ecosystem stringclasses 11
values | vuln_id stringlengths 10 19 | summary stringlengths 4 220 ⌀ | details stringlengths 34 13.5k | aliases stringlengths 17 87 ⌀ | modified_date stringdate 2019-03-26 14:13:00 2022-05-10 08:46:52 | published_date stringdate 2012-06-17 03:41:00 2022-05-10 08:46:50 | severity stringclasses 5
values | score float64 0 10 ⌀ | cwe_id stringclasses 581
values | refs stringlengths 82 11.6k | introduced stringclasses 843
values | code_refs stringlengths 46 940 | commits stringlengths 46 940 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Maven | GHSA-qqv6-5w6p-3pgr | Moderate severity vulnerability that affects org.hswebframework.web:hsweb-commons | An issue was discovered in hsweb 3.0.4. It is a reflected XSS vulnerability due to the absence of type parameter checking in FlowableModelManagerController.java. | {'CVE-2018-20594'} | 2022-03-03T05:13:53.425384Z | 2019-01-04T17:43:30Z | MODERATE | null | {'CWE-79'} | {'https://github.com/hs-web/hsweb-framework/issues/107', 'https://github.com/hs-web/hsweb-framework/commit/b72a2275ed21240296c6539bae1049c56abb542f', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20594', 'https://github.com/hs-web/hsweb-framework', 'https://github.com/advisories/GHSA-qqv6-5w6p-3pgr'} | null | {'https://github.com/hs-web/hsweb-framework/commit/b72a2275ed21240296c6539bae1049c56abb542f'} | {'https://github.com/hs-web/hsweb-framework/commit/b72a2275ed21240296c6539bae1049c56abb542f'} |
Maven | GHSA-j823-4qch-3rgm | Deserialization of untrusted data in Jackson Databind | FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.xalan.lib.sql.JNDIConnectionPool (aka apache/drill). | {'CVE-2020-14060'} | 2022-03-03T05:13:24.556259Z | 2020-06-18T14:44:46Z | HIGH | null | {'CWE-502'} | {'https://github.com/FasterXML/jackson-databind/commit/d1c67a0396e84c08d0558fbb843b5bd1f26e1921', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://lists.debian.org/debian-lts-announce/2020/07/msg00001.html', 'https://github.com/FasterXML/jackson-databind... | null | {'https://github.com/FasterXML/jackson-databind/commit/d1c67a0396e84c08d0558fbb843b5bd1f26e1921'} | {'https://github.com/FasterXML/jackson-databind/commit/d1c67a0396e84c08d0558fbb843b5bd1f26e1921'} |
Maven | GHSA-vp37-2f9p-3vr3 | Cross-site Scripting in OWASP AntiSamy | AntiSamy is a library for performing fast, configurable cleansing of HTML coming from untrusted sources. OWASP AntiSamy before 1.6.7 allows XSS via HTML tag smuggling on STYLE content with crafted input. The output serializer does not properly encode the supposed Cascading Style Sheets (CSS) content. NOTE: this issue e... | {'CVE-2022-29577'} | 2022-05-04T04:04:21.229446Z | 2022-04-23T00:03:04Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-29577', 'https://github.com/nahsra/antisamy', 'https://github.com/nahsra/antisamy/releases/tag/v1.6.7', 'https://github.com/nahsra/antisamy/commit/32e273507da0e964b58c50fd8a4c94c9d9363af0'} | null | {'https://github.com/nahsra/antisamy/commit/32e273507da0e964b58c50fd8a4c94c9d9363af0'} | {'https://github.com/nahsra/antisamy/commit/32e273507da0e964b58c50fd8a4c94c9d9363af0'} |
Maven | GHSA-3pp3-77j6-8ph6 | Missing Authentication for Critical Function in Apache NiFi | In Apache NiFi 1.0.0 to 1.11.4, the NiFi download token (one-time password) mechanism used a fixed cache size and did not authenticate a request to create a download token, only when attempting to use the token to access the content. An unauthenticated user could repeatedly request download tokens, preventing legitimat... | {'CVE-2020-9487'} | 2022-03-03T05:12:05.656413Z | 2022-01-06T20:41:04Z | HIGH | null | {'CWE-306'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-9487', 'https://nifi.apache.org/security#CVE-2020-9487', 'https://github.com/apache/nifi/commit/01e42dfb3291c3a3549023edadafd2d8023f3042'} | null | {'https://github.com/apache/nifi/commit/01e42dfb3291c3a3549023edadafd2d8023f3042'} | {'https://github.com/apache/nifi/commit/01e42dfb3291c3a3549023edadafd2d8023f3042'} |
Maven | GHSA-p5gm-fgfx-hr7h | Gadget chain attack in Nippy | A deserialization flaw is present in Taoensso Nippy before 2.14.2. In some circumstances, it is possible for an attacker to create a malicious payload that, when deserialized, will allow arbitrary code to be executed. This occurs because there is automatic use of the Java Serializable interface. | {'CVE-2020-24164'} | 2021-05-04T21:47:51Z | 2022-02-10T20:55:10Z | HIGH | null | {'CWE-502'} | {'https://github.com/ptaoussanis/nippy/commit/61fb009fdde2994140f2da2e495ba8af3a873eb2', 'https://github.com/ptaoussanis/nippy/issues/130', 'https://nvd.nist.gov/vuln/detail/CVE-2020-24164'} | null | {'https://github.com/ptaoussanis/nippy/commit/61fb009fdde2994140f2da2e495ba8af3a873eb2'} | {'https://github.com/ptaoussanis/nippy/commit/61fb009fdde2994140f2da2e495ba8af3a873eb2'} |
Maven | GHSA-hxp5-8pgq-mgv9 | Missing Authentication for Critical Function in Apache Calcite | "HttpUtils#getURLConnection method disables explicitly hostname verification for HTTPS connections making clients vulnerable to man-in-the-middle attacks. Calcite uses this method internally to connect with Druid and Splunk so information leakage may happen when using the respective Calcite adapters. The method itself ... | {'CVE-2020-13955'} | 2022-03-03T05:13:26.228267Z | 2021-04-22T16:14:14Z | MODERATE | null | {'CWE-295'} | {'https://issues.apache.org/jira/browse/CALCITE-4298', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13955', 'https://lists.apache.org/thread.html/r0b0fbe2038388175951ce1028182d980f9e9a7328be13d52dab70bb3%40%3Cdev.calcite.apache.org%3E', 'https://github.com/apache/calcite/commit/43eeafcbac29d02c72bd520c003cdfc571de2d15'} | null | {'https://github.com/apache/calcite/commit/43eeafcbac29d02c72bd520c003cdfc571de2d15'} | {'https://github.com/apache/calcite/commit/43eeafcbac29d02c72bd520c003cdfc571de2d15'} |
Maven | GHSA-j7c3-96rf-jrrp | Critical vulnerability in log4j may affect generated PEAR projects | ### Impact
UIMA PEAR projects that have been generated with the `de.averbis.textanalysis:pear-archetype ` version `2.0.0` have a maven dependency with scope `test` to` log4j 2.8.2` and might be affected by CVE-2021-44228.
### Patches
- The issue has been resolved in `de.averbis.textanalysis:pear-archetype ` version `2... | null | 2021-12-16T18:57:47Z | 2021-12-16T21:01:51Z | CRITICAL | null | null | {'https://github.com/averbis/pear-archetype/commit/6815f5981c836ab8c345a6ff54f29e9f4b67f7eb', 'https://github.com/averbis/pear-archetype/security/advisories/GHSA-j7c3-96rf-jrrp', 'https://github.com/averbis/pear-archetype'} | null | {'https://github.com/averbis/pear-archetype/commit/6815f5981c836ab8c345a6ff54f29e9f4b67f7eb'} | {'https://github.com/averbis/pear-archetype/commit/6815f5981c836ab8c345a6ff54f29e9f4b67f7eb'} |
Maven | GHSA-f8vc-wfc8-hxqh | Improper Privilege Management in Apache Hadoop | In Apache Hadoop 3.2.0 to 3.2.1, 3.0.0-alpha1 to 3.1.3, and 2.0.0-alpha to 2.10.0, WebHDFS client might send SPNEGO authorization header to remote URL without proper verification. | {'CVE-2020-9492'} | 2022-03-03T05:13:35.486633Z | 2022-02-09T22:17:38Z | HIGH | null | {'CWE-863', 'CWE-269'} | {'https://lists.apache.org/thread.html/r513758942356ccd0d14538ba18a09903fc72716d74be1cb727ea91ff%40%3Cgeneral.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r49c9ab444ab1107c6a8be8a0d66602dec32a16d96c2631fec8d309fb@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r4a57de5215494c35c8304... | null | {'https://github.com/apache/hadoop/commit/ca65409836d2949e9a9408d40bec0177b414cd5d'} | {'https://github.com/apache/hadoop/commit/ca65409836d2949e9a9408d40bec0177b414cd5d'} |
Maven | GHSA-fv3m-xhqw-9m79 | ballcat-codegen template engine remote code execution injection | ### Impact
Ballcat Codegen provides the function of online editing code to generate templates.
In version < 1.0.0.beta.2, since Velocity and freemarker templates are introduced but input verification is not done, attackers can implement remote code execution through malicious code injection of the template engine.
###... | {'CVE-2022-24881'} | 2022-04-27T21:16:49.063003Z | 2022-04-27T21:05:15Z | HIGH | null | {'CWE-78'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-24881', 'https://github.com/ballcat-projects/ballcat-codegen/commit/84a7cb38daf0295b93aba21d562ec627e4eb463b', 'https://github.com/ballcat-projects/ballcat-codegen/security/advisories/GHSA-fv3m-xhqw-9m79', 'https://github.com/ballcat-projects/ballcat-codegen', 'https://github... | null | {'https://github.com/ballcat-projects/ballcat-codegen/commit/84a7cb38daf0295b93aba21d562ec627e4eb463b'} | {'https://github.com/ballcat-projects/ballcat-codegen/commit/84a7cb38daf0295b93aba21d562ec627e4eb463b'} |
Maven | GHSA-v525-c3g5-cg9p | Unsafe Deserialization that can Result in Code Execution | JMS Client for RabbitMQ 1.x before 1.15.2 and 2.x before 2.2.0 is vulnerable to unsafe deserialization that can result in code execution via crafted StreamMessage data. | {'CVE-2020-36282'} | 2022-03-03T05:12:43.915627Z | 2021-12-10T17:15:49Z | HIGH | null | {'CWE-502'} | {'https://github.com/rabbitmq/rabbitmq-jms-client/issues/135', 'https://medium.com/@ramon93i7/a99645d0448b', 'https://github.com/rabbitmq/rabbitmq-jms-client/releases/tag/v2.2.0', 'https://github.com/rabbitmq/rabbitmq-jms-client/pull/136/commits/f647e5dbfe055a2ca8cbb16dd70f9d50d888b638', 'https://nvd.nist.gov/vuln/deta... | null | {'https://github.com/rabbitmq/rabbitmq-jms-client/pull/136/commits/f647e5dbfe055a2ca8cbb16dd70f9d50d888b638'} | {'https://github.com/rabbitmq/rabbitmq-jms-client/pull/136/commits/f647e5dbfe055a2ca8cbb16dd70f9d50d888b638'} |
Maven | GHSA-7q4h-pj78-j7vg | Authorization service vulnerable to DDos attacks in Apache CFX | CXF supports (via JwtRequestCodeFilter) passing OAuth 2 parameters via a JWT token as opposed to query parameters (see: The OAuth 2.0 Authorization Framework: JWT Secured Authorization Request (JAR)). Instead of sending a JWT token as a "request" parameter, the spec also supports specifying a URI from which to retrieve... | {'CVE-2021-22696'} | 2022-04-22T17:02:01.173146Z | 2021-05-13T22:31:05Z | HIGH | null | {'CWE-918', 'CWE-400'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-22696', 'https://github.com/apache/cxf/commit/40503a53914758759894f704bbf139ae89ace286', 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/r8651c06212c56294a1c0e... | null | {'https://github.com/apache/cxf/commit/aa789c5c4686597a7bdef2443909ab491fc2bc04', 'https://github.com/apache/cxf/commit/40503a53914758759894f704bbf139ae89ace286'} | {'https://github.com/apache/cxf/commit/aa789c5c4686597a7bdef2443909ab491fc2bc04', 'https://github.com/apache/cxf/commit/40503a53914758759894f704bbf139ae89ace286'} |
Maven | GHSA-cjx7-399x-p2rj | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in micronaut-core | With a basic configuration like
```yaml
router:
static-resources:
assets:
enabled: true
mapping: /.assets/public/**
paths: file:/home/lstrmiska/test/
```
it is possible to access any file from a filesystem, using "/../../" in URL, as Micronaut does not restrict file access to configured paths.... | {'CVE-2021-32769'} | 2022-03-03T05:13:16.896198Z | 2021-07-26T21:15:08Z | HIGH | null | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-32769', 'https://github.com/micronaut-projects/micronaut-core/security/advisories/GHSA-cjx7-399x-p2rj', 'https://github.com/micronaut-projects/micronaut-core/commit/a0cfeb13bf1ef5d692d16d4a3b91b34b7456bb11'} | null | {'https://github.com/micronaut-projects/micronaut-core/commit/a0cfeb13bf1ef5d692d16d4a3b91b34b7456bb11'} | {'https://github.com/micronaut-projects/micronaut-core/commit/a0cfeb13bf1ef5d692d16d4a3b91b34b7456bb11'} |
Maven | GHSA-9vjp-v76f-g363 | SnappyFrameDecoder doesn't restrict chunk length any may buffer skippable chunks in an unnecessary way | ### Impact
The Snappy frame decoder function doesn't restrict the chunk length which may lead to excessive memory usage. Beside this it also may buffer reserved skippable chunks until the whole chunk was received which may lead to excessive memory usage as well.
This vulnerability can be triggered by supplying malicio... | {'CVE-2021-37137'} | 2022-04-22T15:47:02.537330Z | 2021-09-09T17:11:31Z | HIGH | null | {'CWE-400'} | {'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/rfb2bf8597e53364ccab212fbcbb2a4e9f0a9e1429b1dc08023c6868e@%3Cdev.tinkerpop.apache.org%3E', 'https://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0@%3Ccommits.druid.apache.org%3E', 'ht... | null | {'https://github.com/netty/netty/commit/6da4956b31023ae967451e1d94ff51a746a9194f'} | {'https://github.com/netty/netty/commit/6da4956b31023ae967451e1d94ff51a746a9194f'} |
Maven | GHSA-f4cj-3q3h-884r | Partial authorization bypass on document save in xwiki-platform | XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user with SCRIPT right (EDIT right before XWiki 7.4) can save a document with the right of the current user which allow accessing API requiring programming right if the current user has programming right. It has... | {'CVE-2022-23615'} | 2022-05-05T18:01:28Z | 2022-02-09T21:21:53Z | MODERATE | null | {'CWE-863'} | {'https://github.com/xwiki/xwiki-platform/commit/7ab0fe7b96809c7a3881454147598d46a1c9bbbe', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23615', 'https://github.com/xwiki/xwiki-platform', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-f4cj-3q3h-884r', 'https://jira.xwiki.org/browse/XWIKI-5024'} | null | {'https://github.com/xwiki/xwiki-platform/commit/7ab0fe7b96809c7a3881454147598d46a1c9bbbe'} | {'https://github.com/xwiki/xwiki-platform/commit/7ab0fe7b96809c7a3881454147598d46a1c9bbbe'} |
Maven | GHSA-66q9-f7ff-mmx6 | Local file inclusion vulnerability in http4s | ### Impact
This vulnerability applies to all users of:
* `org.http4s.server.staticcontent.FileService`
* `org.http4s.server.staticcontent.ResourceService`
* `org.http4s.server.staticcontent.WebjarService`
#### Path escaping
URI normalization is applied incorrectly. Requests whose path info contain `../` or `//` can... | {'CVE-2020-5280'} | 2022-03-03T05:13:32.942852Z | 2020-03-25T17:35:51Z | CRITICAL | null | {'CWE-23'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-5280', 'https://github.com/http4s/http4s/commit/752b3f63a05a31d2de4f8706877aa08d6b89efca', 'https://github.com/http4s/http4s/commit/250afddbb2e65b70ca9ddaec9d1eb3aaa56de7ec', 'https://github.com/http4s/http4s/security/advisories/GHSA-66q9-f7ff-mmx6', 'https://github.com/http4... | null | {'https://github.com/http4s/http4s/commit/b87f31b2292dabe667bec3b04ce66176c8a3e17b', 'https://github.com/http4s/http4s/commit/250afddbb2e65b70ca9ddaec9d1eb3aaa56de7ec', 'https://github.com/http4s/http4s/commit/752b3f63a05a31d2de4f8706877aa08d6b89efca'} | {'https://github.com/http4s/http4s/commit/250afddbb2e65b70ca9ddaec9d1eb3aaa56de7ec', 'https://github.com/http4s/http4s/commit/752b3f63a05a31d2de4f8706877aa08d6b89efca', 'https://github.com/http4s/http4s/commit/b87f31b2292dabe667bec3b04ce66176c8a3e17b'} |
Maven | GHSA-q42q-523g-3fwv | Cross-Site Request Forgery | This affects the package com.softwaremill.akka-http-session:core_2.13 before 0.5.11; the package com.softwaremill.akka-http-session:core_2.12 before 0.5.11; the package com.softwaremill.akka-http-session:core_2.11 before 0.5.11. For older versions, endpoints protected by randomTokenCsrfProtection could be bypassed with... | {'CVE-2020-7780'} | 2022-03-03T05:13:51.448943Z | 2022-02-09T23:06:40Z | MODERATE | null | {'CWE-352'} | {'https://github.com/softwaremill/akka-http-session/issues/77', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7780', 'https://snyk.io/vuln/SNYK-JAVA-COMSOFTWAREMILLAKKAHTTPSESSION-1045352', 'https://github.com/softwaremill/akka-http-session/commit/57f11663eecb84be03383d164f655b9c5f953b41', 'https://snyk.io/vuln/SNYK-JAVA-... | null | {'https://github.com/softwaremill/akka-http-session/commit/57f11663eecb84be03383d164f655b9c5f953b41'} | {'https://github.com/softwaremill/akka-http-session/commit/57f11663eecb84be03383d164f655b9c5f953b41'} |
Maven | GHSA-wc73-w5r9-x9pc | Cross-site Scripting in XXL-JOB | XXL-JOB 2.2.0 allows Stored XSS (in Add User) to bypass the 20-character limit via xxl-job-admin/src/main/java/com/xxl/job/admin/controller/UserController.java. | {'CVE-2020-29204'} | 2022-03-03T05:13:46.595872Z | 2021-10-12T16:41:36Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-29204', 'https://github.com/xuxueli/xxl-job', 'https://github.com/xuxueli/xxl-job/issues/2083', 'https://github.com/xuxueli/xxl-job/commit/227628567354d3c156951009d683c6fec3006e0e'} | null | {'https://github.com/xuxueli/xxl-job/commit/227628567354d3c156951009d683c6fec3006e0e'} | {'https://github.com/xuxueli/xxl-job/commit/227628567354d3c156951009d683c6fec3006e0e'} |
Maven | GHSA-5mg8-w23w-74h3 | Information Disclosure in Guava | A temp directory creation vulnerability exists in all Guava versions allowing an attacker with access to the machine to potentially access data in a temporary directory created by the Guava `com.google.common.io.Files.createTempDir()`. The permissions granted to the directory created default to the standard unix-like /... | {'CVE-2020-8908'} | 2022-04-26T21:00:16.020771Z | 2021-03-25T17:04:19Z | LOW | null | {'CWE-732', 'CWE-200', 'CWE-173'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-8908', 'https://lists.apache.org/thread.html/reebbd63c25bc1a946caa419cec2be78079f8449d1af48e52d47c9e85@%3Cissues.geode.apache.org%3E', 'https://lists.apache.org/thread.html/r6874dfe26eefc41b7c9a5e4a0487846fc4accf8c78ff948b24a1104a@%3Cdev.drill.apache.org%3E', 'https://lists.a... | null | {'https://github.com/google/guava/commit/fec0dbc4634006a6162cfd4d0d09c962073ddf40'} | {'https://github.com/google/guava/commit/fec0dbc4634006a6162cfd4d0d09c962073ddf40'} |
Maven | GHSA-mvqp-q37c-wf9j | Moderate severity vulnerability that affects io.ratpack:ratpack-core | ## CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting')
Versions of Ratpack 0.9.1 through and including 1.7.4 are vulnerable to [HTTP Response Splitting](https://www.owasp.org/index.php/HTTP_Response_Splitting),
if untrusted and unsanitized data is used to populate the header... | {'CVE-2019-17513'} | 2022-03-03T05:13:42.988026Z | 2019-10-21T16:08:43Z | HIGH | null | {'CWE-74'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-17513', 'https://github.com/ratpack/ratpack', 'https://github.com/ratpack/ratpack/releases/tag/v1.7.5', 'https://github.com/ratpack/ratpack/commit/efb910d38a96494256f36675ef0e5061097dd77d', 'https://github.com/ratpack/ratpack/commit/c560a8d10cb8bdd7a526c1ca2e67c8f224ca23ae', ... | null | {'https://github.com/ratpack/ratpack/commit/efb910d38a96494256f36675ef0e5061097dd77d', 'https://github.com/ratpack/ratpack/commit/c560a8d10cb8bdd7a526c1ca2e67c8f224ca23ae'} | {'https://github.com/ratpack/ratpack/commit/c560a8d10cb8bdd7a526c1ca2e67c8f224ca23ae', 'https://github.com/ratpack/ratpack/commit/efb910d38a96494256f36675ef0e5061097dd77d'} |
Maven | GHSA-694p-xrhg-x3wm | CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request Header Injection') | ### Vulnerability
Micronaut's HTTP client is vulnerable to "HTTP Request Header Injection" due to not validating request headers passed to the client.
Example of vulnerable code:
```java
@Controller("/hello")
public class HelloController {
@Inject
@Client("/")
RxHttpClient client;
@Get("/external-e... | {'CVE-2020-7611'} | 2022-03-03T05:13:51.394878Z | 2020-03-30T20:54:55Z | CRITICAL | null | {'CWE-444'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-7611', 'https://github.com/micronaut-projects/micronaut-core', 'https://github.com/micronaut-projects/micronaut-core/security/advisories/GHSA-694p-xrhg-x3wm', 'https://snyk.io/vuln/SNYK-JAVA-IOMICRONAUT-561342', 'https://github.com/micronaut-projects/micronaut-core/commit/bc8... | null | {'https://github.com/micronaut-projects/micronaut-core/commit/6deb60b75517f80c57b42d935f07955c773b766d', 'https://github.com/micronaut-projects/micronaut-core/commit/bc855e439c4a5ced3d83195bb59d0679cbd95add', 'https://github.com/micronaut-projects/micronaut-core/commit/9d1eff5c8df1d6cda1fe00ef046729b2a6abe7f1'} | {'https://github.com/micronaut-projects/micronaut-core/commit/6deb60b75517f80c57b42d935f07955c773b766d', 'https://github.com/micronaut-projects/micronaut-core/commit/bc855e439c4a5ced3d83195bb59d0679cbd95add', 'https://github.com/micronaut-projects/micronaut-core/commit/9d1eff5c8df1d6cda1fe00ef046729b2a6abe7f1'} |
Maven | GHSA-mwm4-5qwr-g9pf | Keycloak is vulnerable to IDN homograph attack | A flaw was found in keycloak, where IDN homograph attacks are possible. This flaw allows a malicious user to register a name that already exists and then tricking an admin to grant extra privileges. The highest threat from this vulnerability is to integrity. | null | 2022-05-02T22:51:34.306966Z | 2022-04-28T21:00:31Z | LOW | null | {'CWE-284'} | {'https://github.com/keycloak/keycloak/security/advisories/GHSA-mwm4-5qwr-g9pf', 'https://github.com/keycloak/keycloak', 'https://github.com/keycloak/keycloak/commit/ac79fd0c23c6947a04073afc61e30d341498438e'} | null | {'https://github.com/keycloak/keycloak/commit/ac79fd0c23c6947a04073afc61e30d341498438e'} | {'https://github.com/keycloak/keycloak/commit/ac79fd0c23c6947a04073afc61e30d341498438e'} |
Maven | GHSA-668q-qrv7-99fm | Deserialization of Untrusted Data in logback | In logback version 1.2.7 and prior versions, an attacker with the required privileges to edit configurations files could craft a malicious configuration allowing to execute arbitrary code loaded from LDAP servers. | {'CVE-2021-42550'} | 2022-03-28T19:45:13.626788Z | 2021-12-17T20:00:50Z | MODERATE | null | {'CWE-502'} | {'https://github.com/qos-ch/logback/commit/ef4fc4186b74b45ce80d86833820106ff27edd42', 'https://github.com/qos-ch/logback/blob/1502cba4c1dfd135b2e715bc0cf80c0045d4d128/logback-site/src/site/pages/news.html', 'https://jira.qos.ch/browse/LOGBACK-1591', 'https://github.com/cn-panda/logbackRceDemo', 'https://github.com/qos-... | null | {'https://github.com/qos-ch/logback/commit/87291079a1de9369ac67e20dc70a8fdc7cc4359c', 'https://github.com/qos-ch/logback/commit/ef4fc4186b74b45ce80d86833820106ff27edd42'} | {'https://github.com/qos-ch/logback/commit/ef4fc4186b74b45ce80d86833820106ff27edd42', 'https://github.com/qos-ch/logback/commit/87291079a1de9369ac67e20dc70a8fdc7cc4359c'} |
Maven | GHSA-6pcc-3rfx-4gpm | Dom4j contains a XML Injection vulnerability | dom4j version prior to version 2.1.1 contains a CWE-91: XML Injection vulnerability in Class: Element. Methods: addElement, addAttribute that can result in an attacker tampering with XML documents through XML injection. This attack appear to be exploitable via an attacker specifying attributes or elements in the XML do... | {'CVE-2018-1000632'} | 2022-04-26T18:48:01.638175Z | 2018-10-16T17:01:25Z | HIGH | null | {'CWE-91'} | {'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://access.redhat.com/errata/RHSA-2019:1162', 'https://github.com/dom4j/dom4j/', 'https://github.com/dom4j/dom4j/commit/e598eb43d418744c4dbf62f647dd2381c9ce9387', 'https://access.redhat.com/errata/RHSA-2019:1160', 'https://access.redh... | null | {'https://github.com/dom4j/dom4j/commit/c2a99d7dee8ce7a4e5bef134bb781a6672bd8a0f', 'https://github.com/dom4j/dom4j/commit/e598eb43d418744c4dbf62f647dd2381c9ce9387'} | {'https://github.com/dom4j/dom4j/commit/e598eb43d418744c4dbf62f647dd2381c9ce9387', 'https://github.com/dom4j/dom4j/commit/c2a99d7dee8ce7a4e5bef134bb781a6672bd8a0f'} |
Maven | GHSA-gx6h-936c-vrrr | Cross site scripting in registration template in xwiki-platform | ### Impact
We found a possible XSS vector in the `registerinline.vm` template related to the `xredirect` hidden field.
This template is only used in the following conditions:
- the wiki must be open to registration for anyone
- the wiki must be closed to view for Guest users (more specifically the XWiki.Registrat... | {'CVE-2022-23622'} | 2022-02-09T23:25:44Z | 2022-02-09T23:25:44Z | HIGH | null | {'CWE-79'} | {'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gx6h-936c-vrrr', 'https://github.com/xwiki/xwiki-platform/commit/053d957d53f2a543d158f3ab651e390d2728e0b9', 'https://github.com/xwiki/xwiki-platform', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23622', 'https://jira.xwiki.org/browse/XWIKI-19291'} | null | {'https://github.com/xwiki/xwiki-platform/commit/053d957d53f2a543d158f3ab651e390d2728e0b9'} | {'https://github.com/xwiki/xwiki-platform/commit/053d957d53f2a543d158f3ab651e390d2728e0b9'} |
Maven | GHSA-fmm9-3gv8-58f4 | Improper Handling of Missing Values in kaml | ### Impact
Attackers that could provide arbitrary YAML input to an application that uses kaml could cause the application to endlessly loop while parsing the input. This could result in resource starvation and denial of service.
This only affects applications that use polymorphic serialization with the default tagged... | {'CVE-2021-39194'} | 2022-03-03T05:13:21.645961Z | 2021-09-07T23:08:40Z | MODERATE | null | {'CWE-230', 'CWE-835'} | {'https://github.com/charleskorn/kaml/', 'https://github.com/charleskorn/kaml/issues/179', 'https://github.com/charleskorn/kaml/commit/e18785d043fc6324c81e968aae9764b4b060bc6a', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39194', 'https://github.com/charleskorn/kaml/security/advisories/GHSA-fmm9-3gv8-58f4'} | null | {'https://github.com/charleskorn/kaml/commit/e18785d043fc6324c81e968aae9764b4b060bc6a'} | {'https://github.com/charleskorn/kaml/commit/e18785d043fc6324c81e968aae9764b4b060bc6a'} |
Maven | GHSA-5x3v-2gxr-59m2 | Directory traversal in Apache RocketMQ | In Apache RocketMQ 4.2.0 to 4.6.0, when the automatic topic creation in the broker is turned on by default, an evil topic like “../../../../topic2020” is sent from rocketmq-client to the broker, a topic folder will be created in the parent directory in brokers, which leads to a directory traversal vulnerability. Users ... | {'CVE-2019-17572'} | 2022-03-03T05:13:21.737252Z | 2020-07-01T17:26:15Z | MODERATE | null | {'CWE-22'} | {'https://lists.apache.org/thread.html/fdea1c5407da47a17d5522fa149a097cacded1916c1c1534d46edc6d%40%3Cprivate.rocketmq.apache.org%3E', 'https://github.com/apache/rocketmq/issues/1637', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17572', 'https://github.com/apache/rocketmq/commit/f8f6fbe4aa7f5dee937e688322628c366b12a552',... | null | {'https://github.com/apache/rocketmq/commit/f8f6fbe4aa7f5dee937e688322628c366b12a552'} | {'https://github.com/apache/rocketmq/commit/f8f6fbe4aa7f5dee937e688322628c366b12a552'} |
Maven | GHSA-4446-656p-f54g | Deserialization of Untrusted Data in Bouncy castle | Legion of the Bouncy Castle Legion of the Bouncy Castle Java Cryptography APIs version prior to version 1.60 contains a CWE-470: Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') vulnerability in XMSS/XMSS^MT private key deserialization that can result in Deserializing an XMSS/XMSS^MT p... | {'CVE-2018-1000613'} | 2022-04-27T18:01:56.807655Z | 2018-10-17T16:23:12Z | CRITICAL | null | {'CWE-502', 'CWE-470'} | {'https://github.com/bcgit/bc-java', 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00011.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000613', 'https://lists... | null | {'https://github.com/bcgit/bc-java/commit/cd98322b171b15b3f88c5ec871175147893c31e6#diff-148a6c098af0199192d6aede960f45dc', 'https://github.com/bcgit/bc-java/commit/4092ede58da51af9a21e4825fbad0d9a3ef5a223#diff-2c06e2edef41db889ee14899e12bd574'} | {'https://github.com/bcgit/bc-java/commit/cd98322b171b15b3f88c5ec871175147893c31e6#diff-148a6c098af0199192d6aede960f45dc', 'https://github.com/bcgit/bc-java/commit/4092ede58da51af9a21e4825fbad0d9a3ef5a223#diff-2c06e2edef41db889ee14899e12bd574'} |
Maven | GHSA-4gr7-qw2q-jxh6 | Cross-site Scripting in Nacos | A Cross Site Scripting (XSS) vulnerability exists in Nacos 2.0.3 in auth/users via the (1) pageSize and (2) pageNo parameters. | {'CVE-2021-44667'} | 2022-03-22T21:46:59.043224Z | 2022-03-12T00:00:27Z | MODERATE | null | {'CWE-79'} | {'https://github.com/alibaba/nacos', 'https://github.com/alibaba/nacos/issues/7359', 'https://github.com/alibaba/nacos/commit/cd6d7e33b94f24814701f3faf8b632e5e85444c5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44667'} | null | {'https://github.com/alibaba/nacos/commit/cd6d7e33b94f24814701f3faf8b632e5e85444c5'} | {'https://github.com/alibaba/nacos/commit/cd6d7e33b94f24814701f3faf8b632e5e85444c5'} |
Maven | GHSA-7chv-rrw6-w6fc | XStream is vulnerable to a Remote Command Execution attack | ### Impact
The vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.
### Patches
... | {'CVE-2021-29505'} | 2022-04-22T16:01:59.255632Z | 2021-05-18T18:36:27Z | HIGH | null | {'CWE-502', 'CWE-74', 'CWE-94'} | {'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://www.debian.org/security/2021/dsa-5004', 'https://github.com/x-stream/xstream', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29505', 'https://lists.debian.org/debian-lts-announce/2021/07/msg00004.html', 'https://x-stream.github.io/CVE-2021-29505.html', 'h... | null | {'https://github.com/x-stream/xstream/commit/24fac82191292c6ae25f94508d28b9823f83624f'} | {'https://github.com/x-stream/xstream/commit/24fac82191292c6ae25f94508d28b9823f83624f'} |
Maven | GHSA-cmx4-p4v5-hmr5 | Server-side request forgery (SSRF) in Apache Batik | Apache Batik is vulnerable to server-side request forgery, caused by improper input validation by the "xlink:href" attributes. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests. | {'CVE-2019-17566'} | 2022-03-03T05:13:03.743431Z | 2022-02-09T00:46:46Z | HIGH | null | {'CWE-20', 'CWE-918'} | {'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/apache/xmlgraphics-batik/commit/bc6078ca949039e2076cd08b4cb169c84c1179b1', 'https://xmlgraphics.apache.org/security.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://issues.apache.org/jira/browse/BATIK-1276', 'https:/... | null | {'https://github.com/apache/xmlgraphics-batik/commit/bc6078ca949039e2076cd08b4cb169c84c1179b1'} | {'https://github.com/apache/xmlgraphics-batik/commit/bc6078ca949039e2076cd08b4cb169c84c1179b1'} |
Maven | GHSA-2jx8-v4hv-gx3h | XXE vulnerability in Launch import | | Release Date | Affected Projects | Affected Versions | Access Vector| Security Risk |
|--------------|-------------------|-------------------|---------------|---------------|
| Monday, May 4, 2020| [service-api](https://github.com/reportportal/service-api) | Every version, starting from 3.1.0 | Remote | Medium |
###... | {'CVE-2020-12642'} | 2022-03-03T05:14:09.263133Z | 2021-06-28T16:45:47Z | HIGH | null | {'CWE-611'} | {'https://github.com/reportportal/service-api/pull/1201', 'https://github.com/reportportal/reportportal', 'https://github.com/reportportal/reportportal/security/advisories/GHSA-2jx8-v4hv-gx3h', 'https://nvd.nist.gov/vuln/detail/CVE-2020-12642', 'https://github.com/reportportal/service-api/commit/da4a012abdcc69f02f4255d... | null | {'https://github.com/reportportal/service-api/commit/da4a012abdcc69f02f4255d81466f1f473b7f418'} | {'https://github.com/reportportal/service-api/commit/da4a012abdcc69f02f4255d81466f1f473b7f418'} |
Maven | GHSA-2jhm-qp48-hv5j | Missing authorization in xwiki-platform | ### Impact
Any user with SCRIPT right (EDIT right before XWiki 7.4) can read any file located in the XWiki WAR (for example xwiki.cfg and xwiki.properties) through XWiki#invokeServletAndReturnAsString:
```
$xwiki.invokeServletAndReturnAsString("/WEB-INF/xwiki.cfg")
```
### Patches
It has been patched in XWiki versi... | {'CVE-2022-23621'} | 2022-02-09T21:56:05Z | 2022-02-09T21:56:05Z | MODERATE | null | {'CWE-862'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-23621', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-2jhm-qp48-hv5j', 'https://github.com/xwiki/xwiki-platform', 'https://jira.xwiki.org/browse/XWIKI-18870', 'https://github.com/xwiki/xwiki-platform/commit/df8bd49b5a4d87a427002c6535fb5b1746ff117a'} | null | {'https://github.com/xwiki/xwiki-platform/commit/df8bd49b5a4d87a427002c6535fb5b1746ff117a'} | {'https://github.com/xwiki/xwiki-platform/commit/df8bd49b5a4d87a427002c6535fb5b1746ff117a'} |
Maven | GHSA-x64g-4xx9-fh6x | Denial of Service in Cryptacular | CiphertextHeader.java in Cryptacular before 1.2.4, as used in Apereo CAS and other products, allows attackers to trigger excessive memory allocation during a decode operation, because the nonce array length associated with "new byte" may depend on untrusted input within the header of encoded data. | {'CVE-2020-7226'} | 2022-04-22T18:30:43.107186Z | 2020-06-10T20:02:58Z | HIGH | null | {'CWE-770'} | {'https://lists.apache.org/thread.html/r380781f5b489cb3c818536cd3b3757e806bfe0bca188591e0051ac03@%3Ccommits.ws.apache.org%3E', 'https://lists.apache.org/thread.html/r0847c7eb78c8f9e87d5b841fbd5da52b2ad4b4345e04b51c30621d88@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/re04e4f8f0d095387fb6b0ff90... | null | {'https://github.com/apereo/cas/commit/93b1c3e9d90e36a19d0fa0f6efb863c6f0235e75', 'https://github.com/apereo/cas/commit/a042808d6adbbf44753d52c55cac5f533e24101f', 'https://github.com/vt-middleware/cryptacular/commit/311baf12252abf21947afd07bf0a0291ec3ec796', 'https://github.com/apereo/cas/commit/8810f2b6c71d73341d4dde6... | {'https://github.com/apereo/cas/commit/a042808d6adbbf44753d52c55cac5f533e24101f', 'https://github.com/apereo/cas/commit/8810f2b6c71d73341d4dde6b09a18eb46cfd6d45', 'https://github.com/vt-middleware/cryptacular/commit/311baf12252abf21947afd07bf0a0291ec3ec796', 'https://github.com/apereo/cas/commit/93b1c3e9d90e36a19d0fa0f... |
Maven | GHSA-j7m2-58wv-9v79 | Vulnerability in Torpedo Query | Torpedo Query before 2.5.3 mishandles the LIKE operator in ConditionBuilder.java, LikeCondition.java, and NotLikeCondition.java. | {'CVE-2019-11343'} | 2022-03-03T05:13:02.028405Z | 2022-02-10T20:47:29Z | CRITICAL | null | null | {'https://github.com/xjodoin/torpedoquery/compare/v2.5.2...v2.5.3', 'https://github.com/xjodoin/torpedoquery/commit/3c20b874fba9cc2a78b9ace10208de1602b56c3f', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11343', 'https://github.com/xjodoin/torpedoquery/'} | null | {'https://github.com/xjodoin/torpedoquery/commit/3c20b874fba9cc2a78b9ace10208de1602b56c3f'} | {'https://github.com/xjodoin/torpedoquery/commit/3c20b874fba9cc2a78b9ace10208de1602b56c3f'} |
Maven | GHSA-7q8g-gpfp-v8gx | Insertion of Sensitive Information into Log File in Apache NiFi | In Apache NiFi 0.0.1 to 1.11.0, the flow fingerprint factory generated flow fingerprints which included sensitive property descriptor values. In the event a node attempted to join a cluster and the cluster flow was not inheritable, the flow fingerprint of both the cluster and local flow was printed, potentially contain... | {'CVE-2020-1942'} | 2022-03-03T05:13:01.375961Z | 2022-01-06T20:40:58Z | HIGH | null | {'CWE-532', 'CWE-200'} | {'https://nifi.apache.org/security.html#CVE-2020-1942', 'https://github.com/apache/nifi/commit/d7c29f46378379fb596e4d1e59d1a3c41063db5b', 'https://github.com/apache/nifi/commit/95746d346cddbd6134c4b28fdc39d5813a626f97', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1942'} | null | {'https://github.com/apache/nifi/commit/95746d346cddbd6134c4b28fdc39d5813a626f97', 'https://github.com/apache/nifi/commit/d7c29f46378379fb596e4d1e59d1a3c41063db5b'} | {'https://github.com/apache/nifi/commit/d7c29f46378379fb596e4d1e59d1a3c41063db5b', 'https://github.com/apache/nifi/commit/95746d346cddbd6134c4b28fdc39d5813a626f97'} |
Maven | GHSA-w8rc-pgxq-x2cj | Negative charge in shopping cart in Shopizer | ### Impact
Using API or Controller based versions negative quantity is not adequately validated hence creating incorrect shopping cart and order total.
### Patches
Adding a back-end verification to check that quantity parameter isn't negative. If so, it is set to 1. Patched in 2.11.0
### Workarounds
Without uprading... | {'CVE-2020-11007'} | 2022-03-03T05:14:17.425427Z | 2020-04-22T20:59:26Z | CRITICAL | null | {'CWE-20'} | {'https://github.com/shopizer-ecommerce/shopizer/commit/929ca0839a80c6f4dad087e0259089908787ad2a', 'https://github.com/shopizer-ecommerce/shopizer/security/advisories/GHSA-w8rc-pgxq-x2cj', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11007'} | null | {'https://github.com/shopizer-ecommerce/shopizer/commit/929ca0839a80c6f4dad087e0259089908787ad2a'} | {'https://github.com/shopizer-ecommerce/shopizer/commit/929ca0839a80c6f4dad087e0259089908787ad2a'} |
Maven | GHSA-f256-j965-7f32 | Possible request smuggling in HTTP/2 due missing validation of content-length | ### Impact
The content-length header is not correctly validated if the request only use a single Http2HeaderFrame with the endStream set to to true. This could lead to request smuggling if the request is proxied to a remote peer and translated to HTTP/1.1
This is a followup of https://github.com/netty/netty/security/a... | {'CVE-2021-21409'} | 2022-04-22T16:01:59.493412Z | 2021-03-30T15:10:38Z | MODERATE | null | {'CWE-444'} | {'https://lists.apache.org/thread.html/r69efd8ef003f612c43e4154e788ca3b1f837feaacd16d97854402355@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/redef0fb5474fd686781007de9ddb852b24f1b04131a248d9a4789183@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r101f82d8... | null | {'https://github.com/netty/netty/commit/b0fa4d5aab4215f3c22ce6123dd8dd5f38dc0432'} | {'https://github.com/netty/netty/commit/b0fa4d5aab4215f3c22ce6123dd8dd5f38dc0432'} |
Maven | GHSA-w4fj-ccr6-7pcp | Insertion of Sensitive Information into Log File in Apache NiFi | An information disclosure vulnerability was found in Apache NiFi 1.10.0. The sensitive parameter parser would log parsed values for debugging purposes. This would expose literal values entered in a sensitive property when no parameter was present. | {'CVE-2020-1928'} | 2022-01-04T19:51:02Z | 2022-01-06T20:40:56Z | MODERATE | null | {'CWE-532', 'CWE-200'} | {'https://lists.apache.org/thread.html/rd50baccd1bbb96c2327d5a8caa25a49692b3d68d96915bd1cfbb9f8b@%3Cusers.tomcat.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1928', 'https://github.com/apache/nifi/commit/42cb6e84898e66672878f61f99543d6af3c0a567', 'https://nifi.apache.org/security.html#CVE-2020-1928', 'htt... | null | {'https://github.com/apache/nifi/commit/42cb6e84898e66672878f61f99543d6af3c0a567'} | {'https://github.com/apache/nifi/commit/42cb6e84898e66672878f61f99543d6af3c0a567'} |
Maven | GHSA-57j2-w4cx-62h2 | Deeply nested json in jackson-databind | jackson-databind is a data-binding package for the Jackson Data Processor. jackson-databind allows a Java stack overflow exception and denial of service via a large depth of nested objects. | {'CVE-2020-36518'} | 2022-03-28T20:01:54.218311Z | 2022-03-12T00:00:36Z | HIGH | null | {'CWE-787'} | {'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.13', 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.12', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36518', 'https://github.com/FasterXML/jackson-databind/issues/2816', 'https://github.com/FasterXML/jackson-databind', 'https://github.com/Faster... | null | {'https://github.com/FasterXML/jackson-databind/commit/fcfc4998ec23f0b1f7f8a9521c2b317b6c25892b'} | {'https://github.com/FasterXML/jackson-databind/commit/fcfc4998ec23f0b1f7f8a9521c2b317b6c25892b'} |
Maven | GHSA-8jpx-m2wh-2v34 | Remote Code Execution (RCE) vulnerability in dropwizard-validation | ### Summary
A server-side template injection was identified in the self-validating ([`@SelfValidating`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.3/io/dropwizard/validation/selfvalidating/SelfValidating.html)) feature of **dropwizard-validation** enabling attackers to inject arbitrary Java EL expr... | {'CVE-2020-11002'} | 2022-03-03T05:13:54.974005Z | 2020-04-10T18:42:20Z | HIGH | null | {'CWE-74'} | {'https://docs.jboss.org/hibernate/validator/6.1/reference/en-US/html_single/#section-hibernateconstraintvalidatorcontext', 'https://github.com/dropwizard/dropwizard/security/policy#reporting-a-vulnerability', 'https://github.com/dropwizard/dropwizard/security/advisories/GHSA-8jpx-m2wh-2v34', 'https://github.com/dropwi... | null | {'https://github.com/dropwizard/dropwizard/commit/d5a512f7abf965275f2a6b913ac4fe778e424242'} | {'https://github.com/dropwizard/dropwizard/commit/d5a512f7abf965275f2a6b913ac4fe778e424242'} |
Maven | GHSA-q7q9-w24q-cpgh | Cross-site Scripting (XSS) in Apache Ambari Views | A cross-site scripting issue was found in Apache Ambari Views. This was addressed in Apache Ambari 2.7.4. | {'CVE-2020-1936'} | 2022-03-03T05:13:02.068224Z | 2022-01-06T20:35:22Z | MODERATE | null | {'CWE-79'} | {'https://github.com/apache/ambari/pull/3040', 'https://issues.apache.org/jira/browse/AMBARI-25329', 'http://www.openwall.com/lists/oss-security/2021/03/02/1', 'https://github.com/apache/ambari/pull/3040/commits/a9cfdb9dcce63a3494c07c81ebb2cf8da218a210', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1936', 'https://lists.... | null | {'https://github.com/apache/ambari/pull/3040/commits/a9cfdb9dcce63a3494c07c81ebb2cf8da218a210'} | {'https://github.com/apache/ambari/pull/3040/commits/a9cfdb9dcce63a3494c07c81ebb2cf8da218a210'} |
Maven | GHSA-hxxp-6546-wv6r | Improper Restriction of XML External Entity Reference | Jenkins Selenium HTML report Plugin 1.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | {'CVE-2021-21672'} | 2022-04-19T18:30:08.852585Z | 2021-07-02T18:36:13Z | MODERATE | null | {'CWE-611'} | {'https://www.jenkins.io/security/advisory/2021-06-30/#SECURITY-2329', 'http://www.openwall.com/lists/oss-security/2021/06/30/1', 'http://www.openwall.com/lists/oss-security/2022/04/14/2', 'https://github.com/jenkinsci/seleniumhtmlreport-plugin/commit/5ca59b8c7d23af4450dc7f19c1b4107d59063ae1', 'https://nvd.nist.gov/vul... | null | {'https://github.com/jenkinsci/seleniumhtmlreport-plugin/commit/5ca59b8c7d23af4450dc7f19c1b4107d59063ae1'} | {'https://github.com/jenkinsci/seleniumhtmlreport-plugin/commit/5ca59b8c7d23af4450dc7f19c1b4107d59063ae1'} |
Maven | GHSA-vjv6-gq77-3mjw | XXE attack in Mapfish Print | ### Impact
A user can do to an XML External Entity (XXE) attack with the provided SDL style.
### Patches
Use version >= 3.24
### Workarounds
No
### References
* https://cwe.mitre.org/data/definitions/611.html
* https://github.com/mapfish/mapfish-print/pull/1397/commits/e1d0527d13db06b2b62ca7d6afb9e97dacd67a0e
### F... | {'CVE-2020-15232'} | 2022-03-03T05:12:58.870464Z | 2020-07-07T16:32:45Z | LOW | null | {'CWE-611'} | {'https://github.com/mapfish/mapfish-print/security/advisories/GHSA-vjv6-gq77-3mjw', 'https://github.com/mapfish/mapfish-print/pull/1397/commits/e1d0527d13db06b2b62ca7d6afb9e97dacd67a0e', 'https://github.com/mapfish/mapfish-print/pull/1397', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15232'} | null | {'https://github.com/mapfish/mapfish-print/pull/1397/commits/e1d0527d13db06b2b62ca7d6afb9e97dacd67a0e'} | {'https://github.com/mapfish/mapfish-print/pull/1397/commits/e1d0527d13db06b2b62ca7d6afb9e97dacd67a0e'} |
Maven | GHSA-x2p8-rgfm-qw3v | Access Control vulnerability within CoreNLP | An Incorrect Access Control vulnerability exists in CoreNLP 4.3.2 via the classifier in NERServlet.java (lines 158 and 159). | {'CVE-2021-44550'} | 2022-03-07T20:47:22.182725Z | 2022-02-25T00:01:07Z | CRITICAL | null | {'CWE-863'} | {'https://github.com/stanfordnlp/CoreNLP', 'https://github.com/stanfordnlp/CoreNLP/issues/1222', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44550', 'https://github.com/stanfordnlp/CoreNLP/commit/5ee097dbede547023e88f60ed3f430ff09398b87'} | null | {'https://github.com/stanfordnlp/CoreNLP/commit/5ee097dbede547023e88f60ed3f430ff09398b87'} | {'https://github.com/stanfordnlp/CoreNLP/commit/5ee097dbede547023e88f60ed3f430ff09398b87'} |
Maven | GHSA-6g3c-2mh5-7q6x | Missing validation of JWT signature in `ManyDesigns/Portofino` | ### Impact
https://github.com/ManyDesigns/Portofino before version 5.2.1 did not properly verify the signature of JSON Web Tokens.
This allows forging a valid JWT.
### Patches
The issue will be patched in the upcoming 5.2.1 release.
### For more information
If you have any questions or comments about this advisory:
*... | {'CVE-2021-29451'} | 2022-03-03T05:13:03.766772Z | 2021-04-19T14:56:33Z | CRITICAL | null | {'CWE-347'} | {'https://github.com/ManyDesigns/Portofino/commit/8c754a0ad234555e813dcbf9e57d637f9f23d8fb', 'https://github.com/ManyDesigns/Portofino/security/advisories/GHSA-6g3c-2mh5-7q6x', 'https://mvnrepository.com/artifact/com.manydesigns/portofino', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29451'} | null | {'https://github.com/ManyDesigns/Portofino/commit/8c754a0ad234555e813dcbf9e57d637f9f23d8fb'} | {'https://github.com/ManyDesigns/Portofino/commit/8c754a0ad234555e813dcbf9e57d637f9f23d8fb'} |
Maven | GHSA-w534-q4xf-h5v2 | XSS in Mapfish Print relating to JSONP support | ### Impact
A user can use the JSONP support to do a Cross-site scripting.
### Patches
Use version >= 3.24
### Workarounds
No
### References
* https://github.com/mapfish/mapfish-print/pull/1397/commits/89155f2506b9cee822e15ce60ccae390a1419d5e
* https://cwe.mitre.org/data/definitions/79.html
### For more information
... | {'CVE-2020-15231'} | 2022-03-03T05:13:46.438056Z | 2020-07-07T16:32:49Z | LOW | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-15231', 'https://github.com/mapfish/mapfish-print/pull/1397/commits/89155f2506b9cee822e15ce60ccae390a1419d5e', 'https://github.com/mapfish/mapfish-print/security/advisories/GHSA-w534-q4xf-h5v2'} | null | {'https://github.com/mapfish/mapfish-print/pull/1397/commits/89155f2506b9cee822e15ce60ccae390a1419d5e'} | {'https://github.com/mapfish/mapfish-print/pull/1397/commits/89155f2506b9cee822e15ce60ccae390a1419d5e'} |
Maven | GHSA-8m5h-hrqm-pxm2 | Path traversal in the OWASP Enterprise Security API | ### Impact
The default implementation of `Validator.getValidDirectoryPath(String, String, File, boolean)` may incorrectly treat the tested input string as a child of the specified parent directory. This potentially could allow control-flow bypass checks to be defeated if an attack can specify the entire string represen... | {'CVE-2022-23457'} | 2022-04-27T21:16:48.750511Z | 2022-04-27T21:09:43Z | HIGH | null | {'CWE-22'} | {'https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/GHSL-2022-008_The_OWASP_Enterprise_Security_API.md', 'https://securitylab.github.com/advisories/GHSL-2022-008_The_OWASP_Enterprise_Security_API/', 'https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/esapi4java-core-2.3.0.0-releas... | null | {'https://github.com/ESAPI/esapi-java-legacy/commit/a0d67b75593878b1b6e39e2acc1773b3effedb2a'} | {'https://github.com/ESAPI/esapi-java-legacy/commit/a0d67b75593878b1b6e39e2acc1773b3effedb2a'} |
Maven | GHSA-9hx8-2mrv-r674 | Deserialization of Untrusted Data in Apache jUDDI | Apache jUDDI uses several classes related to Java's Remote Method Invocation (RMI) which (as an extension to UDDI) provides an alternate transport for accessing UDDI services.
RMI uses the default Java serialization mechanism to pass parameters in RMI invocations. A remote attacker can send a malicious serialized obje... | {'CVE-2021-37578'} | 2022-03-03T05:14:09.020775Z | 2021-08-09T20:41:37Z | CRITICAL | null | {'CWE-502'} | {'https://lists.apache.org/thread.html/r82047b3ba774cf870ea8e1e9ec51c6107f6cd056d4e36608148c6e71%40%3Cprivate.juddi.apache.org%3E', 'https://github.com/apache/juddi/commit/dd880ffe7694a70cee75efeee79c9197d261866f', 'https://github.com/apache/juddi', 'http://www.openwall.com/lists/oss-security/2021/07/29/1', 'https://nv... | null | {'https://github.com/apache/juddi/commit/dd880ffe7694a70cee75efeee79c9197d261866f'} | {'https://github.com/apache/juddi/commit/dd880ffe7694a70cee75efeee79c9197d261866f'} |
Maven | GHSA-q6w2-89hq-hq27 | Cross-site scripting in keycloak | A flaw was found in keycloak in versions before 13.0.0. A Self Stored XSS attack vector escalating to a complete account takeover is possible due to user-supplied data fields not being properly encoded and Javascript code being used to process the data. The highest threat from this vulnerability is to data confidential... | {'CVE-2021-20195'} | 2022-03-03T05:13:34.212953Z | 2021-06-08T23:02:43Z | CRITICAL | null | {'CWE-20', 'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-20195', 'https://github.com/keycloak/keycloak/commit/717d9515fa131e3d8c8936e41b2e52270fdec976', 'https://bugzilla.redhat.com/show_bug.cgi?id=1919143'} | null | {'https://github.com/keycloak/keycloak/commit/717d9515fa131e3d8c8936e41b2e52270fdec976'} | {'https://github.com/keycloak/keycloak/commit/717d9515fa131e3d8c8936e41b2e52270fdec976'} |
Maven | GHSA-hcxx-mp6g-6gr9 | Opencast publishes global system account credentials | The issue was mostly mitigated before, drastically reducing the risk. See references below for more information.
### Impact
Opencast before version 10.6 will try to authenticate against any external services listed in a media package when it is trying to access the files, sending the global system user's credentials,... | {'CVE-2018-16153'} | 2022-03-03T05:13:34.748719Z | 2021-12-14T21:43:48Z | LOW | null | {'CWE-522', 'CWE-200'} | {'https://github.com/opencast/opencast/security/advisories/GHSA-hcxx-mp6g-6gr9', 'https://github.com/opencast/opencast', 'https://github.com/opencast/opencast/commit/776d5588f39c61eb04c03bb955416c4f77629d51', 'https://docs.opencast.org/r/10.x/admin/#changelog/#opencast-106'} | null | {'https://github.com/opencast/opencast/commit/776d5588f39c61eb04c03bb955416c4f77629d51'} | {'https://github.com/opencast/opencast/commit/776d5588f39c61eb04c03bb955416c4f77629d51'} |
Maven | GHSA-fxp8-7h5w-h235 | XSS in search engine | In the Alkacon OpenCms Apollo Template 10.5.4 and 10.5.5, there is XSS in the search engine. | {'CVE-2019-13234'} | 2022-03-03T05:12:50.658509Z | 2019-11-12T22:58:11Z | MODERATE | null | {'CWE-79'} | {'https://aetsu.github.io/OpenCms', 'https://github.com/alkacon/apollo-template/commits/branch_10_5_x', 'http://packetstormsecurity.com/files/154298/Alkacon-OpenCMS-10.5.x-Cross-Site-Scripting.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13234'} | null | {'https://github.com/alkacon/apollo-template/commits/branch_10_5_x'} | {'https://github.com/alkacon/apollo-template/commits/branch_10_5_x'} |
Maven | GHSA-c4rh-4376-gff4 | Improper certificate management in AWS IoT Device SDK v2 | The AWS IoT Device SDK v2 for Java, Python, C++ and Node.js appends a user supplied Certificate Authority (CA) to the root CAs instead of overriding it on Unix systems. TLS handshakes will thus succeed if the peer can be verified either from the user-supplied CA or the system’s default trust-store. Attackers with acces... | {'CVE-2021-40830'} | 2022-03-03T05:13:15.678455Z | 2021-11-24T21:12:04Z | MODERATE | null | {'CWE-295'} | {'https://github.com/aws/aws-iot-device-sdk-python-v2/commit/0450ce68add7e3d05c6d781ecdac953c299c053a', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40830', 'https://github.com/aws/aws-iot-device-sdk-java-v2/commit/67950ad2a02f2f9355c310b69dc9226b017f32f2', 'https://github.com/awslabs/aws-c-io/', 'https://github.com/aws/... | null | {'https://github.com/aws/aws-iot-device-sdk-java-v2/commit/67950ad2a02f2f9355c310b69dc9226b017f32f2', 'https://github.com/aws/aws-iot-device-sdk-js-v2/commit/53a36e3ac203291494120604d416b6de59177cac', 'https://github.com/aws/aws-iot-device-sdk-python-v2/commit/0450ce68add7e3d05c6d781ecdac953c299c053a'} | {'https://github.com/aws/aws-iot-device-sdk-java-v2/commit/67950ad2a02f2f9355c310b69dc9226b017f32f2', 'https://github.com/aws/aws-iot-device-sdk-python-v2/commit/0450ce68add7e3d05c6d781ecdac953c299c053a', 'https://github.com/aws/aws-iot-device-sdk-js-v2/commit/53a36e3ac203291494120604d416b6de59177cac'} |
Maven | GHSA-5mcr-gq6c-3hq2 | Local Information Disclosure Vulnerability in Netty on Unix-Like systems | ### Impact
When netty's multipart decoders are used local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk is enabled.
The CVSSv3.1 score of this vulnerability is calculated to be a [6.2/10](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=A... | {'CVE-2021-21290'} | 2022-04-22T18:30:10.165346Z | 2021-02-08T21:17:48Z | MODERATE | null | {'CWE-668', 'CWE-379', 'CWE-378'} | {'https://github.com/netty/netty/security/advisories/GHSA-5mcr-gq6c-3hq2', 'https://lists.apache.org/thread.html/r4efed2c501681cb2e8d629da16e48d9eac429624fd4c9a8c6b8e7020@%3Cdev.tinkerpop.apache.org%3E', 'https://lists.apache.org/thread.html/ra0fc2b4553dd7aaf75febb61052b7f1243ac3a180a71c01f29093013@%3Cjira.kafka.apache... | null | {'https://github.com/netty/netty/commit/c735357bf29d07856ad171c6611a2e1a0e0000ec'} | {'https://github.com/netty/netty/commit/c735357bf29d07856ad171c6611a2e1a0e0000ec'} |
Maven | GHSA-2j6v-xpf3-xvrv | Use of Externally-Controlled Format String in wire-avs | ### Impact
A remote format string vulnerability allowed an attacker to cause a denial of service or possibly execute arbitrary code.
### Patches
* The issue has been fixed in wire-avs 7.1.12 and is already included on all Wire products (currently used version is 8.0.x)
### Workarounds
* No workaround known
### Refer... | {'CVE-2021-41193'} | 2022-03-10T15:59:41Z | 2022-03-01T18:58:23Z | HIGH | null | {'CWE-134'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-41193', 'https://github.com/wireapp/wire-avs/', 'https://github.com/wireapp/wire-avs/commit/40d373ede795443ae6f2f756e9fb1f4f4ae90bbe', 'https://github.com/wireapp/wire-avs/security/advisories/GHSA-2j6v-xpf3-xvrv'} | null | {'https://github.com/wireapp/wire-avs/commit/40d373ede795443ae6f2f756e9fb1f4f4ae90bbe'} | {'https://github.com/wireapp/wire-avs/commit/40d373ede795443ae6f2f756e9fb1f4f4ae90bbe'} |
Maven | GHSA-5mh9-r3rr-9597 | Code execution vulnerability in HtmlUnit | HtmlUnit prior to 2.37.0 contains code execution vulnerabilities. HtmlUnit initializes Rhino engine improperly, hence a malicious JavScript code can execute arbitrary Java code on the application. Moreover, when embedded in Android application, Android-specific initialization of Rhino engine is done in an improper way,... | {'CVE-2020-5529'} | 2022-03-03T05:11:14.726392Z | 2020-05-21T21:08:33Z | HIGH | null | {'CWE-665'} | {'https://github.com/HtmlUnit/htmlunit/commit/bc1f58d483cc8854a9c4c1739abd5e04a2eb0367', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5529', 'https://github.com/HtmlUnit/htmlunit', 'https://jvn.jp/en/jp/JVN34535327/', 'https://usn.ubuntu.com/4584-1/', 'https://lists.apache.org/thread.html/ra2cd7f8e61dc6b8a2d9065094cd1f46... | null | {'https://github.com/HtmlUnit/htmlunit/commit/bc1f58d483cc8854a9c4c1739abd5e04a2eb0367'} | {'https://github.com/HtmlUnit/htmlunit/commit/bc1f58d483cc8854a9c4c1739abd5e04a2eb0367'} |
Maven | GHSA-883x-6fch-6wjx | Trust Boundary Violation due to Incomplete Blacklist in Test Failure Processing in Ares | ### Impact
This allows an attacker to create special subclasses of `InvocationTargetException` that escape the exception sanitization because JUnit extracts the cause in a trusted context before the exception reaches Ares. This means that arbitrary student code can be executed in a trusted context, and that in turn all... | null | 2022-03-03T05:14:11.617255Z | 2022-01-21T23:39:19Z | HIGH | null | null | {'https://github.com/ls1intum/Ares/commit/af4f28a56e2fe600d8750b3b415352a0a3217392', 'https://github.com/ls1intum/Ares/security/advisories/GHSA-883x-6fch-6wjx', 'https://github.com/ls1intum/Ares/releases/tag/1.7.6', 'https://github.com/ls1intum/Ares', 'https://github.com/ls1intum/Ares/issues/15#issuecomment-996449371'} | null | {'https://github.com/ls1intum/Ares/commit/af4f28a56e2fe600d8750b3b415352a0a3217392'} | {'https://github.com/ls1intum/Ares/commit/af4f28a56e2fe600d8750b3b415352a0a3217392'} |
Maven | GHSA-v6w3-2prq-h95f | Improper Input Validation in Jakarta Expression Language | In the Jakarta Expression Language implementation 3.0.3 and earlier, a bug in the ELParserTokenManager enables invalid EL expressions to be evaluated as if they were valid. | {'CVE-2021-28170'} | 2022-04-26T18:16:59.623718Z | 2021-10-06T17:48:38Z | MODERATE | null | {'CWE-917', 'CWE-20'} | {'https://github.com/eclipse-ee4j/el-ri/pull/160/commits/b6a3943ac5fba71cbc6719f092e319caa747855b', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/eclipse-ee4j/el-ri', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28170', 'https://securitylab.github.com/advisories/GHSL-2020-021-jakarta-el/',... | null | {'https://github.com/eclipse-ee4j/el-ri/pull/160/commits/b6a3943ac5fba71cbc6719f092e319caa747855b'} | {'https://github.com/eclipse-ee4j/el-ri/pull/160/commits/b6a3943ac5fba71cbc6719f092e319caa747855b'} |
Maven | GHSA-3mqv-8gxg-pfm4 | Cross-site scripting in twitter-server | server/handler/HistogramQueryHandler.scala in Twitter TwitterServer (aka twitter-server) before 20.12.0, in some configurations, allows XSS via the /histograms endpoint. | {'CVE-2020-35774'} | 2022-03-03T05:12:37.366113Z | 2022-02-09T22:37:28Z | MODERATE | null | {'CWE-79'} | {'https://advisory.checkmarx.net/advisory/CX-2020-4287', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35774', 'https://github.com/twitter/twitter-server/commit/e0aeb87e89a6e6c711214ee2de0dd9f6e5f9cb6c', 'https://github.com/twitter/twitter-server/compare/twitter-server-20.10.0...twitter-server-20.12.0'} | null | {'https://github.com/twitter/twitter-server/commit/e0aeb87e89a6e6c711214ee2de0dd9f6e5f9cb6c'} | {'https://github.com/twitter/twitter-server/commit/e0aeb87e89a6e6c711214ee2de0dd9f6e5f9cb6c'} |
Maven | GHSA-24wf-7vf2-pv59 | XXE vulnerability on Launch import with externally-defined DTD file | ### Impact
Starting from version 3.1.0 we introduced a new feature of JUnit XML launch import. Unfortunately XML parser was not configured properly to prevent XML external entity (XXE) attacks. This allows a user to import a specifically-crafted XML file which imports external Document Type Definition (DTD) file with e... | {'CVE-2021-29620'} | 2022-03-03T05:14:13.171729Z | 2021-06-28T16:38:29Z | HIGH | null | {'CWE-611'} | {'https://github.com/reportportal/reportportal/security/advisories/GHSA-24wf-7vf2-pv59', 'https://github.com/reportportal/service-api/pull/1392', 'https://mvnrepository.com/artifact/com.epam.reportportal/service-api', 'https://github.com/reportportal/service-api/commit/a73e0dfb4eda844c37139df1f9847013d55f084e', 'https:... | null | {'https://github.com/reportportal/service-api/commit/a73e0dfb4eda844c37139df1f9847013d55f084e'} | {'https://github.com/reportportal/service-api/commit/a73e0dfb4eda844c37139df1f9847013d55f084e'} |
Maven | GHSA-29q4-gxjq-rx5c | Remote Code Execution in SCIMono | ### Impact
It is possible for attacker to inject and execute java expression and compromising the availability and integrity of the system.
### Patches
The issue was fixed on [0.0.19 version](https://mvnrepository.com/artifact/com.sap.scimono/scimono-server/0.0.19) | {'CVE-2021-21479'} | 2022-03-03T05:13:28.940958Z | 2021-02-10T02:31:53Z | HIGH | null | {'CWE-62', 'CWE-77', 'CWE-74', 'CWE-917', 'CWE-59', 'CWE-690'} | {'https://mvnrepository.com/artifact/com.sap.scimono/scimono-server/0.0.19', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21479', 'https://github.com/SAP/scimono/commit/413b5d75fa94e77876af0e47be76475a23745b80', 'https://github.com/SAP/scimono/security/advisories/GHSA-29q4-gxjq-rx5c'} | null | {'https://github.com/SAP/scimono/commit/413b5d75fa94e77876af0e47be76475a23745b80'} | {'https://github.com/SAP/scimono/commit/413b5d75fa94e77876af0e47be76475a23745b80'} |
Maven | GHSA-3gm7-v7vw-866c | XML External Entity (XXE) Injection in Apache Solr | In Apache Solr, the DataImportHandler, an optional but popular module to pull in data from databases and other sources, has a feature in which the whole DIH configuration can come from a request's "dataConfig" parameter. The debug mode of the DIH admin screen uses this to allow convenient debugging / development of a D... | {'CVE-2019-0193'} | 2022-03-03T05:13:17.001738Z | 2019-08-01T19:17:35Z | HIGH | null | {'CWE-94'} | {'https://issues.apache.org/jira/browse/SOLR-13669', 'https://lists.apache.org/thread.html/6f2d61bd8732224c5fd3bdd84798f8e01e4542d3ee2f527a52a81b83@%3Cissues.lucene.apache.org%3E', 'https://snyk.io/vuln/SNYK-JAVA-ORGAPACHESOLR-536063', 'https://lists.apache.org/thread.html/1addbb49a1fc0947fb32ca663d76d93cfaade35a4848a7... | null | {'https://github.com/apache/lucene-solr/commit/02c693f3713add1b4891cbaa87127de3a55c10f7'} | {'https://github.com/apache/lucene-solr/commit/02c693f3713add1b4891cbaa87127de3a55c10f7'} |
Maven | GHSA-rcwj-2hj2-vmjj | Insufficient Session Expiration in Apache NiFi Registry | If NiFi Registry 0.1.0 to 0.5.0 uses an authentication mechanism other than PKI, when the user clicks Log Out, NiFi Registry invalidates the authentication token on the client side but not on the server side. This permits the user's client-side token to be used for up to 12 hours after logging out to make API requests ... | {'CVE-2020-9482'} | 2022-03-03T05:13:41.527509Z | 2022-02-09T00:23:06Z | MODERATE | null | {'CWE-613'} | {'https://github.com/apache/nifi-registry/pull/277/files/9f7f1c1b1095e3facdaa986435fa94eff78627dd', 'https://github.com/apache/nifi-registry/commit/2881e29dce3a179f3e56069b82ef8cbb7bd8d85c', 'https://nifi.apache.org/registry-security.html#CVE-2020-9482', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9482'} | null | {'https://github.com/apache/nifi-registry/commit/2881e29dce3a179f3e56069b82ef8cbb7bd8d85c'} | {'https://github.com/apache/nifi-registry/commit/2881e29dce3a179f3e56069b82ef8cbb7bd8d85c'} |
Maven | GHSA-f263-c949-w85g | Improper Authorization in Google OAuth Client | PKCE support is not implemented in accordance with the RFC for OAuth 2.0 for Native Apps. Without the use of PKCE, the authorization code returned by an authorization server is not enough to guarantee that the client that issued the initial authorization request is the one that will be authorized. An attacker is able t... | {'CVE-2020-7692'} | 2022-05-04T02:37:13.286190Z | 2021-09-28T16:16:52Z | HIGH | null | {'CWE-863', 'CWE-862'} | {'https://tools.ietf.org/html/rfc8252%23section-8.1', 'https://lists.apache.org/thread.html/reae8909b264d1103f321b9ce1623c10c1ddc77dba9790247f2c0c90f@%3Ccommits.druid.apache.org%3E', 'https://github.com/googleapis/google-oauth-java-client', 'https://github.com/googleapis/google-oauth-java-client/commit/13433cd7dd06267f... | null | {'https://github.com/googleapis/google-oauth-java-client/commit/13433cd7dd06267fc261f0b1d4764f8e3432c824'} | {'https://github.com/googleapis/google-oauth-java-client/commit/13433cd7dd06267fc261f0b1d4764f8e3432c824'} |
Maven | GHSA-h362-m8f2-5x7c | Password Hashing: Do not use MD5 | ### Impact
User passwords are stored in the database using the rather outdated and cryptographically insecure MD5 hash algorithm. Furthermore, the hashes are salted using the username instead of a random salt, causing hashes for users with the same username and password to collide which is problematic especially for p... | {'CVE-2020-5229'} | 2022-03-03T05:14:06.782689Z | 2020-01-30T21:21:58Z | LOW | null | {'CWE-327'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-5229', 'https://github.com/opencast/opencast/commit/32bfbe5f78e214e2d589f92050228b91d704758e', 'https://github.com/opencast/opencast/security/advisories/GHSA-h362-m8f2-5x7c'} | null | {'https://github.com/opencast/opencast/commit/32bfbe5f78e214e2d589f92050228b91d704758e'} | {'https://github.com/opencast/opencast/commit/32bfbe5f78e214e2d589f92050228b91d704758e'} |
Maven | GHSA-cf6r-3wgc-h863 | Polymorphic deserialization of malicious object in jackson-databind | A flaw was discovered in jackson-databind in versions before 2.9.10, 2.8.11.5 and 2.6.7.3, where it would permit polymorphic deserialization of a malicious object using commons-configuration 1 and 2 JNDI classes. An attacker could use this flaw to execute arbitrary code. | {'CVE-2019-14892'} | 2022-03-03T05:13:43.282192Z | 2020-05-15T18:58:58Z | HIGH | null | {'CWE-502'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14892', 'https://access.redhat.com/errata/RHSA-2020:0729', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14892', 'https://github.com/Fa... | null | {'https://github.com/FasterXML/jackson-databind/commit/819cdbcab51c6da9fb896380f2d46e9b7d4fdc3b', 'https://github.com/FasterXML/jackson-databind/commit/41b7f9b90149e9d44a65a8261a8deedc7186f6af'} | {'https://github.com/FasterXML/jackson-databind/commit/819cdbcab51c6da9fb896380f2d46e9b7d4fdc3b', 'https://github.com/FasterXML/jackson-databind/commit/41b7f9b90149e9d44a65a8261a8deedc7186f6af'} |
Maven | GHSA-mh8g-hprg-8363 | Hard-Coded Key Used For Remember-me Token in Opencast | ### Impact
The security configuration in `etc/security/mh_default_org.xml` enables a remember-me cookie based on a hash created from the [username, password, and an additional system key](https://docs.spring.io/spring-security/site/docs/3.0.x/reference/remember-me.html). Opencast has hard-coded this system key in the ... | {'CVE-2020-5222'} | 2022-03-03T05:12:50.912934Z | 2020-01-30T21:21:44Z | MODERATE | null | {'CWE-798'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-5222', 'https://github.com/opencast/opencast/commit/1a7172c95af8d542a77ae5b153e4c834dd4788a6', 'https://github.com/opencast/opencast/security/advisories/GHSA-mh8g-hprg-8363'} | null | {'https://github.com/opencast/opencast/commit/1a7172c95af8d542a77ae5b153e4c834dd4788a6'} | {'https://github.com/opencast/opencast/commit/1a7172c95af8d542a77ae5b153e4c834dd4788a6'} |
Maven | GHSA-8p36-q63g-68qh | Autobinding vulnerability in MITREid Connect | org/mitre/oauth2/web/OAuthConfirmationController.java in the OpenID Connect server implementation for MITREid Connect through 1.3.3 contains a Mass Assignment (aka Autobinding) vulnerability. This arises due to unsafe usage of the @ModelAttribute annotation during the OAuth authorization flow, in which HTTP request par... | {'CVE-2021-27582'} | 2022-03-03T05:13:05.884875Z | 2021-05-13T22:31:22Z | CRITICAL | null | {'CWE-915'} | {'https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/commit/7eba3c12fed82388f917e8dd9b73e86e3a311e4c', 'https://portswigger.net/research/hidden-oauth-attack-vectors', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27582', 'http://agrrrdog.blogspot.com/2017/03/autobinding-vulns-and-spring-mvc.html'} | null | {'https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/commit/7eba3c12fed82388f917e8dd9b73e86e3a311e4c'} | {'https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/commit/7eba3c12fed82388f917e8dd9b73e86e3a311e4c'} |
Maven | GHSA-hwj3-m3p6-hj38 | dom4j allows External Entities by default which might enable XXE attacks | dom4j before 2.1.3 allows external DTDs and External Entities by default, which might enable XXE attacks. However, there is popular external documentation from OWASP showing how to enable the safe, non-default behavior in any application that uses dom4j.
Note: This advisory applies to `dom4j:dom4j` version 1.x legacy ... | {'CVE-2020-10683'} | 2022-03-03T05:12:57.574058Z | 2020-06-05T16:13:36Z | CRITICAL | null | {'CWE-611'} | {'https://github.com/dom4j/dom4j/commit/a8228522a99a02146106672a34c104adbda5c658', 'https://github.com/dom4j/dom4j/issues/87', 'https://security.netapp.com/advisory/ntap-20200518-0002/', 'https://lists.apache.org/thread.html/r91c64cd51e68e97d524395474eaa25362d564572276b9917fcbf5c32@%3Cdev.velocity.apache.org%3E', 'http... | null | {'https://github.com/dom4j/dom4j/commit/a8228522a99a02146106672a34c104adbda5c658', 'https://github.com/dom4j/dom4j/commit/1707bf3d898a8ada3b213acb0e3b38f16eaae73d'} | {'https://github.com/dom4j/dom4j/commit/a8228522a99a02146106672a34c104adbda5c658', 'https://github.com/dom4j/dom4j/commit/1707bf3d898a8ada3b213acb0e3b38f16eaae73d'} |
Maven | GHSA-v528-7hrm-frqp | Improper Check for Unusual or Exceptional Conditions in json-smart | An issue was discovered in netplex json-smart-v1 through 2015-10-23 and json-smart-v2 through 2.4. An exception is thrown from a function, but it is not caught, as demonstrated by NumberFormatException. When it is not caught, it may cause programs using the library to crash or expose sensitive information. | {'CVE-2021-27568'} | 2022-04-26T21:00:32.613340Z | 2021-06-16T18:03:47Z | CRITICAL | null | {'CWE-754'} | {'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/rf70210b4d63191c0bfb2a0d5745e104484e71703bf5ad9cb01c980c6@%3Ccommits.druid.apache.org%3E', 'https://github.com/netplex/json-smart-v1/issues/7', 'https://github.com/netplex/json-smart-v2', 'https://github.com/netplex/json-sm... | null | {'https://github.com/netplex/json-smart-v1/commit/768db58ee0e3e344fcdb574b7629765308a1d0af'} | {'https://github.com/netplex/json-smart-v1/commit/768db58ee0e3e344fcdb574b7629765308a1d0af'} |
Maven | GHSA-86qr-9vqc-pgc6 | Code execution in Spring Integration | Spring Integration framework provides Kryo Codec implementations as an alternative for Java (de)serialization. When Kryo is configured with default options, all unregistered classes are resolved on demand. This leads to the "deserialization gadgets" exploit when provided data contains malicious code for execution durin... | {'CVE-2020-5413'} | 2022-04-25T23:16:59.419794Z | 2020-08-05T14:53:06Z | CRITICAL | null | {'CWE-502'} | {'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/spring-projects/spring-integration/commit/6a02b5abe97fabab6003d51b98dd45ab009a6e05', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5413', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://tanzu.vmware.com/security/cve-2020-5413... | null | {'https://github.com/spring-projects/spring-integration/commit/6a02b5abe97fabab6003d51b98dd45ab009a6e05'} | {'https://github.com/spring-projects/spring-integration/commit/6a02b5abe97fabab6003d51b98dd45ab009a6e05'} |
Maven | GHSA-9gp4-qrff-c648 | Moderate severity vulnerability that affects org.bouncycastle:bcprov-jdk14 and org.bouncycastle:bcprov-jdk15 | In the Bouncy Castle JCE Provider version 1.55 and earlier the DHIES/ECIES CBC mode vulnerable to padding oracle attack. For BC 1.55 and older, in an environment where timings can be easily observed, it is possible with enough observations to identify when the decryption is failing due to padding. | {'CVE-2016-1000345'} | 2022-03-03T05:12:59.881779Z | 2018-10-18T18:04:13Z | MODERATE | null | null | {'https://nvd.nist.gov/vuln/detail/CVE-2016-1000345', 'https://github.com/advisories/GHSA-9gp4-qrff-c648', 'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://access.redhat.com/errata/RHSA-2018:2927', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://github.com/bcgit/bc-java/commit/21d... | null | {'https://github.com/bcgit/bc-java/commit/21dcb3d9744c83dcf2ff8fcee06dbca7bfa4ef35#diff-4439ce586bf9a13bfec05c0d113b8098'} | {'https://github.com/bcgit/bc-java/commit/21dcb3d9744c83dcf2ff8fcee06dbca7bfa4ef35#diff-4439ce586bf9a13bfec05c0d113b8098'} |
Maven | GHSA-94jq-q5v2-76wj | Improper certificate management in AWS IoT Device SDK v2 | Connections initialized by the AWS IoT Device SDK v2 for Java (versions prior to 1.3.3), Python (versions prior to 1.5.18), C++ (versions prior to 1.12.7) and Node.js (versions prior to 1.5.1) did not verify server certificate hostname during TLS handshake when overriding Certificate Authorities (CA) in their trust sto... | {'CVE-2021-40828'} | 2022-03-03T05:13:50.572827Z | 2021-11-24T21:02:24Z | MODERATE | null | {'CWE-295'} | {'https://github.com/aws/aws-iot-device-sdk-python-v2/commit/fd4c0ba04b35eab9e20c635af5548fcc5a92d8be', 'https://github.com/aws/aws-iot-device-sdk-java-v2/commit/67950ad2a02f2f9355c310b69dc9226b017f32f2', 'https://github.com/aws/aws-iot-device-sdk-python-v2', 'https://github.com/awslabs/aws-c-io/', 'https://github.com/... | null | {'https://github.com/aws/aws-iot-device-sdk-java-v2/commit/67950ad2a02f2f9355c310b69dc9226b017f32f2', 'https://github.com/aws/aws-iot-device-sdk-python-v2/commit/fd4c0ba04b35eab9e20c635af5548fcc5a92d8be', 'https://github.com/aws/aws-iot-device-sdk-js-v2/commit/4be41394f1aee979e6f4b012fcb01eecabd0c08d'} | {'https://github.com/aws/aws-iot-device-sdk-java-v2/commit/67950ad2a02f2f9355c310b69dc9226b017f32f2', 'https://github.com/aws/aws-iot-device-sdk-python-v2/commit/fd4c0ba04b35eab9e20c635af5548fcc5a92d8be', 'https://github.com/aws/aws-iot-device-sdk-js-v2/commit/4be41394f1aee979e6f4b012fcb01eecabd0c08d'} |
Maven | GHSA-v4rr-65x6-g69f | XXE vulnerability in Jenkins Flaky Test Handler Plugin | Jenkins Flaky Test Handler Plugin 1.2.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | {'CVE-2022-28140'} | 2022-05-03T21:01:58.771749Z | 2022-03-30T00:00:25Z | HIGH | null | {'CWE-611'} | {'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-1896', 'http://www.openwall.com/lists/oss-security/2022/03/29/1', 'https://github.com/jenkinsci/flaky-test-handler-plugin', 'https://github.com/jenkinsci/flaky-test-handler-plugin/commit/c4ab38fef3658a02315a00288b934bdd9981b3a4', 'https://nvd.nist.gov/vuln... | null | {'https://github.com/jenkinsci/flaky-test-handler-plugin/commit/c4ab38fef3658a02315a00288b934bdd9981b3a4'} | {'https://github.com/jenkinsci/flaky-test-handler-plugin/commit/c4ab38fef3658a02315a00288b934bdd9981b3a4'} |
Maven | GHSA-gg9m-x3cg-69vh | Access key stored in plain text by Jenkins Metrics Plugin | Jenkins Metrics Plugin 4.0.2.8 and earlier stores an access key unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system. | {'CVE-2022-20621'} | 2022-05-04T21:01:56.226583Z | 2022-01-13T00:00:57Z | MODERATE | null | {'CWE-522'} | {'http://www.openwall.com/lists/oss-security/2022/01/12/6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-20621', 'https://github.com/jenkinsci/metrics-plugin/commit/9810480370d4c5e04a2b710934db5461bde0d1b6', 'https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-1624', 'https://github.com/jenkinsci/metrics-plugin... | null | {'https://github.com/jenkinsci/metrics-plugin/commit/9810480370d4c5e04a2b710934db5461bde0d1b6'} | {'https://github.com/jenkinsci/metrics-plugin/commit/9810480370d4c5e04a2b710934db5461bde0d1b6'} |
Maven | GHSA-fjqm-246c-mwqg | In Bouncy Castle JCE Provider the other party DH public key is not fully validated | In the Bouncy Castle JCE Provider version 1.55 and earlier the other party DH public key is not fully validated. This can cause issues as invalid keys can be used to reveal details about the other party's private key where static Diffie-Hellman is in use. As of release 1.56 the key parameters are checked on agreement c... | {'CVE-2016-1000346'} | 2022-04-27T13:45:14.853516Z | 2018-10-17T16:27:28Z | LOW | null | null | {'https://github.com/bcgit/bc-java', 'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://access.redhat.com/errata/RHSA-2018:2927', 'https://github.com/advisories/GHSA-fjqm-246c-mwqg', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000346', 'https:/... | null | {'https://github.com/bcgit/bc-java/commit/1127131c89021612c6eefa26dbe5714c194e7495#diff-d525a20b8acaed791ae2f0f770eb5937'} | {'https://github.com/bcgit/bc-java/commit/1127131c89021612c6eefa26dbe5714c194e7495#diff-d525a20b8acaed791ae2f0f770eb5937'} |
Maven | GHSA-f93p-f762-vr53 | Reflected Cross-Site Scripting in Apache CXF | By default, Apache CXF creates a /services page containing a listing of the available endpoint names and addresses. This webpage is vulnerable to a reflected Cross-Site Scripting (XSS) attack, which allows a malicious actor to inject javascript into the web page. Please note that the attack exploits a feature which is ... | {'CVE-2019-17573'} | 2022-03-03T05:14:06.048096Z | 2020-06-10T20:02:33Z | MODERATE | null | {'CWE-79'} | {'http://www.openwall.com/lists/oss-security/2020/11/12/2', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17573', 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E', 'https://github.com/apache/cxf/commit/a02e96ba1095596bef481919f16a90c5e80a92c8', '... | null | {'https://github.com/apache/cxf/commit/a02e96ba1095596bef481919f16a90c5e80a92c8'} | {'https://github.com/apache/cxf/commit/a02e96ba1095596bef481919f16a90c5e80a92c8'} |
Maven | GHSA-m9cj-v55f-8x26 | Authentication Bypass in keycloak | A flaw was found in Keycloak before version 12.0.0 where it is possible to update the user's metadata attributes using Account REST API. This flaw allows an attacker to change its own NameID attribute to impersonate the admin user for any particular application. | {'CVE-2020-27826'} | 2022-03-18T18:02:27.911017Z | 2022-03-18T17:55:26Z | HIGH | null | {'CWE-250'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-27826', 'https://bugzilla.redhat.com/show_bug.cgi?id=1905089', 'https://access.redhat.com/security/cve/cve-2020-27826', 'https://github.com/keycloak/keycloak/commit/dae4a3eaf26590b8d441b8e4bec3b700ee303b72'} | null | {'https://github.com/keycloak/keycloak/commit/dae4a3eaf26590b8d441b8e4bec3b700ee303b72'} | {'https://github.com/keycloak/keycloak/commit/dae4a3eaf26590b8d441b8e4bec3b700ee303b72'} |
Maven | GHSA-r9ch-m4fh-fc7q | Moderate severity vulnerability that affects org.bouncycastle:bcprov-jdk14 and org.bouncycastle:bcprov-jdk15 | In the Bouncy Castle JCE Provider version 1.55 and earlier DSA signature generation is vulnerable to timing attack. Where timings can be closely observed for the generation of signatures, the lack of blinding in 1.55, or earlier, may allow an attacker to gain information about the signature's k value and ultimately the... | {'CVE-2016-1000341'} | 2022-03-03T05:13:58.446532Z | 2018-10-17T16:24:00Z | MODERATE | null | null | {'https://github.com/advisories/GHSA-r9ch-m4fh-fc7q', 'https://github.com/bcgit/bc-java', 'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://access.redhat.com/errata/RHSA-2018:2927', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://github.com/bcgit/bc-java/commit/acaac81f96fec91ab45b... | null | {'https://github.com/bcgit/bc-java/commit/acaac81f96fec91ab45bd0412beaf9c3acd8defa#diff-e75226a9ca49217a7276b29242ec59ce'} | {'https://github.com/bcgit/bc-java/commit/acaac81f96fec91ab45bd0412beaf9c3acd8defa#diff-e75226a9ca49217a7276b29242ec59ce'} |
Maven | GHSA-f62v-xpxf-3v68 | Code injection in Apache Ant | As mitigation for CVE-2020-1945 Apache Ant 1.10.8 changed the permissions of temporary files it created so that only the current user was allowed to access them. Unfortunately the fixcrlf task deleted the temporary file and created a new one without said protection, effectively nullifying the effort. This would still a... | {'CVE-2020-11979'} | 2022-04-22T17:30:20.141853Z | 2021-02-03T19:16:35Z | HIGH | null | {'CWE-74', 'CWE-94'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DYBRN5C2RW7JRY75IB7Q7ZVKZCHWAQWS/', 'https://lists.apache.org/thread.html/raaeddc41da8f3afb1cb224876084a45f68e437a0afd9889a707e4b0c@%3Cdev.creadur.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-annou... | null | {'https://github.com/apache/ant/commit/87ac51d3c22bcf7cfd0dc07cb0bd04a496e0d428'} | {'https://github.com/apache/ant/commit/87ac51d3c22bcf7cfd0dc07cb0bd04a496e0d428'} |
Maven | GHSA-vmfg-rjjm-rjrj | Deserialization of Untrusted Data | QOS.ch Logback before 1.2.0 has a serialization vulnerability affecting the SocketServer and ServerSocketReceiver components. The RemoteStreamAppenderClient class in logback-classic and the SocketNode classes in logback-classic and logback-access allow data to be deserialized over a Java Socket, via an ObjectInputStrea... | {'CVE-2017-5929'} | 2022-04-19T16:01:50.629989Z | 2021-06-07T16:07:36Z | CRITICAL | null | {'CWE-502'} | {'https://lists.apache.org/thread.html/r397bf63783240fbb5713389d3f889d287ae0c11509006700ac720037@%3Ccommits.cassandra.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:1676', 'https://lists.apache.org/thread.html/rc5f0cc2f3b153bdf15ee7389d78585829abc9c7af4d322ba1085dd3e@%3Ccommits.cassandra.apache.org%3E', 'h... | null | {'https://github.com/qos-ch/logback/commit/f46044b805bca91efe5fd6afe52257cd02f775f8'} | {'https://github.com/qos-ch/logback/commit/f46044b805bca91efe5fd6afe52257cd02f775f8'} |
Maven | GHSA-2rq5-68hm-h4j8 | Cross-Site Request Forgery in OpenNMS Horizon | In OpenNMS Horizon, versions opennms-1-0-stable through opennms-27.1.1; OpenNMS Meridian, versions meridian-foundation-2015.1.0-1 through meridian-foundation-2019.1.18-1; meridian-foundation-2020.1.0-1 through meridian-foundation-2020.1.6-1 are vulnerable to CSRF, due to no CSRF protection at `/opennms/admin/userGroupV... | {'CVE-2021-25931'} | 2021-05-28T22:26:41Z | 2021-05-25T18:46:55Z | HIGH | null | {'CWE-352'} | {'https://github.com/OpenNMS/opennms/commit/607151ea8f90212a3fb37c977fa57c7d58d26a84', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25931', 'https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25931'} | null | {'https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c', 'https://github.com/OpenNMS/opennms/commit/607151ea8f90212a3fb37c977fa57c7d58d26a84'} | {'https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c', 'https://github.com/OpenNMS/opennms/commit/607151ea8f90212a3fb37c977fa57c7d58d26a84'} |
Maven | GHSA-4gq5-ch57-c2mg | High severity vulnerability that affects com.fasterxml.jackson.core:jackson-databind | FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code by leveraging failure to block the blaze-ds-opt and blaze-ds-core classes from polymorphic deserialization. | {'CVE-2018-14719'} | 2022-03-03T05:13:11.866366Z | 2019-01-04T19:09:49Z | CRITICAL | null | {'CWE-502'} | {'https://access.redhat.com/errata/RHSA-2019:3140', 'https://github.com/advisories/GHSA-4gq5-ch57-c2mg', 'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://www.oracle.com/technetwork/se... | null | {'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44'} | {'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44'} |
Maven | GHSA-j4mm-7pj3-jf7v | HTTP Method Spoofing | Opencast versions prior to 9.10 allow HTTP method spoofing, allowing to change the assumed HTTP method via URL parameter. This allows attackers to turn HTTP GET requests into PUT requests or an HTTP form to send DELETE requests. This bypasses restrictions otherwise put on these types of requests and aids in cross-site... | {'CVE-2021-43807'} | 2022-03-03T05:13:41.892420Z | 2021-12-14T21:43:00Z | HIGH | null | {'CWE-290'} | {'https://github.com/opencast/opencast/security/advisories/GHSA-j4mm-7pj3-jf7v', 'https://github.com/opencast/opencast', 'https://github.com/opencast/opencast/commit/8f8271e1085f6f8e306c689d6a56b0bb8d076444', 'https://github.com/opencast/opencast/commit/59cb6731067283e54f15462be38b6117d8b9ea8b#diff-9c5fb3d1b7e3b0f54bc5... | null | {'https://github.com/opencast/opencast/commit/59cb6731067283e54f15462be38b6117d8b9ea8b#diff-9c5fb3d1b7e3b0f54bc5c4182965c4fe1f9023d449017cece3005d3f90e8e4d8', 'https://github.com/opencast/opencast/commit/8f8271e1085f6f8e306c689d6a56b0bb8d076444'} | {'https://github.com/opencast/opencast/commit/59cb6731067283e54f15462be38b6117d8b9ea8b#diff-9c5fb3d1b7e3b0f54bc5c4182965c4fe1f9023d449017cece3005d3f90e8e4d8', 'https://github.com/opencast/opencast/commit/8f8271e1085f6f8e306c689d6a56b0bb8d076444'} |
Maven | GHSA-26hm-r6mg-963c | SQL Injection in JeecgBoot | In JeecgBoot 3.0, there is a SQL injection vulnerability that can operate the database with root privileges. A patch has been released on the repository's `master` branch. | {'CVE-2021-46089'} | 2022-03-03T05:13:23.136820Z | 2022-01-26T00:01:25Z | CRITICAL | null | {'CWE-89'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-46089', 'https://github.com/jeecgboot/jeecg-boot/issues/3331', 'https://github.com/jeecgboot/jeecg-boot/commit/baefc1338dd03de36384ce7d5846b08041b488d0', 'https://github.com/jeecgboot/jeecg-boot'} | null | {'https://github.com/jeecgboot/jeecg-boot/commit/baefc1338dd03de36384ce7d5846b08041b488d0'} | {'https://github.com/jeecgboot/jeecg-boot/commit/baefc1338dd03de36384ce7d5846b08041b488d0'} |
Maven | GHSA-h4m4-pgp4-whgm | The reset password form reveal users email address | ### Impact
The reset password form reveals the email address of users just by giving their username.
### Patches
The problem has been patched on XWiki 13.2RC1.
### Workarounds
It's possible to manually modify the `resetpasswordinline.vm` to perform the changes made in https://github.com/xwiki/xwiki-platform/commit/0c... | {'CVE-2021-32731'} | 2021-07-02T16:39:50Z | 2021-07-02T19:19:04Z | MODERATE | null | {'CWE-668', 'CWE-200'} | {'https://github.com/xwiki/xwiki-platform/commit/0cf716250b3645a5974c80d8336dcdf885749dff#diff-14a3132e3986b1f5606dd13d9d8a8bb8634bec9932123c5e49e9604cfd850fc2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32731', 'https://jira.xwiki.org/browse/XWIKI-18400', 'https://github.com/xwiki/xwiki-platform/security/advisories/G... | null | {'https://github.com/xwiki/xwiki-platform/commit/0cf716250b3645a5974c80d8336dcdf885749dff#diff-14a3132e3986b1f5606dd13d9d8a8bb8634bec9932123c5e49e9604cfd850fc2'} | {'https://github.com/xwiki/xwiki-platform/commit/0cf716250b3645a5974c80d8336dcdf885749dff#diff-14a3132e3986b1f5606dd13d9d8a8bb8634bec9932123c5e49e9604cfd850fc2'} |
Maven | GHSA-qhh5-9738-g9mx | Incorrect Default Permissions in Apache DolphinScheduler | Versions of Apache DolphinScheduler prior to 1.3.2 allowed an ordinary user under any tenant to override another users password through the API interface. | {'CVE-2020-13922'} | 2022-03-03T05:13:34.456850Z | 2022-02-09T22:26:32Z | MODERATE | null | {'CWE-276'} | {'https://www.mail-archive.com/announce@apache.org/msg06076.html', 'https://github.com/apache/incubator-dolphinscheduler/commit/b8a9e2e00f2f207ae60c913a7173b59405ff95f1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13922'} | null | {'https://github.com/apache/incubator-dolphinscheduler/commit/b8a9e2e00f2f207ae60c913a7173b59405ff95f1'} | {'https://github.com/apache/incubator-dolphinscheduler/commit/b8a9e2e00f2f207ae60c913a7173b59405ff95f1'} |
Maven | GHSA-44cw-p2hm-gpf6 | Disabled Hostname Verification in Opencast | Opencast before version 8.9 and 7.9 disables HTTPS hostname verification of its HTTP client used for a large portion of Opencast's HTTP requests.
Hostname verification is an important part when using HTTPS to ensure that the presented certificate is valid for the host. Disabling it can allow for man-in-the-middle atta... | {'CVE-2020-26234'} | 2022-03-03T05:12:06.667135Z | 2020-12-08T22:37:59Z | HIGH | null | {'CWE-297'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-26234', 'https://github.com/opencast/opencast/commit/4225bf90af74557deaf8fb6b80b0705c9621acfc', 'https://github.com/opencast/opencast/security/advisories/GHSA-44cw-p2hm-gpf6'} | null | {'https://github.com/opencast/opencast/commit/4225bf90af74557deaf8fb6b80b0705c9621acfc'} | {'https://github.com/opencast/opencast/commit/4225bf90af74557deaf8fb6b80b0705c9621acfc'} |
Maven | GHSA-vmm6-w4cf-7f3x | Authentication Bypass For Endpoints With Anonymous Access in Opencast | ### Impact
Using a remember-me cookie with an arbitrary username can cause Opencast to assume proper authentication for that user even if the remember-me cookie was incorrect given that the attacked endpoint also allows anonymous access.
This way, an attacker can, for example, fake a remember-me token, assume the ide... | {'CVE-2020-5206'} | 2022-03-03T05:13:57.051323Z | 2020-01-30T21:21:30Z | CRITICAL | null | {'CWE-285'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-5206', 'https://github.com/opencast/opencast/commit/b157e1fb3b35991ca7bf59f0730329fbe7ce82e8', 'https://github.com/opencast/opencast/security/advisories/GHSA-vmm6-w4cf-7f3x'} | null | {'https://github.com/opencast/opencast/commit/b157e1fb3b35991ca7bf59f0730329fbe7ce82e8'} | {'https://github.com/opencast/opencast/commit/b157e1fb3b35991ca7bf59f0730329fbe7ce82e8'} |
Maven | GHSA-mm8j-9x84-m9cv | Arbitrary code injection in json-sanitizer | OWASP json-sanitizer before 1.2.2 may emit closing SCRIPT tags and CDATA section delimiters for crafted input. This allows an attacker to inject arbitrary HTML or XML into embedding documents. | {'CVE-2021-23899'} | 2022-03-03T05:13:26.047631Z | 2021-06-16T17:34:18Z | CRITICAL | null | {'CWE-611'} | {'https://github.com/OWASP/json-sanitizer/compare/v1.2.1...v1.2.2', 'https://github.com/OWASP/json-sanitizer/commit/a37f594f7378a1c76b3283e0dab9e1ab1dc0247e', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23899', 'https://groups.google.com/g/json-sanitizer-support/c/dAW1AeNMoA0'} | null | {'https://github.com/OWASP/json-sanitizer/commit/a37f594f7378a1c76b3283e0dab9e1ab1dc0247e'} | {'https://github.com/OWASP/json-sanitizer/commit/a37f594f7378a1c76b3283e0dab9e1ab1dc0247e'} |
Maven | GHSA-8p8g-f9vg-r7xr | Moderate severity vulnerability that affects com.squareup.retrofit2:retrofit | Square Retrofit versions from (including) 2.0 to 2.5.0 (excluding) contain a Directory Traversal vulnerability in RequestBuilder class, method addPathParameter. By manipulating the URL an attacker could add or delete resources otherwise unavailable to her. This attack appears to be exploitable via an encoded path param... | {'CVE-2018-1000850'} | 2022-03-03T05:13:12.591547Z | 2018-12-21T17:48:19Z | HIGH | null | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-1000850', 'https://github.com/square/retrofit', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://github.com/advisories/GHSA-8p8g-f9vg-r7xr', 'https://lists.apache.org/thread.html/f9bc3e55f4e28... | null | {'https://github.com/square/retrofit/commit/b9a7f6ad72073ddd40254c0058710e87a073047d#diff-943ec7ed35e68201824904d1dc0ec982'} | {'https://github.com/square/retrofit/commit/b9a7f6ad72073ddd40254c0058710e87a073047d#diff-943ec7ed35e68201824904d1dc0ec982'} |
Maven | GHSA-hfg5-xpvw-c9x4 | Improper Input Validation in Apache Camel | Apache Camel's JMX is vulnerable to Rebind Flaw. Apache Camel users should upgrade to 3.2.0. | {'CVE-2020-11971'} | 2021-09-01T19:36:12Z | 2021-05-21T19:20:30Z | HIGH | null | {'CWE-20'} | {'https://issues.apache.org/jira/browse/CAMEL-14811', 'https://github.com/apache/camel', 'https://github.com/apache/camel/commit/b954402272ddcfbb45dc1495520f920e70cc041c', 'http://www.openwall.com/lists/oss-security/2020/05/14/7', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/securit... | null | {'https://github.com/apache/camel/commit/b954402272ddcfbb45dc1495520f920e70cc041c'} | {'https://github.com/apache/camel/commit/b954402272ddcfbb45dc1495520f920e70cc041c'} |
Maven | GHSA-xhw6-hjc9-679m | Token validation bypass in Pac4j | Pac4j v5.1 and earlier allows (by default) clients to accept and successfully validate ID Tokens with "none" algorithm (i.e., tokens with no signature) which is not secure and violates the OpenID Core Specification. The "none" algorithm does not require any signature verification when validating the ID tokens, which al... | {'CVE-2021-44878'} | 2022-04-01T18:17:03.461426Z | 2022-01-08T00:36:05Z | HIGH | null | {'CWE-347'} | {'https://github.com/pac4j/pac4j', 'https://github.com/pac4j/pac4j/commit/22b82ffd702a132d9f09da60362fc6264fc281ae', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44878', 'https://www.pac4j.org/blog/cve_2021_44878_is_this_serious.html', 'https://openid.net/specs/openid-connect-core-1_0.html#IDToken'} | null | {'https://github.com/pac4j/pac4j/commit/22b82ffd702a132d9f09da60362fc6264fc281ae'} | {'https://github.com/pac4j/pac4j/commit/22b82ffd702a132d9f09da60362fc6264fc281ae'} |
Maven | GHSA-763g-fqq7-48wg | XML external entity (XXE) processing ('external-parameter-entities' feature was not fully disabled)) | Due to an incomplete fix for [CVE-2019-9658](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9658), checkstyle was still vulnerable to XML External Entity (XXE) Processing.
### Impact
#### User: Build Maintainers
This vulnerability probably doesn't impact Maven/Gradle users as, in most cases, these builds ar... | {'CVE-2019-10782'} | 2022-03-03T05:13:51.546007Z | 2020-01-31T18:00:07Z | MODERATE | null | {'CWE-611'} | {'https://snyk.io/vuln/SNYK-JAVA-COMPUPPYCRAWLTOOLS-543266', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10782', 'https://github.com/checkstyle/checkstyle/security/advisories/GHSA-763g-fqq7-48wg', 'https://lists.apache.org/thread.html/r8aaf4ee16bbaf6204731d4770d96ebb34b258cd79b491f9cdd7f2540@%3Ccommits.nifi.apache.org%3... | null | {'https://github.com/checkstyle/checkstyle/commit/c46a16d177e6797895b195c288ae9a9a096254b8'} | {'https://github.com/checkstyle/checkstyle/commit/c46a16d177e6797895b195c288ae9a9a096254b8'} |
Maven | GHSA-cjjf-94ff-43w7 | High severity vulnerability that affects com.fasterxml.jackson.core:jackson-databind | An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a specific property), the service has the Jodd-db jar (for database access for the Jodd framework) in the classpath, and an attacker can provide an LDAP service to access, ... | {'CVE-2018-12022'} | 2022-03-03T05:13:35.749753Z | 2019-03-25T18:03:09Z | HIGH | null | {'CWE-502'} | {'https://access.redhat.com/errata/RHSA-2019:1108', 'https://github.com/advisories/GHSA-cjjf-94ff-43w7', 'https://access.redhat.com/errata/RHSA-2019:3140', 'https://access.redhat.com/errata/RHSA-2019:2804', 'https://www.blackhat.com/docs/us-16/materials/us-16-Munoz-A-Journey-From-JNDI-LDAP-Manipulation-To-RCE.pdf', 'ht... | null | {'https://github.com/FasterXML/jackson-databind/commit/28badf7ef60ac3e7ef151cd8e8ec010b8479226a'} | {'https://github.com/FasterXML/jackson-databind/commit/28badf7ef60ac3e7ef151cd8e8ec010b8479226a'} |
Maven | GHSA-2363-cqg2-863c | XML External Entity (XXE) Injection in JDOM | An XXE issue in SAXBuilder in JDOM through 2.0.6 allows attackers to cause a denial of service via a crafted HTTP request. At this time there is not released fixed version of JDOM. As a workaround, to avoid external entities being expanded, one can call `builder.setExpandEntities(false)` and they won't be expanded. | {'CVE-2021-33813'} | 2022-04-22T16:01:59.574173Z | 2021-07-27T19:02:56Z | HIGH | null | {'CWE-611'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EWFVYTHGILOQXUA7U3SPOERQXL7OPSZG/', 'https://lists.apache.org/thread.html/rfb7a93e40ebeb1e0068cde0bf3834dcab46bb1ef06d6424db48ed9fd@%3Cdev.tika.apache.org%3E', 'https://github.com/hunterhacker/jdom/commit/dd4f3c2fc7893edd91... | null | {'https://github.com/hunterhacker/jdom/commit/dd4f3c2fc7893edd914954c73eb577f925a7d361'} | {'https://github.com/hunterhacker/jdom/commit/dd4f3c2fc7893edd914954c73eb577f925a7d361'} |
Maven | GHSA-xfv3-rrfm-f2rv | Information Exposure in Netty | Netty before 3.9.8.Final, 3.10.x before 3.10.3.Final, 4.0.x before 4.0.28.Final, and 4.1.x before 4.1.0.Beta5 and Play Framework 2.x before 2.3.9 might allow remote attackers to bypass the httpOnly flag on cookies and obtain sensitive information by leveraging improper validation of cookie name and value characters. | {'CVE-2015-2156'} | 2022-03-03T05:13:47.779414Z | 2020-06-30T21:01:21Z | HIGH | null | {'CWE-20'} | {'https://github.com/netty/netty/pull/3748/commits/4ac519f534493bb0ca7a77e1c779138a54faa7b9', 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2015/05/17/1', 'https://lists.apache.org/thread.html/... | null | {'https://github.com/netty/netty/commit/2caa38a2795fe1f1ae6ceda4d69e826ed7c55e55', 'https://github.com/netty/netty/pull/3748/commits/4ac519f534493bb0ca7a77e1c779138a54faa7b9', 'https://github.com/netty/netty/commit/31815598a2af37f0b71ea94eada70d6659c23752'} | {'https://github.com/netty/netty/pull/3748/commits/4ac519f534493bb0ca7a77e1c779138a54faa7b9', 'https://github.com/netty/netty/commit/2caa38a2795fe1f1ae6ceda4d69e826ed7c55e55', 'https://github.com/netty/netty/commit/31815598a2af37f0b71ea94eada70d6659c23752'} |
Maven | GHSA-7hmh-8gwv-mfvq | SQL Injection in Kylin | Kylin has some restful apis which will concatenate SQLs with the user input string, a user is likely to be able to run malicious database queries. | {'CVE-2020-1937'} | 2022-03-03T05:13:29.470212Z | 2020-07-27T22:51:47Z | MODERATE | null | {'CWE-89'} | {'https://lists.apache.org/thread.html/r021baf9d8d4ae41e8c8332c167c4fa96c91b5086563d9be55d2d7acf@%3Ccommits.kylin.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1937', 'https://lists.apache.org/thread.html/r61666760d8a4e8764b2d5fe158d8a48b569414480fbfadede574cdc0@%3Ccommits.kylin.apache.org%3E', 'https://li... | null | {'https://github.com/apache/kylin/commit/e373c64c96a54a7abfe4bccb82e8feb60db04749'} | {'https://github.com/apache/kylin/commit/e373c64c96a54a7abfe4bccb82e8feb60db04749'} |
Maven | GHSA-gf7x-2j2x-7f73 | Missing authorization in xwiki-platform | ### Impact
Any user with edit right can copy the content of a page it does not have access to by using it as template of a new page.
### Patches
It has been patched in XWiki 13.2CR1 and 12.10.6
### Workarounds
There is no workaround beside patching.
### References
https://jira.xwiki.org/browse/XWIKI-18430
### F... | {'CVE-2022-23617'} | 2022-02-09T21:41:46Z | 2022-02-09T21:41:46Z | MODERATE | null | {'CWE-862'} | {'https://github.com/xwiki/xwiki-platform/commit/b35ef0edd4f2ff2c974cbeef6b80fcf9b5a44554', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23617', 'https://jira.xwiki.org/browse/XWIKI-18430', 'https://github.com/xwiki/xwiki-platform', 'https://github.com/xwiki/xwiki-platform/commit/30c52b01559b8ef5ed1035dac7c34aaf805764d5'... | null | {'https://github.com/xwiki/xwiki-platform/commit/30c52b01559b8ef5ed1035dac7c34aaf805764d5', 'https://github.com/xwiki/xwiki-platform/commit/b35ef0edd4f2ff2c974cbeef6b80fcf9b5a44554'} | {'https://github.com/xwiki/xwiki-platform/commit/30c52b01559b8ef5ed1035dac7c34aaf805764d5', 'https://github.com/xwiki/xwiki-platform/commit/b35ef0edd4f2ff2c974cbeef6b80fcf9b5a44554'} |
Maven | GHSA-rjmq-6v55-4rjv | Improper Authorization in org.cometd.oort | ### Impact
Internal usage of Oort and Seti channels is improperly authorized, so any remote user could subscribe and publish to those channels.
By subscribing to those channels, a remote user may be able to watch cluster-internal traffic that contains other user's (possibly sensitive) data.
By publishing to those chann... | {'CVE-2022-24721'} | 2022-03-16T22:01:59.681034Z | 2022-03-15T19:02:36Z | HIGH | null | {'CWE-863'} | {'https://github.com/cometd/cometd/issues/1146', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24721', 'https://github.com/cometd/cometd/commit/bb445a143fbf320f17c62e340455cd74acfb5929', 'https://github.com/cometd/cometd', 'https://github.com/cometd/cometd/security/advisories/GHSA-rjmq-6v55-4rjv'} | null | {'https://github.com/cometd/cometd/commit/bb445a143fbf320f17c62e340455cd74acfb5929'} | {'https://github.com/cometd/cometd/commit/bb445a143fbf320f17c62e340455cd74acfb5929'} |
Maven | GHSA-rc75-cf5c-mxvh | Use of Cryptographically Weak Pseudo-Random Number Generator in org.pac4j:pac4j-saml | The SAML identifier generated within SAML2Utils.java was found to make use of the apache commons-lang3 RandomStringUtils class which makes them predictable due to RandomStringUtils PRNG's algorithm not being cryptographically strong. This issue only affects the 3.X release of pac4j-saml. | {'CVE-2019-10755'} | 2022-03-03T05:14:08.505074Z | 2019-11-06T17:06:28Z | MODERATE | null | {'CWE-338'} | {'https://github.com/pac4j/pac4j/commit/34d5b1028a2db201ee81ec51b52a782fe073f609', 'https://snyk.io/vuln/SNYK-JAVA-ORGPAC4J-467407', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10755'} | null | {'https://github.com/pac4j/pac4j/commit/34d5b1028a2db201ee81ec51b52a782fe073f609'} | {'https://github.com/pac4j/pac4j/commit/34d5b1028a2db201ee81ec51b52a782fe073f609'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.