": "val"} +{"id": "6a7f45f9f318977162a7", "text": "[Unknown] Rack CVE-2022-30122: Denial of Service Vulnerability in Rack Multipart Parsing\n\nReDoS in `Rack::Multipart::BROKEN_QUOTED` and `Rack::Multipart::BROKEN_UNQUOTED`.\n\n\nhttps://groups.google.com/g/ruby-security-ann/c/L2Axto442qk\n> Carefully crafted multipart POST requests can cause Rack's multipart parser to take much longer than expected, leading to a possible denial of service vulnerability.\n\n## Impact\n\nWhen the client sends a specially crafted header, it occur ReDoS on the server side.\nS", "cve_id": "CVE-2022-30122", "title": "Rack CVE-2022-30122: Denial of Service Vulnerability in Rack Multipart Parsing (Unknown)", "source": "hackerone", "timestamp": "2022-07-23", "split": "val"} +{"id": "b11eea756781faf16341", "text": "CVE: CVE-2022-1848\n\n[{'lang': 'en', 'value': 'Business Logic Errors in GitHub repository erudika/para prior to 1.45.11.'}]\n\nFix commit: fixed password length issues", "cve_id": "CVE-2022-1848", "title": "CVE-2022-1848", "source": "cvefixes", "timestamp": "2022-05-24", "split": "val"} +{"id": "61ab8f79486c26990c61", "text": "CVE: CVE-2022-24799\n\n[{'lang': 'en', 'value': 'wire-webapp is the web application interface for the wire messaging service. Insufficient escaping in markdown “code highlighting” in the wire-webapp resulted in the possibility of injecting and executing arbitrary HTML code and thus also JavaScript. If a user receives and views such a malicious message, arbitrary code is injected and executed in the context of the victim. This allows the attacker to fully control the user account. Wire-desktop clie", "cve_id": "CVE-2022-24799", "title": "CVE-2022-24799", "source": "cvefixes", "timestamp": "2022-04-20", "split": "val"} +{"id": "5cd14aab09a9578b3df7", "text": "CVE: CVE-2022-27649\n\n[{'lang': 'en', 'value': 'A flaw was found in Podman, where containers were started incorrectly with non-empty default permissions. A vulnerability was found in Moby (Docker Engine), where containers were started incorrectly with non-empty inheritable Linux process capabilities. This flaw allows an attacker with access to programs with inheritable file capabilities to elevate those capabilities to the permitted set when execve(2) runs.'}]\n\nFix commit: do not set the inherita", "cve_id": "CVE-2022-27649", "title": "CVE-2022-27649", "source": "cvefixes", "timestamp": "2022-04-04", "split": "val"} +{"id": "f17f0576b97ae84593eb", "text": "CVE: CVE-2022-23609\n\n[{'lang': 'en', 'value': 'iTunesRPC-Remastered is a Discord Rich Presence for iTunes on Windows utility. In affected versions iTunesRPC-Remastered did not properly sanitize user input used to remove files leading to file deletion only limited by the process permissions. Users are advised to upgrade as soon as possible.'}]\n\nFix commit: quick security fix", "cve_id": "CVE-2022-23609", "title": "CVE-2022-23609", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val"} +{"id": "2466e8e1952922dc542c", "text": "CVE: CVE-2022-21725\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The estimator for the cost of some convolution operations can be made to execute a division by 0. The function fails to check that the stride argument is strictly positive. Hence, the fix is to add a check for the stride argument to ensure it is valid. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3,", "cve_id": "CVE-2022-21725", "title": "CVE-2022-21725", "source": "cvefixes", "timestamp": "2022-02-03", "split": "val"} +{"id": "b251fde4a149458d4dc4", "text": "CVE: CVE-2022-0437\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - DOM in NPM karma prior to 6.3.14.'}]\n\nFix commit: fix(security): remove XSS vulnerability in `returnUrl` query param\n\nThe `returnUrl` query parameter can be used to execute malicious code. For\nexample, visiting\n`http://localhost:9876/?return_url=javascript:alert(document.domain)` will\ndisplay an alert.", "cve_id": "CVE-2022-0437", "title": "CVE-2022-0437", "source": "cvefixes", "timestamp": "2022-02-05", "split": "val"} +{"id": "3b4234c7d4100367921d", "text": "CVE: CVE-2022-24732\n\n[{'lang': 'en', 'value': 'Maddy Mail Server is an open source SMTP compatible email server. Versions of maddy prior to 0.5.4 do not implement password expiry or account expiry checking when authenticating using PAM. Users are advised to upgrade. Users unable to upgrade should manually remove expired accounts via existing filtering mechanisms.'}]\n\nFix commit: auth/pam: Check for account/password expiry\n\nSee GHSA-6cp7-g972-w9m9. Thanks Youssef Rebahi-Gilbert (ysf) for\nreportin", "cve_id": "CVE-2022-24732", "title": "CVE-2022-24732", "source": "cvefixes", "timestamp": "2022-03-09", "split": "val"} +{"id": "218340ec424837d025ac", "text": "CVE: CVE-2022-0576\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Generic in Packagist librenms/librenms prior to 22.1.0.'}]\n\nFix commit: security - XSS Fix 01\n\nfixing https://huntr.dev/bounties/114ba055-a2f0-4db9-aafb-95df944ba177/ (#13775)", "cve_id": "CVE-2022-0576", "title": "CVE-2022-0576", "source": "cvefixes", "timestamp": "2022-02-14", "split": "val"} +{"id": "CVE-2023-20269", "text": "Cisco Adaptive Security Appliance and Firepower Threat Defense Unauthorized Access Vulnerability\n\nAffected: Cisco Adaptive Security Appliance and Firepower Threat Defense\n\nCisco Adaptive Security Appliance and Firepower Threat Defense contain an unauthorized access vulnerability that could allow an unauthenticated, remote attacker to conduct a brute force attack in an attempt to identify valid username and password combinations or establish a clientless SSL VPN session with an unauthorized user.", "cve_id": "CVE-2023-20269", "title": "Cisco Adaptive Security Appliance and Firepower Threat Defense Unauthorized Access Vulnerability", "source": "cisa_kev", "timestamp": "2023-09-13", "split": "val"} +{"id": "CVE-2022-29499", "text": "Mitel MiVoice Connect Data Validation Vulnerability\n\nAffected: Mitel MiVoice Connect\n\nThe Service Appliance component in Mitel MiVoice Connect allows remote code execution due to incorrect data validation.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-20\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-29499", "title": "Mitel MiVoice Connect Data Validation Vulnerability", "source": "cisa_kev", "timestamp": "2022-06-27", "split": "val"} +{"id": "d55b2c81d93d4e563981", "text": "CVE: CVE-2022-24763\n\n[{'lang': 'en', 'value': \"PJSIP is a free and open source multimedia communication library written in the C language. Versions 2.12 and prior contain a denial-of-service vulnerability that affects PJSIP users that consume PJSIP's XML parsing in their apps. Users are advised to update. There are no known workarounds.\"}]\n\nFix commit: Merge pull request from GHSA-5x45-qp78-g4p4\n\n* Prevent infinite loop in scanning xml content\n\n* Simplify scanning method\n\n* Optimization", "cve_id": "CVE-2022-24763", "title": "CVE-2022-24763", "source": "cvefixes", "timestamp": "2022-03-30", "split": "val"} +{"id": "0605ca6724139f36caf6", "text": "CVE: CVE-2022-34033\n\n[{'lang': 'en', 'value': 'HTMLDoc v1.9.15 was discovered to contain a heap overflow via (write_header) /htmldoc/htmldoc/html.cxx:273.'}]\n\nFix commit: Fix a crash bug with empty titles (Issue #425)", "cve_id": "CVE-2022-34033", "title": "CVE-2022-34033", "source": "cvefixes", "timestamp": "2022-07-18", "split": "val"} +{"id": "CVE-2022-26500", "text": "Veeam Backup & Replication Remote Code Execution Vulnerability\n\nAffected: Veeam Backup & Replication\n\nThe Veeam Distribution Service in the Backup & Replication application allows unauthenticated users to access internal API functions. A remote attacker can send input to the internal API which may lead to uploading and executing of malicious code.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-22\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-26500", "title": "Veeam Backup & Replication Remote Code Execution Vulnerability", "source": "cisa_kev", "timestamp": "2022-12-13", "split": "val"} +{"id": "bb986001c6775f5f5409", "text": "CVE: CVE-2022-33172\n\n[{'lang': 'en', 'value': \"de.fac2 1.34 allows bypassing the User Presence protection mechanism when there is malware on the victim's PC.\"}]\n\nFix commit: Update README.md", "cve_id": "CVE-2022-33172", "title": "CVE-2022-33172", "source": "cvefixes", "timestamp": "2022-08-24", "split": "val"} +{"id": "d2e971fa9ff9f11662de", "text": "CVE: CVE-2022-2290\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Reflected in GitHub repository zadam/trilium prior to 0.52.4, 0.53.1-beta.'}]\n\nFix commit: set correct content type for error messages", "cve_id": "CVE-2022-2290", "title": "CVE-2022-2290", "source": "cvefixes", "timestamp": "2022-07-03", "split": "val"} +{"id": "987bcb4fda3ec0fd84f7", "text": "CVE: CVE-2022-21712\n\n[{'lang': 'en', 'value': 'twisted is an event-driven networking engine written in Python. In affected versions twisted exposes cookies and authorization headers when following cross-origin redirects. This issue is present in the `twited.web.RedirectAgent` and `twisted.web. BrowserLikeRedirectAgent` functions. Users are advised to upgrade. There are no known workarounds.'}]\n\nFix commit: Merge pull request from GHSA-92x2-jw7w-xvvx\n\n10294 Advisory fix 1", "cve_id": "CVE-2022-21712", "title": "CVE-2022-21712", "source": "cvefixes", "timestamp": "2022-02-07", "split": "val"} +{"id": "3759f7beb8b5d0408435", "text": "[Improper Access Control - Generic] DNS rebinding in --inspect (insufficient fix of CVE-2022-32212 affecting macOS devices)\n\n**Summary:** This is an insufficient fix of CVE-2022-32212, which itself is a fix of CVE-2018-7160. There exists a specific behaviour in browsers on macOS devices when handling the `http://0.0.0.0`URL that allows an attacker-controlled DNS server to bypass the DNS rebinding protection by resolving hosts in the `.local` domain.\n\n**Description:** \n\nIn the latest version, onl", "cve_id": "CVE-2022-32212", "title": "DNS rebinding in --inspect (insufficient fix of CVE-2022-32212 affecting macOS devices) (Improper Access Control - Generic)", "source": "hackerone", "timestamp": "2022-09-28", "split": "val"} +{"id": "57a19cc0c0c50fb09b70", "text": "CVE: CVE-2022-29711\n\n[{'lang': 'en', 'value': 'LibreNMS v22.3.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /Table/GraylogController.php.'}]\n\nFix commit: fix graylog xss (#13931)", "cve_id": "CVE-2022-29711", "title": "CVE-2022-29711", "source": "cvefixes", "timestamp": "2022-06-02", "split": "val"} +{"id": "CVE-2022-22718", "text": "Microsoft Windows Print Spooler Privilege Escalation Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Print Spooler contains an unspecified vulnerability which allow for privilege escalation.\n\nRequired Action: Apply updates per vendor instructions.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-22718", "title": "Microsoft Windows Print Spooler Privilege Escalation Vulnerability", "source": "cisa_kev", "timestamp": "2022-04-19", "split": "val"} +{"id": "251bb4c0f9b0c3ccceff", "text": "CVE: CVE-2022-0841\n\n[{'lang': 'en', 'value': 'OS Command Injection in GitHub repository ljharb/npm-lockfile in v2.0.3 and v2.0.4.'}]\n\nFix commit: [Fix] reject invalid `only` values", "cve_id": "CVE-2022-0841", "title": "CVE-2022-0841", "source": "cvefixes", "timestamp": "2022-03-03", "split": "val"} +{"id": "86530a87600ed11441c8", "text": "CVE: CVE-2022-23604\n\n[{'lang': 'en', 'value': 'x26-Cogs is a repository of cogs made by Twentysix for the Red Discord bot. Among these cogs is the Defender cog, a tool for Discord server moderation. A vulnerability in the Defender cog prior to version 1.10.0 allows users with admin privileges to issue commands as other users who share the same server. If a bot owner shares the same server as the attacker, it is possible for the attacker to issue bot-owner restricted commands. The issue has been", "cve_id": "CVE-2022-23604", "title": "CVE-2022-23604", "source": "cvefixes", "timestamp": "2022-02-15", "split": "val"} +{"id": "371edeb99836aa5c6901", "text": "[Allocation of Resources Without Limits or Throttling] CVE-2023-38039: HTTP header allocation DOS\n\nIt was found that curl does not currently limit the amount of HTTP headers to be received leading to a potential DOS for the users.\nIf an attacker sets up a malicious HTTP server that continuously sends new headers and keeps the socket open, curl will continuously listen on the socket and parse new received headers. This leads to the user's machine allocating more and more resources until the syste", "cve_id": "CVE-2023-38039", "title": "CVE-2023-38039: HTTP header allocation DOS (Allocation of Resources Without Limits or Throttling)", "source": "hackerone", "timestamp": "2023-09-13", "split": "val"} +{"id": "ce31f65c312d14ad2d32", "text": "CVE: CVE-2022-21221\n\n[{'lang': 'en', 'value': 'The package github.com/valyala/fasthttp before 1.34.0 are vulnerable to Directory Traversal via the ServeFile function, due to improper sanitization. It is possible to be exploited by using a backslash %5c character in the path. **Note:** This security issue impacts Windows users only.'}]\n\nFix commit: Add windows support to normalizePath\n\nThis is probably still not 100% sure and there are still many bugs with\nFS on windows. But it's a slight improve", "cve_id": "CVE-2022-21221", "title": "CVE-2022-21221", "source": "cvefixes", "timestamp": "2022-03-17", "split": "val"} +{"id": "e1ad45192c40e40c739b", "text": "CVE: CVE-2022-0173\n\n[{'lang': 'en', 'value': 'radare2 is vulnerable to Out-of-bounds Read'}]\n\nFix commit: Fix use-after-free in iobank rbtree usage ##io\n\n* See havoc4 bin for reproducer\n* Reported via huntr.dev by 'Cen Zhang'", "cve_id": "CVE-2022-0173", "title": "CVE-2022-0173", "source": "cvefixes", "timestamp": "2022-01-11", "split": "val"} +{"id": "CVE-2022-23176", "text": "WatchGuard Firebox and XTM Privilege Escalation Vulnerability\n\nAffected: WatchGuard Firebox and XTM\n\nWatchGuard Firebox and XTM appliances allow a remote attacker with unprivileged credentials to access the system with a privileged management session via exposed management access.\n\nRequired Action: Apply updates per vendor instructions.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-23176", "title": "WatchGuard Firebox and XTM Privilege Escalation Vulnerability", "source": "cisa_kev", "timestamp": "2022-04-11", "split": "val"} +{"id": "c818e69a006f5830bce3", "text": "CVE: CVE-2022-28959\n\n[{'lang': 'en', 'value': 'Multiple cross-site scripting (XSS) vulnerabilities in the component /spip.php of Spip Web Framework v3.1.13 and below allows attackers to execute arbitrary web scripts or HTML.'}]\n\nFix commit: Divers petites sanitization et une balise manquante #4494", "cve_id": "CVE-2022-28959", "title": "CVE-2022-28959", "source": "cvefixes", "timestamp": "2022-05-19", "split": "val"} +{"id": "b07652e49951b70c5fbd", "text": "CVE: CVE-2022-29253\n\n[{'lang': 'en', 'value': 'XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Starting with version 8.3-rc-1 and prior to versions 12.10.3 and 14.0, one can ask for any file located in the classloader using the template API and a path with \"..\" in it. The issue is patched in versions 14.0 and 13.10.3. There is no easy workaround for this issue.'}]\n\nFix commit: XWIKI-19349: Bad handling of classloader templates path resolut", "cve_id": "CVE-2022-29253", "title": "CVE-2022-29253", "source": "cvefixes", "timestamp": "2022-05-25", "split": "val"} +{"id": "cfecccb2393a7f7dc14a", "text": "CVE: CVE-2022-29533\n\n[{'lang': 'en', 'value': 'An issue was discovered in MISP before 2.4.158. There is XSS in app/Controller/OrganisationsController.php in a situation with a \"weird single checkbox page.\"'}]\n\nFix commit: fix: [security] low probability reflected XSS fixed\n\n- User would need to navigate to a url that contains the payload\n- user needs to click on a checkbox in a weird single checkbox page to trigger the exploit\n\n- as reported by Dawid Czarnecki of Zigrin Security on behalf of the", "cve_id": "CVE-2022-29533", "title": "CVE-2022-29533", "source": "cvefixes", "timestamp": "2022-04-20", "split": "val"} +{"id": "77db3edc3046e5dba87b", "text": "CVE: CVE-2022-1234\n\n[{'lang': 'en', 'value': 'XSS in livehelperchat in GitHub repository livehelperchat/livehelperchat prior to 3.97. This vulnerability has the potential to deface websites, result in compromised user accounts, and can run malicious code on web pages, which can lead to a compromise of the user’s device.'}]\n\nFix commit: Add missing applicaiton/json header where missing", "cve_id": "CVE-2022-1234", "title": "CVE-2022-1234", "source": "cvefixes", "timestamp": "2022-04-06", "split": "val"} +{"id": "CVE-2022-47986", "text": "IBM Aspera Faspex Code Execution Vulnerability\n\nAffected: IBM Aspera Faspex\n\nIBM Aspera Faspex could allow a remote attacker to execute code on the system, caused by a YAML deserialization flaw.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-47986", "title": "IBM Aspera Faspex Code Execution Vulnerability", "source": "cisa_kev", "timestamp": "2023-02-21", "split": "val"} +{"id": "20912f66a90a8557855a", "text": "CVE: CVE-2022-29858\n\n[{'lang': 'en', 'value': 'Silverstripe silverstripe/assets through 1.10 is vulnerable to improper access control that allows protected images to be published by changing an existing image short code on website content.'}]\n\nFix commit: [CVE-2022-29858] Read grant config for regenerate_shortcode", "cve_id": "CVE-2022-29858", "title": "CVE-2022-29858", "source": "cvefixes", "timestamp": "2022-06-28", "split": "val"} +{"id": "1df4a6287c4395061724", "text": "CVE: CVE-2022-29258\n\n[{'lang': 'en', 'value': 'XWiki Platform Filter UI provides a generic user interface to convert from a XWiki Filter input stream to an output stream with settings for each stream. Starting with versions 6.0-milestone-2 and 5.4.4 and prior to versions 12.10.11, 14.0-rc-1, 13.4.7, and 13.10.3, XWiki Platform Filter UI contains a possible cross-site scripting vector in the `Filter.FilterStreamDescriptorForm` wiki page related to pretty much all the form fields printed in the ho", "cve_id": "CVE-2022-29258", "title": "CVE-2022-29258", "source": "cvefixes", "timestamp": "2022-05-31", "split": "val"} +{"id": "e1cd0bc1ac049cfc1f20", "text": "CVE: CVE-2022-22851\n\n[{'lang': 'en', 'value': \"A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodtester Hospital's Patient Records Management System 1.0 via the specialization parameter in doctors.php\"}]\n\nFix commit: Create CVE-2022-22851.md", "cve_id": "CVE-2022-22851", "title": "CVE-2022-22851", "source": "cvefixes", "timestamp": "2022-01-26", "split": "val"} +{"id": "CVE-2023-6448", "text": "Unitronics Vision PLC and HMI Insecure Default Password Vulnerability\n\nAffected: Unitronics Vision PLC and HMI\n\nUnitronics Vision Series PLCs and HMIs ship with an insecure default password, which if left unchanged, can allow attackers to execute remote commands.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-1188\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-6448", "title": "Unitronics Vision PLC and HMI Insecure Default Password Vulnerability", "source": "cisa_kev", "timestamp": "2023-12-11", "split": "val"} +{"id": "CVE-2022-29464", "text": "WSO2 Multiple Products Unrestrictive Upload of File Vulnerability\n\nAffected: WSO2 Multiple Products\n\nMultiple WSO2 products allow for unrestricted file upload, resulting in remote code execution.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-22\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-29464", "title": "WSO2 Multiple Products Unrestrictive Upload of File Vulnerability", "source": "cisa_kev", "timestamp": "2022-04-25", "split": "val"} +{"id": "3955c5724ddeb7d95537", "text": "CVE: CVE-2022-1176\n\n[{'lang': 'en', 'value': 'Loose comparison causes IDOR on multiple endpoints in GitHub repository livehelperchat/livehelperchat prior to 3.96.'}]\n\nFix commit: Type check", "cve_id": "CVE-2022-1176", "title": "CVE-2022-1176", "source": "cvefixes", "timestamp": "2022-03-31", "split": "val"} +{"id": "1e0d2e96b7f25ee6981d", "text": "CVE: CVE-2022-29776\n\n[{'lang': 'en', 'value': 'Onlyoffice Document Server v6.0.0 and below and Core 6.1.0.26 and below were discovered to contain a stack overflow via the component DesktopEditor/common/File.cpp.'}]\n\nFix commit: Fix 25 errors", "cve_id": "CVE-2022-29776", "title": "CVE-2022-29776", "source": "cvefixes", "timestamp": "2022-06-02", "split": "val"} +{"id": "CVE-2023-39780", "text": "ASUS RT-AX55 Routers OS Command Injection Vulnerability\n\nAffected: ASUS RT-AX55 Routers\n\nASUS RT-AX55 devices contain an OS command injection vulnerability that could allow a remote, authenticated attacker to execute arbitrary commands. As represented by CVE-2023-41346.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-78\n\n[Source: CISA Known Exploite", "cve_id": "CVE-2023-39780", "title": "ASUS RT-AX55 Routers OS Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2025-06-02", "split": "val"} +{"id": "a0941ee7043d81ba36d9", "text": "CVE: CVE-2022-0695\n\n[{'lang': 'en', 'value': 'Denial of Service in GitHub repository radareorg/radare2 prior to 5.6.4.'}]\n\nFix commit: Fix DoS in PE/QNX/DYLDCACHE/PSX parsers ##crash\n\n* Reported by lazymio\n* Reproducer: AAA4AAAAAB4=", "cve_id": "CVE-2022-0695", "title": "CVE-2022-0695", "source": "cvefixes", "timestamp": "2022-02-24", "split": "val"} +{"id": "ce3bbef0e3f7fb546541", "text": "CVE: CVE-2022-30330\n\n[{'lang': 'en', 'value': 'In the KeepKey firmware before 7.3.2,Flaws in the supervisor interface can be exploited to bypass important security restrictions on firmware operations. Using these flaws, malicious firmware code can elevate privileges, permanently make the device inoperable or overwrite the trusted bootloader code to compromise the hardware wallet across reboots or storage wipes.'}]\n\nFix commit: fix: more robust address range checks in svhandler_flash_*", "cve_id": "CVE-2022-30330", "title": "CVE-2022-30330", "source": "cvefixes", "timestamp": "2022-05-07", "split": "val"} +{"id": "e7e2ace13e7803fae947", "text": "CVE: CVE-2022-2982\n\n[{'lang': 'en', 'value': 'Use After Free in GitHub repository vim/vim prior to 9.0.0260.'}]\n\nFix commit: patch 9.0.0260: using freed memory when using 'quickfixtextfunc' recursively\n\nProblem: Using freed memory when using 'quickfixtextfunc' recursively.\nSolution: Do not allow for recursion.", "cve_id": "CVE-2022-2982", "title": "CVE-2022-2982", "source": "cvefixes", "timestamp": "2022-08-25", "split": "val"} +{"id": "CVE-2023-35082", "text": "Ivanti Endpoint Manager Mobile (EPMM) and MobileIron Core Authentication Bypass Vulnerability\n\nAffected: Ivanti Endpoint Manager Mobile (EPMM) and MobileIron Core\n\nIvanti Endpoint Manager Mobile (EPMM) and MobileIron Core contain an authentication bypass vulnerability that allows unauthorized users to access restricted functionality or resources of the application.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRanso", "cve_id": "CVE-2023-35082", "title": "Ivanti Endpoint Manager Mobile (EPMM) and MobileIron Core Authentication Bypass Vulnerability", "source": "cisa_kev", "timestamp": "2024-01-18", "split": "val"} +{"id": "CVE-2023-35081", "text": "Ivanti Endpoint Manager Mobile (EPMM) Path Traversal Vulnerability\n\nAffected: Ivanti Endpoint Manager Mobile (EPMM)\n\nIvanti Endpoint Manager Mobile (EPMM) contains a path traversal vulnerability that enables an authenticated administrator to perform malicious file writes to the EPMM server. This vulnerability can be used in conjunction with CVE-2023-35078 to bypass authentication and ACLs restrictions (if applicable).\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use", "cve_id": "CVE-2023-35081", "title": "Ivanti Endpoint Manager Mobile (EPMM) Path Traversal Vulnerability", "source": "cisa_kev", "timestamp": "2023-07-31", "split": "val"} +{"id": "3f2b21f79ee780b86f43", "text": "CVE: CVE-2022-29340\n\n[{'lang': 'en', 'value': 'GPAC 2.1-DEV-rev87-g053aae8-master. has a Null Pointer Dereference vulnerability in gf_isom_parse_movie_boxes_internal due to improper return value handling of GF_SKIP_BOX, which causes a Denial of Service. This vulnerability was fixed in commit 37592ad.'}]\n\nFix commit: fixed #2163", "cve_id": "CVE-2022-29340", "title": "CVE-2022-29340", "source": "cvefixes", "timestamp": "2022-05-05", "split": "val"} +{"id": "1c9f238ae120a28346bc", "text": "CVE: CVE-2022-26183\n\n[{'lang': 'en', 'value': 'PNPM v6.15.1 and below was discovered to contain an untrusted search path which causes the application to behave in unexpected ways when users execute PNPM commands in a directory containing malicious content. This vulnerability occurs when the application is ran on Windows OS.'}]\n\nFix commit: fix: prevent binary planting attacks on Windows", "cve_id": "CVE-2022-26183", "title": "CVE-2022-26183", "source": "cvefixes", "timestamp": "2022-03-21", "split": "val"} +{"id": "CVE-2023-27997", "text": "Fortinet FortiOS and FortiProxy SSL-VPN Heap-Based Buffer Overflow Vulnerability\n\nAffected: Fortinet FortiOS and FortiProxy SSL-VPN\n\nFortinet FortiOS and FortiProxy SSL-VPN contain a heap-based buffer overflow vulnerability which can allow an unauthenticated, remote attacker to execute code or commands via specifically crafted requests.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-122\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-27997", "title": "Fortinet FortiOS and FortiProxy SSL-VPN Heap-Based Buffer Overflow Vulnerability", "source": "cisa_kev", "timestamp": "2023-06-13", "split": "val"} +{"id": "CVE-2023-27992", "text": "Zyxel Multiple NAS Devices Command Injection Vulnerability\n\nAffected: Zyxel Multiple Network-Attached Storage (NAS) Devices\n\nMultiple Zyxel network-attached storage (NAS) devices contain a pre-authentication command injection vulnerability that could allow an unauthenticated attacker to execute commands remotely via a crafted HTTP request.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-78\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-27992", "title": "Zyxel Multiple NAS Devices Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2023-06-23", "split": "val"} +{"id": "68a8510057ecaf9d39ab", "text": "CVE: CVE-2022-29528\n\n[{'lang': 'en', 'value': 'An issue was discovered in MISP before 2.4.158. PHAR deserialization can occur.'}]\n\nFix commit: fix: [security] unregister phar from stream wrappers globally for all Model code\n\n- blanket protection against phar deserialization vulnerabilities\n\n- as reported by Dawid Czarnecki of Zigrin Security", "cve_id": "CVE-2022-29528", "title": "CVE-2022-29528", "source": "cvefixes", "timestamp": "2022-04-20", "split": "val"} +{"id": "669e9ffae9a878429471", "text": "CVE: CVE-2022-24798\n\n[{'lang': 'en', 'value': 'Internet Routing Registry daemon version 4 is an IRR database server, processing IRR objects in the RPSL format. IRRd did not always filter password hashes in query responses relating to `mntner` objects and database exports. This may have allowed adversaries to retrieve some of these hashes, perform a brute-force search for the clear-text passphrase, and use these to make unauthorised changes to affected IRR objects. This issue only affected instan", "cve_id": "CVE-2022-24798", "title": "CVE-2022-24798", "source": "cvefixes", "timestamp": "2022-03-31", "split": "val"} +{"id": "CVE-2023-49897", "text": "FXC AE1021, AE1021PE OS Command Injection Vulnerability\n\nAffected: FXC AE1021, AE1021PE\n\nFXC AE1021 and AE1021PE contain an OS command injection vulnerability that allows authenticated users to execute commands via a network.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-78\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-49897", "title": "FXC AE1021, AE1021PE OS Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2023-12-21", "split": "val"} +{"id": "36bb482f41e770111507", "text": "CVE: CVE-2022-2028\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Generic in GitHub repository kromitgmbh/titra prior to 0.77.0.'}]\n\nFix commit: 🔒 fixes three critical stored XSS vulnerabilities thanks @saharshtapi for reporting this\n🔒 fixes a formula injection vulnerability in the Excel export functionality thanks @saharshtapi for reprorting this\n❗️this is an important security release, we recommend to migrate asap, all titra versions below version 0.77.0 are considered insecure for pr", "cve_id": "CVE-2022-2028", "title": "CVE-2022-2028", "source": "cvefixes", "timestamp": "2022-06-09", "split": "val"} +{"id": "bae25f134b5bc06b6b6d", "text": "CVE: CVE-2022-29534\n\n[{'lang': 'en', 'value': 'An issue was discovered in MISP before 2.4.158. In UsersController.php, password confirmation can be bypassed via vectors involving an \"Accept: application/json\" header.'}]\n\nFix commit: fix: [security] Password confirmation bypass in user edit\n\n- optional password confirmation can be potentially circumvented\n- fooling the user edit via a request that sets accept:application/json whilst posting form content\n\n- as reported by Dawid Czarnecki of Zigrin", "cve_id": "CVE-2022-29534", "title": "CVE-2022-29534", "source": "cvefixes", "timestamp": "2022-04-20", "split": "val"} +{"id": "3fe37994530271d0338e", "text": "CVE: CVE-2022-0630\n\n[{'lang': 'en', 'value': 'Out-of-bounds Read in Homebrew mruby prior to 3.2.'}]\n\nFix commit: vm.c: should check type before hash access.\n\nSince the operand of double splat (`**`) may not be a hash, simple\nassertion (previous code since d42a64e) was not enough for this case.", "cve_id": "CVE-2022-0630", "title": "CVE-2022-0630", "source": "cvefixes", "timestamp": "2022-02-19", "split": "val"} +{"id": "362b3a448dd10e130ec0", "text": "CVE: CVE-2022-0645\n\n[{'lang': 'en', 'value': 'Open redirect vulnerability via endpoint authorize_and_redirect/?redirect= in GitHub repository posthog/posthog prior to 1.34.1.'}]\n\nFix commit: fix(toolbar): only redirect to hosts in app_urls (#9268)\n\n* fix(toolbar): only redirect to hosts in app_urls\r\n\r\n* fix mypy and regex", "cve_id": "CVE-2022-0645", "title": "CVE-2022-0645", "source": "cvefixes", "timestamp": "2022-04-19", "split": "val"} +{"id": "CVE-2022-1364", "text": "Google Chromium V8 Type Confusion Vulnerability\n\nAffected: Google Chromium V8\n\nGoogle Chromium V8 Engine contains a type confusion vulnerability that allows a remote attacker to potentially exploit heap corruption via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-843\n\n[Source: CISA Known Exploited Vulner", "cve_id": "CVE-2022-1364", "title": "Google Chromium V8 Type Confusion Vulnerability", "source": "cisa_kev", "timestamp": "2022-04-15", "split": "val"} +{"id": "6ea0fee47509f6f286ee", "text": "CVE: CVE-2022-25891\n\n[{'lang': 'en', 'value': 'The package github.com/containrrr/shoutrrr/pkg/util before 0.6.0 are vulnerable to Denial of Service (DoS) via the util.PartitionMessage function. Exploiting this vulnerability is possible by sending exactly 2000, 4000, or 6000 characters messages.'}]\n\nFix commit: fix(discord): message size fixes (#242)\n\n* fix(discord): handle empty messages without panic\r\n* fix: off by one error when partitioning messages\r\n* test(discord): add tests for Send failur", "cve_id": "CVE-2022-25891", "title": "CVE-2022-25891", "source": "cvefixes", "timestamp": "2022-07-15", "split": "val"} +{"id": "5b3afebe7cc0fd981320", "text": "CVE: CVE-2022-0911\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.4.0.'}]\n\nFix commit: [Admin] Security - Add handler to enable Content Security Policy (#11447)\n\n* [Admin] Security - Add handler to enable Content Security Policy\r\n\r\n* [Admin] Security - Add handler to enable Content Security Policy\r\n\r\n* [Admin] Security - Add handler to enable Content Security Policy - fix document preview\r\n\r\n* [Admin] Security - Add handler to enab", "cve_id": "CVE-2022-0911", "title": "CVE-2022-0911", "source": "cvefixes", "timestamp": "2022-03-16", "split": "val"} +{"id": "27753dc36eecd21e1d70", "text": "CVE: CVE-2022-2651\n\n[{'lang': 'en', 'value': 'Authentication Bypass by Primary Weakness in GitHub repository bookwyrm-social/bookwyrm prior to 0.4.5.'}]\n\nFix commit: Merge pull request #2230 from bookwyrm-social/nginx-rate-limit\n\nAdds rate limiting to some views in nginx", "cve_id": "CVE-2022-2651", "title": "CVE-2022-2651", "source": "cvefixes", "timestamp": "2022-08-04", "split": "val"} +{"id": "169094cd0ee1e802d655", "text": "[Server-Side Request Forgery (SSRF)] CVE-2022-27780: percent-encoded path separator in URL host\n\n## Summary:\nURL decoding the entire proxy string could lead to SSRF filter bypasses. For example,\n\nWhen the following curl specifies the proxy string `http://example.com%2F127.0.0.1`\n\n- If curl URL parser or another RFC3986 compliant parser parses the initial string http://127.0.0.1%2F.example.com, it will derive 127.0.0.1%2Fexample.com or 127.0.0.1/example.com as the host, if for instance, an SSRF c", "cve_id": "CVE-2022-27780", "title": "CVE-2022-27780: percent-encoded path separator in URL host (Server-Side Request Forgery (SSRF))", "source": "hackerone", "timestamp": "2022-05-11", "split": "val"} +{"id": "827cb843ffab392374bf", "text": "CVE: CVE-2022-2400\n\n[{'lang': 'en', 'value': 'External Control of File Name or Path in GitHub repository dompdf/dompdf prior to 2.0.0.'}]\n\nFix commit: Update resource URI validation and handling\n\nURI scheme (protocol) validation rules are now specified through the Options class. By default file and http(s) URIs are allowed and validation rules defined. Validation rules for PHAR URIs are defined but the scheme is not enabled by default.\n\nResource retrieval has been updated to use file_get_content", "cve_id": "CVE-2022-2400", "title": "CVE-2022-2400", "source": "cvefixes", "timestamp": "2022-07-18", "split": "val"} +{"id": "5cdc543921050a2733e1", "text": "CVE: CVE-2022-31041\n\n[{'lang': 'en', 'value': 'Open Forms is an application for creating and publishing smart forms. Open Forms supports file uploads as one of the form field types. These fields can be configured to allow only certain file extensions to be uploaded by end users (e.g. only PDF / Excel / ...). The input validation of uploaded files is insufficient in versions prior to 1.0.9 and 1.1.1. Users could alter or strip file extensions to bypass this validation. This results in files being", "cve_id": "CVE-2022-31041", "title": "CVE-2022-31041", "source": "cvefixes", "timestamp": "2022-06-13", "split": "val"} +{"id": "35bda27b863a0f98c6f5", "text": "CVE: CVE-2022-2353\n\n[{'lang': 'en', 'value': 'Prior to microweber/microweber v1.2.20, due to improper neutralization of input, an attacker can steal tokens to perform cross-site request forgery, fetch contents from same-site and redirect a user.'}]\n\nFix commit: update", "cve_id": "CVE-2022-2353", "title": "CVE-2022-2353", "source": "cvefixes", "timestamp": "2022-07-09", "split": "val"} +{"id": "5d5ef8333024aec9a943", "text": "CVE: CVE-2022-2571\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0101.'}]\n\nFix commit: patch 9.0.0102: reading past end of line with insert mode completion\n\nProblem: Reading past end of line with insert mode completion.\nSolution: Check text length.", "cve_id": "CVE-2022-2571", "title": "CVE-2022-2571", "source": "cvefixes", "timestamp": "2022-08-01", "split": "val"} +{"id": "ae4e9b1ca95d310e4f32", "text": "[Insufficiently Protected Credentials] Credential leak on redirect\n\n## Summary:\n[add summary of the vulnerability]\n\nCurl can be coaxed to leak user credentials to third-party host by issuing HTTP redirect , like the Proxy-Authorization 、x-auth-token header. It is a bypass of fix https://hackerone.com/reports/1547048 , CVE-2022-27776 .\n\n## Steps To Reproduce:\n[add details for how we can reproduce the issue]\n\n 1. Create a 302.php file, such as:\n```\n", "cve_id": "CVE-2022-27776", "title": "Credential leak on redirect (Insufficiently Protected Credentials)", "source": "hackerone", "timestamp": "2022-05-14", "split": "val"} +{"id": "0ce4e2dc66a341e7e627", "text": "CVE: CVE-2022-0539\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in Packagist ptrofimov/beanstalk_console prior to 1.7.14.'}]\n\nFix commit: applying htmlspecialchars for sanitization output\nFix issue XSS\nDisclosure : https://huntr.dev/bounties/5f41b182-dda2-4c6f-9668-2a9afaed53af/", "cve_id": "CVE-2022-0539", "title": "CVE-2022-0539", "source": "cvefixes", "timestamp": "2022-02-09", "split": "val"} +{"id": "e1c71edbc025415e5595", "text": "CVE: CVE-2022-24710\n\n[{'lang': 'en', 'value': 'Weblate is a copyleft software web-based continuous localization system. Versions prior to 4.11 do not properly neutralize user input used in user name and language fields. Due to this improper neutralization it is possible to perform cross-site scripting via these fields. The issues were fixed in the 4.11 release. Users unable to upgrade are advised to add their own neutralize logic.'}]\n\nFix commit: reports: Escape user names in generated reports", "cve_id": "CVE-2022-24710", "title": "CVE-2022-24710", "source": "cvefixes", "timestamp": "2022-02-25", "split": "val"} +{"id": "2fbb152c5951f12093ff", "text": "CVE: CVE-2022-21682\n\n[{'lang': 'en', 'value': 'Flatpak is a Linux application sandboxing and distribution framework. A path traversal vulnerability affects versions of Flatpak prior to 1.12.3 and 1.10.6. flatpak-builder applies `finish-args` last in the build. At this point the build directory will have the full access that is specified in the manifest, so running `flatpak build` against it will gain those permissions. Normally this will not be done, so this is not problem. However, if `--mirror", "cve_id": "CVE-2022-21682", "title": "CVE-2022-21682", "source": "cvefixes", "timestamp": "2022-01-13", "split": "val"} +{"id": "bf12c2d1d4b883ac3e68", "text": "CVE: CVE-2022-31502\n\n[{'lang': 'en', 'value': 'The operatorequals/wormnest repository through 0.4.7 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.'}]\n\nFix commit: Merge pull request #8 from porcupineyhairs/FixPathInjection\n\nFix Path Traversal Vulnerability", "cve_id": "CVE-2022-31502", "title": "CVE-2022-31502", "source": "cvefixes", "timestamp": "2022-07-11", "split": "val"} +{"id": "CVE-2022-3236", "text": "Sophos Firewall Code Injection Vulnerability\n\nAffected: Sophos Firewall\n\nA code injection vulnerability in the User Portal and Webadmin of Sophos Firewall allows for remote code execution.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-94\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-3236", "title": "Sophos Firewall Code Injection Vulnerability", "source": "cisa_kev", "timestamp": "2022-09-23", "split": "val"} +{"id": "7beebebed0831ebe5ce0", "text": "[Business Logic Errors] CVE-2023-27538: SSH connection too eager reuse still\n\nlibcurl would reuse a previously created connection even when an SSH related option had been changed that should have prohibited reuse.\n\nlibcurl keeps previously used connections in a connection pool for subsequent transfers to reuse if one of them matches the setup. However, two SSH settings were left out from the configuration match checks, making them match too easily.\n\n## Hackerone report\n#1898475\n\n## Impact\n\nConne", "cve_id": "CVE-2023-27538", "title": "CVE-2023-27538: SSH connection too eager reuse still (Business Logic Errors)", "source": "hackerone", "timestamp": "2023-04-19", "split": "val"} +{"id": "dc3e5e13e7f3b31e0c5f", "text": "CVE: CVE-2022-31128\n\n[{'lang': 'en', 'value': 'Tuleap is a Free & Open Source Suite to improve management of software developments and collaboration. In affected versions Tuleap does not properly verify permissions when creating branches with the REST API in Git repositories using the fine grained permissions. Users can create branches via the REST endpoint `POST git/:id/branches` regardless of the permissions set on the repository. This issue has been fixed in version 13.10.99.82 Tuleap Communi", "cve_id": "CVE-2022-31128", "title": "CVE-2022-31128", "source": "cvefixes", "timestamp": "2022-08-01", "split": "val"} +{"id": "CVE-2023-26359", "text": "Adobe ColdFusion Deserialization of Untrusted Data Vulnerability\n\nAffected: Adobe ColdFusion\n\nAdobe ColdFusion contains a deserialization of untrusted data vulnerability that could result in code execution in the context of the current user.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-26359", "title": "Adobe ColdFusion Deserialization of Untrusted Data Vulnerability", "source": "cisa_kev", "timestamp": "2023-08-21", "split": "val"} +{"id": "7cf4ccfe5338d53acb94", "text": "CVE: CVE-2022-34295\n\n[{'lang': 'en', 'value': 'totd before 1.5.3 does not properly randomize mesg IDs.'}]\n\nFix commit: Patch provided by Gabor Lencse for generating better randomized mesg IDs.", "cve_id": "CVE-2022-34295", "title": "CVE-2022-34295", "source": "cvefixes", "timestamp": "2022-06-23", "split": "val"} +{"id": "2b2dc764e569f382d1cc", "text": "CVE: CVE-2022-0352\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Reflected in Pypi calibreweb prior to 0.6.16.'}]\n\nFix commit: Prevent wrong use of safe statement", "cve_id": "CVE-2022-0352", "title": "CVE-2022-0352", "source": "cvefixes", "timestamp": "2022-01-28", "split": "val"} +{"id": "CVE-2022-37969", "text": "Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Common Log File System (CLFS) driver contains an unspecified vulnerability that allows for privilege escalation.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-20, CWE-787\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-37969", "title": "Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability", "source": "cisa_kev", "timestamp": "2022-09-14", "split": "val"} +{"id": "62134d050769146ac3f8", "text": "CVE: CVE-2022-0717\n\n[{'lang': 'en', 'value': 'Out-of-bounds Read in GitHub repository mruby/mruby prior to 3.2.'}]\n\nFix commit: codegen.c: fix a argument generation bug in array assignment.", "cve_id": "CVE-2022-0717", "title": "CVE-2022-0717", "source": "cvefixes", "timestamp": "2022-02-23", "split": "val"} +{"id": "536a5f8616b93ef2aadd", "text": "CVE: CVE-2022-24719\n\n[{'lang': 'en', 'value': 'Fluture-Node is a FP-style HTTP and streaming utils for Node based on Fluture. Using `followRedirects` or `followRedirectsWith` with any of the redirection strategies built into fluture-node 4.0.0 or 4.0.1, paired with a request that includes confidential headers such as Authorization or Cookie, exposes you to a vulnerability where, if the destination server were to redirect the request to a server on a third-party domain, or the same domain over un", "cve_id": "CVE-2022-24719", "title": "CVE-2022-24719", "source": "cvefixes", "timestamp": "2022-03-01", "split": "val"} +{"id": "f67181d9a4c64942e0b3", "text": "CVE: CVE-2022-1631\n\n[{'lang': 'en', 'value': 'Users Account Pre-Takeover or Users Account Takeover. in GitHub repository microweber/microweber prior to 1.2.15. Victim Account Take Over. Since, there is no email confirmation, an attacker can easily create an account in the application using the Victim’s Email. This allows an attacker to gain pre-authentication to the victim’s account. Further, due to the lack of proper validation of email coming from Social Login and failing to check if an accoun", "cve_id": "CVE-2022-1631", "title": "CVE-2022-1631", "source": "cvefixes", "timestamp": "2022-05-09", "split": "val"} +{"id": "CVE-2023-36033", "text": "Microsoft Windows Desktop Window Manager (DWM) Core Library Privilege Escalation Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Desktop Window Manager (DWM) Core Library contains an unspecified vulnerability that allows for privilege escalation.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-822\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-36033", "title": "Microsoft Windows Desktop Window Manager (DWM) Core Library Privilege Escalation Vulnerability", "source": "cisa_kev", "timestamp": "2023-11-14", "split": "val"} +{"id": "5ca2a095185744597c2b", "text": "CVE: CVE-2022-31506\n\n[{'lang': 'en', 'value': 'The cmusatyalab/opendiamond repository through 10.1.1 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.'}]\n\nFix commit: Fix path traversal issues in all dataretriever backends", "cve_id": "CVE-2022-31506", "title": "CVE-2022-31506", "source": "cvefixes", "timestamp": "2022-07-11", "split": "val"} +{"id": "dcd8e0ac8e790dc76ee5", "text": "[Cross-site Scripting (XSS) - Generic] Incomplete fix for CVE-2022-32209 (XSS in Rails::Html::Sanitizer under certain configurations)\n\nWhile building a PoC for CVE-2022-32209, I noticed that I could not fix my vulnerable application by updating https://github.com/rails/rails-html-sanitizer from 1.4.2 to 1.4.3 even though the Hackerone report about this vulnerability suggested that this should fix it (see here: https://hackerone.com/reports/1530898).\n\nI built this app with Rails 7.0.3.1 by just r", "cve_id": "CVE-2022-32209", "title": "Incomplete fix for CVE-2022-32209 (XSS in Rails::Html::Sanitizer under certain configurations) (Cross-site Scripting (XSS) - Generic)", "source": "hackerone", "timestamp": "2022-12-14", "split": "val"} +{"id": "65449b96c234ec8ee7c5", "text": "CVE: CVE-2022-31057\n\n[{'lang': 'en', 'value': 'Shopware is an open source e-commerce software made in Germany. Versions of Shopware 5 prior to version 5.7.12 are subject to an authenticated Stored XSS in Administration. Users are advised to upgrade. There are no known workarounds for this issue.'}]\n\nFix commit: SW-26748 - improve input filter", "cve_id": "CVE-2022-31057", "title": "CVE-2022-31057", "source": "cvefixes", "timestamp": "2022-06-27", "split": "val"} +{"id": "b952c6dc1ebe14b93371", "text": "CVE: CVE-2022-1445\n\n[{'lang': 'en', 'value': 'Stored Cross Site Scripting vulnerability in the checked_out_to parameter in GitHub repository snipe/snipe-it prior to 5.4.3. The vulnerability is capable of stolen the user Cookie.'}]\n\nFix commit: Escape checkout target name\n\nSigned-off-by: snipe ", "cve_id": "CVE-2022-1445", "title": "CVE-2022-1445", "source": "cvefixes", "timestamp": "2022-04-24", "split": "val"} +{"id": "726ff0cd965c1842665f", "text": "CVE: CVE-2022-0281\n\n[{'lang': 'en', 'value': 'Exposure of Sensitive Information to an Unauthorized Actor in Packagist microweber/microweber prior to 1.2.11.'}]\n\nFix commit: search_authors only admins", "cve_id": "CVE-2022-0281", "title": "CVE-2022-0281", "source": "cvefixes", "timestamp": "2022-01-20", "split": "val"} +{"id": "405d9fbf019d86d42c7f", "text": "CVE: CVE-2022-2321\n\n[{'lang': 'en', 'value': 'Improper Restriction of Excessive Authentication Attempts in GitHub repository heroiclabs/nakama prior to 3.13.0. This results in login brute-force attacks.'}]\n\nFix commit: Better limit for unsuccessful login attempts on the devconsole. (#878)", "cve_id": "CVE-2022-2321", "title": "CVE-2022-2321", "source": "cvefixes", "timestamp": "2022-07-05", "split": "val"} +{"id": "81994b326683ba53e13a", "text": "CVE: CVE-2022-2819\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0211.'}]\n\nFix commit: patch 9.0.0211: invalid memory access when compiling :lockvar\n\nProblem: Invalid memory access when compiling :lockvar.\nSolution: Don't read past the end of the line.", "cve_id": "CVE-2022-2819", "title": "CVE-2022-2819", "source": "cvefixes", "timestamp": "2022-08-15", "split": "val"} +{"id": "eb8d03514ff0db1f77dc", "text": "CVE: CVE-2022-29206\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.SparseTensorDenseAdd` does not fully validate the input arguments. In this case, a reference gets bound to a `nullptr` during kernel execution. This is undefined behavior. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.'}]\n\nFix commit: Fix UB in SparseTensorDenseAdd\n\nAdded more input", "cve_id": "CVE-2022-29206", "title": "CVE-2022-29206", "source": "cvefixes", "timestamp": "2022-05-20", "split": "val"} +{"id": "007ee110cbacec8e974e", "text": "CVE: CVE-2022-23590\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. A `GraphDef` from a TensorFlow `SavedModel` can be maliciously altered to cause a TensorFlow process to crash due to encountering a `StatusOr` value that is an error and forcibly extracting the value from it. We have patched the issue in multiple GitHub commits and these will be included in TensorFlow 2.8.0 and TensorFlow 2.7.1, as both are affected.'}]\n\nFix commit: Check for type inference er", "cve_id": "CVE-2022-23590", "title": "CVE-2022-23590", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val"} +{"id": "48876ccbb09924089d98", "text": "CVE: CVE-2022-21675\n\n[{'lang': 'en', 'value': 'Bytecode Viewer (BCV) is a Java/Android reverse engineering suite. Versions of the package prior to 2.11.0 are vulnerable to Arbitrary File Write via Archive Extraction (AKA \"Zip Slip\"). The vulnerability is exploited using a specially crafted archive that holds directory traversal filenames (e.g. ../../evil.exe). The Zip Slip vulnerability can affect numerous archive formats, including zip, jar, tar, war, cpio, apk, rar and 7z. The attacker can the", "cve_id": "CVE-2022-21675", "title": "CVE-2022-21675", "source": "cvefixes", "timestamp": "2022-01-12", "split": "val"} +{"id": "403dc21b9a9e6741f108", "text": "CVE: CVE-2022-21650\n\n[{'lang': 'en', 'value': \"Convos is an open source multi-user chat that runs in a web browser. You can't use SVG extension in Convos' chat window, but you can upload a file with an .html extension. By uploading an SVG file with an html extension the upload filter can be bypassed. This causes Stored XSS. Also, after uploading a file the XSS attack is triggered upon a user viewing the file. Through this vulnerability, an attacker is capable to execute malicious scripts. Users", "cve_id": "CVE-2022-21650", "title": "CVE-2022-21650", "source": "cvefixes", "timestamp": "2022-01-04", "split": "val"} +{"id": "1840b318ba4ce1dc99b0", "text": "CVE: CVE-2022-1235\n\n[{'lang': 'en', 'value': 'Weak secrethash can be brute-forced in GitHub repository livehelperchat/livehelperchat prior to 3.96.'}]\n\nFix commit: Increase size of secret hash and chagne it's algorithm", "cve_id": "CVE-2022-1235", "title": "CVE-2022-1235", "source": "cvefixes", "timestamp": "2022-04-05", "split": "val"} +{"id": "6724ea2398b1c55cb349", "text": "CVE: CVE-2022-2210\n\n[{'lang': 'en', 'value': 'Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.5164: invalid memory access after diff buffer manipulations\n\nProblem: Invalid memory access after diff buffer manipulations.\nSolution: Use zero offset when change removes all lines in a diff block.", "cve_id": "CVE-2022-2210", "title": "CVE-2022-2210", "source": "cvefixes", "timestamp": "2022-06-27", "split": "val"} +{"id": "94dc812cc9d335ed027c", "text": "CVE: CVE-2022-2652\n\n[{'lang': 'en', 'value': \"Depending on the way the format strings in the card label are crafted it's possible to leak kernel stack memory. There is also the possibility for DoS due to the v4l2loopback kernel module crashing when providing the card label on request (reproduce e.g. with many %s modifiers in a row).\"}]\n\nFix commit: add explicit format specifier to printf() invocations\n\nCWE-134", "cve_id": "CVE-2022-2652", "title": "CVE-2022-2652", "source": "cvefixes", "timestamp": "2022-08-04", "split": "val"} +{"id": "c0c62576c655918a7f06", "text": "CVE: CVE-2022-24818\n\n[{'lang': 'en', 'value': 'GeoTools is an open source Java library that provides tools for geospatial data. The GeoTools library has a number of data sources that can perform unchecked JNDI lookups, which in turn can be used to perform class deserialization and result in arbitrary code execution. Similar to the Log4J case, the vulnerability can be triggered if the JNDI names are user-provided, but requires admin-level login to be triggered. The lookups are now restricted in G", "cve_id": "CVE-2022-24818", "title": "CVE-2022-24818", "source": "cvefixes", "timestamp": "2022-04-13", "split": "val"} +{"id": "f08b78bb01e226e9406f", "text": "CVE: CVE-2022-2066\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Reflected in GitHub repository neorazorx/facturascripts prior to 2022.06.'}]\n\nFix commit: Sanitized username when showing user not found message.\n------\nSaneado nombre de usuario al mostrar el mensaje de usuario no encontrado.", "cve_id": "CVE-2022-2066", "title": "CVE-2022-2066", "source": "cvefixes", "timestamp": "2022-06-13", "split": "val"} +{"id": "CVE-2023-47565", "text": "QNAP VioStor NVR OS Command Injection Vulnerability\n\nAffected: QNAP VioStor NVR\n\nQNAP VioStar NVR contains an OS command injection vulnerability that allows authenticated users to execute commands via a network.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-78\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-47565", "title": "QNAP VioStor NVR OS Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2023-12-21", "split": "val"} +{"id": "ef30748276136ad151e0", "text": "CVE: CVE-2022-31090\n\n[{'lang': 'en', 'value': 'Guzzle, an extensible PHP HTTP client. `Authorization` headers on requests are sensitive information. In affected versions when using our Curl handler, it is possible to use the `CURLOPT_HTTPAUTH` option to specify an `Authorization` header. On making a request which responds with a redirect to a URI with a different origin (change in host, scheme or port), if we choose to follow it, we should remove the `CURLOPT_HTTPAUTH` option before continuing,", "cve_id": "CVE-2022-31090", "title": "CVE-2022-31090", "source": "cvefixes", "timestamp": "2022-06-27", "split": "val"} +{"id": "236062b799a2b75f843f", "text": "CVE: CVE-2022-23638\n\n[{'lang': 'en', 'value': 'svg-sanitizer is a SVG/XML sanitizer written in PHP. A cross-site scripting vulnerability impacts all users of the `svg-sanitizer` library prior to version 0.15.0. This issue is fixed in version 0.15.0. There is currently no workaround available.'}]\n\nFix commit: Merge pull request from GHSA-fqx8-v33p-4qcc\n\nAdvisory fix 1", "cve_id": "CVE-2022-23638", "title": "CVE-2022-23638", "source": "cvefixes", "timestamp": "2022-02-14", "split": "val"} +{"id": "e3f8e2c201dad8887ef8", "text": "[Code Injection] CVE-2022-40127: RCE in Apache Airflow <2.4.0 bash example\n\nairflow-2.3.3/airflow/example_dags/example_bash_operator.py has a command injection vulnerability.\nI can control the run_id in the following code(example_bash_operator.py),So I can inject custom commands.\n```\n also_run_this = BashOperator(\n task_id='also_run_this',\n bash_command='echo \"run_id={{ run_id }} | dag_run={{ dag_run }}\"',\n )\n```\nEnter the DAGs menu and start example_bash_operator task, selec", "cve_id": "CVE-2022-40127", "title": "CVE-2022-40127: RCE in Apache Airflow <2.4.0 bash example (Code Injection)", "source": "hackerone", "timestamp": "2023-01-05", "split": "val"} +{"id": "fc8fd1e8842821b3c3fc", "text": "CVE: CVE-2022-0238\n\n[{'lang': 'en', 'value': 'phoronix-test-suite is vulnerable to Cross-Site Request Forgery (CSRF)'}]\n\nFix commit: phoromatic: Additional input sanitization / validation", "cve_id": "CVE-2022-0238", "title": "CVE-2022-0238", "source": "cvefixes", "timestamp": "2022-01-16", "split": "val"} +{"id": "98ba7b2ff2ae714c3ca6", "text": "CVE: CVE-2022-0905\n\n[{'lang': 'en', 'value': 'Improper Authorization in GitHub repository go-gitea/gitea prior to 1.16.4.'}]\n\nFix commit: fix pam authorization (#19040)\n\nhttps://huntr.dev/bounties/8d221f92-b2b1-4878-bc31-66ff272e5ceb/\r\n\r\nCo-authored-by: ysf <34326+ysf@users.noreply.github.com>", "cve_id": "CVE-2022-0905", "title": "CVE-2022-0905", "source": "cvefixes", "timestamp": "2022-03-10", "split": "val"} +{"id": "c9e97a7810905043a7ae", "text": "CVE: CVE-2022-2921\n\n[{'lang': 'en', 'value': 'Exposure of Private Personal Information to an Unauthorized Actor in GitHub repository notrinos/notrinoserp prior to v0.7. This results in privilege escalation to a system administrator account. An attacker can gain access to protected functionality such as create/update companies, install/update languages, install/activate extensions, install/activate themes and other permissive actions.'}]\n\nFix commit: changed password hash method from md5 to bcryp", "cve_id": "CVE-2022-2921", "title": "CVE-2022-2921", "source": "cvefixes", "timestamp": "2022-08-21", "split": "val"} +{"id": "3b7246129df01c01091d", "text": "CVE: CVE-2022-25321\n\n[{'lang': 'en', 'value': 'An issue was discovered in Cerebrate through 1.4. XSS could occur in the bookmarks component.'}]\n\nFix commit: fix: [userSettings] Perform URI validation for bookmarks\n\n- As reported by Dawid Czarnecki from Zigrin Security", "cve_id": "CVE-2022-25321", "title": "CVE-2022-25321", "source": "cvefixes", "timestamp": "2022-02-18", "split": "val"} +{"id": "6d6d47108795165a21b9", "text": "CVE: CVE-2022-23654\n\n[{'lang': 'en', 'value': 'Wiki.js is a wiki app built on Node.js. In affected versions an authenticated user with write access on a restricted set of paths can update a page outside the allowed paths by specifying a different target page ID while keeping the path intact. The access control incorrectly check the path access against the user-provided values instead of the actual path associated to the page ID. Commit https://github.com/Requarks/wiki/commit/411802ec2f654bb5ed11", "cve_id": "CVE-2022-23654", "title": "CVE-2022-23654", "source": "cvefixes", "timestamp": "2022-02-22", "split": "val"} +{"id": "28b525a75006b50c7a92", "text": "CVE: CVE-2022-2564\n\n[{'lang': 'en', 'value': 'Prototype Pollution in GitHub repository automattic/mongoose prior to 6.4.6.'}]\n\nFix commit: fix(schema): disallow setting __proto__ when creating schema with dotted properties\n\nFix #12085", "cve_id": "CVE-2022-2564", "title": "CVE-2022-2564", "source": "cvefixes", "timestamp": "2022-07-28", "split": "val"} +{"id": "611d65a582d3a0c15b83", "text": "CVE: CVE-2022-24780\n\n[{'lang': 'en', 'value': 'Combodo iTop is a web based IT Service Management tool. In versions prior to 2.7.6 and 3.0.0, users of the iTop user portal can send TWIG code to the server by forging specific http queries, and execute arbitrary code on the server using http server user privileges. This issue is fixed in versions 2.7.6 and 3.0.0. There are currently no known workarounds.'}]\n\nFix commit: N°4384 Fix PHP warning when decoding formmanager_data when it is already in a P", "cve_id": "CVE-2022-24780", "title": "CVE-2022-24780", "source": "cvefixes", "timestamp": "2022-04-05", "split": "val"} +{"id": "b2944ae389334d812f32", "text": "CVE: CVE-2022-23579\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The Grappler optimizer in TensorFlow can be used to cause a denial of service by altering a `SavedModel` such that `SafeToRemoveIdentity` would trigger `CHECK` failures. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: Prevent a", "cve_id": "CVE-2022-23579", "title": "CVE-2022-23579", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val"} +{"id": "c7a8ca0a7bb6d049bec7", "text": "CVE: CVE-2022-35414\n\n[{'lang': 'en', 'value': 'softmmu/physmem.c in QEMU through 7.0.0 can perform an uninitialized read on the translate_fail path, leading to an io_readx or io_writex crash.'}]\n\nFix commit: softmmu: Always initialize xlat in address_space_translate_for_iotlb\n\nThe bug is an uninitialized memory read, along the translate_fail\npath, which results in garbage being read from iotlb_to_section,\nwhich can lead to a crash in io_readx/io_writex.\n\nThe bug may be fixed by writing any value", "cve_id": "CVE-2022-35414", "title": "CVE-2022-35414", "source": "cvefixes", "timestamp": "2022-07-11", "split": "val"} +{"id": "7ef4e63f99872aa2c2ba", "text": "CVE: CVE-2022-1514\n\n[{'lang': 'en', 'value': \"Stored XSS via upload plugin functionality in zip format in GitHub repository neorazorx/facturascripts prior to 2022.06. Cross-site scripting attacks can have devastating consequences. Code injected into a vulnerable application can exfiltrate data or install malware on the user's machine. Attackers can masquerade as authorized users via session cookies, allowing them to perform any action allowed by the user account.\"}]\n\nFix commit: Sanitized the da", "cve_id": "CVE-2022-1514", "title": "CVE-2022-1514", "source": "cvefixes", "timestamp": "2022-04-28", "split": "val"} +{"id": "a5c1ac904c9d24832470", "text": "CVE: CVE-2022-2134\n\n[{'lang': 'en', 'value': 'Denial of Service in GitHub repository inventree/inventree prior to 0.8.0.'}]\n\nFix commit: Remove reliance on django-markdownx (#3231)\n\n* Remove reliance on django-markdownx\r\n\r\n- We are now rendering notes on the client side using easymde\r\n- No longer any need to utilize the markdownx integration\r\n- Adds character limit for notes fields`\r\n\r\n* Adjust legacy migrations - remove references to markdownx\r\n\r\n* Fix bug for company notes field", "cve_id": "CVE-2022-2134", "title": "CVE-2022-2134", "source": "cvefixes", "timestamp": "2022-06-20", "split": "val"} +{"id": "f21bd74f8576666021ae", "text": "CVE: CVE-2022-29201\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.QuantizedConv2D` does not fully validate the input arguments. In this case, references get bound to `nullptr` for each argument that is empty. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.'}]\n\nFix commit: Fix undefined behavior in QuantizedConv2D\n\nAdded more input validation and tes", "cve_id": "CVE-2022-29201", "title": "CVE-2022-29201", "source": "cvefixes", "timestamp": "2022-05-20", "split": "val"} +{"id": "ae7f62ada474adeb74c5", "text": "CVE: CVE-2022-23623\n\n[{'lang': 'en', 'value': 'Frourio is a full stack framework, for TypeScript. Frourio users who uses frourio version prior to v0.26.0 and integration with class-validator through `validators/` folder are subject to a input validation vulnerability. Validators do not work properly for request bodies and queries in specific situations and some input is not validated at all. Users are advised to update frourio to v0.26.0 or later and to install `class-transformer` and `reflect-m", "cve_id": "CVE-2022-23623", "title": "CVE-2022-23623", "source": "cvefixes", "timestamp": "2022-02-07", "split": "val"} +{"id": "cc88250b20bf93635fe3", "text": "CVE: CVE-2022-1815\n\n[{'lang': 'en', 'value': 'Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository jgraph/drawio prior to 18.1.2.'}]\n\nFix commit: 18.1.2 release", "cve_id": "CVE-2022-1815", "title": "CVE-2022-1815", "source": "cvefixes", "timestamp": "2022-05-25", "split": "val"} +{"id": "ec1b3113c720fe9d8828", "text": "CVE: CVE-2022-2037\n\n[{'lang': 'en', 'value': 'Excessive Attack Surface in GitHub repository tooljet/tooljet prior to v1.16.0.'}]\n\nFix commit: [BUG] Account level security issue (#3150)\n\n* bug fixes\r\n\r\n* changes\r\n\r\n* changes for single workspace support\r\n\r\n* added guards for signup route\r\n\r\n* test cases fixes\r\n\r\n* Workspace invite and user onboarding flow changes (#3190)\r\n\r\n* invite user flow changes\r\n\r\n* review comments\r\n\r\n* cleanup\r\n\r\n* testcase fix", "cve_id": "CVE-2022-2037", "title": "CVE-2022-2037", "source": "cvefixes", "timestamp": "2022-06-09", "split": "val"} +{"id": "95595bf239780273a63c", "text": "CVE: CVE-2022-0542\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - DOM in GitHub repository chatwoot/chatwoot prior to 2.7.0.'}]\n\nFix commit: fix: Handle unsanitized markup in DOM (#4110)", "cve_id": "CVE-2022-0542", "title": "CVE-2022-0542", "source": "cvefixes", "timestamp": "2022-08-19", "split": "val"} +{"id": "eb3926aad6313695dd0d", "text": "CVE: CVE-2022-2339\n\n[{'lang': 'en', 'value': \"With this SSRF vulnerability, an attacker can reach internal addresses to make a request as the server and read it's contents. This attack can lead to leak of sensitive information.\"}]\n\nFix commit: Merge pull request #2495 from nocodb/develop\n\nPre-release 0.92.0", "cve_id": "CVE-2022-2339", "title": "CVE-2022-2339", "source": "cvefixes", "timestamp": "2022-07-07", "split": "val"} +{"id": "834d9dfd4d42ec838586", "text": "[Session Fixation] CVE-2023-40273: Session fixation in Apache Airflow web interface\n\nWhen I reset the password of the test user through the button Reset Password, I hope that the person who previously had the password of the test user will lose the corresponding authority. However, if others have logged in to the test user before, they can still use the account.\n{F2630619}\n{F2630620}\nIn short,Change user password wouldn't prevent an already authenticated user from being able to continue using th", "cve_id": "CVE-2023-40273", "title": "CVE-2023-40273: Session fixation in Apache Airflow web interface (Session Fixation)", "source": "hackerone", "timestamp": "2023-09-04", "split": "val"} +{"id": "ce4f131e0bd25338018d", "text": "CVE: CVE-2022-0612\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in Packagist remdex/livehelperchat prior to 3.93v.'}]\n\nFix commit: Non bindable logo", "cve_id": "CVE-2022-0612", "title": "CVE-2022-0612", "source": "cvefixes", "timestamp": "2022-02-16", "split": "val"} +{"id": "70cc9e8516ccfa602e67", "text": "CVE: CVE-2022-24711\n\n[{'lang': 'en', 'value': 'CodeIgniter4 is the 4.x branch of CodeIgniter, a PHP full-stack web framework. Prior to version 4.1.9, an improper input validation vulnerability allows attackers to execute CLI routes via HTTP request. Version 4.1.9 contains a patch. There are currently no known workarounds for this vulnerability.'}]\n\nFix commit: Merge pull request from GHSA-xjp4-6w75-qrj7\n\nHotfix 4.1.9", "cve_id": "CVE-2022-24711", "title": "CVE-2022-24711", "source": "cvefixes", "timestamp": "2022-02-28", "split": "val"} +{"id": "CVE-2023-32409", "text": "Apple Multiple Products WebKit Sandbox Escape Vulnerability\n\nAffected: Apple Multiple Products\n\nApple iOS, iPadOS, macOS, tvOS, watchOS, and Safari WebKit contain an unspecified vulnerability that can allow a remote attacker to break out of the Web Content sandbox. This vulnerability could impact HTML parsers that use WebKit, including but not limited to Apple Safari and non-Apple products which rely on WebKit for HTML processing.\n\nRequired Action: Apply updates per vendor instructions.\n\n[Source", "cve_id": "CVE-2023-32409", "title": "Apple Multiple Products WebKit Sandbox Escape Vulnerability", "source": "cisa_kev", "timestamp": "2023-05-22", "split": "val"} +{"id": "6c3e3a83b7f3ef014059", "text": "CVE: CVE-2022-34494\n\n[{'lang': 'en', 'value': 'rpmsg_virtio_add_ctrl_dev in drivers/rpmsg/virtio_rpmsg_bus.c in the Linux kernel before 5.18.4 has a double free.'}]\n\nFix commit: rpmsg: virtio: Fix possible double free in rpmsg_virtio_add_ctrl_dev()\n\nvch will be free in virtio_rpmsg_release_device() when\nrpmsg_ctrldev_register_device() fails. There is no need to call\nkfree() again.\n\nFixes: c486682ae1e2 (\"rpmsg: virtio: Register the rpmsg_char device\")\nSigned-off-by: Hangyu Hua ", "cve_id": "CVE-2022-34494", "title": "CVE-2022-34494", "source": "cvefixes", "timestamp": "2022-06-26", "split": "val"} +{"id": "09d77b3325752322d54e", "text": "CVE: CVE-2022-28796\n\n[{'lang': 'en', 'value': 'jbd2_journal_wait_updates in fs/jbd2/transaction.c in the Linux kernel before 5.17.1 has a use-after-free caused by a transaction_t race condition.'}]\n\nFix commit: jbd2: fix use-after-free of transaction_t race\n\njbd2_journal_wait_updates() is called with j_state_lock held. But if\nthere is a commit in progress, then this transaction might get committed\nand freed via jbd2_journal_commit_transaction() ->\njbd2_journal_free_transaction(), when we release", "cve_id": "CVE-2022-28796", "title": "CVE-2022-28796", "source": "cvefixes", "timestamp": "2022-04-08", "split": "val"} +{"id": "7e1356d0a1e090a9f537", "text": "CVE: CVE-2022-25050\n\n[{'lang': 'en', 'value': 'rtl_433 21.12 was discovered to contain a stack overflow in the function somfy_iohc_decode(). This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted file.'}]\n\nFix commit: minor: Fix overflow in Clipsal-CMR113 and Somfy-IOHC reported by aug5t7", "cve_id": "CVE-2022-25050", "title": "CVE-2022-25050", "source": "cvefixes", "timestamp": "2022-03-02", "split": "val"} +{"id": "609b9cd2ee45040514cb", "text": "[Time-of-check Time-of-use (TOCTOU) Race Condition] CVE-2023-32001: fopen race condition\n\nAs we can see in the following curl code (line 59-61 https://github.com/curl/curl/blob/fb802b521af997230b65174a559f5c419520e142/lib/fopen.c ): \n```C\n if(stat(filename, &sb) == -1 || !S_ISREG(sb.st_mode)) {\n /* a non-regular file, fallback to direct fopen() */\n *fh = fopen(filename, FOPEN_WRITETEXT);\n...\n}\n...\n```\nThere is a race condition between the moment \"stat(filename, &sb)\" is executed and the m", "cve_id": "CVE-2023-32001", "title": "CVE-2023-32001: fopen race condition (Time-of-check Time-of-use (TOCTOU) Race Condition)", "source": "hackerone", "timestamp": "2023-07-25", "split": "val"} +{"id": "9dfa24108952a211a2a2", "text": "CVE: CVE-2022-0552\n\n[{'lang': 'en', 'value': 'A flaw was found in the original fix for the netty-codec-http CVE-2021-21409, where the OpenShift Logging openshift-logging/elasticsearch6-rhel8 container was incomplete. The vulnerable netty-codec-http maven package was not removed from the image content. This flaw affects origin-aggregated-logging versions 3.11.'}]\n\nFix commit: Update netty to 4.1.63", "cve_id": "CVE-2022-0552", "title": "CVE-2022-0552", "source": "cvefixes", "timestamp": "2022-04-11", "split": "val"} +{"id": "CVE-2023-27524", "text": "Apache Superset Insecure Default Initialization of Resource Vulnerability\n\nAffected: Apache Superset\n\nApache Superset contains an insecure default initialization of a resource vulnerability that allows an attacker to authenticate and access unauthorized resources on installations that have not altered the default configured SECRET_KEY according to installation instructions.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailabl", "cve_id": "CVE-2023-27524", "title": "Apache Superset Insecure Default Initialization of Resource Vulnerability", "source": "cisa_kev", "timestamp": "2024-01-08", "split": "val"} +{"id": "CVE-2022-33891", "text": "Apache Spark Command Injection Vulnerability\n\nAffected: Apache Spark\n\nApache Spark contains a command injection vulnerability via Spark User Interface (UI) when Access Control Lists (ACLs) are enabled.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-78\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-33891", "title": "Apache Spark Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2023-03-07", "split": "val"} +{"id": "aeddab44b9fe29a7ee7e", "text": "CVE: CVE-2022-1767\n\n[{'lang': 'en', 'value': 'Server-Side Request Forgery (SSRF) in GitHub repository jgraph/drawio prior to 18.0.7.'}]\n\nFix commit: 18.0.7 release", "cve_id": "CVE-2022-1767", "title": "CVE-2022-1767", "source": "cvefixes", "timestamp": "2022-05-18", "split": "val"} +{"id": "f148a03f0e372e1a231a", "text": "CVE: CVE-2022-23653\n\n[{'lang': 'en', 'value': 'B2 Command Line Tool is the official command line tool for the backblaze cloud storage service. Linux and Mac releases of the B2 command-line tool version 3.2.0 and below contain a key disclosure vulnerability that, in certain conditions, can be exploited by local attackers through a time-of-check-time-of-use (TOCTOU) race condition. The command line tool saves API keys (and bucket name-to-id mapping) in a local database file (`$XDG_CONFIG_HOME/b2/a", "cve_id": "CVE-2022-23653", "title": "CVE-2022-23653", "source": "cvefixes", "timestamp": "2022-02-23", "split": "val"} +{"id": "dfad67a224527d7bad41", "text": "CVE: CVE-2022-0688\n\n[{'lang': 'en', 'value': 'Business Logic Errors in Packagist microweber/microweber prior to 1.2.11.'}]\n\nFix commit: update", "cve_id": "CVE-2022-0688", "title": "CVE-2022-0688", "source": "cvefixes", "timestamp": "2022-02-20", "split": "val"} +{"id": "4e6914db61ab0e7b7334", "text": "CVE: CVE-2022-2653\n\n[{'lang': 'en', 'value': 'With this vulnerability an attacker can read many sensitive files like configuration files, or the /proc/self/environ file, that contains the environment variable used by the web server that includes database credentials. If the web server user is root, an attacker will be able to read any file in the system.'}]\n\nFix commit: fix: Fix path traversal vulnerability", "cve_id": "CVE-2022-2653", "title": "CVE-2022-2653", "source": "cvefixes", "timestamp": "2022-08-04", "split": "val"} +{"id": "7374933b179fb7e28618", "text": "CVE: CVE-2022-24842\n\n[{'lang': 'en', 'value': 'MinIO is a High Performance Object Storage released under GNU Affero General Public License v3.0. A security issue was found where an non-admin user is able to create service accounts for root or other admin users and then is able to assume their access policies via the generated credentials. This in turn allows the user to escalate privilege to that of the root user. This vulnerability has been resolved in pull request #14729 and is included in `RE", "cve_id": "CVE-2022-24842", "title": "CVE-2022-24842", "source": "cvefixes", "timestamp": "2022-04-12", "split": "val"} +{"id": "5f64c9bd508948b28eef", "text": "CVE: CVE-2022-0623\n\n[{'lang': 'en', 'value': 'Out-of-bounds Read in Homebrew mruby prior to 3.2.'}]\n\nFix commit: vm.c: should check type before hash access.\n\nSince the operand of double splat (`**`) may not be a hash, simple\nassertion (previous code since d42a64e) was not enough for this case.", "cve_id": "CVE-2022-0623", "title": "CVE-2022-0623", "source": "cvefixes", "timestamp": "2022-02-17", "split": "val"} +{"id": "df5f4bc093316f5129a0", "text": "CVE: CVE-2022-21682\n\n[{'lang': 'en', 'value': 'Flatpak is a Linux application sandboxing and distribution framework. A path traversal vulnerability affects versions of Flatpak prior to 1.12.3 and 1.10.6. flatpak-builder applies `finish-args` last in the build. At this point the build directory will have the full access that is specified in the manifest, so running `flatpak build` against it will gain those permissions. Normally this will not be done, so this is not problem. However, if `--mirror", "cve_id": "CVE-2022-21682", "title": "CVE-2022-21682", "source": "cvefixes", "timestamp": "2022-01-13", "split": "val"} +{"id": "6b55f5b5471e48d0f408", "text": "CVE: CVE-2022-24797\n\n[{'lang': 'en', 'value': \"Pomerium is an identity-aware access proxy. In distributed service mode, Pomerium's Authenticate service exposes pprof debug and prometheus metrics handlers to untrusted traffic. This can leak potentially sensitive environmental information or lead to limited denial of service conditions. This issue is patched in version v0.17.1 Workarounds: Block access to `/debug` and `/metrics` paths on the authenticate service. This can be done with any L7 proxy", "cve_id": "CVE-2022-24797", "title": "CVE-2022-24797", "source": "cvefixes", "timestamp": "2022-03-31", "split": "val"} +{"id": "8ea0a0bfee5237ebb922", "text": "CVE: CVE-2022-23568\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The implementation of `AddManySparseToTensorsMap` is vulnerable to an integer overflow which results in a `CHECK`-fail when building new `TensorShape` objects (so, an assert failure based denial of service). We are missing some validation on the shapes of the input tensors as well as directly constructing a large `TensorShape` with user-provided dimensions. The fix will be included in TensorFl", "cve_id": "CVE-2022-23568", "title": "CVE-2022-23568", "source": "cvefixes", "timestamp": "2022-02-03", "split": "val"} +{"id": "0347e548d2547bde9fd0", "text": "CVE: CVE-2022-2125\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.5122: lisp indenting my run over the end of the line\n\nProblem: Lisp indenting my run over the end of the line.\nSolution: Check for NUL earlier.", "cve_id": "CVE-2022-2125", "title": "CVE-2022-2125", "source": "cvefixes", "timestamp": "2022-06-19", "split": "val"} +{"id": "0ee0327873dae873ad68", "text": "CVE: CVE-2022-2932\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Reflected in GitHub repository bustle/mobiledoc-kit prior to 0.14.2.'}]\n\nFix commit: Update dependencies 8/18/22 (#771)\n\n* Update devDependencies\r\n\r\n* Update mobiledoc-dom-renderer\r\n\r\n* pin", "cve_id": "CVE-2022-2932", "title": "CVE-2022-2932", "source": "cvefixes", "timestamp": "2022-08-22", "split": "val"} +{"id": "32fc4f2fb4928bca06c0", "text": "[Authentication Bypass by Primary Weakness] CVE-2023-27538: SSH connection too eager reuse still\n\n## Summary:\nThere's a check if SSH keys match between new and existing connection when considering reuse. This check is broken due to wrong comparison:\n`#define PROTO_FAMILY_SSH (CURLPROTO_SCP|CURLPROTO_SFTP)`\n...\n`else if(get_protocol_family(needle->handler) == PROTO_FAMILY_SSH) {`\nThis never matches as handler family is either `CURLPROTO_SCP` or `CURLPROTO_SFTP`.\n\n## Remediation\n\n* Make the code:", "cve_id": "CVE-2023-27538", "title": "CVE-2023-27538: SSH connection too eager reuse still (Authentication Bypass by Primary Weakness)", "source": "hackerone", "timestamp": "2023-03-22", "split": "val"} +{"id": "3ff7aa30838de11305ec", "text": "CVE: CVE-2022-21708\n\n[{'lang': 'en', 'value': 'graphql-go is a GraphQL server with a focus on ease of use. In versions prior to 1.3.0 there exists a DoS vulnerability that is possible due to a bug in the library that would allow an attacker with specifically designed queries to cause stack overflow panics. Any user with access to the GraphQL handler can send these queries and cause stack overflows. This in turn could potentially compromise the ability of the server to serve data to its users. Th", "cve_id": "CVE-2022-21708", "title": "CVE-2022-21708", "source": "cvefixes", "timestamp": "2022-01-21", "split": "val"} +{"id": "c52a5d3f13d5583477f9", "text": "CVE: CVE-2022-1064\n\n[{'lang': 'en', 'value': 'SQL injection through marking blog comments on bulk as spam in GitHub repository forkcms/forkcms prior to 5.11.1.'}]\n\nFix commit: Prevent sql injection through the ids of the blog comments", "cve_id": "CVE-2022-1064", "title": "CVE-2022-1064", "source": "cvefixes", "timestamp": "2022-03-25", "split": "val"} +{"id": "173a6cd345a5860bf3f1", "text": "CVE: CVE-2022-24710\n\n[{'lang': 'en', 'value': 'Weblate is a copyleft software web-based continuous localization system. Versions prior to 4.11 do not properly neutralize user input used in user name and language fields. Due to this improper neutralization it is possible to perform cross-site scripting via these fields. The issues were fixed in the 4.11 release. Users unable to upgrade are advised to add their own neutralize logic.'}]\n\nFix commit: translate: Add missing escaping to language name", "cve_id": "CVE-2022-24710", "title": "CVE-2022-24710", "source": "cvefixes", "timestamp": "2022-02-25", "split": "val"} +{"id": "2442138b673694073707", "text": "CVE: CVE-2022-0153\n\n[{'lang': 'en', 'value': 'SQL Injection in GitHub repository forkcms/forkcms prior to 5.11.1.'}]\n\nFix commit: Prevent sql injection through the ids of the action", "cve_id": "CVE-2022-0153", "title": "CVE-2022-0153", "source": "cvefixes", "timestamp": "2022-03-24", "split": "val"} +{"id": "2f9355492d09fd7fd2a6", "text": "CVE: CVE-2022-1531\n\n[{'lang': 'en', 'value': 'SQL injection vulnerability in ARAX-UI Synonym Lookup functionality in GitHub repository rtxteam/rtx prior to checkpoint_2022-04-20 . This vulnerability is critical as it can lead to remote code execution and thus complete server takeover.'}]\n\nFix commit: avoid SQL injection exploits", "cve_id": "CVE-2022-1531", "title": "CVE-2022-1531", "source": "cvefixes", "timestamp": "2022-04-29", "split": "val"} +{"id": "df7ce7038c7a84f8803b", "text": "CVE: CVE-2022-2777\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository microweber/microweber prior to 1.3.1.'}]\n\nFix commit: update", "cve_id": "CVE-2022-2777", "title": "CVE-2022-2777", "source": "cvefixes", "timestamp": "2022-08-11", "split": "val"} +{"id": "0a3efec598c8e17baef0", "text": "CVE: CVE-2022-24713\n\n[{'lang': 'en', 'value': \"regex is an implementation of regular expressions for the Rust language. The regex crate features built-in mitigations to prevent denial of service attacks caused by untrusted regexes, or untrusted input matched by trusted regexes. Those (tunable) mitigations already provide sane defaults to prevent attacks. This guarantee is documented and it's considered part of the crate's API. Unfortunately a bug was discovered in the mitigations designed to pre", "cve_id": "CVE-2022-24713", "title": "CVE-2022-24713", "source": "cvefixes", "timestamp": "2022-03-08", "split": "val"} +{"id": "8a53c9d369885d69354e", "text": "CVE: CVE-2022-1219\n\n[{'lang': 'en', 'value': 'SQL injection in RecyclebinController.php in GitHub repository pimcore/pimcore prior to 10.3.5. This vulnerability is capable of steal the data'}]\n\nFix commit: [Recyclebin] Quote condition filter", "cve_id": "CVE-2022-1219", "title": "CVE-2022-1219", "source": "cvefixes", "timestamp": "2022-04-08", "split": "val"} +{"id": "3ea053860450108dfeb0", "text": "CVE: CVE-2022-0261\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.4120: block insert goes over the end of the line\n\nProblem: Block insert goes over the end of the line.\nSolution: Handle invalid byte better. Fix inserting the wrong text.", "cve_id": "CVE-2022-0261", "title": "CVE-2022-0261", "source": "cvefixes", "timestamp": "2022-01-18", "split": "val"} +{"id": "22ce98095159626e8950", "text": "CVE: CVE-2022-31173\n\n[{'lang': 'en', 'value': 'Juniper is a GraphQL server library for Rust. Affected versions of Juniper are vulnerable to uncontrolled recursion resulting in a program crash. This issue has been addressed in version 0.15.10. Users are advised to upgrade. Users unable to upgrade should limit the recursion depth manually.'}]\n\nFix commit: Backport CVE-2022-31173 fix from GHSA-4rx6-g5vg-5f3j\n\nCo-authored-by: ilslv ", "cve_id": "CVE-2022-31173", "title": "CVE-2022-31173", "source": "cvefixes", "timestamp": "2022-08-01", "split": "val"} +{"id": "678c617cda79453e2157", "text": "CVE: CVE-2022-24448\n\n[{'lang': 'en', 'value': 'An issue was discovered in fs/nfs/dir.c in the Linux kernel before 5.16.5. If an application sets the O_DIRECTORY flag, and tries to open a regular file, nfs_atomic_open() performs a regular lookup. If a regular file is found, ENOTDIR should occur, but the server instead returns uninitialized data in the file descriptor.'}]\n\nFix commit: NFSv4: Handle case where the lookup of a directory fails\n\nIf the application sets the O_DIRECTORY flag, and tries", "cve_id": "CVE-2022-24448", "title": "CVE-2022-24448", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val"} +{"id": "e4b83ca55dbe71930642", "text": "CVE: CVE-2022-1437\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash.'}]\n\nFix commit: Fix oobread and null deref in symbols file parser ##crash\n\n* Reported by @cnitlrt\n* BountyID: af6c3e9e-b7df-4d80-b48f-77fdd17b4038/\n* Reproducer: symoob", "cve_id": "CVE-2022-1437", "title": "CVE-2022-1437", "source": "cvefixes", "timestamp": "2022-04-22", "split": "val"} +{"id": "d4c7d44dd8ea1b024cd6", "text": "CVE: CVE-2022-21504\n\n[{'lang': 'en', 'value': 'The code in UEK6 U3 was missing an appropiate file descriptor count to be missing. This resulted in a use count error that allowed a file descriptor to a socket to be closed and freed while it was still in use by another portion of the kernel. An attack with local access can operate on the socket, and cause a denial of service. CVSS 3.1 Base Score 6.2 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).'}]\n\nFix commit", "cve_id": "CVE-2022-21504", "title": "CVE-2022-21504", "source": "cvefixes", "timestamp": "2022-06-14", "split": "val"} +{"id": "ae4b1ccf4367eaffd159", "text": "CVE: CVE-2022-34132\n\n[{'lang': 'en', 'value': 'Benjamin BALET Jorani v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at application/controllers/Leaves.php.'}]\n\nFix commit: BF:Prevent SQL injection fix #369", "cve_id": "CVE-2022-34132", "title": "CVE-2022-34132", "source": "cvefixes", "timestamp": "2022-06-28", "split": "val"} +{"id": "CVE-2023-38831", "text": "RARLAB WinRAR Code Execution Vulnerability\n\nAffected: RARLAB WinRAR\n\nRARLAB WinRAR contains an unspecified vulnerability that allows an attacker to execute code when a user attempts to view a benign file within a ZIP archive.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-351\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-38831", "title": "RARLAB WinRAR Code Execution Vulnerability", "source": "cisa_kev", "timestamp": "2023-08-24", "split": "val"} +{"id": "b2b542213ec1404db3dd", "text": "CVE: CVE-2022-0945\n\n[{'lang': 'en', 'value': 'Stored XSS viva axd and cshtml file upload in star7th/showdoc in GitHub repository star7th/showdoc prior to v2.10.4.'}]\n\nFix commit: bug", "cve_id": "CVE-2022-0945", "title": "CVE-2022-0945", "source": "cvefixes", "timestamp": "2022-03-15", "split": "val"} +{"id": "247a2e352f1bbf4f2b7e", "text": "CVE: CVE-2022-0339\n\n[{'lang': 'en', 'value': 'Server-Side Request Forgery (SSRF) in Pypi calibreweb prior to 0.6.16.'}]\n\nFix commit: Kobo sync token is now also created if accessed from localhost(fixes #1990)\nCreate kobo sync token button is now \"unclicked\" after closing dialog\nAdditional localhost route is catched\nIf book format is deleted this also deletes the book synced to kobo status", "cve_id": "CVE-2022-0339", "title": "CVE-2022-0339", "source": "cvefixes", "timestamp": "2022-01-30", "split": "val"} +{"id": "b2afb7e0b2488e7273b1", "text": "CVE: CVE-2022-2454\n\n[{'lang': 'en', 'value': 'Integer Overflow or Wraparound in GitHub repository gpac/gpac prior to 2.1-DEV.'}]\n\nFix commit: fixed #2213", "cve_id": "CVE-2022-2454", "title": "CVE-2022-2454", "source": "cvefixes", "timestamp": "2022-07-19", "split": "val"} +{"id": "2807d2afa6a2cc7ef947", "text": "CVE: CVE-2022-0359\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.4214: illegal memory access with large 'tabstop' in Ex mode\n\nProblem: Illegal memory access with large 'tabstop' in Ex mode.\nSolution: Allocate enough memory.", "cve_id": "CVE-2022-0359", "title": "CVE-2022-0359", "source": "cvefixes", "timestamp": "2022-01-26", "split": "val"} +{"id": "fdb27345f8b594fde292", "text": "CVE: CVE-2022-2885\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository yetiforcecompany/yetiforcecrm prior to 6.4.0.'}]\n\nFix commit: Improved input data cleanup", "cve_id": "CVE-2022-2885", "title": "CVE-2022-2885", "source": "cvefixes", "timestamp": "2022-08-21", "split": "val"} +{"id": "82a82051d5570081395e", "text": "CVE: CVE-2022-0571\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Reflected in GitHub repository phoronix-test-suite/phoronix-test-suite prior to 10.8.2.'}]\n\nFix commit: phoromatic: Reject HTML encoded character input and other strings that likely have no use within the context of Phoromatic inputs", "cve_id": "CVE-2022-0571", "title": "CVE-2022-0571", "source": "cvefixes", "timestamp": "2022-02-14", "split": "val"} +{"id": "CVE-2023-40044", "text": "Progress WS_FTP Server Deserialization of Untrusted Data Vulnerability\n\nAffected: Progress WS_FTP Server\n\nProgress WS_FTP Server contains a deserialization of untrusted data vulnerability in the Ad Hoc Transfer module that allows an authenticated attacker to execute remote commands on the underlying operating system.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-502\n\n[Source: CISA Know", "cve_id": "CVE-2023-40044", "title": "Progress WS_FTP Server Deserialization of Untrusted Data Vulnerability", "source": "cisa_kev", "timestamp": "2023-10-05", "split": "val"} +{"id": "CVE-2022-24112", "text": "Apache APISIX Authentication Bypass Vulnerability\n\nAffected: Apache APISIX\n\nApache APISIX contains an authentication bypass vulnerability that allows for remote code execution.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-290\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-24112", "title": "Apache APISIX Authentication Bypass Vulnerability", "source": "cisa_kev", "timestamp": "2022-08-25", "split": "val"} +{"id": "25f4cc4fb2b26fb09bbb", "text": "CVE: CVE-2022-29189\n\n[{'lang': 'en', 'value': 'Pion DTLS is a Go implementation of Datagram Transport Layer Security. Prior to version 2.1.4, a buffer that was used for inbound network traffic had no upper limit. Pion DTLS would buffer all network traffic from the remote user until the handshake completes or timed out. An attacker could exploit this to cause excessive memory usage. Version 2.1.4 contains a patch for this issue. There are currently no known workarounds available.'}]\n\nFix commit:", "cve_id": "CVE-2022-29189", "title": "CVE-2022-29189", "source": "cvefixes", "timestamp": "2022-05-21", "split": "val"} +{"id": "ee5a2d9affe7a593d0ab", "text": "CVE: CVE-2022-29530\n\n[{'lang': 'en', 'value': 'An issue was discovered in MISP before 2.4.158. There is stored XSS in the galaxy clusters.'}]\n\nFix commit: fix: [security] XSS in galaxy clusters\n\n- fixed a stored XSS in the galaxy clusters\n\n- as reported by Dawid Czarnecki of Zigrin Security on behalf of the Luxembourg Army", "cve_id": "CVE-2022-29530", "title": "CVE-2022-29530", "source": "cvefixes", "timestamp": "2022-04-20", "split": "val"} +{"id": "d63286b2b6a0f756d558", "text": "CVE: CVE-2022-24976\n\n[{'lang': 'en', 'value': 'Atheme IRC Services before 7.2.12, when used in conjunction with InspIRCd, allows authentication bypass by ending an IRC handshake at a certain point during a challenge-response login sequence.'}]\n\nFix commit: saslserv/main: Track EID we're pending login to\n\nThe existing model does not remember that we've sent a SVSLOGIN for a\ngiven SASL session, and simply assumes that if a client is introduced\nwith a SASL session open, that session must have succe", "cve_id": "CVE-2022-24976", "title": "CVE-2022-24976", "source": "cvefixes", "timestamp": "2022-02-14", "split": "val"} +{"id": "50d94f7c4f728fd2589f", "text": "CVE: CVE-2022-2217\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Generic in GitHub repository ionicabizau/parse-url prior to 7.0.0.'}]\n\nFix commit: Refactor codebase, upgrade dependencies", "cve_id": "CVE-2022-2217", "title": "CVE-2022-2217", "source": "cvefixes", "timestamp": "2022-06-27", "split": "val"} +{"id": "330a33ec69968a3d2d4e", "text": "CVE: CVE-2022-0724\n\n[{'lang': 'en', 'value': 'Insecure Storage of Sensitive Information in GitHub repository microweber/microweber prior to 1.3.'}]\n\nFix commit: Update plupload.php", "cve_id": "CVE-2022-0724", "title": "CVE-2022-0724", "source": "cvefixes", "timestamp": "2022-02-23", "split": "val"} +{"id": "aeb644a587a07ec4675a", "text": "[Failure to Sanitize Special Elements into a Different Plane (Special Element Injection)] CVE-2023-27533: Telnet option IAC injection\n\n## Summary:\n`CURLOPT_TELNETOPTIONS` allows setting various telnet options for telnet protocol. Due to missing encoding of \"Interpret as Command\" `IAC` (0xff) character, the attacker who can control these option values can escape out of the telnet subnegotiation and enter arbitrary TELNET commands (*) via the `CURLOPT_TELNETOPTIONS` options. `TTYPE`, `XDISPLOC` a", "cve_id": "CVE-2023-27533", "title": "CVE-2023-27533: Telnet option IAC injection (Failure to Sanitize Special Elements into a Different Plane (Special Element Injection))", "source": "hackerone", "timestamp": "2023-03-22", "split": "val"} +{"id": "6c29b50cf52d481e0b8f", "text": "CVE: CVE-2022-0243\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in NuGet OrchardCore.Application.Cms.Targets prior to 1.2.2.'}]\n\nFix commit: Fix localization and sanitization usages (#11034)", "cve_id": "CVE-2022-0243", "title": "CVE-2022-0243", "source": "cvefixes", "timestamp": "2022-01-19", "split": "val"} +{"id": "117009bd85a6e10ac028", "text": "CVE: CVE-2022-0144\n\n[{'lang': 'en', 'value': 'shelljs is vulnerable to Improper Privilege Management'}]\n\nFix commit: fix(exec): lockdown file permissions (#1060)\n\nThis locks down file permissions used by the internal implementation of\r\n`shell.exec()`.\r\n\r\nIssue #1058\r\nTested manually using the documented scenarios", "cve_id": "CVE-2022-0144", "title": "CVE-2022-0144", "source": "cvefixes", "timestamp": "2022-01-11", "split": "val"} +{"id": "CVE-2023-46747", "text": "F5 BIG-IP Configuration Utility Authentication Bypass Vulnerability\n\nAffected: F5 BIG-IP Configuration Utility\n\nF5 BIG-IP Configuration utility contains an authentication bypass using an alternate path or channel vulnerability due to undisclosed requests that may allow an unauthenticated attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute system commands. This vulnerability can be used in conjunction with CVE-2023-46748.\n\nRequired Act", "cve_id": "CVE-2023-46747", "title": "F5 BIG-IP Configuration Utility Authentication Bypass Vulnerability", "source": "cisa_kev", "timestamp": "2023-10-31", "split": "val"} +{"id": "CVE-2022-27924", "text": "Synacor Zimbra Collaboration Suite (ZCS) Command Injection Vulnerability\n\nAffected: Synacor Zimbra Collaboration Suite (ZCS)\n\nSynacor Zimbra Collaboration Suite (ZCS) allows an attacker to inject memcache commands into a targeted instance which causes an overwrite of arbitrary cached entries.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-93\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-27924", "title": "Synacor Zimbra Collaboration Suite (ZCS) Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2022-08-04", "split": "val"} +{"id": "bb1bcd2198bc2ef3917d", "text": "CVE: CVE-2022-23617\n\n[{'lang': 'en', 'value': 'XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. In affected versions any user with edit right can copy the content of a page it does not have access to by using it as template of a new page. This issue has been patched in XWiki 13.2CR1 and 12.10.6. Users are advised to update. There are no known workarounds for this issue.'}]\n\nFix commit: XWIKI-18430: Page content is revealed to users that don", "cve_id": "CVE-2022-23617", "title": "CVE-2022-23617", "source": "cvefixes", "timestamp": "2022-02-09", "split": "val"} +{"id": "900f73685adc882087b4", "text": "CVE: CVE-2022-21684\n\n[{'lang': 'en', 'value': 'Discourse is an open source discussion platform. Versions prior to 2.7.13 in `stable`, 2.8.0.beta11 in `beta`, and 2.8.0.beta11 in `tests-passed` allow some users to log in to a community before they should be able to do so. A user invited via email to a forum with `must_approve_users` enabled is going to be automatically logged in, bypassing the check that does not allow unapproved users to sign in. They will be able to do everything an approved us", "cve_id": "CVE-2022-21684", "title": "CVE-2022-21684", "source": "cvefixes", "timestamp": "2022-01-13", "split": "val"} +{"id": "18a2647be93d7686ba28", "text": "CVE: CVE-2022-0986\n\n[{'lang': 'en', 'value': 'Reflected Cross-site Scripting (XSS) Vulnerability in GitHub repository hestiacp/hestiacp prior to 1.5.11.'}]\n\nFix commit: Patch out XSS in edit server (#2471)", "cve_id": "CVE-2022-0986", "title": "CVE-2022-0986", "source": "cvefixes", "timestamp": "2022-03-16", "split": "val"} +{"id": "1e8b1ed7d493b40709a9", "text": "CVE: CVE-2022-24778\n\n[{'lang': 'en', 'value': 'The imgcrypt library provides API exensions for containerd to support encrypted container images and implements the ctd-decoder command line tool for use by containerd to decrypt encrypted container images. The imgcrypt function `CheckAuthorization` is supposed to check whether the current used is authorized to access an encrypted image and prevent the user from running an image that another user previously decrypted on the same system. In versions", "cve_id": "CVE-2022-24778", "title": "CVE-2022-24778", "source": "cvefixes", "timestamp": "2022-03-25", "split": "val"} +{"id": "63033b5bc1138384104d", "text": "CVE: CVE-2022-22115\n\n[{'lang': 'en', 'value': 'In Teedy, versions v1.5 through v1.9 are vulnerable to Stored Cross-Site Scripting (XSS) in the name of a created Tag. Since the Tag name is not being sanitized properly in the edit tag page, a low privileged attacker can store malicious scripts in the name of the Tag. In the worst case, the victim who inadvertently triggers the attack is a highly privileged administrator. The injected scripts can extract the Session ID, which can lead to full Accou", "cve_id": "CVE-2022-22115", "title": "CVE-2022-22115", "source": "cvefixes", "timestamp": "2022-01-10", "split": "val"} +{"id": "6ef9e8a7718baf5cf200", "text": "CVE: CVE-2022-21190\n\n[{'lang': 'en', 'value': \"This affects the package convict before 6.2.3. This is a bypass of [CVE-2022-22143](https://security.snyk.io/vuln/SNYK-JS-CONVICT-2340604). The [fix](https://github.com/mozilla/node-convict/commit/3b86be087d8f14681a9c889d45da7fe3ad9cd880) introduced, relies on the startsWith method and does not prevent the vulnerability: before splitting the path, it checks if it starts with __proto__ or this.constructor.prototype. To bypass this check it's possible", "cve_id": "CVE-2022-21190", "title": "CVE-2022-21190", "source": "cvefixes", "timestamp": "2022-05-13", "split": "val"} +{"id": "92b89f4d6cbaafdec46f", "text": "CVE: CVE-2022-21740\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The implementation of `SparseCountSparseOutput` is vulnerable to a heap overflow. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: Further validate sparse tensor for `SparseCount`: indices must be valid within dense shape.\n\nPiper", "cve_id": "CVE-2022-21740", "title": "CVE-2022-21740", "source": "cvefixes", "timestamp": "2022-02-03", "split": "val"} +{"id": "0f8ce4868e9dd910b6a5", "text": "CVE: CVE-2022-0736\n\n[{'lang': 'en', 'value': 'Insecure Temporary File in GitHub repository mlflow/mlflow prior to 1.23.1.'}]\n\nFix commit: Use mkstemp to replace deprecated mktemp call (#5303)\n\n* Use mkstemp\r\n\r\nSigned-off-by: dbczumar \r\n\r\n* Remove num examples\r\n\r\nSigned-off-by: dbczumar \r\n\r\n* Close instead of remove\r\n\r\nSigned-off-by: dbczumar \r\n\r\n* Close the handle\r\n\r\nSigned-off-by: dbczumar A ReDoS issue was discovered in the URI component through 0.12.1 for Ruby. The URI parser mishandles invalid URLs that have specific characters. There is an increase in execution time for parsing strings to URI objects with rfc2396_parser.rb and rfc3986_parser.rb.\n\n> NOTE: this issue exists because of", "cve_id": "CVE-2023-28755", "title": "CVE-2023-36617: ReDoS vulnerability in URI (Ruby) (Unknown)", "source": "hackerone", "timestamp": "2023-08-15", "split": "val"} +{"id": "cd20c9fa80fc6bb476cc", "text": "CVE: CVE-2022-31507\n\n[{'lang': 'en', 'value': 'The ganga-devs/ganga repository before 8.5.10 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.'}]\n\nFix commit: # Absolute Path Traversal due to incorrect use of `send_file` call (#2025)\n\nA path traversal attack (also known as directory traversal) aims to access files and directories that are stored outside the web root folder. By manipulating variables that reference files with “dot-dot-slash (../)” seq", "cve_id": "CVE-2022-31507", "title": "CVE-2022-31507", "source": "cvefixes", "timestamp": "2022-07-11", "split": "val"} +{"id": "8dcbca45e347b86006a6", "text": "CVE: CVE-2022-23857\n\n[{'lang': 'en', 'value': \"model/criteria/criteria.go in Navidrome before 0.47.5 is vulnerable to SQL injection attacks when processing crafted Smart Playlists. An authenticated user could abuse this to extract arbitrary data from the database, including the user table (which contains sensitive information such as the users' encrypted passwords).\"}]\n\nFix commit: Fix potential SQL injection in Smart Playlists", "cve_id": "CVE-2022-23857", "title": "CVE-2022-23857", "source": "cvefixes", "timestamp": "2022-01-24", "split": "val"} +{"id": "c1a2615fc9aba88f4fbe", "text": "CVE: CVE-2022-23647\n\n[{'lang': 'en', 'value': \"Prism is a syntax highlighting library. Starting with version 1.14.0 and prior to version 1.27.0, Prism's command line plugin can be used by attackers to achieve a cross-site scripting attack. The command line plugin did not properly escape its output, leading to the input text being inserted into the DOM as HTML code. Server-side usage of Prism is not impacted. Websites that do not use the Command Line plugin are also not impacted. This bug has bee", "cve_id": "CVE-2022-23647", "title": "CVE-2022-23647", "source": "cvefixes", "timestamp": "2022-02-18", "split": "val"} +{"id": "e91b0d42632ca23129a6", "text": "CVE: CVE-2022-31183\n\n[{'lang': 'en', 'value': 'fs2 is a compositional, streaming I/O library for Scala. When establishing a server-mode `TLSSocket` using `fs2-io` on Node.js, the parameter `requestCert = true` is ignored, peer certificate verification is skipped, and the connection proceeds. The vulnerability is limited to: 1. `fs2-io` running on Node.js. The JVM TLS implementation is completely independent. 2. `TLSSocket`s in server-mode. Client-mode `TLSSocket`s are implemented via a different", "cve_id": "CVE-2022-31183", "title": "CVE-2022-31183", "source": "cvefixes", "timestamp": "2022-08-01", "split": "val"} +{"id": "9a3a9047b1a5b0f2d0bf", "text": "CVE: CVE-2022-1893\n\n[{'lang': 'en', 'value': 'Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository polonel/trudesk prior to 1.2.3.'}]\n\nFix commit: fix(core): image data removal", "cve_id": "CVE-2022-1893", "title": "CVE-2022-1893", "source": "cvefixes", "timestamp": "2022-05-31", "split": "val"} +{"id": "CVE-2022-22675", "text": "Apple macOS Out-of-Bounds Write Vulnerability\n\nAffected: Apple macOS\n\nmacOS Monterey contains an out-of-bounds write vulnerability that could allow an application to execute arbitrary code with kernel privileges.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-20, CWE-125\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-22675", "title": "Apple macOS Out-of-Bounds Write Vulnerability", "source": "cisa_kev", "timestamp": "2022-04-04", "split": "val"} +{"id": "843a51f177dd2d2e9437", "text": "CVE: CVE-2022-24304\n\n[{'lang': 'en', 'value': 'Schema in lib/schema.js in Mongoose before 6.4.6 is vulnerable to prototype pollution.'}]\n\nFix commit: fix(schema): disallow setting __proto__ when creating schema with dotted properties\n\nFix #12085", "cve_id": "CVE-2022-24304", "title": "CVE-2022-24304", "source": "cvefixes", "timestamp": "2022-08-26", "split": "val"} +{"id": "f80001daa7a5373b03ae", "text": "CVE: CVE-2022-0704\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.4.0.'}]\n\nFix commit: [Admin] Security - Add handler to enable Content Security Policy (#11447)\n\n* [Admin] Security - Add handler to enable Content Security Policy\r\n\r\n* [Admin] Security - Add handler to enable Content Security Policy\r\n\r\n* [Admin] Security - Add handler to enable Content Security Policy - fix document preview\r\n\r\n* [Admin] Security - Add handler to enab", "cve_id": "CVE-2022-0704", "title": "CVE-2022-0704", "source": "cvefixes", "timestamp": "2022-03-16", "split": "val"} +{"id": "8d1a495525f34f425bb7", "text": "CVE: CVE-2022-31032\n\n[{'lang': 'en', 'value': 'Tuleap is a Free & Open Source Suite to improve management of software developments and collaboration. In versions prior to 13.9.99.58 authorizations are not properly verified when creating projects or trackers from projects marked as templates. Users can get access to information in those template projects because the permissions model is not properly enforced. Users are advised to upgrade. There are no known workarounds for this issue.'}]\n\nFix com", "cve_id": "CVE-2022-31032", "title": "CVE-2022-31032", "source": "cvefixes", "timestamp": "2022-06-29", "split": "val"} +{"id": "deca45f2489b73243ad9", "text": "CVE: CVE-2022-21726\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The implementation of `Dequantize` does not fully validate the value of `axis` and can result in heap OOB accesses. The `axis` argument can be `-1` (the default value for the optional argument) or any other positive value at most the number of dimensions of the input. Unfortunately, the upper bound is not checked and this results in reading past the end of the array containing the dimensions o", "cve_id": "CVE-2022-21726", "title": "CVE-2022-21726", "source": "cvefixes", "timestamp": "2022-02-03", "split": "val"} +{"id": "8e272155fe4224ab386b", "text": "[Unknown] CVE-2023-28322: more POST-after-PUT confusion\n\nOriginal Report:https://hackerone.com/reports/1954658\n\n## Impact\n\nCWE-440: Expected Behavior Violation\nAn attacker could potentially inject data, either from stdin or from an unintended buffer. Further, without even an active attacker, this could lead to segfaults or sensitive information being exposed to an unintended recipient.", "cve_id": "CVE-2023-28322", "title": "CVE-2023-28322: more POST-after-PUT confusion (Unknown)", "source": "hackerone", "timestamp": "2023-06-25", "split": "val"} +{"id": "f83412173e403051dc48", "text": "[Double Free] CVE-2022-42915: HTTP proxy double-free\n\nThis is a finding that Trail of Bits found in their ongoing curl security audit. Reported at a status meeting today.\n\n## Summary:\n\ncurl frees memory twice in some cleanup function related to HTTP proxies.\n\nIt as simple as `curl -x http://localhost:80 dict://127.0.0.1`\n\nUsing valgrind on the current git master, it shows:\n\n==55921== Memcheck, a memory error detector\n==55921== Copyright (C) 2002-2022, and GNU GPL'd, by Julian Seward et al.\n==559", "cve_id": "CVE-2022-42915", "title": "CVE-2022-42915: HTTP proxy double-free (Double Free)", "source": "hackerone", "timestamp": "2022-11-26", "split": "val"} +{"id": "b2533b080df7dcee0ec9", "text": "CVE: CVE-2022-2636\n\n[{'lang': 'en', 'value': 'Improper Input Validation in GitHub repository hestiacp/hestiacp prior to 1.6.6.'}]\n\nFix commit: Fix security issues in v-add-web-domain-redirect + Sync up main with release (#2814)\n\n* Fix v-add-web-domain-redirect\r\n\r\n* Remove sudo permission admin group on new setups\r\n\r\nWe delete the group before install anyway\r\n\r\n* Block \"sudo\" from\r\n\r\n* Add missing slash\r\n\r\n* Update changelog\r\n\r\n* Update versions", "cve_id": "CVE-2022-2636", "title": "CVE-2022-2636", "source": "cvefixes", "timestamp": "2022-08-05", "split": "val"} +{"id": "137609a8e14569313d65", "text": "CVE: CVE-2022-21656\n\n[{'lang': 'en', 'value': 'Envoy is an open source edge and service proxy, designed for cloud-native applications. The default_validator.cc implementation used to implement the default certificate validation routines has a \"type confusion\" bug when processing subjectAltNames. This processing allows, for example, an rfc822Name or uniformResourceIndicator to be authenticated as a domain name. This confusion allows for the bypassing of nameConstraints, as processed by the underl", "cve_id": "CVE-2022-21656", "title": "CVE-2022-21656", "source": "cvefixes", "timestamp": "2022-02-22", "split": "val"} +{"id": "e4a483df8d8abf420c12", "text": "[HTTP Response Splitting] Apache HTTP Server: mod_proxy_uwsgi HTTP response splitting (CVE-2023-27522)\n\n#Summary\n\nHTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55. Special characters in the origin response header can truncate/split the response forwarded to the client.\n\nhttps://httpd.apache.org/security/vulnerabilities_24.html#CVE-2023-27522\n\n## Impact\n\nThe response headers can be truncated, resulti", "cve_id": "CVE-2023-27522", "title": "Apache HTTP Server: mod_proxy_uwsgi HTTP response splitting (CVE-2023-27522) (HTTP Response Splitting)", "source": "hackerone", "timestamp": "2023-03-23", "split": "val"} +{"id": "df40d25a290c6df4baa8", "text": "CVE: CVE-2022-25866\n\n[{'lang': 'en', 'value': 'The package czproject/git-php before 4.0.3 are vulnerable to Command Injection via git argument injection. When calling the isRemoteUrlReadable($url, array $refs = NULL) function, both the url and refs parameters are passed to the git ls-remote subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.'}]\n\nFix commit: Uses --end-of-options after command options (for security reasons)", "cve_id": "CVE-2022-25866", "title": "CVE-2022-25866", "source": "cvefixes", "timestamp": "2022-04-25", "split": "val"} +{"id": "c436550666bcb1e5952e", "text": "CVE: CVE-2022-1771\n\n[{'lang': 'en', 'value': 'Uncontrolled Recursion in GitHub repository vim/vim prior to 8.2.4975.'}]\n\nFix commit: patch 8.2.4975: recursive command line loop may cause a crash\n\nProblem: Recursive command line loop may cause a crash.\nSolution: Limit recursion of getcmdline().", "cve_id": "CVE-2022-1771", "title": "CVE-2022-1771", "source": "cvefixes", "timestamp": "2022-05-18", "split": "val"} +{"id": "843900ee51f3ae555481", "text": "CVE: CVE-2022-24720\n\n[{'lang': 'en', 'value': 'image_processing is an image processing wrapper for libvips and ImageMagick/GraphicsMagick. Prior to version 1.12.2, using the `#apply` method from image_processing to apply a series of operations that are coming from unsanitized user input allows the attacker to execute shell commands. This method is called internally by Active Storage variants, so Active Storage is vulnerable as well. The vulnerability has been fixed in version 1.12.2 of image_pro", "cve_id": "CVE-2022-24720", "title": "CVE-2022-24720", "source": "cvefixes", "timestamp": "2022-03-01", "split": "val"} +{"id": "ba0f15ce72c75cae8a27", "text": "[Improper Access Control - Generic] Unauthenticated File Read Adobe ColdFusion\n\nUnauthenticated Arbitrary File Read vulnerability due to de serialization of untrusted data in Adobe ColdFusion.\n\n## Impact\n\nThe impact of this vulnerability could result in unauthorized access to sensitive data and actions within the affected Adobe ColdFusion instances.\n\n## System Host(s)\n█████████\n\n## Affected Product(s) and Version(s)\nThe vulnerability affects ColdFusion 2021 Update 5 and earlier as well as ColdFu", "cve_id": "CVE-2023-26360", "title": "Unauthenticated File Read Adobe ColdFusion (Improper Access Control - Generic)", "source": "hackerone", "timestamp": "2023-12-21", "split": "val"} +{"id": "83af833af0309d3dadb6", "text": "CVE: CVE-2022-21208\n\n[{'lang': 'en', 'value': 'The package node-opcua before 2.74.0 are vulnerable to Denial of Service (DoS) due to a missing limitation on the number of received chunks - per single session or in total for all concurrent sessions. An attacker can exploit this vulnerability by sending an unlimited number of huge chunks (e.g. 2GB each) without sending the Final closing chunk.'}]\n\nFix commit: fix message chunk overflow detection", "cve_id": "CVE-2022-21208", "title": "CVE-2022-21208", "source": "cvefixes", "timestamp": "2022-08-23", "split": "val"} +{"id": "da4126e4091ea886c566", "text": "CVE: CVE-2022-29695\n\n[{'lang': 'en', 'value': 'Unicorn Engine v2.0.0-rc7 contains memory leaks caused by an incomplete unicorn engine initialization.'}]\n\nFix commit: Generate bindings", "cve_id": "CVE-2022-29695", "title": "CVE-2022-29695", "source": "cvefixes", "timestamp": "2022-06-02", "split": "val"} +{"id": "0edacc2ba995f2c48ad1", "text": "CVE: CVE-2022-24747\n\n[{'lang': 'en', 'value': 'Shopware is an open commerce platform based on the Symfony php Framework and the Vue javascript framework. Affected versions of shopware do no properly set sensitive HTTP headers to be non-cacheable. If there is an HTTP cache between the server and client then headers may be exposed via HTTP caches. This issue has been resolved in version 6.4.8.2. There are no known workarounds.'}]\n\nFix commit: NEXT-20309 - Fix cache control", "cve_id": "CVE-2022-24747", "title": "CVE-2022-24747", "source": "cvefixes", "timestamp": "2022-03-09", "split": "val"} +{"id": "26213821485bb643d39b", "text": "CVE: CVE-2022-23640\n\n[{'lang': 'en', 'value': 'Excel-Streaming-Reader is an easy-to-use implementation of a streaming Excel reader using Apache POI. Prior to xlsx-streamer 2.1.0, the XML parser that was used did apply all the necessary settings to prevent XML Entity Expansion issues. Upgrade to version 2.1.0 to receive a patch. There is no known workaround.'}]\n\nFix commit: Updating readme for security release", "cve_id": "CVE-2022-23640", "title": "CVE-2022-23640", "source": "cvefixes", "timestamp": "2022-03-02", "split": "val"} +{"id": "ae9fbc2fd98ef0d7b3e9", "text": "CVE: CVE-2022-2206\n\n[{'lang': 'en', 'value': 'Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.5160: accessing invalid memory after changing terminal size\n\nProblem: Accessing invalid memory after changing terminal size.\nSolution: Adjust cmdline_row and msg_row to the value of Rows.", "cve_id": "CVE-2022-2206", "title": "CVE-2022-2206", "source": "cvefixes", "timestamp": "2022-06-26", "split": "val"} +{"id": "c9a3fac0f6dd7306a476", "text": "CVE: CVE-2022-1509\n\n[{'lang': 'en', 'value': 'Sed Injection Vulnerability in GitHub repository hestiacp/hestiacp prior to 1.5.12. An authenticated remote attacker with low privileges can execute arbitrary code under root context.'}]\n\nFix commit: [Security] Patches multiple security issue (#2555)\n\n* Add missing check in is_format_valid\r\n\r\n* Add check on v-delete-dns-domain\r\n\r\n* Validate theme via is_format_valid\r\n\r\n* No need for extra code\r\n\r\n* Prevent LF command passed trough + Add test to veri", "cve_id": "CVE-2022-1509", "title": "CVE-2022-1509", "source": "cvefixes", "timestamp": "2022-04-28", "split": "val"} +{"id": "0e7d1a24f03da26f22bb", "text": "CVE: CVE-2022-24757\n\n[{'lang': 'en', 'value': 'The Jupyter Server provides the backend (i.e. the core services, APIs, and REST endpoints) for Jupyter web applications. Prior to version 1.15.4, unauthorized actors can access sensitive information from server logs. Anytime a 5xx error is triggered, the auth cookie and other header values are recorded in Jupyter Server logs by default. Considering these logs do not require root access, an attacker can monitor these logs, steal sensitive auth/cookie", "cve_id": "CVE-2022-24757", "title": "CVE-2022-24757", "source": "cvefixes", "timestamp": "2022-03-23", "split": "val"} +{"id": "6aeb6e57fe3accd0c7eb", "text": "CVE: CVE-2022-2023\n\n[{'lang': 'en', 'value': 'Incorrect Use of Privileged APIs in GitHub repository polonel/trudesk prior to 1.2.4.'}]\n\nFix commit: fix(accounts): security enhancement", "cve_id": "CVE-2022-2023", "title": "CVE-2022-2023", "source": "cvefixes", "timestamp": "2022-06-20", "split": "val"} +{"id": "a49ed75e8ae8eea05efd", "text": "CVE: CVE-2022-28545\n\n[{'lang': 'en', 'value': 'FUDforum 3.1.1 is vulnerable to Stored XSS.'}]\n\nFix commit: Fix stored XSS vulnerability reported by ptsecurity.com", "cve_id": "CVE-2022-28545", "title": "CVE-2022-28545", "source": "cvefixes", "timestamp": "2022-05-06", "split": "val"} +{"id": "130e5441721333b63268", "text": "CVE: CVE-2022-1207\n\n[{'lang': 'en', 'value': 'Out-of-bounds read in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability allows attackers to read sensitive information from outside the allocated buffer boundary.'}]\n\nFix commit: Fix 1 byte oobread in the cris analysis plugin ##crash", "cve_id": "CVE-2022-1207", "title": "CVE-2022-1207", "source": "cvefixes", "timestamp": "2022-04-01", "split": "val"} +{"id": "2c41559ee411c076b801", "text": "CVE: CVE-2022-31508\n\n[{'lang': 'en', 'value': 'The idayrus/evoting repository before 2022-05-08 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.'}]\n\nFix commit: Merge pull request #2 from porcupineyhairs/FixPathInjection\n\nFix Path Traversal Vulnerability", "cve_id": "CVE-2022-31508", "title": "CVE-2022-31508", "source": "cvefixes", "timestamp": "2022-07-11", "split": "val"} +{"id": "0e0c4aa8108abc09a485", "text": "[Information Exposure Through Sent Data] CVE-2023-46218: cookie mixed case PSL bypass\n\n## Summary:\nlibcurl fails to normalize the `hostname` and `cookie_domain` parameters passed to `psl_is_cookie_domain_acceptable` function. As a result a malicious site can set a super cookie if the victim requests the url with hostname with any upper case characters in the domain part of the hostname.\n\nlibpsl `psl_is_cookie_domain_acceptable` documentation https://rockdaboot.github.io/libpsl/libpsl-Public-Suf", "cve_id": "CVE-2023-46218", "title": "CVE-2023-46218: cookie mixed case PSL bypass (Information Exposure Through Sent Data)", "source": "hackerone", "timestamp": "2023-12-06", "split": "val"} +{"id": "06ff941395ebbfc545bc", "text": "CVE: CVE-2022-0957\n\n[{'lang': 'en', 'value': 'Stored XSS via File Upload in GitHub repository star7th/showdoc prior to 2.10.4.'}]\n\nFix commit: Merge pull request #1632 from ajaysenr/master\n\nUpdate AttachmentModel.class.php", "cve_id": "CVE-2022-0957", "title": "CVE-2022-0957", "source": "cvefixes", "timestamp": "2022-03-15", "split": "val"} +{"id": "21bc1dd15b3c4ff9f57c", "text": "CVE: CVE-2022-29361\n\n[{'lang': 'en', 'value': \"** DISPUTED ** Improper parsing of HTTP requests in Pallets Werkzeug v2.1.0 and below allows attackers to perform HTTP Request Smuggling using a crafted HTTP request with multiple requests included inside the body. NOTE: the vendor's position is that this behavior can only occur in unsupported configurations involving development mode and an HTTP server from outside the Werkzeug project.\"}]\n\nFix commit: Merge branch '2.0.x'", "cve_id": "CVE-2022-29361", "title": "CVE-2022-29361", "source": "cvefixes", "timestamp": "2022-05-25", "split": "val"} +{"id": "0c3b77baa1fe51d50664", "text": "CVE: CVE-2022-32545\n\n[{'lang': 'en', 'value': \"A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned char' at coders/psd.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior.\"}]\n\nFix commit: Pull request: https://github.com/ImageMagick/ImageMagick/pull/4963", "cve_id": "CVE-2022-32545", "title": "CVE-2022-32545", "source": "cvefixes", "timestamp": "2022-06-16", "split": "val"} +{"id": "0e274e63c3f74acf74df", "text": "CVE: CVE-2022-29200\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.LSTMBlockCell` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. The code does not validate the ranks of any of the arguments to this API call. This results in `CHECK`-failures when the elements of the tensor are accessed.", "cve_id": "CVE-2022-29200", "title": "CVE-2022-29200", "source": "cvefixes", "timestamp": "2022-05-20", "split": "val"} +{"id": "d918f36298c123560f06", "text": "CVE: CVE-2022-27666\n\n[{'lang': 'en', 'value': 'A heap buffer overflow flaw was found in IPsec ESP transformation code in net/ipv4/esp4.c and net/ipv6/esp6.c. This flaw allows a local attacker with a normal user privilege to overwrite kernel heap objects and may cause a local privilege escalation threat.'}]\n\nFix commit: esp: Fix possible buffer overflow in ESP transformation\n\nThe maximum message size that can be send is bigger than\nthe maximum site that skb_page_frag_refill can allocate.\nSo it i", "cve_id": "CVE-2022-27666", "title": "CVE-2022-27666", "source": "cvefixes", "timestamp": "2022-03-23", "split": "val"} +{"id": "08f5dc1d54280ffacfa0", "text": "CVE: CVE-2022-25318\n\n[{'lang': 'en', 'value': 'An issue was discovered in Cerebrate through 1.4. An incorrect sharing group ACL allowed an unprivileged user to edit and modify sharing groups.'}]\n\nFix commit: fix: [security] Sharing group ACL fixes\n\n- added indirect object reference protection\n- added correct ACL functionalities to delete, addOrg, removeOrg\n\n- as reported by Dawid Czarnecki from Zigrin Security", "cve_id": "CVE-2022-25318", "title": "CVE-2022-25318", "source": "cvefixes", "timestamp": "2022-02-18", "split": "val"} +{"id": "72366349bfe114661d19", "text": "CVE: CVE-2022-29237\n\n[{'lang': 'en', 'value': \"Opencast is a free and open source solution for automated video capture and distribution at scale. Prior to Opencast 10.14 and 11.7, users could pass along URLs for files belonging to organizations other than the user's own, which Opencast would then import into the current organization, bypassing organizational barriers. Attackers must have full access to Opencast's ingest REST interface, and also know internal links to resources in another organiz", "cve_id": "CVE-2022-29237", "title": "CVE-2022-29237", "source": "cvefixes", "timestamp": "2022-05-24", "split": "val"} +{"id": "7b98960221a82a6e975a", "text": "[Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')] CVE-2023-28320 - siglongjmp race condition\n\nlibcurl provides several different backends for resolving host names, selected at build time. If it is built to use the synchronous resolver, it allows name resolves to time-out slow operations using alarm() and siglongjmp().\n\nWhen doing this, libcurl used a global buffer that was not mutex protected and a multi-threaded application might therefore crash or ot", "cve_id": "CVE-2023-28320", "title": "CVE-2023-28320 - siglongjmp race condition (Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition'))", "source": "hackerone", "timestamp": "2023-05-26", "split": "val"} +{"id": "0dce5071f0683d217423", "text": "CVE: CVE-2022-31621\n\n[{'lang': 'en', 'value': 'MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_xbstream.cc, when an error occurs (stream_ctxt->dest_file == NULL) while executing the method xbstream_open, the held lock is not released correctly, which allows local users to trigger a denial of service due to the deadlock.'}]\n\nFix commit: MDEV-26574 An improper locking bug due to unreleased lock in the ds_xbstream.cc\n\nrelease lock in all as cases n xbstream_op", "cve_id": "CVE-2022-31621", "title": "CVE-2022-31621", "source": "cvefixes", "timestamp": "2022-05-25", "split": "val"} +{"id": "ca478bbc42b122fe5874", "text": "CVE: CVE-2022-0881\n\n[{'lang': 'en', 'value': 'Insecure Storage of Sensitive Information in GitHub repository chocobozzz/peertube prior to 4.1.1.'}]\n\nFix commit: Remove exif tags when processing images", "cve_id": "CVE-2022-0881", "title": "CVE-2022-0881", "source": "cvefixes", "timestamp": "2022-03-09", "split": "val"} +{"id": "b468f61426eb6192e045", "text": "CVE: CVE-2022-23071\n\n[{'lang': 'en', 'value': 'In Recipes, versions 0.9.1 through 1.2.5 are vulnerable to Server Side Request Forgery (SSRF), in the “Import Recipe” functionality. When an attacker enters the localhost URL, a low privileged attacker can access/read the internal file system to access sensitive information.'}]\n\nFix commit: added url validation to all server requests", "cve_id": "CVE-2022-23071", "title": "CVE-2022-23071", "source": "cvefixes", "timestamp": "2022-06-19", "split": "val"} +{"id": "8fd40c3d5c4dfe3a24e9", "text": "CVE: CVE-2022-36446\n\n[{'lang': 'en', 'value': 'software/apt-lib.pl in Webmin before 1.997 lacks HTML escaping for a UI command.'}]\n\nFix commit: Command to show in the UI should not be escaped, but the actual command must be", "cve_id": "CVE-2022-36446", "title": "CVE-2022-36446", "source": "cvefixes", "timestamp": "2022-07-25", "split": "val"} +{"id": "CVE-2022-0847", "text": "Linux Kernel Privilege Escalation Vulnerability\n\nAffected: Linux Kernel\n\nLinux kernel contains an improper initialization vulnerability where an unprivileged local user could escalate their privileges on the system. This vulnerability has the moniker of \"Dirty Pipe.\"\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-665\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-0847", "title": "Linux Kernel Privilege Escalation Vulnerability", "source": "cisa_kev", "timestamp": "2022-04-25", "split": "val"} +{"id": "81a8e90e09e7c4ea55bc", "text": "CVE: CVE-2022-0395\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in Packagist remdex/livehelperchat prior to 3.93v.'}]\n\nFix commit: Escape in user box", "cve_id": "CVE-2022-0395", "title": "CVE-2022-0395", "source": "cvefixes", "timestamp": "2022-01-28", "split": "val"} +{"id": "684017bc3e9bf13efb44", "text": "CVE: CVE-2022-29207\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, multiple TensorFlow operations misbehave in eager mode when the resource handle provided to them is invalid. In graph mode, it would have been impossible to perform these API calls, but migration to TF 2.x eager mode opened up this vulnerability. If the resource handle is empty, then a reference is bound to a null pointer inside TensorFlow c", "cve_id": "CVE-2022-29207", "title": "CVE-2022-29207", "source": "cvefixes", "timestamp": "2022-05-20", "split": "val"} +{"id": "220ab87f235095a1355b", "text": "CVE: CVE-2022-24958\n\n[{'lang': 'en', 'value': 'drivers/usb/gadget/legacy/inode.c in the Linux kernel through 5.16.8 mishandles dev->buf release.'}]\n\nFix commit: usb: gadget: don't release an existing dev->buf\n\ndev->buf does not need to be released if it already exists before\nexecuting dev_config.\n\nAcked-by: Alan Stern \nSigned-off-by: Hangyu Hua \nLink: https://lore.kernel.org/r/20211231172138.7993-2-hbh25y@gmail.com\nSigned-off-by: Greg Kroah-Hartman = 1.9.22.noko2`. Note: The upstream library `org.cyberneko.html` is no longer maintained. Nokogiri uses its own fork of this library located at https://github.com/sparklemotion/nekohtml and this CVE applies only to that", "cve_id": "CVE-2022-24839", "title": "CVE-2022-24839", "source": "cvefixes", "timestamp": "2022-04-11", "split": "val"} +{"id": "CVE-2023-21608", "text": "Adobe Acrobat and Reader Use-After-Free Vulnerability\n\nAffected: Adobe Acrobat and Reader\n\nAdobe Acrobat and Reader contains a use-after-free vulnerability that allows for code execution in the context of the current user.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-21608", "title": "Adobe Acrobat and Reader Use-After-Free Vulnerability", "source": "cisa_kev", "timestamp": "2023-10-10", "split": "val"} +{"id": "c339ad93c28be3b69aea", "text": "CVE: CVE-2022-24734\n\n[{'lang': 'en', 'value': \"MyBB is a free and open source forum software. In affected versions the Admin CP's Settings management module does not validate setting types correctly on insertion and update, making it possible to add settings of supported type `php` with PHP code, executed on on _Change Settings_ pages. This results in a Remote Code Execution (RCE) vulnerability. The vulnerable module requires Admin CP access with the `Can manage settings?` permission. MyBB's Set", "cve_id": "CVE-2022-24734", "title": "CVE-2022-24734", "source": "cvefixes", "timestamp": "2022-03-09", "split": "val"} +{"id": "aeb00cd8c029be130e8e", "text": "CVE: CVE-2022-32545\n\n[{'lang': 'en', 'value': \"A vulnerability was found in ImageMagick, causing an outside the range of representable values of type 'unsigned char' at coders/psd.c, when crafted or untrusted input is processed. This leads to a negative impact to application availability or other problems related to undefined behavior.\"}]\n\nFix commit: fix issue: outside the range of representable values of type 'unsigned int' at coders/psd.c:1025 (#4963)\n\n* fix Division by zero in XMenuWidget()", "cve_id": "CVE-2022-32545", "title": "CVE-2022-32545", "source": "cvefixes", "timestamp": "2022-06-16", "split": "val"} +{"id": "bc4d69c0013f72daf248", "text": "CVE: CVE-2022-1899\n\n[{'lang': 'en', 'value': 'Out-of-bounds Read in GitHub repository radareorg/radare2 prior to 5.7.0.'}]\n\nFix commit: Fix integer overflow in string search causing oobread ##crash\n\n* Reported by @greatergoodest via huntrdev\r\n* BountyID: 8a3dc5cb-08b3-4807-82b2-77f08c137a04\r\n* Reproducer bfileovf", "cve_id": "CVE-2022-1899", "title": "CVE-2022-1899", "source": "cvefixes", "timestamp": "2022-05-26", "split": "val"} +{"id": "6d67ac39225508b0bbc8", "text": "CVE: CVE-2022-0158\n\n[{'lang': 'en', 'value': 'vim is vulnerable to Heap-based Buffer Overflow'}]\n\nFix commit: patch 8.2.4049: Vim9: reading before the start of the line with \"$\"\n\nProblem: Vim9: reading before the start of the line with \"$\" by itself.\nSolution: Do not subtract one when reporting the error.", "cve_id": "CVE-2022-0158", "title": "CVE-2022-0158", "source": "cvefixes", "timestamp": "2022-01-10", "split": "val"} +{"id": "CVE-2022-41352", "text": "Synacor Zimbra Collaboration Suite (ZCS) Arbitrary File Upload Vulnerability\n\nAffected: Synacor Zimbra Collaboration Suite (ZCS)\n\nSynacor Zimbra Collaboration Suite (ZCS) allows an attacker to upload arbitrary files using cpio package to gain incorrect access to any other user accounts.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-22\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-41352", "title": "Synacor Zimbra Collaboration Suite (ZCS) Arbitrary File Upload Vulnerability", "source": "cisa_kev", "timestamp": "2022-10-20", "split": "val"} +{"id": "cac762e9c3b03a570f08", "text": "CVE: CVE-2022-0963\n\n[{'lang': 'en', 'value': 'Unrestricted XML Files Leads to Stored XSS in GitHub repository microweber/microweber prior to 1.2.12.'}]\n\nFix commit: Update Files.php", "cve_id": "CVE-2022-0963", "title": "CVE-2022-0963", "source": "cvefixes", "timestamp": "2022-03-15", "split": "val"} +{"id": "CVE-2022-21919", "text": "Microsoft Windows User Profile Service Privilege Escalation Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows User Profile Service contains an unspecified vulnerability that allows for privilege escalation.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-1386\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-21919", "title": "Microsoft Windows User Profile Service Privilege Escalation Vulnerability", "source": "cisa_kev", "timestamp": "2022-04-25", "split": "val"} +{"id": "ecc896449061ed982d35", "text": "CVE: CVE-2022-0086\n\n[{'lang': 'en', 'value': 'uppy is vulnerable to Server-Side Request Forgery (SSRF)'}]\n\nFix commit: improve private ip check (#3403)\n\nhttps://huntr.dev/bounties/c1c03ef6-3f18-4976-a9ad-08c251279122/", "cve_id": "CVE-2022-0086", "title": "CVE-2022-0086", "source": "cvefixes", "timestamp": "2022-01-04", "split": "val"} +{"id": "CVE-2023-34192", "text": "Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting (XSS) Vulnerability\n\nAffected: Synacor Zimbra Collaboration Suite (ZCS)\n\nSynacor Zimbra Collaboration Suite (ZCS) contains a cross-site scripting (XSS) vulnerability that allows a remote authenticated attacker to execute arbitrary code via a crafted script to the /h/autoSaveDraft function.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the pro", "cve_id": "CVE-2023-34192", "title": "Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting (XSS) Vulnerability", "source": "cisa_kev", "timestamp": "2025-02-25", "split": "val"} +{"id": "515a882fd679542f13b6", "text": "CVE: CVE-2022-0589\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in Packagist librenms/librenms prior to 22.1.0.'}]\n\nFix commit: XSS fixes (#13780)", "cve_id": "CVE-2022-0589", "title": "CVE-2022-0589", "source": "cvefixes", "timestamp": "2022-02-15", "split": "val"} +{"id": "283ab771efb286dded99", "text": "[Unknown] Privilege Esacalation at Apache Airflow 2.5.1\n\nHello. I found security issue about airflow's log file. \n\nAirflow 2.5.1 sets log files to vulnerable privileges. (chmod 666)\n\nAny Linux user on the host on which the airflow operates can read and tamper with the airflow's logs.\n\nTaking advantage of this, an attacker in local host can retrieve sensitive information from a Linux host that can only access airflow accounts. ** (This is privilege escaltion from any linux account to airflow's", "cve_id": "CVE-2023-25754", "title": "Privilege Esacalation at Apache Airflow 2.5.1 (Unknown)", "source": "hackerone", "timestamp": "2023-05-18", "split": "val"} +{"id": "6c67a08aa34719fa18e8", "text": "[Missing Required Cryptographic Step] CVE-2022-30115: HSTS bypass via trailing dot\n\ncurl allows users to load a HSTS cache which will cause curl to use HTTPS instead of HTTP given a HTTP URL for a given site specified in the HSTS cache.\n\nIf the trailing dot is used, the HSTS check will be bypassed.\n\nIf a user has a preloaded hsts.txt:\n`````` \n# Your HSTS cache. https://curl.se/docs/hsts.html\n# This file was generated by libcurl! Edit at your own risk.\naccounts.google.com \"20230503 08:47:52\"\n```", "cve_id": "CVE-2022-30115", "title": "CVE-2022-30115: HSTS bypass via trailing dot (Missing Required Cryptographic Step)", "source": "hackerone", "timestamp": "2022-05-11", "split": "val"} +{"id": "8229e0241f51ccf68546", "text": "CVE: CVE-2022-2453\n\n[{'lang': 'en', 'value': 'Use After Free in GitHub repository gpac/gpac prior to 2.1-DEV.'}]\n\nFix commit: fixed #2212", "cve_id": "CVE-2022-2453", "title": "CVE-2022-2453", "source": "cvefixes", "timestamp": "2022-07-19", "split": "val"} +{"id": "67e018ec1e1be31c2b2f", "text": "CVE: CVE-2022-2130\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Reflected in GitHub repository microweber/microweber prior to 1.2.17.'}]\n\nFix commit: Merge branch 'dev' of github.com:microweber/microweber into dev", "cve_id": "CVE-2022-2130", "title": "CVE-2022-2130", "source": "cvefixes", "timestamp": "2022-06-20", "split": "val"} +{"id": "a54f9d09c6c145bd1c1d", "text": "[Type Confusion] Incorrect Type Conversion in interpreting IPv4-mapped IPv6 addresses and below `curl` results in indeterminate SSRF vulnerabilities.\n\n## Summary:\nOctal Type Handling of Errors in IPv4 Mapped IPv6 Addresses in curl allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many programs that rely on curl. \n\n[RFC 4291](https://datatracker.ietf.org/doc/html/rfc4291#section-2-5-5) defines ways to embed an IPv4 address into IPv6 addresses. One of", "cve_id": "CVE-2023-24329", "title": "Incorrect Type Conversion in interpreting IPv4-mapped IPv6 addresses and below `curl` results in indeterminate SSRF vulnerabilities. (Type Confusion)", "source": "hackerone", "timestamp": "2024-05-08", "split": "val"} +{"id": "5c7e5ff9607743fb47a2", "text": "CVE: CVE-2022-1852\n\n[{'lang': 'en', 'value': 'A NULL pointer dereference flaw was found in the Linux kernel’s KVM module, which can lead to a denial of service in the x86_emulate_insn in arch/x86/kvm/emulate.c. This flaw occurs while executing an illegal instruction in guest in the Intel CPU.'}]\n\nFix commit: KVM: x86: avoid calling x86 emulator without a decoded instruction\n\nWhenever x86_decode_emulated_instruction() detects a breakpoint, it\nreturns the value that kvm_vcpu_check_breakpoint() wri", "cve_id": "CVE-2022-1852", "title": "CVE-2022-1852", "source": "cvefixes", "timestamp": "2022-06-30", "split": "val"} +{"id": "c51298199bb723171997", "text": "CVE: CVE-2022-24751\n\n[{'lang': 'en', 'value': 'Zulip is an open source group chat application. Starting with version 4.0 and prior to version 4.11, Zulip is vulnerable to a race condition during account deactivation, where a simultaneous access by the user being deactivated may, in rare cases, allow continued access by the deactivated user. A patch is available in version 4.11 on the 4.x branch and version 5.0-rc1 on the 5.x branch. Upgrading to a fixed version will, as a side effect, deactivate", "cve_id": "CVE-2022-24751", "title": "CVE-2022-24751", "source": "cvefixes", "timestamp": "2022-03-16", "split": "val"} +{"id": "7e862c78d2a3c19c7a2f", "text": "CVE: CVE-2022-1316\n\n[{'lang': 'en', 'value': 'ZeroTierOne for windows local privilege escalation because of incorrect directory privilege in GitHub repository zerotier/zerotierone prior to 1.8.8. Local Privilege Escalation'}]\n\nFix commit: 1.8.8 bump", "cve_id": "CVE-2022-1316", "title": "CVE-2022-1316", "source": "cvefixes", "timestamp": "2022-04-11", "split": "val"} +{"id": "0fe8d3d81190a98a6112", "text": "CVE: CVE-2022-28463\n\n[{'lang': 'en', 'value': 'ImageMagick 7.1.0-27 is vulnerable to Buffer Overflow.'}]\n\nFix commit: https://github.com/ImageMagick/ImageMagick/issues/4988", "cve_id": "CVE-2022-28463", "title": "CVE-2022-28463", "source": "cvefixes", "timestamp": "2022-05-08", "split": "val"} +{"id": "438c3fb3f7802c071898", "text": "CVE: CVE-2022-2965\n\n[{'lang': 'en', 'value': 'Improper Restriction of Rendered UI Layers or Frames in GitHub repository notrinos/notrinoserp prior to 0.7.'}]\n\nFix commit: no x-frame-options header set which allow clickjacking attack. Fixed.", "cve_id": "CVE-2022-2965", "title": "CVE-2022-2965", "source": "cvefixes", "timestamp": "2022-08-23", "split": "val"} +{"id": "CVE-2022-40765", "text": "Mitel MiVoice Connect Command Injection Vulnerability\n\nAffected: Mitel MiVoice Connect\n\nThe Mitel Edge Gateway component of MiVoice Connect allows an authenticated attacker with internal network access to execute commands within the context of the system.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-77\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-40765", "title": "Mitel MiVoice Connect Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2023-02-21", "split": "val"} +{"id": "CVE-2022-21882", "text": "Microsoft Win32k Privilege Escalation Vulnerability\n\nAffected: Microsoft Win32k\n\nMicrosoft Win32k contains an unspecified vulnerability that allows for privilege escalation.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-787\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-21882", "title": "Microsoft Win32k Privilege Escalation Vulnerability", "source": "cisa_kev", "timestamp": "2022-02-04", "split": "val"} +{"id": "e31be0cbfd2fdca4bf36", "text": "CVE: CVE-2022-1586\n\n[{'lang': 'en', 'value': 'An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.'}]\n\nFix commit: Fixed a unicode properrty matching issue in JIT", "cve_id": "CVE-2022-1586", "title": "CVE-2022-1586", "source": "cvefixes", "timestamp": "2022-05-16", "split": "val"} +{"id": "014c3bcd7245c3748ed7", "text": "CVE: CVE-2022-0569\n\n[{'lang': 'en', 'value': 'Exposure of Sensitive Information to an Unauthorized Actor in Packagist snipe/snipe-it prior to v5.3.9.'}]\n\nFix commit: Updated language string\n\nSigned-off-by: snipe ", "cve_id": "CVE-2022-0569", "title": "CVE-2022-0569", "source": "cvefixes", "timestamp": "2022-02-14", "split": "val"} +{"id": "89232b03aff020210c61", "text": "CVE: CVE-2022-21731\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The implementation of shape inference for `ConcatV2` can be used to trigger a denial of service attack via a segfault caused by a type confusion. The `axis` argument is translated into `concat_dim` in the `ConcatShapeHelper` helper function. Then, a value for `min_rank` is computed based on `concat_dim`. This is then used to validate that the `values` tensor has at least the required rank. How", "cve_id": "CVE-2022-21731", "title": "CVE-2022-21731", "source": "cvefixes", "timestamp": "2022-02-03", "split": "val"} +{"id": "85b72eb6109303c1c16b", "text": "CVE: CVE-2022-2874\n\n[{'lang': 'en', 'value': 'NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0224.'}]\n\nFix commit: patch 9.0.0224: Using NULL pointer when skipping compiled code\n\nProblem: Using NULL pointer when skipping compiled code.\nSolution: Check for skipping.", "cve_id": "CVE-2022-2874", "title": "CVE-2022-2874", "source": "cvefixes", "timestamp": "2022-08-18", "split": "val"} +{"id": "ad741d4640fd1cbb6573", "text": "CVE: CVE-2022-1968\n\n[{'lang': 'en', 'value': 'Use After Free in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.5050: using freed memory when searching for pattern in path\n\nProblem: Using freed memory when searching for pattern in path.\nSolution: Make a copy of the line.", "cve_id": "CVE-2022-1968", "title": "CVE-2022-1968", "source": "cvefixes", "timestamp": "2022-06-02", "split": "val"} +{"id": "b80016fab66ebd23442a", "text": "CVE: CVE-2022-21720\n\n[{'lang': 'en', 'value': 'GLPI is a free asset and IT management software package. Prior to version 9.5.7, an entity administrator is capable of retrieving normally inaccessible data via SQL injection. Version 9.5.7 contains a patch for this issue. As a workaround, disabling the `Entities` update right prevents exploitation of this vulnerability.'}]\n\nFix commit: Merge pull request from GHSA-5hg4-r64r-rf83", "cve_id": "CVE-2022-21720", "title": "CVE-2022-21720", "source": "cvefixes", "timestamp": "2022-01-28", "split": "val"} +{"id": "458c3919ba715231ad61", "text": "CVE: CVE-2022-0838\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Reflected in GitHub repository hestiacp/hestiacp prior to 1.5.10.'}]\n\nFix commit: replace html() with text\n\n+ 2 small problems on add / edit database page", "cve_id": "CVE-2022-0838", "title": "CVE-2022-0838", "source": "cvefixes", "timestamp": "2022-03-04", "split": "val"} +{"id": "5c2422564a32fbb5c6bd", "text": "CVE: CVE-2022-24950\n\n[{'lang': 'en', 'value': \"A race condition exists in Eternal Terminal prior to version 6.2.0 that allows an authenticated attacker to hijack other users' SSH authorization socket, enabling the attacker to login to other systems as the targeted users. The bug is in UserTerminalRouter::getInfoForId().\"}]\n\nFix commit: red fixes (#468)\n\n* red fixes\r\n\r\n* remove magic number", "cve_id": "CVE-2022-24950", "title": "CVE-2022-24950", "source": "cvefixes", "timestamp": "2022-08-16", "split": "val"} +{"id": "77f63c32c7943a507de9", "text": "[Server-Side Request Forgery (SSRF)] [CVE-2022-35949]: undici.request vulnerable to SSRF using absolute / protocol-relative URL on pathname\n\nGHSA: https://github.com/nodejs/undici/security/advisories/GHSA-8qr4-xgw6-wmr3\n\nReport: https://hackerone.com/reports/1642017\n\n## Impact\n\nSSRF", "cve_id": "CVE-2022-35949", "title": "[CVE-2022-35949]: undici.request vulnerable to SSRF using absolute / protocol-relative URL on pathname (Server-Side Request Forgery (SSRF))", "source": "hackerone", "timestamp": "2022-09-23", "split": "val"} +{"id": "f1fa53f1a829924cc8d0", "text": "CVE: CVE-2022-2927\n\n[{'lang': 'en', 'value': 'Weak Password Requirements in GitHub repository notrinos/notrinoserp prior to 0.7.'}]\n\nFix commit: added password validation for adding new user.", "cve_id": "CVE-2022-2927", "title": "CVE-2022-2927", "source": "cvefixes", "timestamp": "2022-08-22", "split": "val"} +{"id": "1d5343cc587bf02d7f1b", "text": "CVE: CVE-2022-1297\n\n[{'lang': 'en', 'value': 'Out-of-bounds Read in r_bin_ne_get_entrypoints function in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability may allow attackers to read sensitive information or cause a crash.'}]\n\nFix commit: Fix oobread and unaligned casts in the NE entrypoint logic ##crash\n\n* Reported by @hmsec via huntr.dev\n* Reproducer: nepocaligns\n* BountyID: ec538fa4-06c6-4050-a141-f60153ddeaac", "cve_id": "CVE-2022-1297", "title": "CVE-2022-1297", "source": "cvefixes", "timestamp": "2022-04-11", "split": "val"} +{"id": "7d58c31934840f600cb7", "text": "CVE: CVE-2022-31622\n\n[{'lang': 'en', 'value': 'MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_compress.cc, when an error occurs (pthread_create returns a nonzero value) while executing the method create_worker_threads, the held lock is not released correctly, which allows local users to trigger a denial of service due to the deadlock.'}]\n\nFix commit: MDEV-26561 Fix a bug due to unreleased lock\n\nFix a bug of unreleased lock ctrl_mutex in the method create_w", "cve_id": "CVE-2022-31622", "title": "CVE-2022-31622", "source": "cvefixes", "timestamp": "2022-05-25", "split": "val"} +{"id": "add44921fc57e270f4a6", "text": "CVE: CVE-2022-21730\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The implementation of `FractionalAvgPoolGrad` does not consider cases where the input tensors are invalid allowing an attacker to read from outside of bounds of heap. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: Add negative", "cve_id": "CVE-2022-21730", "title": "CVE-2022-21730", "source": "cvefixes", "timestamp": "2022-02-03", "split": "val"} +{"id": "e2a3486514ab926c3003", "text": "CVE: CVE-2022-0849\n\n[{'lang': 'en', 'value': 'Use After Free in r_reg_get_name_idx in GitHub repository radareorg/radare2 prior to 5.6.6.'}]\n\nFix commit: aaef on arm/thumb switches causes uaf ##crash\n\n* Reported by peacock-doris via huntr.dev\n* Reproducer: poc_uaf_r_reg_get", "cve_id": "CVE-2022-0849", "title": "CVE-2022-0849", "source": "cvefixes", "timestamp": "2022-03-05", "split": "val"} +{"id": "c60f3b2a29f49ece9fec", "text": "CVE: CVE-2022-23630\n\n[{'lang': 'en', 'value': 'Gradle is a build tool with a focus on build automation and support for multi-language development. In some cases, Gradle may skip that verification and accept a dependency that would otherwise fail the build as an untrusted external artifact. This occurs when dependency verification is disabled on one or more configurations and those configurations have common dependencies with other configurations that have dependency verification enabled. If the", "cve_id": "CVE-2022-23630", "title": "CVE-2022-23630", "source": "cvefixes", "timestamp": "2022-02-10", "split": "val"} +{"id": "052e65a91d9ebde8edac", "text": "CVE: CVE-2022-1452\n\n[{'lang': 'en', 'value': 'Out-of-bounds Read in r_bin_java_bootstrap_methods_attr_new function in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end 2f the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. More details see [CWE-125: Out-of-bounds read](https://cwe.mitre.org/data/definitions/125.html).'}]\n\nFix commit: Fix oobread in java parser ##c", "cve_id": "CVE-2022-1452", "title": "CVE-2022-1452", "source": "cvefixes", "timestamp": "2022-04-24", "split": "val"} +{"id": "470e6aaa6564f4f70c32", "text": "CVE: CVE-2022-2257\n\n[{'lang': 'en', 'value': 'Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.'}]\n\nFix commit: patch 9.0.0009: going past the end of a menu item with only modifier\n\nProblem: Going past the end of a menu item with only modifier.\nSolution: Check for NUL.", "cve_id": "CVE-2022-2257", "title": "CVE-2022-2257", "source": "cvefixes", "timestamp": "2022-06-30", "split": "val"} +{"id": "dca6efee0b48b5eecd2f", "text": "CVE: CVE-2022-34033\n\n[{'lang': 'en', 'value': 'HTMLDoc v1.9.15 was discovered to contain a heap overflow via (write_header) /htmldoc/htmldoc/html.cxx:273.'}]\n\nFix commit: Fix a crash bug with bogus text (Issue #426)", "cve_id": "CVE-2022-34033", "title": "CVE-2022-34033", "source": "cvefixes", "timestamp": "2022-07-18", "split": "val"} +{"id": "CVE-2023-28434", "text": "MinIO Security Feature Bypass Vulnerability\n\nAffected: MinIO MinIO\n\nMinIO contains a security feature bypass vulnerability that allows an attacker to use crafted requests to bypass metadata bucket name checking and put an object into any bucket while processing `PostPolicyBucket` to conduct privilege escalation. To carry out this attack, the attacker requires credentials with `arn:aws:s3:::*` permission, as well as enabled Console API access.\n\nRequired Action: Apply mitigations per vendor instru", "cve_id": "CVE-2023-28434", "title": "MinIO Security Feature Bypass Vulnerability", "source": "cisa_kev", "timestamp": "2023-09-19", "split": "val"} +{"id": "821e82c35aa6a669bfd4", "text": "[Double Free] CVE-2023-27537: HSTS double-free\n\n## Summary:\nWhen processing HSTS with multi-threading, double-free or UAF may occur due to lack of exclusion control.\nHSTS entries disappear when they expire or when \"max-age=0\" is received.\nIn this case, the offending entry is removed from the internal memory list, freeing memory but not exclusivity control.\nTherefore, depending on the timing, other threads may perform the operation, resulting in double-free or UAF.\n\n`lib/hsts.c` in the function `", "cve_id": "CVE-2023-27537", "title": "CVE-2023-27537: HSTS double-free (Double Free)", "source": "hackerone", "timestamp": "2023-03-20", "split": "val"} +{"id": "4c4db3104321e390b955", "text": "CVE: CVE-2022-0839\n\n[{'lang': 'en', 'value': 'Improper Restriction of XML External Entity Reference in GitHub repository liquibase/liquibase prior to 4.8.0.'}]\n\nFix commit: Added liquibase.secureParsing test", "cve_id": "CVE-2022-0839", "title": "CVE-2022-0839", "source": "cvefixes", "timestamp": "2022-03-04", "split": "val"} +{"id": "0ceea414589178f60475", "text": "CVE: CVE-2022-24896\n\n[{'lang': 'en', 'value': 'Tuleap is a Free & Open Source Suite to manage software developments and collaboration. In versions prior to 13.7.99.239 Tuleap does not properly verify authorizations when displaying the content of tracker report renderer and chart widgets. Malicious users could use this vulnerability to retrieve the name of a tracker they cannot access as well as the name of the fields used in reports.'}]\n\nFix commit: request #26729 Tracker report renderer and cha", "cve_id": "CVE-2022-24896", "title": "CVE-2022-24896", "source": "cvefixes", "timestamp": "2022-06-09", "split": "val"} +{"id": "113353a1dd49225428ce", "text": "CVE: CVE-2022-0326\n\n[{'lang': 'en', 'value': 'NULL Pointer Dereference in Homebrew mruby prior to 3.2.'}]\n\nFix commit: codegen.c: no `OP_HASHADD` required when `val` is false.", "cve_id": "CVE-2022-0326", "title": "CVE-2022-0326", "source": "cvefixes", "timestamp": "2022-01-21", "split": "val"} +{"id": "c360de1ee14e125b39a2", "text": "CVE: CVE-2022-29193\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.TensorSummaryV2` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.'}]\n\nFix commit: Fix tf.raw_ops.TensorSummaryV2 vulnerability with invalid serialized", "cve_id": "CVE-2022-29193", "title": "CVE-2022-29193", "source": "cvefixes", "timestamp": "2022-05-20", "split": "val"} +{"id": "5183635d4a54a6b31356", "text": "CVE: CVE-2022-23561\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite model that would cause a write outside of bounds of an array in TFLite. In fact, the attacker can override the linked list used by the memory allocator. This can be leveraged for an arbitrary write primitive under certain conditions. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and Tensor", "cve_id": "CVE-2022-23561", "title": "CVE-2022-23561", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val"} +{"id": "639a9cba6accc46abda6", "text": "CVE: CVE-2022-27462\n\n[{'lang': 'en', 'value': 'Cross Site Scripting (XSS) vulnerability in objects/function.php in function getDeviceID in WWBN AVideo through 11.6, via the yptDevice parameter to view/include/head.php.'}]\n\nFix commit: XSS vulnerability fix , thanks Max Boll", "cve_id": "CVE-2022-27462", "title": "CVE-2022-27462", "source": "cvefixes", "timestamp": "2022-04-05", "split": "val"} +{"id": "69f14a2859ea1bb5759a", "text": "CVE: CVE-2022-0083\n\n[{'lang': 'en', 'value': 'livehelperchat is vulnerable to Generation of Error Message Containing Sensitive Information'}]\n\nFix commit: Show same message in all cases", "cve_id": "CVE-2022-0083", "title": "CVE-2022-0083", "source": "cvefixes", "timestamp": "2022-01-04", "split": "val"} +{"id": "CVE-2022-0028", "text": "Palo Alto Networks PAN-OS Reflected Amplification Denial-of-Service Vulnerability\n\nAffected: Palo Alto Networks PAN-OS\n\nA Palo Alto Networks PAN-OS URL filtering policy misconfiguration could allow a network-based attacker to conduct reflected and amplified TCP denial-of-service (RDoS) attacks.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-940\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-0028", "title": "Palo Alto Networks PAN-OS Reflected Amplification Denial-of-Service Vulnerability", "source": "cisa_kev", "timestamp": "2022-08-22", "split": "val"} +{"id": "a2e75e294ce7dffa2c12", "text": "CVE: CVE-2022-31133\n\n[{'lang': 'en', 'value': 'HumHub is an Open Source Enterprise Social Network. Affected versions of HumHub are vulnerable to a stored Cross-Site Scripting (XSS) vulnerability. For exploitation, the attacker would need a permission to administer the Spaces feature. The names of individual \"spaces\" are not properly escaped and so an attacker with sufficient privilege could insert malicious javascript into a space name and exploit system users who visit that space. It is recomme", "cve_id": "CVE-2022-31133", "title": "CVE-2022-31133", "source": "cvefixes", "timestamp": "2022-07-07", "split": "val"} +{"id": "53d9180d32b1332ce18f", "text": "CVE: CVE-2022-2208\n\n[{'lang': 'en', 'value': 'NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.5163.'}]\n\nFix commit: patch 8.2.5163: crash when deleting buffers in diff mode\n\nProblem: Crash when deleting buffers in diff mode.\nSolution: Recompute diffs later. Skip window without a valid buffer.", "cve_id": "CVE-2022-2208", "title": "CVE-2022-2208", "source": "cvefixes", "timestamp": "2022-06-27", "split": "val"} +{"id": "b5215d626a1fd98380aa", "text": "[Cross-site Scripting (XSS) - Generic] XSS in Cisco Endpoint\n\n**Description:**\nMultiple vulnerabilities in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the web services interface of an affected device. The vulnerabilities are due to insufficient validation of user-supplied input by the web services inte", "cve_id": "CVE-2023-3580", "title": "XSS in Cisco Endpoint (Cross-site Scripting (XSS) - Generic)", "source": "hackerone", "timestamp": "2023-11-17", "split": "val"} +{"id": "ed8b88e03f8841dba769", "text": "[Improper Input Validation] CVE-2023-28710 Apache Airflow Spark Provider Arbitrary File Read via JDBC\n\nIn all versions of Apache Airflow Spark Provider (the verification version is 4.0.0), because the parameters are not effectively filtered, the attacker can pass in malicious schema parameters (including malicious JDBC url) when establishing a connection with SparkJDBCHook, so that when establishing When connecting, a malicious mysql server can read any file on airflow.\n\nthis is screenshot of e", "cve_id": "CVE-2023-28710", "title": "CVE-2023-28710 Apache Airflow Spark Provider Arbitrary File Read via JDBC (Improper Input Validation)", "source": "hackerone", "timestamp": "2023-07-12", "split": "val"} +{"id": "c7a532ffcf9a8cb90140", "text": "CVE: CVE-2022-2997\n\n[{'lang': 'en', 'value': 'Session Fixation in GitHub repository snipe/snipe-it prior to 6.0.10.'}]\n\nFix commit: Log user out of other devices when they change their password\n\nSigned-off-by: snipe ", "cve_id": "CVE-2022-2997", "title": "CVE-2022-2997", "source": "cvefixes", "timestamp": "2022-08-25", "split": "val"} +{"id": "CVE-2023-42793", "text": "JetBrains TeamCity Authentication Bypass Vulnerability\n\nAffected: JetBrains TeamCity\n\nJetBrains TeamCity contains an authentication bypass vulnerability that allows for remote code execution on TeamCity Server.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-288\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-42793", "title": "JetBrains TeamCity Authentication Bypass Vulnerability", "source": "cisa_kev", "timestamp": "2023-10-04", "split": "val"} +{"id": "CVE-2023-2868", "text": "Barracuda Networks ESG Appliance Improper Input Validation Vulnerability\n\nAffected: Barracuda Networks Email Security Gateway (ESG) Appliance\n\nBarracuda Email Security Gateway (ESG) appliance contains an improper input validation vulnerability of a user-supplied .tar file, leading to remote command injection.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-20\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-2868", "title": "Barracuda Networks ESG Appliance Improper Input Validation Vulnerability", "source": "cisa_kev", "timestamp": "2023-05-26", "split": "val"} +{"id": "6803a4d5e030eb036faa", "text": "CVE: CVE-2022-0689\n\n[{'lang': 'en', 'value': 'Use multiple time the one-time coupon in Packagist microweber/microweber prior to 1.2.11.'}]\n\nFix commit: update", "cve_id": "CVE-2022-0689", "title": "CVE-2022-0689", "source": "cvefixes", "timestamp": "2022-02-19", "split": "val"} +{"id": "452a84891accba5271e3", "text": "CVE: CVE-2022-1795\n\n[{'lang': 'en', 'value': 'Use After Free in GitHub repository gpac/gpac prior to v2.1.0-DEV.'}]\n\nFix commit: fixed #2194", "cve_id": "CVE-2022-1795", "title": "CVE-2022-1795", "source": "cvefixes", "timestamp": "2022-05-18", "split": "val"} +{"id": "b39fe671459ab9e56128", "text": "CVE: CVE-2022-2042\n\n[{'lang': 'en', 'value': 'Use After Free in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.5072: using uninitialized value and freed memory in spell command\n\nProblem: Using uninitialized value and freed memory in spell command.\nSolution: Initialize \"attr\". Check for empty line early.", "cve_id": "CVE-2022-2042", "title": "CVE-2022-2042", "source": "cvefixes", "timestamp": "2022-06-10", "split": "val"} +{"id": "f9972ab6d24d3ae5c304", "text": "CVE: CVE-2022-0476\n\n[{'lang': 'en', 'value': 'Denial of Service in GitHub repository radareorg/radare2 prior to 5.6.4.'}]\n\nFix commit: Fix DoS in the minidump parser ##crash\n\n* Reported by lazymio via huntr.dev\n* Reproducer: mdmp-dos", "cve_id": "CVE-2022-0476", "title": "CVE-2022-0476", "source": "cvefixes", "timestamp": "2022-02-23", "split": "val"} +{"id": "045fd480aa94eb0b67f9", "text": "CVE: CVE-2022-25867\n\n[{'lang': 'en', 'value': 'The package io.socket:socket.io-client before 2.0.1 are vulnerable to NULL Pointer Dereference when parsing a packet with with invalid payload format.'}]\n\nFix commit: fix: ensure the payload format is valid\n\nThis commit should prevent some NPE issues encountered after the\nparsing of the packet.\n\nRelated:\n\n- https://github.com/socketio/socket.io-client-java/issues/642\n- https://github.com/socketio/socket.io-client-java/issues/609\n- https://github.com", "cve_id": "CVE-2022-25867", "title": "CVE-2022-25867", "source": "cvefixes", "timestamp": "2022-08-02", "split": "val"} +{"id": "1a83428dcc24296fa66d", "text": "CVE: CVE-2022-1291\n\n[{'lang': 'en', 'value': 'XSS vulnerability with default `onCellHtmlData` function in GitHub repository hhurz/tableexport.jquery.plugin prior to 1.25.0. Transmitting cookies to third-party servers. Sending data from secure sessions to third-party servers'}]\n\nFix commit: Release 1.25", "cve_id": "CVE-2022-1291", "title": "CVE-2022-1291", "source": "cvefixes", "timestamp": "2022-04-10", "split": "val"} +{"id": "86effca427ca2e88c472", "text": "CVE: CVE-2022-1926\n\n[{'lang': 'en', 'value': 'Integer Overflow or Wraparound in GitHub repository polonel/trudesk prior to 1.2.3.'}]\n\nFix commit: fix(messages): xss security", "cve_id": "CVE-2022-1926", "title": "CVE-2022-1926", "source": "cvefixes", "timestamp": "2022-05-31", "split": "val"} +{"id": "0e436f64b82fd4f61929", "text": "CVE: CVE-2022-0968\n\n[{'lang': 'en', 'value': 'The microweber application allows large characters to insert in the input field \"fist & last name\" which can allow attackers to cause a Denial of Service (DoS) via a crafted HTTP request. in microweber/microweber in GitHub repository microweber/microweber prior to 1.2.12.'}]\n\nFix commit: user update requrest validation", "cve_id": "CVE-2022-0968", "title": "CVE-2022-0968", "source": "cvefixes", "timestamp": "2022-03-15", "split": "val"} +{"id": "ecf7f8a0713b2ff80755", "text": "CVE: CVE-2022-32978\n\n[{'lang': 'en', 'value': 'There is an assertion failure in SingleComponentLSScan::ParseMCU in singlecomponentlsscan.cpp in libjpeg before 1.64 via an empty JPEG-LS scan.'}]\n\nFix commit: Fixed handling of empty JPEG-LS scans.", "cve_id": "CVE-2022-32978", "title": "CVE-2022-32978", "source": "cvefixes", "timestamp": "2022-06-10", "split": "val"} +{"id": "084647247b6feaa02db2", "text": "CVE: CVE-2022-24769\n\n[{'lang': 'en', 'value': \"Moby is an open-source project created by Docker to enable and accelerate software containerization. A bug was found in Moby (Docker Engine) prior to version 20.10.14 where containers were incorrectly started with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during `execve(2)`. Normally, when executa", "cve_id": "CVE-2022-24769", "title": "CVE-2022-24769", "source": "cvefixes", "timestamp": "2022-03-24", "split": "val"} +{"id": "925359b67ab07a2fe00d", "text": "[Authentication Bypass by Primary Weakness] CVE-2023-27536: GSS delegation too eager connection re-use\n\n## Summary:\nWhen considering reuse of existing connections different `CURLOPT_GSSAPI_DELEGATION` (libcurl) `--delegation` (curl) option is not taken into consideration. This can lead to reuse of previously established connection when it should no longer be (as more strict or no delegation was requested).\n\n## Steps To Reproduce:\n\n 1. `curl --negotiate -u : --delegation \"always\" https://serve", "cve_id": "CVE-2023-27536", "title": "CVE-2023-27536: GSS delegation too eager connection re-use (Authentication Bypass by Primary Weakness)", "source": "hackerone", "timestamp": "2023-03-22", "split": "val"} +{"id": "e3354371765b67d0b2d5", "text": "[Business Logic Errors] CVE-2022-32208: FTP-KRB bad message verification\n\nWhen curl does FTP transfers secured by krb5, it handles message verification failures wrongly. This flaw makes it possible for a Man-In-The-Middle attack to go unnoticed and even allows it to inject data to the client.\n\n## Impact\n\nLoss of integrity of FTP-KRB transfers", "cve_id": "CVE-2022-32208", "title": "CVE-2022-32208: FTP-KRB bad message verification (Business Logic Errors)", "source": "hackerone", "timestamp": "2022-06-27", "split": "val"} +{"id": "f560465992e25b386313", "text": "CVE: CVE-2022-2029\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - DOM in GitHub repository kromitgmbh/titra prior to 0.77.0.'}]\n\nFix commit: 🔒 fixes three critical stored XSS vulnerabilities thanks @saharshtapi for reporting this\n🔒 fixes a formula injection vulnerability in the Excel export functionality thanks @saharshtapi for reprorting this\n❗️this is an important security release, we recommend to migrate asap, all titra versions below version 0.77.0 are considered insecure for produc", "cve_id": "CVE-2022-2029", "title": "CVE-2022-2029", "source": "cvefixes", "timestamp": "2022-06-09", "split": "val"} +{"id": "CVE-2023-1389", "text": "TP-Link Archer AX-21 Command Injection Vulnerability\n\nAffected: TP-Link Archer AX21\n\nTP-Link Archer AX-21 contains a command injection vulnerability that allows for remote code execution.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-77\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-1389", "title": "TP-Link Archer AX-21 Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2023-05-01", "split": "val"} +{"id": "556426db2f2a16303085", "text": "CVE: CVE-2022-0482\n\n[{'lang': 'en', 'value': 'Exposure of Private Personal Information to an Unauthorized Actor in GitHub repository alextselegidis/easyappointments prior to 1.4.3.'}]\n\nFix commit: Release v1.4.3", "cve_id": "CVE-2022-0482", "title": "CVE-2022-0482", "source": "cvefixes", "timestamp": "2022-03-09", "split": "val"} +{"id": "ad58fd318adbb3092135", "text": "[Code Injection] ███ vulnerable to CVE-2022-22954\n\nI found that one of the targets belongs to DOD vulnerable to CVE-2022-22954 where an attacker may be able to execute any malicious code like escalating Remote code execution is also possible \n\n**Technical Summary:**\n\nCVE-2022-22954 is a server-side template injection vulnerability in the VMware Workspace ONE Access and Identity Manager. This vulnerability was assigned a CVSSv3 score of 9.8. An unauthenticated attacker with network access could e", "cve_id": "CVE-2022-22954", "title": "███ vulnerable to CVE-2022-22954 (Code Injection)", "source": "hackerone", "timestamp": "2022-04-20", "split": "val"} +{"id": "dab1353e5ccc434583f5", "text": "CVE: CVE-2022-35918\n\n[{'lang': 'en', 'value': 'Streamlit is a data oriented application development framework for python. Users hosting Streamlit app(s) that use custom components are vulnerable to a directory traversal attack that could leak data from their web server file-system such as: server logs, world readable files, and potentially other sensitive information. An attacker can craft a malicious URL with file paths and the streamlit server would process that URL and return the contents of", "cve_id": "CVE-2022-35918", "title": "CVE-2022-35918", "source": "cvefixes", "timestamp": "2022-08-01", "split": "val"} +{"id": "CVE-2023-20198", "text": "Cisco IOS XE Web UI Privilege Escalation Vulnerability\n\nAffected: Cisco IOS XE Web UI\n\nCisco IOS XE Web UI contains a privilege escalation vulnerability in the web user interface that could allow a remote, unauthenticated attacker to create an account with privilege level 15 access. The attacker can then use that account to gain control of the affected device.\n\nRequired Action: Verify that instances of Cisco IOS XE Web UI are in compliance with BOD 23-02 and apply mitigations per vendor instruct", "cve_id": "CVE-2023-20198", "title": "Cisco IOS XE Web UI Privilege Escalation Vulnerability", "source": "cisa_kev", "timestamp": "2023-10-16", "split": "val"} +{"id": "f0bbc00f8b34dd8b4561", "text": "CVE: CVE-2022-2581\n\n[{'lang': 'en', 'value': 'Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.0104.'}]\n\nFix commit: patch 9.0.0105: illegal memory access when pattern starts with illegal byte\n\nProblem: Illegal memory access when pattern starts with illegal byte.\nSolution: Do not match a character with an illegal byte.", "cve_id": "CVE-2022-2581", "title": "CVE-2022-2581", "source": "cvefixes", "timestamp": "2022-08-01", "split": "val"} +{"id": "72914b7d3e3a005f9d44", "text": "[Business Logic Errors] CVE-2023-27535: FTP too eager connection reuse\n\nlibcurl would reuse a previously created FTP connection even when one or more options had been changed that could have made the effective user a very different one, thus leading to the doing the second transfer with wrong credentials.\n\nlibcurl keeps previously used connections in a connection pool for subsequent transfers to reuse if one of them matches the setup. However, several FTP settings were left out from the configur", "cve_id": "CVE-2023-27535", "title": "CVE-2023-27535: FTP too eager connection reuse (Business Logic Errors)", "source": "hackerone", "timestamp": "2023-03-20", "split": "val"} +{"id": "aba117e92a46c8f88845", "text": "CVE: CVE-2022-31047\n\n[{'lang': 'en', 'value': 'TYPO3 is an open source web content management system. Prior to versions 7.6.57 ELTS, 8.7.47 ELTS, 9.5.34 ELTS, 10.4.29, and 11.5.11, system internal credentials or keys (e.g. database credentials) can be logged as plaintext in exception handlers, when logging the complete exception stack trace. TYPO3 versions 7.6.57 ELTS, 8.7.47 ELTS, 9.5.34 ELTS, 10.4.29, 11.5.11 contain a fix for the problem.'}]\n\nFix commit: [SECURITY] Do not log stacktrace in ex", "cve_id": "CVE-2022-31047", "title": "CVE-2022-31047", "source": "cvefixes", "timestamp": "2022-06-14", "split": "val"} +{"id": "6f0c2b94bf0fcd20d277", "text": "CVE: CVE-2022-24722\n\n[{'lang': 'en', 'value': 'VIewComponent is a framework for building view components in Ruby on Rails. Versions prior to 2.31.2 and 2.49.1 contain a cross-site scripting vulnerability that has the potential to impact anyone using translations with the view_component gem. Data received via user input and passed as an interpolation argument to the `translate` method is not properly sanitized before display. Versions 2.31.2 and 2.49.1 have been released and fully mitigate the vu", "cve_id": "CVE-2022-24722", "title": "CVE-2022-24722", "source": "cvefixes", "timestamp": "2022-03-02", "split": "val"} +{"id": "037160c70ddc6a6ba810", "text": "CVE: CVE-2022-23598\n\n[{'lang': 'en', 'value': 'laminas-form is a package for validating and displaying simple and complex forms. When rendering validation error messages via the `formElementErrors()` view helper shipped with laminas-form, many messages will contain the submitted value. However, in laminas-form prior to version 3.1.1, the value was not being escaped for HTML contexts, which could potentially lead to a reflected cross-site scripting attack. Versions 3.1.1 and above contain a patch", "cve_id": "CVE-2022-23598", "title": "CVE-2022-23598", "source": "cvefixes", "timestamp": "2022-01-28", "split": "val"} +{"id": "d601ca0c48bd6f032e3d", "text": "CVE: CVE-2022-24802\n\n[{'lang': 'en', 'value': 'deepmerge-ts is a typescript library providing functionality to deep merging of javascript objects. deepmerge-ts is vulnerable to Prototype Pollution via file deepmerge.ts, function defaultMergeRecords(). This issue has been patched in version 4.0.2. There are no known workarounds for this issue.'}]\n\nFix commit: fix: protect against prototype pollution", "cve_id": "CVE-2022-24802", "title": "CVE-2022-24802", "source": "cvefixes", "timestamp": "2022-04-01", "split": "val"} +{"id": "bb16cee13400ada4c4f1", "text": "CVE: CVE-2022-23603\n\n[{'lang': 'en', 'value': 'iTunesRPC-Remastered is a discord rich presence application for use with iTunes & Apple Music. In code before commit 24f43aa user input is not properly sanitized and code injection is possible. Users are advised to upgrade as soon as is possible. There are no known workarounds for this issue.'}]\n\nFix commit: Merge pull request from GHSA-3xpp-rhqx-cw96\n\nsec fix 2", "cve_id": "CVE-2022-23603", "title": "CVE-2022-23603", "source": "cvefixes", "timestamp": "2022-02-01", "split": "val"} +{"id": "a61327a27a7f0b6c4b32", "text": "CVE: CVE-2022-23571\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. When decoding a tensor from protobuf, a TensorFlow process can encounter cases where a `CHECK` assertion is invalidated based on user controlled arguments, if the tensors have an invalid `dtype` and 0 elements or an invalid shape. This allows attackers to cause denial of services in TensorFlow processes. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on Tenso", "cve_id": "CVE-2022-23571", "title": "CVE-2022-23571", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val"} +{"id": "de57d6b8160f62538ed2", "text": "CVE: CVE-2022-23637\n\n[{'lang': 'en', 'value': 'K-Box is a web-based application to manage documents, images, videos and geodata. Prior to version 0.33.1, a stored Cross-Site-Scripting (XSS) vulnerability is present in the markdown editor used by the document abstract and markdown file preview. A specifically crafted anchor link can, if clicked, execute untrusted javascript actions, like retrieving user cookies. Version 0.33.1 includes a patch that allows discarding unsafe links.'}]\n\nFix commit:", "cve_id": "CVE-2022-23637", "title": "CVE-2022-23637", "source": "cvefixes", "timestamp": "2022-02-14", "split": "val"} +{"id": "CVE-2022-27926", "text": "Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting (XSS) Vulnerability\n\nAffected: Synacor Zimbra Collaboration Suite (ZCS)\n\nSynacor Zimbra Collaboration Suite (ZCS) contains a cross-site scripting vulnerability by allowing an endpoint URL to accept parameters without sanitizing.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-79, CWE-138\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-27926", "title": "Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting (XSS) Vulnerability", "source": "cisa_kev", "timestamp": "2023-04-03", "split": "val"} +{"id": "752ce8268764ecbecce4", "text": "CVE: CVE-2022-0407\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.4219: reading before the start of the line\n\nProblem: Reading before the start of the line.\nSolution: Check boundary before trying to read the character.", "cve_id": "CVE-2022-0407", "title": "CVE-2022-0407", "source": "cvefixes", "timestamp": "2022-01-30", "split": "val"} +{"id": "b5da779676df3d462ce8", "text": "CVE: CVE-2022-23074\n\n[{'lang': 'en', 'value': \"In Recipes, versions 0.17.0 through 1.2.5 are vulnerable to Stored Cross-Site Scripting (XSS), in the ‘Name’ field of Keyword, Food and Unit components. When a victim accesses the Keyword/Food/Unit endpoints, the XSS payload will trigger. A low privileged attacker will have the victim's API key and can lead to admin's account takeover.\"}]\n\nFix commit: improved output sanitization of several views", "cve_id": "CVE-2022-23074", "title": "CVE-2022-23074", "source": "cvefixes", "timestamp": "2022-06-21", "split": "val"} +{"id": "1c16eaf7092d5495141a", "text": "CVE: CVE-2022-0692\n\n[{'lang': 'en', 'value': 'Open Redirect on Rudloff/alltube in Packagist rudloff/alltube prior to 3.0.1.'}]\n\nFix commit: Don't redirect to REQUEST_URI when browsing to index.php\nInstead, we can make sure everything works correctly on index.php", "cve_id": "CVE-2022-0692", "title": "CVE-2022-0692", "source": "cvefixes", "timestamp": "2022-02-21", "split": "val"} +{"id": "96fde7fe3d6f5f77aa00", "text": "CVE: CVE-2022-31000\n\n[{'lang': 'en', 'value': \"solidus_backend is the admin interface for the Solidus e-commerce framework. Versions prior to 3.1.6, 3.0.6, and 2.11.16 contain a cross-site request forgery (CSRF) vulnerability. The vulnerability allows attackers to change the state of an order's adjustments if they hold its number, and the execution happens on a store administrator's computer. Users should upgrade to solidus_backend 3.1.6, 3.0.6, or 2.11.16 to receive a patch.\"}]\n\nFix commit: Mer", "cve_id": "CVE-2022-31000", "title": "CVE-2022-31000", "source": "cvefixes", "timestamp": "2022-06-01", "split": "val"} +{"id": "5ffa6d99216678577448", "text": "CVE: CVE-2022-1031\n\n[{'lang': 'en', 'value': 'Use After Free in op_is_set_bp in GitHub repository radareorg/radare2 prior to 5.6.6.'}]\n\nFix commit: Fix UAF in aaaa on arm/thumb switching ##crash\n\n* Reported by @peacock-doris via huntr.dev\n* Reproducer tests_65185\n* This is a logic fix, but not the fully safe as changes in the code\n can result on UAF again, to properly protect r2 from crashing we\n need to break the ABI and add refcounting to RRegItem, which can't\n happen in 5.6.x because of ab", "cve_id": "CVE-2022-1031", "title": "CVE-2022-1031", "source": "cvefixes", "timestamp": "2022-03-22", "split": "val"} +{"id": "8d1896c4a0e5cc587cdd", "text": "[Insufficiently Protected Credentials] CVE-2022-27776: Auth/cookie leak on redirect\n\n## Summary:\nCurl can be coaxed to leak Authorisation / Cookie headers by redirecting request to http:// URL on the same host. Successful exploitation requires that the attacker can either Man-in-the-Middle the connection or can access the traffic at the recipient side (for example by redirecting to a non-privileged port such as 9999 on the same host).\n\n## Steps To Reproduce:\n\n1. Configure for example Apache2 to", "cve_id": "CVE-2022-27776", "title": "CVE-2022-27776: Auth/cookie leak on redirect (Insufficiently Protected Credentials)", "source": "hackerone", "timestamp": "2022-04-27", "split": "val"} +{"id": "CVE-2022-41128", "text": "Microsoft Windows Scripting Languages Remote Code Execution Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows contains an unspecified vulnerability in the JScript9 scripting language which allows for remote code execution.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-787\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-41128", "title": "Microsoft Windows Scripting Languages Remote Code Execution Vulnerability", "source": "cisa_kev", "timestamp": "2022-11-08", "split": "val"} +{"id": "0159eac955b2aeb4000e", "text": "CVE: CVE-2022-31015\n\n[{'lang': 'en', 'value': 'Waitress is a Web Server Gateway Interface server for Python 2 and 3. Waitress versions 2.1.0 and 2.1.1 may terminate early due to a thread closing a socket while the main thread is about to call select(). This will lead to the main thread raising an exception that is not handled and then causing the entire application to be killed. This issue has been fixed in Waitress 2.1.2 by no longer allowing the WSGI thread to close the socket. Instead, that i", "cve_id": "CVE-2022-31015", "title": "CVE-2022-31015", "source": "cvefixes", "timestamp": "2022-05-31", "split": "val"} +{"id": "71fc69319d7a1098d98e", "text": "CVE: CVE-2022-24723\n\n[{'lang': 'en', 'value': 'URI.js is a Javascript URL mutation library. Before version 1.19.9, whitespace characters are not removed from the beginning of the protocol, so URLs are not parsed properly. This issue has been patched in version 1.19.9. Removing leading whitespace from values before passing them to URI.parse can be used as a workaround.'}]\n\nFix commit: fix(parse): remove leading whitespace\n\nreported by @p0cas via huntr.dev", "cve_id": "CVE-2022-24723", "title": "CVE-2022-24723", "source": "cvefixes", "timestamp": "2022-03-03", "split": "val"} +{"id": "4f5e04405930cc41b2a3", "text": "CVE: CVE-2022-1347\n\n[{'lang': 'en', 'value': 'Stored XSS in the \"Username\" & \"Email\" input fields leads to account takeover of Admin & Co-admin users in GitHub repository causefx/organizr prior to 2.1.1810. Account takeover and privilege escalation'}]\n\nFix commit: added sanitizeUserString and sanitizeEmail functions\nadded sanitize to uploaded image names\nadded sanitize to tabs, categories, users and bookmarks\nremoved svg files from approved image lists", "cve_id": "CVE-2022-1347", "title": "CVE-2022-1347", "source": "cvefixes", "timestamp": "2022-04-13", "split": "val"} +{"id": "99f11b3a65c1e60ab2ec", "text": "CVE: CVE-2022-31029\n\n[{'lang': 'en', 'value': 'AdminLTE is a Pi-hole Dashboard for stats and configuration. In affected versions inserting code like `` in the field marked with \"Domain to look for\" and hitting enter (or clicking on any of the buttons) will execute the script. The user must be logged in to use this vulnerability. Usually only administrators have login access to pi-hole, minimizing the risks. Users are advised to upgrade. There are no known", "cve_id": "CVE-2022-31029", "title": "CVE-2022-31029", "source": "cvefixes", "timestamp": "2022-07-07", "split": "val"} +{"id": "943f223373cebca75855", "text": "CVE: CVE-2022-2306\n\n[{'lang': 'en', 'value': 'Old session tokens can be used to authenticate to the application and send authenticated requests.'}]\n\nFix commit: Correctly console session token on all logouts. (#875)", "cve_id": "CVE-2022-2306", "title": "CVE-2022-2306", "source": "cvefixes", "timestamp": "2022-07-05", "split": "val"} +{"id": "CVE-2023-38950", "text": "ZKTeco BioTime Path Traversal Vulnerability\n\nAffected: ZKTeco BioTime\n\nZKTeco BioTime contains a path traversal vulnerability in the iclock API that allows an unauthenticated attacker to read arbitrary files via supplying a crafted payload.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-22\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-38950", "title": "ZKTeco BioTime Path Traversal Vulnerability", "source": "cisa_kev", "timestamp": "2025-05-19", "split": "val"} +{"id": "79308c8e328109920ce9", "text": "CVE: CVE-2022-31093\n\n[{'lang': 'en', 'value': 'NextAuth.js is a complete open source authentication solution for Next.js applications. In affected versions an attacker can send a request to an app using NextAuth.js with an invalid `callbackUrl` query parameter, which internally is converted to a `URL` object. The URL instantiation would fail due to a malformed URL being passed into the constructor, causing it to throw an unhandled error which led to the **API route handler timing out and logging", "cve_id": "CVE-2022-31093", "title": "CVE-2022-31093", "source": "cvefixes", "timestamp": "2022-06-27", "split": "val"} +{"id": "0c4656265c993c32f3cd", "text": "[Improper Access Control - Generic] Adobe ColdFusion - Access Control Bypass [CVE-2023-38205] at ██████\n\nHello Gents, I would like to report an issue where attackers are able to bypass the product feature that restricts external access to the ColdFusion Administrator. [CVE-2023-38205] at `██████`\n\n\n\n## Steps to reproduce\n+ Please open the following link:\n\n> https://█████████/hax/..CFIDE/wizards/common/utils.cfc?method=wizardHash&inPassword=foo&_cfclient=true&returnFormat=wddx\n\n## Proof of concep", "cve_id": "CVE-2023-38205", "title": "Adobe ColdFusion - Access Control Bypass [CVE-2023-38205] at ██████ (Improper Access Control - Generic)", "source": "hackerone", "timestamp": "2023-09-08", "split": "val"} +{"id": "223ff64b44cf5dda9518", "text": "CVE: CVE-2022-23562\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The implementation of `Range` suffers from integer overflows. These can trigger undefined behavior or, in some scenarios, extremely large allocations. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: Merge pull request #52707 fro", "cve_id": "CVE-2022-23562", "title": "CVE-2022-23562", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val"} +{"id": "f5aa2fa501e37e351cde", "text": "CVE: CVE-2022-0559\n\n[{'lang': 'en', 'value': 'Use After Free in GitHub repository radareorg/radare2 prior to 5.6.2.'}]\n\nFix commit: Prefer memleak over usaf in io.bank's rbtree bug ##crash\n\n* That's a workaround, proper fix will come later\n* Reproducer: bins/fuzzed/iobank-crash\n* Reported by Akyne Choi via huntr.dev", "cve_id": "CVE-2022-0559", "title": "CVE-2022-0559", "source": "cvefixes", "timestamp": "2022-02-16", "split": "val"} +{"id": "54824cd22b2db2778af7", "text": "CVE: CVE-2022-0079\n\n[{'lang': 'en', 'value': 'showdoc is vulnerable to Generation of Error Message Containing Sensitive Information'}]\n\nFix commit: Merge branch 'v2.10.0'", "cve_id": "CVE-2022-0079", "title": "CVE-2022-0079", "source": "cvefixes", "timestamp": "2022-01-03", "split": "val"} +{"id": "5fc0b469ccf6d10b4843", "text": "CVE: CVE-2022-28927\n\n[{'lang': 'en', 'value': 'A remote code execution (RCE) vulnerability in Subconverter v0.7.2 allows attackers to execute arbitrary code via crafted config and url parameters.'}]\n\nFix commit: Enhancements\n\nAdd authorization check before loading scripts.\nAdd detailed logs when loading preference settings.", "cve_id": "CVE-2022-28927", "title": "CVE-2022-28927", "source": "cvefixes", "timestamp": "2022-05-19", "split": "val"} +{"id": "CVE-2023-49103", "text": "ownCloud graphapi Information Disclosure Vulnerability\n\nAffected: ownCloud ownCloud graphapi\n\nownCloud graphapi contains an information disclosure vulnerability that can reveal sensitive data stored in phpinfo() via GetPhpInfo.php, including administrative credentials.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-49103", "title": "ownCloud graphapi Information Disclosure Vulnerability", "source": "cisa_kev", "timestamp": "2023-11-30", "split": "val"} +{"id": "021e834b9fd6f602b356", "text": "CVE: CVE-2022-27650\n\n[{'lang': 'en', 'value': 'A flaw was found in crun where containers were incorrectly started with non-empty default permissions. A vulnerability was found in Moby (Docker Engine) where containers were started incorrectly with non-empty inheritable Linux process capabilities. This flaw allows an attacker with access to programs with inheritable file capabilities to elevate those capabilities to the permitted set when execve(2) runs.'}]\n\nFix commit: exec: --cap do not set inhe", "cve_id": "CVE-2022-27650", "title": "CVE-2022-27650", "source": "cvefixes", "timestamp": "2022-04-04", "split": "val"} +{"id": "0c65e31ee7c0819e7ecb", "text": "CVE: CVE-2022-2175\n\n[{'lang': 'en', 'value': 'Buffer Over-read in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.5148: invalid memory access when using expression on command line\n\nProblem: Invalid memory access when using an expression on the command line.\nSolution: Make sure the position does not go negative.", "cve_id": "CVE-2022-2175", "title": "CVE-2022-2175", "source": "cvefixes", "timestamp": "2022-06-23", "split": "val"} +{"id": "8ba9b2b0179f6acd3315", "text": "CVE: CVE-2022-31155\n\n[{'lang': 'en', 'value': 'Sourcegraph is an opensource code search and navigation engine. In Sourcegraph versions before 3.41.0, it is possible for an attacker to delete other users’ saved searches due to a bug in the authorization check. The vulnerability does not allow the reading of other users’ saved searches, only overwriting them with attacker-controlled searches. The issue is patched in Sourcegraph version 3.41.0. There is no workaround for this issue and updating", "cve_id": "CVE-2022-31155", "title": "CVE-2022-31155", "source": "cvefixes", "timestamp": "2022-08-01", "split": "val"} +{"id": "CVE-2023-36847", "text": "Juniper Junos OS EX Series Missing Authentication for Critical Function Vulnerability\n\nAffected: Juniper Junos OS\n\nJuniper Junos OS on EX Series contains a missing authentication for critical function vulnerability that allows an unauthenticated, network-based attacker to cause limited impact to the file system integrity. With a specific request to installAppPackage.php that doesn't require authentication, an attacker is able to upload arbitrary files via J-Web, leading to a loss of integrity fo", "cve_id": "CVE-2023-36847", "title": "Juniper Junos OS EX Series Missing Authentication for Critical Function Vulnerability", "source": "cisa_kev", "timestamp": "2023-11-13", "split": "val"} +{"id": "bf424d1a14afe6aec94a", "text": "CVE: CVE-2022-24717\n\n[{'lang': 'en', 'value': 'ssr-pages is an HTML page builder for the purpose of server-side rendering (SSR). In versions prior to 0.1.5, a cross site scripting (XSS) issue can occur when providing untrusted input to the `redirect.link` property as an argument to the `build(MessagePageOptions)` function. While there is no known workaround at this time, there is a patch in version 0.1.5.'}]\n\nFix commit: fix string encoder", "cve_id": "CVE-2022-24717", "title": "CVE-2022-24717", "source": "cvefixes", "timestamp": "2022-03-01", "split": "val"} +{"id": "fdd533fe2968e11a539b", "text": "CVE: CVE-2022-21727\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. The implementation of shape inference for `Dequantize` is vulnerable to an integer overflow weakness. The `axis` argument can be `-1` (the default value for the optional argument) or any other positive value at most the number of dimensions of the input. Unfortunately, the upper bound is not checked, and, since the code computes `axis + 1`, an attacker can trigger an integer overflow. The fix", "cve_id": "CVE-2022-21727", "title": "CVE-2022-21727", "source": "cvefixes", "timestamp": "2022-02-03", "split": "val"} +{"id": "0493751af438d89e9f7f", "text": "CVE: CVE-2022-21707\n\n[{'lang': 'en', 'value': 'wasmCloud Host Runtime is a server process that securely hosts and provides dispatch for web assembly (WASM) actors and capability providers. In versions prior to 0.52.2 actors can bypass capability authorization. Actors are normally required to declare their capabilities for inbound invocations, but with this vulnerability actor capability claims are not verified upon receiving invocations. This compromises the security model for actors as they can", "cve_id": "CVE-2022-21707", "title": "CVE-2022-21707", "source": "cvefixes", "timestamp": "2022-01-21", "split": "val"} +{"id": "c9043bb08f464ca55b2e", "text": "CVE: CVE-2022-2280\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository microweber/microweber prior to 1.2.19.'}]\n\nFix commit: update", "cve_id": "CVE-2022-2280", "title": "CVE-2022-2280", "source": "cvefixes", "timestamp": "2022-07-01", "split": "val"} +{"id": "CVE-2023-33246", "text": "Apache RocketMQ Command Execution Vulnerability\n\nAffected: Apache RocketMQ\n\nSeveral components of Apache RocketMQ, including NameServer, Broker, and Controller, are exposed to the extranet and lack permission verification. An attacker can exploit this vulnerability by using the update configuration function to execute commands as the system users that RocketMQ is running as or achieve the same effect by forging the RocketMQ protocol content.\n\nRequired Action: Apply mitigations per vendor instruc", "cve_id": "CVE-2023-33246", "title": "Apache RocketMQ Command Execution Vulnerability", "source": "cisa_kev", "timestamp": "2023-09-06", "split": "val"} +{"id": "d1ca6824a5e758cb1668", "text": "CVE: CVE-2022-24770\n\n[{'lang': 'en', 'value': \"`gradio` is an open source framework for building interactive machine learning models and demos. Prior to version 2.8.11, `gradio` suffers from Improper Neutralization of Formula Elements in a CSV File. The `gradio` library has a flagging functionality which saves input/output data into a CSV file on the developer's computer. This can allow a user to save arbitrary text into the CSV file, such as commands. If a program like MS Excel opens such a fil", "cve_id": "CVE-2022-24770", "title": "CVE-2022-24770", "source": "cvefixes", "timestamp": "2022-03-17", "split": "val"} +{"id": "b3b2c6fd21e876bef358", "text": "CVE: CVE-2022-2060\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository dolibarr/dolibarr prior to 16.0.'}]\n\nFix commit: Merge branch 'develop' of git@github.com:Dolibarr/dolibarr.git into develop", "cve_id": "CVE-2022-2060", "title": "CVE-2022-2060", "source": "cvefixes", "timestamp": "2022-06-13", "split": "val"} +{"id": "5c150722b401f078643d", "text": "CVE: CVE-2022-1649\n\n[{'lang': 'en', 'value': 'Null pointer dereference in libr/bin/format/mach0/mach0.c in radareorg/radare2 in GitHub repository radareorg/radare2 prior to 5.7.0. It is likely to be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/476.html).'}]\n\nFix commit: Fix null deref in macho parser ##crash\n\n* Reported by Han0nly via huntrdev\n* BountyID: c07e4918-cf86-4d2e-8969-5fb63575b449\n* Reproducer: machonull", "cve_id": "CVE-2022-1649", "title": "CVE-2022-1649", "source": "cvefixes", "timestamp": "2022-05-10", "split": "val"} +{"id": "7494adb597b90a29dc66", "text": "CVE: CVE-2022-0341\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository vanessa219/vditor prior to 3.8.12.'}]\n\nFix commit: :bug: 所见即所得模式传入字符串 ```
``` 报错 Fix https://github.com/Vanessa219/vditor/issues/1102", "cve_id": "CVE-2022-0341", "title": "CVE-2022-0341", "source": "cvefixes", "timestamp": "2022-03-14", "split": "val"} +{"id": "ec1ce4e25226423438f8", "text": "CVE: CVE-2022-24764\n\n[{'lang': 'en', 'value': 'PJSIP is a free and open source multimedia communication library written in C. Versions 2.12 and prior contain a stack buffer overflow vulnerability that affects PJSUA2 users or users that call the API `pjmedia_sdp_print(), pjmedia_sdp_media_print()`. Applications that do not use PJSUA2 and do not directly call `pjmedia_sdp_print()` or `pjmedia_sdp_media_print()` should not be affected. A patch is available on the `master` branch of the `pjsip/pjpro", "cve_id": "CVE-2022-24764", "title": "CVE-2022-24764", "source": "cvefixes", "timestamp": "2022-03-22", "split": "val"} +{"id": "d8cc9317e974ddba14aa", "text": "CVE: CVE-2022-36008\n\n[{'lang': 'en', 'value': \"Frontier is Substrate's Ethereum compatibility layer. A security issue was discovered affecting parsing of the RPC result of the exit reason in case of EVM reversion. In release build, this would cause the exit reason being incorrectly parsed and returned by RPC. In debug build, this would cause an overflow panic. No action is needed unless you have a bridge node that needs to distinguish different reversion exit reasons and you used RPC for this. T", "cve_id": "CVE-2022-36008", "title": "CVE-2022-36008", "source": "cvefixes", "timestamp": "2022-08-19", "split": "val"} +{"id": "4b2b6849ba9512f5824e", "text": "CVE: CVE-2022-24840\n\n[{'lang': 'en', 'value': 'django-s3file is a lightweight file upload input for Django and Amazon S3 . In versions prior to 5.5.1 it was possible to traverse the entire AWS S3 bucket and in most cases to access or delete files. If the `AWS_LOCATION` setting was set, traversal was limited to that location only. The issue was discovered by the maintainer. There were no reports of the vulnerability being known to or exploited by a third party, prior to the release of the patch.", "cve_id": "CVE-2022-24840", "title": "CVE-2022-24840", "source": "cvefixes", "timestamp": "2022-06-09", "split": "val"} +{"id": "75265bfb04aa90b4a072", "text": "CVE: CVE-2022-21677\n\n[{'lang': 'en', 'value': \"Discourse is an open source discussion platform. Discourse groups can be configured with varying visibility levels for the group as well as the group members. By default, a newly created group has its visibility set to public and the group's members visibility set to public as well. However, a group's visibility and the group's members visibility can be configured such that it is restricted to logged on users, members of the group or staff users. A", "cve_id": "CVE-2022-21677", "title": "CVE-2022-21677", "source": "cvefixes", "timestamp": "2022-01-14", "split": "val"} +{"id": "8b86b30945bcddfc1976", "text": "CVE: CVE-2022-29156\n\n[{'lang': 'en', 'value': 'drivers/infiniband/ulp/rtrs/rtrs-clt.c in the Linux kernel before 5.16.12 has a double free related to rtrs_clt_dev_release.'}]\n\nFix commit: RDMA/rtrs-clt: Fix possible double free in error case\n\nCallback function rtrs_clt_dev_release() for put_device() calls kfree(clt)\nto free memory. We shouldn't call kfree(clt) again, and we can't use the\nclt after kfree too.\n\nReplace device_register() with device_initialize() and device_add() so that\ndev_set_nam", "cve_id": "CVE-2022-29156", "title": "CVE-2022-29156", "source": "cvefixes", "timestamp": "2022-04-13", "split": "val"} +{"id": "8e626e05169e331764e1", "text": "CVE: CVE-2022-0955\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/data-hub prior to 1.2.4.'}]\n\nFix commit: follow up to https://github.com/pimcore/data-hub/pull/462", "cve_id": "CVE-2022-0955", "title": "CVE-2022-0955", "source": "cvefixes", "timestamp": "2022-03-24", "split": "val"} +{"id": "d3b4e6e35dc0e951bc50", "text": "CVE: CVE-2022-1071\n\n[{'lang': 'en', 'value': 'User after free in mrb_vm_exec in GitHub repository mruby/mruby prior to 3.2.'}]\n\nFix commit: vm.c: stack may be reallocated in functions calls.\n\nProbably due to recursive VM calls via `mrb_funcall()`.", "cve_id": "CVE-2022-1071", "title": "CVE-2022-1071", "source": "cvefixes", "timestamp": "2022-03-26", "split": "val"} +{"id": "CVE-2023-29300", "text": "Adobe ColdFusion Deserialization of Untrusted Data Vulnerability\n\nAffected: Adobe ColdFusion\n\nAdobe ColdFusion contains a deserialization of untrusted data vulnerability that allows for code execution.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nRansomware: Known\n\nCWE(s): CWE-502\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-29300", "title": "Adobe ColdFusion Deserialization of Untrusted Data Vulnerability", "source": "cisa_kev", "timestamp": "2024-01-08", "split": "val"} +{"id": "0506e16e83ec5da35dbc", "text": "CVE: CVE-2022-23580\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. During shape inference, TensorFlow can allocate a large vector based on a value from a tensor controlled by the user. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: Fix abort caused by allocating a too large vector.\n\nWe need to", "cve_id": "CVE-2022-23580", "title": "CVE-2022-23580", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val"} +{"id": "93389572e09271ff43f0", "text": "CVE: CVE-2022-1383\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.8. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash.'}]\n\nFix commit: Fix oobread bug in NE parser ##crash\n\n* Reported by @cnitlrt via huntrdev\r\n* BountyID: 02b4b563-b946-4343-9092-38d1c5cd60c9\r\n* Reproducer: neoobread", "cve_id": "CVE-2022-1383", "title": "CVE-2022-1383", "source": "cvefixes", "timestamp": "2022-04-18", "split": "val"} +{"id": "c6e1e70b09e063966b7c", "text": "CVE: CVE-2022-0253\n\n[{'lang': 'en', 'value': \"livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\"}]\n\nFix commit: Do not execute angular title", "cve_id": "CVE-2022-0253", "title": "CVE-2022-0253", "source": "cvefixes", "timestamp": "2022-01-17", "split": "val"} +{"id": "CVE-2022-26318", "text": "WatchGuard Firebox and XTM Appliances Arbitrary Code Execution\n\nAffected: WatchGuard Firebox and XTM Appliances\n\nOn WatchGuard Firebox and XTM appliances, an unauthenticated user can execute arbitrary code.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-122\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-26318", "title": "WatchGuard Firebox and XTM Appliances Arbitrary Code Execution", "source": "cisa_kev", "timestamp": "2022-03-25", "split": "val"} +{"id": "CVE-2022-41040", "text": "Microsoft Exchange Server Server-Side Request Forgery Vulnerability\n\nAffected: Microsoft Exchange Server\n\nMicrosoft Exchange Server allows for server-side request forgery. Dubbed \"ProxyNotShell,\" this vulnerability is chainable with CVE-2022-41082 which allows for remote code execution.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-918\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-41040", "title": "Microsoft Exchange Server Server-Side Request Forgery Vulnerability", "source": "cisa_kev", "timestamp": "2022-09-30", "split": "val"} +{"id": "92186f07510e1f018cda", "text": "CVE: CVE-2022-0080\n\n[{'lang': 'en', 'value': 'mruby is vulnerable to Heap-based Buffer Overflow'}]\n\nFix commit: proc.c: should not reference `irep` when copying failed.\n\nIt may cause broken reference count numbers.", "cve_id": "CVE-2022-0080", "title": "CVE-2022-0080", "source": "cvefixes", "timestamp": "2022-01-02", "split": "val"} +{"id": "94e2b8ef9b6a40e61918", "text": "CVE: CVE-2022-35942\n\n[{'lang': 'en', 'value': \"Improper input validation on the `contains` LoopBack filter may allow for arbitrary SQL injection. When the extended filter property `contains` is permitted to be interpreted by the Postgres connector, it is possible to inject arbitrary SQL which may affect the confidentiality and integrity of data stored on the connected database. A patch was released in version 5.5.1. This affects users who does any of the following: - Connect to the database via", "cve_id": "CVE-2022-35942", "title": "CVE-2022-35942", "source": "cvefixes", "timestamp": "2022-08-12", "split": "val"} +{"id": "a999daef45d0a2d57ad4", "text": "CVE: CVE-2022-1927\n\n[{'lang': 'en', 'value': 'Buffer Over-read in GitHub repository vim/vim prior to 8.2.'}]\n\nFix commit: patch 8.2.5037: cursor position may be invalid after \"0;\" range\n\nProblem: Cursor position may be invalid after \"0;\" range.\nSolution: Check the cursor position when it was set by \";\" in the range.", "cve_id": "CVE-2022-1927", "title": "CVE-2022-1927", "source": "cvefixes", "timestamp": "2022-05-29", "split": "val"} +{"id": "6792667b437158980662", "text": "CVE: CVE-2022-2713\n\n[{'lang': 'en', 'value': 'Insufficient Session Expiration in GitHub repository cockpit-hq/cockpit prior to 2.2.0.'}]\n\nFix commit: Stop execution of code after redirecting", "cve_id": "CVE-2022-2713", "title": "CVE-2022-2713", "source": "cvefixes", "timestamp": "2022-08-08", "split": "val"} +{"id": "d77503b9d0aa62add798", "text": "CVE: CVE-2022-31135\n\n[{'lang': 'en', 'value': 'Akashi is an open source server implementation of the Attorney Online video game based on the Ace Attorney universe. Affected versions of Akashi are subject to a denial of service attack. An attacker can use a specially crafted evidence packet to make an illegal modification, causing a server crash. This can be used to mount a denial-of-service exploit. Users are advised to upgrade. There is no known workaround for this issue.'}]\n\nFix commit: Fix ou", "cve_id": "CVE-2022-31135", "title": "CVE-2022-31135", "source": "cvefixes", "timestamp": "2022-07-07", "split": "val"} +{"id": "526ea2758b222bade784", "text": "CVE: CVE-2022-31049\n\n[{'lang': 'en', 'value': 'TYPO3 is an open source web content management system. Prior to versions 9.5.34 ELTS, 10.4.29, and 11.5.11, user submitted content was used without being properly encoded in HTML emails sent to users. The actually affected components were mail clients used to view those messages. TYPO3 versions 9.5.34 ELTS, 10.4.29, and 11.5.11 contain a fix for the problem.'}]\n\nFix commit: [SECURITY] Avoid HTML injection in password recovery mail\n\nThe `receiverName", "cve_id": "CVE-2022-31049", "title": "CVE-2022-31049", "source": "cvefixes", "timestamp": "2022-06-14", "split": "val"} +{"id": "c35ef8243edc7a4eb6dc", "text": "CVE: CVE-2022-32323\n\n[{'lang': 'en', 'value': 'AutoTrace v0.40.0 was discovered to contain a heap overflow via the ReadImage function at input-bmp.c:660.'}]\n\nFix commit: Merge pull request #72 from lemenkov/misleading_indentation\n\nMisleading indentation", "cve_id": "CVE-2022-32323", "title": "CVE-2022-32323", "source": "cvefixes", "timestamp": "2022-07-14", "split": "val"} +{"id": "96df407612c73f9133ed", "text": "CVE: CVE-2022-30708\n\n[{'lang': 'en', 'value': 'Webmin through 1.991, when the Authentic theme is used, allows remote code execution when a user has been manually created (i.e., not created in Virtualmin or Cloudmin). This occurs because settings-editor_write.cgi does not properly restrict the file parameter.'}]\n\nFix commit: Factor out check for root-ish user into a separate function https://github.com/webmin/webmin/issues/1635", "cve_id": "CVE-2022-30708", "title": "CVE-2022-30708", "source": "cvefixes", "timestamp": "2022-05-15", "split": "val"} +{"id": "1a2b85256945d7d19b66", "text": "[Business Logic Errors] CVE-2022-27782: TLS and SSH connection too eager reuse\n\n## Summary:\nCurl fails to consider some security related options when reusing TLS connections. For example:\n- CURLOPT_SSL_OPTIONS\n- CURLOPT_PROXY_SSL_OPTIONS\n- CURLOPT_CRLFILE\n- CURLOPT_PROXY_CRLFILE\n\nAs a result for example TLS connection with lower security (`CURLSSLOPT_ALLOW_BEAST`,` CURLSSLOPT_NO_REVOKE`) connection reused when it should no longer be. Also connection that has been authenticated perviously with `", "cve_id": "CVE-2022-27782", "title": "CVE-2022-27782: TLS and SSH connection too eager reuse (Business Logic Errors)", "source": "hackerone", "timestamp": "2022-05-11", "split": "val"} +{"id": "b1bb57d7b551e1a3e62e", "text": "CVE: CVE-2022-23612\n\n[{'lang': 'en', 'value': \"OpenMRS is a patient-based medical record system focusing on giving providers a free customizable electronic medical record system. Affected versions are subject to arbitrary file exfiltration due to failure to sanitize request when satisfying GET requests for `/images` & `/initfilter/scripts`. This can allow an attacker to access any file on a system running OpenMRS that is accessible to the user id OpenMRS is running under. Affected implementation", "cve_id": "CVE-2022-23612", "title": "CVE-2022-23612", "source": "cvefixes", "timestamp": "2022-02-22", "split": "val"} +{"id": "CVE-2023-24880", "text": "Microsoft Windows SmartScreen Security Feature Bypass Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows SmartScreen contains a security feature bypass vulnerability that could allow an attacker to evade Mark of the Web (MOTW) defenses via a specially crafted malicious file.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-863\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-24880", "title": "Microsoft Windows SmartScreen Security Feature Bypass Vulnerability", "source": "cisa_kev", "timestamp": "2023-03-14", "split": "val"} +{"id": "CVE-2022-37042", "text": "Synacor Zimbra Collaboration Suite (ZCS) Authentication Bypass Vulnerability\n\nAffected: Synacor Zimbra Collaboration Suite (ZCS)\n\nSynacor Zimbra Collaboration Suite (ZCS) contains an authentication bypass vulnerability in MailboxImportServlet. This vulnerability was chained with CVE-2022-27925 which allows for unauthenticated remote code execution.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-23\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-37042", "title": "Synacor Zimbra Collaboration Suite (ZCS) Authentication Bypass Vulnerability", "source": "cisa_kev", "timestamp": "2022-08-11", "split": "val"} +{"id": "df914e863d07439f5c54", "text": "CVE: CVE-2022-0087\n\n[{'lang': 'en', 'value': \"keystone is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\"}]\n\nFix commit: Do not add `from` parameter to URL on signin page when it matches the default redirect\n\nAdditionally extract redirect logic for ease of reuse", "cve_id": "CVE-2022-0087", "title": "CVE-2022-0087", "source": "cvefixes", "timestamp": "2022-01-12", "split": "val"} +{"id": "37c14571ede2efc355eb", "text": "CVE: CVE-2022-23641\n\n[{'lang': 'en', 'value': 'Discourse is an open source discussion platform. In versions prior to 2.8.1 in the `stable` branch, 2.9.0.beta2 in the `beta` branch, and 2.9.0.beta2 in the `tests-passed` branch, users can trigger a Denial of Service attack by posting a streaming URL. Parsing Oneboxes in the background job trigger an infinite loop, which cause memory leaks. This issue is patched in version 2.8.1 of the `stable` branch, 2.9.0.beta2 of the `beta` branch, and 2.9.0.be", "cve_id": "CVE-2022-23641", "title": "CVE-2022-23641", "source": "cvefixes", "timestamp": "2022-02-15", "split": "val"} +{"id": "9858541d5eea1acaa2cd", "text": "CVE: CVE-2022-24823\n\n[{'lang': 'en', 'value': \"Netty is an open-source, asynchronous event-driven network application framework. The package `io.netty:netty-codec-http` prior to version 4.1.77.Final contains an insufficient fix for CVE-2021-21290. When Netty's multipart decoders are used local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk is enabled. This only impacts applications running on Java version 6 and lower. Additional", "cve_id": "CVE-2022-24823", "title": "CVE-2022-24823", "source": "cvefixes", "timestamp": "2022-05-06", "split": "val"} +{"id": "a058d1005e26b51b27ed", "text": "CVE: CVE-2022-0678\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Reflected in Packagist microweber/microweber prior to 1.2.11.'}]\n\nFix commit: Update UrlManager.php", "cve_id": "CVE-2022-0678", "title": "CVE-2022-0678", "source": "cvefixes", "timestamp": "2022-02-19", "split": "val"} +{"id": "bbeb0fb1fe4930a062bd", "text": "CVE: CVE-2022-31032\n\n[{'lang': 'en', 'value': 'Tuleap is a Free & Open Source Suite to improve management of software developments and collaboration. In versions prior to 13.9.99.58 authorizations are not properly verified when creating projects or trackers from projects marked as templates. Users can get access to information in those template projects because the permissions model is not properly enforced. Users are advised to upgrade. There are no known workarounds for this issue.'}]\n\nFix com", "cve_id": "CVE-2022-31032", "title": "CVE-2022-31032", "source": "cvefixes", "timestamp": "2022-06-29", "split": "val"} +{"id": "CVE-2023-23376", "text": "Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability\n\nAffected: Microsoft Windows\n\nMicrosoft Windows Common Log File System (CLFS) driver contains an unspecified vulnerability that allows for privilege escalation.\n\nRequired Action: Apply updates per vendor instructions.\n\nRansomware: Known\n\nCWE(s): CWE-122\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-23376", "title": "Microsoft Windows Common Log File System (CLFS) Driver Privilege Escalation Vulnerability", "source": "cisa_kev", "timestamp": "2023-02-14", "split": "val"} +{"id": "25a4d5a8b77c1314ea14", "text": "[Cross-site Scripting (XSS) - Reflected] CVE-2023-29489 XSS in cpanel at [www.███] - Securado, Oman\n\n**Description:**\nThere is a cross-site scripting vulnerability found on cpanel application hosted on the website. Cpanel is not updated because auto update feature is disabled.\n\n## Impact\n\nAn attacker can steal cookies or hijack browser session.\n\n## System Host(s)\nwww.██████\n\n## Affected Product(s) and Version(s)\n\n\n## CVE Numbers\n\n\n## Steps to Reproduce\n1. Go to `http://www.████/cpanelwebcall/%3C", "cve_id": "CVE-2023-29489", "title": "CVE-2023-29489 XSS in cpanel at [www.███] - Securado, Oman (Cross-site Scripting (XSS) - Reflected)", "source": "hackerone", "timestamp": "2023-06-09", "split": "val"} +{"id": "d7edfd23f333d782dcb2", "text": "[Command Injection - Generic] CVE-2022-24288: Apache Airflow: TWO RCEs in example DAGs\n\nIn Apache Airflow, prior to version 2.2.4, In DAG script of airflow , there is two command injection vulnerability (RCE) in the some scripts, which an attacker can execute arbitrary commands on the system. The impact is even greater when airflow is configured for unauthenticated access. These two RCEs are assigned the same CVE number(CVE-2022-24288)\n\n## Impact\n\n#RCE one: example_passing_params_via_test_comma", "cve_id": "CVE-2022-24288", "title": "CVE-2022-24288: Apache Airflow: TWO RCEs in example DAGs (Command Injection - Generic)", "source": "hackerone", "timestamp": "2022-04-01", "split": "val"} +{"id": "4a2bd3e8a7b8bac139ce", "text": "CVE: CVE-2022-31081\n\n[{'lang': 'en', 'value': \"HTTP::Daemon is a simple http server class written in perl. Versions prior to 6.15 are subject to a vulnerability which could potentially be exploited to gain privileged access to APIs or poison intermediate caches. It is uncertain how large the risks are, most Perl based applications are served on top of Nginx or Apache, not on the `HTTP::Daemon`. This library is commonly used for local development and tests. Users are advised to update to resolve", "cve_id": "CVE-2022-31081", "title": "CVE-2022-31081", "source": "cvefixes", "timestamp": "2022-06-27", "split": "val"} +{"id": "501eb3a5ccb91bcbcd6a", "text": "CVE: CVE-2022-29195\n\n[{'lang': 'en', 'value': 'TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.StagePeek` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. The code assumes `index` is a scalar but there is no validation for this before accessing its value. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for t", "cve_id": "CVE-2022-29195", "title": "CVE-2022-29195", "source": "cvefixes", "timestamp": "2022-05-20", "split": "val"} +{"id": "0c7cdeb7e39d74b5813f", "text": "CVE: CVE-2022-0705\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.4.0.'}]\n\nFix commit: [Admin] Security - Add handler to enable Content Security Policy (#11447)\n\n* [Admin] Security - Add handler to enable Content Security Policy\r\n\r\n* [Admin] Security - Add handler to enable Content Security Policy\r\n\r\n* [Admin] Security - Add handler to enable Content Security Policy - fix document preview\r\n\r\n* [Admin] Security - Add handler to enab", "cve_id": "CVE-2022-0705", "title": "CVE-2022-0705", "source": "cvefixes", "timestamp": "2022-03-16", "split": "val"} +{"id": "95da08360841dbf9a2a6", "text": "CVE: CVE-2022-29221\n\n[{'lang': 'en', 'value': 'Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.45 and 4.1.1, template authors could inject php code by choosing a malicious {block} name or {include} file name. Sites that cannot fully trust template authors should upgrade to versions 3.1.45 or 4.1.1 to receive a patch for this issue. There are currently no known workarounds.'}]\n\nFix commit: Merge branch 'secu", "cve_id": "CVE-2022-29221", "title": "CVE-2022-29221", "source": "cvefixes", "timestamp": "2022-05-24", "split": "val"} +{"id": "f319fc6305e72496c0ab", "text": "CVE: CVE-2022-0128\n\n[{'lang': 'en', 'value': 'vim is vulnerable to Out-of-bounds Read'}]\n\nFix commit: patch 8.2.4009: reading one byte beyond the end of the line\n\nProblem: Reading one byte beyond the end of the line.\nSolution: Check for NUL byte first.", "cve_id": "CVE-2022-0128", "title": "CVE-2022-0128", "source": "cvefixes", "timestamp": "2022-01-06", "split": "val"} +{"id": "cac1e011af4b93d26006", "text": "CVE: CVE-2022-0350\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository vanessa219/vditor prior to 3.8.13.'}]\n\nFix commit: :arrow_up:", "cve_id": "CVE-2022-0350", "title": "CVE-2022-0350", "source": "cvefixes", "timestamp": "2022-03-31", "split": "val"} +{"id": "CVE-2023-20887", "text": "Vmware Aria Operations for Networks Command Injection Vulnerability\n\nAffected: VMware Aria Operations for Networks\n\nVMware Aria Operations for Networks (formerly vRealize Network Insight) contains a command injection vulnerability that allows a malicious actor with network access to perform an attack resulting in remote code execution.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-77\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-20887", "title": "Vmware Aria Operations for Networks Command Injection Vulnerability", "source": "cisa_kev", "timestamp": "2023-06-22", "split": "val"} +{"id": "2bc2a505191d5204ec36", "text": "CVE: CVE-2022-1728\n\n[{'lang': 'en', 'value': 'Allowing long password leads to denial of service in polonel/trudesk in GitHub repository polonel/trudesk prior to 1.2.2. This vulnerability can be abused by doing a DDoS attack for which genuine users will not able to access resources/applications.'}]\n\nFix commit: fix(account): security fix", "cve_id": "CVE-2022-1728", "title": "CVE-2022-1728", "source": "cvefixes", "timestamp": "2022-05-16", "split": "val"} +{"id": "1353d4ec4a75fd22d39a", "text": "CVE: CVE-2022-26691\n\n[{'lang': 'en', 'value': 'A logic issue was addressed with improved state management. This issue is fixed in Security Update 2022-003 Catalina, macOS Monterey 12.3, macOS Big Sur 11.6.5. An application may be able to gain elevated privileges.'}]\n\nFix commit: scheduler/cert.c: Fix string comparison (fixes CVE-2022-26691)\n\nThe previous algorithm didn't expect the strings can have a different\nlength, so one string can be a substring of the other and such substring\nwas reported", "cve_id": "CVE-2022-26691", "title": "CVE-2022-26691", "source": "cvefixes", "timestamp": "2022-05-26", "split": "val"} +{"id": "d6027174ef2e2111dfc7", "text": "[Uncontrolled Resource Consumption] ReDoS( Ruby, Time)\n\nI reported at https://hackerone.com/reports/1485501\n\nhttps://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/\n> The Time parser mishandles invalid strings that have specific characters. It causes an increase in execution time for parsing strings to Time objects.\n> A ReDoS issue was discovered in the Time gem 0.1.0 and 0.2.1 and Time library of Ruby 2.7.7.\n\n## Impact\n\nReDoS occurs when `Time.rfc2822` accepts user input.\n\nIn", "cve_id": "CVE-2023-28756", "title": "ReDoS( Ruby, Time) (Uncontrolled Resource Consumption)", "source": "hackerone", "timestamp": "2023-04-26", "split": "val"} +{"id": "54b03090eb234464d274", "text": "CVE: CVE-2022-29527\n\n[{'lang': 'en', 'value': 'Amazon AWS amazon-ssm-agent before 3.1.1208.0 creates a world-writable sudoers file, which allows local attackers to inject Sudo rules and escalate privileges to root. This occurs in certain situations involving a race condition.'}]\n\nFix commit: Create ssm-agent-users sudoer file with constrained file permission\n\ncr: https://code.amazon.com/reviews/CR-67315538", "cve_id": "CVE-2022-29527", "title": "CVE-2022-29527", "source": "cvefixes", "timestamp": "2022-04-20", "split": "val"} +{"id": "fbfe0954a3eaa3d87242", "text": "CVE: CVE-2022-24958\n\n[{'lang': 'en', 'value': 'drivers/usb/gadget/legacy/inode.c in the Linux kernel through 5.16.8 mishandles dev->buf release.'}]\n\nFix commit: usb: gadget: clear related members when goto fail\n\ndev->config and dev->hs_config and dev->dev need to be cleaned if\ndev_config fails to avoid UAF.\n\nAcked-by: Alan Stern \nSigned-off-by: Hangyu Hua \nLink: https://lore.kernel.org/r/20211231172138.7993-3-hbh25y@gmail.com\nSigned-off-by: Greg Kroah", "cve_id": "CVE-2022-24958", "title": "CVE-2022-24958", "source": "cvefixes", "timestamp": "2022-02-11", "split": "val"} +{"id": "e4bdca099c7d27e85d5f", "text": "CVE: CVE-2022-2288\n\n[{'lang': 'en', 'value': 'Out-of-bounds Write in GitHub repository vim/vim prior to 9.0.'}]\n\nFix commit: patch 9.0.0025: accessing beyond allocated memory with the cmdline window\n\nProblem: Accessing beyond allocated memory when using the cmdline window in\n Ex mode.\nSolution: Use \"*\" instead of \"'<,'>\" for Visual mode.", "cve_id": "CVE-2022-2288", "title": "CVE-2022-2288", "source": "cvefixes", "timestamp": "2022-07-03", "split": "val"} +{"id": "34970a152d76c7a6493f", "text": "CVE: CVE-2022-31160\n\n[{'lang': 'en', 'value': 'jQuery UI is a curated set of user interface interactions, effects, widgets, and themes built on top of jQuery. Versions prior to 1.13.2 are potentially vulnerable to cross-site scripting. Initializing a checkboxradio widget on an input enclosed within a label makes that parent label contents considered as the input label. Calling `.checkboxradio( \"refresh\" )` on such a widget and the initial HTML contained encoded HTML entities will make them erron", "cve_id": "CVE-2022-31160", "title": "CVE-2022-31160", "source": "cvefixes", "timestamp": "2022-07-20", "split": "val"} +{"id": "a8a5374dd05369c06cb3", "text": "CVE: CVE-2022-28961\n\n[{'lang': 'en', 'value': 'Spip Web Framework v3.1.13 and below was discovered to contain multiple SQL injection vulnerabilities at /ecrire via the lier_trad and where parameters.'}]\n\nFix commit: Divers petites sanitization et une balise manquante #4494", "cve_id": "CVE-2022-28961", "title": "CVE-2022-28961", "source": "cvefixes", "timestamp": "2022-05-19", "split": "val"} +{"id": "e3a75ffc7f87e0b9f13c", "text": "CVE: CVE-2022-21642\n\n[{'lang': 'en', 'value': 'Discourse is an open source platform for community discussion. In affected versions when composing a message from topic the composer user suggestions reveals whisper participants. The issue has been patched in stable version 2.7.13 and beta version 2.8.0.beta11. There is no workaround for this issue and users are advised to upgrade.'}]\n\nFix commit: SECURITY: only show user suggestions with regular post (#15436)", "cve_id": "CVE-2022-21642", "title": "CVE-2022-21642", "source": "cvefixes", "timestamp": "2022-01-05", "split": "val"} +{"id": "3134720f7014f25e4840", "text": "CVE: CVE-2022-21159\n\n[{'lang': 'en', 'value': 'A denial of service vulnerability exists in the parseNormalModeParameters functionality of MZ Automation GmbH libiec61850 1.5.0. A specially-crafted series of network requests can lead to denial of service. An attacker can send a sequence of malformed iec61850 messages to trigger this vulnerability.'}]\n\nFix commit: - fixed - Bug in presentation layer parser can cause infinite loop (LIB61850-302)", "cve_id": "CVE-2022-21159", "title": "CVE-2022-21159", "source": "cvefixes", "timestamp": "2022-04-15", "split": "val"} +{"id": "2e26ca9f602f231d851d", "text": "CVE: CVE-2022-33146\n\n[{'lang': 'en', 'value': 'Open redirect vulnerability in web2py versions prior to 2.22.5 allows a remote attacker to redirect a user to an arbitrary web site and conduct a phishing attack by having a user to access a specially crafted URL.'}]\n\nFix commit: improved open redirect prevention", "cve_id": "CVE-2022-33146", "title": "CVE-2022-33146", "source": "cvefixes", "timestamp": "2022-06-27", "split": "val"} +{"id": "99fc406af38d10ace9f5", "text": "CVE: CVE-2022-22117\n\n[{'lang': 'en', 'value': 'In Directus, versions 9.0.0-alpha.4 through 9.4.1 allow unrestricted file upload of .html files in the media upload functionality, which leads to Cross-Site Scripting vulnerability. A low privileged attacker can upload a crafted HTML file as a profile avatar, and when an admin or another user opens it, the XSS payload gets triggered.'}]\n\nFix commit: Add Content-Security-Policy header by default (#10776)", "cve_id": "CVE-2022-22117", "title": "CVE-2022-22117", "source": "cvefixes", "timestamp": "2022-01-10", "split": "val"} +{"id": "4920220dbeaf9b63a9a5", "text": "CVE: CVE-2022-23566\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. TensorFlow is vulnerable to a heap OOB write in `Grappler`. The `set_output` function writes to an array at the specified index. Hence, this gives a malicious user a write primitive. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commi", "cve_id": "CVE-2022-23566", "title": "CVE-2022-23566", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val"} +{"id": "7aaa95f2da32694a9bec", "text": "CVE: CVE-2022-21697\n\n[{'lang': 'en', 'value': 'Jupyter Server Proxy is a Jupyter notebook server extension to proxy web services. Versions of Jupyter Server Proxy prior to 3.2.1 are vulnerable to Server-Side Request Forgery (SSRF). Any user deploying Jupyter Server or Notebook with jupyter-proxy-server extension enabled is affected. A lack of input validation allows authenticated clients to proxy requests to other hosts, bypassing the `allowed_hosts` check. Because authentication is required, wh", "cve_id": "CVE-2022-21697", "title": "CVE-2022-21697", "source": "cvefixes", "timestamp": "2022-01-25", "split": "val"} +{"id": "4b41e63630cc53f83811", "text": "CVE: CVE-2022-28960\n\n[{'lang': 'en', 'value': 'A PHP injection vulnerability in Spip before v3.2.8 allows attackers to execute arbitrary PHP code via the _oups parameter at /ecrire.'}]\n\nFix commit: _oups donc (aka un base64_encode ca fait pas de mal)", "cve_id": "CVE-2022-28960", "title": "CVE-2022-28960", "source": "cvefixes", "timestamp": "2022-05-19", "split": "val"} +{"id": "f0af327b85eeba0d7dd1", "text": "CVE: CVE-2022-0714\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.4436.'}]\n\nFix commit: patch 8.2.4436: crash with weird 'vartabstop' value\n\nProblem: Crash with weird 'vartabstop' value.\nSolution: Check for running into the end of the line.", "cve_id": "CVE-2022-0714", "title": "CVE-2022-0714", "source": "cvefixes", "timestamp": "2022-02-22", "split": "val"} +{"id": "cacf44032b3acfdee83b", "text": "[Improper Access Control - Generic] Adobe ColdFusion Access Control Bypass - CVE-2023-38205\n\n**Description:**\nHi team,\nThe subdomain https://████ is with adobe ColdFusion vulnerable with CVE-2023-38205.\nThis vulnerability is a bypass path created for CVE-2023-29298.\n\n## References\n\nhttps://www.rapid7.com/blog/post/2023/07/19/cve-2023-38205-adobe-coldfusion-access-control-bypass-fixed/\n\n## Impact\n\nIf an attacker accesses a URL path of /hax/..CFIDE/wizards/common/utils.cfc the access control can b", "cve_id": "CVE-2023-29298", "title": "Adobe ColdFusion Access Control Bypass - CVE-2023-38205 (Improper Access Control - Generic)", "source": "hackerone", "timestamp": "2023-12-21", "split": "val"} +{"id": "CVE-2023-46748", "text": "F5 BIG-IP Configuration Utility SQL Injection Vulnerability\n\nAffected: F5 BIG-IP Configuration Utility\n\nF5 BIG-IP Configuration utility contains an SQL injection vulnerability that may allow an authenticated attacker with network access through the BIG-IP management port and/or self IP addresses to execute system commands. This vulnerability can be used in conjunction with CVE-2023-46747.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations", "cve_id": "CVE-2023-46748", "title": "F5 BIG-IP Configuration Utility SQL Injection Vulnerability", "source": "cisa_kev", "timestamp": "2023-10-31", "split": "val"} +{"id": "6357a6b81f8f91083dc2", "text": "CVE: CVE-2022-34299\n\n[{'lang': 'en', 'value': 'There is a heap-based buffer over-read in libdwarf 0.4.0. This issue is related to dwarf_global_formref_b.'}]\n\nFix commit: Fixes old bug(which could result in Denial of Service)\ndue to a missing check before reading the 8 bytes of a DW_FORM_ref_sig8.\nDW202206-001\n\tmodified: src/lib/libdwarf/dwarf_form.c", "cve_id": "CVE-2022-34299", "title": "CVE-2022-34299", "source": "cvefixes", "timestamp": "2022-06-23", "split": "val"} +{"id": "8ff660b39fb726b7023a", "text": "CVE: CVE-2022-24832\n\n[{'lang': 'en', 'value': 'GoCD is an open source a continuous delivery server. The bundled gocd-ldap-authentication-plugin included with the GoCD Server fails to correctly escape special characters when using the username to construct LDAP queries. While this does not directly allow arbitrary LDAP data exfiltration, it can allow an existing LDAP-authenticated GoCD user with malicious intent to construct and execute malicious queries, allowing them to deduce facts about other", "cve_id": "CVE-2022-24832", "title": "CVE-2022-24832", "source": "cvefixes", "timestamp": "2022-04-11", "split": "val"} +{"id": "1f439fcf789dfc679b79", "text": "CVE: CVE-2022-23557\n\n[{'lang': 'en', 'value': 'Tensorflow is an Open Source Machine Learning Framework. An attacker can craft a TFLite model that would trigger a division by zero in `BiasAndClamp` implementation. There is no check that the `bias_size` is non zero. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.'}]\n\nFix commit: [lite] Add check fo", "cve_id": "CVE-2022-23557", "title": "CVE-2022-23557", "source": "cvefixes", "timestamp": "2022-02-04", "split": "val"} +{"id": "7dd4f1b96bdf3eaef956", "text": "CVE: CVE-2022-0557\n\n[{'lang': 'en', 'value': 'OS Command Injection in Packagist microweber/microweber prior to 1.2.11.'}]\n\nFix commit: Update plupload.php", "cve_id": "CVE-2022-0557", "title": "CVE-2022-0557", "source": "cvefixes", "timestamp": "2022-02-11", "split": "val"} +{"id": "CVE-2022-23134", "text": "Zabbix Frontend Improper Access Control Vulnerability\n\nAffected: Zabbix Frontend\n\nMalicious actors can pass step checks and potentially change the configuration of Zabbix Frontend.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-284\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-23134", "title": "Zabbix Frontend Improper Access Control Vulnerability", "source": "cisa_kev", "timestamp": "2022-02-22", "split": "val"} +{"id": "3a97add07185796fba06", "text": "CVE: CVE-2022-0197\n\n[{'lang': 'en', 'value': 'phoronix-test-suite is vulnerable to Cross-Site Request Forgery (CSRF)'}]\n\nFix commit: phoromatic: Some additional input sanitization and starting on some CSRF token handling", "cve_id": "CVE-2022-0197", "title": "CVE-2022-0197", "source": "cvefixes", "timestamp": "2022-01-13", "split": "val"} +{"id": "45ffb9ddc49e383045f9", "text": "CVE: CVE-2022-1586\n\n[{'lang': 'en', 'value': 'An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.'}]\n\nFix commit: Fix incorrect value reading in JIT.", "cve_id": "CVE-2022-1586", "title": "CVE-2022-1586", "source": "cvefixes", "timestamp": "2022-05-16", "split": "val"} +{"id": "cc35df02f794d3ed8da0", "text": "CVE: CVE-2022-0894\n\n[{'lang': 'en', 'value': 'Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.4.0.'}]\n\nFix commit: [Admin] Security - Add handler to enable Content Security Policy (#11447)\n\n* [Admin] Security - Add handler to enable Content Security Policy\r\n\r\n* [Admin] Security - Add handler to enable Content Security Policy\r\n\r\n* [Admin] Security - Add handler to enable Content Security Policy - fix document preview\r\n\r\n* [Admin] Security - Add handler to enab", "cve_id": "CVE-2022-0894", "title": "CVE-2022-0894", "source": "cvefixes", "timestamp": "2022-03-15", "split": "val"} +{"id": "bc508ef2ce1fbc21b4a8", "text": "[HTTP Request Smuggling] CVE-2022-32215 - HTTP Request Smuggling Due to Incorrect Parsing of Multi-line Transfer-Encoding\n\nOriginal Report: https://hackerone.com/reports/1501679\n\n## Impact\n\nDepending on the specific web application, HRS can lead to cache poisoning, bypassing of security layers, stealing of credentials and so on.", "cve_id": "CVE-2022-32215", "title": "CVE-2022-32215 - HTTP Request Smuggling Due to Incorrect Parsing of Multi-line Transfer-Encoding (HTTP Request Smuggling)", "source": "hackerone", "timestamp": "2022-07-22", "split": "val"} +{"id": "CVE-2022-24706", "text": "Apache CouchDB Insecure Default Initialization of Resource Vulnerability\n\nAffected: Apache CouchDB\n\nApache CouchDB contains an insecure default initialization of resource vulnerability which can allow an attacker to escalate to administrative privileges.\n\nRequired Action: Apply updates per vendor instructions.\n\nCWE(s): CWE-1188\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2022-24706", "title": "Apache CouchDB Insecure Default Initialization of Resource Vulnerability", "source": "cisa_kev", "timestamp": "2022-08-25", "split": "val"} +{"id": "9fb93cfac1fe8eca59f1", "text": "CVE: CVE-2022-2522\n\n[{'lang': 'en', 'value': 'Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0061.'}]\n\nFix commit: patch 9.0.0060: accessing uninitialized memory when completing long line\n\nProblem: Accessing uninitialized memory when completing long line.\nSolution: Terminate string with NUL.", "cve_id": "CVE-2022-2522", "title": "CVE-2022-2522", "source": "cvefixes", "timestamp": "2022-07-25", "split": "val"} +{"id": "CVE-2023-28229", "text": "Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability\n\nAffected: Microsoft Windows CNG Key Isolation Service\n\nMicrosoft Windows Cryptographic Next Generation (CNG) Key Isolation Service contains an unspecified vulnerability that allows an attacker to gain specific limited SYSTEM privileges.\n\nRequired Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-591\n\n[Source: CISA Known Exploited Vulnerabi", "cve_id": "CVE-2023-28229", "title": "Microsoft Windows CNG Key Isolation Service Privilege Escalation Vulnerability", "source": "cisa_kev", "timestamp": "2023-10-04", "split": "val"} +{"id": "446a249631c6966d923f", "text": "CVE: CVE-2022-0950\n\n[{'lang': 'en', 'value': 'Unrestricted Upload of File with Dangerous Type in GitHub repository star7th/showdoc prior to 2.10.4.'}]\n\nFix commit: file upload bug", "cve_id": "CVE-2022-0950", "title": "CVE-2022-0950", "source": "cvefixes", "timestamp": "2022-03-15", "split": "val"} +{"id": "CVE-2023-41974", "text": "Apple iOS and iPadOS Use-After-Free Vulnerability\n\nAffected: Apple iOS and iPadOS\n\nApple iOS and iPadOS contain a use-after-free vulnerability. An app may be able to execute arbitrary code with kernel privileges.\n\nRequired Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\n\nCWE(s): CWE-416\n\n[Source: CISA Known Exploited Vulnerabilities Catalog]", "cve_id": "CVE-2023-41974", "title": "Apple iOS and iPadOS Use-After-Free Vulnerability", "source": "cisa_kev", "timestamp": "2026-03-05", "split": "val"} +{"id": "c71ad44499c761e53672", "text": "CVE: CVE-2022-30767\n\n[{'lang': 'en', 'value': 'nfs_lookup_reply in net/nfs.c in Das U-Boot through 2022.04 (and through 2022.07-rc2) has an unbounded memcpy with a failed length check, leading to a buffer overflow. NOTE: this issue exists because of an incorrect fix for CVE-2019-14196.'}]\n\nFix commit: CVE-2019-14196: nfs: fix unbounded memcpy with a failed length check at nfs_lookup_reply\n\nThis patch adds a check to rpc_pkt.u.reply.data at nfs_lookup_reply.\n\nSigned-off-by: Cheng Liu