ecosystem
stringclasses
11 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
220
details
stringlengths
34
13.5k
aliases
stringlengths
17
87
modified_date
stringdate
2019-03-26 14:13:00
2022-05-10 08:46:52
published_date
stringdate
2012-06-17 03:41:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
581 values
refs
stringlengths
82
11.6k
introduced
stringclasses
843 values
code_refs
stringlengths
46
940
commits
stringlengths
46
940
Maven
GHSA-q448-6c3m-cxmj
Cross-site Scripting in jeecg-boot
jeecg-boot is a code generator. A Cross Site Scripting (XSS) vulnerabilitiy exists in jeecg-boot 3.0 in /jeecg-boot/jmreport/view with a mouseover event.
{'CVE-2021-44585'}
2022-03-28T14:45:07.274896Z
2022-03-11T00:01:59Z
MODERATE
null
{'CWE-79'}
{'https://github.com/jeecgboot/jeecg-boot', 'https://github.com/jeecgboot/jeecg-boot/commit/dbba190980fe44ab5377703dc1a9487806ee2a91', 'https://github.com/jeecgboot/jeecg-boot/issues/3223', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44585'}
null
{'https://github.com/jeecgboot/jeecg-boot/commit/dbba190980fe44ab5377703dc1a9487806ee2a91'}
{'https://github.com/jeecgboot/jeecg-boot/commit/dbba190980fe44ab5377703dc1a9487806ee2a91'}
Maven
GHSA-q4rf-3fhx-88pf
YAML deserialization can run untrusted code
### Impact An authorized user can upload a zip-format plugin with a crafted plugin.yaml, or a crafted aclpolicy yaml file, or upload an untrusted project archive with a crafted aclpolicy yaml file, that can cause the server to run untrusted code on Rundeck Community or Enterprise Edition. An authenticated user can ma...
{'CVE-2021-39132'}
2022-03-03T05:13:37.221339Z
2021-09-01T18:27:01Z
MODERATE
null
{'CWE-502'}
{'https://github.com/rundeck/rundeck/security/advisories/GHSA-q4rf-3fhx-88pf', 'https://github.com/rundeck/rundeck/commit/850d12e21d22833bc148b7f458d7cb5949f829b6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39132', 'https://github.com/rundeck/rundeck'}
null
{'https://github.com/rundeck/rundeck/commit/850d12e21d22833bc148b7f458d7cb5949f829b6'}
{'https://github.com/rundeck/rundeck/commit/850d12e21d22833bc148b7f458d7cb5949f829b6'}
Maven
GHSA-m6cj-93v6-cvr5
Infinite loop in junrar
### Impact A carefully crafted RAR archive can trigger an infinite loop while extracting said archive. The impact depends solely on how the application uses the library, and whether files can be provided by malignant users. ### Patches The problem is partially patched in 7.4.1 ### Workarounds None ### References h...
{'CVE-2022-23596'}
2022-04-19T18:00:13.490422Z
2022-02-01T00:47:23Z
HIGH
null
{'CWE-400', 'CWE-835'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23596', 'https://github.com/junrar/junrar/commit/7b16b3d90b91445fd6af0adfed22c07413d4fab7', 'https://github.com/junrar/junrar/issues/73', 'https://github.com/junrar/junrar', 'https://github.com/junrar/junrar/security/advisories/GHSA-m6cj-93v6-cvr5'}
null
{'https://github.com/junrar/junrar/commit/7b16b3d90b91445fd6af0adfed22c07413d4fab7'}
{'https://github.com/junrar/junrar/commit/7b16b3d90b91445fd6af0adfed22c07413d4fab7'}
Maven
GHSA-m2r5-4w96-qxg5
Arbitrary file access through XML parsing in org.xwiki.commons:xwiki-commons-xml
### Impact It's possible in a script to access any file accessing to the user running XWiki application server with XML External Entity Injection through the XML script service. For example: ``` {{velocity}} #set($xml=$services.get('xml')) #set($xxe_payload = "<?xml version='1.0' encoding='UTF-8'?><!DOCTYPE root[<!E...
{'CVE-2022-24898'}
2022-04-29T20:45:20.929502Z
2022-04-28T19:31:55Z
MODERATE
null
{'CWE-611'}
{'https://github.com/xwiki/xwiki-commons/commit/947e8921ebd95462d5a7928f397dd1b64f77c7d5', 'https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-m2r5-4w96-qxg5', 'https://jira.xwiki.org/browse/XWIKI-18946', 'https://github.com/xwiki/xwiki-commons'}
null
{'https://github.com/xwiki/xwiki-commons/commit/947e8921ebd95462d5a7928f397dd1b64f77c7d5'}
{'https://github.com/xwiki/xwiki-commons/commit/947e8921ebd95462d5a7928f397dd1b64f77c7d5'}
Maven
GHSA-qjwc-v72v-fq6r
HTTP request smuggling in Undertow
A flaw was found in Undertow. A regression in the fix for CVE-2020-10687 was found. HTTP request smuggling related to CVE-2017-2666 is possible against HTTP/1.x and HTTP/2 due to permitting invalid characters in an HTTP request. This flaw allows an attacker to poison a web-cache, perform an XSS attack, or obtain sensit...
{'CVE-2021-20220'}
2022-03-03T05:13:23.722795Z
2021-06-16T17:47:52Z
MODERATE
null
{'CWE-444'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-20220', 'https://bugzilla.redhat.com/show_bug.cgi?id=1923133', 'https://security.netapp.com/advisory/ntap-20220210-0013/', 'https://github.com/undertow-io/undertow/commit/9e797b2f99617fdad0471eaa88c711ee7f44605f'}
null
{'https://github.com/undertow-io/undertow/commit/9e797b2f99617fdad0471eaa88c711ee7f44605f'}
{'https://github.com/undertow-io/undertow/commit/9e797b2f99617fdad0471eaa88c711ee7f44605f'}
Maven
GHSA-r2wf-q3x4-hrv9
Default development error handler in Ratpack is vulnerable to HTML content injection (XSS)
Versions of Ratpack from 0.9.10 through 1.7.5 are vulnerable to [CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')](https://cwe.mitre.org/data/definitions/79.html) (aka. XSS) in the development error handler. An attacker can utilize this to perform XSS when an exception messag...
{'CVE-2019-10770'}
2022-03-03T05:13:37.516047Z
2020-01-27T19:28:20Z
MODERATE
null
{'CWE-779'}
{'https://snyk.io/vuln/SNYK-JAVA-IORATPACK-534882', 'https://github.com/ratpack/ratpack/security/advisories/GHSA-r2wf-q3x4-hrv9', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10770', 'https://github.com/ratpack/ratpack/commit/a3cbb13be1527874528c3b99fc33517c0297b6d3'}
null
{'https://github.com/ratpack/ratpack/commit/a3cbb13be1527874528c3b99fc33517c0297b6d3'}
{'https://github.com/ratpack/ratpack/commit/a3cbb13be1527874528c3b99fc33517c0297b6d3'}
Maven
GHSA-pr38-qpxm-g88x
Uncontrolled Resource Consumption in Apache ActiveMQ Artemis
In Apache ActiveMQ Artemis prior to 2.20.0 or 2.19.1, an attacker could partially disrupt availability (DoS) through uncontrolled resource consumption of memory.
{'CVE-2022-23913'}
2022-05-03T02:32:19.369867Z
2022-02-06T00:00:55Z
HIGH
null
{'CWE-400'}
{'https://github.com/apache/activemq-artemis/pull/3871', 'https://github.com/github/codeql-java-CVE-coverage/issues/1061', 'https://github.com/apache/activemq-artemis/pull/3862', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23913', 'https://github.com/apache/activemq-artemis/pull/3871/commits/153d2e9a979aead8dff95fbc91d6...
null
{'https://github.com/apache/activemq-artemis/pull/3862/commits/1f92368240229b8f5db92a92a72c703faf83e9b7', 'https://github.com/apache/activemq-artemis/pull/3871/commits/153d2e9a979aead8dff95fbc91d659ecc7d0fb82'}
{'https://github.com/apache/activemq-artemis/pull/3871/commits/153d2e9a979aead8dff95fbc91d659ecc7d0fb82', 'https://github.com/apache/activemq-artemis/pull/3862/commits/1f92368240229b8f5db92a92a72c703faf83e9b7'}
Maven
GHSA-5xqr-grq4-qwgx
Moderate severity vulnerability that affects com.github.junrar:junrar
Archive.java in Junrar before 1.0.1, as used in Apache Tika and other products, is affected by a denial of service vulnerability due to an infinite loop when handling corrupt RAR files.
{'CVE-2018-12418'}
2022-03-03T05:13:15.624989Z
2018-10-17T00:04:05Z
MODERATE
null
{'CWE-835'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-12418', 'https://github.com/junrar/junrar/commit/ad8d0ba8e155630da8a1215cee3f253e0af45817', 'https://github.com/junrar/junrar/pull/8', 'https://github.com/advisories/GHSA-5xqr-grq4-qwgx', 'https://github.com/junrar/junrar'}
null
{'https://github.com/junrar/junrar/commit/ad8d0ba8e155630da8a1215cee3f253e0af45817'}
{'https://github.com/junrar/junrar/commit/ad8d0ba8e155630da8a1215cee3f253e0af45817'}
Maven
GHSA-c2q3-4qrh-fm48
Deserialization of untrusted data in Jackson Databind
FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to oracle.jms.AQjmsQueueConnectionFactory, oracle.jms.AQjmsXATopicConnectionFactory, oracle.jms.AQjmsTopicConnectionFactory, oracle.jms.AQjmsXAQueueConnectionFactory, and oracle.jms.AQjmsXAConnect...
{'CVE-2020-14061'}
2022-03-03T05:13:51.797949Z
2020-06-18T14:44:50Z
HIGH
null
{'CWE-502'}
{'https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-572316', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14061', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://lists.debian.org/debian-lts-announce/2020/07/msg00001.html', 'https://github.com/FasterX...
null
{'https://github.com/FasterXML/jackson-databind/commit/5c8642aeae9c756b438ab7637c90ef3c77966e6e'}
{'https://github.com/FasterXML/jackson-databind/commit/5c8642aeae9c756b438ab7637c90ef3c77966e6e'}
Maven
GHSA-2m7g-9q74-9m3q
Improper Certificate Validation in Apache Beam
The Apache Beam MongoDB connector in versions 2.10.0 to 2.16.0 has an option to disable SSL trust verification. However this configuration is not respected and the certificate verification disables trust verification in every case. This exclusion also gets registered globally which disables trust checking for any code ...
{'CVE-2020-1929'}
2022-03-03T05:13:24.352659Z
2020-05-06T20:49:04Z
HIGH
null
{'CWE-295'}
{'https://lists.apache.org/thread.html/rdd0e85b71bf0274471b40fa1396d77f7b2d1165eaea4becbdc69aa04%40%3Cuser.beam.apache.org%3E', 'https://github.com/apache/beam', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1929', 'https://github.com/apache/beam/commit/a7dd23d95d2d214b4110781b5a28802bd43b834b'}
null
{'https://github.com/apache/beam/commit/a7dd23d95d2d214b4110781b5a28802bd43b834b'}
{'https://github.com/apache/beam/commit/a7dd23d95d2d214b4110781b5a28802bd43b834b'}
Maven
GHSA-mx9v-gmh4-mgqw
High severity vulnerability that affects com.fasterxml.jackson.core:jackson-databind
FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the openjpa class from polymorphic deserialization.
{'CVE-2018-19361'}
2022-03-03T05:11:54.751309Z
2019-01-04T19:07:01Z
CRITICAL
null
{'CWE-502'}
{'http://www.securityfocus.com/bid/107985', 'https://access.redhat.com/errata/RHSA-2019:3140', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E', 'https://access....
null
{'https://github.com/FasterXML/jackson-databind/commit/42912cac4753f3f718ece875e4d486f8264c2f2b'}
{'https://github.com/FasterXML/jackson-databind/commit/42912cac4753f3f718ece875e4d486f8264c2f2b'}
Maven
GHSA-p63h-7hw8-5cw4
Cross-Site Request Forgery in OpenNMS Horizon
In OpenNMS Horizon, versions opennms-1-0-stable through opennms-27.1.1; OpenNMS Meridian, versions meridian-foundation-2015.1.0-1 through meridian-foundation-2019.1.18-1; meridian-foundation-2020.1.0-1 through meridian-foundation-2020.1.6-1 are vulnerable to CSRF, due to no CSRF protection, and since there is no valida...
{'CVE-2021-25930'}
2021-05-28T22:25:41Z
2021-05-25T18:46:49Z
MODERATE
null
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-25930', 'https://github.com/OpenNMS/opennms/commit/607151ea8f90212a3fb37c977fa57c7d58d26a84', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25930', 'https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c'}
null
{'https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c', 'https://github.com/OpenNMS/opennms/commit/607151ea8f90212a3fb37c977fa57c7d58d26a84'}
{'https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c', 'https://github.com/OpenNMS/opennms/commit/607151ea8f90212a3fb37c977fa57c7d58d26a84'}
Maven
GHSA-9jq9-c2cv-pcrj
Cross-site Scripting by SVG upload in xwiki-platform
### Impact When using default XWiki configuration, it's possible for an attacker to upload an SVG containing a script executed when executing the download action on the file. ### Patches This problem has been patched so that the default configuration doesn't allow to display the SVG files in the browser. ### Workaro...
{'CVE-2021-43841'}
2022-02-11T21:08:41Z
2022-02-10T22:42:48Z
MODERATE
null
{'CWE-79'}
{'https://www.xwiki.org/xwiki/bin/view/Documentation/AdminGuide/Attachments#HAttachmentdisplayordownload', 'https://github.com/xwiki/xwiki-platform/commit/5853d492b3a274db0d94d560e2a5ea988a271c62', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43841', 'https://github.com/xwiki/xwiki-platform/', 'https://jira.xwiki.org/bro...
null
{'https://github.com/xwiki/xwiki-platform/commit/5853d492b3a274db0d94d560e2a5ea988a271c62'}
{'https://github.com/xwiki/xwiki-platform/commit/5853d492b3a274db0d94d560e2a5ea988a271c62'}
Maven
GHSA-gv3v-92v6-m48j
Improper Neutralization of CRLF Sequences in HTTP Headers in Jooby ('HTTP Response Splitting)
### Impact - Cross Site Scripting - Cache Poisoning - Page Hijacking ### Patches This was fixed in version `2.2.1`. ### Workarounds If you are unable to update, ensure that user supplied data isn't able to flow to HTTP headers. If it does, pre-sanitize for CRLF characters. ### References ##### [CWE-113: Impro...
{'CVE-2020-7622'}
2022-03-03T05:14:07.280832Z
2020-04-03T15:23:30Z
CRITICAL
null
{'CWE-444'}
{'https://github.com/jooby-project/jooby/security/advisories/GHSA-gv3v-92v6-m48j', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7622', 'https://github.com/jooby-project/jooby/commit/b66e3342cf95205324023cfdf2cb5811e8a6dcf4', 'https://snyk.io/vuln/SNYK-JAVA-IOJOOBY-564249'}
null
{'https://github.com/jooby-project/jooby/commit/b66e3342cf95205324023cfdf2cb5811e8a6dcf4'}
{'https://github.com/jooby-project/jooby/commit/b66e3342cf95205324023cfdf2cb5811e8a6dcf4'}
Maven
GHSA-mgh8-hcwj-h57v
Improper Restriction of XML External Entity Reference in Apache Olingo
The XML content type entity deserializer in Apache Olingo versions 4.0.0 to 4.6.0 is not configured to deny the resolution of external entities. Request with content type "application/xml", which trigger the deserialization of entities, can be used to trigger XXE attacks.
{'CVE-2019-17554'}
2022-03-03T05:14:02.923777Z
2020-02-04T22:37:43Z
MODERATE
null
{'CWE-611'}
{'https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E', 'https://seclists.org/bugtraq/2019/Dec/11', 'https://mail-archives.apache.org/mod_mbox/olingo-user/201912.mbox/%3CCAGSZ4d7Ty%3DL-n_iAzT6vcQp65BY29XZDS5tMoM8MdDrb1moM7A%40mail.gmail.com%3E', 'http...
null
{'https://github.com/apache/olingo-odata4/commit/c3f982db3d97e395d313ae8f231202bb2139882c', 'https://github.com/apache/olingo-odata4/commit/5948974ad28271818e2afe747c71cde56a7f2c63'}
{'https://github.com/apache/olingo-odata4/commit/5948974ad28271818e2afe747c71cde56a7f2c63', 'https://github.com/apache/olingo-odata4/commit/c3f982db3d97e395d313ae8f231202bb2139882c'}
Maven
GHSA-59g4-hpg3-3gcp
Files Accessible to External Parties in Opencast
Opencast before version 10.6 allows references to local file URLs in ingested media packages, allowing attackers to include local files from Opencast's host machines and making them available via the web interface. ### Impact Before Opencast 10.6, Opencast would [open and include local files during ingests](https://g...
{'CVE-2021-43821'}
2022-03-03T05:14:00.491448Z
2021-12-14T21:44:03Z
CRITICAL
null
{'CWE-552'}
{'https://github.com/opencast/opencast/security/advisories/GHSA-59g4-hpg3-3gcp', 'https://github.com/opencast/opencast/blob/69952463971cf578363e3b97d8edaf334ff51253/modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java#L1587', 'https://github.com/opencast/opencast', 'https://g...
null
{'https://github.com/opencast/opencast/commit/65c46b9d3e8f045c544881059923134571897764'}
{'https://github.com/opencast/opencast/commit/65c46b9d3e8f045c544881059923134571897764'}
Maven
GHSA-p9m8-27x8-rg87
Critical vulnerability found in cron-utils
### Impact A Template Injection was identified in cron-utils enabling attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. Versions up to 9.1.2 are susceptible to this vulnerability. Please note, that only projects using the @Cron annotation to validat...
{'CVE-2021-41269'}
2022-03-03T05:13:37.090314Z
2021-11-15T23:27:11Z
CRITICAL
null
{'CWE-94'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41269', 'https://github.com/jmrozanec/cron-utils/commit/d6707503ec2f20947f79e38f861dba93b39df9da', 'https://github.com/jmrozanec/cron-utils/security/advisories/GHSA-p9m8-27x8-rg87', 'https://github.com/jmrozanec/cron-utils', 'https://github.com/jmrozanec/cron-utils/commit/cfd...
null
{'https://github.com/jmrozanec/cron-utils/commit/cfd2880f80e62ea74b92fa83474c2aabdb9899da', 'https://github.com/jmrozanec/cron-utils/commit/d6707503ec2f20947f79e38f861dba93b39df9da'}
{'https://github.com/jmrozanec/cron-utils/commit/d6707503ec2f20947f79e38f861dba93b39df9da', 'https://github.com/jmrozanec/cron-utils/commit/cfd2880f80e62ea74b92fa83474c2aabdb9899da'}
Maven
GHSA-2h63-qp69-fwvw
Server-side request forgery (SSRF) in Apache Batik
Apache Batik 1.13 is vulnerable to server-side request forgery, caused by improper input validation by the NodePickerPanel. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.
{'CVE-2020-11987'}
2022-03-03T05:13:00.592182Z
2022-01-06T20:35:54Z
HIGH
null
{'CWE-20', 'CWE-918'}
{'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W7EAYO5XIHD6OIEA3HPK64UDDBSLNAC5/', 'https://lists.apache.org/thread.html/r588d05a0790b40a0eb81088252e1e8c1efb99706631421f17038eb05@%3Cdev.poi.apache.org%3E', 'https...
null
{'https://github.com/apache/xmlgraphics-batik/commit/0ef5b661a1f77772d1110877ea9e0287987098f6'}
{'https://github.com/apache/xmlgraphics-batik/commit/0ef5b661a1f77772d1110877ea9e0287987098f6'}
Maven
GHSA-3pqg-4rqg-pg9g
Cross-site Scripting in OWASP AntiSamy
OWASP AntiSamy is a library for performing fast, configurable cleansing of HTML coming from untrusted sources. AntiSamy before 1.6.6 allows XSS via HTML tag smuggling on STYLE content with crafted input. The output serializer does not properly encode the supposed Cascading Style Sheets (CSS) content.
{'CVE-2022-28367'}
2022-05-04T04:20:29.353805Z
2022-04-23T00:03:04Z
MODERATE
null
{'CWE-79'}
{'https://github.com/nahsra/antisamy/releases/tag/v1.6.6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-28367', 'https://github.com/nahsra/antisamy/commit/0199e7e194dba5e7d7197703f43ebe22401e61ae', 'https://github.com/nahsra/antisamy'}
null
{'https://github.com/nahsra/antisamy/commit/0199e7e194dba5e7d7197703f43ebe22401e61ae'}
{'https://github.com/nahsra/antisamy/commit/0199e7e194dba5e7d7197703f43ebe22401e61ae'}
Maven
GHSA-m8p2-495h-ccmh
The SafeHtml annotation in Hibernate-Validator does not properly guard against XSS attacks
A vulnerability was found in Hibernate-Validator. The SafeHtml validator annotation fails to properly sanitize payloads consisting of potentially malicious code in HTML comments and instructions. This vulnerability can result in an XSS attack.
{'CVE-2019-10219'}
2022-03-03T05:13:17.197092Z
2020-01-08T17:01:52Z
MODERATE
null
{'CWE-79'}
{'https://lists.apache.org/thread.html/r4f92d7f7682dcff92722fa947f9e6f8ba2227c5dc3e11ba09114897d@%3Cnotifications.accumulo.apache.org%3E', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10219', 'https://github.com/hibernate/hibernate-validator/commit/124b7dd6d9a4ad24d4d49f74701f05a13e56ceee', 'https://github.com...
null
{'https://github.com/hibernate/hibernate-validator/commit/20d729548511ac5cff6fd459f93de137195420fe', 'https://github.com/hibernate/hibernate-validator/commit/124b7dd6d9a4ad24d4d49f74701f05a13e56ceee'}
{'https://github.com/hibernate/hibernate-validator/commit/20d729548511ac5cff6fd459f93de137195420fe', 'https://github.com/hibernate/hibernate-validator/commit/124b7dd6d9a4ad24d4d49f74701f05a13e56ceee'}
Maven
GHSA-36p3-wjmg-h94x
Remote Code Execution in Spring Framework
Spring Framework prior to versions 5.2.20 and 5.3.18 contains a remote code execution vulnerability known as `Spring4Shell`. ## Impact A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run o...
{'CVE-2022-22965'}
2022-04-01T16:30:56.651036Z
2022-03-31T18:30:50Z
CRITICAL
null
{'CWE-74'}
{'https://github.com/spring-projects/spring-framework/commit/002546b3e4b8d791ea6acccb81eb3168f51abb15', 'https://tanzu.vmware.com/security/cve-2022-22965', 'https://github.com/spring-projects/spring-framework/releases/tag/v5.2.20.RELEASE', 'https://github.com/spring-projects/spring-boot/releases/tag/v2.6.6', 'https://g...
null
{'https://github.com/spring-projects/spring-framework/commit/002546b3e4b8d791ea6acccb81eb3168f51abb15'}
{'https://github.com/spring-projects/spring-framework/commit/002546b3e4b8d791ea6acccb81eb3168f51abb15'}
Maven
GHSA-hw3m-8h25-8frw
Command Injection in Apache Kylin
Apache kylin checks the legitimacy of the project before executing some commands with the project name passed in by the user. There is a mismatch between what is being checked and what is being used as the shell command argument in DiagnosisService. This may cause an illegal project name to pass the check and perform t...
{'CVE-2021-45456'}
2022-03-03T05:13:32.561750Z
2022-01-08T00:42:59Z
MODERATE
null
{'CWE-77'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-45456', 'https://lists.apache.org/thread/70fkf9w1swt2cqdcz13rwfjvblw1fcpf', 'http://www.openwall.com/lists/oss-security/2022/01/06/1', 'https://github.com/apache/kylin/pull/1781', 'https://github.com/apache/kylin', 'https://github.com/apache/kylin/commit/f4daf14dde99b934c92ce...
null
{'https://github.com/apache/kylin/commit/f4daf14dde99b934c92ce2c832509f24342bc845'}
{'https://github.com/apache/kylin/commit/f4daf14dde99b934c92ce2c832509f24342bc845'}
Maven
GHSA-52rg-hpwq-qp56
Allocation of Resources Without Limits or Throttling in Keycloak
A vulnerability was found in Keycloak before 11.0.1 where DoS attack is possible by sending twenty requests simultaneously to the specified keycloak server, all with a Content-Length header value that exceeds the actual byte count of the request body.
{'CVE-2020-10758'}
2022-03-03T05:12:31.791056Z
2022-02-09T00:56:51Z
HIGH
null
{'CWE-770'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=1843849', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10758', 'https://github.com/keycloak/keycloak/commit/bee4ca89897766c4b68856eafe14f1a3dad34251'}
null
{'https://github.com/keycloak/keycloak/commit/bee4ca89897766c4b68856eafe14f1a3dad34251'}
{'https://github.com/keycloak/keycloak/commit/bee4ca89897766c4b68856eafe14f1a3dad34251'}
Maven
GHSA-wmfg-55f9-j8hq
Server-Side Template Injection
### Impact A Server-Side Template Injection was identified in BrowserUp Proxy enabling attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. This has been assigned CVE-2020-26282. ### Patches Effective Immediately, all users should upgrade to version 2...
{'CVE-2020-26282'}
2022-03-03T05:14:06.141126Z
2020-12-24T20:49:34Z
HIGH
null
{'CWE-74'}
{'https://securitylab.github.com/research/bean-validation-RCE', 'https://github.com/browserup/browserup-proxy/releases/tag/v2.1.2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26282', 'https://github.com/browserup/browserup-proxy/commit/4b38e7a3e20917e5c3329d0d4e9590bed9d578ab', 'https://github.com/browserup/browserup-p...
null
{'https://github.com/browserup/browserup-proxy/commit/4b38e7a3e20917e5c3329d0d4e9590bed9d578ab'}
{'https://github.com/browserup/browserup-proxy/commit/4b38e7a3e20917e5c3329d0d4e9590bed9d578ab'}
Maven
GHSA-74qp-233x-p5j8
Cross-site scripting (XSS) in Apache Livy
Livy server version 0.7.0-incubating (only) is vulnerable to a cross site scripting issue in the session name. A malicious user could use this flaw to access logs and results of other users' sessions and run jobs with their privileges. This issue is fixed in Livy 0.7.1-incubating.
{'CVE-2021-26544'}
2022-03-03T05:13:09.945335Z
2021-05-13T22:30:41Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-26544', 'http://www.openwall.com/lists/oss-security/2021/02/20/1', 'https://github.com/apache/incubator-livy/commit/4d8a912699683b973eee76d4e91447d769a0cb0d', 'https://lists.apache.org/thread.html/r2db14e7fd1e5ec2519e8828d43529bad623d75698cc7918af3a3f3ed%40%3Cuser.livy.apache...
null
{'https://github.com/apache/incubator-livy/commit/4d8a912699683b973eee76d4e91447d769a0cb0d'}
{'https://github.com/apache/incubator-livy/commit/4d8a912699683b973eee76d4e91447d769a0cb0d'}
Maven
GHSA-vpfp-5gwq-g533
Improper Authentication in Apache ShenYu Admin
A flaw was found in Apache ShenYu Admin. The incorrect use of JWT in ShenyuAdminBootstrap allows an attacker to bypass authentication. This issue affected Apache ShenYu 2.3.0 and 2.4.0
{'CVE-2021-37580'}
2022-03-03T05:13:44.383618Z
2021-11-17T23:15:30Z
CRITICAL
null
{'CWE-287'}
{'https://lists.apache.org/thread/o15j25qwtpcw62k48xw1tnv48skh3zgb', 'https://github.com/apache/incubator-shenyu', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37580', 'https://github.com/apache/incubator-shenyu/releases/tag/v2.4.1', 'https://github.com/apache/incubator-shenyu/commit/5154e6f487c4d51dc8e022f2e2bf360841cab...
null
{'https://github.com/apache/incubator-shenyu/commit/5154e6f487c4d51dc8e022f2e2bf360841cabda4'}
{'https://github.com/apache/incubator-shenyu/commit/5154e6f487c4d51dc8e022f2e2bf360841cabda4'}
Maven
GHSA-ppc3-fpvh-7396
Improper synchronization in Apache Netbeans HTML/Java API
There exists a race condition between the deletion of the temporary file and the creation of the temporary directory in `webkit` subproject of HTML/Java API version 1.7. A similar vulnerability has recently been disclosed in other Java projects and the fix in HTML/Java API version 1.7.1 follows theirs: To avoid local p...
{'CVE-2020-17534'}
2022-05-03T19:52:12.075427Z
2022-02-09T22:25:18Z
HIGH
null
{'CWE-362'}
{'https://github.com/apache/netbeans-html4j/commit/fa70e507e5555e1adb4f6518479fc408a7abd0e6', 'https://lists.apache.org/thread.html/ra6119c0cdfccf051a846fa11b61364f5df9e7db93c310706a947f86a%40%3Cdev.netbeans.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17534'}
null
{'https://github.com/apache/netbeans-html4j/commit/fa70e507e5555e1adb4f6518479fc408a7abd0e6'}
{'https://github.com/apache/netbeans-html4j/commit/fa70e507e5555e1adb4f6518479fc408a7abd0e6'}
Maven
GHSA-52mh-p2m2-w625
Cross-site Scripting in HAPI FHIR
XSS exists in the HAPI FHIR testpage overlay module of the HAPI FHIR library before 3.8.0. The attack involves unsanitized HTTP parameters being output in a form page, allowing attackers to leak cookies and other sensitive information from ca/uhn/fhir/to/BaseController.java via a specially crafted URL. (This module is ...
{'CVE-2019-12741'}
2022-03-03T05:13:27.411183Z
2019-06-07T20:56:59Z
MODERATE
null
{'CWE-79'}
{'https://github.com/jamesagnew/hapi-fhir/commit/8f41159eb147eeb964cad68b28eff97acac6ea9a', 'https://github.com/jamesagnew/hapi-fhir/issues/1335', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12741', 'https://github.com/jamesagnew/hapi-fhir/releases/tag/v3.8.0'}
null
{'https://github.com/jamesagnew/hapi-fhir/commit/8f41159eb147eeb964cad68b28eff97acac6ea9a'}
{'https://github.com/jamesagnew/hapi-fhir/commit/8f41159eb147eeb964cad68b28eff97acac6ea9a'}
Maven
GHSA-5949-rw7g-wx7w
Deserialization of untrusted data in jackson-databind
A flaw was found in jackson-databind before 2.9.10.7. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
{'CVE-2021-20190'}
2022-03-03T05:13:41.686303Z
2021-01-20T21:20:15Z
HIGH
null
{'CWE-502'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=1916633', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://security.netapp.com/advisory/ntap-20210219-0008/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20190', 'https://github.com/FasterXML/jackson-databind/issues/2854', 'https://github.com/Fa...
null
{'https://github.com/FasterXML/jackson-databind/commit/7dbf51bf78d157098074a20bd9da39bd48c18e4a'}
{'https://github.com/FasterXML/jackson-databind/commit/7dbf51bf78d157098074a20bd9da39bd48c18e4a'}
Maven
GHSA-74mg-6xqx-2vrq
Deserialization exploitation in Apache Dubbo
A deserialization vulnerability existed in dubbo 2.7.5 and its earlier versions, which could lead to malicious code execution. Most Dubbo users use Hessian2 as the default serialization/deserialization protool, during Hessian2 deserializing the HashMap object, some functions in the classes stored in HashMap will be exe...
{'CVE-2020-11995'}
2022-03-03T05:13:50.092682Z
2022-02-09T22:27:01Z
CRITICAL
null
{'CWE-502'}
{'https://github.com/apache/dubbo/commit/d2e9baf380108950c48e0ab700ccdbf11dd753ab', 'https://lists.apache.org/thread.html/r5b2df4ef479209dc4ced457b3d58a887763b60b9354c3dc148b2eb5b%40%3Cdev.dubbo.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11995'}
null
{'https://github.com/apache/dubbo/commit/d2e9baf380108950c48e0ab700ccdbf11dd753ab'}
{'https://github.com/apache/dubbo/commit/d2e9baf380108950c48e0ab700ccdbf11dd753ab'}
Maven
GHSA-xqj7-j8j5-f2xr
Bouncy Castle has a flaw in the Low-level interface to RSA key pair generator
Bouncy Castle BC 1.54 - 1.59, BC-FJA 1.0.0, BC-FJA 1.0.1 and earlier have a flaw in the Low-level interface to RSA key pair generator, specifically RSA Key Pairs generated in low-level API with added certainty may have less M-R tests than expected. This appears to be fixed in versions BC 1.60 beta 4 and later, BC-FJA 1...
{'CVE-2018-1000180'}
2022-04-26T19:00:14.440858Z
2018-10-16T17:44:39Z
HIGH
null
{'CWE-327'}
{'https://www.bountysource.com/issues/58293083-rsa-key-generation-computation-of-iterations-for-mr-primality-test', 'https://access.redhat.com/errata/RHSA-2019:0877', 'https://access.redhat.com/errata/RHSA-2018:2423', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://github.com/bc...
null
{'https://github.com/bcgit/bc-java/commit/22467b6e8fe19717ecdf201c0cf91bacf04a55ad', 'https://github.com/bcgit/bc-java/commit/73780ac522b7795fc165630aba8d5f5729acc839'}
{'https://github.com/bcgit/bc-java/commit/22467b6e8fe19717ecdf201c0cf91bacf04a55ad', 'https://github.com/bcgit/bc-java/commit/73780ac522b7795fc165630aba8d5f5729acc839'}
Maven
GHSA-9mxf-g3x6-wv74
High severity vulnerability that affects com.fasterxml.jackson.core:jackson-databind
FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization.
{'CVE-2018-14721'}
2022-03-03T05:13:02.517930Z
2019-01-04T19:07:06Z
CRITICAL
null
{'CWE-918'}
{'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.7', 'https://access.redhat.com/errata/RHSA-2019:1108', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44', 'https://www.oracle.com/technetwork/security-advisory...
null
{'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44'}
{'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44'}
Maven
GHSA-xmc8-26q4-qjhx
Denial of Service (DoS) in Jackson Dataformat CBOR
This affects the package com.fasterxml.jackson.dataformat:jackson-dataformat-cbor from 0 and before 2.11.4, from 2.12.0-rc1 and before 2.12.1. Unchecked allocation of byte buffer can cause a java.lang.OutOfMemoryError exception.
{'CVE-2020-28491'}
2022-03-03T05:12:59.919693Z
2021-12-09T19:17:21Z
HIGH
null
{'CWE-770'}
{'https://github.com/FasterXML/jackson-dataformats-binary/issues/186', 'https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONDATAFORMAT-1047329', 'https://github.com/FasterXML/jackson-dataformats-binary', 'https://github.com/FasterXML/jackson-dataformats-binary/commit/de072d314af8f5f269c8abec6930652af67bc8e6', 'https://nv...
null
{'https://github.com/FasterXML/jackson-dataformats-binary/commit/de072d314af8f5f269c8abec6930652af67bc8e6'}
{'https://github.com/FasterXML/jackson-dataformats-binary/commit/de072d314af8f5f269c8abec6930652af67bc8e6'}
Maven
GHSA-24r8-fm9r-cpj2
Low severity vulnerability that affects com.linecorp.armeria:armeria
## Multiple timing attack vulnerabilities leading to the recovery of secrets based on the use of non-constant time compare function ### Impact String comparison method in multiple authentication validation in Armeria were known to be vulnerable to timing attacks. This vulnerability is caused by the insecure implement...
{'CVE-2019-16771'}
2022-03-03T05:12:59.259982Z
2019-12-05T18:40:51Z
LOW
null
{'CWE-113'}
{'https://github.com/line/armeria/commit/b597f7a865a527a84ee3d6937075cfbb4470ed20', 'https://github.com/line/armeria/security/advisories/GHSA-35fr-h7jr-hh86', 'https://github.com/advisories/GHSA-24r8-fm9r-cpj2', 'https://github.com/line/armeria/security/advisories/GHSA-24r8-fm9r-cpj2', 'https://nvd.nist.gov/vuln/detail...
null
{'https://github.com/line/armeria/commit/b597f7a865a527a84ee3d6937075cfbb4470ed20'}
{'https://github.com/line/armeria/commit/b597f7a865a527a84ee3d6937075cfbb4470ed20'}
Maven
GHSA-p2j7-6g9h-32xh
Cross site scripting in Shopizer
A Stored Cross Site Scripting (XSS) vulnerability exists in Shopizer versions v2.0.2 through v2.17.0 via the “Manage Images” tab, which allows an attacker to upload a SVG file containing malicious JavaScript code.
{'CVE-2022-23059'}
2022-04-07T22:16:52.919294Z
2022-03-30T00:00:27Z
MODERATE
null
{'CWE-79'}
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23059', 'https://github.com/shopizer-ecommerce/shopizer/commit/6b9f1ecd303b3b724d96bd08095c1a751dcc287e', 'https://github.com/shopizer-ecommerce/shopizer', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23059'}
null
{'https://github.com/shopizer-ecommerce/shopizer/commit/6b9f1ecd303b3b724d96bd08095c1a751dcc287e'}
{'https://github.com/shopizer-ecommerce/shopizer/commit/6b9f1ecd303b3b724d96bd08095c1a751dcc287e'}
Maven
GHSA-2mxr-89gf-rc4v
Read permissions not enforced for client provided filter expressions in Elide.
### Impact It is possible for an adversary to "guess and check" the value of a model field they do not have access to assuming they can read at least one other field in the model. The adversary can construct filter expressions for an inaccessible field to filter a collection. The presence or absence of models in the ...
{'CVE-2020-5289'}
2022-03-03T05:13:01.891877Z
2020-03-30T20:09:58Z
HIGH
null
{'CWE-285'}
{'https://github.com/yahoo/elide/security/advisories/GHSA-2mxr-89gf-rc4v', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5289', 'https://github.com/yahoo/elide/pull/1236', 'https://github.com/yahoo/elide/pull/1236/commits/a985f0f9c448aabe70bc904337096399de4576dc'}
null
{'https://github.com/yahoo/elide/pull/1236/commits/a985f0f9c448aabe70bc904337096399de4576dc'}
{'https://github.com/yahoo/elide/pull/1236/commits/a985f0f9c448aabe70bc904337096399de4576dc'}
Maven
GHSA-hf44-3mx6-vhhw
Navigate endpoint is vulnerable to regex injection that may lead to Denial of Service.
### Impact The regex injection that may lead to Denial of Service. ### Patches Will be patched in 2.4 and 3.0 ### Workarounds Versions lower than 2.x are only affected if the navigation module is added ### References See this pull request for the fix: https://github.com/graphhopper/graphhopper/pull/2304 If you have...
{'CVE-2021-29506'}
2022-03-03T05:13:45.979595Z
2021-05-19T23:02:57Z
MODERATE
null
{'CWE-400'}
{'https://github.com/graphhopper/graphhopper/commit/eb189be1fa7443ebf4ae881e737a18f818c95f41', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29506', 'https://github.com/graphhopper/graphhopper/security/advisories/GHSA-hf44-3mx6-vhhw', 'https://github.com/graphhopper/graphhopper/pull/2304'}
null
{'https://github.com/graphhopper/graphhopper/commit/eb189be1fa7443ebf4ae881e737a18f818c95f41'}
{'https://github.com/graphhopper/graphhopper/commit/eb189be1fa7443ebf4ae881e737a18f818c95f41'}
Maven
GHSA-r97x-3g8f-gx3m
The Bouncy Castle JCE Provider carry a propagation bug
In the Bouncy Castle JCE Provider versions 1.51 to 1.55, a carry propagation bug was introduced in the implementation of squaring for several raw math classes have been fixed (org.bouncycastle.math.raw.Nat???). These classes are used by our custom elliptic curve implementations (org.bouncycastle.math.ec.custom.**), so ...
{'CVE-2016-1000340'}
2022-04-27T13:30:08.936923Z
2018-10-17T16:23:50Z
HIGH
null
null
{'https://github.com/advisories/GHSA-r97x-3g8f-gx3m', 'https://github.com/bcgit/bc-java/commit/790642084c4e0cadd47352054f868cc8397e2c00#diff-e5934feac8203ca0104ab291a3560a31', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://github.com/bcgit/bc-java', 'https://access.redhat.com/errata/RHSA-2018:2669',...
null
{'https://github.com/bcgit/bc-java/commit/790642084c4e0cadd47352054f868cc8397e2c00#diff-e5934feac8203ca0104ab291a3560a31'}
{'https://github.com/bcgit/bc-java/commit/790642084c4e0cadd47352054f868cc8397e2c00#diff-e5934feac8203ca0104ab291a3560a31'}
Maven
GHSA-2j2x-hx4g-2gf4
In Bouncy Castle JCE Provider the DHIES implementation allowed the use of ECB mode
In the Bouncy Castle JCE Provider version 1.55 and earlier the DHIES implementation allowed the use of ECB mode. This mode is regarded as unsafe and support for it has been removed from the provider.
{'CVE-2016-1000344'}
2022-04-27T13:45:16.751309Z
2018-10-18T17:43:55Z
HIGH
null
{'CWE-1310'}
{'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://github.com/bcgit/bc-java/commit/9385b0ebd277724b167fe1d1456e3c112112be1f', 'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://access.redhat.com/errata/RHSA-2018:2927', 'https://nvd.ni...
null
{'https://github.com/bcgit/bc-java/commit/9385b0ebd277724b167fe1d1456e3c112112be1f'}
{'https://github.com/bcgit/bc-java/commit/9385b0ebd277724b167fe1d1456e3c112112be1f'}
Maven
GHSA-54mg-vgrp-mwx9
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in Ratpack
Ratpack versions before 1.6.1 generate a session ID using a cryptographically weak PRNG in the JDK's ThreadLocalRandom. This means that if an attacker can determine a small window for the server start time and obtain a session ID value, they can theoretically determine the sequence of session IDs.
{'CVE-2019-11808'}
2022-03-03T05:13:00.025711Z
2019-05-14T04:01:37Z
LOW
null
{'CWE-338'}
{'https://github.com/ratpack/ratpack/releases/tag/v1.6.1', 'https://github.com/ratpack/ratpack/issues/1448', 'https://github.com/ratpack/ratpack/commit/f2b63eb82dd71194319fd3945f5edf29b8f3a42d', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11808'}
null
{'https://github.com/ratpack/ratpack/commit/f2b63eb82dd71194319fd3945f5edf29b8f3a42d'}
{'https://github.com/ratpack/ratpack/commit/f2b63eb82dd71194319fd3945f5edf29b8f3a42d'}
Maven
GHSA-w736-hf9p-qqh3
Key Caching behavior in the DynamoDB Encryption Client.
### Impact This advisory concerns users of MostRecentProvider in the DynamoDB Encryption Client with a key provider like AWS Key Management Service that allows for permissions on keys to be modified. When key usage permissions were changed at the key provider, time-based key reauthorization logic in MostRecentProvider...
null
2022-03-03T05:13:22.445994Z
2021-02-08T17:43:36Z
LOW
null
{'CWE-862'}
{'https://github.com/aws/aws-dynamodb-encryption-java/blob/master/CHANGELOG.md#1150----2021-02-04', 'https://github.com/aws/aws-dynamodb-encryption-java/security/advisories/GHSA-w736-hf9p-qqh3', 'https://github.com/aws/aws-dynamodb-encryption-java/commit/7de5f5a5929271ab25bce685089eb7ec564dac4b'}
null
{'https://github.com/aws/aws-dynamodb-encryption-java/commit/7de5f5a5929271ab25bce685089eb7ec564dac4b'}
{'https://github.com/aws/aws-dynamodb-encryption-java/commit/7de5f5a5929271ab25bce685089eb7ec564dac4b'}
Maven
GHSA-jmv4-73v2-pvgc
Cross-site Scripting in OpenNMS Horizon
In OpenNMS Horizon, versions opennms-1-0-stable through opennms-27.1.1; OpenNMS Meridian, versions meridian-foundation-2015.1.0-1 through meridian-foundation-2019.1.18-1; meridian-foundation-2020.1.0-1 through meridian-foundation-2020.1.6-1 are vulnerable to Stored Cross-Site Scripting since there is no validation on t...
{'CVE-2021-25929'}
2021-05-28T22:27:11Z
2021-05-25T18:46:58Z
MODERATE
null
{'CWE-79'}
{'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25929', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25929', 'https://github.com/OpenNMS/opennms/commit/66c1f626bf38a7d1a9530b4d68598269ee5245a2', 'https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c'}
null
{'https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c', 'https://github.com/OpenNMS/opennms/commit/66c1f626bf38a7d1a9530b4d68598269ee5245a2'}
{'https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c', 'https://github.com/OpenNMS/opennms/commit/66c1f626bf38a7d1a9530b4d68598269ee5245a2'}
Maven
GHSA-2wr2-8qjq-gh55
Exposure of Resource to Wrong Sphere in org.craftercms:crafter-search
Installations, where crafter-search is not protected, allow unauthenticated remote attackers to create, view, and delete search indexes.
{'CVE-2021-23264'}
2022-03-03T05:13:40.050314Z
2021-12-16T15:27:35Z
CRITICAL
null
{'CWE-402', 'CWE-668'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23264', 'https://docs.craftercms.org/en/3.1/security/advisory.html#cv-2021120107', 'https://github.com/craftercms/craftercms/commit/0e256ef0372c7be9d6e2fefc4652dd4fd94770a1'}
null
{'https://github.com/craftercms/craftercms/commit/0e256ef0372c7be9d6e2fefc4652dd4fd94770a1'}
{'https://github.com/craftercms/craftercms/commit/0e256ef0372c7be9d6e2fefc4652dd4fd94770a1'}
Maven
GHSA-3jmw-c69h-426c
Cross-Site Request Forgery (CSRF) can run untrusted code on Rundeck server
### Impact A user with `admin` access to the `system` resource type is potentially vulnerable to a CSRF attack that could cause the server to run untrusted code on all Rundeck editions. ### Patches Available in Rundeck 3.4.3 and 3.3.14 ### Workarounds Please visit [https://rundeck.com/security](https://rundeck.com...
{'CVE-2021-39133'}
2022-03-03T05:13:15.627677Z
2021-09-01T18:26:48Z
HIGH
null
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-39133', 'https://github.com/rundeck/rundeck/commit/67c4eedeaf9509fc0b255aff15977a5229ef13b9', 'https://github.com/rundeck/rundeck/security/advisories/GHSA-3jmw-c69h-426c', 'https://github.com/rundeck/rundeck'}
null
{'https://github.com/rundeck/rundeck/commit/67c4eedeaf9509fc0b255aff15977a5229ef13b9'}
{'https://github.com/rundeck/rundeck/commit/67c4eedeaf9509fc0b255aff15977a5229ef13b9'}
Maven
GHSA-x2w5-5m2g-7h5m
High severity vulnerability that affects com.fasterxml.jackson.core:jackson-databind
FasterXML jackson-databind 2.x before 2.9.7 might allow attackers to conduct external XML entity (XXE) attacks by leveraging failure to block unspecified JDK classes from polymorphic deserialization.
{'CVE-2018-14720'}
2022-03-03T05:12:53.467027Z
2019-01-04T19:09:46Z
CRITICAL
null
{'CWE-502', 'CWE-611'}
{'https://access.redhat.com/errata/RHSA-2019:1108', 'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://li...
null
{'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44'}
{'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44'}
Maven
GHSA-99wh-973f-779p
XML External Entity Reference in Hazelcast
The AbstractXmlConfigRootTagRecognizer() function makes use of SAXParser generated from a SAXParserFactory with no FEATURE_SECURE_PROCESSING set, allowing for XXE attacks.
{'CVE-2022-0265'}
2022-04-01T20:00:09.532110Z
2022-03-04T00:00:15Z
CRITICAL
null
{'CWE-611'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0265', 'https://huntr.dev/bounties/d63972a2-b910-480a-a86b-d1f75d24d563', 'https://github.com/hazelcast/hazelcast/pull/20407', 'https://github.com/hazelcast/hazelcast/', 'https://github.com/hazelcast/hazelcast/commit/4d6b666cd0291abd618c3b95cdbb51aa4208e748'}
null
{'https://github.com/hazelcast/hazelcast/commit/4d6b666cd0291abd618c3b95cdbb51aa4208e748'}
{'https://github.com/hazelcast/hazelcast/commit/4d6b666cd0291abd618c3b95cdbb51aa4208e748'}
Maven
GHSA-px9f-597f-wmcf
Uncontrolled Resource Consumption in Apache OpenMeetings server
If was found that the NetTest web service can be used to overload the bandwidth of a Apache OpenMeetings server. This issue was addressed in Apache OpenMeetings 6.0.0
{'CVE-2021-27576'}
2022-03-03T05:14:20.630197Z
2021-06-16T17:43:36Z
HIGH
null
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-27576', 'https://github.com/apache/openmeetings/commit/060a3114ad759931aeb42cd9afa9d1ebb39d3075', 'https://lists.apache.org/thread.html/r9bb615bd70a0197368f5f3ffc887162686caeb0b5fc30592a7a871e9%40%3Cuser.openmeetings.apache.org%3E', 'https://github.com/apache/openmeetings/com...
null
{'https://github.com/apache/openmeetings/commit/cbdfd2f9731a8fe3daa9b4adf5da4a063fde161d', 'https://github.com/apache/openmeetings/commit/060a3114ad759931aeb42cd9afa9d1ebb39d3075', 'https://github.com/apache/openmeetings/commit/afe26c950b127776f2dfe920abff41a584874de8'}
{'https://github.com/apache/openmeetings/commit/060a3114ad759931aeb42cd9afa9d1ebb39d3075', 'https://github.com/apache/openmeetings/commit/afe26c950b127776f2dfe920abff41a584874de8', 'https://github.com/apache/openmeetings/commit/cbdfd2f9731a8fe3daa9b4adf5da4a063fde161d'}
Maven
GHSA-q3vw-4jx3-rrr2
Validation bypass vulnerability
Back in min June a security vulnerability was reported to the team, the reason for the slow response was due to ownership of some packages was locked and we wanted to be sure to update all packages before any disclosure was released. The issue is deemed being a Low severity vulnerability. ### Impact This vulnerabili...
null
2020-09-23T17:15:43Z
2020-09-23T17:20:09Z
LOW
null
null
{'https://github.com/personnummer/java/security/advisories/GHSA-q3vw-4jx3-rrr2', 'https://github.com/personnummer/java/commit/3bad4e3354503d7cfd443257c94c41f57b3d1621'}
null
{'https://github.com/personnummer/java/commit/3bad4e3354503d7cfd443257c94c41f57b3d1621'}
{'https://github.com/personnummer/java/commit/3bad4e3354503d7cfd443257c94c41f57b3d1621'}
Maven
GHSA-cf8j-64h9-6q58
CSRF in Play Framework
In Play Framework 2.6.0 through 2.8.1, the CSRF filter can be bypassed by making CORS simple requests with content types that contain parameters that can't be parsed.
{'CVE-2020-12480'}
2022-03-03T05:12:56.329028Z
2020-08-18T17:30:25Z
MODERATE
null
{'CWE-352'}
{'https://www.playframework.com/security/vulnerability/CVE-2020-12480-CsrfBlacklistBypass', 'https://github.com/playframework/playframework/pull/10285', 'https://github.com/playframework/playframework/commit/c82de44fc50b7c58c6e0580f1f67ff08aa7bd154', 'https://github.com/playframework/playframework', 'https://www.playfr...
null
{'https://github.com/playframework/playframework/commit/c82de44fc50b7c58c6e0580f1f67ff08aa7bd154'}
{'https://github.com/playframework/playframework/commit/c82de44fc50b7c58c6e0580f1f67ff08aa7bd154'}
Maven
GHSA-743r-5g92-5vgf
Improper certificate management in AWS IoT Device SDK v2
Connections initialized by the AWS IoT Device SDK v2 for Java (versions prior to 1.4.2), Python (versions prior to 1.6.1), C++ (versions prior to 1.12.7) and Node.js (versions prior to 1.5.3) did not verify server certificate hostname during TLS handshake when overriding Certificate Authorities (CA) in their trust stor...
{'CVE-2021-40829'}
2022-03-03T05:13:12.773300Z
2021-11-24T21:11:16Z
MODERATE
null
{'CWE-295'}
{'https://github.com/aws/aws-iot-device-sdk-cpp-v2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40829', 'https://github.com/aws/aws-iot-device-sdk-js-v2', 'https://github.com/aws/aws-iot-device-sdk-java-v2/commits/v1.4.2', 'https://github.com/aws/aws-iot-device-sdk-java-v2', 'https://github.com/aws/aws-iot-device-sdk-p...
null
{'https://github.com/aws/aws-iot-device-sdk-java-v2/commits/v1.4.2'}
{'https://github.com/aws/aws-iot-device-sdk-java-v2/commits/v1.4.2'}
Maven
GHSA-pv39-qp28-4mgh
Improper Restriction of XML External Entity Reference in soa-model
Soa-model is a toolkit and Java API for WSDL, WADL and XML Schema. An XML External Entity (XXE) vulnerability exists in versions of soa-model prior to 1.6.4 in the WSDLParser function. This issue has been fixed in version 1.6.4.
{'CVE-2021-43090'}
2022-04-12T16:46:51.785543Z
2022-03-26T00:00:32Z
CRITICAL
null
{'CWE-611'}
{'https://github.com/membrane/soa-model/commit/3aa295f155f621d5ea661cb9a0604013fc8fd8ff', 'https://github.com/membrane/soa-model', 'https://github.com/membrane/soa-model/releases/tag/v1.6.4', 'https://github.com/membrane/soa-model/commit/19de16902468e7963cc4dc6b544574bc1ea3f251', 'https://github.com/membrane/soa-model/...
null
{'https://github.com/membrane/soa-model/commit/3aa295f155f621d5ea661cb9a0604013fc8fd8ff', 'https://github.com/membrane/soa-model/commit/19de16902468e7963cc4dc6b544574bc1ea3f251'}
{'https://github.com/membrane/soa-model/commit/3aa295f155f621d5ea661cb9a0604013fc8fd8ff', 'https://github.com/membrane/soa-model/commit/19de16902468e7963cc4dc6b544574bc1ea3f251'}
Maven
GHSA-6cw8-7j6c-hccp
Moderate severity vulnerability that affects io.vertx:vertx-core
In Eclipse Vert.x version 3.0 to 3.5.1, the HttpServer response headers and HttpClient request headers do not filter carriage return and line feed characters from the header value. This allow unfiltered values to inject a new header in the client request or server response.
{'CVE-2018-12537'}
2022-03-03T05:13:57.612126Z
2018-10-19T17:43:36Z
MODERATE
null
{'CWE-93'}
{'https://github.com/eclipse/vert.x/commit/1bb6445226c39a95e7d07ce3caaf56828e8aab72', 'https://github.com/eclipse/vert.x/issues/2470', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=536038', 'https://access.redhat.com/errata/RHSA-2018:3768', 'https://nvd.nist.gov/vuln/detail/CVE-2018-12537', 'https://github.com/advisor...
null
{'https://github.com/eclipse/vert.x/commit/1bb6445226c39a95e7d07ce3caaf56828e8aab72'}
{'https://github.com/eclipse/vert.x/commit/1bb6445226c39a95e7d07ce3caaf56828e8aab72'}
Maven
GHSA-6fvx-r7hx-3vh6
JavaMelody has XXE via parseSoapMethodName in bull/javamelody/PayloadNameRequestWrapper.java.
JavaMelody before 1.74.0 has XXE via parseSoapMethodName in bull/javamelody/PayloadNameRequestWrapper.java.
{'CVE-2018-15531'}
2022-04-27T14:30:08.045979Z
2018-10-17T18:28:00Z
CRITICAL
null
{'CWE-611'}
{'https://github.com/javamelody/javamelody/commit/ef111822562d0b9365bd3e671a75b65bd0613353', 'https://github.com/javamelody/javamelody', 'https://jenkins.io/security/advisory/2018-09-25/', 'https://github.com/advisories/GHSA-6fvx-r7hx-3vh6', 'https://github.com/javamelody/javamelody/wiki/ReleaseNotes', 'https://nvd.nis...
null
{'https://github.com/javamelody/javamelody/commit/ef111822562d0b9365bd3e671a75b65bd0613353'}
{'https://github.com/javamelody/javamelody/commit/ef111822562d0b9365bd3e671a75b65bd0613353'}
Maven
GHSA-rcp4-jm2v-mr3f
Cross-site scripting in Shopizer
A stored cross-site scripting (XSS) vulnerability in Shopizer before 2.17.0 allows remote attackers to inject arbitrary web script or HTML via customer_name in various forms of store administration. It is saved in the database. The code is executed for any user of store administration when information is fetched from t...
{'CVE-2021-33561'}
2022-03-03T05:12:10.220835Z
2021-06-08T23:10:24Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-33561', 'https://www.exploit-db.com/exploits/49901', 'https://github.com/shopizer-ecommerce/shopizer/compare/2.16.0...2.17.0', 'https://github.com/shopizer-ecommerce/shopizer/commit/197f8c78c8f673b957e41ca2c823afc654c19271'}
null
{'https://github.com/shopizer-ecommerce/shopizer/commit/197f8c78c8f673b957e41ca2c823afc654c19271'}
{'https://github.com/shopizer-ecommerce/shopizer/commit/197f8c78c8f673b957e41ca2c823afc654c19271'}
Maven
GHSA-269g-pwp5-87pp
TemporaryFolder on unix-like systems does not limit access to created files
### Vulnerability The JUnit4 test rule [TemporaryFolder](https://junit.org/junit4/javadoc/4.13/org/junit/rules/TemporaryFolder.html) contains a local information disclosure vulnerability. Example of vulnerable code: ```java public static class HasTempFolder { @Rule public TemporaryFolder folder = new Temporar...
{'CVE-2020-15250'}
2022-04-25T23:16:55.728890Z
2020-10-12T17:33:00Z
MODERATE
null
{'CWE-732', 'CWE-200'}
{'https://lists.debian.org/debian-lts-announce/2020/11/msg00003.html', 'https://lists.apache.org/thread.html/raebf13f53cd5d23d990712e3d11c80da9a7bae94a6284050f148ed99@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rde385b8b53ed046600ef68dd6b4528dea7566aaddb02c3e702cc28bc@%3Ccommits.creadur.apac...
null
{'https://github.com/junit-team/junit4/commit/610155b8c22138329f0723eec22521627dbc52ae'}
{'https://github.com/junit-team/junit4/commit/610155b8c22138329f0723eec22521627dbc52ae'}
Maven
GHSA-xvm2-9xvc-hx7f
Improper Restriction of XML External Entity Reference in com.monitorjbl:xlsx-streamer
### Impact Prior to xlsx-streamer 2.1.0, the XML parser that was used did not apply all the necessary settings to prevent XML Entity Expansion issues. ### Patches Upgrade to version 2.1.0. ### Workarounds No known workaround. ### References https://github.com/monitorjbl/excel-streaming-reader/commit/0749c7b9709db078...
{'CVE-2022-23640'}
2022-03-10T16:02:27.790970Z
2022-03-02T21:30:54Z
CRITICAL
null
{'CWE-611'}
{'https://github.com/monitorjbl/excel-streaming-reader/commit/0749c7b9709db078ccdeada16d46a34bc2910c73', 'https://github.com/monitorjbl/excel-streaming-reader/', 'https://github.com/monitorjbl/excel-streaming-reader/security/advisories/GHSA-xvm2-9xvc-hx7f', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23640'}
null
{'https://github.com/monitorjbl/excel-streaming-reader/commit/0749c7b9709db078ccdeada16d46a34bc2910c73'}
{'https://github.com/monitorjbl/excel-streaming-reader/commit/0749c7b9709db078ccdeada16d46a34bc2910c73'}
Maven
GHSA-p9j6-4pjr-gp48
Path Traversal in MPXJ
common/InputStreamHelper.java in Packwood MPXJ before 8.3.5 allows directory traversal in the zip stream handler flow, leading to the writing of files to arbitrary locations.
{'CVE-2020-35460'}
2022-03-03T05:14:13.356562Z
2020-12-18T18:28:23Z
MODERATE
null
{'CWE-22'}
{'http://www.mpxj.org/changes-report.html#a8.3.5', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35460', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://github.com/joniles/mpxj/commit/8eaf4225048ea5ba7e59ef4556dab2098fcc4a1d'}
null
{'https://github.com/joniles/mpxj/commit/8eaf4225048ea5ba7e59ef4556dab2098fcc4a1d'}
{'https://github.com/joniles/mpxj/commit/8eaf4225048ea5ba7e59ef4556dab2098fcc4a1d'}
Maven
GHSA-wm47-8v5p-wjpj
Possible request smuggling in HTTP/2 due missing validation
### Impact If a Content-Length header is present in the original HTTP/2 request, the field is not validated by `Http2MultiplexHandler` as it is propagated up. This is fine as long as the request is not proxied through as HTTP/1.1. If the request comes in as an HTTP/2 stream, gets converted into the HTTP/1.1 domain obj...
{'CVE-2021-21295'}
2022-04-25T20:32:04.165316Z
2021-03-09T18:49:49Z
MODERATE
null
{'CWE-444'}
{'https://lists.apache.org/thread.html/rdb4db3f5a9c478ca52a7b164680b88877a5a9c174e7047676c006b2c@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/r8bcaf7821247b1836b10f6a1a3a3212b06272fd4cde4a859de1b78cf@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/r2936730ef0...
null
{'https://github.com/netty/netty/commit/89c241e3b1795ff257af4ad6eadc616cb2fb3dc4'}
{'https://github.com/netty/netty/commit/89c241e3b1795ff257af4ad6eadc616cb2fb3dc4'}
Maven
GHSA-hpv8-9rq5-hq7w
Generated Code Contains Local Information Disclosure Vulnerability
### Impact **This vulnerability impacts generated code.** If this code was generated as a one-off occasion, not as a part of an automated CI/CD process, this code will remain vulnerable until fixed manually! On Unix-Like systems, the system temporary directory is shared between all local users. When files/directories...
{'CVE-2021-21364'}
2022-03-03T05:13:01.358387Z
2021-03-11T03:09:18Z
LOW
null
{'CWE-732', 'CWE-200', 'CWE-378'}
{'https://github.com/swagger-api/swagger-codegen/security/advisories/GHSA-hpv8-9rq5-hq7w', 'https://github.com/swagger-api/swagger-codegen/commit/35adbd552d5f99b3ff1e0e59da228becc85190f2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21364'}
null
{'https://github.com/swagger-api/swagger-codegen/commit/35adbd552d5f99b3ff1e0e59da228becc85190f2'}
{'https://github.com/swagger-api/swagger-codegen/commit/35adbd552d5f99b3ff1e0e59da228becc85190f2'}
Maven
GHSA-rpq8-mmwh-q9hm
Directory traversal in Eclipse Mojarra
Directory traversal in Eclipse Mojarra before 2.3.14 allows attackers to read arbitrary files via the loc parameter or con parameter.
{'CVE-2020-6950'}
2022-04-22T16:01:59.732772Z
2021-09-01T18:23:58Z
HIGH
null
{'CWE-22'}
{'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/eclipse-ee4j/mojarra/issues/4571', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=550943', 'https://nvd.nist.gov/vuln/detail/CVE-2020-6950', 'https://www.oracle.com/security-alerts/cp...
null
{'https://github.com/eclipse-ee4j/mojarra/commit/cefbb9447e7be560e59da2da6bd7cb93776f7741'}
{'https://github.com/eclipse-ee4j/mojarra/commit/cefbb9447e7be560e59da2da6bd7cb93776f7741'}
Maven
GHSA-4pm3-f52j-8ggh
Improper Input Validation in GeoServer
### Impact The GeoServer security mechanism can perform an unchecked JNDI lookup, which in turn can be used to perform class deserialization and result in arbitrary code execution. The same can happen while configuring data stores with data sources located in JNDI, or while setting up the disk quota mechanism. In order...
{'CVE-2022-24847'}
2022-04-22T20:39:10Z
2022-04-22T20:39:10Z
HIGH
null
{'CWE-20'}
{'https://github.com/geoserver/geoserver', 'https://github.com/geoserver/geoserver/security/advisories/GHSA-4pm3-f52j-8ggh', 'https://github.com/geoserver/geoserver/commit/b94a69943992df999d627b21a4ed056fad4569f8', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24847'}
null
{'https://github.com/geoserver/geoserver/commit/b94a69943992df999d627b21a4ed056fad4569f8'}
{'https://github.com/geoserver/geoserver/commit/b94a69943992df999d627b21a4ed056fad4569f8'}
Maven
GHSA-jvfv-hrrc-6q72
Improper Restriction of XML External Entity Reference in Liquibase
The XMLChangeLogSAXParser() function in Liquibase prior to version 4.8.0 contains an issue that may lead to to Improper Restriction of XML External Entity Reference.
{'CVE-2022-0839'}
2022-03-18T21:17:01.937148Z
2022-03-05T00:00:45Z
CRITICAL
null
{'CWE-611'}
{'https://huntr.dev/bounties/f1ae5779-b406-4594-a8a3-d089c68d6e70', 'https://github.com/liquibase/liquibase/commit/33d9d925082097fb1a3d2fc8e44423d964cd9381', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0839', 'https://github.com/liquibase/liquibase'}
null
{'https://github.com/liquibase/liquibase/commit/33d9d925082097fb1a3d2fc8e44423d964cd9381'}
{'https://github.com/liquibase/liquibase/commit/33d9d925082097fb1a3d2fc8e44423d964cd9381'}
Maven
GHSA-7qqr-3pj3-q2f5
XSS issues in the management interface
In system/workplace/ in Alkacon OpenCms 10.5.4 and 10.5.5, there are multiple Reflected and Stored XSS issues in the management interface.
{'CVE-2019-13236'}
2022-03-03T05:13:13.905651Z
2019-11-12T22:58:21Z
MODERATE
null
{'CWE-79'}
{'https://twitter.com/aetsu/status/1152096227938459648', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13236', 'https://github.com/alkacon/opencms-core/commits/branch_10_5_x', 'https://aetsu.github.io/OpenCms', 'http://packetstormsecurity.com/files/154283/Alkacon-OpenCMS-10.5.x-Cross-Site-Scripting.html'}
null
{'https://github.com/alkacon/opencms-core/commits/branch_10_5_x'}
{'https://github.com/alkacon/opencms-core/commits/branch_10_5_x'}
Maven
GHSA-rwh9-8xx8-4wfm
Cross-site Scripting in OpenCRX
In OpenCRX, versions v4.0.0 through v5.1.0 are vulnerable to reflected Cross-site Scripting (XSS), due to unsanitized parameters in the password reset functionality. This allows execution of external javascript files on any user of the openCRX instance.
{'CVE-2021-25959'}
2022-03-03T05:14:06.274512Z
2021-09-30T20:50:21Z
MODERATE
null
{'CWE-79'}
{'https://github.com/opencrx/opencrx', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25959', 'https://github.com/opencrx/opencrx/commit/14e75f95e5f56fbe7ee897bdf5d858788072e818'}
null
{'https://github.com/opencrx/opencrx/commit/14e75f95e5f56fbe7ee897bdf5d858788072e818'}
{'https://github.com/opencrx/opencrx/commit/14e75f95e5f56fbe7ee897bdf5d858788072e818'}
Maven
GHSA-q4xf-3pmq-3hw8
Improper Restriction of XML External Entity Reference in Apache NiFi
In Apache NiFi 1.0.0 to 1.11.4, the notification service manager and various policy authorizer and user group provider objects allowed trusted administrators to inadvertently configure a potentially malicious XML file. The XML file has the ability to make external calls to services (via XXE).
{'CVE-2020-13940'}
2022-03-03T05:14:17.513693Z
2022-01-06T20:41:00Z
MODERATE
null
{'CWE-611'}
{'https://nifi.apache.org/security#CVE-2020-13940', 'https://github.com/apache/nifi/commit/7f0416ee8bdcee95e28409cc6fae9c1394c2a798', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13940'}
null
{'https://github.com/apache/nifi/commit/7f0416ee8bdcee95e28409cc6fae9c1394c2a798'}
{'https://github.com/apache/nifi/commit/7f0416ee8bdcee95e28409cc6fae9c1394c2a798'}
Maven
GHSA-75vw-3m5v-fprh
corenlp is vulnerable to Improper Restriction of XML External Entity Reference
corenlp is vulnerable to Improper Restriction of XML External Entity Reference
{'CVE-2022-0239'}
2022-03-03T05:12:48.961183Z
2022-01-21T23:43:11Z
CRITICAL
null
{'CWE-611'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0239', 'https://github.com/stanfordnlp/corenlp', 'https://github.com/stanfordnlp/corenlp/commit/1940ffb938dc4f3f5bc5f2a2fd8b35aabbbae3dd', 'https://huntr.dev/bounties/a717aec2-5646-4a5f-ade0-dadc25736ae3'}
null
{'https://github.com/stanfordnlp/corenlp/commit/1940ffb938dc4f3f5bc5f2a2fd8b35aabbbae3dd'}
{'https://github.com/stanfordnlp/corenlp/commit/1940ffb938dc4f3f5bc5f2a2fd8b35aabbbae3dd'}
Maven
GHSA-grg4-wf29-r9vv
Bzip2Decoder doesn't allow setting size restrictions for decompressed data
### Impact The Bzip2 decompression decoder function doesn't allow setting size restrictions on the decompressed output data (which affects the allocation size used during decompression). All users of Bzip2Decoder are affected. The malicious input can trigger an OOME and so a DoS attack ### Workarounds No workarounds...
{'CVE-2021-37136'}
2022-04-22T15:47:10.605187Z
2021-09-09T17:11:21Z
HIGH
null
{'CWE-400'}
{'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/netty/netty/commit/41d3d61a61608f2223bb364955ab2045dd5e4020', 'https://lists.apache.org/thread.html/rfb2bf8597e53364ccab212fbcbb2a4e9f0a9e1429b1dc08023c6868e@%3Cdev.tinkerpop.apache.org%3E', 'https://lists.apache.org/thread.html/r75490c61c2c...
null
{'https://github.com/netty/netty/commit/41d3d61a61608f2223bb364955ab2045dd5e4020'}
{'https://github.com/netty/netty/commit/41d3d61a61608f2223bb364955ab2045dd5e4020'}
Maven
GHSA-fmj2-7wx8-qj4v
Server-side request forgery (SSRF) in Apache XmlGraphics Commons
Apache XmlGraphics Commons 2.4 is vulnerable to server-side request forgery, caused by improper input validation by the XMPParser. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.
{'CVE-2020-11988'}
2022-03-03T05:14:07.493019Z
2022-02-09T00:45:56Z
HIGH
null
{'CWE-20', 'CWE-918'}
{'https://github.com/apache/xmlgraphics-commons/', 'https://github.com/apache/xmlgraphics-commons/commit/57393912eb87b994c7fed39ddf30fb778a275183', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22HESSYU7T4D6GGENUVEX3X3H6FGBECH/', 'https://lists.apache.org/thread.html/r5...
null
{'https://github.com/apache/xmlgraphics-commons/commit/57393912eb87b994c7fed39ddf30fb778a275183'}
{'https://github.com/apache/xmlgraphics-commons/commit/57393912eb87b994c7fed39ddf30fb778a275183'}
Maven
GHSA-rrvx-pwf8-p59p
In Bouncy Castle JCE Provider the DSA key pair generator generates a weak private key if used with default values
In the Bouncy Castle JCE Provider version 1.55 and earlier the DSA key pair generator generates a weak private key if used with default values. If the JCA key pair generator is not explicitly initialised with DSA parameters, 1.55 and earlier generates a private value assuming a 1024 bit key size. In earlier releases th...
{'CVE-2016-1000343'}
2022-04-27T13:30:10.946799Z
2018-10-17T16:24:22Z
HIGH
null
null
{'https://github.com/advisories/GHSA-rrvx-pwf8-p59p', 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E', 'https://github.com/bcgit/bc-java', 'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://access.redhat.com/errata/RHSA-...
null
{'https://github.com/bcgit/bc-java/commit/50a53068c094d6cff37659da33c9b4505becd389#diff-5578e61500abb2b87b300d3114bdfd7d'}
{'https://github.com/bcgit/bc-java/commit/50a53068c094d6cff37659da33c9b4505becd389#diff-5578e61500abb2b87b300d3114bdfd7d'}
Maven
GHSA-76qr-mmh8-cp8f
Moderate severity vulnerability that affects com.sparkjava:spark-core
In Spark before 2.7.2, a remote attacker can read unintended static files via various representations of absolute or relative pathnames, as demonstrated by file: URLs and directory traversal sequences. NOTE: this product is unrelated to Ignite Realtime Spark.
{'CVE-2018-9159'}
2022-03-03T05:14:12.096573Z
2018-10-19T16:56:00Z
MODERATE
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-9159', 'https://access.redhat.com/errata/RHSA-2018:2405', 'https://github.com/advisories/GHSA-76qr-mmh8-cp8f', 'https://access.redhat.com/errata/RHSA-2018:2020', 'https://github.com/perwendel/spark/commit/a221a864db28eb736d36041df2fa6eb8839fc5cd', 'http://sparkjava.com/news#s...
null
{'https://github.com/perwendel/spark/commit/a221a864db28eb736d36041df2fa6eb8839fc5cd', 'https://github.com/perwendel/spark/commit/030e9d00125cbd1ad759668f85488aba1019c668', 'https://github.com/perwendel/spark/commit/ce9e11517eca69e58ed4378d1e47a02bd06863cc'}
{'https://github.com/perwendel/spark/commit/a221a864db28eb736d36041df2fa6eb8839fc5cd', 'https://github.com/perwendel/spark/commit/ce9e11517eca69e58ed4378d1e47a02bd06863cc', 'https://github.com/perwendel/spark/commit/030e9d00125cbd1ad759668f85488aba1019c668'}
Maven
GHSA-qh2g-7h5p-mxf4
Credentials bypass in Apache Druid
When LDAP authentication is enabled in Apache Druid 0.17.0, callers of Druid APIs with a valid set of LDAP credentials can bypass the credentialsValidator.userSearch filter barrier that determines if a valid LDAP user is allowed to authenticate with Druid. They are still subject to role-based authorization checks, if c...
{'CVE-2020-1958'}
2021-04-05T21:49:45Z
2022-02-09T22:05:39Z
MODERATE
null
{'CWE-200', 'CWE-74'}
{'https://github.com/apache/druid/commit/dbaabdd24710fef726c5730c609937706f456a44#diff-fab6b7a8a160a405e787690201aade5462961550c97715ab18de6ad07a3edf7e', 'https://lists.apache.org/thread.html/rf70876ecafb45b314eff9d040c5281c4adb0cb7771eb029448cfb79b@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r1c3...
null
{'https://github.com/apache/druid/commit/dbaabdd24710fef726c5730c609937706f456a44#diff-fab6b7a8a160a405e787690201aade5462961550c97715ab18de6ad07a3edf7e'}
{'https://github.com/apache/druid/commit/dbaabdd24710fef726c5730c609937706f456a44#diff-fab6b7a8a160a405e787690201aade5462961550c97715ab18de6ad07a3edf7e'}
Maven
GHSA-qjw2-hr98-qgfh
Unsafe Deserialization in jackson-databind
FasterXML jackson-databind 2.x before 2.6.7.5 and from 2.7.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to com.pastdev.httpcomponents.configuration.JndiConfiguration.
{'CVE-2020-24750'}
2022-04-26T21:00:22.723871Z
2021-12-09T19:15:36Z
HIGH
null
{'CWE-502'}
{'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://security.netapp.com/advisory/ntap-20201009-0003/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-24750', 'https://github.com/FasterXML/jackson-databind/issues/2798', 'https://github.com...
null
{'https://github.com/FasterXML/jackson-databind/commit/2118e71325486c68f089a9761c9d8a11b4ddd1cb', 'https://github.com/FasterXML/jackson-databind/commit/ad5a630174f08d279504bc51ebba8772fd71b86b'}
{'https://github.com/FasterXML/jackson-databind/commit/2118e71325486c68f089a9761c9d8a11b4ddd1cb', 'https://github.com/FasterXML/jackson-databind/commit/ad5a630174f08d279504bc51ebba8772fd71b86b'}
Maven
GHSA-gq67-pp9w-43gp
Cryptographically weak CSRF tokens in Apache MyFaces
In the default configuration, Apache MyFaces Core versions 2.2.0 to 2.2.13, 2.3.0 to 2.3.7, 2.3-next-M1 to 2.3-next-M4, and 3.0.0-RC1 use cryptographically weak implicit and explicit cross-site request forgery (CSRF) tokens. Due to that limitation, it is possible (although difficult) for an attacker to calculate a futu...
{'CVE-2021-26296'}
2022-03-03T05:12:05.891893Z
2021-06-16T17:31:39Z
HIGH
null
{'CWE-330', 'CWE-352'}
{'https://security.netapp.com/advisory/ntap-20210528-0007/', 'https://lists.apache.org/thread.html/r2b73e2356c6155e9ec78fdd8f72a4fac12f3e588014f5f535106ed9b%40%3Cannounce.apache.org%3E', 'https://github.com/apache/myfaces/commit/cc6e1cc7b9aa17e52452f7f2657b3af9c421b2b2', 'https://issues.apache.org/jira/browse/MYFACES-4...
null
{'https://github.com/apache/myfaces/commit/cc6e1cc7b9aa17e52452f7f2657b3af9c421b2b2'}
{'https://github.com/apache/myfaces/commit/cc6e1cc7b9aa17e52452f7f2657b3af9c421b2b2'}
Maven
GHSA-v84g-cf5j-xjqx
Path Traversal in Apache James Server
Apache James Server prior to version 3.6.2 contains a path traversal vulnerability. The fix for CVE-2021-40525 does not prepend delimiters upon valid directory validations. Affected implementations include: - maildir mailbox store - Sieve file repository This enables a user to access other users data stores (limited to...
{'CVE-2022-22931'}
2022-03-03T05:13:36.937321Z
2022-02-08T00:00:34Z
MODERATE
null
{'CWE-22'}
{'https://github.com/apache/james-project/pull/877/commits/b1e891a9e5eeadfa1d779ae50f21c73efe4d2fc7', 'https://lists.apache.org/thread/bp8yql4wws56jlh0vxoowj7foothsmpr', 'https://github.com/apache/james-project', 'https://www.openwall.com/lists/oss-security/2022/02/07/1', 'https://github.com/apache/james-project/pull/8...
null
{'https://github.com/apache/james-project/pull/877/commits/b1e891a9e5eeadfa1d779ae50f21c73efe4d2fc7'}
{'https://github.com/apache/james-project/pull/877/commits/b1e891a9e5eeadfa1d779ae50f21c73efe4d2fc7'}
Maven
GHSA-6wqp-v4v6-c87c
Deserialization of Untrusted Data
An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a specific property), the service has the Oracle JDBC jar in the classpath, and an attacker can provide an LDAP service to access, it is possible to make the service execut...
{'CVE-2018-12023'}
2022-03-03T05:12:41.002423Z
2020-06-15T18:44:51Z
HIGH
null
{'CWE-502'}
{'https://access.redhat.com/errata/RHSA-2019:1108', 'https://access.redhat.com/errata/RHSA-2019:3140', 'https://nvd.nist.gov/vuln/detail/CVE-2018-12023', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://access.redhat.com/errata/RHSA-2019:2804', 'https://github.com/FasterXML/jacks...
null
{'https://github.com/FasterXML/jackson-databind/commit/28badf7ef60ac3e7ef151cd8e8ec010b8479226a'}
{'https://github.com/FasterXML/jackson-databind/commit/28badf7ef60ac3e7ef151cd8e8ec010b8479226a'}
Maven
GHSA-v6wr-fch2-vm5w
Moderate severity vulnerability that affects com.orientechnologies:orientdb-studio
server/network/protocol/http/OHttpSessionManager.java in the Studio component in OrientDB Server Community Edition before 2.0.15 and 2.1.x before 2.1.1 improperly relies on the java.util.Random class for generation of random Session ID values, which makes it easier for remote attackers to predict a value by determining...
{'CVE-2015-2913'}
2021-09-20T15:49:26Z
2018-10-18T17:41:27Z
MODERATE
null
{'CWE-200'}
{'https://github.com/orientechnologies/orientdb', 'https://www.kb.cert.org/vuls/id/845332', 'https://github.com/advisories/GHSA-v6wr-fch2-vm5w', 'https://github.com/orientechnologies/orientdb/commit/668ece96be210e742a4e2820a3085b215cf55104', 'https://nvd.nist.gov/vuln/detail/CVE-2015-2913'}
null
{'https://github.com/orientechnologies/orientdb/commit/668ece96be210e742a4e2820a3085b215cf55104'}
{'https://github.com/orientechnologies/orientdb/commit/668ece96be210e742a4e2820a3085b215cf55104'}
Maven
GHSA-9959-6p3m-wxpc
Denial of service in Netty
The SslHandler in Netty before 3.9.2 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted SSLv2Hello message.
{'CVE-2014-3488'}
2021-09-22T18:44:46Z
2020-06-30T21:01:31Z
MODERATE
null
{'CWE-119'}
{'https://github.com/netty/netty/commit/2fa9400a59d0563a66908aba55c41e7285a04994', 'https://snyk.io/vuln/SNYK-JAVA-ORGJBOSSNETTY-31630', 'https://github.com/netty/netty', 'http://secunia.com/advisories/59196', 'http://netty.io/news/2014/06/11/3-9-2-Final.html', 'https://nvd.nist.gov/vuln/detail/CVE-2014-3488', 'https:/...
null
{'https://github.com/netty/netty/commit/2fa9400a59d0563a66908aba55c41e7285a04994'}
{'https://github.com/netty/netty/commit/2fa9400a59d0563a66908aba55c41e7285a04994'}
Maven
GHSA-pq4w-qm9g-qx68
Insufficient Nonce Validation in Eclipse Milo Client
### Impact Credential replay affecting those connected to a server when *all 3* of the following conditions are met: - `SecurityPolicy` is `None` - using username/password or X509-based authentication - the server has a defect causing it to send null/empty or zeroed nonces ### Patches The problem has been patched in ...
{'CVE-2019-19135'}
2022-03-03T05:14:20.050313Z
2020-03-16T22:46:50Z
HIGH
null
{'CWE-330', 'CWE-522'}
{'https://opcfoundation.org/security-bulletins/', 'https://github.com/eclipse/milo/commit/cac0e710bf2b8bed9c602fc597e9de1d8903abed', 'https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2019-19135.pdf', 'https://github.com/eclipse/milo/security/advisories/GHSA-pq4w-qm9g-qx68', 'http...
null
{'https://github.com/eclipse/milo/commit/cac0e710bf2b8bed9c602fc597e9de1d8903abed'}
{'https://github.com/eclipse/milo/commit/cac0e710bf2b8bed9c602fc597e9de1d8903abed'}
Maven
GHSA-c8xf-m4ff-jcxj
Moderate severity vulnerability that affects org.bouncycastle:bcprov-jdk14 and org.bouncycastle:bcprov-jdk15
In the Bouncy Castle JCE Provider version 1.55 and earlier the primary engine class used for AES was AESFastEngine. Due to the highly table driven approach used in the algorithm it turns out that if the data channel on the CPU can be monitored the lookup table accesses are sufficient to leak information on the AES key ...
{'CVE-2016-1000339'}
2022-03-03T05:13:14.245841Z
2018-10-17T16:23:38Z
MODERATE
null
null
{'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://access.redhat.com/errata/RHSA-2018:2927', 'https://github.com/bcgit/bc-java/commit/8a73f08931450c17c749af067b6a8185abdfd2c0#diff-494fb066bed02aeb76b6c005632943f2', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://github.com/advisori...
null
{'https://github.com/bcgit/bc-java/commit/413b42f4d770456508585c830cfcde95f9b0e93b#diff-54656f860db94b867ba7542430cd2ef0', 'https://github.com/bcgit/bc-java/commit/8a73f08931450c17c749af067b6a8185abdfd2c0#diff-494fb066bed02aeb76b6c005632943f2'}
{'https://github.com/bcgit/bc-java/commit/8a73f08931450c17c749af067b6a8185abdfd2c0#diff-494fb066bed02aeb76b6c005632943f2', 'https://github.com/bcgit/bc-java/commit/413b42f4d770456508585c830cfcde95f9b0e93b#diff-54656f860db94b867ba7542430cd2ef0'}
Maven
GHSA-g5wh-fw4m-2v28
CSRF vulnerability in Jenkins autonomiq plugin
A cross-site request forgery (CSRF) vulnerability in Jenkins autonomiq Plugin 1.15 and earlier allows attackers to connect to an attacker-specified URL server using attacker-specified credentials.
{'CVE-2022-25194'}
2022-05-04T20:57:40Z
2022-02-16T00:01:23Z
HIGH
null
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-25194', 'https://github.com/jenkinsci/autonomiq-plugin', 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2545', 'https://github.com/jenkinsci/autonomiq-plugin/commit/e06b1ff67664a90819c9561bbc12f4c6e593d1dc'}
null
{'https://github.com/jenkinsci/autonomiq-plugin/commit/e06b1ff67664a90819c9561bbc12f4c6e593d1dc'}
{'https://github.com/jenkinsci/autonomiq-plugin/commit/e06b1ff67664a90819c9561bbc12f4c6e593d1dc'}
Maven
GHSA-59g9-7gfx-c72p
Infinite loop in Tomcat due to parsing error
Apache Tomcat 8.5.0 to 8.5.63, 9.0.0-M1 to 9.0.43 and 10.0.0-M1 to 10.0.2 did not properly validate incoming TLS packets. When Tomcat was configured to use NIO+OpenSSL or NIO2+OpenSSL for TLS, a specially crafted packet could be used to trigger an infinite loop resulting in a denial of service.
{'CVE-2021-41079'}
2022-03-03T05:12:12.505852Z
2021-09-20T20:45:44Z
HIGH
null
{'CWE-20'}
{'https://www.debian.org/security/2021/dsa-4986', 'https://lists.debian.org/debian-lts-announce/2021/09/msg00012.html', 'https://security.netapp.com/advisory/ntap-20211008-0005/', 'https://lists.apache.org/thread.html/rb4de81ac647043541a32881099aa6eb5a23f1b7fd116f713f8ab9dbe@%3Cdev.tomcat.apache.org%3E', 'https://lists...
null
{'https://github.com/apache/tomcat/commit/34115fb3c83f6cd97772232316a492a4cc5729e0'}
{'https://github.com/apache/tomcat/commit/34115fb3c83f6cd97772232316a492a4cc5729e0'}
Maven
GHSA-xwgq-pcqx-hpmv
URL Redirection to Untrusted Site (Open Redirect) in Ktor
In Ktor through 1.2.6, the client resends data from the HTTP Authorization header to a redirect location.
{'CVE-2019-19703'}
2022-03-03T05:13:14.265291Z
2020-02-12T18:45:50Z
MODERATE
null
{'CWE-601'}
{'https://github.com/ktorio/ktor/commit/0c108156f45423d09014b47be810188629cb878f', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19703', 'https://github.com/ktorio/ktor/issues/1467'}
null
{'https://github.com/ktorio/ktor/commit/0c108156f45423d09014b47be810188629cb878f'}
{'https://github.com/ktorio/ktor/commit/0c108156f45423d09014b47be810188629cb878f'}
Maven
GHSA-rcj2-vvjx-87pm
Missing Encryption of Sensitive Data in arrow-kt Arrow
arrow-kt Arrow before 0.9.0 resolved Gradle build artifacts (for compiling and building the published JARs) over HTTP instead of HTTPS. Any of these dependent artifacts could have been maliciously compromised by an MITM attack.
{'CVE-2019-11404'}
2022-03-03T05:13:24.756571Z
2019-04-22T17:15:40Z
MODERATE
null
{'CWE-311'}
{'https://github.com/arrow-kt/ank/issues/35', 'https://github.com/arrow-kt/arrow/releases/tag/0.9.0', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11404', 'https://github.com/arrow-kt/ank/pull/36', 'https://github.com/arrow-kt/arrow/issues/1310', 'https://github.com/arrow-kt/arrow/commit/74198dab522393487d5344f194dc21208...
null
{'https://github.com/arrow-kt/arrow/commit/74198dab522393487d5344f194dc21208ab71ae8'}
{'https://github.com/arrow-kt/arrow/commit/74198dab522393487d5344f194dc21208ab71ae8'}
Maven
GHSA-xwx6-vmj4-5rv8
Denial of service via deserialization attack in nifi
A vulnerability found in Apache NIFI before 1.5.0-RC1. Attacker can perform XXE attacks through JAXB.
{'CVE-2017-15703'}
2022-03-03T05:12:27.401653Z
2019-10-25T19:42:50Z
MODERATE
null
{'CWE-502'}
{'https://github.com/apache/nifi/commit/9e2c7be7d3c6a380c5f61074d9a5a690b617c3dc'}
null
{'https://github.com/apache/nifi/commit/9e2c7be7d3c6a380c5f61074d9a5a690b617c3dc'}
{'https://github.com/apache/nifi/commit/9e2c7be7d3c6a380c5f61074d9a5a690b617c3dc'}
Maven
GHSA-2p6p-v69p-9mm9
XSS in login form
In the Alkacon OpenCms Apollo Template 10.5.4 and 10.5.5, there is XSS in the Login form.
{'CVE-2019-13235'}
2022-03-03T05:13:44.173532Z
2019-11-12T22:58:16Z
MODERATE
null
{'CWE-79'}
{'https://aetsu.github.io/OpenCms', 'https://github.com/alkacon/apollo-template/commits/branch_10_5_x', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13235', 'http://packetstormsecurity.com/files/154298/Alkacon-OpenCMS-10.5.x-Cross-Site-Scripting.html'}
null
{'https://github.com/alkacon/apollo-template/commits/branch_10_5_x'}
{'https://github.com/alkacon/apollo-template/commits/branch_10_5_x'}
Maven
GHSA-xpmx-h7xq-xffh
Potential access control security issue in apollo-adminservice
### Impact If users expose apollo-adminservice to internet(which is not recommended), there are potential security issues since apollo-adminservice is designed to work in intranet and it doesn't have built-in access control. Malicious hackers may access apollo-adminservice apis directly to access/edit the application's...
{'CVE-2020-15170'}
2022-03-03T05:13:32.189742Z
2020-10-02T16:33:41Z
HIGH
null
{'CWE-20'}
{'https://github.com/ctripcorp/apollo/pull/3233/commits/ae9ba6cfd32ed80469f162e5e3583e2477862ddf', 'https://github.com/ctripcorp/apollo', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15170', 'https://github.com/ctripcorp/apollo/security/advisories/GHSA-xpmx-h7xq-xffh'}
null
{'https://github.com/ctripcorp/apollo/pull/3233/commits/ae9ba6cfd32ed80469f162e5e3583e2477862ddf'}
{'https://github.com/ctripcorp/apollo/pull/3233/commits/ae9ba6cfd32ed80469f162e5e3583e2477862ddf'}
Maven
GHSA-4jf5-jggp-g56j
Cross-Site Request Forgery in com.softwaremill.akka-http-session:core_2.12
This affects the package com.softwaremill.akka-http-session:core_2.12 from 0 and before 0.6.1; all versions of package com.softwaremill.akka-http-session:core_2.11; the package com.softwaremill.akka-http-session:core_2.13 from 0 and before 0.6.1. CSRF protection can be bypassed by forging a request that contains the sa...
{'CVE-2020-28452'}
2022-03-03T05:13:48.743049Z
2022-01-06T20:23:05Z
HIGH
null
{'CWE-352'}
{'https://github.com/softwaremill/akka-http-session/pull/79', 'https://github.com/softwaremill/akka-http-session/issues/77', 'https://snyk.io/vuln/SNYK-JAVA-COMSOFTWAREMILLAKKAHTTPSESSION-1046674', 'https://snyk.io/vuln/SNYK-JAVA-COMSOFTWAREMILLAKKAHTTPSESSION-1058933', 'https://snyk.io/vuln/SNYK-JAVA-COMSOFTWAREMILLAK...
null
{'https://github.com/softwaremill/akka-http-session/commit/8725dccfc3143ac52304a51f4bbfda119d5ba3a1'}
{'https://github.com/softwaremill/akka-http-session/commit/8725dccfc3143ac52304a51f4bbfda119d5ba3a1'}
Maven
GHSA-94qw-r73x-j7hg
Users with ROLE_COURSE_ADMIN can create new users in Opencast
### Impact Users with the role `ROLE_COURSE_ADMIN` can use the user-utils endpoint to create new users not including the role `ROLE_ADMIN`. For example: ```bash # Use the admin to create a new user with ROLE_COURSE_ADMIN using the admin user. # We expect this to work. % curl -i -u admin:opencast 'https://example.open...
{'CVE-2020-5231'}
2022-03-03T05:14:18.353152Z
2020-01-30T21:21:37Z
MODERATE
null
{'CWE-285'}
{'https://github.com/opencast/opencast/security/advisories/GHSA-94qw-r73x-j7hg', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5231', 'https://github.com/opencast/opencast/commit/72fad0031d8a82c860e2bde0b27570c5042320ee'}
null
{'https://github.com/opencast/opencast/commit/72fad0031d8a82c860e2bde0b27570c5042320ee'}
{'https://github.com/opencast/opencast/commit/72fad0031d8a82c860e2bde0b27570c5042320ee'}
Maven
GHSA-pfj3-56hm-jwq5
Template injection in cron-utils
### Impact A Template Injection was identified in cron-utils enabling attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. Versions up to 9.1.2 are susceptible to this vulnerability. Please note, that only projects using the @Cron annotation to validat...
{'CVE-2020-26238'}
2022-03-03T05:14:02.872232Z
2020-11-24T23:48:38Z
CRITICAL
null
{'CWE-74'}
{'https://lists.apache.org/thread.html/r390bb7630b7ea8f02bf7adbbe69c0ae8b562c527d663c543d965f959@%3Cgitbox.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r432a69a1a85cbcb1f1bad2aa0fbfce0367bf894bf917f6ed7118e7f0@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r737406bc17d49ffe8fe6a8828d...
null
{'https://github.com/jmrozanec/cron-utils/commit/4cf373f7352f5d95f0bf6512af8af326b31c835e'}
{'https://github.com/jmrozanec/cron-utils/commit/4cf373f7352f5d95f0bf6512af8af326b31c835e'}
Maven
GHSA-rhcw-wjcm-9h6g
Denial of service in Undertow
A flaw was found in the Undertow AJP connector. Malicious requests and abrupt connection closes could be triggered by an attacker using query strings with non-RFC compliant characters resulting in a denial of service. The highest threat from this vulnerability is to system availability. This affects Undertow 2.1.5.SP1,...
{'CVE-2020-27782'}
2022-03-03T05:13:40.690161Z
2022-02-09T00:54:12Z
HIGH
null
{'CWE-400'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=1901304', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27782', 'https://issues.redhat.com/browse/UNDERTOW-1813', 'https://github.com/undertow-io/undertow/pull/997/commits/98a9ab7f2d7fe7a7254eaf17d47816c452169c90'}
null
{'https://github.com/undertow-io/undertow/pull/997/commits/98a9ab7f2d7fe7a7254eaf17d47816c452169c90'}
{'https://github.com/undertow-io/undertow/pull/997/commits/98a9ab7f2d7fe7a7254eaf17d47816c452169c90'}
Maven
GHSA-3mcp-9wr4-cjqf
Remote Code Execution (RCE) vulnerability in dropwizard-validation
Dropwizard-Validation before 1.3.19, and 2.0.2 may allow arbitrary code execution on the host system, with the privileges of the Dropwizard service account, by injecting arbitrary Java Expression Language expressions when using the self-validating feature. ### Summary A server-side template injection was identified i...
{'CVE-2020-5245'}
2022-04-25T23:17:01.669512Z
2020-02-24T17:27:27Z
HIGH
null
{'CWE-74'}
{'https://github.com/dropwizard/dropwizard/commit/d87d1e4f8e20f6494c0232bf8560c961b46db634', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://beanvalidation.org/2.0/spec/#validationapi-message-defaultmessageinterpolation', 'https://github.com/dropwizard/dropwizard/pull/3160', 'https://nvd.nist.gov/vul...
null
{'https://github.com/dropwizard/dropwizard/commit/d87d1e4f8e20f6494c0232bf8560c961b46db634'}
{'https://github.com/dropwizard/dropwizard/commit/d87d1e4f8e20f6494c0232bf8560c961b46db634'}
Maven
GHSA-7qx4-pp76-vrqh
Remote code execution in Apache Commons Configuration
Apache Commons Configuration uses a third-party library to parse YAML files which by default allows the instantiation of classes if the YAML includes special statements. Apache Commons Configuration versions 2.2, 2.3, 2.4, 2.5, 2.6 did not change the default settings of this library. So if a YAML file was loaded from a...
{'CVE-2020-1953'}
2022-03-03T05:13:45.634364Z
2020-05-21T19:08:08Z
CRITICAL
null
{'CWE-20'}
{'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/rde2186ad6ac0d6ed8d51af7509244adcf1ce0f9a3b7e1d1dd3b64676@%3Ccommits.camel.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1953', 'https://github.com/apache/commons-configuration/commit/add7375cf37fd316d4838c6c56...
null
{'https://github.com/apache/commons-configuration/commit/add7375cf37fd316d4838c6c56b054fc293b4641'}
{'https://github.com/apache/commons-configuration/commit/add7375cf37fd316d4838c6c56b054fc293b4641'}
Maven
GHSA-9gwx-9cwp-5c2m
Billion laughs attack (XML bomb)
### Impact Opencast is vulnerable to the [Billion laughs attack](https://en.wikipedia.org/wiki/Billion_laughs_attack) which allows an attacker to easily execute a (seemingly permanent) denial of service attack, essentially taking down Opencast using a single HTTP request. Consider an XML file (`createMediaPackage.xm...
{'CVE-2021-32623'}
2022-03-03T05:13:31.179791Z
2021-06-17T20:11:35Z
HIGH
null
{'CWE-776'}
{'https://github.com/opencast/opencast/commit/8ae27da5a6f658011a5741b3210e715b0dc6213e', 'https://github.com/opencast/opencast', 'https://github.com/opencast/opencast/commit/16b0d641713fe31b8518fcf14fc5e4e815d81206', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32623', 'https://github.com/opencast/opencast/security/advis...
null
{'https://github.com/opencast/opencast/commit/8ae27da5a6f658011a5741b3210e715b0dc6213e', 'https://github.com/opencast/opencast/commit/16b0d641713fe31b8518fcf14fc5e4e815d81206'}
{'https://github.com/opencast/opencast/commit/8ae27da5a6f658011a5741b3210e715b0dc6213e', 'https://github.com/opencast/opencast/commit/16b0d641713fe31b8518fcf14fc5e4e815d81206'}
Maven
GHSA-2cfc-865j-gm4w
XML External Entity Reference in detekt
Improper Restriction of XML External Entity Reference in GitHub repository detekt/detekt prior to 1.20.0.
{'CVE-2022-0272'}
2022-04-26T13:15:13.219611Z
2022-04-22T00:00:36Z
HIGH
null
{'CWE-611'}
{'https://github.com/detekt/detekt/commit/c965a8d2a6bbdb9bcfc6acfa7bbffd3da81f5395', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0272', 'https://github.com/detekt/detekt', 'https://huntr.dev/bounties/23e37ba7-96d5-4037-a90a-8c8f4a70ce44'}
null
{'https://github.com/detekt/detekt/commit/c965a8d2a6bbdb9bcfc6acfa7bbffd3da81f5395'}
{'https://github.com/detekt/detekt/commit/c965a8d2a6bbdb9bcfc6acfa7bbffd3da81f5395'}
Maven
GHSA-6jmm-mp6w-4rrg
OutOfMemory Exception by specifically crafted processing instruction in NekoHtml Parser
### Impact NekoHtml Parser suffers from a denial of service vulnerability on versions 2.60.0 and below. A specifically crafted input regarding the parsing of processing instructions leads to heap memory consumption. Please update to version 2.61.0. ### For more information If you have any questions or comments about t...
{'CVE-2022-29546'}
2022-05-02T20:06:31.677428Z
2022-04-26T21:14:57Z
MODERATE
null
{'CWE-400'}
{'https://github.com/HtmlUnit/htmlunit-neko/commit/9d2aecd69223469e40c12ca3edddda09009110cc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-29546', 'https://github.com/HtmlUnit/htmlunit-neko', 'https://github.com/HtmlUnit/htmlunit-neko/security/advisories/GHSA-6jmm-mp6w-4rrg'}
null
{'https://github.com/HtmlUnit/htmlunit-neko/commit/9d2aecd69223469e40c12ca3edddda09009110cc'}
{'https://github.com/HtmlUnit/htmlunit-neko/commit/9d2aecd69223469e40c12ca3edddda09009110cc'}
Maven
GHSA-gprm-xqrc-c2j3
Command Injection in Kylin
Kylin has some restful apis which will concatenate os command with the user input string, a user is likely to be able to execute any os command without any protection or validation.
{'CVE-2020-1956'}
2022-03-03T05:13:34.310834Z
2020-07-27T22:51:44Z
HIGH
null
{'CWE-78'}
{'https://lists.apache.org/thread.html/r250a867961cfd6e0506240a9c7eaee782d84c6ab0091c7c4bc45f3eb@%3Cuser.kylin.apache.org%3E', 'https://lists.apache.org/thread.html/r61666760d8a4e8764b2d5fe158d8a48b569414480fbfadede574cdc0@%3Ccommits.kylin.apache.org%3E', 'https://github.com/apache/kylin', 'https://snyk.io/vuln/SNYK-JA...
null
{'https://github.com/apache/kylin/commit/58fad56ac6aaa43c6bd8f962d7f2d84438664092'}
{'https://github.com/apache/kylin/commit/58fad56ac6aaa43c6bd8f962d7f2d84438664092'}
Maven
GHSA-px4w-rcv2-6x8x
Arbitrary code execution in Apache ServiceComb java-chassis
When handler-router component is enabled in servicecomb-java-chassis, authenticated user may inject some data and cause arbitrary code execution. The problem happens in versions between 2.0.0 ~ 2.1.3 and fixed in Apache ServiceComb-Java-Chassis 2.1.5
{'CVE-2020-17532'}
2022-03-03T05:13:16.049601Z
2022-02-09T22:19:00Z
HIGH
null
{'CWE-502'}
{'https://seclists.org/oss-sec/2021/q1/60', 'https://issues.apache.org/jira/browse/SCB-2145', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17532', 'https://github.com/apache/servicecomb-java-chassis/commit/839a52e27c754cb5ce14f20063902f21065bd26c', 'https://github.com/apache/servicecomb-java-chassis/commit/ba4fb37b6ab8bd...
null
{'https://github.com/apache/servicecomb-java-chassis/commit/839a52e27c754cb5ce14f20063902f21065bd26c', 'https://github.com/apache/servicecomb-java-chassis/commit/ba4fb37b6ab8bd3a6c3d0693f295d99a94879838'}
{'https://github.com/apache/servicecomb-java-chassis/commit/839a52e27c754cb5ce14f20063902f21065bd26c', 'https://github.com/apache/servicecomb-java-chassis/commit/ba4fb37b6ab8bd3a6c3d0693f295d99a94879838'}
Maven
GHSA-px9h-x66r-8mpc
path traversal in Jooby
### Impact Access to sensitive information available from classpath. ### Patches Patched version: 1.6.7 and 2.8.2 Commit 1.x: https://github.com/jooby-project/jooby/commit/34f526028e6cd0652125baa33936ffb6a8a4a009 Commit 2.x: https://github.com/jooby-project/jooby/commit/c81479de67036993f406ccdec23990b44b0bec32 ###...
{'CVE-2020-7647'}
2022-03-03T05:13:34.682100Z
2020-05-13T16:29:26Z
MODERATE
null
{'CWE-22'}
{'https://snyk.io/vuln/SNYK-JAVA-IOJOOBY-568806', 'https://snyk.io/vuln/SNYK-JAVA-ORGJOOBY-568807,', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7647', 'https://github.com/jooby-project/jooby/security/advisories/GHSA-px9h-x66r-8mpc', 'https://snyk.io/vuln/SNYK-JAVA-ORGJOOBY-568807', 'https://github.com/jooby-project/joo...
null
{'https://github.com/jooby-project/jooby/commit/34f526028e6cd0652125baa33936ffb6a8a4a009'}
{'https://github.com/jooby-project/jooby/commit/34f526028e6cd0652125baa33936ffb6a8a4a009'}
Maven
GHSA-jp55-vvmf-63mv
URL Redirection to Untrusted Site ('Open Redirect')
### Impact There's no protection against URL redirection to untrusted site, in particular some well known parameters (xredirect) can be used to perform such redirections. ### Patches The problem has been patched in XWiki 12.10.7 and XWiki 13.3RC1. ### Workarounds There's no known workaround for this issue. ### Refe...
{'CVE-2022-23618'}
2022-02-09T21:42:47Z
2022-02-09T21:42:47Z
MODERATE
null
{'CWE-601'}
{'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-jp55-vvmf-63mv', 'https://github.com/xwiki/xwiki-platform/commit/5251c02080466bf9fb55288f04a37671108f8096', 'https://github.com/xwiki/xwiki-platform', 'https://jira.xwiki.org/browse/XWIKI-10309', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23618'}
null
{'https://github.com/xwiki/xwiki-platform/commit/5251c02080466bf9fb55288f04a37671108f8096'}
{'https://github.com/xwiki/xwiki-platform/commit/5251c02080466bf9fb55288f04a37671108f8096'}
Maven
GHSA-mc6h-4qgp-37qh
Deserialization of untrusted data in Jackson Databind
FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to org.jsecurity.realm.jndi.JndiRealmFactory (aka org.jsecurity).
{'CVE-2020-14195'}
2022-03-03T05:12:46.699406Z
2020-06-18T14:44:43Z
HIGH
null
{'CWE-502'}
{'https://github.com/FasterXML/jackson-databind/issues/2765', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14195', 'https://lists.debian.org/debian-lts-announce/2020/07/msg00001.html', 'https://github.com/FasterXML/jackson-databind', 'https://security.netapp.com/advisory/ntap-20200702-0003/', 'https://github.com/FasterXM...
null
{'https://github.com/FasterXML/jackson-databind/commit/f6d9c664f6d481703138319f6a0f1fdbddb3a259'}
{'https://github.com/FasterXML/jackson-databind/commit/f6d9c664f6d481703138319f6a0f1fdbddb3a259'}