ecosystem
stringclasses
11 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
220
details
stringlengths
34
13.5k
aliases
stringlengths
17
87
modified_date
stringdate
2019-03-26 14:13:00
2022-05-10 08:46:52
published_date
stringdate
2012-06-17 03:41:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
581 values
refs
stringlengths
82
11.6k
introduced
stringclasses
843 values
code_refs
stringlengths
46
940
commits
stringlengths
46
940
Maven
GHSA-qqv6-5w6p-3pgr
Moderate severity vulnerability that affects org.hswebframework.web:hsweb-commons
An issue was discovered in hsweb 3.0.4. It is a reflected XSS vulnerability due to the absence of type parameter checking in FlowableModelManagerController.java.
{'CVE-2018-20594'}
2022-03-03T05:13:53.425384Z
2019-01-04T17:43:30Z
MODERATE
null
{'CWE-79'}
{'https://github.com/hs-web/hsweb-framework/issues/107', 'https://github.com/hs-web/hsweb-framework/commit/b72a2275ed21240296c6539bae1049c56abb542f', 'https://nvd.nist.gov/vuln/detail/CVE-2018-20594', 'https://github.com/hs-web/hsweb-framework', 'https://github.com/advisories/GHSA-qqv6-5w6p-3pgr'}
null
{'https://github.com/hs-web/hsweb-framework/commit/b72a2275ed21240296c6539bae1049c56abb542f'}
{'https://github.com/hs-web/hsweb-framework/commit/b72a2275ed21240296c6539bae1049c56abb542f'}
Maven
GHSA-j823-4qch-3rgm
Deserialization of untrusted data in Jackson Databind
FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.xalan.lib.sql.JNDIConnectionPool (aka apache/drill).
{'CVE-2020-14060'}
2022-03-03T05:13:24.556259Z
2020-06-18T14:44:46Z
HIGH
null
{'CWE-502'}
{'https://github.com/FasterXML/jackson-databind/commit/d1c67a0396e84c08d0558fbb843b5bd1f26e1921', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://lists.debian.org/debian-lts-announce/2020/07/msg00001.html', 'https://github.com/FasterXML/jackson-databind...
null
{'https://github.com/FasterXML/jackson-databind/commit/d1c67a0396e84c08d0558fbb843b5bd1f26e1921'}
{'https://github.com/FasterXML/jackson-databind/commit/d1c67a0396e84c08d0558fbb843b5bd1f26e1921'}
Maven
GHSA-vp37-2f9p-3vr3
Cross-site Scripting in OWASP AntiSamy
AntiSamy is a library for performing fast, configurable cleansing of HTML coming from untrusted sources. OWASP AntiSamy before 1.6.7 allows XSS via HTML tag smuggling on STYLE content with crafted input. The output serializer does not properly encode the supposed Cascading Style Sheets (CSS) content. NOTE: this issue e...
{'CVE-2022-29577'}
2022-05-04T04:04:21.229446Z
2022-04-23T00:03:04Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-29577', 'https://github.com/nahsra/antisamy', 'https://github.com/nahsra/antisamy/releases/tag/v1.6.7', 'https://github.com/nahsra/antisamy/commit/32e273507da0e964b58c50fd8a4c94c9d9363af0'}
null
{'https://github.com/nahsra/antisamy/commit/32e273507da0e964b58c50fd8a4c94c9d9363af0'}
{'https://github.com/nahsra/antisamy/commit/32e273507da0e964b58c50fd8a4c94c9d9363af0'}
Maven
GHSA-3pp3-77j6-8ph6
Missing Authentication for Critical Function in Apache NiFi
In Apache NiFi 1.0.0 to 1.11.4, the NiFi download token (one-time password) mechanism used a fixed cache size and did not authenticate a request to create a download token, only when attempting to use the token to access the content. An unauthenticated user could repeatedly request download tokens, preventing legitimat...
{'CVE-2020-9487'}
2022-03-03T05:12:05.656413Z
2022-01-06T20:41:04Z
HIGH
null
{'CWE-306'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-9487', 'https://nifi.apache.org/security#CVE-2020-9487', 'https://github.com/apache/nifi/commit/01e42dfb3291c3a3549023edadafd2d8023f3042'}
null
{'https://github.com/apache/nifi/commit/01e42dfb3291c3a3549023edadafd2d8023f3042'}
{'https://github.com/apache/nifi/commit/01e42dfb3291c3a3549023edadafd2d8023f3042'}
Maven
GHSA-p5gm-fgfx-hr7h
Gadget chain attack in Nippy
A deserialization flaw is present in Taoensso Nippy before 2.14.2. In some circumstances, it is possible for an attacker to create a malicious payload that, when deserialized, will allow arbitrary code to be executed. This occurs because there is automatic use of the Java Serializable interface.
{'CVE-2020-24164'}
2021-05-04T21:47:51Z
2022-02-10T20:55:10Z
HIGH
null
{'CWE-502'}
{'https://github.com/ptaoussanis/nippy/commit/61fb009fdde2994140f2da2e495ba8af3a873eb2', 'https://github.com/ptaoussanis/nippy/issues/130', 'https://nvd.nist.gov/vuln/detail/CVE-2020-24164'}
null
{'https://github.com/ptaoussanis/nippy/commit/61fb009fdde2994140f2da2e495ba8af3a873eb2'}
{'https://github.com/ptaoussanis/nippy/commit/61fb009fdde2994140f2da2e495ba8af3a873eb2'}
Maven
GHSA-hxp5-8pgq-mgv9
Missing Authentication for Critical Function in Apache Calcite
"HttpUtils#getURLConnection method disables explicitly hostname verification for HTTPS connections making clients vulnerable to man-in-the-middle attacks. Calcite uses this method internally to connect with Druid and Splunk so information leakage may happen when using the respective Calcite adapters. The method itself ...
{'CVE-2020-13955'}
2022-03-03T05:13:26.228267Z
2021-04-22T16:14:14Z
MODERATE
null
{'CWE-295'}
{'https://issues.apache.org/jira/browse/CALCITE-4298', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13955', 'https://lists.apache.org/thread.html/r0b0fbe2038388175951ce1028182d980f9e9a7328be13d52dab70bb3%40%3Cdev.calcite.apache.org%3E', 'https://github.com/apache/calcite/commit/43eeafcbac29d02c72bd520c003cdfc571de2d15'}
null
{'https://github.com/apache/calcite/commit/43eeafcbac29d02c72bd520c003cdfc571de2d15'}
{'https://github.com/apache/calcite/commit/43eeafcbac29d02c72bd520c003cdfc571de2d15'}
Maven
GHSA-j7c3-96rf-jrrp
Critical vulnerability in log4j may affect generated PEAR projects
### Impact UIMA PEAR projects that have been generated with the `de.averbis.textanalysis:pear-archetype ` version `2.0.0` have a maven dependency with scope `test` to` log4j 2.8.2` and might be affected by CVE-2021-44228. ### Patches - The issue has been resolved in `de.averbis.textanalysis:pear-archetype ` version `2...
null
2021-12-16T18:57:47Z
2021-12-16T21:01:51Z
CRITICAL
null
null
{'https://github.com/averbis/pear-archetype/commit/6815f5981c836ab8c345a6ff54f29e9f4b67f7eb', 'https://github.com/averbis/pear-archetype/security/advisories/GHSA-j7c3-96rf-jrrp', 'https://github.com/averbis/pear-archetype'}
null
{'https://github.com/averbis/pear-archetype/commit/6815f5981c836ab8c345a6ff54f29e9f4b67f7eb'}
{'https://github.com/averbis/pear-archetype/commit/6815f5981c836ab8c345a6ff54f29e9f4b67f7eb'}
Maven
GHSA-f8vc-wfc8-hxqh
Improper Privilege Management in Apache Hadoop
In Apache Hadoop 3.2.0 to 3.2.1, 3.0.0-alpha1 to 3.1.3, and 2.0.0-alpha to 2.10.0, WebHDFS client might send SPNEGO authorization header to remote URL without proper verification.
{'CVE-2020-9492'}
2022-03-03T05:13:35.486633Z
2022-02-09T22:17:38Z
HIGH
null
{'CWE-863', 'CWE-269'}
{'https://lists.apache.org/thread.html/r513758942356ccd0d14538ba18a09903fc72716d74be1cb727ea91ff%40%3Cgeneral.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r49c9ab444ab1107c6a8be8a0d66602dec32a16d96c2631fec8d309fb@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r4a57de5215494c35c8304...
null
{'https://github.com/apache/hadoop/commit/ca65409836d2949e9a9408d40bec0177b414cd5d'}
{'https://github.com/apache/hadoop/commit/ca65409836d2949e9a9408d40bec0177b414cd5d'}
Maven
GHSA-fv3m-xhqw-9m79
ballcat-codegen template engine remote code execution injection
### Impact Ballcat Codegen provides the function of online editing code to generate templates. In version < 1.0.0.beta.2, since Velocity and freemarker templates are introduced but input verification is not done, attackers can implement remote code execution through malicious code injection of the template engine. ###...
{'CVE-2022-24881'}
2022-04-27T21:16:49.063003Z
2022-04-27T21:05:15Z
HIGH
null
{'CWE-78'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24881', 'https://github.com/ballcat-projects/ballcat-codegen/commit/84a7cb38daf0295b93aba21d562ec627e4eb463b', 'https://github.com/ballcat-projects/ballcat-codegen/security/advisories/GHSA-fv3m-xhqw-9m79', 'https://github.com/ballcat-projects/ballcat-codegen', 'https://github...
null
{'https://github.com/ballcat-projects/ballcat-codegen/commit/84a7cb38daf0295b93aba21d562ec627e4eb463b'}
{'https://github.com/ballcat-projects/ballcat-codegen/commit/84a7cb38daf0295b93aba21d562ec627e4eb463b'}
Maven
GHSA-v525-c3g5-cg9p
Unsafe Deserialization that can Result in Code Execution
JMS Client for RabbitMQ 1.x before 1.15.2 and 2.x before 2.2.0 is vulnerable to unsafe deserialization that can result in code execution via crafted StreamMessage data.
{'CVE-2020-36282'}
2022-03-03T05:12:43.915627Z
2021-12-10T17:15:49Z
HIGH
null
{'CWE-502'}
{'https://github.com/rabbitmq/rabbitmq-jms-client/issues/135', 'https://medium.com/@ramon93i7/a99645d0448b', 'https://github.com/rabbitmq/rabbitmq-jms-client/releases/tag/v2.2.0', 'https://github.com/rabbitmq/rabbitmq-jms-client/pull/136/commits/f647e5dbfe055a2ca8cbb16dd70f9d50d888b638', 'https://nvd.nist.gov/vuln/deta...
null
{'https://github.com/rabbitmq/rabbitmq-jms-client/pull/136/commits/f647e5dbfe055a2ca8cbb16dd70f9d50d888b638'}
{'https://github.com/rabbitmq/rabbitmq-jms-client/pull/136/commits/f647e5dbfe055a2ca8cbb16dd70f9d50d888b638'}
Maven
GHSA-7q4h-pj78-j7vg
Authorization service vulnerable to DDos attacks in Apache CFX
CXF supports (via JwtRequestCodeFilter) passing OAuth 2 parameters via a JWT token as opposed to query parameters (see: The OAuth 2.0 Authorization Framework: JWT Secured Authorization Request (JAR)). Instead of sending a JWT token as a "request" parameter, the spec also supports specifying a URI from which to retrieve...
{'CVE-2021-22696'}
2022-04-22T17:02:01.173146Z
2021-05-13T22:31:05Z
HIGH
null
{'CWE-918', 'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-22696', 'https://github.com/apache/cxf/commit/40503a53914758759894f704bbf139ae89ace286', 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/r8651c06212c56294a1c0e...
null
{'https://github.com/apache/cxf/commit/aa789c5c4686597a7bdef2443909ab491fc2bc04', 'https://github.com/apache/cxf/commit/40503a53914758759894f704bbf139ae89ace286'}
{'https://github.com/apache/cxf/commit/aa789c5c4686597a7bdef2443909ab491fc2bc04', 'https://github.com/apache/cxf/commit/40503a53914758759894f704bbf139ae89ace286'}
Maven
GHSA-cjx7-399x-p2rj
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in micronaut-core
With a basic configuration like ```yaml router: static-resources: assets: enabled: true mapping: /.assets/public/** paths: file:/home/lstrmiska/test/ ``` it is possible to access any file from a filesystem, using "/../../" in URL, as Micronaut does not restrict file access to configured paths....
{'CVE-2021-32769'}
2022-03-03T05:13:16.896198Z
2021-07-26T21:15:08Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32769', 'https://github.com/micronaut-projects/micronaut-core/security/advisories/GHSA-cjx7-399x-p2rj', 'https://github.com/micronaut-projects/micronaut-core/commit/a0cfeb13bf1ef5d692d16d4a3b91b34b7456bb11'}
null
{'https://github.com/micronaut-projects/micronaut-core/commit/a0cfeb13bf1ef5d692d16d4a3b91b34b7456bb11'}
{'https://github.com/micronaut-projects/micronaut-core/commit/a0cfeb13bf1ef5d692d16d4a3b91b34b7456bb11'}
Maven
GHSA-9vjp-v76f-g363
SnappyFrameDecoder doesn't restrict chunk length any may buffer skippable chunks in an unnecessary way
### Impact The Snappy frame decoder function doesn't restrict the chunk length which may lead to excessive memory usage. Beside this it also may buffer reserved skippable chunks until the whole chunk was received which may lead to excessive memory usage as well. This vulnerability can be triggered by supplying malicio...
{'CVE-2021-37137'}
2022-04-22T15:47:02.537330Z
2021-09-09T17:11:31Z
HIGH
null
{'CWE-400'}
{'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/rfb2bf8597e53364ccab212fbcbb2a4e9f0a9e1429b1dc08023c6868e@%3Cdev.tinkerpop.apache.org%3E', 'https://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0@%3Ccommits.druid.apache.org%3E', 'ht...
null
{'https://github.com/netty/netty/commit/6da4956b31023ae967451e1d94ff51a746a9194f'}
{'https://github.com/netty/netty/commit/6da4956b31023ae967451e1d94ff51a746a9194f'}
Maven
GHSA-f4cj-3q3h-884r
Partial authorization bypass on document save in xwiki-platform
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user with SCRIPT right (EDIT right before XWiki 7.4) can save a document with the right of the current user which allow accessing API requiring programming right if the current user has programming right. It has...
{'CVE-2022-23615'}
2022-05-05T18:01:28Z
2022-02-09T21:21:53Z
MODERATE
null
{'CWE-863'}
{'https://github.com/xwiki/xwiki-platform/commit/7ab0fe7b96809c7a3881454147598d46a1c9bbbe', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23615', 'https://github.com/xwiki/xwiki-platform', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-f4cj-3q3h-884r', 'https://jira.xwiki.org/browse/XWIKI-5024'}
null
{'https://github.com/xwiki/xwiki-platform/commit/7ab0fe7b96809c7a3881454147598d46a1c9bbbe'}
{'https://github.com/xwiki/xwiki-platform/commit/7ab0fe7b96809c7a3881454147598d46a1c9bbbe'}
Maven
GHSA-66q9-f7ff-mmx6
Local file inclusion vulnerability in http4s
### Impact This vulnerability applies to all users of: * `org.http4s.server.staticcontent.FileService` * `org.http4s.server.staticcontent.ResourceService` * `org.http4s.server.staticcontent.WebjarService` #### Path escaping URI normalization is applied incorrectly. Requests whose path info contain `../` or `//` can...
{'CVE-2020-5280'}
2022-03-03T05:13:32.942852Z
2020-03-25T17:35:51Z
CRITICAL
null
{'CWE-23'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-5280', 'https://github.com/http4s/http4s/commit/752b3f63a05a31d2de4f8706877aa08d6b89efca', 'https://github.com/http4s/http4s/commit/250afddbb2e65b70ca9ddaec9d1eb3aaa56de7ec', 'https://github.com/http4s/http4s/security/advisories/GHSA-66q9-f7ff-mmx6', 'https://github.com/http4...
null
{'https://github.com/http4s/http4s/commit/b87f31b2292dabe667bec3b04ce66176c8a3e17b', 'https://github.com/http4s/http4s/commit/250afddbb2e65b70ca9ddaec9d1eb3aaa56de7ec', 'https://github.com/http4s/http4s/commit/752b3f63a05a31d2de4f8706877aa08d6b89efca'}
{'https://github.com/http4s/http4s/commit/250afddbb2e65b70ca9ddaec9d1eb3aaa56de7ec', 'https://github.com/http4s/http4s/commit/752b3f63a05a31d2de4f8706877aa08d6b89efca', 'https://github.com/http4s/http4s/commit/b87f31b2292dabe667bec3b04ce66176c8a3e17b'}
Maven
GHSA-q42q-523g-3fwv
Cross-Site Request Forgery
This affects the package com.softwaremill.akka-http-session:core_2.13 before 0.5.11; the package com.softwaremill.akka-http-session:core_2.12 before 0.5.11; the package com.softwaremill.akka-http-session:core_2.11 before 0.5.11. For older versions, endpoints protected by randomTokenCsrfProtection could be bypassed with...
{'CVE-2020-7780'}
2022-03-03T05:13:51.448943Z
2022-02-09T23:06:40Z
MODERATE
null
{'CWE-352'}
{'https://github.com/softwaremill/akka-http-session/issues/77', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7780', 'https://snyk.io/vuln/SNYK-JAVA-COMSOFTWAREMILLAKKAHTTPSESSION-1045352', 'https://github.com/softwaremill/akka-http-session/commit/57f11663eecb84be03383d164f655b9c5f953b41', 'https://snyk.io/vuln/SNYK-JAVA-...
null
{'https://github.com/softwaremill/akka-http-session/commit/57f11663eecb84be03383d164f655b9c5f953b41'}
{'https://github.com/softwaremill/akka-http-session/commit/57f11663eecb84be03383d164f655b9c5f953b41'}
Maven
GHSA-wc73-w5r9-x9pc
Cross-site Scripting in XXL-JOB
XXL-JOB 2.2.0 allows Stored XSS (in Add User) to bypass the 20-character limit via xxl-job-admin/src/main/java/com/xxl/job/admin/controller/UserController.java.
{'CVE-2020-29204'}
2022-03-03T05:13:46.595872Z
2021-10-12T16:41:36Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-29204', 'https://github.com/xuxueli/xxl-job', 'https://github.com/xuxueli/xxl-job/issues/2083', 'https://github.com/xuxueli/xxl-job/commit/227628567354d3c156951009d683c6fec3006e0e'}
null
{'https://github.com/xuxueli/xxl-job/commit/227628567354d3c156951009d683c6fec3006e0e'}
{'https://github.com/xuxueli/xxl-job/commit/227628567354d3c156951009d683c6fec3006e0e'}
Maven
GHSA-5mg8-w23w-74h3
Information Disclosure in Guava
A temp directory creation vulnerability exists in all Guava versions allowing an attacker with access to the machine to potentially access data in a temporary directory created by the Guava `com.google.common.io.Files.createTempDir()`. The permissions granted to the directory created default to the standard unix-like /...
{'CVE-2020-8908'}
2022-04-26T21:00:16.020771Z
2021-03-25T17:04:19Z
LOW
null
{'CWE-732', 'CWE-200', 'CWE-173'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-8908', 'https://lists.apache.org/thread.html/reebbd63c25bc1a946caa419cec2be78079f8449d1af48e52d47c9e85@%3Cissues.geode.apache.org%3E', 'https://lists.apache.org/thread.html/r6874dfe26eefc41b7c9a5e4a0487846fc4accf8c78ff948b24a1104a@%3Cdev.drill.apache.org%3E', 'https://lists.a...
null
{'https://github.com/google/guava/commit/fec0dbc4634006a6162cfd4d0d09c962073ddf40'}
{'https://github.com/google/guava/commit/fec0dbc4634006a6162cfd4d0d09c962073ddf40'}
Maven
GHSA-mvqp-q37c-wf9j
Moderate severity vulnerability that affects io.ratpack:ratpack-core
## CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting') Versions of Ratpack 0.9.1 through and including 1.7.4 are vulnerable to [HTTP Response Splitting](https://www.owasp.org/index.php/HTTP_Response_Splitting), if untrusted and unsanitized data is used to populate the header...
{'CVE-2019-17513'}
2022-03-03T05:13:42.988026Z
2019-10-21T16:08:43Z
HIGH
null
{'CWE-74'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-17513', 'https://github.com/ratpack/ratpack', 'https://github.com/ratpack/ratpack/releases/tag/v1.7.5', 'https://github.com/ratpack/ratpack/commit/efb910d38a96494256f36675ef0e5061097dd77d', 'https://github.com/ratpack/ratpack/commit/c560a8d10cb8bdd7a526c1ca2e67c8f224ca23ae', ...
null
{'https://github.com/ratpack/ratpack/commit/efb910d38a96494256f36675ef0e5061097dd77d', 'https://github.com/ratpack/ratpack/commit/c560a8d10cb8bdd7a526c1ca2e67c8f224ca23ae'}
{'https://github.com/ratpack/ratpack/commit/c560a8d10cb8bdd7a526c1ca2e67c8f224ca23ae', 'https://github.com/ratpack/ratpack/commit/efb910d38a96494256f36675ef0e5061097dd77d'}
Maven
GHSA-694p-xrhg-x3wm
CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request Header Injection')
### Vulnerability Micronaut's HTTP client is vulnerable to "HTTP Request Header Injection" due to not validating request headers passed to the client. Example of vulnerable code: ```java @Controller("/hello") public class HelloController { @Inject @Client("/") RxHttpClient client; @Get("/external-e...
{'CVE-2020-7611'}
2022-03-03T05:13:51.394878Z
2020-03-30T20:54:55Z
CRITICAL
null
{'CWE-444'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-7611', 'https://github.com/micronaut-projects/micronaut-core', 'https://github.com/micronaut-projects/micronaut-core/security/advisories/GHSA-694p-xrhg-x3wm', 'https://snyk.io/vuln/SNYK-JAVA-IOMICRONAUT-561342', 'https://github.com/micronaut-projects/micronaut-core/commit/bc8...
null
{'https://github.com/micronaut-projects/micronaut-core/commit/6deb60b75517f80c57b42d935f07955c773b766d', 'https://github.com/micronaut-projects/micronaut-core/commit/bc855e439c4a5ced3d83195bb59d0679cbd95add', 'https://github.com/micronaut-projects/micronaut-core/commit/9d1eff5c8df1d6cda1fe00ef046729b2a6abe7f1'}
{'https://github.com/micronaut-projects/micronaut-core/commit/6deb60b75517f80c57b42d935f07955c773b766d', 'https://github.com/micronaut-projects/micronaut-core/commit/bc855e439c4a5ced3d83195bb59d0679cbd95add', 'https://github.com/micronaut-projects/micronaut-core/commit/9d1eff5c8df1d6cda1fe00ef046729b2a6abe7f1'}
Maven
GHSA-mwm4-5qwr-g9pf
Keycloak is vulnerable to IDN homograph attack
A flaw was found in keycloak, where IDN homograph attacks are possible. This flaw allows a malicious user to register a name that already exists and then tricking an admin to grant extra privileges. The highest threat from this vulnerability is to integrity.
null
2022-05-02T22:51:34.306966Z
2022-04-28T21:00:31Z
LOW
null
{'CWE-284'}
{'https://github.com/keycloak/keycloak/security/advisories/GHSA-mwm4-5qwr-g9pf', 'https://github.com/keycloak/keycloak', 'https://github.com/keycloak/keycloak/commit/ac79fd0c23c6947a04073afc61e30d341498438e'}
null
{'https://github.com/keycloak/keycloak/commit/ac79fd0c23c6947a04073afc61e30d341498438e'}
{'https://github.com/keycloak/keycloak/commit/ac79fd0c23c6947a04073afc61e30d341498438e'}
Maven
GHSA-668q-qrv7-99fm
Deserialization of Untrusted Data in logback
In logback version 1.2.7 and prior versions, an attacker with the required privileges to edit configurations files could craft a malicious configuration allowing to execute arbitrary code loaded from LDAP servers.
{'CVE-2021-42550'}
2022-03-28T19:45:13.626788Z
2021-12-17T20:00:50Z
MODERATE
null
{'CWE-502'}
{'https://github.com/qos-ch/logback/commit/ef4fc4186b74b45ce80d86833820106ff27edd42', 'https://github.com/qos-ch/logback/blob/1502cba4c1dfd135b2e715bc0cf80c0045d4d128/logback-site/src/site/pages/news.html', 'https://jira.qos.ch/browse/LOGBACK-1591', 'https://github.com/cn-panda/logbackRceDemo', 'https://github.com/qos-...
null
{'https://github.com/qos-ch/logback/commit/87291079a1de9369ac67e20dc70a8fdc7cc4359c', 'https://github.com/qos-ch/logback/commit/ef4fc4186b74b45ce80d86833820106ff27edd42'}
{'https://github.com/qos-ch/logback/commit/ef4fc4186b74b45ce80d86833820106ff27edd42', 'https://github.com/qos-ch/logback/commit/87291079a1de9369ac67e20dc70a8fdc7cc4359c'}
Maven
GHSA-6pcc-3rfx-4gpm
Dom4j contains a XML Injection vulnerability
dom4j version prior to version 2.1.1 contains a CWE-91: XML Injection vulnerability in Class: Element. Methods: addElement, addAttribute that can result in an attacker tampering with XML documents through XML injection. This attack appear to be exploitable via an attacker specifying attributes or elements in the XML do...
{'CVE-2018-1000632'}
2022-04-26T18:48:01.638175Z
2018-10-16T17:01:25Z
HIGH
null
{'CWE-91'}
{'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://access.redhat.com/errata/RHSA-2019:1162', 'https://github.com/dom4j/dom4j/', 'https://github.com/dom4j/dom4j/commit/e598eb43d418744c4dbf62f647dd2381c9ce9387', 'https://access.redhat.com/errata/RHSA-2019:1160', 'https://access.redh...
null
{'https://github.com/dom4j/dom4j/commit/c2a99d7dee8ce7a4e5bef134bb781a6672bd8a0f', 'https://github.com/dom4j/dom4j/commit/e598eb43d418744c4dbf62f647dd2381c9ce9387'}
{'https://github.com/dom4j/dom4j/commit/e598eb43d418744c4dbf62f647dd2381c9ce9387', 'https://github.com/dom4j/dom4j/commit/c2a99d7dee8ce7a4e5bef134bb781a6672bd8a0f'}
Maven
GHSA-gx6h-936c-vrrr
Cross site scripting in registration template in xwiki-platform
### Impact We found a possible XSS vector in the `registerinline.vm` template related to the `xredirect` hidden field. This template is only used in the following conditions: - the wiki must be open to registration for anyone - the wiki must be closed to view for Guest users (more specifically the XWiki.Registrat...
{'CVE-2022-23622'}
2022-02-09T23:25:44Z
2022-02-09T23:25:44Z
HIGH
null
{'CWE-79'}
{'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gx6h-936c-vrrr', 'https://github.com/xwiki/xwiki-platform/commit/053d957d53f2a543d158f3ab651e390d2728e0b9', 'https://github.com/xwiki/xwiki-platform', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23622', 'https://jira.xwiki.org/browse/XWIKI-19291'}
null
{'https://github.com/xwiki/xwiki-platform/commit/053d957d53f2a543d158f3ab651e390d2728e0b9'}
{'https://github.com/xwiki/xwiki-platform/commit/053d957d53f2a543d158f3ab651e390d2728e0b9'}
Maven
GHSA-fmm9-3gv8-58f4
Improper Handling of Missing Values in kaml
### Impact Attackers that could provide arbitrary YAML input to an application that uses kaml could cause the application to endlessly loop while parsing the input. This could result in resource starvation and denial of service. This only affects applications that use polymorphic serialization with the default tagged...
{'CVE-2021-39194'}
2022-03-03T05:13:21.645961Z
2021-09-07T23:08:40Z
MODERATE
null
{'CWE-230', 'CWE-835'}
{'https://github.com/charleskorn/kaml/', 'https://github.com/charleskorn/kaml/issues/179', 'https://github.com/charleskorn/kaml/commit/e18785d043fc6324c81e968aae9764b4b060bc6a', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39194', 'https://github.com/charleskorn/kaml/security/advisories/GHSA-fmm9-3gv8-58f4'}
null
{'https://github.com/charleskorn/kaml/commit/e18785d043fc6324c81e968aae9764b4b060bc6a'}
{'https://github.com/charleskorn/kaml/commit/e18785d043fc6324c81e968aae9764b4b060bc6a'}
Maven
GHSA-5x3v-2gxr-59m2
Directory traversal in Apache RocketMQ
In Apache RocketMQ 4.2.0 to 4.6.0, when the automatic topic creation in the broker is turned on by default, an evil topic like “../../../../topic2020” is sent from rocketmq-client to the broker, a topic folder will be created in the parent directory in brokers, which leads to a directory traversal vulnerability. Users ...
{'CVE-2019-17572'}
2022-03-03T05:13:21.737252Z
2020-07-01T17:26:15Z
MODERATE
null
{'CWE-22'}
{'https://lists.apache.org/thread.html/fdea1c5407da47a17d5522fa149a097cacded1916c1c1534d46edc6d%40%3Cprivate.rocketmq.apache.org%3E', 'https://github.com/apache/rocketmq/issues/1637', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17572', 'https://github.com/apache/rocketmq/commit/f8f6fbe4aa7f5dee937e688322628c366b12a552',...
null
{'https://github.com/apache/rocketmq/commit/f8f6fbe4aa7f5dee937e688322628c366b12a552'}
{'https://github.com/apache/rocketmq/commit/f8f6fbe4aa7f5dee937e688322628c366b12a552'}
Maven
GHSA-4446-656p-f54g
Deserialization of Untrusted Data in Bouncy castle
Legion of the Bouncy Castle Legion of the Bouncy Castle Java Cryptography APIs version prior to version 1.60 contains a CWE-470: Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') vulnerability in XMSS/XMSS^MT private key deserialization that can result in Deserializing an XMSS/XMSS^MT p...
{'CVE-2018-1000613'}
2022-04-27T18:01:56.807655Z
2018-10-17T16:23:12Z
CRITICAL
null
{'CWE-502', 'CWE-470'}
{'https://github.com/bcgit/bc-java', 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00011.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000613', 'https://lists...
null
{'https://github.com/bcgit/bc-java/commit/cd98322b171b15b3f88c5ec871175147893c31e6#diff-148a6c098af0199192d6aede960f45dc', 'https://github.com/bcgit/bc-java/commit/4092ede58da51af9a21e4825fbad0d9a3ef5a223#diff-2c06e2edef41db889ee14899e12bd574'}
{'https://github.com/bcgit/bc-java/commit/cd98322b171b15b3f88c5ec871175147893c31e6#diff-148a6c098af0199192d6aede960f45dc', 'https://github.com/bcgit/bc-java/commit/4092ede58da51af9a21e4825fbad0d9a3ef5a223#diff-2c06e2edef41db889ee14899e12bd574'}
Maven
GHSA-4gr7-qw2q-jxh6
Cross-site Scripting in Nacos
A Cross Site Scripting (XSS) vulnerability exists in Nacos 2.0.3 in auth/users via the (1) pageSize and (2) pageNo parameters.
{'CVE-2021-44667'}
2022-03-22T21:46:59.043224Z
2022-03-12T00:00:27Z
MODERATE
null
{'CWE-79'}
{'https://github.com/alibaba/nacos', 'https://github.com/alibaba/nacos/issues/7359', 'https://github.com/alibaba/nacos/commit/cd6d7e33b94f24814701f3faf8b632e5e85444c5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44667'}
null
{'https://github.com/alibaba/nacos/commit/cd6d7e33b94f24814701f3faf8b632e5e85444c5'}
{'https://github.com/alibaba/nacos/commit/cd6d7e33b94f24814701f3faf8b632e5e85444c5'}
Maven
GHSA-7chv-rrw6-w6fc
XStream is vulnerable to a Remote Command Execution attack
### Impact The vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. ### Patches ...
{'CVE-2021-29505'}
2022-04-22T16:01:59.255632Z
2021-05-18T18:36:27Z
HIGH
null
{'CWE-502', 'CWE-74', 'CWE-94'}
{'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://www.debian.org/security/2021/dsa-5004', 'https://github.com/x-stream/xstream', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29505', 'https://lists.debian.org/debian-lts-announce/2021/07/msg00004.html', 'https://x-stream.github.io/CVE-2021-29505.html', 'h...
null
{'https://github.com/x-stream/xstream/commit/24fac82191292c6ae25f94508d28b9823f83624f'}
{'https://github.com/x-stream/xstream/commit/24fac82191292c6ae25f94508d28b9823f83624f'}
Maven
GHSA-cmx4-p4v5-hmr5
Server-side request forgery (SSRF) in Apache Batik
Apache Batik is vulnerable to server-side request forgery, caused by improper input validation by the "xlink:href" attributes. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.
{'CVE-2019-17566'}
2022-03-03T05:13:03.743431Z
2022-02-09T00:46:46Z
HIGH
null
{'CWE-20', 'CWE-918'}
{'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/apache/xmlgraphics-batik/commit/bc6078ca949039e2076cd08b4cb169c84c1179b1', 'https://xmlgraphics.apache.org/security.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://issues.apache.org/jira/browse/BATIK-1276', 'https:/...
null
{'https://github.com/apache/xmlgraphics-batik/commit/bc6078ca949039e2076cd08b4cb169c84c1179b1'}
{'https://github.com/apache/xmlgraphics-batik/commit/bc6078ca949039e2076cd08b4cb169c84c1179b1'}
Maven
GHSA-2jx8-v4hv-gx3h
XXE vulnerability in Launch import
| Release Date | Affected Projects | Affected Versions | Access Vector| Security Risk | |--------------|-------------------|-------------------|---------------|---------------| | Monday, May 4, 2020| [service-api](https://github.com/reportportal/service-api) | Every version, starting from 3.1.0 | Remote | Medium | ###...
{'CVE-2020-12642'}
2022-03-03T05:14:09.263133Z
2021-06-28T16:45:47Z
HIGH
null
{'CWE-611'}
{'https://github.com/reportportal/service-api/pull/1201', 'https://github.com/reportportal/reportportal', 'https://github.com/reportportal/reportportal/security/advisories/GHSA-2jx8-v4hv-gx3h', 'https://nvd.nist.gov/vuln/detail/CVE-2020-12642', 'https://github.com/reportportal/service-api/commit/da4a012abdcc69f02f4255d...
null
{'https://github.com/reportportal/service-api/commit/da4a012abdcc69f02f4255d81466f1f473b7f418'}
{'https://github.com/reportportal/service-api/commit/da4a012abdcc69f02f4255d81466f1f473b7f418'}
Maven
GHSA-2jhm-qp48-hv5j
Missing authorization in xwiki-platform
### Impact Any user with SCRIPT right (EDIT right before XWiki 7.4) can read any file located in the XWiki WAR (for example xwiki.cfg and xwiki.properties) through XWiki#invokeServletAndReturnAsString: ``` $xwiki.invokeServletAndReturnAsString("/WEB-INF/xwiki.cfg") ``` ### Patches It has been patched in XWiki versi...
{'CVE-2022-23621'}
2022-02-09T21:56:05Z
2022-02-09T21:56:05Z
MODERATE
null
{'CWE-862'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23621', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-2jhm-qp48-hv5j', 'https://github.com/xwiki/xwiki-platform', 'https://jira.xwiki.org/browse/XWIKI-18870', 'https://github.com/xwiki/xwiki-platform/commit/df8bd49b5a4d87a427002c6535fb5b1746ff117a'}
null
{'https://github.com/xwiki/xwiki-platform/commit/df8bd49b5a4d87a427002c6535fb5b1746ff117a'}
{'https://github.com/xwiki/xwiki-platform/commit/df8bd49b5a4d87a427002c6535fb5b1746ff117a'}
Maven
GHSA-x64g-4xx9-fh6x
Denial of Service in Cryptacular
CiphertextHeader.java in Cryptacular before 1.2.4, as used in Apereo CAS and other products, allows attackers to trigger excessive memory allocation during a decode operation, because the nonce array length associated with &quot;new byte&quot; may depend on untrusted input within the header of encoded data.
{'CVE-2020-7226'}
2022-04-22T18:30:43.107186Z
2020-06-10T20:02:58Z
HIGH
null
{'CWE-770'}
{'https://lists.apache.org/thread.html/r380781f5b489cb3c818536cd3b3757e806bfe0bca188591e0051ac03@%3Ccommits.ws.apache.org%3E', 'https://lists.apache.org/thread.html/r0847c7eb78c8f9e87d5b841fbd5da52b2ad4b4345e04b51c30621d88@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/re04e4f8f0d095387fb6b0ff90...
null
{'https://github.com/apereo/cas/commit/93b1c3e9d90e36a19d0fa0f6efb863c6f0235e75', 'https://github.com/apereo/cas/commit/a042808d6adbbf44753d52c55cac5f533e24101f', 'https://github.com/vt-middleware/cryptacular/commit/311baf12252abf21947afd07bf0a0291ec3ec796', 'https://github.com/apereo/cas/commit/8810f2b6c71d73341d4dde6...
{'https://github.com/apereo/cas/commit/a042808d6adbbf44753d52c55cac5f533e24101f', 'https://github.com/apereo/cas/commit/8810f2b6c71d73341d4dde6b09a18eb46cfd6d45', 'https://github.com/vt-middleware/cryptacular/commit/311baf12252abf21947afd07bf0a0291ec3ec796', 'https://github.com/apereo/cas/commit/93b1c3e9d90e36a19d0fa0f...
Maven
GHSA-j7m2-58wv-9v79
Vulnerability in Torpedo Query
Torpedo Query before 2.5.3 mishandles the LIKE operator in ConditionBuilder.java, LikeCondition.java, and NotLikeCondition.java.
{'CVE-2019-11343'}
2022-03-03T05:13:02.028405Z
2022-02-10T20:47:29Z
CRITICAL
null
null
{'https://github.com/xjodoin/torpedoquery/compare/v2.5.2...v2.5.3', 'https://github.com/xjodoin/torpedoquery/commit/3c20b874fba9cc2a78b9ace10208de1602b56c3f', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11343', 'https://github.com/xjodoin/torpedoquery/'}
null
{'https://github.com/xjodoin/torpedoquery/commit/3c20b874fba9cc2a78b9ace10208de1602b56c3f'}
{'https://github.com/xjodoin/torpedoquery/commit/3c20b874fba9cc2a78b9ace10208de1602b56c3f'}
Maven
GHSA-7q8g-gpfp-v8gx
Insertion of Sensitive Information into Log File in Apache NiFi
In Apache NiFi 0.0.1 to 1.11.0, the flow fingerprint factory generated flow fingerprints which included sensitive property descriptor values. In the event a node attempted to join a cluster and the cluster flow was not inheritable, the flow fingerprint of both the cluster and local flow was printed, potentially contain...
{'CVE-2020-1942'}
2022-03-03T05:13:01.375961Z
2022-01-06T20:40:58Z
HIGH
null
{'CWE-532', 'CWE-200'}
{'https://nifi.apache.org/security.html#CVE-2020-1942', 'https://github.com/apache/nifi/commit/d7c29f46378379fb596e4d1e59d1a3c41063db5b', 'https://github.com/apache/nifi/commit/95746d346cddbd6134c4b28fdc39d5813a626f97', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1942'}
null
{'https://github.com/apache/nifi/commit/95746d346cddbd6134c4b28fdc39d5813a626f97', 'https://github.com/apache/nifi/commit/d7c29f46378379fb596e4d1e59d1a3c41063db5b'}
{'https://github.com/apache/nifi/commit/d7c29f46378379fb596e4d1e59d1a3c41063db5b', 'https://github.com/apache/nifi/commit/95746d346cddbd6134c4b28fdc39d5813a626f97'}
Maven
GHSA-w8rc-pgxq-x2cj
Negative charge in shopping cart in Shopizer
### Impact Using API or Controller based versions negative quantity is not adequately validated hence creating incorrect shopping cart and order total. ### Patches Adding a back-end verification to check that quantity parameter isn't negative. If so, it is set to 1. Patched in 2.11.0 ### Workarounds Without uprading...
{'CVE-2020-11007'}
2022-03-03T05:14:17.425427Z
2020-04-22T20:59:26Z
CRITICAL
null
{'CWE-20'}
{'https://github.com/shopizer-ecommerce/shopizer/commit/929ca0839a80c6f4dad087e0259089908787ad2a', 'https://github.com/shopizer-ecommerce/shopizer/security/advisories/GHSA-w8rc-pgxq-x2cj', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11007'}
null
{'https://github.com/shopizer-ecommerce/shopizer/commit/929ca0839a80c6f4dad087e0259089908787ad2a'}
{'https://github.com/shopizer-ecommerce/shopizer/commit/929ca0839a80c6f4dad087e0259089908787ad2a'}
Maven
GHSA-f256-j965-7f32
Possible request smuggling in HTTP/2 due missing validation of content-length
### Impact The content-length header is not correctly validated if the request only use a single Http2HeaderFrame with the endStream set to to true. This could lead to request smuggling if the request is proxied to a remote peer and translated to HTTP/1.1 This is a followup of https://github.com/netty/netty/security/a...
{'CVE-2021-21409'}
2022-04-22T16:01:59.493412Z
2021-03-30T15:10:38Z
MODERATE
null
{'CWE-444'}
{'https://lists.apache.org/thread.html/r69efd8ef003f612c43e4154e788ca3b1f837feaacd16d97854402355@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/redef0fb5474fd686781007de9ddb852b24f1b04131a248d9a4789183@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r101f82d8...
null
{'https://github.com/netty/netty/commit/b0fa4d5aab4215f3c22ce6123dd8dd5f38dc0432'}
{'https://github.com/netty/netty/commit/b0fa4d5aab4215f3c22ce6123dd8dd5f38dc0432'}
Maven
GHSA-w4fj-ccr6-7pcp
Insertion of Sensitive Information into Log File in Apache NiFi
An information disclosure vulnerability was found in Apache NiFi 1.10.0. The sensitive parameter parser would log parsed values for debugging purposes. This would expose literal values entered in a sensitive property when no parameter was present.
{'CVE-2020-1928'}
2022-01-04T19:51:02Z
2022-01-06T20:40:56Z
MODERATE
null
{'CWE-532', 'CWE-200'}
{'https://lists.apache.org/thread.html/rd50baccd1bbb96c2327d5a8caa25a49692b3d68d96915bd1cfbb9f8b@%3Cusers.tomcat.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1928', 'https://github.com/apache/nifi/commit/42cb6e84898e66672878f61f99543d6af3c0a567', 'https://nifi.apache.org/security.html#CVE-2020-1928', 'htt...
null
{'https://github.com/apache/nifi/commit/42cb6e84898e66672878f61f99543d6af3c0a567'}
{'https://github.com/apache/nifi/commit/42cb6e84898e66672878f61f99543d6af3c0a567'}
Maven
GHSA-57j2-w4cx-62h2
Deeply nested json in jackson-databind
jackson-databind is a data-binding package for the Jackson Data Processor. jackson-databind allows a Java stack overflow exception and denial of service via a large depth of nested objects.
{'CVE-2020-36518'}
2022-03-28T20:01:54.218311Z
2022-03-12T00:00:36Z
HIGH
null
{'CWE-787'}
{'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.13', 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.12', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36518', 'https://github.com/FasterXML/jackson-databind/issues/2816', 'https://github.com/FasterXML/jackson-databind', 'https://github.com/Faster...
null
{'https://github.com/FasterXML/jackson-databind/commit/fcfc4998ec23f0b1f7f8a9521c2b317b6c25892b'}
{'https://github.com/FasterXML/jackson-databind/commit/fcfc4998ec23f0b1f7f8a9521c2b317b6c25892b'}
Maven
GHSA-8jpx-m2wh-2v34
Remote Code Execution (RCE) vulnerability in dropwizard-validation
### Summary A server-side template injection was identified in the self-validating ([`@SelfValidating`](https://javadoc.io/static/io.dropwizard/dropwizard-project/2.0.3/io/dropwizard/validation/selfvalidating/SelfValidating.html)) feature of **dropwizard-validation** enabling attackers to inject arbitrary Java EL expr...
{'CVE-2020-11002'}
2022-03-03T05:13:54.974005Z
2020-04-10T18:42:20Z
HIGH
null
{'CWE-74'}
{'https://docs.jboss.org/hibernate/validator/6.1/reference/en-US/html_single/#section-hibernateconstraintvalidatorcontext', 'https://github.com/dropwizard/dropwizard/security/policy#reporting-a-vulnerability', 'https://github.com/dropwizard/dropwizard/security/advisories/GHSA-8jpx-m2wh-2v34', 'https://github.com/dropwi...
null
{'https://github.com/dropwizard/dropwizard/commit/d5a512f7abf965275f2a6b913ac4fe778e424242'}
{'https://github.com/dropwizard/dropwizard/commit/d5a512f7abf965275f2a6b913ac4fe778e424242'}
Maven
GHSA-q7q9-w24q-cpgh
Cross-site Scripting (XSS) in Apache Ambari Views
A cross-site scripting issue was found in Apache Ambari Views. This was addressed in Apache Ambari 2.7.4.
{'CVE-2020-1936'}
2022-03-03T05:13:02.068224Z
2022-01-06T20:35:22Z
MODERATE
null
{'CWE-79'}
{'https://github.com/apache/ambari/pull/3040', 'https://issues.apache.org/jira/browse/AMBARI-25329', 'http://www.openwall.com/lists/oss-security/2021/03/02/1', 'https://github.com/apache/ambari/pull/3040/commits/a9cfdb9dcce63a3494c07c81ebb2cf8da218a210', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1936', 'https://lists....
null
{'https://github.com/apache/ambari/pull/3040/commits/a9cfdb9dcce63a3494c07c81ebb2cf8da218a210'}
{'https://github.com/apache/ambari/pull/3040/commits/a9cfdb9dcce63a3494c07c81ebb2cf8da218a210'}
Maven
GHSA-hxxp-6546-wv6r
Improper Restriction of XML External Entity Reference
Jenkins Selenium HTML report Plugin 1.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
{'CVE-2021-21672'}
2022-04-19T18:30:08.852585Z
2021-07-02T18:36:13Z
MODERATE
null
{'CWE-611'}
{'https://www.jenkins.io/security/advisory/2021-06-30/#SECURITY-2329', 'http://www.openwall.com/lists/oss-security/2021/06/30/1', 'http://www.openwall.com/lists/oss-security/2022/04/14/2', 'https://github.com/jenkinsci/seleniumhtmlreport-plugin/commit/5ca59b8c7d23af4450dc7f19c1b4107d59063ae1', 'https://nvd.nist.gov/vul...
null
{'https://github.com/jenkinsci/seleniumhtmlreport-plugin/commit/5ca59b8c7d23af4450dc7f19c1b4107d59063ae1'}
{'https://github.com/jenkinsci/seleniumhtmlreport-plugin/commit/5ca59b8c7d23af4450dc7f19c1b4107d59063ae1'}
Maven
GHSA-vjv6-gq77-3mjw
XXE attack in Mapfish Print
### Impact A user can do to an XML External Entity (XXE) attack with the provided SDL style. ### Patches Use version >= 3.24 ### Workarounds No ### References * https://cwe.mitre.org/data/definitions/611.html * https://github.com/mapfish/mapfish-print/pull/1397/commits/e1d0527d13db06b2b62ca7d6afb9e97dacd67a0e ### F...
{'CVE-2020-15232'}
2022-03-03T05:12:58.870464Z
2020-07-07T16:32:45Z
LOW
null
{'CWE-611'}
{'https://github.com/mapfish/mapfish-print/security/advisories/GHSA-vjv6-gq77-3mjw', 'https://github.com/mapfish/mapfish-print/pull/1397/commits/e1d0527d13db06b2b62ca7d6afb9e97dacd67a0e', 'https://github.com/mapfish/mapfish-print/pull/1397', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15232'}
null
{'https://github.com/mapfish/mapfish-print/pull/1397/commits/e1d0527d13db06b2b62ca7d6afb9e97dacd67a0e'}
{'https://github.com/mapfish/mapfish-print/pull/1397/commits/e1d0527d13db06b2b62ca7d6afb9e97dacd67a0e'}
Maven
GHSA-x2p8-rgfm-qw3v
Access Control vulnerability within CoreNLP
An Incorrect Access Control vulnerability exists in CoreNLP 4.3.2 via the classifier in NERServlet.java (lines 158 and 159).
{'CVE-2021-44550'}
2022-03-07T20:47:22.182725Z
2022-02-25T00:01:07Z
CRITICAL
null
{'CWE-863'}
{'https://github.com/stanfordnlp/CoreNLP', 'https://github.com/stanfordnlp/CoreNLP/issues/1222', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44550', 'https://github.com/stanfordnlp/CoreNLP/commit/5ee097dbede547023e88f60ed3f430ff09398b87'}
null
{'https://github.com/stanfordnlp/CoreNLP/commit/5ee097dbede547023e88f60ed3f430ff09398b87'}
{'https://github.com/stanfordnlp/CoreNLP/commit/5ee097dbede547023e88f60ed3f430ff09398b87'}
Maven
GHSA-6g3c-2mh5-7q6x
Missing validation of JWT signature in `ManyDesigns/Portofino`
### Impact https://github.com/ManyDesigns/Portofino before version 5.2.1 did not properly verify the signature of JSON Web Tokens. This allows forging a valid JWT. ### Patches The issue will be patched in the upcoming 5.2.1 release. ### For more information If you have any questions or comments about this advisory: *...
{'CVE-2021-29451'}
2022-03-03T05:13:03.766772Z
2021-04-19T14:56:33Z
CRITICAL
null
{'CWE-347'}
{'https://github.com/ManyDesigns/Portofino/commit/8c754a0ad234555e813dcbf9e57d637f9f23d8fb', 'https://github.com/ManyDesigns/Portofino/security/advisories/GHSA-6g3c-2mh5-7q6x', 'https://mvnrepository.com/artifact/com.manydesigns/portofino', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29451'}
null
{'https://github.com/ManyDesigns/Portofino/commit/8c754a0ad234555e813dcbf9e57d637f9f23d8fb'}
{'https://github.com/ManyDesigns/Portofino/commit/8c754a0ad234555e813dcbf9e57d637f9f23d8fb'}
Maven
GHSA-w534-q4xf-h5v2
XSS in Mapfish Print relating to JSONP support
### Impact A user can use the JSONP support to do a Cross-site scripting. ### Patches Use version >= 3.24 ### Workarounds No ### References * https://github.com/mapfish/mapfish-print/pull/1397/commits/89155f2506b9cee822e15ce60ccae390a1419d5e * https://cwe.mitre.org/data/definitions/79.html ### For more information ...
{'CVE-2020-15231'}
2022-03-03T05:13:46.438056Z
2020-07-07T16:32:49Z
LOW
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15231', 'https://github.com/mapfish/mapfish-print/pull/1397/commits/89155f2506b9cee822e15ce60ccae390a1419d5e', 'https://github.com/mapfish/mapfish-print/security/advisories/GHSA-w534-q4xf-h5v2'}
null
{'https://github.com/mapfish/mapfish-print/pull/1397/commits/89155f2506b9cee822e15ce60ccae390a1419d5e'}
{'https://github.com/mapfish/mapfish-print/pull/1397/commits/89155f2506b9cee822e15ce60ccae390a1419d5e'}
Maven
GHSA-8m5h-hrqm-pxm2
Path traversal in the OWASP Enterprise Security API
### Impact The default implementation of `Validator.getValidDirectoryPath(String, String, File, boolean)` may incorrectly treat the tested input string as a child of the specified parent directory. This potentially could allow control-flow bypass checks to be defeated if an attack can specify the entire string represen...
{'CVE-2022-23457'}
2022-04-27T21:16:48.750511Z
2022-04-27T21:09:43Z
HIGH
null
{'CWE-22'}
{'https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/GHSL-2022-008_The_OWASP_Enterprise_Security_API.md', 'https://securitylab.github.com/advisories/GHSL-2022-008_The_OWASP_Enterprise_Security_API/', 'https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/esapi4java-core-2.3.0.0-releas...
null
{'https://github.com/ESAPI/esapi-java-legacy/commit/a0d67b75593878b1b6e39e2acc1773b3effedb2a'}
{'https://github.com/ESAPI/esapi-java-legacy/commit/a0d67b75593878b1b6e39e2acc1773b3effedb2a'}
Maven
GHSA-9hx8-2mrv-r674
Deserialization of Untrusted Data in Apache jUDDI
Apache jUDDI uses several classes related to Java's Remote Method Invocation (RMI) which (as an extension to UDDI) provides an alternate transport for accessing UDDI services. RMI uses the default Java serialization mechanism to pass parameters in RMI invocations. A remote attacker can send a malicious serialized obje...
{'CVE-2021-37578'}
2022-03-03T05:14:09.020775Z
2021-08-09T20:41:37Z
CRITICAL
null
{'CWE-502'}
{'https://lists.apache.org/thread.html/r82047b3ba774cf870ea8e1e9ec51c6107f6cd056d4e36608148c6e71%40%3Cprivate.juddi.apache.org%3E', 'https://github.com/apache/juddi/commit/dd880ffe7694a70cee75efeee79c9197d261866f', 'https://github.com/apache/juddi', 'http://www.openwall.com/lists/oss-security/2021/07/29/1', 'https://nv...
null
{'https://github.com/apache/juddi/commit/dd880ffe7694a70cee75efeee79c9197d261866f'}
{'https://github.com/apache/juddi/commit/dd880ffe7694a70cee75efeee79c9197d261866f'}
Maven
GHSA-q6w2-89hq-hq27
Cross-site scripting in keycloak
A flaw was found in keycloak in versions before 13.0.0. A Self Stored XSS attack vector escalating to a complete account takeover is possible due to user-supplied data fields not being properly encoded and Javascript code being used to process the data. The highest threat from this vulnerability is to data confidential...
{'CVE-2021-20195'}
2022-03-03T05:13:34.212953Z
2021-06-08T23:02:43Z
CRITICAL
null
{'CWE-20', 'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-20195', 'https://github.com/keycloak/keycloak/commit/717d9515fa131e3d8c8936e41b2e52270fdec976', 'https://bugzilla.redhat.com/show_bug.cgi?id=1919143'}
null
{'https://github.com/keycloak/keycloak/commit/717d9515fa131e3d8c8936e41b2e52270fdec976'}
{'https://github.com/keycloak/keycloak/commit/717d9515fa131e3d8c8936e41b2e52270fdec976'}
Maven
GHSA-hcxx-mp6g-6gr9
Opencast publishes global system account credentials
The issue was mostly mitigated before, drastically reducing the risk. See references below for more information. ### Impact Opencast before version 10.6 will try to authenticate against any external services listed in a media package when it is trying to access the files, sending the global system user's credentials,...
{'CVE-2018-16153'}
2022-03-03T05:13:34.748719Z
2021-12-14T21:43:48Z
LOW
null
{'CWE-522', 'CWE-200'}
{'https://github.com/opencast/opencast/security/advisories/GHSA-hcxx-mp6g-6gr9', 'https://github.com/opencast/opencast', 'https://github.com/opencast/opencast/commit/776d5588f39c61eb04c03bb955416c4f77629d51', 'https://docs.opencast.org/r/10.x/admin/#changelog/#opencast-106'}
null
{'https://github.com/opencast/opencast/commit/776d5588f39c61eb04c03bb955416c4f77629d51'}
{'https://github.com/opencast/opencast/commit/776d5588f39c61eb04c03bb955416c4f77629d51'}
Maven
GHSA-fxp8-7h5w-h235
XSS in search engine
In the Alkacon OpenCms Apollo Template 10.5.4 and 10.5.5, there is XSS in the search engine.
{'CVE-2019-13234'}
2022-03-03T05:12:50.658509Z
2019-11-12T22:58:11Z
MODERATE
null
{'CWE-79'}
{'https://aetsu.github.io/OpenCms', 'https://github.com/alkacon/apollo-template/commits/branch_10_5_x', 'http://packetstormsecurity.com/files/154298/Alkacon-OpenCMS-10.5.x-Cross-Site-Scripting.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13234'}
null
{'https://github.com/alkacon/apollo-template/commits/branch_10_5_x'}
{'https://github.com/alkacon/apollo-template/commits/branch_10_5_x'}
Maven
GHSA-c4rh-4376-gff4
Improper certificate management in AWS IoT Device SDK v2
The AWS IoT Device SDK v2 for Java, Python, C++ and Node.js appends a user supplied Certificate Authority (CA) to the root CAs instead of overriding it on Unix systems. TLS handshakes will thus succeed if the peer can be verified either from the user-supplied CA or the system’s default trust-store. Attackers with acces...
{'CVE-2021-40830'}
2022-03-03T05:13:15.678455Z
2021-11-24T21:12:04Z
MODERATE
null
{'CWE-295'}
{'https://github.com/aws/aws-iot-device-sdk-python-v2/commit/0450ce68add7e3d05c6d781ecdac953c299c053a', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40830', 'https://github.com/aws/aws-iot-device-sdk-java-v2/commit/67950ad2a02f2f9355c310b69dc9226b017f32f2', 'https://github.com/awslabs/aws-c-io/', 'https://github.com/aws/...
null
{'https://github.com/aws/aws-iot-device-sdk-java-v2/commit/67950ad2a02f2f9355c310b69dc9226b017f32f2', 'https://github.com/aws/aws-iot-device-sdk-js-v2/commit/53a36e3ac203291494120604d416b6de59177cac', 'https://github.com/aws/aws-iot-device-sdk-python-v2/commit/0450ce68add7e3d05c6d781ecdac953c299c053a'}
{'https://github.com/aws/aws-iot-device-sdk-java-v2/commit/67950ad2a02f2f9355c310b69dc9226b017f32f2', 'https://github.com/aws/aws-iot-device-sdk-python-v2/commit/0450ce68add7e3d05c6d781ecdac953c299c053a', 'https://github.com/aws/aws-iot-device-sdk-js-v2/commit/53a36e3ac203291494120604d416b6de59177cac'}
Maven
GHSA-5mcr-gq6c-3hq2
Local Information Disclosure Vulnerability in Netty on Unix-Like systems
### Impact When netty's multipart decoders are used local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk is enabled. The CVSSv3.1 score of this vulnerability is calculated to be a [6.2/10](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=A...
{'CVE-2021-21290'}
2022-04-22T18:30:10.165346Z
2021-02-08T21:17:48Z
MODERATE
null
{'CWE-668', 'CWE-379', 'CWE-378'}
{'https://github.com/netty/netty/security/advisories/GHSA-5mcr-gq6c-3hq2', 'https://lists.apache.org/thread.html/r4efed2c501681cb2e8d629da16e48d9eac429624fd4c9a8c6b8e7020@%3Cdev.tinkerpop.apache.org%3E', 'https://lists.apache.org/thread.html/ra0fc2b4553dd7aaf75febb61052b7f1243ac3a180a71c01f29093013@%3Cjira.kafka.apache...
null
{'https://github.com/netty/netty/commit/c735357bf29d07856ad171c6611a2e1a0e0000ec'}
{'https://github.com/netty/netty/commit/c735357bf29d07856ad171c6611a2e1a0e0000ec'}
Maven
GHSA-2j6v-xpf3-xvrv
Use of Externally-Controlled Format String in wire-avs
### Impact A remote format string vulnerability allowed an attacker to cause a denial of service or possibly execute arbitrary code. ### Patches * The issue has been fixed in wire-avs 7.1.12 and is already included on all Wire products (currently used version is 8.0.x) ### Workarounds * No workaround known ### Refer...
{'CVE-2021-41193'}
2022-03-10T15:59:41Z
2022-03-01T18:58:23Z
HIGH
null
{'CWE-134'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41193', 'https://github.com/wireapp/wire-avs/', 'https://github.com/wireapp/wire-avs/commit/40d373ede795443ae6f2f756e9fb1f4f4ae90bbe', 'https://github.com/wireapp/wire-avs/security/advisories/GHSA-2j6v-xpf3-xvrv'}
null
{'https://github.com/wireapp/wire-avs/commit/40d373ede795443ae6f2f756e9fb1f4f4ae90bbe'}
{'https://github.com/wireapp/wire-avs/commit/40d373ede795443ae6f2f756e9fb1f4f4ae90bbe'}
Maven
GHSA-5mh9-r3rr-9597
Code execution vulnerability in HtmlUnit
HtmlUnit prior to 2.37.0 contains code execution vulnerabilities. HtmlUnit initializes Rhino engine improperly, hence a malicious JavScript code can execute arbitrary Java code on the application. Moreover, when embedded in Android application, Android-specific initialization of Rhino engine is done in an improper way,...
{'CVE-2020-5529'}
2022-03-03T05:11:14.726392Z
2020-05-21T21:08:33Z
HIGH
null
{'CWE-665'}
{'https://github.com/HtmlUnit/htmlunit/commit/bc1f58d483cc8854a9c4c1739abd5e04a2eb0367', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5529', 'https://github.com/HtmlUnit/htmlunit', 'https://jvn.jp/en/jp/JVN34535327/', 'https://usn.ubuntu.com/4584-1/', 'https://lists.apache.org/thread.html/ra2cd7f8e61dc6b8a2d9065094cd1f46...
null
{'https://github.com/HtmlUnit/htmlunit/commit/bc1f58d483cc8854a9c4c1739abd5e04a2eb0367'}
{'https://github.com/HtmlUnit/htmlunit/commit/bc1f58d483cc8854a9c4c1739abd5e04a2eb0367'}
Maven
GHSA-883x-6fch-6wjx
Trust Boundary Violation due to Incomplete Blacklist in Test Failure Processing in Ares
### Impact This allows an attacker to create special subclasses of `InvocationTargetException` that escape the exception sanitization because JUnit extracts the cause in a trusted context before the exception reaches Ares. This means that arbitrary student code can be executed in a trusted context, and that in turn all...
null
2022-03-03T05:14:11.617255Z
2022-01-21T23:39:19Z
HIGH
null
null
{'https://github.com/ls1intum/Ares/commit/af4f28a56e2fe600d8750b3b415352a0a3217392', 'https://github.com/ls1intum/Ares/security/advisories/GHSA-883x-6fch-6wjx', 'https://github.com/ls1intum/Ares/releases/tag/1.7.6', 'https://github.com/ls1intum/Ares', 'https://github.com/ls1intum/Ares/issues/15#issuecomment-996449371'}
null
{'https://github.com/ls1intum/Ares/commit/af4f28a56e2fe600d8750b3b415352a0a3217392'}
{'https://github.com/ls1intum/Ares/commit/af4f28a56e2fe600d8750b3b415352a0a3217392'}
Maven
GHSA-v6w3-2prq-h95f
Improper Input Validation in Jakarta Expression Language
In the Jakarta Expression Language implementation 3.0.3 and earlier, a bug in the ELParserTokenManager enables invalid EL expressions to be evaluated as if they were valid.
{'CVE-2021-28170'}
2022-04-26T18:16:59.623718Z
2021-10-06T17:48:38Z
MODERATE
null
{'CWE-917', 'CWE-20'}
{'https://github.com/eclipse-ee4j/el-ri/pull/160/commits/b6a3943ac5fba71cbc6719f092e319caa747855b', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/eclipse-ee4j/el-ri', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28170', 'https://securitylab.github.com/advisories/GHSL-2020-021-jakarta-el/',...
null
{'https://github.com/eclipse-ee4j/el-ri/pull/160/commits/b6a3943ac5fba71cbc6719f092e319caa747855b'}
{'https://github.com/eclipse-ee4j/el-ri/pull/160/commits/b6a3943ac5fba71cbc6719f092e319caa747855b'}
Maven
GHSA-3mqv-8gxg-pfm4
Cross-site scripting in twitter-server
server/handler/HistogramQueryHandler.scala in Twitter TwitterServer (aka twitter-server) before 20.12.0, in some configurations, allows XSS via the /histograms endpoint.
{'CVE-2020-35774'}
2022-03-03T05:12:37.366113Z
2022-02-09T22:37:28Z
MODERATE
null
{'CWE-79'}
{'https://advisory.checkmarx.net/advisory/CX-2020-4287', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35774', 'https://github.com/twitter/twitter-server/commit/e0aeb87e89a6e6c711214ee2de0dd9f6e5f9cb6c', 'https://github.com/twitter/twitter-server/compare/twitter-server-20.10.0...twitter-server-20.12.0'}
null
{'https://github.com/twitter/twitter-server/commit/e0aeb87e89a6e6c711214ee2de0dd9f6e5f9cb6c'}
{'https://github.com/twitter/twitter-server/commit/e0aeb87e89a6e6c711214ee2de0dd9f6e5f9cb6c'}
Maven
GHSA-24wf-7vf2-pv59
XXE vulnerability on Launch import with externally-defined DTD file
### Impact Starting from version 3.1.0 we introduced a new feature of JUnit XML launch import. Unfortunately XML parser was not configured properly to prevent XML external entity (XXE) attacks. This allows a user to import a specifically-crafted XML file which imports external Document Type Definition (DTD) file with e...
{'CVE-2021-29620'}
2022-03-03T05:14:13.171729Z
2021-06-28T16:38:29Z
HIGH
null
{'CWE-611'}
{'https://github.com/reportportal/reportportal/security/advisories/GHSA-24wf-7vf2-pv59', 'https://github.com/reportportal/service-api/pull/1392', 'https://mvnrepository.com/artifact/com.epam.reportportal/service-api', 'https://github.com/reportportal/service-api/commit/a73e0dfb4eda844c37139df1f9847013d55f084e', 'https:...
null
{'https://github.com/reportportal/service-api/commit/a73e0dfb4eda844c37139df1f9847013d55f084e'}
{'https://github.com/reportportal/service-api/commit/a73e0dfb4eda844c37139df1f9847013d55f084e'}
Maven
GHSA-29q4-gxjq-rx5c
Remote Code Execution in SCIMono
### Impact It is possible for attacker to inject and execute java expression and compromising the availability and integrity of the system. ### Patches The issue was fixed on [0.0.19 version](https://mvnrepository.com/artifact/com.sap.scimono/scimono-server/0.0.19)
{'CVE-2021-21479'}
2022-03-03T05:13:28.940958Z
2021-02-10T02:31:53Z
HIGH
null
{'CWE-62', 'CWE-77', 'CWE-74', 'CWE-917', 'CWE-59', 'CWE-690'}
{'https://mvnrepository.com/artifact/com.sap.scimono/scimono-server/0.0.19', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21479', 'https://github.com/SAP/scimono/commit/413b5d75fa94e77876af0e47be76475a23745b80', 'https://github.com/SAP/scimono/security/advisories/GHSA-29q4-gxjq-rx5c'}
null
{'https://github.com/SAP/scimono/commit/413b5d75fa94e77876af0e47be76475a23745b80'}
{'https://github.com/SAP/scimono/commit/413b5d75fa94e77876af0e47be76475a23745b80'}
Maven
GHSA-3gm7-v7vw-866c
XML External Entity (XXE) Injection in Apache Solr
In Apache Solr, the DataImportHandler, an optional but popular module to pull in data from databases and other sources, has a feature in which the whole DIH configuration can come from a request's "dataConfig" parameter. The debug mode of the DIH admin screen uses this to allow convenient debugging / development of a D...
{'CVE-2019-0193'}
2022-03-03T05:13:17.001738Z
2019-08-01T19:17:35Z
HIGH
null
{'CWE-94'}
{'https://issues.apache.org/jira/browse/SOLR-13669', 'https://lists.apache.org/thread.html/6f2d61bd8732224c5fd3bdd84798f8e01e4542d3ee2f527a52a81b83@%3Cissues.lucene.apache.org%3E', 'https://snyk.io/vuln/SNYK-JAVA-ORGAPACHESOLR-536063', 'https://lists.apache.org/thread.html/1addbb49a1fc0947fb32ca663d76d93cfaade35a4848a7...
null
{'https://github.com/apache/lucene-solr/commit/02c693f3713add1b4891cbaa87127de3a55c10f7'}
{'https://github.com/apache/lucene-solr/commit/02c693f3713add1b4891cbaa87127de3a55c10f7'}
Maven
GHSA-rcwj-2hj2-vmjj
Insufficient Session Expiration in Apache NiFi Registry
If NiFi Registry 0.1.0 to 0.5.0 uses an authentication mechanism other than PKI, when the user clicks Log Out, NiFi Registry invalidates the authentication token on the client side but not on the server side. This permits the user's client-side token to be used for up to 12 hours after logging out to make API requests ...
{'CVE-2020-9482'}
2022-03-03T05:13:41.527509Z
2022-02-09T00:23:06Z
MODERATE
null
{'CWE-613'}
{'https://github.com/apache/nifi-registry/pull/277/files/9f7f1c1b1095e3facdaa986435fa94eff78627dd', 'https://github.com/apache/nifi-registry/commit/2881e29dce3a179f3e56069b82ef8cbb7bd8d85c', 'https://nifi.apache.org/registry-security.html#CVE-2020-9482', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9482'}
null
{'https://github.com/apache/nifi-registry/commit/2881e29dce3a179f3e56069b82ef8cbb7bd8d85c'}
{'https://github.com/apache/nifi-registry/commit/2881e29dce3a179f3e56069b82ef8cbb7bd8d85c'}
Maven
GHSA-f263-c949-w85g
Improper Authorization in Google OAuth Client
PKCE support is not implemented in accordance with the RFC for OAuth 2.0 for Native Apps. Without the use of PKCE, the authorization code returned by an authorization server is not enough to guarantee that the client that issued the initial authorization request is the one that will be authorized. An attacker is able t...
{'CVE-2020-7692'}
2022-05-04T02:37:13.286190Z
2021-09-28T16:16:52Z
HIGH
null
{'CWE-863', 'CWE-862'}
{'https://tools.ietf.org/html/rfc8252%23section-8.1', 'https://lists.apache.org/thread.html/reae8909b264d1103f321b9ce1623c10c1ddc77dba9790247f2c0c90f@%3Ccommits.druid.apache.org%3E', 'https://github.com/googleapis/google-oauth-java-client', 'https://github.com/googleapis/google-oauth-java-client/commit/13433cd7dd06267f...
null
{'https://github.com/googleapis/google-oauth-java-client/commit/13433cd7dd06267fc261f0b1d4764f8e3432c824'}
{'https://github.com/googleapis/google-oauth-java-client/commit/13433cd7dd06267fc261f0b1d4764f8e3432c824'}
Maven
GHSA-h362-m8f2-5x7c
Password Hashing: Do not use MD5
### Impact User passwords are stored in the database using the rather outdated and cryptographically insecure MD5 hash algorithm. Furthermore, the hashes are salted using the username instead of a random salt, causing hashes for users with the same username and password to collide which is problematic especially for p...
{'CVE-2020-5229'}
2022-03-03T05:14:06.782689Z
2020-01-30T21:21:58Z
LOW
null
{'CWE-327'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-5229', 'https://github.com/opencast/opencast/commit/32bfbe5f78e214e2d589f92050228b91d704758e', 'https://github.com/opencast/opencast/security/advisories/GHSA-h362-m8f2-5x7c'}
null
{'https://github.com/opencast/opencast/commit/32bfbe5f78e214e2d589f92050228b91d704758e'}
{'https://github.com/opencast/opencast/commit/32bfbe5f78e214e2d589f92050228b91d704758e'}
Maven
GHSA-cf6r-3wgc-h863
Polymorphic deserialization of malicious object in jackson-databind
A flaw was discovered in jackson-databind in versions before 2.9.10, 2.8.11.5 and 2.6.7.3, where it would permit polymorphic deserialization of a malicious object using commons-configuration 1 and 2 JNDI classes. An attacker could use this flaw to execute arbitrary code.
{'CVE-2019-14892'}
2022-03-03T05:13:43.282192Z
2020-05-15T18:58:58Z
HIGH
null
{'CWE-502'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14892', 'https://access.redhat.com/errata/RHSA-2020:0729', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14892', 'https://github.com/Fa...
null
{'https://github.com/FasterXML/jackson-databind/commit/819cdbcab51c6da9fb896380f2d46e9b7d4fdc3b', 'https://github.com/FasterXML/jackson-databind/commit/41b7f9b90149e9d44a65a8261a8deedc7186f6af'}
{'https://github.com/FasterXML/jackson-databind/commit/819cdbcab51c6da9fb896380f2d46e9b7d4fdc3b', 'https://github.com/FasterXML/jackson-databind/commit/41b7f9b90149e9d44a65a8261a8deedc7186f6af'}
Maven
GHSA-mh8g-hprg-8363
Hard-Coded Key Used For Remember-me Token in Opencast
### Impact The security configuration in `etc/security/mh_default_org.xml` enables a remember-me cookie based on a hash created from the [username, password, and an additional system key](https://docs.spring.io/spring-security/site/docs/3.0.x/reference/remember-me.html). Opencast has hard-coded this system key in the ...
{'CVE-2020-5222'}
2022-03-03T05:12:50.912934Z
2020-01-30T21:21:44Z
MODERATE
null
{'CWE-798'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-5222', 'https://github.com/opencast/opencast/commit/1a7172c95af8d542a77ae5b153e4c834dd4788a6', 'https://github.com/opencast/opencast/security/advisories/GHSA-mh8g-hprg-8363'}
null
{'https://github.com/opencast/opencast/commit/1a7172c95af8d542a77ae5b153e4c834dd4788a6'}
{'https://github.com/opencast/opencast/commit/1a7172c95af8d542a77ae5b153e4c834dd4788a6'}
Maven
GHSA-8p36-q63g-68qh
Autobinding vulnerability in MITREid Connect
org/mitre/oauth2/web/OAuthConfirmationController.java in the OpenID Connect server implementation for MITREid Connect through 1.3.3 contains a Mass Assignment (aka Autobinding) vulnerability. This arises due to unsafe usage of the @ModelAttribute annotation during the OAuth authorization flow, in which HTTP request par...
{'CVE-2021-27582'}
2022-03-03T05:13:05.884875Z
2021-05-13T22:31:22Z
CRITICAL
null
{'CWE-915'}
{'https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/commit/7eba3c12fed82388f917e8dd9b73e86e3a311e4c', 'https://portswigger.net/research/hidden-oauth-attack-vectors', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27582', 'http://agrrrdog.blogspot.com/2017/03/autobinding-vulns-and-spring-mvc.html'}
null
{'https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/commit/7eba3c12fed82388f917e8dd9b73e86e3a311e4c'}
{'https://github.com/mitreid-connect/OpenID-Connect-Java-Spring-Server/commit/7eba3c12fed82388f917e8dd9b73e86e3a311e4c'}
Maven
GHSA-hwj3-m3p6-hj38
dom4j allows External Entities by default which might enable XXE attacks
dom4j before 2.1.3 allows external DTDs and External Entities by default, which might enable XXE attacks. However, there is popular external documentation from OWASP showing how to enable the safe, non-default behavior in any application that uses dom4j. Note: This advisory applies to `dom4j:dom4j` version 1.x legacy ...
{'CVE-2020-10683'}
2022-03-03T05:12:57.574058Z
2020-06-05T16:13:36Z
CRITICAL
null
{'CWE-611'}
{'https://github.com/dom4j/dom4j/commit/a8228522a99a02146106672a34c104adbda5c658', 'https://github.com/dom4j/dom4j/issues/87', 'https://security.netapp.com/advisory/ntap-20200518-0002/', 'https://lists.apache.org/thread.html/r91c64cd51e68e97d524395474eaa25362d564572276b9917fcbf5c32@%3Cdev.velocity.apache.org%3E', 'http...
null
{'https://github.com/dom4j/dom4j/commit/a8228522a99a02146106672a34c104adbda5c658', 'https://github.com/dom4j/dom4j/commit/1707bf3d898a8ada3b213acb0e3b38f16eaae73d'}
{'https://github.com/dom4j/dom4j/commit/a8228522a99a02146106672a34c104adbda5c658', 'https://github.com/dom4j/dom4j/commit/1707bf3d898a8ada3b213acb0e3b38f16eaae73d'}
Maven
GHSA-v528-7hrm-frqp
Improper Check for Unusual or Exceptional Conditions in json-smart
An issue was discovered in netplex json-smart-v1 through 2015-10-23 and json-smart-v2 through 2.4. An exception is thrown from a function, but it is not caught, as demonstrated by NumberFormatException. When it is not caught, it may cause programs using the library to crash or expose sensitive information.
{'CVE-2021-27568'}
2022-04-26T21:00:32.613340Z
2021-06-16T18:03:47Z
CRITICAL
null
{'CWE-754'}
{'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/rf70210b4d63191c0bfb2a0d5745e104484e71703bf5ad9cb01c980c6@%3Ccommits.druid.apache.org%3E', 'https://github.com/netplex/json-smart-v1/issues/7', 'https://github.com/netplex/json-smart-v2', 'https://github.com/netplex/json-sm...
null
{'https://github.com/netplex/json-smart-v1/commit/768db58ee0e3e344fcdb574b7629765308a1d0af'}
{'https://github.com/netplex/json-smart-v1/commit/768db58ee0e3e344fcdb574b7629765308a1d0af'}
Maven
GHSA-86qr-9vqc-pgc6
Code execution in Spring Integration
Spring Integration framework provides Kryo Codec implementations as an alternative for Java (de)serialization. When Kryo is configured with default options, all unregistered classes are resolved on demand. This leads to the "deserialization gadgets" exploit when provided data contains malicious code for execution durin...
{'CVE-2020-5413'}
2022-04-25T23:16:59.419794Z
2020-08-05T14:53:06Z
CRITICAL
null
{'CWE-502'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/spring-projects/spring-integration/commit/6a02b5abe97fabab6003d51b98dd45ab009a6e05', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5413', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://tanzu.vmware.com/security/cve-2020-5413...
null
{'https://github.com/spring-projects/spring-integration/commit/6a02b5abe97fabab6003d51b98dd45ab009a6e05'}
{'https://github.com/spring-projects/spring-integration/commit/6a02b5abe97fabab6003d51b98dd45ab009a6e05'}
Maven
GHSA-9gp4-qrff-c648
Moderate severity vulnerability that affects org.bouncycastle:bcprov-jdk14 and org.bouncycastle:bcprov-jdk15
In the Bouncy Castle JCE Provider version 1.55 and earlier the DHIES/ECIES CBC mode vulnerable to padding oracle attack. For BC 1.55 and older, in an environment where timings can be easily observed, it is possible with enough observations to identify when the decryption is failing due to padding.
{'CVE-2016-1000345'}
2022-03-03T05:12:59.881779Z
2018-10-18T18:04:13Z
MODERATE
null
null
{'https://nvd.nist.gov/vuln/detail/CVE-2016-1000345', 'https://github.com/advisories/GHSA-9gp4-qrff-c648', 'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://access.redhat.com/errata/RHSA-2018:2927', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://github.com/bcgit/bc-java/commit/21d...
null
{'https://github.com/bcgit/bc-java/commit/21dcb3d9744c83dcf2ff8fcee06dbca7bfa4ef35#diff-4439ce586bf9a13bfec05c0d113b8098'}
{'https://github.com/bcgit/bc-java/commit/21dcb3d9744c83dcf2ff8fcee06dbca7bfa4ef35#diff-4439ce586bf9a13bfec05c0d113b8098'}
Maven
GHSA-94jq-q5v2-76wj
Improper certificate management in AWS IoT Device SDK v2
Connections initialized by the AWS IoT Device SDK v2 for Java (versions prior to 1.3.3), Python (versions prior to 1.5.18), C++ (versions prior to 1.12.7) and Node.js (versions prior to 1.5.1) did not verify server certificate hostname during TLS handshake when overriding Certificate Authorities (CA) in their trust sto...
{'CVE-2021-40828'}
2022-03-03T05:13:50.572827Z
2021-11-24T21:02:24Z
MODERATE
null
{'CWE-295'}
{'https://github.com/aws/aws-iot-device-sdk-python-v2/commit/fd4c0ba04b35eab9e20c635af5548fcc5a92d8be', 'https://github.com/aws/aws-iot-device-sdk-java-v2/commit/67950ad2a02f2f9355c310b69dc9226b017f32f2', 'https://github.com/aws/aws-iot-device-sdk-python-v2', 'https://github.com/awslabs/aws-c-io/', 'https://github.com/...
null
{'https://github.com/aws/aws-iot-device-sdk-java-v2/commit/67950ad2a02f2f9355c310b69dc9226b017f32f2', 'https://github.com/aws/aws-iot-device-sdk-python-v2/commit/fd4c0ba04b35eab9e20c635af5548fcc5a92d8be', 'https://github.com/aws/aws-iot-device-sdk-js-v2/commit/4be41394f1aee979e6f4b012fcb01eecabd0c08d'}
{'https://github.com/aws/aws-iot-device-sdk-java-v2/commit/67950ad2a02f2f9355c310b69dc9226b017f32f2', 'https://github.com/aws/aws-iot-device-sdk-python-v2/commit/fd4c0ba04b35eab9e20c635af5548fcc5a92d8be', 'https://github.com/aws/aws-iot-device-sdk-js-v2/commit/4be41394f1aee979e6f4b012fcb01eecabd0c08d'}
Maven
GHSA-v4rr-65x6-g69f
XXE vulnerability in Jenkins Flaky Test Handler Plugin
Jenkins Flaky Test Handler Plugin 1.2.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
{'CVE-2022-28140'}
2022-05-03T21:01:58.771749Z
2022-03-30T00:00:25Z
HIGH
null
{'CWE-611'}
{'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-1896', 'http://www.openwall.com/lists/oss-security/2022/03/29/1', 'https://github.com/jenkinsci/flaky-test-handler-plugin', 'https://github.com/jenkinsci/flaky-test-handler-plugin/commit/c4ab38fef3658a02315a00288b934bdd9981b3a4', 'https://nvd.nist.gov/vuln...
null
{'https://github.com/jenkinsci/flaky-test-handler-plugin/commit/c4ab38fef3658a02315a00288b934bdd9981b3a4'}
{'https://github.com/jenkinsci/flaky-test-handler-plugin/commit/c4ab38fef3658a02315a00288b934bdd9981b3a4'}
Maven
GHSA-gg9m-x3cg-69vh
Access key stored in plain text by Jenkins Metrics Plugin
Jenkins Metrics Plugin 4.0.2.8 and earlier stores an access key unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
{'CVE-2022-20621'}
2022-05-04T21:01:56.226583Z
2022-01-13T00:00:57Z
MODERATE
null
{'CWE-522'}
{'http://www.openwall.com/lists/oss-security/2022/01/12/6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-20621', 'https://github.com/jenkinsci/metrics-plugin/commit/9810480370d4c5e04a2b710934db5461bde0d1b6', 'https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-1624', 'https://github.com/jenkinsci/metrics-plugin...
null
{'https://github.com/jenkinsci/metrics-plugin/commit/9810480370d4c5e04a2b710934db5461bde0d1b6'}
{'https://github.com/jenkinsci/metrics-plugin/commit/9810480370d4c5e04a2b710934db5461bde0d1b6'}
Maven
GHSA-fjqm-246c-mwqg
In Bouncy Castle JCE Provider the other party DH public key is not fully validated
In the Bouncy Castle JCE Provider version 1.55 and earlier the other party DH public key is not fully validated. This can cause issues as invalid keys can be used to reveal details about the other party's private key where static Diffie-Hellman is in use. As of release 1.56 the key parameters are checked on agreement c...
{'CVE-2016-1000346'}
2022-04-27T13:45:14.853516Z
2018-10-17T16:27:28Z
LOW
null
null
{'https://github.com/bcgit/bc-java', 'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://access.redhat.com/errata/RHSA-2018:2927', 'https://github.com/advisories/GHSA-fjqm-246c-mwqg', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000346', 'https:/...
null
{'https://github.com/bcgit/bc-java/commit/1127131c89021612c6eefa26dbe5714c194e7495#diff-d525a20b8acaed791ae2f0f770eb5937'}
{'https://github.com/bcgit/bc-java/commit/1127131c89021612c6eefa26dbe5714c194e7495#diff-d525a20b8acaed791ae2f0f770eb5937'}
Maven
GHSA-f93p-f762-vr53
Reflected Cross-Site Scripting in Apache CXF
By default, Apache CXF creates a /services page containing a listing of the available endpoint names and addresses. This webpage is vulnerable to a reflected Cross-Site Scripting (XSS) attack, which allows a malicious actor to inject javascript into the web page. Please note that the attack exploits a feature which is ...
{'CVE-2019-17573'}
2022-03-03T05:14:06.048096Z
2020-06-10T20:02:33Z
MODERATE
null
{'CWE-79'}
{'http://www.openwall.com/lists/oss-security/2020/11/12/2', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17573', 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E', 'https://github.com/apache/cxf/commit/a02e96ba1095596bef481919f16a90c5e80a92c8', '...
null
{'https://github.com/apache/cxf/commit/a02e96ba1095596bef481919f16a90c5e80a92c8'}
{'https://github.com/apache/cxf/commit/a02e96ba1095596bef481919f16a90c5e80a92c8'}
Maven
GHSA-m9cj-v55f-8x26
Authentication Bypass in keycloak
A flaw was found in Keycloak before version 12.0.0 where it is possible to update the user's metadata attributes using Account REST API. This flaw allows an attacker to change its own NameID attribute to impersonate the admin user for any particular application.
{'CVE-2020-27826'}
2022-03-18T18:02:27.911017Z
2022-03-18T17:55:26Z
HIGH
null
{'CWE-250'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-27826', 'https://bugzilla.redhat.com/show_bug.cgi?id=1905089', 'https://access.redhat.com/security/cve/cve-2020-27826', 'https://github.com/keycloak/keycloak/commit/dae4a3eaf26590b8d441b8e4bec3b700ee303b72'}
null
{'https://github.com/keycloak/keycloak/commit/dae4a3eaf26590b8d441b8e4bec3b700ee303b72'}
{'https://github.com/keycloak/keycloak/commit/dae4a3eaf26590b8d441b8e4bec3b700ee303b72'}
Maven
GHSA-r9ch-m4fh-fc7q
Moderate severity vulnerability that affects org.bouncycastle:bcprov-jdk14 and org.bouncycastle:bcprov-jdk15
In the Bouncy Castle JCE Provider version 1.55 and earlier DSA signature generation is vulnerable to timing attack. Where timings can be closely observed for the generation of signatures, the lack of blinding in 1.55, or earlier, may allow an attacker to gain information about the signature's k value and ultimately the...
{'CVE-2016-1000341'}
2022-03-03T05:13:58.446532Z
2018-10-17T16:24:00Z
MODERATE
null
null
{'https://github.com/advisories/GHSA-r9ch-m4fh-fc7q', 'https://github.com/bcgit/bc-java', 'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://access.redhat.com/errata/RHSA-2018:2927', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://github.com/bcgit/bc-java/commit/acaac81f96fec91ab45b...
null
{'https://github.com/bcgit/bc-java/commit/acaac81f96fec91ab45bd0412beaf9c3acd8defa#diff-e75226a9ca49217a7276b29242ec59ce'}
{'https://github.com/bcgit/bc-java/commit/acaac81f96fec91ab45bd0412beaf9c3acd8defa#diff-e75226a9ca49217a7276b29242ec59ce'}
Maven
GHSA-f62v-xpxf-3v68
Code injection in Apache Ant
As mitigation for CVE-2020-1945 Apache Ant 1.10.8 changed the permissions of temporary files it created so that only the current user was allowed to access them. Unfortunately the fixcrlf task deleted the temporary file and created a new one without said protection, effectively nullifying the effort. This would still a...
{'CVE-2020-11979'}
2022-04-22T17:30:20.141853Z
2021-02-03T19:16:35Z
HIGH
null
{'CWE-74', 'CWE-94'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DYBRN5C2RW7JRY75IB7Q7ZVKZCHWAQWS/', 'https://lists.apache.org/thread.html/raaeddc41da8f3afb1cb224876084a45f68e437a0afd9889a707e4b0c@%3Cdev.creadur.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-annou...
null
{'https://github.com/apache/ant/commit/87ac51d3c22bcf7cfd0dc07cb0bd04a496e0d428'}
{'https://github.com/apache/ant/commit/87ac51d3c22bcf7cfd0dc07cb0bd04a496e0d428'}
Maven
GHSA-vmfg-rjjm-rjrj
Deserialization of Untrusted Data
QOS.ch Logback before 1.2.0 has a serialization vulnerability affecting the SocketServer and ServerSocketReceiver components. The RemoteStreamAppenderClient class in logback-classic and the SocketNode classes in logback-classic and logback-access allow data to be deserialized over a Java Socket, via an ObjectInputStrea...
{'CVE-2017-5929'}
2022-04-19T16:01:50.629989Z
2021-06-07T16:07:36Z
CRITICAL
null
{'CWE-502'}
{'https://lists.apache.org/thread.html/r397bf63783240fbb5713389d3f889d287ae0c11509006700ac720037@%3Ccommits.cassandra.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:1676', 'https://lists.apache.org/thread.html/rc5f0cc2f3b153bdf15ee7389d78585829abc9c7af4d322ba1085dd3e@%3Ccommits.cassandra.apache.org%3E', 'h...
null
{'https://github.com/qos-ch/logback/commit/f46044b805bca91efe5fd6afe52257cd02f775f8'}
{'https://github.com/qos-ch/logback/commit/f46044b805bca91efe5fd6afe52257cd02f775f8'}
Maven
GHSA-2rq5-68hm-h4j8
Cross-Site Request Forgery in OpenNMS Horizon
In OpenNMS Horizon, versions opennms-1-0-stable through opennms-27.1.1; OpenNMS Meridian, versions meridian-foundation-2015.1.0-1 through meridian-foundation-2019.1.18-1; meridian-foundation-2020.1.0-1 through meridian-foundation-2020.1.6-1 are vulnerable to CSRF, due to no CSRF protection at `/opennms/admin/userGroupV...
{'CVE-2021-25931'}
2021-05-28T22:26:41Z
2021-05-25T18:46:55Z
HIGH
null
{'CWE-352'}
{'https://github.com/OpenNMS/opennms/commit/607151ea8f90212a3fb37c977fa57c7d58d26a84', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25931', 'https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25931'}
null
{'https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c', 'https://github.com/OpenNMS/opennms/commit/607151ea8f90212a3fb37c977fa57c7d58d26a84'}
{'https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c', 'https://github.com/OpenNMS/opennms/commit/607151ea8f90212a3fb37c977fa57c7d58d26a84'}
Maven
GHSA-4gq5-ch57-c2mg
High severity vulnerability that affects com.fasterxml.jackson.core:jackson-databind
FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to execute arbitrary code by leveraging failure to block the blaze-ds-opt and blaze-ds-core classes from polymorphic deserialization.
{'CVE-2018-14719'}
2022-03-03T05:13:11.866366Z
2019-01-04T19:09:49Z
CRITICAL
null
{'CWE-502'}
{'https://access.redhat.com/errata/RHSA-2019:3140', 'https://github.com/advisories/GHSA-4gq5-ch57-c2mg', 'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://www.oracle.com/technetwork/se...
null
{'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44'}
{'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44'}
Maven
GHSA-j4mm-7pj3-jf7v
HTTP Method Spoofing
Opencast versions prior to 9.10 allow HTTP method spoofing, allowing to change the assumed HTTP method via URL parameter. This allows attackers to turn HTTP GET requests into PUT requests or an HTTP form to send DELETE requests. This bypasses restrictions otherwise put on these types of requests and aids in cross-site...
{'CVE-2021-43807'}
2022-03-03T05:13:41.892420Z
2021-12-14T21:43:00Z
HIGH
null
{'CWE-290'}
{'https://github.com/opencast/opencast/security/advisories/GHSA-j4mm-7pj3-jf7v', 'https://github.com/opencast/opencast', 'https://github.com/opencast/opencast/commit/8f8271e1085f6f8e306c689d6a56b0bb8d076444', 'https://github.com/opencast/opencast/commit/59cb6731067283e54f15462be38b6117d8b9ea8b#diff-9c5fb3d1b7e3b0f54bc5...
null
{'https://github.com/opencast/opencast/commit/59cb6731067283e54f15462be38b6117d8b9ea8b#diff-9c5fb3d1b7e3b0f54bc5c4182965c4fe1f9023d449017cece3005d3f90e8e4d8', 'https://github.com/opencast/opencast/commit/8f8271e1085f6f8e306c689d6a56b0bb8d076444'}
{'https://github.com/opencast/opencast/commit/59cb6731067283e54f15462be38b6117d8b9ea8b#diff-9c5fb3d1b7e3b0f54bc5c4182965c4fe1f9023d449017cece3005d3f90e8e4d8', 'https://github.com/opencast/opencast/commit/8f8271e1085f6f8e306c689d6a56b0bb8d076444'}
Maven
GHSA-26hm-r6mg-963c
SQL Injection in JeecgBoot
In JeecgBoot 3.0, there is a SQL injection vulnerability that can operate the database with root privileges. A patch has been released on the repository's `master` branch.
{'CVE-2021-46089'}
2022-03-03T05:13:23.136820Z
2022-01-26T00:01:25Z
CRITICAL
null
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-46089', 'https://github.com/jeecgboot/jeecg-boot/issues/3331', 'https://github.com/jeecgboot/jeecg-boot/commit/baefc1338dd03de36384ce7d5846b08041b488d0', 'https://github.com/jeecgboot/jeecg-boot'}
null
{'https://github.com/jeecgboot/jeecg-boot/commit/baefc1338dd03de36384ce7d5846b08041b488d0'}
{'https://github.com/jeecgboot/jeecg-boot/commit/baefc1338dd03de36384ce7d5846b08041b488d0'}
Maven
GHSA-h4m4-pgp4-whgm
The reset password form reveal users email address
### Impact The reset password form reveals the email address of users just by giving their username. ### Patches The problem has been patched on XWiki 13.2RC1. ### Workarounds It's possible to manually modify the `resetpasswordinline.vm` to perform the changes made in https://github.com/xwiki/xwiki-platform/commit/0c...
{'CVE-2021-32731'}
2021-07-02T16:39:50Z
2021-07-02T19:19:04Z
MODERATE
null
{'CWE-668', 'CWE-200'}
{'https://github.com/xwiki/xwiki-platform/commit/0cf716250b3645a5974c80d8336dcdf885749dff#diff-14a3132e3986b1f5606dd13d9d8a8bb8634bec9932123c5e49e9604cfd850fc2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32731', 'https://jira.xwiki.org/browse/XWIKI-18400', 'https://github.com/xwiki/xwiki-platform/security/advisories/G...
null
{'https://github.com/xwiki/xwiki-platform/commit/0cf716250b3645a5974c80d8336dcdf885749dff#diff-14a3132e3986b1f5606dd13d9d8a8bb8634bec9932123c5e49e9604cfd850fc2'}
{'https://github.com/xwiki/xwiki-platform/commit/0cf716250b3645a5974c80d8336dcdf885749dff#diff-14a3132e3986b1f5606dd13d9d8a8bb8634bec9932123c5e49e9604cfd850fc2'}
Maven
GHSA-qhh5-9738-g9mx
Incorrect Default Permissions in Apache DolphinScheduler
Versions of Apache DolphinScheduler prior to 1.3.2 allowed an ordinary user under any tenant to override another users password through the API interface.
{'CVE-2020-13922'}
2022-03-03T05:13:34.456850Z
2022-02-09T22:26:32Z
MODERATE
null
{'CWE-276'}
{'https://www.mail-archive.com/announce@apache.org/msg06076.html', 'https://github.com/apache/incubator-dolphinscheduler/commit/b8a9e2e00f2f207ae60c913a7173b59405ff95f1', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13922'}
null
{'https://github.com/apache/incubator-dolphinscheduler/commit/b8a9e2e00f2f207ae60c913a7173b59405ff95f1'}
{'https://github.com/apache/incubator-dolphinscheduler/commit/b8a9e2e00f2f207ae60c913a7173b59405ff95f1'}
Maven
GHSA-44cw-p2hm-gpf6
Disabled Hostname Verification in Opencast
Opencast before version 8.9 and 7.9 disables HTTPS hostname verification of its HTTP client used for a large portion of Opencast's HTTP requests. Hostname verification is an important part when using HTTPS to ensure that the presented certificate is valid for the host. Disabling it can allow for man-in-the-middle atta...
{'CVE-2020-26234'}
2022-03-03T05:12:06.667135Z
2020-12-08T22:37:59Z
HIGH
null
{'CWE-297'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-26234', 'https://github.com/opencast/opencast/commit/4225bf90af74557deaf8fb6b80b0705c9621acfc', 'https://github.com/opencast/opencast/security/advisories/GHSA-44cw-p2hm-gpf6'}
null
{'https://github.com/opencast/opencast/commit/4225bf90af74557deaf8fb6b80b0705c9621acfc'}
{'https://github.com/opencast/opencast/commit/4225bf90af74557deaf8fb6b80b0705c9621acfc'}
Maven
GHSA-vmm6-w4cf-7f3x
Authentication Bypass For Endpoints With Anonymous Access in Opencast
### Impact Using a remember-me cookie with an arbitrary username can cause Opencast to assume proper authentication for that user even if the remember-me cookie was incorrect given that the attacked endpoint also allows anonymous access. This way, an attacker can, for example, fake a remember-me token, assume the ide...
{'CVE-2020-5206'}
2022-03-03T05:13:57.051323Z
2020-01-30T21:21:30Z
CRITICAL
null
{'CWE-285'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-5206', 'https://github.com/opencast/opencast/commit/b157e1fb3b35991ca7bf59f0730329fbe7ce82e8', 'https://github.com/opencast/opencast/security/advisories/GHSA-vmm6-w4cf-7f3x'}
null
{'https://github.com/opencast/opencast/commit/b157e1fb3b35991ca7bf59f0730329fbe7ce82e8'}
{'https://github.com/opencast/opencast/commit/b157e1fb3b35991ca7bf59f0730329fbe7ce82e8'}
Maven
GHSA-mm8j-9x84-m9cv
Arbitrary code injection in json-sanitizer
OWASP json-sanitizer before 1.2.2 may emit closing SCRIPT tags and CDATA section delimiters for crafted input. This allows an attacker to inject arbitrary HTML or XML into embedding documents.
{'CVE-2021-23899'}
2022-03-03T05:13:26.047631Z
2021-06-16T17:34:18Z
CRITICAL
null
{'CWE-611'}
{'https://github.com/OWASP/json-sanitizer/compare/v1.2.1...v1.2.2', 'https://github.com/OWASP/json-sanitizer/commit/a37f594f7378a1c76b3283e0dab9e1ab1dc0247e', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23899', 'https://groups.google.com/g/json-sanitizer-support/c/dAW1AeNMoA0'}
null
{'https://github.com/OWASP/json-sanitizer/commit/a37f594f7378a1c76b3283e0dab9e1ab1dc0247e'}
{'https://github.com/OWASP/json-sanitizer/commit/a37f594f7378a1c76b3283e0dab9e1ab1dc0247e'}
Maven
GHSA-8p8g-f9vg-r7xr
Moderate severity vulnerability that affects com.squareup.retrofit2:retrofit
Square Retrofit versions from (including) 2.0 to 2.5.0 (excluding) contain a Directory Traversal vulnerability in RequestBuilder class, method addPathParameter. By manipulating the URL an attacker could add or delete resources otherwise unavailable to her. This attack appears to be exploitable via an encoded path param...
{'CVE-2018-1000850'}
2022-03-03T05:13:12.591547Z
2018-12-21T17:48:19Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-1000850', 'https://github.com/square/retrofit', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://github.com/advisories/GHSA-8p8g-f9vg-r7xr', 'https://lists.apache.org/thread.html/f9bc3e55f4e28...
null
{'https://github.com/square/retrofit/commit/b9a7f6ad72073ddd40254c0058710e87a073047d#diff-943ec7ed35e68201824904d1dc0ec982'}
{'https://github.com/square/retrofit/commit/b9a7f6ad72073ddd40254c0058710e87a073047d#diff-943ec7ed35e68201824904d1dc0ec982'}
Maven
GHSA-hfg5-xpvw-c9x4
Improper Input Validation in Apache Camel
Apache Camel's JMX is vulnerable to Rebind Flaw. Apache Camel users should upgrade to 3.2.0.
{'CVE-2020-11971'}
2021-09-01T19:36:12Z
2021-05-21T19:20:30Z
HIGH
null
{'CWE-20'}
{'https://issues.apache.org/jira/browse/CAMEL-14811', 'https://github.com/apache/camel', 'https://github.com/apache/camel/commit/b954402272ddcfbb45dc1495520f920e70cc041c', 'http://www.openwall.com/lists/oss-security/2020/05/14/7', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/securit...
null
{'https://github.com/apache/camel/commit/b954402272ddcfbb45dc1495520f920e70cc041c'}
{'https://github.com/apache/camel/commit/b954402272ddcfbb45dc1495520f920e70cc041c'}
Maven
GHSA-xhw6-hjc9-679m
Token validation bypass in Pac4j
Pac4j v5.1 and earlier allows (by default) clients to accept and successfully validate ID Tokens with "none" algorithm (i.e., tokens with no signature) which is not secure and violates the OpenID Core Specification. The "none" algorithm does not require any signature verification when validating the ID tokens, which al...
{'CVE-2021-44878'}
2022-04-01T18:17:03.461426Z
2022-01-08T00:36:05Z
HIGH
null
{'CWE-347'}
{'https://github.com/pac4j/pac4j', 'https://github.com/pac4j/pac4j/commit/22b82ffd702a132d9f09da60362fc6264fc281ae', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44878', 'https://www.pac4j.org/blog/cve_2021_44878_is_this_serious.html', 'https://openid.net/specs/openid-connect-core-1_0.html#IDToken'}
null
{'https://github.com/pac4j/pac4j/commit/22b82ffd702a132d9f09da60362fc6264fc281ae'}
{'https://github.com/pac4j/pac4j/commit/22b82ffd702a132d9f09da60362fc6264fc281ae'}
Maven
GHSA-763g-fqq7-48wg
XML external entity (XXE) processing ('external-parameter-entities' feature was not fully disabled))
Due to an incomplete fix for [CVE-2019-9658](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9658), checkstyle was still vulnerable to XML External Entity (XXE) Processing. ### Impact #### User: Build Maintainers This vulnerability probably doesn't impact Maven/Gradle users as, in most cases, these builds ar...
{'CVE-2019-10782'}
2022-03-03T05:13:51.546007Z
2020-01-31T18:00:07Z
MODERATE
null
{'CWE-611'}
{'https://snyk.io/vuln/SNYK-JAVA-COMPUPPYCRAWLTOOLS-543266', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10782', 'https://github.com/checkstyle/checkstyle/security/advisories/GHSA-763g-fqq7-48wg', 'https://lists.apache.org/thread.html/r8aaf4ee16bbaf6204731d4770d96ebb34b258cd79b491f9cdd7f2540@%3Ccommits.nifi.apache.org%3...
null
{'https://github.com/checkstyle/checkstyle/commit/c46a16d177e6797895b195c288ae9a9a096254b8'}
{'https://github.com/checkstyle/checkstyle/commit/c46a16d177e6797895b195c288ae9a9a096254b8'}
Maven
GHSA-cjjf-94ff-43w7
High severity vulnerability that affects com.fasterxml.jackson.core:jackson-databind
An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a specific property), the service has the Jodd-db jar (for database access for the Jodd framework) in the classpath, and an attacker can provide an LDAP service to access, ...
{'CVE-2018-12022'}
2022-03-03T05:13:35.749753Z
2019-03-25T18:03:09Z
HIGH
null
{'CWE-502'}
{'https://access.redhat.com/errata/RHSA-2019:1108', 'https://github.com/advisories/GHSA-cjjf-94ff-43w7', 'https://access.redhat.com/errata/RHSA-2019:3140', 'https://access.redhat.com/errata/RHSA-2019:2804', 'https://www.blackhat.com/docs/us-16/materials/us-16-Munoz-A-Journey-From-JNDI-LDAP-Manipulation-To-RCE.pdf', 'ht...
null
{'https://github.com/FasterXML/jackson-databind/commit/28badf7ef60ac3e7ef151cd8e8ec010b8479226a'}
{'https://github.com/FasterXML/jackson-databind/commit/28badf7ef60ac3e7ef151cd8e8ec010b8479226a'}
Maven
GHSA-2363-cqg2-863c
XML External Entity (XXE) Injection in JDOM
An XXE issue in SAXBuilder in JDOM through 2.0.6 allows attackers to cause a denial of service via a crafted HTTP request. At this time there is not released fixed version of JDOM. As a workaround, to avoid external entities being expanded, one can call `builder.setExpandEntities(false)` and they won't be expanded.
{'CVE-2021-33813'}
2022-04-22T16:01:59.574173Z
2021-07-27T19:02:56Z
HIGH
null
{'CWE-611'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EWFVYTHGILOQXUA7U3SPOERQXL7OPSZG/', 'https://lists.apache.org/thread.html/rfb7a93e40ebeb1e0068cde0bf3834dcab46bb1ef06d6424db48ed9fd@%3Cdev.tika.apache.org%3E', 'https://github.com/hunterhacker/jdom/commit/dd4f3c2fc7893edd91...
null
{'https://github.com/hunterhacker/jdom/commit/dd4f3c2fc7893edd914954c73eb577f925a7d361'}
{'https://github.com/hunterhacker/jdom/commit/dd4f3c2fc7893edd914954c73eb577f925a7d361'}
Maven
GHSA-xfv3-rrfm-f2rv
Information Exposure in Netty
Netty before 3.9.8.Final, 3.10.x before 3.10.3.Final, 4.0.x before 4.0.28.Final, and 4.1.x before 4.1.0.Beta5 and Play Framework 2.x before 2.3.9 might allow remote attackers to bypass the httpOnly flag on cookies and obtain sensitive information by leveraging improper validation of cookie name and value characters.
{'CVE-2015-2156'}
2022-03-03T05:13:47.779414Z
2020-06-30T21:01:21Z
HIGH
null
{'CWE-20'}
{'https://github.com/netty/netty/pull/3748/commits/4ac519f534493bb0ca7a77e1c779138a54faa7b9', 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2015/05/17/1', 'https://lists.apache.org/thread.html/...
null
{'https://github.com/netty/netty/commit/2caa38a2795fe1f1ae6ceda4d69e826ed7c55e55', 'https://github.com/netty/netty/pull/3748/commits/4ac519f534493bb0ca7a77e1c779138a54faa7b9', 'https://github.com/netty/netty/commit/31815598a2af37f0b71ea94eada70d6659c23752'}
{'https://github.com/netty/netty/pull/3748/commits/4ac519f534493bb0ca7a77e1c779138a54faa7b9', 'https://github.com/netty/netty/commit/2caa38a2795fe1f1ae6ceda4d69e826ed7c55e55', 'https://github.com/netty/netty/commit/31815598a2af37f0b71ea94eada70d6659c23752'}
Maven
GHSA-7hmh-8gwv-mfvq
SQL Injection in Kylin
Kylin has some restful apis which will concatenate SQLs with the user input string, a user is likely to be able to run malicious database queries.
{'CVE-2020-1937'}
2022-03-03T05:13:29.470212Z
2020-07-27T22:51:47Z
MODERATE
null
{'CWE-89'}
{'https://lists.apache.org/thread.html/r021baf9d8d4ae41e8c8332c167c4fa96c91b5086563d9be55d2d7acf@%3Ccommits.kylin.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1937', 'https://lists.apache.org/thread.html/r61666760d8a4e8764b2d5fe158d8a48b569414480fbfadede574cdc0@%3Ccommits.kylin.apache.org%3E', 'https://li...
null
{'https://github.com/apache/kylin/commit/e373c64c96a54a7abfe4bccb82e8feb60db04749'}
{'https://github.com/apache/kylin/commit/e373c64c96a54a7abfe4bccb82e8feb60db04749'}
Maven
GHSA-gf7x-2j2x-7f73
Missing authorization in xwiki-platform
### Impact Any user with edit right can copy the content of a page it does not have access to by using it as template of a new page. ### Patches It has been patched in XWiki 13.2CR1 and 12.10.6 ### Workarounds There is no workaround beside patching. ### References https://jira.xwiki.org/browse/XWIKI-18430 ### F...
{'CVE-2022-23617'}
2022-02-09T21:41:46Z
2022-02-09T21:41:46Z
MODERATE
null
{'CWE-862'}
{'https://github.com/xwiki/xwiki-platform/commit/b35ef0edd4f2ff2c974cbeef6b80fcf9b5a44554', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23617', 'https://jira.xwiki.org/browse/XWIKI-18430', 'https://github.com/xwiki/xwiki-platform', 'https://github.com/xwiki/xwiki-platform/commit/30c52b01559b8ef5ed1035dac7c34aaf805764d5'...
null
{'https://github.com/xwiki/xwiki-platform/commit/30c52b01559b8ef5ed1035dac7c34aaf805764d5', 'https://github.com/xwiki/xwiki-platform/commit/b35ef0edd4f2ff2c974cbeef6b80fcf9b5a44554'}
{'https://github.com/xwiki/xwiki-platform/commit/30c52b01559b8ef5ed1035dac7c34aaf805764d5', 'https://github.com/xwiki/xwiki-platform/commit/b35ef0edd4f2ff2c974cbeef6b80fcf9b5a44554'}
Maven
GHSA-rjmq-6v55-4rjv
Improper Authorization in org.cometd.oort
### Impact Internal usage of Oort and Seti channels is improperly authorized, so any remote user could subscribe and publish to those channels. By subscribing to those channels, a remote user may be able to watch cluster-internal traffic that contains other user's (possibly sensitive) data. By publishing to those chann...
{'CVE-2022-24721'}
2022-03-16T22:01:59.681034Z
2022-03-15T19:02:36Z
HIGH
null
{'CWE-863'}
{'https://github.com/cometd/cometd/issues/1146', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24721', 'https://github.com/cometd/cometd/commit/bb445a143fbf320f17c62e340455cd74acfb5929', 'https://github.com/cometd/cometd', 'https://github.com/cometd/cometd/security/advisories/GHSA-rjmq-6v55-4rjv'}
null
{'https://github.com/cometd/cometd/commit/bb445a143fbf320f17c62e340455cd74acfb5929'}
{'https://github.com/cometd/cometd/commit/bb445a143fbf320f17c62e340455cd74acfb5929'}
Maven
GHSA-rc75-cf5c-mxvh
Use of Cryptographically Weak Pseudo-Random Number Generator in org.pac4j:pac4j-saml
The SAML identifier generated within SAML2Utils.java was found to make use of the apache commons-lang3 RandomStringUtils class which makes them predictable due to RandomStringUtils PRNG's algorithm not being cryptographically strong. This issue only affects the 3.X release of pac4j-saml.
{'CVE-2019-10755'}
2022-03-03T05:14:08.505074Z
2019-11-06T17:06:28Z
MODERATE
null
{'CWE-338'}
{'https://github.com/pac4j/pac4j/commit/34d5b1028a2db201ee81ec51b52a782fe073f609', 'https://snyk.io/vuln/SNYK-JAVA-ORGPAC4J-467407', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10755'}
null
{'https://github.com/pac4j/pac4j/commit/34d5b1028a2db201ee81ec51b52a782fe073f609'}
{'https://github.com/pac4j/pac4j/commit/34d5b1028a2db201ee81ec51b52a782fe073f609'}