ecosystem stringclasses 11
values | vuln_id stringlengths 10 19 | summary stringlengths 4 220 ⌀ | details stringlengths 34 13.5k | aliases stringlengths 17 87 ⌀ | modified_date stringdate 2019-03-26 14:13:00 2022-05-10 08:46:52 | published_date stringdate 2012-06-17 03:41:00 2022-05-10 08:46:50 | severity stringclasses 5
values | score float64 0 10 ⌀ | cwe_id stringclasses 581
values | refs stringlengths 82 11.6k | introduced stringclasses 843
values | code_refs stringlengths 46 940 | commits stringlengths 46 940 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Maven | GHSA-q448-6c3m-cxmj | Cross-site Scripting in jeecg-boot | jeecg-boot is a code generator. A Cross Site Scripting (XSS) vulnerabilitiy exists in jeecg-boot 3.0 in /jeecg-boot/jmreport/view with a mouseover event. | {'CVE-2021-44585'} | 2022-03-28T14:45:07.274896Z | 2022-03-11T00:01:59Z | MODERATE | null | {'CWE-79'} | {'https://github.com/jeecgboot/jeecg-boot', 'https://github.com/jeecgboot/jeecg-boot/commit/dbba190980fe44ab5377703dc1a9487806ee2a91', 'https://github.com/jeecgboot/jeecg-boot/issues/3223', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44585'} | null | {'https://github.com/jeecgboot/jeecg-boot/commit/dbba190980fe44ab5377703dc1a9487806ee2a91'} | {'https://github.com/jeecgboot/jeecg-boot/commit/dbba190980fe44ab5377703dc1a9487806ee2a91'} |
Maven | GHSA-q4rf-3fhx-88pf | YAML deserialization can run untrusted code | ### Impact
An authorized user can upload a zip-format plugin with a crafted plugin.yaml, or a crafted aclpolicy yaml file, or upload an untrusted project archive with a crafted aclpolicy yaml file, that can cause the server to run untrusted code on Rundeck Community or Enterprise Edition. An authenticated user can ma... | {'CVE-2021-39132'} | 2022-03-03T05:13:37.221339Z | 2021-09-01T18:27:01Z | MODERATE | null | {'CWE-502'} | {'https://github.com/rundeck/rundeck/security/advisories/GHSA-q4rf-3fhx-88pf', 'https://github.com/rundeck/rundeck/commit/850d12e21d22833bc148b7f458d7cb5949f829b6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39132', 'https://github.com/rundeck/rundeck'} | null | {'https://github.com/rundeck/rundeck/commit/850d12e21d22833bc148b7f458d7cb5949f829b6'} | {'https://github.com/rundeck/rundeck/commit/850d12e21d22833bc148b7f458d7cb5949f829b6'} |
Maven | GHSA-m6cj-93v6-cvr5 | Infinite loop in junrar | ### Impact
A carefully crafted RAR archive can trigger an infinite loop while extracting said archive. The impact depends solely on how the application uses the library, and whether files can be provided by malignant users.
### Patches
The problem is partially patched in 7.4.1
### Workarounds
None
### References
h... | {'CVE-2022-23596'} | 2022-04-19T18:00:13.490422Z | 2022-02-01T00:47:23Z | HIGH | null | {'CWE-400', 'CWE-835'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-23596', 'https://github.com/junrar/junrar/commit/7b16b3d90b91445fd6af0adfed22c07413d4fab7', 'https://github.com/junrar/junrar/issues/73', 'https://github.com/junrar/junrar', 'https://github.com/junrar/junrar/security/advisories/GHSA-m6cj-93v6-cvr5'} | null | {'https://github.com/junrar/junrar/commit/7b16b3d90b91445fd6af0adfed22c07413d4fab7'} | {'https://github.com/junrar/junrar/commit/7b16b3d90b91445fd6af0adfed22c07413d4fab7'} |
Maven | GHSA-m2r5-4w96-qxg5 | Arbitrary file access through XML parsing in org.xwiki.commons:xwiki-commons-xml | ### Impact
It's possible in a script to access any file accessing to the user running XWiki application server with XML External Entity Injection through the XML script service.
For example:
```
{{velocity}}
#set($xml=$services.get('xml'))
#set($xxe_payload = "<?xml version='1.0' encoding='UTF-8'?><!DOCTYPE root[<!E... | {'CVE-2022-24898'} | 2022-04-29T20:45:20.929502Z | 2022-04-28T19:31:55Z | MODERATE | null | {'CWE-611'} | {'https://github.com/xwiki/xwiki-commons/commit/947e8921ebd95462d5a7928f397dd1b64f77c7d5', 'https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-m2r5-4w96-qxg5', 'https://jira.xwiki.org/browse/XWIKI-18946', 'https://github.com/xwiki/xwiki-commons'} | null | {'https://github.com/xwiki/xwiki-commons/commit/947e8921ebd95462d5a7928f397dd1b64f77c7d5'} | {'https://github.com/xwiki/xwiki-commons/commit/947e8921ebd95462d5a7928f397dd1b64f77c7d5'} |
Maven | GHSA-qjwc-v72v-fq6r | HTTP request smuggling in Undertow | A flaw was found in Undertow. A regression in the fix for CVE-2020-10687 was found. HTTP request smuggling related to CVE-2017-2666 is possible against HTTP/1.x and HTTP/2 due to permitting invalid characters in an HTTP request. This flaw allows an attacker to poison a web-cache, perform an XSS attack, or obtain sensit... | {'CVE-2021-20220'} | 2022-03-03T05:13:23.722795Z | 2021-06-16T17:47:52Z | MODERATE | null | {'CWE-444'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-20220', 'https://bugzilla.redhat.com/show_bug.cgi?id=1923133', 'https://security.netapp.com/advisory/ntap-20220210-0013/', 'https://github.com/undertow-io/undertow/commit/9e797b2f99617fdad0471eaa88c711ee7f44605f'} | null | {'https://github.com/undertow-io/undertow/commit/9e797b2f99617fdad0471eaa88c711ee7f44605f'} | {'https://github.com/undertow-io/undertow/commit/9e797b2f99617fdad0471eaa88c711ee7f44605f'} |
Maven | GHSA-r2wf-q3x4-hrv9 | Default development error handler in Ratpack is vulnerable to HTML content injection (XSS) | Versions of Ratpack from 0.9.10 through 1.7.5 are vulnerable to [CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')](https://cwe.mitre.org/data/definitions/79.html) (aka. XSS) in the development error handler. An attacker can utilize this to perform XSS when an exception messag... | {'CVE-2019-10770'} | 2022-03-03T05:13:37.516047Z | 2020-01-27T19:28:20Z | MODERATE | null | {'CWE-779'} | {'https://snyk.io/vuln/SNYK-JAVA-IORATPACK-534882', 'https://github.com/ratpack/ratpack/security/advisories/GHSA-r2wf-q3x4-hrv9', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10770', 'https://github.com/ratpack/ratpack/commit/a3cbb13be1527874528c3b99fc33517c0297b6d3'} | null | {'https://github.com/ratpack/ratpack/commit/a3cbb13be1527874528c3b99fc33517c0297b6d3'} | {'https://github.com/ratpack/ratpack/commit/a3cbb13be1527874528c3b99fc33517c0297b6d3'} |
Maven | GHSA-pr38-qpxm-g88x | Uncontrolled Resource Consumption in Apache ActiveMQ Artemis | In Apache ActiveMQ Artemis prior to 2.20.0 or 2.19.1, an attacker could partially disrupt availability (DoS) through uncontrolled resource consumption of memory. | {'CVE-2022-23913'} | 2022-05-03T02:32:19.369867Z | 2022-02-06T00:00:55Z | HIGH | null | {'CWE-400'} | {'https://github.com/apache/activemq-artemis/pull/3871', 'https://github.com/github/codeql-java-CVE-coverage/issues/1061', 'https://github.com/apache/activemq-artemis/pull/3862', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23913', 'https://github.com/apache/activemq-artemis/pull/3871/commits/153d2e9a979aead8dff95fbc91d6... | null | {'https://github.com/apache/activemq-artemis/pull/3862/commits/1f92368240229b8f5db92a92a72c703faf83e9b7', 'https://github.com/apache/activemq-artemis/pull/3871/commits/153d2e9a979aead8dff95fbc91d659ecc7d0fb82'} | {'https://github.com/apache/activemq-artemis/pull/3871/commits/153d2e9a979aead8dff95fbc91d659ecc7d0fb82', 'https://github.com/apache/activemq-artemis/pull/3862/commits/1f92368240229b8f5db92a92a72c703faf83e9b7'} |
Maven | GHSA-5xqr-grq4-qwgx | Moderate severity vulnerability that affects com.github.junrar:junrar | Archive.java in Junrar before 1.0.1, as used in Apache Tika and other products, is affected by a denial of service vulnerability due to an infinite loop when handling corrupt RAR files. | {'CVE-2018-12418'} | 2022-03-03T05:13:15.624989Z | 2018-10-17T00:04:05Z | MODERATE | null | {'CWE-835'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-12418', 'https://github.com/junrar/junrar/commit/ad8d0ba8e155630da8a1215cee3f253e0af45817', 'https://github.com/junrar/junrar/pull/8', 'https://github.com/advisories/GHSA-5xqr-grq4-qwgx', 'https://github.com/junrar/junrar'} | null | {'https://github.com/junrar/junrar/commit/ad8d0ba8e155630da8a1215cee3f253e0af45817'} | {'https://github.com/junrar/junrar/commit/ad8d0ba8e155630da8a1215cee3f253e0af45817'} |
Maven | GHSA-c2q3-4qrh-fm48 | Deserialization of untrusted data in Jackson Databind | FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to oracle.jms.AQjmsQueueConnectionFactory, oracle.jms.AQjmsXATopicConnectionFactory, oracle.jms.AQjmsTopicConnectionFactory, oracle.jms.AQjmsXAQueueConnectionFactory, and oracle.jms.AQjmsXAConnect... | {'CVE-2020-14061'} | 2022-03-03T05:13:51.797949Z | 2020-06-18T14:44:50Z | HIGH | null | {'CWE-502'} | {'https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-572316', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14061', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://lists.debian.org/debian-lts-announce/2020/07/msg00001.html', 'https://github.com/FasterX... | null | {'https://github.com/FasterXML/jackson-databind/commit/5c8642aeae9c756b438ab7637c90ef3c77966e6e'} | {'https://github.com/FasterXML/jackson-databind/commit/5c8642aeae9c756b438ab7637c90ef3c77966e6e'} |
Maven | GHSA-2m7g-9q74-9m3q | Improper Certificate Validation in Apache Beam | The Apache Beam MongoDB connector in versions 2.10.0 to 2.16.0 has an option to disable SSL trust verification. However this configuration is not respected and the certificate verification disables trust verification in every case. This exclusion also gets registered globally which disables trust checking for any code ... | {'CVE-2020-1929'} | 2022-03-03T05:13:24.352659Z | 2020-05-06T20:49:04Z | HIGH | null | {'CWE-295'} | {'https://lists.apache.org/thread.html/rdd0e85b71bf0274471b40fa1396d77f7b2d1165eaea4becbdc69aa04%40%3Cuser.beam.apache.org%3E', 'https://github.com/apache/beam', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1929', 'https://github.com/apache/beam/commit/a7dd23d95d2d214b4110781b5a28802bd43b834b'} | null | {'https://github.com/apache/beam/commit/a7dd23d95d2d214b4110781b5a28802bd43b834b'} | {'https://github.com/apache/beam/commit/a7dd23d95d2d214b4110781b5a28802bd43b834b'} |
Maven | GHSA-mx9v-gmh4-mgqw | High severity vulnerability that affects com.fasterxml.jackson.core:jackson-databind | FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the openjpa class from polymorphic deserialization. | {'CVE-2018-19361'} | 2022-03-03T05:11:54.751309Z | 2019-01-04T19:07:01Z | CRITICAL | null | {'CWE-502'} | {'http://www.securityfocus.com/bid/107985', 'https://access.redhat.com/errata/RHSA-2019:3140', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E', 'https://access.... | null | {'https://github.com/FasterXML/jackson-databind/commit/42912cac4753f3f718ece875e4d486f8264c2f2b'} | {'https://github.com/FasterXML/jackson-databind/commit/42912cac4753f3f718ece875e4d486f8264c2f2b'} |
Maven | GHSA-p63h-7hw8-5cw4 | Cross-Site Request Forgery in OpenNMS Horizon | In OpenNMS Horizon, versions opennms-1-0-stable through opennms-27.1.1; OpenNMS Meridian, versions meridian-foundation-2015.1.0-1 through meridian-foundation-2019.1.18-1; meridian-foundation-2020.1.0-1 through meridian-foundation-2020.1.6-1 are vulnerable to CSRF, due to no CSRF protection, and since there is no valida... | {'CVE-2021-25930'} | 2021-05-28T22:25:41Z | 2021-05-25T18:46:49Z | MODERATE | null | {'CWE-352'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-25930', 'https://github.com/OpenNMS/opennms/commit/607151ea8f90212a3fb37c977fa57c7d58d26a84', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25930', 'https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c'} | null | {'https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c', 'https://github.com/OpenNMS/opennms/commit/607151ea8f90212a3fb37c977fa57c7d58d26a84'} | {'https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c', 'https://github.com/OpenNMS/opennms/commit/607151ea8f90212a3fb37c977fa57c7d58d26a84'} |
Maven | GHSA-9jq9-c2cv-pcrj | Cross-site Scripting by SVG upload in xwiki-platform | ### Impact
When using default XWiki configuration, it's possible for an attacker to upload an SVG containing a script executed when executing the download action on the file.
### Patches
This problem has been patched so that the default configuration doesn't allow to display the SVG files in the browser.
### Workaro... | {'CVE-2021-43841'} | 2022-02-11T21:08:41Z | 2022-02-10T22:42:48Z | MODERATE | null | {'CWE-79'} | {'https://www.xwiki.org/xwiki/bin/view/Documentation/AdminGuide/Attachments#HAttachmentdisplayordownload', 'https://github.com/xwiki/xwiki-platform/commit/5853d492b3a274db0d94d560e2a5ea988a271c62', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43841', 'https://github.com/xwiki/xwiki-platform/', 'https://jira.xwiki.org/bro... | null | {'https://github.com/xwiki/xwiki-platform/commit/5853d492b3a274db0d94d560e2a5ea988a271c62'} | {'https://github.com/xwiki/xwiki-platform/commit/5853d492b3a274db0d94d560e2a5ea988a271c62'} |
Maven | GHSA-gv3v-92v6-m48j | Improper Neutralization of CRLF Sequences in HTTP Headers in Jooby ('HTTP Response Splitting) | ### Impact
- Cross Site Scripting
- Cache Poisoning
- Page Hijacking
### Patches
This was fixed in version `2.2.1`.
### Workarounds
If you are unable to update, ensure that user supplied data isn't able to flow to HTTP headers. If it does, pre-sanitize for CRLF characters.
### References
##### [CWE-113: Impro... | {'CVE-2020-7622'} | 2022-03-03T05:14:07.280832Z | 2020-04-03T15:23:30Z | CRITICAL | null | {'CWE-444'} | {'https://github.com/jooby-project/jooby/security/advisories/GHSA-gv3v-92v6-m48j', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7622', 'https://github.com/jooby-project/jooby/commit/b66e3342cf95205324023cfdf2cb5811e8a6dcf4', 'https://snyk.io/vuln/SNYK-JAVA-IOJOOBY-564249'} | null | {'https://github.com/jooby-project/jooby/commit/b66e3342cf95205324023cfdf2cb5811e8a6dcf4'} | {'https://github.com/jooby-project/jooby/commit/b66e3342cf95205324023cfdf2cb5811e8a6dcf4'} |
Maven | GHSA-mgh8-hcwj-h57v | Improper Restriction of XML External Entity Reference in Apache Olingo | The XML content type entity deserializer in Apache Olingo versions 4.0.0 to 4.6.0 is not configured to deny the resolution of external entities. Request with content type "application/xml", which trigger the deserialization of entities, can be used to trigger XXE attacks. | {'CVE-2019-17554'} | 2022-03-03T05:14:02.923777Z | 2020-02-04T22:37:43Z | MODERATE | null | {'CWE-611'} | {'https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E', 'https://seclists.org/bugtraq/2019/Dec/11', 'https://mail-archives.apache.org/mod_mbox/olingo-user/201912.mbox/%3CCAGSZ4d7Ty%3DL-n_iAzT6vcQp65BY29XZDS5tMoM8MdDrb1moM7A%40mail.gmail.com%3E', 'http... | null | {'https://github.com/apache/olingo-odata4/commit/c3f982db3d97e395d313ae8f231202bb2139882c', 'https://github.com/apache/olingo-odata4/commit/5948974ad28271818e2afe747c71cde56a7f2c63'} | {'https://github.com/apache/olingo-odata4/commit/5948974ad28271818e2afe747c71cde56a7f2c63', 'https://github.com/apache/olingo-odata4/commit/c3f982db3d97e395d313ae8f231202bb2139882c'} |
Maven | GHSA-59g4-hpg3-3gcp | Files Accessible to External Parties in Opencast | Opencast before version 10.6 allows references to local file URLs in ingested media packages, allowing attackers to include local files from Opencast's host machines and making them available via the web interface.
### Impact
Before Opencast 10.6, Opencast would [open and include local files during ingests](https://g... | {'CVE-2021-43821'} | 2022-03-03T05:14:00.491448Z | 2021-12-14T21:44:03Z | CRITICAL | null | {'CWE-552'} | {'https://github.com/opencast/opencast/security/advisories/GHSA-59g4-hpg3-3gcp', 'https://github.com/opencast/opencast/blob/69952463971cf578363e3b97d8edaf334ff51253/modules/ingest-service-impl/src/main/java/org/opencastproject/ingest/impl/IngestServiceImpl.java#L1587', 'https://github.com/opencast/opencast', 'https://g... | null | {'https://github.com/opencast/opencast/commit/65c46b9d3e8f045c544881059923134571897764'} | {'https://github.com/opencast/opencast/commit/65c46b9d3e8f045c544881059923134571897764'} |
Maven | GHSA-p9m8-27x8-rg87 | Critical vulnerability found in cron-utils | ### Impact
A Template Injection was identified in cron-utils enabling attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. Versions up to 9.1.2 are susceptible to this vulnerability. Please note, that only projects using the @Cron annotation to validat... | {'CVE-2021-41269'} | 2022-03-03T05:13:37.090314Z | 2021-11-15T23:27:11Z | CRITICAL | null | {'CWE-94'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-41269', 'https://github.com/jmrozanec/cron-utils/commit/d6707503ec2f20947f79e38f861dba93b39df9da', 'https://github.com/jmrozanec/cron-utils/security/advisories/GHSA-p9m8-27x8-rg87', 'https://github.com/jmrozanec/cron-utils', 'https://github.com/jmrozanec/cron-utils/commit/cfd... | null | {'https://github.com/jmrozanec/cron-utils/commit/cfd2880f80e62ea74b92fa83474c2aabdb9899da', 'https://github.com/jmrozanec/cron-utils/commit/d6707503ec2f20947f79e38f861dba93b39df9da'} | {'https://github.com/jmrozanec/cron-utils/commit/d6707503ec2f20947f79e38f861dba93b39df9da', 'https://github.com/jmrozanec/cron-utils/commit/cfd2880f80e62ea74b92fa83474c2aabdb9899da'} |
Maven | GHSA-2h63-qp69-fwvw | Server-side request forgery (SSRF) in Apache Batik | Apache Batik 1.13 is vulnerable to server-side request forgery, caused by improper input validation by the NodePickerPanel. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests. | {'CVE-2020-11987'} | 2022-03-03T05:13:00.592182Z | 2022-01-06T20:35:54Z | HIGH | null | {'CWE-20', 'CWE-918'} | {'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W7EAYO5XIHD6OIEA3HPK64UDDBSLNAC5/', 'https://lists.apache.org/thread.html/r588d05a0790b40a0eb81088252e1e8c1efb99706631421f17038eb05@%3Cdev.poi.apache.org%3E', 'https... | null | {'https://github.com/apache/xmlgraphics-batik/commit/0ef5b661a1f77772d1110877ea9e0287987098f6'} | {'https://github.com/apache/xmlgraphics-batik/commit/0ef5b661a1f77772d1110877ea9e0287987098f6'} |
Maven | GHSA-3pqg-4rqg-pg9g | Cross-site Scripting in OWASP AntiSamy | OWASP AntiSamy is a library for performing fast, configurable cleansing of HTML coming from untrusted sources. AntiSamy before 1.6.6 allows XSS via HTML tag smuggling on STYLE content with crafted input. The output serializer does not properly encode the supposed Cascading Style Sheets (CSS) content. | {'CVE-2022-28367'} | 2022-05-04T04:20:29.353805Z | 2022-04-23T00:03:04Z | MODERATE | null | {'CWE-79'} | {'https://github.com/nahsra/antisamy/releases/tag/v1.6.6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-28367', 'https://github.com/nahsra/antisamy/commit/0199e7e194dba5e7d7197703f43ebe22401e61ae', 'https://github.com/nahsra/antisamy'} | null | {'https://github.com/nahsra/antisamy/commit/0199e7e194dba5e7d7197703f43ebe22401e61ae'} | {'https://github.com/nahsra/antisamy/commit/0199e7e194dba5e7d7197703f43ebe22401e61ae'} |
Maven | GHSA-m8p2-495h-ccmh | The SafeHtml annotation in Hibernate-Validator does not properly guard against XSS attacks | A vulnerability was found in Hibernate-Validator. The SafeHtml validator annotation fails to properly sanitize payloads consisting of potentially malicious code in HTML comments and instructions. This vulnerability can result in an XSS attack. | {'CVE-2019-10219'} | 2022-03-03T05:13:17.197092Z | 2020-01-08T17:01:52Z | MODERATE | null | {'CWE-79'} | {'https://lists.apache.org/thread.html/r4f92d7f7682dcff92722fa947f9e6f8ba2227c5dc3e11ba09114897d@%3Cnotifications.accumulo.apache.org%3E', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10219', 'https://github.com/hibernate/hibernate-validator/commit/124b7dd6d9a4ad24d4d49f74701f05a13e56ceee', 'https://github.com... | null | {'https://github.com/hibernate/hibernate-validator/commit/20d729548511ac5cff6fd459f93de137195420fe', 'https://github.com/hibernate/hibernate-validator/commit/124b7dd6d9a4ad24d4d49f74701f05a13e56ceee'} | {'https://github.com/hibernate/hibernate-validator/commit/20d729548511ac5cff6fd459f93de137195420fe', 'https://github.com/hibernate/hibernate-validator/commit/124b7dd6d9a4ad24d4d49f74701f05a13e56ceee'} |
Maven | GHSA-36p3-wjmg-h94x | Remote Code Execution in Spring Framework | Spring Framework prior to versions 5.2.20 and 5.3.18 contains a remote code execution vulnerability known as `Spring4Shell`.
## Impact
A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run o... | {'CVE-2022-22965'} | 2022-04-01T16:30:56.651036Z | 2022-03-31T18:30:50Z | CRITICAL | null | {'CWE-74'} | {'https://github.com/spring-projects/spring-framework/commit/002546b3e4b8d791ea6acccb81eb3168f51abb15', 'https://tanzu.vmware.com/security/cve-2022-22965', 'https://github.com/spring-projects/spring-framework/releases/tag/v5.2.20.RELEASE', 'https://github.com/spring-projects/spring-boot/releases/tag/v2.6.6', 'https://g... | null | {'https://github.com/spring-projects/spring-framework/commit/002546b3e4b8d791ea6acccb81eb3168f51abb15'} | {'https://github.com/spring-projects/spring-framework/commit/002546b3e4b8d791ea6acccb81eb3168f51abb15'} |
Maven | GHSA-hw3m-8h25-8frw | Command Injection in Apache Kylin | Apache kylin checks the legitimacy of the project before executing some commands with the project name passed in by the user. There is a mismatch between what is being checked and what is being used as the shell command argument in DiagnosisService. This may cause an illegal project name to pass the check and perform t... | {'CVE-2021-45456'} | 2022-03-03T05:13:32.561750Z | 2022-01-08T00:42:59Z | MODERATE | null | {'CWE-77'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-45456', 'https://lists.apache.org/thread/70fkf9w1swt2cqdcz13rwfjvblw1fcpf', 'http://www.openwall.com/lists/oss-security/2022/01/06/1', 'https://github.com/apache/kylin/pull/1781', 'https://github.com/apache/kylin', 'https://github.com/apache/kylin/commit/f4daf14dde99b934c92ce... | null | {'https://github.com/apache/kylin/commit/f4daf14dde99b934c92ce2c832509f24342bc845'} | {'https://github.com/apache/kylin/commit/f4daf14dde99b934c92ce2c832509f24342bc845'} |
Maven | GHSA-52rg-hpwq-qp56 | Allocation of Resources Without Limits or Throttling in Keycloak | A vulnerability was found in Keycloak before 11.0.1 where DoS attack is possible by sending twenty requests simultaneously to the specified keycloak server, all with a Content-Length header value that exceeds the actual byte count of the request body. | {'CVE-2020-10758'} | 2022-03-03T05:12:31.791056Z | 2022-02-09T00:56:51Z | HIGH | null | {'CWE-770'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=1843849', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10758', 'https://github.com/keycloak/keycloak/commit/bee4ca89897766c4b68856eafe14f1a3dad34251'} | null | {'https://github.com/keycloak/keycloak/commit/bee4ca89897766c4b68856eafe14f1a3dad34251'} | {'https://github.com/keycloak/keycloak/commit/bee4ca89897766c4b68856eafe14f1a3dad34251'} |
Maven | GHSA-wmfg-55f9-j8hq | Server-Side Template Injection | ### Impact
A Server-Side Template Injection was identified in BrowserUp Proxy enabling attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. This has been assigned CVE-2020-26282.
### Patches
Effective Immediately, all users should upgrade to version 2... | {'CVE-2020-26282'} | 2022-03-03T05:14:06.141126Z | 2020-12-24T20:49:34Z | HIGH | null | {'CWE-74'} | {'https://securitylab.github.com/research/bean-validation-RCE', 'https://github.com/browserup/browserup-proxy/releases/tag/v2.1.2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26282', 'https://github.com/browserup/browserup-proxy/commit/4b38e7a3e20917e5c3329d0d4e9590bed9d578ab', 'https://github.com/browserup/browserup-p... | null | {'https://github.com/browserup/browserup-proxy/commit/4b38e7a3e20917e5c3329d0d4e9590bed9d578ab'} | {'https://github.com/browserup/browserup-proxy/commit/4b38e7a3e20917e5c3329d0d4e9590bed9d578ab'} |
Maven | GHSA-74qp-233x-p5j8 | Cross-site scripting (XSS) in Apache Livy | Livy server version 0.7.0-incubating (only) is vulnerable to a cross site scripting issue in the session name. A malicious user could use this flaw to access logs and results of other users' sessions and run jobs with their privileges. This issue is fixed in Livy 0.7.1-incubating. | {'CVE-2021-26544'} | 2022-03-03T05:13:09.945335Z | 2021-05-13T22:30:41Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-26544', 'http://www.openwall.com/lists/oss-security/2021/02/20/1', 'https://github.com/apache/incubator-livy/commit/4d8a912699683b973eee76d4e91447d769a0cb0d', 'https://lists.apache.org/thread.html/r2db14e7fd1e5ec2519e8828d43529bad623d75698cc7918af3a3f3ed%40%3Cuser.livy.apache... | null | {'https://github.com/apache/incubator-livy/commit/4d8a912699683b973eee76d4e91447d769a0cb0d'} | {'https://github.com/apache/incubator-livy/commit/4d8a912699683b973eee76d4e91447d769a0cb0d'} |
Maven | GHSA-vpfp-5gwq-g533 | Improper Authentication in Apache ShenYu Admin | A flaw was found in Apache ShenYu Admin. The incorrect use of JWT in ShenyuAdminBootstrap allows an attacker to bypass authentication. This issue affected Apache ShenYu 2.3.0 and 2.4.0 | {'CVE-2021-37580'} | 2022-03-03T05:13:44.383618Z | 2021-11-17T23:15:30Z | CRITICAL | null | {'CWE-287'} | {'https://lists.apache.org/thread/o15j25qwtpcw62k48xw1tnv48skh3zgb', 'https://github.com/apache/incubator-shenyu', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37580', 'https://github.com/apache/incubator-shenyu/releases/tag/v2.4.1', 'https://github.com/apache/incubator-shenyu/commit/5154e6f487c4d51dc8e022f2e2bf360841cab... | null | {'https://github.com/apache/incubator-shenyu/commit/5154e6f487c4d51dc8e022f2e2bf360841cabda4'} | {'https://github.com/apache/incubator-shenyu/commit/5154e6f487c4d51dc8e022f2e2bf360841cabda4'} |
Maven | GHSA-ppc3-fpvh-7396 | Improper synchronization in Apache Netbeans HTML/Java API | There exists a race condition between the deletion of the temporary file and the creation of the temporary directory in `webkit` subproject of HTML/Java API version 1.7. A similar vulnerability has recently been disclosed in other Java projects and the fix in HTML/Java API version 1.7.1 follows theirs: To avoid local p... | {'CVE-2020-17534'} | 2022-05-03T19:52:12.075427Z | 2022-02-09T22:25:18Z | HIGH | null | {'CWE-362'} | {'https://github.com/apache/netbeans-html4j/commit/fa70e507e5555e1adb4f6518479fc408a7abd0e6', 'https://lists.apache.org/thread.html/ra6119c0cdfccf051a846fa11b61364f5df9e7db93c310706a947f86a%40%3Cdev.netbeans.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17534'} | null | {'https://github.com/apache/netbeans-html4j/commit/fa70e507e5555e1adb4f6518479fc408a7abd0e6'} | {'https://github.com/apache/netbeans-html4j/commit/fa70e507e5555e1adb4f6518479fc408a7abd0e6'} |
Maven | GHSA-52mh-p2m2-w625 | Cross-site Scripting in HAPI FHIR | XSS exists in the HAPI FHIR testpage overlay module of the HAPI FHIR library before 3.8.0. The attack involves unsanitized HTTP parameters being output in a form page, allowing attackers to leak cookies and other sensitive information from ca/uhn/fhir/to/BaseController.java via a specially crafted URL. (This module is ... | {'CVE-2019-12741'} | 2022-03-03T05:13:27.411183Z | 2019-06-07T20:56:59Z | MODERATE | null | {'CWE-79'} | {'https://github.com/jamesagnew/hapi-fhir/commit/8f41159eb147eeb964cad68b28eff97acac6ea9a', 'https://github.com/jamesagnew/hapi-fhir/issues/1335', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12741', 'https://github.com/jamesagnew/hapi-fhir/releases/tag/v3.8.0'} | null | {'https://github.com/jamesagnew/hapi-fhir/commit/8f41159eb147eeb964cad68b28eff97acac6ea9a'} | {'https://github.com/jamesagnew/hapi-fhir/commit/8f41159eb147eeb964cad68b28eff97acac6ea9a'} |
Maven | GHSA-5949-rw7g-wx7w | Deserialization of untrusted data in jackson-databind | A flaw was found in jackson-databind before 2.9.10.7. FasterXML mishandles the interaction between serialization gadgets and typing. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | {'CVE-2021-20190'} | 2022-03-03T05:13:41.686303Z | 2021-01-20T21:20:15Z | HIGH | null | {'CWE-502'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=1916633', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://security.netapp.com/advisory/ntap-20210219-0008/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20190', 'https://github.com/FasterXML/jackson-databind/issues/2854', 'https://github.com/Fa... | null | {'https://github.com/FasterXML/jackson-databind/commit/7dbf51bf78d157098074a20bd9da39bd48c18e4a'} | {'https://github.com/FasterXML/jackson-databind/commit/7dbf51bf78d157098074a20bd9da39bd48c18e4a'} |
Maven | GHSA-74mg-6xqx-2vrq | Deserialization exploitation in Apache Dubbo | A deserialization vulnerability existed in dubbo 2.7.5 and its earlier versions, which could lead to malicious code execution. Most Dubbo users use Hessian2 as the default serialization/deserialization protool, during Hessian2 deserializing the HashMap object, some functions in the classes stored in HashMap will be exe... | {'CVE-2020-11995'} | 2022-03-03T05:13:50.092682Z | 2022-02-09T22:27:01Z | CRITICAL | null | {'CWE-502'} | {'https://github.com/apache/dubbo/commit/d2e9baf380108950c48e0ab700ccdbf11dd753ab', 'https://lists.apache.org/thread.html/r5b2df4ef479209dc4ced457b3d58a887763b60b9354c3dc148b2eb5b%40%3Cdev.dubbo.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11995'} | null | {'https://github.com/apache/dubbo/commit/d2e9baf380108950c48e0ab700ccdbf11dd753ab'} | {'https://github.com/apache/dubbo/commit/d2e9baf380108950c48e0ab700ccdbf11dd753ab'} |
Maven | GHSA-xqj7-j8j5-f2xr | Bouncy Castle has a flaw in the Low-level interface to RSA key pair generator | Bouncy Castle BC 1.54 - 1.59, BC-FJA 1.0.0, BC-FJA 1.0.1 and earlier have a flaw in the Low-level interface to RSA key pair generator, specifically RSA Key Pairs generated in low-level API with added certainty may have less M-R tests than expected. This appears to be fixed in versions BC 1.60 beta 4 and later, BC-FJA 1... | {'CVE-2018-1000180'} | 2022-04-26T19:00:14.440858Z | 2018-10-16T17:44:39Z | HIGH | null | {'CWE-327'} | {'https://www.bountysource.com/issues/58293083-rsa-key-generation-computation-of-iterations-for-mr-primality-test', 'https://access.redhat.com/errata/RHSA-2019:0877', 'https://access.redhat.com/errata/RHSA-2018:2423', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://github.com/bc... | null | {'https://github.com/bcgit/bc-java/commit/22467b6e8fe19717ecdf201c0cf91bacf04a55ad', 'https://github.com/bcgit/bc-java/commit/73780ac522b7795fc165630aba8d5f5729acc839'} | {'https://github.com/bcgit/bc-java/commit/22467b6e8fe19717ecdf201c0cf91bacf04a55ad', 'https://github.com/bcgit/bc-java/commit/73780ac522b7795fc165630aba8d5f5729acc839'} |
Maven | GHSA-9mxf-g3x6-wv74 | High severity vulnerability that affects com.fasterxml.jackson.core:jackson-databind | FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization. | {'CVE-2018-14721'} | 2022-03-03T05:13:02.517930Z | 2019-01-04T19:07:06Z | CRITICAL | null | {'CWE-918'} | {'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.7', 'https://access.redhat.com/errata/RHSA-2019:1108', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44', 'https://www.oracle.com/technetwork/security-advisory... | null | {'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44'} | {'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44'} |
Maven | GHSA-xmc8-26q4-qjhx | Denial of Service (DoS) in Jackson Dataformat CBOR | This affects the package com.fasterxml.jackson.dataformat:jackson-dataformat-cbor from 0 and before 2.11.4, from 2.12.0-rc1 and before 2.12.1. Unchecked allocation of byte buffer can cause a java.lang.OutOfMemoryError exception. | {'CVE-2020-28491'} | 2022-03-03T05:12:59.919693Z | 2021-12-09T19:17:21Z | HIGH | null | {'CWE-770'} | {'https://github.com/FasterXML/jackson-dataformats-binary/issues/186', 'https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONDATAFORMAT-1047329', 'https://github.com/FasterXML/jackson-dataformats-binary', 'https://github.com/FasterXML/jackson-dataformats-binary/commit/de072d314af8f5f269c8abec6930652af67bc8e6', 'https://nv... | null | {'https://github.com/FasterXML/jackson-dataformats-binary/commit/de072d314af8f5f269c8abec6930652af67bc8e6'} | {'https://github.com/FasterXML/jackson-dataformats-binary/commit/de072d314af8f5f269c8abec6930652af67bc8e6'} |
Maven | GHSA-24r8-fm9r-cpj2 | Low severity vulnerability that affects com.linecorp.armeria:armeria | ## Multiple timing attack vulnerabilities leading to the recovery of secrets based on the use of non-constant time compare function
### Impact
String comparison method in multiple authentication validation in Armeria were known to be vulnerable to timing attacks. This vulnerability is caused by the insecure implement... | {'CVE-2019-16771'} | 2022-03-03T05:12:59.259982Z | 2019-12-05T18:40:51Z | LOW | null | {'CWE-113'} | {'https://github.com/line/armeria/commit/b597f7a865a527a84ee3d6937075cfbb4470ed20', 'https://github.com/line/armeria/security/advisories/GHSA-35fr-h7jr-hh86', 'https://github.com/advisories/GHSA-24r8-fm9r-cpj2', 'https://github.com/line/armeria/security/advisories/GHSA-24r8-fm9r-cpj2', 'https://nvd.nist.gov/vuln/detail... | null | {'https://github.com/line/armeria/commit/b597f7a865a527a84ee3d6937075cfbb4470ed20'} | {'https://github.com/line/armeria/commit/b597f7a865a527a84ee3d6937075cfbb4470ed20'} |
Maven | GHSA-p2j7-6g9h-32xh | Cross site scripting in Shopizer | A Stored Cross Site Scripting (XSS) vulnerability exists in Shopizer versions v2.0.2 through v2.17.0 via the “Manage Images” tab, which allows an attacker to upload a SVG file containing malicious JavaScript code. | {'CVE-2022-23059'} | 2022-04-07T22:16:52.919294Z | 2022-03-30T00:00:27Z | MODERATE | null | {'CWE-79'} | {'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23059', 'https://github.com/shopizer-ecommerce/shopizer/commit/6b9f1ecd303b3b724d96bd08095c1a751dcc287e', 'https://github.com/shopizer-ecommerce/shopizer', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23059'} | null | {'https://github.com/shopizer-ecommerce/shopizer/commit/6b9f1ecd303b3b724d96bd08095c1a751dcc287e'} | {'https://github.com/shopizer-ecommerce/shopizer/commit/6b9f1ecd303b3b724d96bd08095c1a751dcc287e'} |
Maven | GHSA-2mxr-89gf-rc4v | Read permissions not enforced for client provided filter expressions in Elide. | ### Impact
It is possible for an adversary to "guess and check" the value of a model field they do not have access to assuming they can read at least one other field in the model. The adversary can construct filter expressions for an inaccessible field to filter a collection. The presence or absence of models in the ... | {'CVE-2020-5289'} | 2022-03-03T05:13:01.891877Z | 2020-03-30T20:09:58Z | HIGH | null | {'CWE-285'} | {'https://github.com/yahoo/elide/security/advisories/GHSA-2mxr-89gf-rc4v', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5289', 'https://github.com/yahoo/elide/pull/1236', 'https://github.com/yahoo/elide/pull/1236/commits/a985f0f9c448aabe70bc904337096399de4576dc'} | null | {'https://github.com/yahoo/elide/pull/1236/commits/a985f0f9c448aabe70bc904337096399de4576dc'} | {'https://github.com/yahoo/elide/pull/1236/commits/a985f0f9c448aabe70bc904337096399de4576dc'} |
Maven | GHSA-hf44-3mx6-vhhw | Navigate endpoint is vulnerable to regex injection that may lead to Denial of Service. | ### Impact
The regex injection that may lead to Denial of Service.
### Patches
Will be patched in 2.4 and 3.0
### Workarounds
Versions lower than 2.x are only affected if the navigation module is added
### References
See this pull request for the fix: https://github.com/graphhopper/graphhopper/pull/2304
If you have... | {'CVE-2021-29506'} | 2022-03-03T05:13:45.979595Z | 2021-05-19T23:02:57Z | MODERATE | null | {'CWE-400'} | {'https://github.com/graphhopper/graphhopper/commit/eb189be1fa7443ebf4ae881e737a18f818c95f41', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29506', 'https://github.com/graphhopper/graphhopper/security/advisories/GHSA-hf44-3mx6-vhhw', 'https://github.com/graphhopper/graphhopper/pull/2304'} | null | {'https://github.com/graphhopper/graphhopper/commit/eb189be1fa7443ebf4ae881e737a18f818c95f41'} | {'https://github.com/graphhopper/graphhopper/commit/eb189be1fa7443ebf4ae881e737a18f818c95f41'} |
Maven | GHSA-r97x-3g8f-gx3m | The Bouncy Castle JCE Provider carry a propagation bug | In the Bouncy Castle JCE Provider versions 1.51 to 1.55, a carry propagation bug was introduced in the implementation of squaring for several raw math classes have been fixed (org.bouncycastle.math.raw.Nat???). These classes are used by our custom elliptic curve implementations (org.bouncycastle.math.ec.custom.**), so ... | {'CVE-2016-1000340'} | 2022-04-27T13:30:08.936923Z | 2018-10-17T16:23:50Z | HIGH | null | null | {'https://github.com/advisories/GHSA-r97x-3g8f-gx3m', 'https://github.com/bcgit/bc-java/commit/790642084c4e0cadd47352054f868cc8397e2c00#diff-e5934feac8203ca0104ab291a3560a31', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://github.com/bcgit/bc-java', 'https://access.redhat.com/errata/RHSA-2018:2669',... | null | {'https://github.com/bcgit/bc-java/commit/790642084c4e0cadd47352054f868cc8397e2c00#diff-e5934feac8203ca0104ab291a3560a31'} | {'https://github.com/bcgit/bc-java/commit/790642084c4e0cadd47352054f868cc8397e2c00#diff-e5934feac8203ca0104ab291a3560a31'} |
Maven | GHSA-2j2x-hx4g-2gf4 | In Bouncy Castle JCE Provider the DHIES implementation allowed the use of ECB mode | In the Bouncy Castle JCE Provider version 1.55 and earlier the DHIES implementation allowed the use of ECB mode. This mode is regarded as unsafe and support for it has been removed from the provider. | {'CVE-2016-1000344'} | 2022-04-27T13:45:16.751309Z | 2018-10-18T17:43:55Z | HIGH | null | {'CWE-1310'} | {'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://github.com/bcgit/bc-java/commit/9385b0ebd277724b167fe1d1456e3c112112be1f', 'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://access.redhat.com/errata/RHSA-2018:2927', 'https://nvd.ni... | null | {'https://github.com/bcgit/bc-java/commit/9385b0ebd277724b167fe1d1456e3c112112be1f'} | {'https://github.com/bcgit/bc-java/commit/9385b0ebd277724b167fe1d1456e3c112112be1f'} |
Maven | GHSA-54mg-vgrp-mwx9 | Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in Ratpack | Ratpack versions before 1.6.1 generate a session ID using a cryptographically weak PRNG in the JDK's ThreadLocalRandom. This means that if an attacker can determine a small window for the server start time and obtain a session ID value, they can theoretically determine the sequence of session IDs. | {'CVE-2019-11808'} | 2022-03-03T05:13:00.025711Z | 2019-05-14T04:01:37Z | LOW | null | {'CWE-338'} | {'https://github.com/ratpack/ratpack/releases/tag/v1.6.1', 'https://github.com/ratpack/ratpack/issues/1448', 'https://github.com/ratpack/ratpack/commit/f2b63eb82dd71194319fd3945f5edf29b8f3a42d', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11808'} | null | {'https://github.com/ratpack/ratpack/commit/f2b63eb82dd71194319fd3945f5edf29b8f3a42d'} | {'https://github.com/ratpack/ratpack/commit/f2b63eb82dd71194319fd3945f5edf29b8f3a42d'} |
Maven | GHSA-w736-hf9p-qqh3 | Key Caching behavior in the DynamoDB Encryption Client. | ### Impact
This advisory concerns users of MostRecentProvider in the DynamoDB Encryption Client with a key provider like AWS Key Management Service that allows for permissions on keys to be modified.
When key usage permissions were changed at the key provider, time-based key reauthorization logic in MostRecentProvider... | null | 2022-03-03T05:13:22.445994Z | 2021-02-08T17:43:36Z | LOW | null | {'CWE-862'} | {'https://github.com/aws/aws-dynamodb-encryption-java/blob/master/CHANGELOG.md#1150----2021-02-04', 'https://github.com/aws/aws-dynamodb-encryption-java/security/advisories/GHSA-w736-hf9p-qqh3', 'https://github.com/aws/aws-dynamodb-encryption-java/commit/7de5f5a5929271ab25bce685089eb7ec564dac4b'} | null | {'https://github.com/aws/aws-dynamodb-encryption-java/commit/7de5f5a5929271ab25bce685089eb7ec564dac4b'} | {'https://github.com/aws/aws-dynamodb-encryption-java/commit/7de5f5a5929271ab25bce685089eb7ec564dac4b'} |
Maven | GHSA-jmv4-73v2-pvgc | Cross-site Scripting in OpenNMS Horizon | In OpenNMS Horizon, versions opennms-1-0-stable through opennms-27.1.1; OpenNMS Meridian, versions meridian-foundation-2015.1.0-1 through meridian-foundation-2019.1.18-1; meridian-foundation-2020.1.0-1 through meridian-foundation-2020.1.6-1 are vulnerable to Stored Cross-Site Scripting since there is no validation on t... | {'CVE-2021-25929'} | 2021-05-28T22:27:11Z | 2021-05-25T18:46:58Z | MODERATE | null | {'CWE-79'} | {'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25929', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25929', 'https://github.com/OpenNMS/opennms/commit/66c1f626bf38a7d1a9530b4d68598269ee5245a2', 'https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c'} | null | {'https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c', 'https://github.com/OpenNMS/opennms/commit/66c1f626bf38a7d1a9530b4d68598269ee5245a2'} | {'https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c', 'https://github.com/OpenNMS/opennms/commit/66c1f626bf38a7d1a9530b4d68598269ee5245a2'} |
Maven | GHSA-2wr2-8qjq-gh55 | Exposure of Resource to Wrong Sphere in org.craftercms:crafter-search | Installations, where crafter-search is not protected, allow unauthenticated remote attackers to create, view, and delete search indexes. | {'CVE-2021-23264'} | 2022-03-03T05:13:40.050314Z | 2021-12-16T15:27:35Z | CRITICAL | null | {'CWE-402', 'CWE-668'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-23264', 'https://docs.craftercms.org/en/3.1/security/advisory.html#cv-2021120107', 'https://github.com/craftercms/craftercms/commit/0e256ef0372c7be9d6e2fefc4652dd4fd94770a1'} | null | {'https://github.com/craftercms/craftercms/commit/0e256ef0372c7be9d6e2fefc4652dd4fd94770a1'} | {'https://github.com/craftercms/craftercms/commit/0e256ef0372c7be9d6e2fefc4652dd4fd94770a1'} |
Maven | GHSA-3jmw-c69h-426c | Cross-Site Request Forgery (CSRF) can run untrusted code on Rundeck server | ### Impact
A user with `admin` access to the `system` resource type is potentially vulnerable to a CSRF attack that could cause the server to run untrusted code on all Rundeck editions.
### Patches
Available in Rundeck 3.4.3 and 3.3.14
### Workarounds
Please visit [https://rundeck.com/security](https://rundeck.com... | {'CVE-2021-39133'} | 2022-03-03T05:13:15.627677Z | 2021-09-01T18:26:48Z | HIGH | null | {'CWE-352'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-39133', 'https://github.com/rundeck/rundeck/commit/67c4eedeaf9509fc0b255aff15977a5229ef13b9', 'https://github.com/rundeck/rundeck/security/advisories/GHSA-3jmw-c69h-426c', 'https://github.com/rundeck/rundeck'} | null | {'https://github.com/rundeck/rundeck/commit/67c4eedeaf9509fc0b255aff15977a5229ef13b9'} | {'https://github.com/rundeck/rundeck/commit/67c4eedeaf9509fc0b255aff15977a5229ef13b9'} |
Maven | GHSA-x2w5-5m2g-7h5m | High severity vulnerability that affects com.fasterxml.jackson.core:jackson-databind | FasterXML jackson-databind 2.x before 2.9.7 might allow attackers to conduct external XML entity (XXE) attacks by leveraging failure to block unspecified JDK classes from polymorphic deserialization. | {'CVE-2018-14720'} | 2022-03-03T05:12:53.467027Z | 2019-01-04T19:09:46Z | CRITICAL | null | {'CWE-502', 'CWE-611'} | {'https://access.redhat.com/errata/RHSA-2019:1108', 'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://li... | null | {'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44'} | {'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44'} |
Maven | GHSA-99wh-973f-779p | XML External Entity Reference in Hazelcast | The AbstractXmlConfigRootTagRecognizer() function makes use of SAXParser generated from a SAXParserFactory with no FEATURE_SECURE_PROCESSING set, allowing for XXE attacks. | {'CVE-2022-0265'} | 2022-04-01T20:00:09.532110Z | 2022-03-04T00:00:15Z | CRITICAL | null | {'CWE-611'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0265', 'https://huntr.dev/bounties/d63972a2-b910-480a-a86b-d1f75d24d563', 'https://github.com/hazelcast/hazelcast/pull/20407', 'https://github.com/hazelcast/hazelcast/', 'https://github.com/hazelcast/hazelcast/commit/4d6b666cd0291abd618c3b95cdbb51aa4208e748'} | null | {'https://github.com/hazelcast/hazelcast/commit/4d6b666cd0291abd618c3b95cdbb51aa4208e748'} | {'https://github.com/hazelcast/hazelcast/commit/4d6b666cd0291abd618c3b95cdbb51aa4208e748'} |
Maven | GHSA-px9f-597f-wmcf | Uncontrolled Resource Consumption in Apache OpenMeetings server | If was found that the NetTest web service can be used to overload the bandwidth of a Apache OpenMeetings server. This issue was addressed in Apache OpenMeetings 6.0.0 | {'CVE-2021-27576'} | 2022-03-03T05:14:20.630197Z | 2021-06-16T17:43:36Z | HIGH | null | {'CWE-400'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-27576', 'https://github.com/apache/openmeetings/commit/060a3114ad759931aeb42cd9afa9d1ebb39d3075', 'https://lists.apache.org/thread.html/r9bb615bd70a0197368f5f3ffc887162686caeb0b5fc30592a7a871e9%40%3Cuser.openmeetings.apache.org%3E', 'https://github.com/apache/openmeetings/com... | null | {'https://github.com/apache/openmeetings/commit/cbdfd2f9731a8fe3daa9b4adf5da4a063fde161d', 'https://github.com/apache/openmeetings/commit/060a3114ad759931aeb42cd9afa9d1ebb39d3075', 'https://github.com/apache/openmeetings/commit/afe26c950b127776f2dfe920abff41a584874de8'} | {'https://github.com/apache/openmeetings/commit/060a3114ad759931aeb42cd9afa9d1ebb39d3075', 'https://github.com/apache/openmeetings/commit/afe26c950b127776f2dfe920abff41a584874de8', 'https://github.com/apache/openmeetings/commit/cbdfd2f9731a8fe3daa9b4adf5da4a063fde161d'} |
Maven | GHSA-q3vw-4jx3-rrr2 | Validation bypass vulnerability | Back in min June a security vulnerability was reported to the team, the reason for the slow response was due to ownership of some packages
was locked and we wanted to be sure to update all packages before any disclosure was released.
The issue is deemed being a Low severity vulnerability.
### Impact
This vulnerabili... | null | 2020-09-23T17:15:43Z | 2020-09-23T17:20:09Z | LOW | null | null | {'https://github.com/personnummer/java/security/advisories/GHSA-q3vw-4jx3-rrr2', 'https://github.com/personnummer/java/commit/3bad4e3354503d7cfd443257c94c41f57b3d1621'} | null | {'https://github.com/personnummer/java/commit/3bad4e3354503d7cfd443257c94c41f57b3d1621'} | {'https://github.com/personnummer/java/commit/3bad4e3354503d7cfd443257c94c41f57b3d1621'} |
Maven | GHSA-cf8j-64h9-6q58 | CSRF in Play Framework | In Play Framework 2.6.0 through 2.8.1, the CSRF filter can be bypassed by making CORS simple requests with content types that contain parameters that can't be parsed. | {'CVE-2020-12480'} | 2022-03-03T05:12:56.329028Z | 2020-08-18T17:30:25Z | MODERATE | null | {'CWE-352'} | {'https://www.playframework.com/security/vulnerability/CVE-2020-12480-CsrfBlacklistBypass', 'https://github.com/playframework/playframework/pull/10285', 'https://github.com/playframework/playframework/commit/c82de44fc50b7c58c6e0580f1f67ff08aa7bd154', 'https://github.com/playframework/playframework', 'https://www.playfr... | null | {'https://github.com/playframework/playframework/commit/c82de44fc50b7c58c6e0580f1f67ff08aa7bd154'} | {'https://github.com/playframework/playframework/commit/c82de44fc50b7c58c6e0580f1f67ff08aa7bd154'} |
Maven | GHSA-743r-5g92-5vgf | Improper certificate management in AWS IoT Device SDK v2 | Connections initialized by the AWS IoT Device SDK v2 for Java (versions prior to 1.4.2), Python (versions prior to 1.6.1), C++ (versions prior to 1.12.7) and Node.js (versions prior to 1.5.3) did not verify server certificate hostname during TLS handshake when overriding Certificate Authorities (CA) in their trust stor... | {'CVE-2021-40829'} | 2022-03-03T05:13:12.773300Z | 2021-11-24T21:11:16Z | MODERATE | null | {'CWE-295'} | {'https://github.com/aws/aws-iot-device-sdk-cpp-v2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40829', 'https://github.com/aws/aws-iot-device-sdk-js-v2', 'https://github.com/aws/aws-iot-device-sdk-java-v2/commits/v1.4.2', 'https://github.com/aws/aws-iot-device-sdk-java-v2', 'https://github.com/aws/aws-iot-device-sdk-p... | null | {'https://github.com/aws/aws-iot-device-sdk-java-v2/commits/v1.4.2'} | {'https://github.com/aws/aws-iot-device-sdk-java-v2/commits/v1.4.2'} |
Maven | GHSA-pv39-qp28-4mgh | Improper Restriction of XML External Entity Reference in soa-model | Soa-model is a toolkit and Java API for WSDL, WADL and XML Schema. An XML External Entity (XXE) vulnerability exists in versions of soa-model prior to 1.6.4 in the WSDLParser function. This issue has been fixed in version 1.6.4. | {'CVE-2021-43090'} | 2022-04-12T16:46:51.785543Z | 2022-03-26T00:00:32Z | CRITICAL | null | {'CWE-611'} | {'https://github.com/membrane/soa-model/commit/3aa295f155f621d5ea661cb9a0604013fc8fd8ff', 'https://github.com/membrane/soa-model', 'https://github.com/membrane/soa-model/releases/tag/v1.6.4', 'https://github.com/membrane/soa-model/commit/19de16902468e7963cc4dc6b544574bc1ea3f251', 'https://github.com/membrane/soa-model/... | null | {'https://github.com/membrane/soa-model/commit/3aa295f155f621d5ea661cb9a0604013fc8fd8ff', 'https://github.com/membrane/soa-model/commit/19de16902468e7963cc4dc6b544574bc1ea3f251'} | {'https://github.com/membrane/soa-model/commit/3aa295f155f621d5ea661cb9a0604013fc8fd8ff', 'https://github.com/membrane/soa-model/commit/19de16902468e7963cc4dc6b544574bc1ea3f251'} |
Maven | GHSA-6cw8-7j6c-hccp | Moderate severity vulnerability that affects io.vertx:vertx-core | In Eclipse Vert.x version 3.0 to 3.5.1, the HttpServer response headers and HttpClient request headers do not filter carriage return and line feed characters from the header value. This allow unfiltered values to inject a new header in the client request or server response. | {'CVE-2018-12537'} | 2022-03-03T05:13:57.612126Z | 2018-10-19T17:43:36Z | MODERATE | null | {'CWE-93'} | {'https://github.com/eclipse/vert.x/commit/1bb6445226c39a95e7d07ce3caaf56828e8aab72', 'https://github.com/eclipse/vert.x/issues/2470', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=536038', 'https://access.redhat.com/errata/RHSA-2018:3768', 'https://nvd.nist.gov/vuln/detail/CVE-2018-12537', 'https://github.com/advisor... | null | {'https://github.com/eclipse/vert.x/commit/1bb6445226c39a95e7d07ce3caaf56828e8aab72'} | {'https://github.com/eclipse/vert.x/commit/1bb6445226c39a95e7d07ce3caaf56828e8aab72'} |
Maven | GHSA-6fvx-r7hx-3vh6 | JavaMelody has XXE via parseSoapMethodName in bull/javamelody/PayloadNameRequestWrapper.java. | JavaMelody before 1.74.0 has XXE via parseSoapMethodName in bull/javamelody/PayloadNameRequestWrapper.java. | {'CVE-2018-15531'} | 2022-04-27T14:30:08.045979Z | 2018-10-17T18:28:00Z | CRITICAL | null | {'CWE-611'} | {'https://github.com/javamelody/javamelody/commit/ef111822562d0b9365bd3e671a75b65bd0613353', 'https://github.com/javamelody/javamelody', 'https://jenkins.io/security/advisory/2018-09-25/', 'https://github.com/advisories/GHSA-6fvx-r7hx-3vh6', 'https://github.com/javamelody/javamelody/wiki/ReleaseNotes', 'https://nvd.nis... | null | {'https://github.com/javamelody/javamelody/commit/ef111822562d0b9365bd3e671a75b65bd0613353'} | {'https://github.com/javamelody/javamelody/commit/ef111822562d0b9365bd3e671a75b65bd0613353'} |
Maven | GHSA-rcp4-jm2v-mr3f | Cross-site scripting in Shopizer | A stored cross-site scripting (XSS) vulnerability in Shopizer before 2.17.0 allows remote attackers to inject arbitrary web script or HTML via customer_name in various forms of store administration. It is saved in the database. The code is executed for any user of store administration when information is fetched from t... | {'CVE-2021-33561'} | 2022-03-03T05:12:10.220835Z | 2021-06-08T23:10:24Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-33561', 'https://www.exploit-db.com/exploits/49901', 'https://github.com/shopizer-ecommerce/shopizer/compare/2.16.0...2.17.0', 'https://github.com/shopizer-ecommerce/shopizer/commit/197f8c78c8f673b957e41ca2c823afc654c19271'} | null | {'https://github.com/shopizer-ecommerce/shopizer/commit/197f8c78c8f673b957e41ca2c823afc654c19271'} | {'https://github.com/shopizer-ecommerce/shopizer/commit/197f8c78c8f673b957e41ca2c823afc654c19271'} |
Maven | GHSA-269g-pwp5-87pp | TemporaryFolder on unix-like systems does not limit access to created files | ### Vulnerability
The JUnit4 test rule [TemporaryFolder](https://junit.org/junit4/javadoc/4.13/org/junit/rules/TemporaryFolder.html) contains a local information disclosure vulnerability.
Example of vulnerable code:
```java
public static class HasTempFolder {
@Rule
public TemporaryFolder folder = new Temporar... | {'CVE-2020-15250'} | 2022-04-25T23:16:55.728890Z | 2020-10-12T17:33:00Z | MODERATE | null | {'CWE-732', 'CWE-200'} | {'https://lists.debian.org/debian-lts-announce/2020/11/msg00003.html', 'https://lists.apache.org/thread.html/raebf13f53cd5d23d990712e3d11c80da9a7bae94a6284050f148ed99@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rde385b8b53ed046600ef68dd6b4528dea7566aaddb02c3e702cc28bc@%3Ccommits.creadur.apac... | null | {'https://github.com/junit-team/junit4/commit/610155b8c22138329f0723eec22521627dbc52ae'} | {'https://github.com/junit-team/junit4/commit/610155b8c22138329f0723eec22521627dbc52ae'} |
Maven | GHSA-xvm2-9xvc-hx7f | Improper Restriction of XML External Entity Reference in com.monitorjbl:xlsx-streamer | ### Impact
Prior to xlsx-streamer 2.1.0, the XML parser that was used did not apply all the necessary settings to prevent XML Entity Expansion issues.
### Patches
Upgrade to version 2.1.0.
### Workarounds
No known workaround.
### References
https://github.com/monitorjbl/excel-streaming-reader/commit/0749c7b9709db078... | {'CVE-2022-23640'} | 2022-03-10T16:02:27.790970Z | 2022-03-02T21:30:54Z | CRITICAL | null | {'CWE-611'} | {'https://github.com/monitorjbl/excel-streaming-reader/commit/0749c7b9709db078ccdeada16d46a34bc2910c73', 'https://github.com/monitorjbl/excel-streaming-reader/', 'https://github.com/monitorjbl/excel-streaming-reader/security/advisories/GHSA-xvm2-9xvc-hx7f', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23640'} | null | {'https://github.com/monitorjbl/excel-streaming-reader/commit/0749c7b9709db078ccdeada16d46a34bc2910c73'} | {'https://github.com/monitorjbl/excel-streaming-reader/commit/0749c7b9709db078ccdeada16d46a34bc2910c73'} |
Maven | GHSA-p9j6-4pjr-gp48 | Path Traversal in MPXJ | common/InputStreamHelper.java in Packwood MPXJ before 8.3.5 allows directory traversal in the zip stream handler flow, leading to the writing of files to arbitrary locations. | {'CVE-2020-35460'} | 2022-03-03T05:14:13.356562Z | 2020-12-18T18:28:23Z | MODERATE | null | {'CWE-22'} | {'http://www.mpxj.org/changes-report.html#a8.3.5', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35460', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://github.com/joniles/mpxj/commit/8eaf4225048ea5ba7e59ef4556dab2098fcc4a1d'} | null | {'https://github.com/joniles/mpxj/commit/8eaf4225048ea5ba7e59ef4556dab2098fcc4a1d'} | {'https://github.com/joniles/mpxj/commit/8eaf4225048ea5ba7e59ef4556dab2098fcc4a1d'} |
Maven | GHSA-wm47-8v5p-wjpj | Possible request smuggling in HTTP/2 due missing validation | ### Impact
If a Content-Length header is present in the original HTTP/2 request, the field is not validated by `Http2MultiplexHandler` as it is propagated up. This is fine as long as the request is not proxied through as HTTP/1.1.
If the request comes in as an HTTP/2 stream, gets converted into the HTTP/1.1 domain obj... | {'CVE-2021-21295'} | 2022-04-25T20:32:04.165316Z | 2021-03-09T18:49:49Z | MODERATE | null | {'CWE-444'} | {'https://lists.apache.org/thread.html/rdb4db3f5a9c478ca52a7b164680b88877a5a9c174e7047676c006b2c@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/r8bcaf7821247b1836b10f6a1a3a3212b06272fd4cde4a859de1b78cf@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/r2936730ef0... | null | {'https://github.com/netty/netty/commit/89c241e3b1795ff257af4ad6eadc616cb2fb3dc4'} | {'https://github.com/netty/netty/commit/89c241e3b1795ff257af4ad6eadc616cb2fb3dc4'} |
Maven | GHSA-hpv8-9rq5-hq7w | Generated Code Contains Local Information Disclosure Vulnerability | ### Impact
**This vulnerability impacts generated code.** If this code was generated as a one-off occasion, not as a part of an automated CI/CD process, this code will remain vulnerable until fixed manually!
On Unix-Like systems, the system temporary directory is shared between all local users. When files/directories... | {'CVE-2021-21364'} | 2022-03-03T05:13:01.358387Z | 2021-03-11T03:09:18Z | LOW | null | {'CWE-732', 'CWE-200', 'CWE-378'} | {'https://github.com/swagger-api/swagger-codegen/security/advisories/GHSA-hpv8-9rq5-hq7w', 'https://github.com/swagger-api/swagger-codegen/commit/35adbd552d5f99b3ff1e0e59da228becc85190f2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21364'} | null | {'https://github.com/swagger-api/swagger-codegen/commit/35adbd552d5f99b3ff1e0e59da228becc85190f2'} | {'https://github.com/swagger-api/swagger-codegen/commit/35adbd552d5f99b3ff1e0e59da228becc85190f2'} |
Maven | GHSA-rpq8-mmwh-q9hm | Directory traversal in Eclipse Mojarra | Directory traversal in Eclipse Mojarra before 2.3.14 allows attackers to read arbitrary files via the loc parameter or con parameter. | {'CVE-2020-6950'} | 2022-04-22T16:01:59.732772Z | 2021-09-01T18:23:58Z | HIGH | null | {'CWE-22'} | {'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/eclipse-ee4j/mojarra/issues/4571', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=550943', 'https://nvd.nist.gov/vuln/detail/CVE-2020-6950', 'https://www.oracle.com/security-alerts/cp... | null | {'https://github.com/eclipse-ee4j/mojarra/commit/cefbb9447e7be560e59da2da6bd7cb93776f7741'} | {'https://github.com/eclipse-ee4j/mojarra/commit/cefbb9447e7be560e59da2da6bd7cb93776f7741'} |
Maven | GHSA-4pm3-f52j-8ggh | Improper Input Validation in GeoServer | ### Impact
The GeoServer security mechanism can perform an unchecked JNDI lookup, which in turn can be used to perform class deserialization and result in arbitrary code execution. The same can happen while configuring data stores with data sources located in JNDI, or while setting up the disk quota mechanism.
In order... | {'CVE-2022-24847'} | 2022-04-22T20:39:10Z | 2022-04-22T20:39:10Z | HIGH | null | {'CWE-20'} | {'https://github.com/geoserver/geoserver', 'https://github.com/geoserver/geoserver/security/advisories/GHSA-4pm3-f52j-8ggh', 'https://github.com/geoserver/geoserver/commit/b94a69943992df999d627b21a4ed056fad4569f8', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24847'} | null | {'https://github.com/geoserver/geoserver/commit/b94a69943992df999d627b21a4ed056fad4569f8'} | {'https://github.com/geoserver/geoserver/commit/b94a69943992df999d627b21a4ed056fad4569f8'} |
Maven | GHSA-jvfv-hrrc-6q72 | Improper Restriction of XML External Entity Reference in Liquibase | The XMLChangeLogSAXParser() function in Liquibase prior to version 4.8.0 contains an issue that may lead to to Improper Restriction of XML External Entity Reference. | {'CVE-2022-0839'} | 2022-03-18T21:17:01.937148Z | 2022-03-05T00:00:45Z | CRITICAL | null | {'CWE-611'} | {'https://huntr.dev/bounties/f1ae5779-b406-4594-a8a3-d089c68d6e70', 'https://github.com/liquibase/liquibase/commit/33d9d925082097fb1a3d2fc8e44423d964cd9381', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0839', 'https://github.com/liquibase/liquibase'} | null | {'https://github.com/liquibase/liquibase/commit/33d9d925082097fb1a3d2fc8e44423d964cd9381'} | {'https://github.com/liquibase/liquibase/commit/33d9d925082097fb1a3d2fc8e44423d964cd9381'} |
Maven | GHSA-7qqr-3pj3-q2f5 | XSS issues in the management interface | In system/workplace/ in Alkacon OpenCms 10.5.4 and 10.5.5, there are multiple Reflected and Stored XSS issues in the management interface. | {'CVE-2019-13236'} | 2022-03-03T05:13:13.905651Z | 2019-11-12T22:58:21Z | MODERATE | null | {'CWE-79'} | {'https://twitter.com/aetsu/status/1152096227938459648', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13236', 'https://github.com/alkacon/opencms-core/commits/branch_10_5_x', 'https://aetsu.github.io/OpenCms', 'http://packetstormsecurity.com/files/154283/Alkacon-OpenCMS-10.5.x-Cross-Site-Scripting.html'} | null | {'https://github.com/alkacon/opencms-core/commits/branch_10_5_x'} | {'https://github.com/alkacon/opencms-core/commits/branch_10_5_x'} |
Maven | GHSA-rwh9-8xx8-4wfm | Cross-site Scripting in OpenCRX | In OpenCRX, versions v4.0.0 through v5.1.0 are vulnerable to reflected Cross-site Scripting (XSS), due to unsanitized parameters in the password reset functionality. This allows execution of external javascript files on any user of the openCRX instance. | {'CVE-2021-25959'} | 2022-03-03T05:14:06.274512Z | 2021-09-30T20:50:21Z | MODERATE | null | {'CWE-79'} | {'https://github.com/opencrx/opencrx', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25959', 'https://github.com/opencrx/opencrx/commit/14e75f95e5f56fbe7ee897bdf5d858788072e818'} | null | {'https://github.com/opencrx/opencrx/commit/14e75f95e5f56fbe7ee897bdf5d858788072e818'} | {'https://github.com/opencrx/opencrx/commit/14e75f95e5f56fbe7ee897bdf5d858788072e818'} |
Maven | GHSA-q4xf-3pmq-3hw8 | Improper Restriction of XML External Entity Reference in Apache NiFi | In Apache NiFi 1.0.0 to 1.11.4, the notification service manager and various policy authorizer and user group provider objects allowed trusted administrators to inadvertently configure a potentially malicious XML file. The XML file has the ability to make external calls to services (via XXE). | {'CVE-2020-13940'} | 2022-03-03T05:14:17.513693Z | 2022-01-06T20:41:00Z | MODERATE | null | {'CWE-611'} | {'https://nifi.apache.org/security#CVE-2020-13940', 'https://github.com/apache/nifi/commit/7f0416ee8bdcee95e28409cc6fae9c1394c2a798', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13940'} | null | {'https://github.com/apache/nifi/commit/7f0416ee8bdcee95e28409cc6fae9c1394c2a798'} | {'https://github.com/apache/nifi/commit/7f0416ee8bdcee95e28409cc6fae9c1394c2a798'} |
Maven | GHSA-75vw-3m5v-fprh | corenlp is vulnerable to Improper Restriction of XML External Entity Reference | corenlp is vulnerable to Improper Restriction of XML External Entity Reference | {'CVE-2022-0239'} | 2022-03-03T05:12:48.961183Z | 2022-01-21T23:43:11Z | CRITICAL | null | {'CWE-611'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0239', 'https://github.com/stanfordnlp/corenlp', 'https://github.com/stanfordnlp/corenlp/commit/1940ffb938dc4f3f5bc5f2a2fd8b35aabbbae3dd', 'https://huntr.dev/bounties/a717aec2-5646-4a5f-ade0-dadc25736ae3'} | null | {'https://github.com/stanfordnlp/corenlp/commit/1940ffb938dc4f3f5bc5f2a2fd8b35aabbbae3dd'} | {'https://github.com/stanfordnlp/corenlp/commit/1940ffb938dc4f3f5bc5f2a2fd8b35aabbbae3dd'} |
Maven | GHSA-grg4-wf29-r9vv | Bzip2Decoder doesn't allow setting size restrictions for decompressed data | ### Impact
The Bzip2 decompression decoder function doesn't allow setting size restrictions on the decompressed output data (which affects the allocation size used during decompression).
All users of Bzip2Decoder are affected. The malicious input can trigger an OOME and so a DoS attack
### Workarounds
No workarounds... | {'CVE-2021-37136'} | 2022-04-22T15:47:10.605187Z | 2021-09-09T17:11:21Z | HIGH | null | {'CWE-400'} | {'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/netty/netty/commit/41d3d61a61608f2223bb364955ab2045dd5e4020', 'https://lists.apache.org/thread.html/rfb2bf8597e53364ccab212fbcbb2a4e9f0a9e1429b1dc08023c6868e@%3Cdev.tinkerpop.apache.org%3E', 'https://lists.apache.org/thread.html/r75490c61c2c... | null | {'https://github.com/netty/netty/commit/41d3d61a61608f2223bb364955ab2045dd5e4020'} | {'https://github.com/netty/netty/commit/41d3d61a61608f2223bb364955ab2045dd5e4020'} |
Maven | GHSA-fmj2-7wx8-qj4v | Server-side request forgery (SSRF) in Apache XmlGraphics Commons | Apache XmlGraphics Commons 2.4 is vulnerable to server-side request forgery, caused by improper input validation by the XMPParser. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests. | {'CVE-2020-11988'} | 2022-03-03T05:14:07.493019Z | 2022-02-09T00:45:56Z | HIGH | null | {'CWE-20', 'CWE-918'} | {'https://github.com/apache/xmlgraphics-commons/', 'https://github.com/apache/xmlgraphics-commons/commit/57393912eb87b994c7fed39ddf30fb778a275183', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22HESSYU7T4D6GGENUVEX3X3H6FGBECH/', 'https://lists.apache.org/thread.html/r5... | null | {'https://github.com/apache/xmlgraphics-commons/commit/57393912eb87b994c7fed39ddf30fb778a275183'} | {'https://github.com/apache/xmlgraphics-commons/commit/57393912eb87b994c7fed39ddf30fb778a275183'} |
Maven | GHSA-rrvx-pwf8-p59p | In Bouncy Castle JCE Provider the DSA key pair generator generates a weak private key if used with default values | In the Bouncy Castle JCE Provider version 1.55 and earlier the DSA key pair generator generates a weak private key if used with default values. If the JCA key pair generator is not explicitly initialised with DSA parameters, 1.55 and earlier generates a private value assuming a 1024 bit key size. In earlier releases th... | {'CVE-2016-1000343'} | 2022-04-27T13:30:10.946799Z | 2018-10-17T16:24:22Z | HIGH | null | null | {'https://github.com/advisories/GHSA-rrvx-pwf8-p59p', 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E', 'https://github.com/bcgit/bc-java', 'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://access.redhat.com/errata/RHSA-... | null | {'https://github.com/bcgit/bc-java/commit/50a53068c094d6cff37659da33c9b4505becd389#diff-5578e61500abb2b87b300d3114bdfd7d'} | {'https://github.com/bcgit/bc-java/commit/50a53068c094d6cff37659da33c9b4505becd389#diff-5578e61500abb2b87b300d3114bdfd7d'} |
Maven | GHSA-76qr-mmh8-cp8f | Moderate severity vulnerability that affects com.sparkjava:spark-core | In Spark before 2.7.2, a remote attacker can read unintended static files via various representations of absolute or relative pathnames, as demonstrated by file: URLs and directory traversal sequences. NOTE: this product is unrelated to Ignite Realtime Spark. | {'CVE-2018-9159'} | 2022-03-03T05:14:12.096573Z | 2018-10-19T16:56:00Z | MODERATE | null | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-9159', 'https://access.redhat.com/errata/RHSA-2018:2405', 'https://github.com/advisories/GHSA-76qr-mmh8-cp8f', 'https://access.redhat.com/errata/RHSA-2018:2020', 'https://github.com/perwendel/spark/commit/a221a864db28eb736d36041df2fa6eb8839fc5cd', 'http://sparkjava.com/news#s... | null | {'https://github.com/perwendel/spark/commit/a221a864db28eb736d36041df2fa6eb8839fc5cd', 'https://github.com/perwendel/spark/commit/030e9d00125cbd1ad759668f85488aba1019c668', 'https://github.com/perwendel/spark/commit/ce9e11517eca69e58ed4378d1e47a02bd06863cc'} | {'https://github.com/perwendel/spark/commit/a221a864db28eb736d36041df2fa6eb8839fc5cd', 'https://github.com/perwendel/spark/commit/ce9e11517eca69e58ed4378d1e47a02bd06863cc', 'https://github.com/perwendel/spark/commit/030e9d00125cbd1ad759668f85488aba1019c668'} |
Maven | GHSA-qh2g-7h5p-mxf4 | Credentials bypass in Apache Druid | When LDAP authentication is enabled in Apache Druid 0.17.0, callers of Druid APIs with a valid set of LDAP credentials can bypass the credentialsValidator.userSearch filter barrier that determines if a valid LDAP user is allowed to authenticate with Druid. They are still subject to role-based authorization checks, if c... | {'CVE-2020-1958'} | 2021-04-05T21:49:45Z | 2022-02-09T22:05:39Z | MODERATE | null | {'CWE-200', 'CWE-74'} | {'https://github.com/apache/druid/commit/dbaabdd24710fef726c5730c609937706f456a44#diff-fab6b7a8a160a405e787690201aade5462961550c97715ab18de6ad07a3edf7e', 'https://lists.apache.org/thread.html/rf70876ecafb45b314eff9d040c5281c4adb0cb7771eb029448cfb79b@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r1c3... | null | {'https://github.com/apache/druid/commit/dbaabdd24710fef726c5730c609937706f456a44#diff-fab6b7a8a160a405e787690201aade5462961550c97715ab18de6ad07a3edf7e'} | {'https://github.com/apache/druid/commit/dbaabdd24710fef726c5730c609937706f456a44#diff-fab6b7a8a160a405e787690201aade5462961550c97715ab18de6ad07a3edf7e'} |
Maven | GHSA-qjw2-hr98-qgfh | Unsafe Deserialization in jackson-databind | FasterXML jackson-databind 2.x before 2.6.7.5 and from 2.7.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to com.pastdev.httpcomponents.configuration.JndiConfiguration. | {'CVE-2020-24750'} | 2022-04-26T21:00:22.723871Z | 2021-12-09T19:15:36Z | HIGH | null | {'CWE-502'} | {'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://security.netapp.com/advisory/ntap-20201009-0003/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-24750', 'https://github.com/FasterXML/jackson-databind/issues/2798', 'https://github.com... | null | {'https://github.com/FasterXML/jackson-databind/commit/2118e71325486c68f089a9761c9d8a11b4ddd1cb', 'https://github.com/FasterXML/jackson-databind/commit/ad5a630174f08d279504bc51ebba8772fd71b86b'} | {'https://github.com/FasterXML/jackson-databind/commit/2118e71325486c68f089a9761c9d8a11b4ddd1cb', 'https://github.com/FasterXML/jackson-databind/commit/ad5a630174f08d279504bc51ebba8772fd71b86b'} |
Maven | GHSA-gq67-pp9w-43gp | Cryptographically weak CSRF tokens in Apache MyFaces | In the default configuration, Apache MyFaces Core versions 2.2.0 to 2.2.13, 2.3.0 to 2.3.7, 2.3-next-M1 to 2.3-next-M4, and 3.0.0-RC1 use cryptographically weak implicit and explicit cross-site request forgery (CSRF) tokens. Due to that limitation, it is possible (although difficult) for an attacker to calculate a futu... | {'CVE-2021-26296'} | 2022-03-03T05:12:05.891893Z | 2021-06-16T17:31:39Z | HIGH | null | {'CWE-330', 'CWE-352'} | {'https://security.netapp.com/advisory/ntap-20210528-0007/', 'https://lists.apache.org/thread.html/r2b73e2356c6155e9ec78fdd8f72a4fac12f3e588014f5f535106ed9b%40%3Cannounce.apache.org%3E', 'https://github.com/apache/myfaces/commit/cc6e1cc7b9aa17e52452f7f2657b3af9c421b2b2', 'https://issues.apache.org/jira/browse/MYFACES-4... | null | {'https://github.com/apache/myfaces/commit/cc6e1cc7b9aa17e52452f7f2657b3af9c421b2b2'} | {'https://github.com/apache/myfaces/commit/cc6e1cc7b9aa17e52452f7f2657b3af9c421b2b2'} |
Maven | GHSA-v84g-cf5j-xjqx | Path Traversal in Apache James Server | Apache James Server prior to version 3.6.2 contains a path traversal vulnerability. The fix for CVE-2021-40525 does not prepend delimiters upon valid directory validations. Affected implementations include: - maildir mailbox store - Sieve file repository This enables a user to access other users data stores (limited to... | {'CVE-2022-22931'} | 2022-03-03T05:13:36.937321Z | 2022-02-08T00:00:34Z | MODERATE | null | {'CWE-22'} | {'https://github.com/apache/james-project/pull/877/commits/b1e891a9e5eeadfa1d779ae50f21c73efe4d2fc7', 'https://lists.apache.org/thread/bp8yql4wws56jlh0vxoowj7foothsmpr', 'https://github.com/apache/james-project', 'https://www.openwall.com/lists/oss-security/2022/02/07/1', 'https://github.com/apache/james-project/pull/8... | null | {'https://github.com/apache/james-project/pull/877/commits/b1e891a9e5eeadfa1d779ae50f21c73efe4d2fc7'} | {'https://github.com/apache/james-project/pull/877/commits/b1e891a9e5eeadfa1d779ae50f21c73efe4d2fc7'} |
Maven | GHSA-6wqp-v4v6-c87c | Deserialization of Untrusted Data | An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a specific property), the service has the Oracle JDBC jar in the classpath, and an attacker can provide an LDAP service to access, it is possible to make the service execut... | {'CVE-2018-12023'} | 2022-03-03T05:12:41.002423Z | 2020-06-15T18:44:51Z | HIGH | null | {'CWE-502'} | {'https://access.redhat.com/errata/RHSA-2019:1108', 'https://access.redhat.com/errata/RHSA-2019:3140', 'https://nvd.nist.gov/vuln/detail/CVE-2018-12023', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://access.redhat.com/errata/RHSA-2019:2804', 'https://github.com/FasterXML/jacks... | null | {'https://github.com/FasterXML/jackson-databind/commit/28badf7ef60ac3e7ef151cd8e8ec010b8479226a'} | {'https://github.com/FasterXML/jackson-databind/commit/28badf7ef60ac3e7ef151cd8e8ec010b8479226a'} |
Maven | GHSA-v6wr-fch2-vm5w | Moderate severity vulnerability that affects com.orientechnologies:orientdb-studio | server/network/protocol/http/OHttpSessionManager.java in the Studio component in OrientDB Server Community Edition before 2.0.15 and 2.1.x before 2.1.1 improperly relies on the java.util.Random class for generation of random Session ID values, which makes it easier for remote attackers to predict a value by determining... | {'CVE-2015-2913'} | 2021-09-20T15:49:26Z | 2018-10-18T17:41:27Z | MODERATE | null | {'CWE-200'} | {'https://github.com/orientechnologies/orientdb', 'https://www.kb.cert.org/vuls/id/845332', 'https://github.com/advisories/GHSA-v6wr-fch2-vm5w', 'https://github.com/orientechnologies/orientdb/commit/668ece96be210e742a4e2820a3085b215cf55104', 'https://nvd.nist.gov/vuln/detail/CVE-2015-2913'} | null | {'https://github.com/orientechnologies/orientdb/commit/668ece96be210e742a4e2820a3085b215cf55104'} | {'https://github.com/orientechnologies/orientdb/commit/668ece96be210e742a4e2820a3085b215cf55104'} |
Maven | GHSA-9959-6p3m-wxpc | Denial of service in Netty | The SslHandler in Netty before 3.9.2 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted SSLv2Hello message. | {'CVE-2014-3488'} | 2021-09-22T18:44:46Z | 2020-06-30T21:01:31Z | MODERATE | null | {'CWE-119'} | {'https://github.com/netty/netty/commit/2fa9400a59d0563a66908aba55c41e7285a04994', 'https://snyk.io/vuln/SNYK-JAVA-ORGJBOSSNETTY-31630', 'https://github.com/netty/netty', 'http://secunia.com/advisories/59196', 'http://netty.io/news/2014/06/11/3-9-2-Final.html', 'https://nvd.nist.gov/vuln/detail/CVE-2014-3488', 'https:/... | null | {'https://github.com/netty/netty/commit/2fa9400a59d0563a66908aba55c41e7285a04994'} | {'https://github.com/netty/netty/commit/2fa9400a59d0563a66908aba55c41e7285a04994'} |
Maven | GHSA-pq4w-qm9g-qx68 | Insufficient Nonce Validation in Eclipse Milo Client | ### Impact
Credential replay affecting those connected to a server when *all 3* of the following conditions are met:
- `SecurityPolicy` is `None`
- using username/password or X509-based authentication
- the server has a defect causing it to send null/empty or zeroed nonces
### Patches
The problem has been patched in ... | {'CVE-2019-19135'} | 2022-03-03T05:14:20.050313Z | 2020-03-16T22:46:50Z | HIGH | null | {'CWE-330', 'CWE-522'} | {'https://opcfoundation.org/security-bulletins/', 'https://github.com/eclipse/milo/commit/cac0e710bf2b8bed9c602fc597e9de1d8903abed', 'https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2019-19135.pdf', 'https://github.com/eclipse/milo/security/advisories/GHSA-pq4w-qm9g-qx68', 'http... | null | {'https://github.com/eclipse/milo/commit/cac0e710bf2b8bed9c602fc597e9de1d8903abed'} | {'https://github.com/eclipse/milo/commit/cac0e710bf2b8bed9c602fc597e9de1d8903abed'} |
Maven | GHSA-c8xf-m4ff-jcxj | Moderate severity vulnerability that affects org.bouncycastle:bcprov-jdk14 and org.bouncycastle:bcprov-jdk15 | In the Bouncy Castle JCE Provider version 1.55 and earlier the primary engine class used for AES was AESFastEngine. Due to the highly table driven approach used in the algorithm it turns out that if the data channel on the CPU can be monitored the lookup table accesses are sufficient to leak information on the AES key ... | {'CVE-2016-1000339'} | 2022-03-03T05:13:14.245841Z | 2018-10-17T16:23:38Z | MODERATE | null | null | {'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://access.redhat.com/errata/RHSA-2018:2927', 'https://github.com/bcgit/bc-java/commit/8a73f08931450c17c749af067b6a8185abdfd2c0#diff-494fb066bed02aeb76b6c005632943f2', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://github.com/advisori... | null | {'https://github.com/bcgit/bc-java/commit/413b42f4d770456508585c830cfcde95f9b0e93b#diff-54656f860db94b867ba7542430cd2ef0', 'https://github.com/bcgit/bc-java/commit/8a73f08931450c17c749af067b6a8185abdfd2c0#diff-494fb066bed02aeb76b6c005632943f2'} | {'https://github.com/bcgit/bc-java/commit/8a73f08931450c17c749af067b6a8185abdfd2c0#diff-494fb066bed02aeb76b6c005632943f2', 'https://github.com/bcgit/bc-java/commit/413b42f4d770456508585c830cfcde95f9b0e93b#diff-54656f860db94b867ba7542430cd2ef0'} |
Maven | GHSA-g5wh-fw4m-2v28 | CSRF vulnerability in Jenkins autonomiq plugin | A cross-site request forgery (CSRF) vulnerability in Jenkins autonomiq Plugin 1.15 and earlier allows attackers to connect to an attacker-specified URL server using attacker-specified credentials. | {'CVE-2022-25194'} | 2022-05-04T20:57:40Z | 2022-02-16T00:01:23Z | HIGH | null | {'CWE-352'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-25194', 'https://github.com/jenkinsci/autonomiq-plugin', 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2545', 'https://github.com/jenkinsci/autonomiq-plugin/commit/e06b1ff67664a90819c9561bbc12f4c6e593d1dc'} | null | {'https://github.com/jenkinsci/autonomiq-plugin/commit/e06b1ff67664a90819c9561bbc12f4c6e593d1dc'} | {'https://github.com/jenkinsci/autonomiq-plugin/commit/e06b1ff67664a90819c9561bbc12f4c6e593d1dc'} |
Maven | GHSA-59g9-7gfx-c72p | Infinite loop in Tomcat due to parsing error | Apache Tomcat 8.5.0 to 8.5.63, 9.0.0-M1 to 9.0.43 and 10.0.0-M1 to 10.0.2 did not properly validate incoming TLS packets. When Tomcat was configured to use NIO+OpenSSL or NIO2+OpenSSL for TLS, a specially crafted packet could be used to trigger an infinite loop resulting in a denial of service. | {'CVE-2021-41079'} | 2022-03-03T05:12:12.505852Z | 2021-09-20T20:45:44Z | HIGH | null | {'CWE-20'} | {'https://www.debian.org/security/2021/dsa-4986', 'https://lists.debian.org/debian-lts-announce/2021/09/msg00012.html', 'https://security.netapp.com/advisory/ntap-20211008-0005/', 'https://lists.apache.org/thread.html/rb4de81ac647043541a32881099aa6eb5a23f1b7fd116f713f8ab9dbe@%3Cdev.tomcat.apache.org%3E', 'https://lists... | null | {'https://github.com/apache/tomcat/commit/34115fb3c83f6cd97772232316a492a4cc5729e0'} | {'https://github.com/apache/tomcat/commit/34115fb3c83f6cd97772232316a492a4cc5729e0'} |
Maven | GHSA-xwgq-pcqx-hpmv | URL Redirection to Untrusted Site (Open Redirect) in Ktor | In Ktor through 1.2.6, the client resends data from the HTTP Authorization header to a redirect location. | {'CVE-2019-19703'} | 2022-03-03T05:13:14.265291Z | 2020-02-12T18:45:50Z | MODERATE | null | {'CWE-601'} | {'https://github.com/ktorio/ktor/commit/0c108156f45423d09014b47be810188629cb878f', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19703', 'https://github.com/ktorio/ktor/issues/1467'} | null | {'https://github.com/ktorio/ktor/commit/0c108156f45423d09014b47be810188629cb878f'} | {'https://github.com/ktorio/ktor/commit/0c108156f45423d09014b47be810188629cb878f'} |
Maven | GHSA-rcj2-vvjx-87pm | Missing Encryption of Sensitive Data in arrow-kt Arrow | arrow-kt Arrow before 0.9.0 resolved Gradle build artifacts (for compiling and building the published JARs) over HTTP instead of HTTPS. Any of these dependent artifacts could have been maliciously compromised by an MITM attack. | {'CVE-2019-11404'} | 2022-03-03T05:13:24.756571Z | 2019-04-22T17:15:40Z | MODERATE | null | {'CWE-311'} | {'https://github.com/arrow-kt/ank/issues/35', 'https://github.com/arrow-kt/arrow/releases/tag/0.9.0', 'https://nvd.nist.gov/vuln/detail/CVE-2019-11404', 'https://github.com/arrow-kt/ank/pull/36', 'https://github.com/arrow-kt/arrow/issues/1310', 'https://github.com/arrow-kt/arrow/commit/74198dab522393487d5344f194dc21208... | null | {'https://github.com/arrow-kt/arrow/commit/74198dab522393487d5344f194dc21208ab71ae8'} | {'https://github.com/arrow-kt/arrow/commit/74198dab522393487d5344f194dc21208ab71ae8'} |
Maven | GHSA-xwx6-vmj4-5rv8 | Denial of service via deserialization attack in nifi | A vulnerability found in Apache NIFI before 1.5.0-RC1. Attacker can perform XXE attacks through JAXB. | {'CVE-2017-15703'} | 2022-03-03T05:12:27.401653Z | 2019-10-25T19:42:50Z | MODERATE | null | {'CWE-502'} | {'https://github.com/apache/nifi/commit/9e2c7be7d3c6a380c5f61074d9a5a690b617c3dc'} | null | {'https://github.com/apache/nifi/commit/9e2c7be7d3c6a380c5f61074d9a5a690b617c3dc'} | {'https://github.com/apache/nifi/commit/9e2c7be7d3c6a380c5f61074d9a5a690b617c3dc'} |
Maven | GHSA-2p6p-v69p-9mm9 | XSS in login form | In the Alkacon OpenCms Apollo Template 10.5.4 and 10.5.5, there is XSS in the Login form. | {'CVE-2019-13235'} | 2022-03-03T05:13:44.173532Z | 2019-11-12T22:58:16Z | MODERATE | null | {'CWE-79'} | {'https://aetsu.github.io/OpenCms', 'https://github.com/alkacon/apollo-template/commits/branch_10_5_x', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13235', 'http://packetstormsecurity.com/files/154298/Alkacon-OpenCMS-10.5.x-Cross-Site-Scripting.html'} | null | {'https://github.com/alkacon/apollo-template/commits/branch_10_5_x'} | {'https://github.com/alkacon/apollo-template/commits/branch_10_5_x'} |
Maven | GHSA-xpmx-h7xq-xffh | Potential access control security issue in apollo-adminservice | ### Impact
If users expose apollo-adminservice to internet(which is not recommended), there are potential security issues since apollo-adminservice is designed to work in intranet and it doesn't have built-in access control. Malicious hackers may access apollo-adminservice apis directly to access/edit the application's... | {'CVE-2020-15170'} | 2022-03-03T05:13:32.189742Z | 2020-10-02T16:33:41Z | HIGH | null | {'CWE-20'} | {'https://github.com/ctripcorp/apollo/pull/3233/commits/ae9ba6cfd32ed80469f162e5e3583e2477862ddf', 'https://github.com/ctripcorp/apollo', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15170', 'https://github.com/ctripcorp/apollo/security/advisories/GHSA-xpmx-h7xq-xffh'} | null | {'https://github.com/ctripcorp/apollo/pull/3233/commits/ae9ba6cfd32ed80469f162e5e3583e2477862ddf'} | {'https://github.com/ctripcorp/apollo/pull/3233/commits/ae9ba6cfd32ed80469f162e5e3583e2477862ddf'} |
Maven | GHSA-4jf5-jggp-g56j | Cross-Site Request Forgery in com.softwaremill.akka-http-session:core_2.12 | This affects the package com.softwaremill.akka-http-session:core_2.12 from 0 and before 0.6.1; all versions of package com.softwaremill.akka-http-session:core_2.11; the package com.softwaremill.akka-http-session:core_2.13 from 0 and before 0.6.1. CSRF protection can be bypassed by forging a request that contains the sa... | {'CVE-2020-28452'} | 2022-03-03T05:13:48.743049Z | 2022-01-06T20:23:05Z | HIGH | null | {'CWE-352'} | {'https://github.com/softwaremill/akka-http-session/pull/79', 'https://github.com/softwaremill/akka-http-session/issues/77', 'https://snyk.io/vuln/SNYK-JAVA-COMSOFTWAREMILLAKKAHTTPSESSION-1046674', 'https://snyk.io/vuln/SNYK-JAVA-COMSOFTWAREMILLAKKAHTTPSESSION-1058933', 'https://snyk.io/vuln/SNYK-JAVA-COMSOFTWAREMILLAK... | null | {'https://github.com/softwaremill/akka-http-session/commit/8725dccfc3143ac52304a51f4bbfda119d5ba3a1'} | {'https://github.com/softwaremill/akka-http-session/commit/8725dccfc3143ac52304a51f4bbfda119d5ba3a1'} |
Maven | GHSA-94qw-r73x-j7hg | Users with ROLE_COURSE_ADMIN can create new users in Opencast | ### Impact
Users with the role `ROLE_COURSE_ADMIN` can use the user-utils endpoint to create new users not including the role `ROLE_ADMIN`. For example:
```bash
# Use the admin to create a new user with ROLE_COURSE_ADMIN using the admin user.
# We expect this to work.
% curl -i -u admin:opencast 'https://example.open... | {'CVE-2020-5231'} | 2022-03-03T05:14:18.353152Z | 2020-01-30T21:21:37Z | MODERATE | null | {'CWE-285'} | {'https://github.com/opencast/opencast/security/advisories/GHSA-94qw-r73x-j7hg', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5231', 'https://github.com/opencast/opencast/commit/72fad0031d8a82c860e2bde0b27570c5042320ee'} | null | {'https://github.com/opencast/opencast/commit/72fad0031d8a82c860e2bde0b27570c5042320ee'} | {'https://github.com/opencast/opencast/commit/72fad0031d8a82c860e2bde0b27570c5042320ee'} |
Maven | GHSA-pfj3-56hm-jwq5 | Template injection in cron-utils | ### Impact
A Template Injection was identified in cron-utils enabling attackers to inject arbitrary Java EL expressions, leading to unauthenticated Remote Code Execution (RCE) vulnerability. Versions up to 9.1.2 are susceptible to this vulnerability. Please note, that only projects using the @Cron annotation to validat... | {'CVE-2020-26238'} | 2022-03-03T05:14:02.872232Z | 2020-11-24T23:48:38Z | CRITICAL | null | {'CWE-74'} | {'https://lists.apache.org/thread.html/r390bb7630b7ea8f02bf7adbbe69c0ae8b562c527d663c543d965f959@%3Cgitbox.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r432a69a1a85cbcb1f1bad2aa0fbfce0367bf894bf917f6ed7118e7f0@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r737406bc17d49ffe8fe6a8828d... | null | {'https://github.com/jmrozanec/cron-utils/commit/4cf373f7352f5d95f0bf6512af8af326b31c835e'} | {'https://github.com/jmrozanec/cron-utils/commit/4cf373f7352f5d95f0bf6512af8af326b31c835e'} |
Maven | GHSA-rhcw-wjcm-9h6g | Denial of service in Undertow | A flaw was found in the Undertow AJP connector. Malicious requests and abrupt connection closes could be triggered by an attacker using query strings with non-RFC compliant characters resulting in a denial of service. The highest threat from this vulnerability is to system availability. This affects Undertow 2.1.5.SP1,... | {'CVE-2020-27782'} | 2022-03-03T05:13:40.690161Z | 2022-02-09T00:54:12Z | HIGH | null | {'CWE-400'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=1901304', 'https://nvd.nist.gov/vuln/detail/CVE-2020-27782', 'https://issues.redhat.com/browse/UNDERTOW-1813', 'https://github.com/undertow-io/undertow/pull/997/commits/98a9ab7f2d7fe7a7254eaf17d47816c452169c90'} | null | {'https://github.com/undertow-io/undertow/pull/997/commits/98a9ab7f2d7fe7a7254eaf17d47816c452169c90'} | {'https://github.com/undertow-io/undertow/pull/997/commits/98a9ab7f2d7fe7a7254eaf17d47816c452169c90'} |
Maven | GHSA-3mcp-9wr4-cjqf | Remote Code Execution (RCE) vulnerability in dropwizard-validation | Dropwizard-Validation before 1.3.19, and 2.0.2 may allow arbitrary code execution on the host system, with the privileges of the Dropwizard service account, by injecting arbitrary Java Expression Language expressions when using the self-validating feature.
### Summary
A server-side template injection was identified i... | {'CVE-2020-5245'} | 2022-04-25T23:17:01.669512Z | 2020-02-24T17:27:27Z | HIGH | null | {'CWE-74'} | {'https://github.com/dropwizard/dropwizard/commit/d87d1e4f8e20f6494c0232bf8560c961b46db634', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://beanvalidation.org/2.0/spec/#validationapi-message-defaultmessageinterpolation', 'https://github.com/dropwizard/dropwizard/pull/3160', 'https://nvd.nist.gov/vul... | null | {'https://github.com/dropwizard/dropwizard/commit/d87d1e4f8e20f6494c0232bf8560c961b46db634'} | {'https://github.com/dropwizard/dropwizard/commit/d87d1e4f8e20f6494c0232bf8560c961b46db634'} |
Maven | GHSA-7qx4-pp76-vrqh | Remote code execution in Apache Commons Configuration | Apache Commons Configuration uses a third-party library to parse YAML files which by default allows the instantiation of classes if the YAML includes special statements. Apache Commons Configuration versions 2.2, 2.3, 2.4, 2.5, 2.6 did not change the default settings of this library. So if a YAML file was loaded from a... | {'CVE-2020-1953'} | 2022-03-03T05:13:45.634364Z | 2020-05-21T19:08:08Z | CRITICAL | null | {'CWE-20'} | {'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/rde2186ad6ac0d6ed8d51af7509244adcf1ce0f9a3b7e1d1dd3b64676@%3Ccommits.camel.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1953', 'https://github.com/apache/commons-configuration/commit/add7375cf37fd316d4838c6c56... | null | {'https://github.com/apache/commons-configuration/commit/add7375cf37fd316d4838c6c56b054fc293b4641'} | {'https://github.com/apache/commons-configuration/commit/add7375cf37fd316d4838c6c56b054fc293b4641'} |
Maven | GHSA-9gwx-9cwp-5c2m | Billion laughs attack (XML bomb) | ### Impact
Opencast is vulnerable to the [Billion laughs attack](https://en.wikipedia.org/wiki/Billion_laughs_attack) which allows an attacker to easily execute a (seemingly permanent) denial of service attack, essentially taking down Opencast using a single HTTP request.
Consider an XML file (`createMediaPackage.xm... | {'CVE-2021-32623'} | 2022-03-03T05:13:31.179791Z | 2021-06-17T20:11:35Z | HIGH | null | {'CWE-776'} | {'https://github.com/opencast/opencast/commit/8ae27da5a6f658011a5741b3210e715b0dc6213e', 'https://github.com/opencast/opencast', 'https://github.com/opencast/opencast/commit/16b0d641713fe31b8518fcf14fc5e4e815d81206', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32623', 'https://github.com/opencast/opencast/security/advis... | null | {'https://github.com/opencast/opencast/commit/8ae27da5a6f658011a5741b3210e715b0dc6213e', 'https://github.com/opencast/opencast/commit/16b0d641713fe31b8518fcf14fc5e4e815d81206'} | {'https://github.com/opencast/opencast/commit/8ae27da5a6f658011a5741b3210e715b0dc6213e', 'https://github.com/opencast/opencast/commit/16b0d641713fe31b8518fcf14fc5e4e815d81206'} |
Maven | GHSA-2cfc-865j-gm4w | XML External Entity Reference in detekt | Improper Restriction of XML External Entity Reference in GitHub repository detekt/detekt prior to 1.20.0. | {'CVE-2022-0272'} | 2022-04-26T13:15:13.219611Z | 2022-04-22T00:00:36Z | HIGH | null | {'CWE-611'} | {'https://github.com/detekt/detekt/commit/c965a8d2a6bbdb9bcfc6acfa7bbffd3da81f5395', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0272', 'https://github.com/detekt/detekt', 'https://huntr.dev/bounties/23e37ba7-96d5-4037-a90a-8c8f4a70ce44'} | null | {'https://github.com/detekt/detekt/commit/c965a8d2a6bbdb9bcfc6acfa7bbffd3da81f5395'} | {'https://github.com/detekt/detekt/commit/c965a8d2a6bbdb9bcfc6acfa7bbffd3da81f5395'} |
Maven | GHSA-6jmm-mp6w-4rrg | OutOfMemory Exception by specifically crafted processing instruction in NekoHtml Parser | ### Impact
NekoHtml Parser suffers from a denial of service vulnerability on versions 2.60.0 and below. A specifically crafted input regarding the parsing of processing instructions leads to heap memory consumption. Please update to version 2.61.0.
### For more information
If you have any questions or comments about t... | {'CVE-2022-29546'} | 2022-05-02T20:06:31.677428Z | 2022-04-26T21:14:57Z | MODERATE | null | {'CWE-400'} | {'https://github.com/HtmlUnit/htmlunit-neko/commit/9d2aecd69223469e40c12ca3edddda09009110cc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-29546', 'https://github.com/HtmlUnit/htmlunit-neko', 'https://github.com/HtmlUnit/htmlunit-neko/security/advisories/GHSA-6jmm-mp6w-4rrg'} | null | {'https://github.com/HtmlUnit/htmlunit-neko/commit/9d2aecd69223469e40c12ca3edddda09009110cc'} | {'https://github.com/HtmlUnit/htmlunit-neko/commit/9d2aecd69223469e40c12ca3edddda09009110cc'} |
Maven | GHSA-gprm-xqrc-c2j3 | Command Injection in Kylin | Kylin has some restful apis which will concatenate os command with the user input string, a user is likely to be able to execute any os command without any protection or validation. | {'CVE-2020-1956'} | 2022-03-03T05:13:34.310834Z | 2020-07-27T22:51:44Z | HIGH | null | {'CWE-78'} | {'https://lists.apache.org/thread.html/r250a867961cfd6e0506240a9c7eaee782d84c6ab0091c7c4bc45f3eb@%3Cuser.kylin.apache.org%3E', 'https://lists.apache.org/thread.html/r61666760d8a4e8764b2d5fe158d8a48b569414480fbfadede574cdc0@%3Ccommits.kylin.apache.org%3E', 'https://github.com/apache/kylin', 'https://snyk.io/vuln/SNYK-JA... | null | {'https://github.com/apache/kylin/commit/58fad56ac6aaa43c6bd8f962d7f2d84438664092'} | {'https://github.com/apache/kylin/commit/58fad56ac6aaa43c6bd8f962d7f2d84438664092'} |
Maven | GHSA-px4w-rcv2-6x8x | Arbitrary code execution in Apache ServiceComb java-chassis | When handler-router component is enabled in servicecomb-java-chassis, authenticated user may inject some data and cause arbitrary code execution.
The problem happens in versions between 2.0.0 ~ 2.1.3 and fixed in Apache ServiceComb-Java-Chassis 2.1.5 | {'CVE-2020-17532'} | 2022-03-03T05:13:16.049601Z | 2022-02-09T22:19:00Z | HIGH | null | {'CWE-502'} | {'https://seclists.org/oss-sec/2021/q1/60', 'https://issues.apache.org/jira/browse/SCB-2145', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17532', 'https://github.com/apache/servicecomb-java-chassis/commit/839a52e27c754cb5ce14f20063902f21065bd26c', 'https://github.com/apache/servicecomb-java-chassis/commit/ba4fb37b6ab8bd... | null | {'https://github.com/apache/servicecomb-java-chassis/commit/839a52e27c754cb5ce14f20063902f21065bd26c', 'https://github.com/apache/servicecomb-java-chassis/commit/ba4fb37b6ab8bd3a6c3d0693f295d99a94879838'} | {'https://github.com/apache/servicecomb-java-chassis/commit/839a52e27c754cb5ce14f20063902f21065bd26c', 'https://github.com/apache/servicecomb-java-chassis/commit/ba4fb37b6ab8bd3a6c3d0693f295d99a94879838'} |
Maven | GHSA-px9h-x66r-8mpc | path traversal in Jooby | ### Impact
Access to sensitive information available from classpath.
### Patches
Patched version: 1.6.7 and 2.8.2
Commit 1.x: https://github.com/jooby-project/jooby/commit/34f526028e6cd0652125baa33936ffb6a8a4a009
Commit 2.x: https://github.com/jooby-project/jooby/commit/c81479de67036993f406ccdec23990b44b0bec32
###... | {'CVE-2020-7647'} | 2022-03-03T05:13:34.682100Z | 2020-05-13T16:29:26Z | MODERATE | null | {'CWE-22'} | {'https://snyk.io/vuln/SNYK-JAVA-IOJOOBY-568806', 'https://snyk.io/vuln/SNYK-JAVA-ORGJOOBY-568807,', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7647', 'https://github.com/jooby-project/jooby/security/advisories/GHSA-px9h-x66r-8mpc', 'https://snyk.io/vuln/SNYK-JAVA-ORGJOOBY-568807', 'https://github.com/jooby-project/joo... | null | {'https://github.com/jooby-project/jooby/commit/34f526028e6cd0652125baa33936ffb6a8a4a009'} | {'https://github.com/jooby-project/jooby/commit/34f526028e6cd0652125baa33936ffb6a8a4a009'} |
Maven | GHSA-jp55-vvmf-63mv | URL Redirection to Untrusted Site ('Open Redirect') | ### Impact
There's no protection against URL redirection to untrusted site, in particular some well known parameters (xredirect) can be used to perform such redirections.
### Patches
The problem has been patched in XWiki 12.10.7 and XWiki 13.3RC1.
### Workarounds
There's no known workaround for this issue.
### Refe... | {'CVE-2022-23618'} | 2022-02-09T21:42:47Z | 2022-02-09T21:42:47Z | MODERATE | null | {'CWE-601'} | {'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-jp55-vvmf-63mv', 'https://github.com/xwiki/xwiki-platform/commit/5251c02080466bf9fb55288f04a37671108f8096', 'https://github.com/xwiki/xwiki-platform', 'https://jira.xwiki.org/browse/XWIKI-10309', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23618'} | null | {'https://github.com/xwiki/xwiki-platform/commit/5251c02080466bf9fb55288f04a37671108f8096'} | {'https://github.com/xwiki/xwiki-platform/commit/5251c02080466bf9fb55288f04a37671108f8096'} |
Maven | GHSA-mc6h-4qgp-37qh | Deserialization of untrusted data in Jackson Databind | FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to org.jsecurity.realm.jndi.JndiRealmFactory (aka org.jsecurity). | {'CVE-2020-14195'} | 2022-03-03T05:12:46.699406Z | 2020-06-18T14:44:43Z | HIGH | null | {'CWE-502'} | {'https://github.com/FasterXML/jackson-databind/issues/2765', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14195', 'https://lists.debian.org/debian-lts-announce/2020/07/msg00001.html', 'https://github.com/FasterXML/jackson-databind', 'https://security.netapp.com/advisory/ntap-20200702-0003/', 'https://github.com/FasterXM... | null | {'https://github.com/FasterXML/jackson-databind/commit/f6d9c664f6d481703138319f6a0f1fdbddb3a259'} | {'https://github.com/FasterXML/jackson-databind/commit/f6d9c664f6d481703138319f6a0f1fdbddb3a259'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.