cve
stringlengths 13
16
| published_date
stringdate 2000-05-10 04:00:00
2023-12-12 17:15:00
| desc
stringlengths 23
3.31k
| commit_urls
listlengths 1
38
| commits
listlengths 1
25
|
---|---|---|---|---|
CVE-2022-27815
|
2022-03-30T00:15Z
|
SWHKD 1.1.5 unsafely uses the /tmp/swhkd.pid pathname. There can be an information leak or denial of service.
|
[
"https://github.com/waycrate/swhkd/commit/e661a4940df78fbb7b52c622ac4ae6a3a7f7d8aa"
] |
[
"e661a4940df78fbb7b52c622ac4ae6a3a7f7d8aa"
] |
CVE-2022-27816
|
2022-03-30T02:15Z
|
SWHKD 1.1.5 unsafely uses the /tmp/swhks.pid pathname. There can be data loss or a denial of service.
|
[
"https://github.com/waycrate/swhkd/commit/0b620a09605afb815c6d8d8953bbb7a10a8c0575"
] |
[
"0b620a09605afb815c6d8d8953bbb7a10a8c0575"
] |
CVE-2022-27818
|
2022-04-07T02:15Z
|
SWHKD 1.1.5 unsafely uses the /tmp/swhkd.sock pathname. There can be an information leak or denial of service.
|
[
"https://github.com/waycrate/swhkd/commit/f70b99dd575fab79d8a942111a6980431f006818"
] |
[
"f70b99dd575fab79d8a942111a6980431f006818"
] |
CVE-2022-27819
|
2022-04-07T02:15Z
|
SWHKD 1.1.5 allows unsafe parsing via the -c option. An information leak might occur but there is a simple denial of service (memory exhaustion) upon an attempt to parse a large or infinite file (such as a block or character device).
|
[
"https://github.com/waycrate/swhkd/commit/b4e6dc76f4845ab03104187a42ac6d1bbc1e0021"
] |
[
"b4e6dc76f4845ab03104187a42ac6d1bbc1e0021"
] |
CVE-2022-27950
|
2022-03-28T04:15Z
|
In drivers/hid/hid-elo.c in the Linux kernel before 5.16.11, a memory leak exists for a certain hid_parse error condition.
|
[
"https://github.com/torvalds/linux/commit/817b8b9c5396d2b2d92311b46719aad5d3339dbe"
] |
[
"817b8b9c5396d2b2d92311b46719aad5d3339dbe"
] |
CVE-2022-28049
|
2022-04-15T14:15Z
|
NGINX NJS 0.7.2 was discovered to contain a NULL pointer dereference via the component njs_vmcode_array at /src/njs_vmcode.c.
|
[
"https://github.com/nginx/njs/commit/f65981b0b8fcf02d69a40bc934803c25c9f607ab"
] |
[
"f65981b0b8fcf02d69a40bc934803c25c9f607ab"
] |
CVE-2022-28055
|
2022-05-04T03:15Z
|
Fusionpbx v4.4 and below contains a command injection vulnerability via the download email logs function.
|
[
"https://github.com/fusionpbx/fusionpbx/commit/4e260b170e17705c4c9ccf787be7711b63a40868"
] |
[
"4e260b170e17705c4c9ccf787be7711b63a40868"
] |
CVE-2022-28085
|
2022-04-27T03:15Z
|
A flaw was found in htmldoc commit 31f7804. A heap buffer overflow in the function pdf_write_names in ps-pdf.cxx may lead to arbitrary code execution and Denial of Service (DoS).
|
[
"https://github.com/michaelrsweet/htmldoc/commit/46c8ec2b9bccb8ccabff52d998c5eee77a228348"
] |
[
"46c8ec2b9bccb8ccabff52d998c5eee77a228348"
] |
CVE-2022-28356
|
2022-04-02T21:15Z
|
In the Linux kernel before 5.17.1, a refcount leak bug was found in net/llc/af_llc.c.
|
[
"https://github.com/torvalds/linux/commit/764f4eb6846f5475f1244767d24d25dd86528a4a"
] |
[
"764f4eb6846f5475f1244767d24d25dd86528a4a"
] |
CVE-2022-28367
|
2022-04-21T23:15Z
|
OWASP AntiSamy before 1.6.6 allows XSS via HTML tag smuggling on STYLE content with crafted input. The output serializer does not properly encode the supposed Cascading Style Sheets (CSS) content.
|
[
"https://github.com/nahsra/antisamy/commit/0199e7e194dba5e7d7197703f43ebe22401e61ae",
"github.com/nahsra/antisamy/commit/32e273507da0e964b58c50fd8a4c94c9d9363af0"
] |
[
"0199e7e194dba5e7d7197703f43ebe22401e61ae",
"32e273507da0e964b58c50fd8a4c94c9d9363af0"
] |
CVE-2022-28378
|
2022-04-03T18:15Z
|
Craft CMS before 3.7.29 allows XSS.
|
[
"https://github.com/craftcms/cms/commit/7ca2b2d2ccecfb524525afc8ceac6f6e44f84b88"
] |
[
"7ca2b2d2ccecfb524525afc8ceac6f6e44f84b88"
] |
CVE-2022-28388
|
2022-04-03T21:15Z
|
usb_8dev_start_xmit in drivers/net/can/usb/usb_8dev.c in the Linux kernel through 5.17.1 has a double free.
|
[
"https://github.com/torvalds/linux/commit/3d3925ff6433f98992685a9679613a2cc97f3ce2"
] |
[
"3d3925ff6433f98992685a9679613a2cc97f3ce2"
] |
CVE-2022-28389
|
2022-04-03T21:15Z
|
mcba_usb_start_xmit in drivers/net/can/usb/mcba_usb.c in the Linux kernel through 5.17.1 has a double free.
|
[
"https://github.com/torvalds/linux/commit/04c9b00ba83594a29813d6b1fb8fdc93a3915174"
] |
[
"04c9b00ba83594a29813d6b1fb8fdc93a3915174"
] |
CVE-2022-28390
|
2022-04-03T21:15Z
|
ems_usb_start_xmit in drivers/net/can/usb/ems_usb.c in the Linux kernel through 5.17.1 has a double free.
|
[
"https://github.com/torvalds/linux/commit/c70222752228a62135cee3409dccefd494a24646"
] |
[
"c70222752228a62135cee3409dccefd494a24646"
] |
CVE-2022-28463
|
2022-05-08T23:15Z
|
ImageMagick 7.1.0-27 is vulnerable to Buffer Overflow.
|
[
"https://github.com/ImageMagick/ImageMagick/commit/ca3654ebf7a439dc736f56f083c9aa98e4464b7f",
"https://github.com/ImageMagick/ImageMagick6/commit/e6ea5876e0228165ee3abc6e959aa174cee06680"
] |
[
"ca3654ebf7a439dc736f56f083c9aa98e4464b7f",
"e6ea5876e0228165ee3abc6e959aa174cee06680"
] |
CVE-2022-28481
|
2022-05-01T15:15Z
|
CSV-Safe gem < 3.0.0 doesn't filter out special characters which could trigger CSV Injection.
|
[
"https://github.com/WeblateOrg/weblate/commit/d9e136ff228e3760fd6dd7572869ac38e9a81809"
] |
[
"d9e136ff228e3760fd6dd7572869ac38e9a81809"
] |
CVE-2022-28796
|
2022-04-08T05:15Z
|
jbd2_journal_wait_updates in fs/jbd2/transaction.c in the Linux kernel before 5.17.1 has a use-after-free caused by a transaction_t race condition.
|
[
"https://github.com/torvalds/linux/commit/cc16eecae687912238ee6efbff71ad31e2bc414e"
] |
[
"cc16eecae687912238ee6efbff71ad31e2bc414e"
] |
CVE-2022-28946
|
2022-05-19T19:15Z
|
An issue in the component ast/parser.go of Open Policy Agent v0.39.0 causes the application to incorrectly interpret every expression, causing a Denial of Service (DoS) via triggering out-of-range memory access.
|
[
"https://github.com/open-policy-agent/opa/commit/e9d3828db670cbe11129885f37f08cbf04935264"
] |
[
"e9d3828db670cbe11129885f37f08cbf04935264"
] |
CVE-2022-29156
|
2022-04-13T07:15Z
|
drivers/infiniband/ulp/rtrs/rtrs-clt.c in the Linux kernel before 5.16.12 has a double free related to rtrs_clt_dev_release.
|
[
"https://github.com/torvalds/linux/commit/8700af2cc18c919b2a83e74e0479038fd113c15d"
] |
[
"8700af2cc18c919b2a83e74e0479038fd113c15d"
] |
CVE-2022-29161
|
2022-05-06T00:15Z
|
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. The XWiki Crypto API will generate X509 certificates signed by default using SHA1 with RSA, which is not considered safe anymore for use in certificate signatures, due to the risk of collisions with SHA1. The problem has been patched in XWiki version 13.10.6, 14.3.1 and 14.4-rc-1. Since then, the Crypto API will generate X509 certificates signed by default using SHA256 with RSA. Administrators are advised to upgrade their XWiki installation to one of the patched versions. If the upgrade is not possible, it is possible to patch the module xwiki-platform-crypto in a local installation by applying the change exposed in 26728f3 and re-compiling the module.
|
[
"https://github.com/xwiki/xwiki-platform/commit/26728f3f23658288683667a5182a916c7ecefc52"
] |
[
"26728f3f23658288683667a5182a916c7ecefc52"
] |
CVE-2022-29164
|
2022-05-06T00:15Z
|
Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. In affected versions an attacker can create a workflow which produces a HTML artifact containing an HTML file that contains a script which uses XHR calls to interact with the Argo Server API. The attacker emails the deep-link to the artifact to their victim. The victim opens the link, the script starts running. As the script has access to the Argo Server API (as the victim), so may read information about the victim’s workflows, or create and delete workflows. Note the attacker must be an insider: they must have access to the same cluster as the victim and must already be able to run their own workflows. The attacker must have an understanding of the victim’s system. We have seen no evidence of this in the wild. We urge all users to upgrade to the fixed versions.
|
[
"https://github.com/argoproj/argo-workflows/commit/87470e1c2bf703a9110e97bb755614ce8757fdcc"
] |
[
"87470e1c2bf703a9110e97bb755614ce8757fdcc"
] |
CVE-2022-29172
|
2022-05-05T23:15Z
|
Auth0 is an authentication broker that supports both social and enterprise identity providers, including Active Directory, LDAP, Google Apps, and Salesforce. In versions before `11.33.0`, when the “additional signup fields” feature [is configured](https://github.com/auth0/lock#additional-sign-up-fields), a malicious actor can inject invalidated HTML code into these additional fields, which is then stored in the service `user_metdata` payload (using the `name` property). Verification emails, when applicable, are generated using this metadata. It is therefor possible for an actor to craft a malicious link by injecting HTML, which is then rendered as the recipient's name within the delivered email template. You are impacted by this vulnerability if you are using `auth0-lock` version `11.32.2` or lower and are using the “additional signup fields” feature in your application. Upgrade to version `11.33.0`.
|
[
"https://github.com/auth0/lock/commit/79ae557d331274b114848150f19832ae341771b1"
] |
[
"79ae557d331274b114848150f19832ae341771b1"
] |
CVE-2022-29181
|
2022-05-20T19:15Z
|
Nokogiri is an open source XML and HTML library for Ruby. Nokogiri prior to version 1.13.6 does not type-check all inputs into the XML and HTML4 SAX parsers, allowing specially crafted untrusted inputs to cause illegal memory access errors (segfault) or reads from unrelated memory. Version 1.13.6 contains a patch for this issue. As a workaround, ensure the untrusted input is a `String` by calling `#to_s` or equivalent.
|
[
"https://github.com/sparklemotion/nokogiri/commit/db05ba9a1bd4b90aa6c76742cf6102a7c7297267",
"github.com/sparklemotion/nokogiri/commit/83cc451c3f29df397caa890afc3b714eae6ab8f7"
] |
[
"83cc451c3f29df397caa890afc3b714eae6ab8f7",
"db05ba9a1bd4b90aa6c76742cf6102a7c7297267"
] |
CVE-2022-29184
|
2022-05-20T20:15Z
|
GoCD is a continuous delivery server. In GoCD versions prior to 22.1.0, it is possible for existing authenticated users who have permissions to edit or create pipeline materials or pipeline configuration repositories to get remote code execution capability on the GoCD server via configuring a malicious branch name which abuses Mercurial hooks/aliases to exploit a command injection weakness. An attacker would require access to an account with existing GoCD administration permissions to either create/edit (`hg`-based) configuration repositories; create/edit pipelines and their (`hg`-based) materials; or, where "pipelines-as-code" configuration repositories are used, to commit malicious configuration to such an external repository which will be automatically parsed into a pipeline configuration and (`hg`) material definition by the GoCD server. This issue is fixed in GoCD 22.1.0. As a workaround, users who do not use/rely upon Mercurial materials can uninstall/remove the `hg`/Mercurial binary from the underlying GoCD Server operating system or Docker image.
|
[
"https://github.com/gocd/gocd/commit/37d35115db2ada2190173f9413cfe1bc6c295ecb"
] |
[
"37d35115db2ada2190173f9413cfe1bc6c295ecb"
] |
CVE-2022-29186
|
2022-05-20T21:15Z
|
Rundeck is an open source automation service with a web console, command line tools and a WebAPI. Rundeck community and rundeck-enterprise docker images contained a pre-generated SSH keypair. If the id_rsa.pub public key of the keypair was copied to authorized_keys files on remote host, those hosts would allow access to anyone with the exposed private credentials. This misconfiguration only impacts Rundeck Docker instances of PagerDuty® Process Automation On Prem (formerly Rundeck) version 4.0 and earlier, not Debian, RPM or .WAR. Additionally, the id_rsa.pub file would have to be copied from the Docker image filesystem contents without overwriting it and used to configure SSH access on a host. A patch on Rundeck's `main` branch has removed the pre-generated SSH key pair, but it does not remove exposed keys that have been configured. To patch, users must run a script on hosts in their environment to search for exposed keys and rotate them. Two workarounds are available: Do not use any pre-existing public key file from the rundeck docker images to allow SSH access by adding it to authorized_keys files and, if you have copied the public key file included in the docker image, remove it from any authorized_keys files.
|
[
"https://github.com/rundeck/rundeck/commit/16ef7a70b202492f9fbb54d8af4bb8ea0afa10ad"
] |
[
"16ef7a70b202492f9fbb54d8af4bb8ea0afa10ad"
] |
CVE-2022-29189
|
2022-05-21T00:15Z
|
Pion DTLS is a Go implementation of Datagram Transport Layer Security. Prior to version 2.1.4, a buffer that was used for inbound network traffic had no upper limit. Pion DTLS would buffer all network traffic from the remote user until the handshake completes or timed out. An attacker could exploit this to cause excessive memory usage. Version 2.1.4 contains a patch for this issue. There are currently no known workarounds available.
|
[
"https://github.com/pion/dtls/commit/a6397ff7282bc56dc37a68ea9211702edb4de1de"
] |
[
"a6397ff7282bc56dc37a68ea9211702edb4de1de"
] |
CVE-2022-29190
|
2022-05-21T00:15Z
|
Pion DTLS is a Go implementation of Datagram Transport Layer Security. Prior to version 2.1.4, an attacker can send packets that sends Pion DTLS into an infinite loop when processing. Version 2.1.4 contains a patch for this issue. There are currently no known workarounds available.
|
[
"https://github.com/pion/dtls/commit/e0b2ce3592e8e7d73713ac67b363a2e192a4cecf"
] |
[
"e0b2ce3592e8e7d73713ac67b363a2e192a4cecf"
] |
CVE-2022-29191
|
2022-05-20T21:15Z
|
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.GetSessionTensor` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.
|
[
"https://github.com/tensorflow/tensorflow/commit/48305e8ffe5246d67570b64096a96f8e315a7281"
] |
[
"48305e8ffe5246d67570b64096a96f8e315a7281"
] |
CVE-2022-29192
|
2022-05-20T21:15Z
|
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.QuantizeAndDequantizeV4Grad` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.
|
[
"https://github.com/tensorflow/tensorflow/commit/098e7762d909bac47ce1dbabe6dfd06294cb9d58"
] |
[
"098e7762d909bac47ce1dbabe6dfd06294cb9d58"
] |
CVE-2022-29193
|
2022-05-20T22:16Z
|
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.TensorSummaryV2` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.
|
[
"https://github.com/tensorflow/tensorflow/commit/290bb05c80c327ed74fae1d089f1001b1e2a4ef7"
] |
[
"290bb05c80c327ed74fae1d089f1001b1e2a4ef7"
] |
CVE-2022-29194
|
2022-05-20T21:15Z
|
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.DeleteSessionTensor` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.
|
[
"https://github.com/tensorflow/tensorflow/commit/cff267650c6a1b266e4b4500f69fbc49cdd773c5"
] |
[
"cff267650c6a1b266e4b4500f69fbc49cdd773c5"
] |
CVE-2022-29195
|
2022-05-20T22:16Z
|
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.StagePeek` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. The code assumes `index` is a scalar but there is no validation for this before accessing its value. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.
|
[
"https://github.com/tensorflow/tensorflow/commit/cebe3c45d76357d201c65bdbbf0dbe6e8a63bbdb"
] |
[
"cebe3c45d76357d201c65bdbbf0dbe6e8a63bbdb"
] |
CVE-2022-29196
|
2022-05-20T22:16Z
|
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.Conv3DBackpropFilterV2` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. The code does not validate that the `filter_sizes` argument is a vector. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.
|
[
"https://github.com/tensorflow/tensorflow/commit/174c5096f303d5be7ed2ca2662b08371bff4ab88"
] |
[
"174c5096f303d5be7ed2ca2662b08371bff4ab88"
] |
CVE-2022-29197
|
2022-05-20T22:16Z
|
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.UnsortedSegmentJoin` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. The code assumes `num_segments` is a scalar but there is no validation for this before accessing its value. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.
|
[
"https://github.com/tensorflow/tensorflow/commit/13d38a07ce9143e044aa737cfd7bb759d0e9b400"
] |
[
"13d38a07ce9143e044aa737cfd7bb759d0e9b400"
] |
CVE-2022-29198
|
2022-05-20T22:16Z
|
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.SparseTensorToCSRSparseMatrix` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. The code assumes `dense_shape` is a vector and `indices` is a matrix (as part of requirements for sparse tensors) but there is no validation for this. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.
|
[
"https://github.com/tensorflow/tensorflow/commit/ea50a40e84f6bff15a0912728e35b657548cef11"
] |
[
"ea50a40e84f6bff15a0912728e35b657548cef11"
] |
CVE-2022-29199
|
2022-05-20T22:16Z
|
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.LoadAndRemapMatrix does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. The code assumes `initializing_values` is a vector but there is no validation for this before accessing its value. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.
|
[
"https://github.com/tensorflow/tensorflow/commit/3150642acbbe254e3c3c5d2232143fa591855ac9"
] |
[
"3150642acbbe254e3c3c5d2232143fa591855ac9"
] |
CVE-2022-29200
|
2022-05-20T22:16Z
|
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.LSTMBlockCell` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. The code does not validate the ranks of any of the arguments to this API call. This results in `CHECK`-failures when the elements of the tensor are accessed. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.
|
[
"https://github.com/tensorflow/tensorflow/commit/803404044ae7a1efac48ba82d74111fce1ddb09a"
] |
[
"803404044ae7a1efac48ba82d74111fce1ddb09a"
] |
CVE-2022-29201
|
2022-05-20T23:15Z
|
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.QuantizedConv2D` does not fully validate the input arguments. In this case, references get bound to `nullptr` for each argument that is empty. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.
|
[
"https://github.com/tensorflow/tensorflow/commit/0f0b080ecde4d3dfec158d6f60da34d5e31693c4"
] |
[
"0f0b080ecde4d3dfec158d6f60da34d5e31693c4"
] |
CVE-2022-29202
|
2022-05-20T23:15Z
|
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.ragged.constant` does not fully validate the input arguments. This results in a denial of service by consuming all available memory. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.
|
[
"https://github.com/tensorflow/tensorflow/commit/bd4d5583ff9c8df26d47a23e508208844297310e"
] |
[
"bd4d5583ff9c8df26d47a23e508208844297310e"
] |
CVE-2022-29203
|
2022-05-20T23:15Z
|
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.SpaceToBatchND` (in all backends such as XLA and handwritten kernels) is vulnerable to an integer overflow: The result of this integer overflow is used to allocate the output tensor, hence we get a denial of service via a `CHECK`-failure (assertion failure), as in TFSA-2021-198. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.
|
[
"https://github.com/tensorflow/tensorflow/commit/acd56b8bcb72b163c834ae4f18469047b001fadf"
] |
[
"acd56b8bcb72b163c834ae4f18469047b001fadf"
] |
CVE-2022-29204
|
2022-05-20T23:15Z
|
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.UnsortedSegmentJoin` does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attack. The code assumes `num_segments` is a positive scalar but there is no validation. Since this value is used to allocate the output tensor, a negative value would result in a `CHECK`-failure (assertion failure), as per TFSA-2021-198. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.
|
[
"https://github.com/tensorflow/tensorflow/commit/20cb18724b0bf6c09071a3f53434c4eec53cc147",
"https://github.com/tensorflow/tensorflow/commit/84563f265f28b3c36a15335c8b005d405260e943"
] |
[
"84563f265f28b3c36a15335c8b005d405260e943",
"20cb18724b0bf6c09071a3f53434c4eec53cc147"
] |
CVE-2022-29205
|
2022-05-20T23:15Z
|
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, there is a potential for segfault / denial of service in TensorFlow by calling `tf.compat.v1.*` ops which don't yet have support for quantized types, which was added after migration to TensorFlow 2.x. In these scenarios, since the kernel is missing, a `nullptr` value is passed to `ParseDimensionValue` for the `py_value` argument. Then, this is dereferenced, resulting in segfault. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.
|
[
"https://github.com/tensorflow/tensorflow/commit/237822b59fc504dda2c564787f5d3ad9c4aa62d9"
] |
[
"237822b59fc504dda2c564787f5d3ad9c4aa62d9"
] |
CVE-2022-29206
|
2022-05-20T23:15Z
|
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.SparseTensorDenseAdd` does not fully validate the input arguments. In this case, a reference gets bound to a `nullptr` during kernel execution. This is undefined behavior. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.
|
[
"https://github.com/tensorflow/tensorflow/commit/11ced8467eccad9c7cb94867708be8fa5c66c730"
] |
[
"11ced8467eccad9c7cb94867708be8fa5c66c730"
] |
CVE-2022-29207
|
2022-05-20T22:16Z
|
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, multiple TensorFlow operations misbehave in eager mode when the resource handle provided to them is invalid. In graph mode, it would have been impossible to perform these API calls, but migration to TF 2.x eager mode opened up this vulnerability. If the resource handle is empty, then a reference is bound to a null pointer inside TensorFlow codebase (various codepaths). This is undefined behavior. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.
|
[
"https://github.com/tensorflow/tensorflow/commit/a5b89cd68c02329d793356bda85d079e9e69b4e7",
"https://github.com/tensorflow/tensorflow/commit/dbdd98c37bc25249e8f288bd30d01e118a7b4498"
] |
[
"dbdd98c37bc25249e8f288bd30d01e118a7b4498",
"a5b89cd68c02329d793356bda85d079e9e69b4e7"
] |
CVE-2022-29208
|
2022-05-20T23:15Z
|
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.raw_ops.EditDistance` has incomplete validation. Users can pass negative values to cause a segmentation fault based denial of service. In multiple places throughout the code, one may compute an index for a write operation. However, the existing validation only checks against the upper bound of the array. Hence, it is possible to write before the array by massaging the input to generate negative values for `loc`. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.
|
[
"https://github.com/tensorflow/tensorflow/commit/30721cf564cb029d34535446d6a5a6357bebc8e7"
] |
[
"30721cf564cb029d34535446d6a5a6357bebc8e7"
] |
CVE-2022-29209
|
2022-05-21T00:15Z
|
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the macros that TensorFlow uses for writing assertions (e.g., `CHECK_LT`, `CHECK_GT`, etc.) have an incorrect logic when comparing `size_t` and `int` values. Due to type conversion rules, several of the macros would trigger incorrectly. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.
|
[
"https://github.com/tensorflow/tensorflow/commit/b917181c29b50cb83399ba41f4d938dc369109a1"
] |
[
"b917181c29b50cb83399ba41f4d938dc369109a1"
] |
CVE-2022-29210
|
2022-05-21T00:15Z
|
TensorFlow is an open source platform for machine learning. In version 2.8.0, the `TensorKey` hash function used total estimated `AllocatedBytes()`, which (a) is an estimate per tensor, and (b) is a very poor hash function for constants (e.g. `int32_t`). It also tried to access individual tensor bytes through `tensor.data()` of size `AllocatedBytes()`. This led to ASAN failures because the `AllocatedBytes()` is an estimate of total bytes allocated by a tensor, including any pointed-to constructs (e.g. strings), and does not refer to contiguous bytes in the `.data()` buffer. The discoverers could not use this byte vector anyway because types such as `tstring` include pointers, whereas they needed to hash the string values themselves. This issue is patched in Tensorflow versions 2.9.0 and 2.8.1.
|
[
"https://github.com/tensorflow/tensorflow/commit/1b85a28d395dc91f4d22b5f9e1e9a22e92ccecd6"
] |
[
"1b85a28d395dc91f4d22b5f9e1e9a22e92ccecd6"
] |
CVE-2022-29211
|
2022-05-21T00:15Z
|
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implementation of `tf.histogram_fixed_width` is vulnerable to a crash when the values array contain `Not a Number` (`NaN`) elements. The implementation assumes that all floating point operations are defined and then converts a floating point result to an integer index. If `values` contains `NaN` then the result of the division is still `NaN` and the cast to `int32` would result in a crash. This only occurs on the CPU implementation. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.
|
[
"https://github.com/tensorflow/tensorflow/commit/e57fd691c7b0fd00ea3bfe43444f30c1969748b5"
] |
[
"e57fd691c7b0fd00ea3bfe43444f30c1969748b5"
] |
CVE-2022-29212
|
2022-05-21T00:15Z
|
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, certain TFLite models that were created using TFLite model converter would crash when loaded in the TFLite interpreter. The culprit is that during quantization the scale of values could be greater than 1 but code was always assuming sub-unit scaling. Thus, since code was calling `QuantizeMultiplierSmallerThanOneExp`, the `TFLITE_CHECK_LT` assertion would trigger and abort the process. Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.
|
[
"https://github.com/tensorflow/tensorflow/commit/a989426ee1346693cc015792f11d715f6944f2b8"
] |
[
"a989426ee1346693cc015792f11d715f6944f2b8"
] |
CVE-2022-29213
|
2022-05-21T00:15Z
|
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the `tf.compat.v1.signal.rfft2d` and `tf.compat.v1.signal.rfft3d` lack input validation and under certain condition can result in crashes (due to `CHECK`-failures). Versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4 contain a patch for this issue.
|
[
"https://github.com/tensorflow/tensorflow/commit/0a8a781e597b18ead006d19b7d23d0a369e9ad73"
] |
[
"0a8a781e597b18ead006d19b7d23d0a369e9ad73"
] |
CVE-2022-29216
|
2022-05-21T00:15Z
|
TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, TensorFlow's `saved_model_cli` tool is vulnerable to a code injection. This can be used to open a reverse shell. This code path was maintained for compatibility reasons as the maintainers had several test cases where numpy expressions were used as arguments. However, given that the tool is always run manually, the impact of this is still not severe. The maintainers have now removed the `safe=False` argument, so all parsing is done without calling `eval`. The patch is available in versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4.
|
[
"https://github.com/tensorflow/tensorflow/commit/c5da7af048611aa29e9382371f0aed5018516cac",
"https://github.com/tensorflow/tensorflow/commit/8b202f08d52e8206af2bdb2112a62fafbc546ec7"
] |
[
"8b202f08d52e8206af2bdb2112a62fafbc546ec7",
"c5da7af048611aa29e9382371f0aed5018516cac"
] |
CVE-2022-29217
|
2022-05-24T15:15Z
|
PyJWT is a Python implementation of RFC 7519. PyJWT supports multiple different JWT signing algorithms. With JWT, an attacker submitting the JWT token can choose the used signing algorithm. The PyJWT library requires that the application chooses what algorithms are supported. The application can specify `jwt.algorithms.get_default_algorithms()` to get support for all algorithms, or specify a single algorithm. The issue is not that big as `algorithms=jwt.algorithms.get_default_algorithms()` has to be used. Users should upgrade to v2.4.0 to receive a patch for this issue. As a workaround, always be explicit with the algorithms that are accepted and expected when decoding.
|
[
"https://github.com/jpadilla/pyjwt/commit/9c528670c455b8d948aff95ed50e22940d1ad3fc"
] |
[
"9c528670c455b8d948aff95ed50e22940d1ad3fc"
] |
CVE-2022-29221
|
2022-05-24T15:15Z
|
Smarty is a template engine for PHP, facilitating the separation of presentation (HTML/CSS) from application logic. Prior to versions 3.1.45 and 4.1.1, template authors could inject php code by choosing a malicious {block} name or {include} file name. Sites that cannot fully trust template authors should upgrade to versions 3.1.45 or 4.1.1 to receive a patch for this issue. There are currently no known workarounds.
|
[
"https://github.com/smarty-php/smarty/commit/64ad6442ca1da31cefdab5c9874262b702cccddd",
"github.com/smarty-php/smarty/commit/3606c4717ed6348e114a610ff1e446048dcd0345"
] |
[
"3606c4717ed6348e114a610ff1e446048dcd0345",
"64ad6442ca1da31cefdab5c9874262b702cccddd"
] |
CVE-2022-29224
|
2022-06-09T19:15Z
|
Envoy is a cloud-native high-performance proxy. Versions of envoy prior to 1.22.1 are subject to a segmentation fault in the GrpcHealthCheckerImpl. Envoy can perform various types of upstream health checking. One of them uses gRPC. Envoy also has a feature which can “hold” (prevent removal) upstream hosts obtained via service discovery until configured active health checking fails. If an attacker controls an upstream host and also controls service discovery of that host (via DNS, the EDS API, etc.), an attacker can crash Envoy by forcing removal of the host from service discovery, and then failing the gRPC health check request. This will crash Envoy via a null pointer dereference. Users are advised to upgrade to resolve this vulnerability. Users unable to upgrade may disable gRPC health checking and/or replace it with a different health checking type as a mitigation.
|
[
"https://github.com/envoyproxy/envoy/commit/9b1c3962172a972bc0359398af6daa3790bb59db"
] |
[
"9b1c3962172a972bc0359398af6daa3790bb59db"
] |
CVE-2022-29225
|
2022-06-09T20:15Z
|
Envoy is a cloud-native high-performance proxy. In versions prior to 1.22.1 secompressors accumulate decompressed data into an intermediate buffer before overwriting the body in the decode/encodeBody. This may allow an attacker to zip bomb the decompressor by sending a small highly compressed payload. Maliciously constructed zip files may exhaust system memory and cause a denial of service. Users are advised to upgrade. Users unable to upgrade may consider disabling decompression.
|
[
"https://github.com/envoyproxy/envoy/commit/cb4ef0b09200c720dfdb07e097092dd105450343"
] |
[
"cb4ef0b09200c720dfdb07e097092dd105450343"
] |
CVE-2022-29226
|
2022-06-09T20:15Z
|
Envoy is a cloud-native high-performance proxy. In versions prior to 1.22.1 the OAuth filter implementation does not include a mechanism for validating access tokens, so by design when the HMAC signed cookie is missing a full authentication flow should be triggered. However, the current implementation assumes that access tokens are always validated thus allowing access in the presence of any access token attached to the request. Users are advised to upgrade. There is no known workaround for this issue.
|
[
"https://github.com/envoyproxy/envoy/commit/7ffda4e809dec74449ebc330cebb9d2f4ab61360"
] |
[
"7ffda4e809dec74449ebc330cebb9d2f4ab61360"
] |
CVE-2022-29227
|
2022-06-09T20:15Z
|
Envoy is a cloud-native high-performance edge/middle/service proxy. In versions prior to 1.22.1 if Envoy attempts to send an internal redirect of an HTTP request consisting of more than HTTP headers, there’s a lifetime bug which can be triggered. If while replaying the request Envoy sends a local reply when the redirect headers are processed, the downstream state indicates that the downstream stream is not complete. On sending the local reply, Envoy will attempt to reset the upstream stream, but as it is actually complete, and deleted, this result in a use-after-free. Users are advised to upgrade. Users unable to upgrade are advised to disable internal redirects if crashes are observed.
|
[
"https://github.com/envoyproxy/envoy/commit/fe7c69c248f4fe5a9080c7ccb35275b5218bb5ab"
] |
[
"fe7c69c248f4fe5a9080c7ccb35275b5218bb5ab"
] |
CVE-2022-29228
|
2022-06-09T20:15Z
|
Envoy is a cloud-native high-performance proxy. In versions prior to 1.22.1 the OAuth filter would try to invoke the remaining filters in the chain after emitting a local response, which triggers an ASSERT() in newer versions and corrupts memory on earlier versions. continueDecoding() shouldn’t ever be called from filters after a local reply has been sent. Users are advised to upgrade. There are no known workarounds for this issue.
|
[
"https://github.com/envoyproxy/envoy/commit/7ffda4e809dec74449ebc330cebb9d2f4ab61360"
] |
[
"7ffda4e809dec74449ebc330cebb9d2f4ab61360"
] |
CVE-2022-29237
|
2022-05-24T15:15Z
|
Opencast is a free and open source solution for automated video capture and distribution at scale. Prior to Opencast 10.14 and 11.7, users could pass along URLs for files belonging to organizations other than the user's own, which Opencast would then import into the current organization, bypassing organizational barriers. Attackers must have full access to Opencast's ingest REST interface, and also know internal links to resources in another organization of the same Opencast cluster. Users who do not run a multi-tenant cluster are not affected by this issue. This issue is fixed in Opencast 10.14 and 11.7.
|
[
"https://github.com/opencast/opencast/commit/8d5ec1614eed109b812bc27b0c6d3214e456d4e7"
] |
[
"8d5ec1614eed109b812bc27b0c6d3214e456d4e7"
] |
CVE-2022-29242
|
2022-05-24T15:15Z
|
GOST engine is a reference implementation of the Russian GOST crypto algorithms for OpenSSL. TLS clients using GOST engine when ciphersuite `TLS_GOSTR341112_256_WITH_KUZNYECHIK_CTR_OMAC` is agreed and the server uses 512 bit GOST secret keys are vulnerable to buffer overflow. GOST engine version 3.0.1 contains a patch for this issue. Disabling ciphersuite `TLS_GOSTR341112_256_WITH_KUZNYECHIK_CTR_OMAC` is a possible workaround.
|
[
"github.com/gost-engine/engine/commit/b2b4d629f100eaee9f5942a106b1ccefe85b8808",
"https://github.com/gost-engine/engine/commit/c6655a0b620a3e31f085cc906f8073fe81b2fad3",
"github.com/gost-engine/engine/commit/7df766124f87768b43b9e8947c5a01e17545772c"
] |
[
"7df766124f87768b43b9e8947c5a01e17545772c",
"c6655a0b620a3e31f085cc906f8073fe81b2fad3",
"b2b4d629f100eaee9f5942a106b1ccefe85b8808"
] |
CVE-2022-29248
|
2022-05-25T18:15Z
|
Guzzle is a PHP HTTP client. Guzzle prior to versions 6.5.6 and 7.4.3 contains a vulnerability with the cookie middleware. The vulnerability is that it is not checked if the cookie domain equals the domain of the server which sets the cookie via the Set-Cookie header, allowing a malicious server to set cookies for unrelated domains. The cookie middleware is disabled by default, so most library consumers will not be affected by this issue. Only those who manually add the cookie middleware to the handler stack or construct the client with ['cookies' => true] are affected. Moreover, those who do not use the same Guzzle client to call multiple domains and have disabled redirect forwarding are not affected by this vulnerability. Guzzle versions 6.5.6 and 7.4.3 contain a patch for this issue. As a workaround, turn off the cookie middleware.
|
[
"https://github.com/guzzle/guzzle/commit/74a8602c6faec9ef74b7a9391ac82c5e65b1cdab"
] |
[
"74a8602c6faec9ef74b7a9391ac82c5e65b1cdab"
] |
CVE-2022-29251
|
2022-05-25T21:15Z
|
XWiki Platform Flamingo Theme UI is a tool that allows customization and preview of any Flamingo-based skin. Starting with versions 6.2.4 and 6.3-rc-1, a possible cross-site scripting vector is present in the `FlamingoThemesCode.WebHomeSheet` wiki page related to the "newThemeName" form field. The issue is patched in versions 12.10.11, 14.0-rc-1, 13.4.7, and 13.10.3. The easiest available workaround is to edit the wiki page `FlamingoThemesCode.WebHomeSheet` (with wiki editor) according to the suggestion provided in the GitHub Security Advisory.
|
[
"https://github.com/xwiki/xwiki-platform/commit/bd935320bee3c27cf7548351b1d0f935f116d437"
] |
[
"bd935320bee3c27cf7548351b1d0f935f116d437"
] |
CVE-2022-29252
|
2022-05-25T21:15Z
|
XWiki Platform Wiki UI Main Wiki is a package for managing subwikis. Starting with version 5.3-milestone-2, XWiki Platform Wiki UI Main Wiki contains a possible cross-site scripting vector in the `WikiManager.JoinWiki ` wiki page related to the "requestJoin" field. The issue is patched in versions 12.10.11, 14.0-rc-1, 13.4.7, and 13.10.3. The easiest available workaround is to edit the wiki page `WikiManager.JoinWiki` (with wiki editor) according to the suggestion provided in the GitHub Security Advisory.
|
[
"https://github.com/xwiki/xwiki-platform/commit/27f839133d41877e538d35fa88274b50a1c00b9b"
] |
[
"27f839133d41877e538d35fa88274b50a1c00b9b"
] |
CVE-2022-29253
|
2022-05-25T21:15Z
|
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Starting with version 8.3-rc-1 and prior to versions 12.10.3 and 14.0, one can ask for any file located in the classloader using the template API and a path with ".." in it. The issue is patched in versions 14.0 and 13.10.3. There is no easy workaround for this issue.
|
[
"https://github.com/xwiki/xwiki-platform/commit/4917c8f355717bb636d763844528b1fe0f95e8e2"
] |
[
"4917c8f355717bb636d763844528b1fe0f95e8e2"
] |
CVE-2022-29255
|
2022-06-09T09:15Z
|
Vyper is a Pythonic Smart Contract Language for the ethereum virtual machine. In versions prior to 0.3.4 when a calling an external contract with no return value, the contract address (including side effects) could be evaluated twice. This may result in incorrect outcomes for contracts. This issue has been addressed in v0.3.4.
|
[
"https://github.com/vyperlang/vyper/commit/6b4d8ff185de071252feaa1c319712b2d6577f8d"
] |
[
"6b4d8ff185de071252feaa1c319712b2d6577f8d"
] |
CVE-2022-29258
|
2022-05-31T17:15Z
|
XWiki Platform Filter UI provides a generic user interface to convert from a XWiki Filter input stream to an output stream with settings for each stream. Starting with versions 6.0-milestone-2 and 5.4.4 and prior to versions 12.10.11, 14.0-rc-1, 13.4.7, and 13.10.3, XWiki Platform Filter UI contains a possible cross-site scripting vector in the `Filter.FilterStreamDescriptorForm` wiki page related to pretty much all the form fields printed in the home page of the application. The issue is patched in versions 12.10.11, 14.0-rc-1, 13.4.7, and 13.10.3. The easiest workaround is to edit the wiki page `Filter.FilterStreamDescriptorForm` (with wiki editor) according to the instructions in the GitHub Security Advisory.
|
[
"https://github.com/xwiki/xwiki-platform/commit/21906acb5ee2304552f56f9bbdbf8e7d368f7f3a"
] |
[
"21906acb5ee2304552f56f9bbdbf8e7d368f7f3a"
] |
CVE-2022-29339
|
2022-05-05T13:15Z
|
In GPAC 2.1-DEV-rev87-g053aae8-master, function BS_ReadByte() in utils/bitstream.c has a failed assertion, which causes a Denial of Service. This vulnerability was fixed in commit 9ea93a2.
|
[
"https://github.com/gpac/gpac/commit/9ea93a2ec8f555ceed1ee27294cf94822f14f10f"
] |
[
"9ea93a2ec8f555ceed1ee27294cf94822f14f10f"
] |
CVE-2022-29361
|
2022-05-25T01:15Z
|
Improper parsing of HTTP requests in Pallets Werkzeug v2.1.0 and below allows attackers to perform HTTP Request Smuggling using a crafted HTTP request with multiple requests included inside the body. NOTE: the vendor's position is that this behavior can only occur in unsupported configurations involving development mode and an HTTP server from outside the Werkzeug project
|
[
"https://github.com/pallets/werkzeug/commit/9a3a981d70d2e9ec3344b5192f86fcaf3210cd85"
] |
[
"9a3a981d70d2e9ec3344b5192f86fcaf3210cd85"
] |
CVE-2022-29369
|
2022-05-12T19:15Z
|
Nginx NJS v0.7.2 was discovered to contain a segmentation violation via njs_lvlhsh_bucket_find at njs_lvlhsh.c.
|
[
"https://github.com/nginx/njs/commit/222d6fdcf0c6485ec8e175f3a7b70d650c234b4e"
] |
[
"222d6fdcf0c6485ec8e175f3a7b70d650c234b4e"
] |
CVE-2022-29379
|
2022-05-25T13:15Z
|
Nginx NJS v0.7.3 was discovered to contain a stack overflow in the function njs_default_module_loader at /src/njs/src/njs_module.c. NOTE: multiple third parties dispute this report, e.g., the behavior is only found in unreleased development code that was not part of the 0.7.2, 0.7.3, or 0.7.4 release
|
[
"https://github.com/nginx/njs/commit/ab1702c7af9959366a5ddc4a75b4357d4e9ebdc1"
] |
[
"ab1702c7af9959366a5ddc4a75b4357d4e9ebdc1"
] |
CVE-2022-29528
|
2022-04-20T23:15Z
|
An issue was discovered in MISP before 2.4.158. PHAR deserialization can occur.
|
[
"https://github.com/MISP/MISP/commit/93821c0de6a7dd32262ce62212773f43136ca66e",
"https://github.com/MISP/MISP/commit/0108f1bde2117ac5c1e28d124128f60c8bb09a8e"
] |
[
"0108f1bde2117ac5c1e28d124128f60c8bb09a8e",
"93821c0de6a7dd32262ce62212773f43136ca66e"
] |
CVE-2022-29529
|
2022-04-20T23:15Z
|
An issue was discovered in MISP before 2.4.158. There is stored XSS via the LinOTP login field.
|
[
"https://github.com/MISP/MISP/commit/9623de2f5cca011afc581d55cfa5ce87682894fd"
] |
[
"9623de2f5cca011afc581d55cfa5ce87682894fd"
] |
CVE-2022-29530
|
2022-04-20T23:15Z
|
An issue was discovered in MISP before 2.4.158. There is stored XSS in the galaxy clusters.
|
[
"https://github.com/MISP/MISP/commit/107e271d78c255d658ce998285fe6f6c4f291b41"
] |
[
"107e271d78c255d658ce998285fe6f6c4f291b41"
] |
CVE-2022-29531
|
2022-04-20T23:15Z
|
An issue was discovered in MISP before 2.4.158. There is stored XSS in the event graph via a tag name.
|
[
"https://github.com/MISP/MISP/commit/bb3b7a7e91862742cae228c43b3091bad476dcc0"
] |
[
"bb3b7a7e91862742cae228c43b3091bad476dcc0"
] |
CVE-2022-29532
|
2022-04-20T23:15Z
|
An issue was discovered in MISP before 2.4.158. There is XSS in the cerebrate view if one administrator puts a javascript: URL in the URL field, and another administrator clicks on it.
|
[
"https://github.com/MISP/MISP/commit/60c85b80e3ab05c3ef015bca5630e95eddbb1436"
] |
[
"60c85b80e3ab05c3ef015bca5630e95eddbb1436"
] |
CVE-2022-29533
|
2022-04-20T23:15Z
|
An issue was discovered in MISP before 2.4.158. There is XSS in app/Controller/OrganisationsController.php in a situation with a "weird single checkbox page."
|
[
"https://github.com/MISP/MISP/commit/ce6bc88e330f5ef50666b149d86c0d94f545f24e"
] |
[
"ce6bc88e330f5ef50666b149d86c0d94f545f24e"
] |
CVE-2022-29534
|
2022-04-20T23:15Z
|
An issue was discovered in MISP before 2.4.158. In UsersController.php, password confirmation can be bypassed via vectors involving an "Accept: application/json" header.
|
[
"https://github.com/MISP/MISP/commit/01120163a6b4d905029d416e7305575df31df8af"
] |
[
"01120163a6b4d905029d416e7305575df31df8af"
] |
CVE-2022-29577
|
2022-04-21T23:15Z
|
OWASP AntiSamy before 1.6.7 allows XSS via HTML tag smuggling on STYLE content with crafted input. The output serializer does not properly encode the supposed Cascading Style Sheets (CSS) content. NOTE: this issue exists because of an incomplete fix for CVE-2022-28367.
|
[
"https://github.com/nahsra/antisamy/commit/32e273507da0e964b58c50fd8a4c94c9d9363af0"
] |
[
"32e273507da0e964b58c50fd8a4c94c9d9363af0"
] |
CVE-2022-29582
|
2022-04-22T16:15Z
|
In the Linux kernel before 5.17.3, fs/io_uring.c has a use-after-free due to a race condition in io_uring timeouts. This can be triggered by a local user who has no access to any user namespace; however, the race condition perhaps can only be exploited infrequently.
|
[
"https://github.com/torvalds/linux/commit/e677edbcabee849bfdd43f1602bccbecf736a646"
] |
[
"e677edbcabee849bfdd43f1602bccbecf736a646"
] |
CVE-2022-29693
|
2022-06-02T14:15Z
|
Unicorn Engine v2.0.0-rc7 and below was discovered to contain a memory leak via the function uc_close at /my/unicorn/uc.c.
|
[
"https://github.com/unicorn-engine/unicorn/commit/469fc4c35a0cfabdbefb158e22d145f4ee6f77b9"
] |
[
"469fc4c35a0cfabdbefb158e22d145f4ee6f77b9"
] |
CVE-2022-29694
|
2022-06-02T14:15Z
|
Unicorn Engine v2.0.0-rc7 and below was discovered to contain a NULL pointer dereference via qemu_ram_free.
|
[
"https://github.com/unicorn-engine/unicorn/commit/3d3deac5e6d38602b689c4fef5dac004f07a2e63"
] |
[
"3d3deac5e6d38602b689c4fef5dac004f07a2e63"
] |
CVE-2022-29695
|
2022-06-02T14:15Z
|
Unicorn Engine v2.0.0-rc7 contains memory leaks caused by an incomplete unicorn engine initialization.
|
[
"https://github.com/unicorn-engine/unicorn/commit/5a79d7879ca3ee0ce684ad6576d8ac15e8d90fc7"
] |
[
"5a79d7879ca3ee0ce684ad6576d8ac15e8d90fc7"
] |
CVE-2022-29710
|
2022-05-25T01:15Z
|
A cross-site scripting (XSS) vulnerability in uploadConfirm.php of LimeSurvey v5.3.9 and below allows attackers to execute arbitrary web scripts or HTML via a crafted plugin.
|
[
"https://github.com/LimeSurvey/LimeSurvey/commit/f7b35619a1c4b0893754594c7d5870fd599a0f9c"
] |
[
"f7b35619a1c4b0893754594c7d5870fd599a0f9c"
] |
CVE-2022-29711
|
2022-06-02T14:15Z
|
LibreNMS v22.3.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /Table/GraylogController.php.
|
[
"https://github.com/librenms/librenms/commit/cc6112b8fb36039b862b42d86eb79ef7ee89d31b"
] |
[
"cc6112b8fb36039b862b42d86eb79ef7ee89d31b"
] |
CVE-2022-29712
|
2022-06-02T14:15Z
|
LibreNMS v22.3.0 was discovered to contain multiple command injection vulnerabilities via the service_ip, hostname, and service_param parameters.
|
[
"https://github.com/librenms/librenms/commit/8b82341cb742e7bd4966964b399012f7ba017e0b"
] |
[
"8b82341cb742e7bd4966964b399012f7ba017e0b"
] |
CVE-2022-29776
|
2022-06-02T14:15Z
|
Onlyoffice Document Server v6.0.0 and below and Core 6.1.0.26 and below were discovered to contain a stack overflow via the component DesktopEditor/common/File.cpp.
|
[
"https://github.com/ONLYOFFICE/core/commit/88cf60a3ed4a2b40d71a1c2ced72fa3902a30967"
] |
[
"88cf60a3ed4a2b40d71a1c2ced72fa3902a30967"
] |
CVE-2022-29777
|
2022-06-02T14:15Z
|
Onlyoffice Document Server v6.0.0 and below and Core 6.1.0.26 and below were discovered to contain a heap overflow via the component DesktopEditor/fontengine/fontconverter/FontFileBase.h.
|
[
"https://github.com/ONLYOFFICE/core/commit/b17d5e860f30e8be2caeb0022b63be4c76660178"
] |
[
"b17d5e860f30e8be2caeb0022b63be4c76660178"
] |
CVE-2022-29779
|
2022-06-02T14:15Z
|
Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_value_own_enumerate at src/njs_value.c.
|
[
"https://github.com/nginx/njs/commit/2e00e95473861846aa8538be87db07699d9f676d"
] |
[
"2e00e95473861846aa8538be87db07699d9f676d"
] |
CVE-2022-29780
|
2022-06-02T14:15Z
|
Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_array_prototype_sort at src/njs_array.c.
|
[
"https://github.com/nginx/njs/commit/8b39afdad9a0761e0a5d4af1a762bd9a6daef572"
] |
[
"8b39afdad9a0761e0a5d4af1a762bd9a6daef572"
] |
CVE-2022-29806
|
2022-04-26T04:15Z
|
ZoneMinder before 1.36.13 allows remote code execution via an invalid language. Ability to create a debug log file at an arbitrary pathname contributes to exploitability.
|
[
"https://github.com/ZoneMinder/zoneminder/commit/9fee64b62fbdff5bf5ece1d617f1f53c7b1967cb"
] |
[
"9fee64b62fbdff5bf5ece1d617f1f53c7b1967cb"
] |
CVE-2022-29858
|
2022-06-28T22:15Z
|
Silverstripe silverstripe/assets through 1.10 is vulnerable to improper access control that allows protected images to be published by changing an existing image short code on website content.
|
[
"https://github.com/silverstripe/silverstripe-assets/commit/5f6a73b010c01587ffbfb954441f6b7cbb54e767"
] |
[
"5f6a73b010c01587ffbfb954441f6b7cbb54e767"
] |
CVE-2022-29967
|
2022-04-29T23:15Z
|
static_compressed_inmemory_website_callback.c in Glewlwyd through 2.6.2 allows directory traversal.
|
[
"https://github.com/babelouest/glewlwyd/commit/e3f7245c33897bf9b3a75acfcdb8b7b93974bf11"
] |
[
"e3f7245c33897bf9b3a75acfcdb8b7b93974bf11"
] |
CVE-2022-29968
|
2022-05-02T04:15Z
|
An issue was discovered in the Linux kernel through 5.17.5. io_rw_init_file in fs/io_uring.c lacks initialization of kiocb->private.
|
[
"https://github.com/torvalds/linux/commit/32452a3eb8b64e01e2be717f518c0be046975b9d"
] |
[
"32452a3eb8b64e01e2be717f518c0be046975b9d"
] |
CVE-2022-30330
|
2022-05-07T04:15Z
|
In the KeepKey firmware before 7.3.2,Flaws in the supervisor interface can be exploited to bypass important security restrictions on firmware operations. Using these flaws, malicious firmware code can elevate privileges, permanently make the device inoperable or overwrite the trusted bootloader code to compromise the hardware wallet across reboots or storage wipes.
|
[
"https://github.com/keepkey/keepkey-firmware/commit/447c1f038a31378ab9589965c098467d9ea6cccc"
] |
[
"447c1f038a31378ab9589965c098467d9ea6cccc"
] |
CVE-2022-30503
|
2022-06-02T14:15Z
|
Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_set_number at src/njs_value.h.
|
[
"https://github.com/nginx/njs/commit/5c6130a2a0b4c41ab415f6b8992aa323636338b9"
] |
[
"5c6130a2a0b4c41ab415f6b8992aa323636338b9"
] |
CVE-2022-30594
|
2022-05-12T05:15Z
|
The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag.
|
[
"https://github.com/torvalds/linux/commit/ee1fee900537b5d9560e9f937402de5ddc8412f3"
] |
[
"ee1fee900537b5d9560e9f937402de5ddc8412f3"
] |
CVE-2022-30596
|
2022-05-18T17:15Z
|
A flaw was found in moodle where ID numbers displayed when bulk allocating markers to assignments required additional sanitizing to prevent a stored XSS risk.
|
[
"http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-74204",
"https://github.com/moodle/moodle/commit/6abe964bbac41b5e40a81b40962f7044b0dc201e"
] |
[
"6abe964bbac41b5e40a81b40962f7044b0dc201e"
] |
CVE-2022-30689
|
2022-05-17T18:15Z
|
HashiCorp Vault and Vault Enterprise from 1.10.0 to 1.10.2 did not correctly configure and enforce MFA on login after server restarts. This affects the Login MFA feature introduced in Vault and Vault Enterprise 1.10.0 and does not affect the separate Enterprise MFA feature set. Fixed in 1.10.3.
|
[
"https://github.com/hashicorp/vault/commit/15baea5fa3e71c837c33b8bcbd8f06e0fbbc110d"
] |
[
"15baea5fa3e71c837c33b8bcbd8f06e0fbbc110d"
] |
CVE-2022-30708
|
2022-05-15T03:15Z
|
Webmin through 1.991, when the Authentic theme is used, allows remote code execution when a user has been manually created (i.e., not created in Virtualmin or Cloudmin). This occurs because settings-editor_write.cgi does not properly restrict the file parameter.
|
[
"https://github.com/webmin/webmin/commit/6a2334bf8b27d55c7edf0b2825cd14f3f8a69d4d"
] |
[
"6a2334bf8b27d55c7edf0b2825cd14f3f8a69d4d"
] |
CVE-2022-30947
|
2022-05-17T15:15Z
|
Jenkins Git Plugin 4.11.1 and earlier allows attackers able to configure pipelines to check out some SCM repositories stored on the Jenkins controller's file system using local paths as SCM URLs, obtaining limited information about other projects' SCM contents.
|
[
"https://github.com/jenkinsci/git-plugin/commit/b295606e0b865c298fde27bea14f9b7535a976e6"
] |
[
"b295606e0b865c298fde27bea14f9b7535a976e6"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.