ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Maven
GHSA-73xv-w5gp-frxh
Logic error in Legion of the Bouncy Castle BC Java
An issue was discovered in Legion of the Bouncy Castle BC Java 1.65 and 1.66. The OpenBSDBCrypt.checkPassword utility method compared incorrect data when checking the password, allowing incorrect passwords to indicate they were matching with previously hashed ones that were different.
{'CVE-2020-28052'}
2022-04-22T17:31:09.893912Z
2021-04-30T16:14:15Z
HIGH
null
{'CWE-670'}
{'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28052', 'https://lists.apache.org/thread.html/r77af3ac7c3bfbd5454546e13faf7aec21d627bdcf36c9ca240436b94@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r2ddabd06d94b60cfb0141e4abb23201c628ab925e30742f61a04d013@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r167dbc42ef7c59802c2ca1ac14735ef9cf687c25208229993d6206fe@%3Cissues.karaf.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.apache.org/thread.html/r37d332c0bf772f4982d1fdeeb2f88dd71dab6451213e69e43734eadc@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rc9e441c1576bdc4375d32526d5cf457226928e9c87b9f54ded26271c@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/rdcbad6d8ce72c79827ed8c635f9a62dd919bb21c94a0b64cab2efc31@%3Cissues.karaf.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/r25d53acd06f29244b8a103781b0339c5e7efee9099a4d52f0c230e4a@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rf9abfc0223747a56694825c050cc6b66627a293a32ea926b3de22402@%3Cissues.karaf.apache.org%3E', 'https://github.com/bcgit/bc-java/commit/97578f9b7ed277e6ecb58834e85e3d18385a4219', 'https://lists.apache.org/thread.html/r30a139c165b3da6e0d5536434ab1550534011b1fdfcd2f5d95892c5b@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r8c36ba34e80e05eecb1f80071cc834d705616f315b634ec0c7d8f42e@%3Cissues.solr.apache.org%3E', 'https://github.com/bcgit/bc-java', 'https://lists.apache.org/thread.html/r175f5a25d100dbe2b1bd3459b3ce882a84c3ff91b120ed4ff2d57b53@%3Ccommits.pulsar.apache.org%3E', 'https://github.com/bcgit/bc-java/wiki/CVE-2020-28052', 'https://www.bouncycastle.org/releasenotes.html', 'https://www.synopsys.com/blogs/software-security/cve-2020-28052-bouncy-castle/', 'https://lists.apache.org/thread.html/rddd2237b8636a48d573869006ee809262525efb2b6ffa6eff50d2a2d@%3Cjira.kafka.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r4e1619cfefcd031fac62064a3858f5c9229eef907bd5d8ef14c594fc@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r954d80fd18e9dafef6e813963eb7e08c228151c2b6268ecd63b35d1f@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rdfd2901b8b697a3f6e2c9c6ecc688fd90d7f881937affb5144d61d6e@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rcd37d9214b08067a2e8f2b5b4fd123a1f8cb6008698d11ef44028c21@%3Cissues.karaf.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/rfc0db1f3c375087e69a239f9284ded72d04fbb55849eadde58fa9dc2@%3Cissues.karaf.apache.org%3E'}
null
Maven
GHSA-73cq-fhp3-8rpw
Moderate severity vulnerability that affects org.restlet.jse:org.restlet
Restlet Framework 2.1.x before 2.1.7 and 2.x.x before 2.2 RC1, when using XMLRepresentation or XML serializers, allows attackers to cause a denial of service via an XML Entity Expansion (XEE) attack.
{'CVE-2014-1868'}
2021-09-02T19:18:12Z
2018-10-17T00:04:53Z
MODERATE
null
{'CWE-776'}
{'https://github.com/restlet/restlet-framework-java/wiki/XEE-security-enhancements', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/91181', 'http://secunia.com/advisories/56940', 'https://nvd.nist.gov/vuln/detail/CVE-2014-1868', 'https://github.com/restlet/restlet-framework-java', 'https://github.com/advisories/GHSA-73cq-fhp3-8rpw'}
null
Maven
GHSA-959q-32g8-vvp7
Moderate severity vulnerability that affects org.keycloak:keycloak-core
It was found that keycloak before 3.4.2 final would permit misuse of a client-side /etc/hosts entry to spoof a URL in a password reset request. An attacker could use this flaw to craft a malicious password reset request and gain a valid reset token, leading to information disclosure or further attacks.
{'CVE-2017-12161'}
2022-03-03T05:13:30.784473Z
2018-10-18T16:50:05Z
MODERATE
null
{'CWE-602'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=1484564', 'https://github.com/keycloak/keycloak-documentation/pull/268/commits/a2b58aadee42af2c375b72e86dffc2cf23cc3770', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12161', 'https://github.com/advisories/GHSA-959q-32g8-vvp7'}
null
Maven
GHSA-6mqq-8r44-vmjc
Low severity vulnerability that affects org.apache.spark:spark-core_2.10 and org.apache.spark:spark-core_2.11
In Apache Spark 1.0.0 to 2.1.2, 2.2.0 to 2.2.1, and 2.3.0, when using PySpark or SparkR, it's possible for a different local user to connect to the Spark application and impersonate the user running the Spark application.
{'CVE-2018-1334'}
2022-03-03T05:13:36.137085Z
2019-03-14T15:41:04Z
MODERATE
null
{'CWE-200'}
{'https://lists.apache.org/thread.html/4d6d210e319a501b740293daaeeeadb51927111fb8261a3e4cd60060@%3Cdev.spark.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1334', 'https://github.com/advisories/GHSA-6mqq-8r44-vmjc', 'https://spark.apache.org/security.html#CVE-2018-1334'}
null
Maven
GHSA-7ph6-5cmq-xgjq
Path traversal in xwiki-platform-skin-skinx
### Impact AbstractSxExportURLFactoryActionHandler#processSx does not escape anything from SSX document reference when serializing it on filesystem, so it's easy to mess up the HTML export process with reference elements containing filesystem syntax like "../", "./". or "/" in general (the last two not causing any security threat, but can cause conflicts with others serialized files). ### Patches Fixed in 13.6-rc-1 ### Workarounds * giving script or subwiki admin right only to trusted people * disabling HTML/PDF export ### References https://jira.xwiki.org/browse/XWIKI-18819 ### For more information If you have any questions or comments about this advisory: * Open an issue in [JIRA](https://jira.xwiki.org) * Email us at [XWiki Security Mailing list](mailto:security@xwiki.org)
{'CVE-2022-23620'}
2022-02-09T21:53:29Z
2022-02-09T21:53:29Z
MODERATE
null
{'CWE-22'}
{'https://github.com/xwiki/xwiki-platform/commit/ab778254fb8f71c774e1c1239368c44fe3b6bba5', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-7ph6-5cmq-xgjq', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23620', 'https://github.com/xwiki/xwiki-platform', 'https://jira.xwiki.org/browse/XWIKI-18819'}
null
Maven
GHSA-gchq-9r68-6jwv
Cross-Site Request Forgery in Jenkins Credentials Plugin
Jenkins Credentials Plugin 2.3.18 and earlier does not escape user-controlled information on a view it provides, resulting in a reflected cross-site scripting (XSS) vulnerability.
{'CVE-2021-21648'}
2021-05-19T19:18:23Z
2021-06-16T17:24:31Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21648', 'https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2349'}
null
Maven
GHSA-vm59-329q-p468
Cross-site Scripting in Apache UIMA
This vulnerability relates to the user's browser processing of DUCC webpage input data.The javascript comprising Apache UIMA DUCC (<= 2.2.2) which runs in the user's browser does not sufficiently filter user supplied inputs, which may result in unintended execution of user supplied javascript code.
{'CVE-2018-8035'}
2022-03-03T05:13:27.945205Z
2019-05-14T04:00:37Z
MODERATE
null
{'CWE-79'}
{'https://uima.apache.org/security_report', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8035'}
null
Maven
GHSA-4fcw-pq4r-f4q7
Server-Side Request Forgery in Spinnaker Orca
The Spinnaker template resolution functionality is vulnerable to Server-Side Request Forgery (SSRF), which allows an attacker to send requests on behalf of Spinnaker potentially leading to sensitive data disclosure.
{'CVE-2020-9298'}
2021-05-05T19:53:13Z
2021-05-07T15:54:31Z
HIGH
null
{'CWE-918'}
{'https://github.com/spinnaker/orca/pull/3706/commits/4f3c07da8fcacd67bb1984aef11b2066f2c0d11c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9298', 'https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2020-003.md', 'https://github.com/spinnaker/orca/releases/tag/v8.7.0'}
null
Maven
GHSA-5q8m-mqmx-pxp9
Spring Data Commons contain a property path parser vulnerability caused by unlimited resource allocation
Spring Data Commons, versions 1.13 to 1.13.10, 2.0 to 2.0.5, and older unsupported versions, contain a property path parser vulnerability caused by unlimited resource allocation. An unauthenticated remote malicious user (or attacker) can issue requests against Spring Data REST endpoints or endpoints using property path parsing which can cause a denial of service (CPU and memory consumption).
{'CVE-2018-1274'}
2022-04-27T14:00:15.080491Z
2018-10-17T17:23:44Z
HIGH
null
{'CWE-770'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-1274', 'https://pivotal.io/security/cve-2018-1274', 'https://github.com/advisories/GHSA-5q8m-mqmx-pxp9', 'http://www.securityfocus.com/bid/103769'}
null
Maven
GHSA-c7fh-chf7-jr5x
ReDOS in Vfsjfilechooser2
A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in Vfsjfilechooser2 which occurs when the application attempts to validate crafted URIs.
{'CVE-2021-29061'}
2022-03-03T05:13:58.202139Z
2022-01-06T18:44:27Z
HIGH
null
{'CWE-770'}
{'https://github.com/fracpete/vfsjfilechooser2/issues/7', 'https://github.com/yetingli/PoCs/blob/main/CVE-2021-29061/Vfsjfilechooser2.md', 'https://github.com/fracpete/vfsjfilechooser2/releases/tag/vfsjfilechooser2-0.2.9', 'https://github.com/yetingli/SaveResults/blob/main/md/vfsjfilechooser2.md', 'https://github.com/fracpete/vfsjfilechooser2/commit/9c9f2c317f3de5ece60a3ae28c371e9796e3909b', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29061'}
null
Maven
GHSA-vrh8-27q8-fr8f
Low severity vulnerability that affects org.apache.solr:solr-core
Server Side Request Forgery in Apache Solr, versions 1.3 until 7.6 (inclusive). Since the "shards" parameter does not have a corresponding whitelist mechanism, a remote attacker with access to the server could make Solr perform an HTTP GET request to any reachable URL.
{'CVE-2017-3164'}
2022-03-03T05:13:31.195986Z
2019-03-14T15:39:56Z
HIGH
null
{'CWE-918'}
{'https://lists.apache.org/thread.html/e0f9c652b57a91fdcc287efcead620af9f4d8e46b88f0b761aa265de@%3Cdev.lucene.apache.org%3E', 'http://mail-archives.apache.org/mod_mbox/www-announce/201902.mbox/%3CCAECwjAVjBN%3DwO5rYs6ktAX-5%3D-f5JDFwbbTSM2TTjEbGO5jKKA%40mail.gmail.com%3E', 'https://lists.apache.org/thread.html/ca3105b6934ccd28e843dffe39724f6963ff49825e9b709837203649@%3Cdev.lucene.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20190327-0003/', 'https://github.com/advisories/GHSA-vrh8-27q8-fr8f', 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/rc400db37710ee79378b6c52de3640493ff538c2beb41cefdbbdf2ab8@%3Ccommits.submarine.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'http://www.securityfocus.com/bid/107026', 'https://lists.apache.org/thread.html/43026507844ada1ac658ccf7bc939378c13e492fd6538416ce65df39@%3Cdev.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/75dc651478f9d04505b46d44fe3ac739e7aaf3d7bf1257973685f8f7@%3Cdev.lucene.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2017-3164'}
null
Maven
GHSA-v35c-49j6-q8hq
Security Constraint Bypass in Spring Security
Spring Security does not consider URL path parameters when processing security constraints. By adding a URL path parameter with an encoded "/" to a request, an attacker may be able to bypass a security constraint. The root cause of this issue is a lack of clarity regarding the handling of path parameters in the Servlet Specification (see below). Some Servlet containers include path parameters in the value returned for getPathInfo() and some do not. Spring Security uses the value returned by getPathInfo() as part of the process of mapping requests to security constraints. The unexpected presence of path parameters can cause a constraint to be bypassed. Users of Apache Tomcat (all current versions) are not affected by this vulnerability since Tomcat follows the guidance previously provided by the Servlet Expert group and strips path parameters from the value returned by getContextPath(), getServletPath() and getPathInfo() [1]. Users of other Servlet containers based on Apache Tomcat may or may not be affected depending on whether or not the handling of path parameters has been modified. Users of IBM WebSphere Application Server 8.5.x are known to be affected. Users of other containers that implement the Servlet specification may be affected. [1] https://issues.apache.org/bugzilla/show_bug.cgi?id=25015 ## Affected Pivotal Products and Versions Severity is high unless otherwise noted. - Spring Security 3.2.0 - 3.2.9 - Spring Security 4.0.x - 4.1.3 - Spring Security 4.2.0 - Older unsupported versions are also affected ## Mitigation Adopting one of the following mitigations will protect against this vulnerability. - Use a Servlet container known not to include path parameters in the return values for getServletPath() and getPathInfo() - Upgrading to Spring Security 3.2.10, 4.1.4 or 4.2.1 will reject the request with a RequestRejectedException if the presence of an encoded "/" is detected. Note: If you wish to disable this feature it can be disabled by setting the DefaultHttpFirewall.allowUrlEncodedSlash = true. However, disabling this feature will mean applications are vulnerable (in containers that return path parameters in getServletPath() or getPathInfo()). ## Credit The issue was identified by Shumpei Asahara & Yuji Ito from NTT DATA Corporation and responsibly reported to Pivotal.
{'CVE-2016-9879'}
2022-03-03T05:13:03.921203Z
2020-09-15T20:30:34Z
HIGH
null
null
{'https://pivotal.io/security/cve-2016-9879', 'https://access.redhat.com/errata/RHSA-2017:1832', 'http://www.securityfocus.com/bid/95142', 'https://nvd.nist.gov/vuln/detail/CVE-2016-9879'}
null
Maven
GHSA-5qx5-vg5w-5mx3
Stored XSS vulnerability in Jenkins Badge Plugin
Jenkins Badge Plugin 1.9 and earlier does not escape the description and does not check for allowed protocols when creating a badge, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
{'CVE-2022-23108'}
2022-04-29T04:45:37.432779Z
2022-01-13T00:00:54Z
MODERATE
null
{'CWE-79'}
{'https://github.com/jenkinsci/badge-plugin', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23108', 'https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2547', 'http://www.openwall.com/lists/oss-security/2022/01/12/6'}
null
Maven
GHSA-7cj4-gj8m-m2f7
Authentication bypass in Apache Shiro
Apache Shiro before 1.7.0, when using Apache Shiro with Spring, a specially crafted HTTP request may cause an authentication bypass.
{'CVE-2020-17510'}
2022-03-03T05:13:46.136754Z
2021-04-22T16:13:23Z
CRITICAL
null
{'CWE-287'}
{'https://lists.debian.org/debian-lts-announce/2021/08/msg00002.html', 'https://github.com/apache/shiro', 'https://lists.apache.org/thread.html/r95bdf3703858b5f958b5e190d747421771b430d97095880db91980d6@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/rb47d88af224e396ee34ffb88ee99fb6d04510de5722cf14b7137e6bc@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r70b907ccb306e9391145e2b10f56cc6914a245f91720a17a486c020a@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r9d93dfb5df016b1a71a808486bc8f9fbafebbdbc8533625f91253f1d@%3Cdev.shiro.apache.org%3E', 'https://github.com/apache/shiro/commit/dc194fc977ab6cfbf3c1ecb085e2bac5db14af6d', 'https://lists.apache.org/thread.html/r852971e28f54cafa7d325bd7033115c67d613b112a2a1076817390ac@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/re25b8317b00a50272a7252c4552cf1a81a97984cc2111ef7728e48e0@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r70098e336d02047ce4d4e69293fe8d558cd68cde06f6430398959bc4@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/rc2cff2538b683d480426393eecf1ce8dd80e052fbef49303b4f47171%40%3Cdev.shiro.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17510', 'https://lists.apache.org/thread.html/r575301804bfac87a064359cf4b4ae9d514f2d10db7d44120765f4129@%3Cdev.shiro.apache.org%3E'}
null
Maven
GHSA-j379-9jr9-w5cq
Moderate severity vulnerability that affects com.squareup.retrofit2:retrofit
Square Open Source Retrofit versions prior to commit 4a693c5aeeef2be6c7ecf80e7b5ec79f6ab59437 contain a XML External Entity (XXE) vulnerability in JAXB. An attacker could use this to remotely read files from the file system or to perform SSRF. This vulnerability appears to have been fixed in commit 4a693c5aeeef2be6c7ecf80e7b5ec79f6ab59437.
{'CVE-2018-1000844'}
2022-03-03T05:13:48.459422Z
2018-12-21T17:48:26Z
CRITICAL
null
{'CWE-611'}
{'https://github.com/square/retrofit/pull/2735', 'https://github.com/square/retrofit', 'https://github.com/advisories/GHSA-j379-9jr9-w5cq', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000844'}
null
Maven
GHSA-rgh3-987h-wpmw
XML External Entity Injection in XStream
Multiple XML external entity (XXE) vulnerabilities in the (1) Dom4JDriver, (2) DomDriver, (3) JDomDriver, (4) JDom2Driver, (5) SjsxpDriver, (6) StandardStaxDriver, and (7) WstxDriver drivers in XStream before 1.4.9 allow remote attackers to read arbitrary files via a crafted XML document.
{'CVE-2016-3674'}
2022-03-03T05:13:24.310443Z
2020-06-30T22:48:14Z
HIGH
null
{'CWE-200'}
{'http://rhn.redhat.com/errata/RHSA-2016-2822.html', 'http://www.securityfocus.com/bid/85381', 'http://x-stream.github.io/changes.html#1.4.9', 'http://rhn.redhat.com/errata/RHSA-2016-2823.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183180.html', 'https://snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-30385', 'http://www.openwall.com/lists/oss-security/2016/03/28/1', 'http://www.openwall.com/lists/oss-security/2016/03/25/8', 'https://nvd.nist.gov/vuln/detail/CVE-2016-3674', 'http://www.debian.org/security/2016/dsa-3575', 'https://github.com/x-stream/xstream', 'http://www.securitytracker.com/id/1036419', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183208.html', 'https://github.com/x-stream/xstream/issues/25'}
null
Maven
GHSA-wr5r-m8pc-85j9
Low severity vulnerability that affects org.springframework.integration:spring-integration-ws and org.springframework.integration:spring-integration-xml
Spring Integration (spring-integration-xml and spring-integration-ws modules), versions 4.3.18, 5.0.10, 5.1.1, and older unsupported versions, were susceptible to XML External Entity Injection (XXE) when receiving XML data from untrusted sources.
{'CVE-2019-3772'}
2022-03-03T05:13:41.869918Z
2019-01-25T16:18:49Z
LOW
null
{'CWE-611'}
{'https://pivotal.io/security/cve-2019-3772', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://github.com/advisories/GHSA-wr5r-m8pc-85j9', 'http://www.securityfocus.com/bid/106749', 'https://nvd.nist.gov/vuln/detail/CVE-2019-3772'}
null
Maven
GHSA-54fx-gm74-q676
Permissions bypass in SmallRye
A flaw was found in SmallRye's API through version 1.6.1. The API can allow other code running within the application server to potentially obtain the ClassLoader, bypassing any permissions checks that should have been applied. The largest threat from this vulnerability is a threat to data confidentiality. This is fixed in SmallRye 1.6.2
{'CVE-2020-1729'}
2022-03-18T18:03:03.686621Z
2022-03-18T17:55:47Z
MODERATE
null
{'CWE-863'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-1729', 'https://bugzilla.redhat.com/show_bug.cgi?id=1802444', 'https://github.com/smallrye/smallrye-config/commit/fb0def6f61c09a2a80c9145e4ec6521225cd0b99'}
null
Maven
GHSA-hf4p-jm7r-vjjj
Deserialization of Untrusted Data in EthereumJ
An issue was discovered in EthereumJ 1.8.2. There is Unsafe Deserialization in ois.readObject in mine/Ethash.java and decoder.readObject in crypto/ECKey.java. When a node syncs and mines a new block, arbitrary OS commands can be run on the server.
{'CVE-2018-15890'}
2021-08-17T19:40:00Z
2019-07-26T16:10:39Z
CRITICAL
null
{'CWE-502'}
{'https://github.com/ethereum/ethereumj/issues/1161', 'https://github.com/frohoff/ysoserial/', 'https://github.com/ethereum/ethereumj', 'https://nvd.nist.gov/vuln/detail/CVE-2018-15890'}
null
Maven
GHSA-9h6g-6mxg-vvp4
Timing side channel vulnerability in endpoint request handler in Vaadin 15-19
Non-constant-time comparison of CSRF tokens in endpoint request handler in `com.vaadin:flow-server` versions 3.0.0 through 5.0.3 (Vaadin 15.0.0 through 18.0.6), and com.vaadin:fusion-endpoint version 6.0.0 (Vaadin 19.0.0) allows attacker to guess a security token for Fusion endpoints via timing attack. - https://vaadin.com/security/cve-2021-31406
null
2022-03-03T05:13:06.163424Z
2021-04-19T14:47:18Z
MODERATE
null
{'CWE-208'}
{'https://github.com/vaadin/platform/', 'https://github.com/vaadin/platform/security/advisories/GHSA-9h6g-6mxg-vvp4', 'https://vaadin.com/security/cve-2021-31406'}
null
Maven
GHSA-c8cc-p3j7-4c7f
Moderate severity vulnerability that affects org.apache.mesos:mesos
Apache Mesos can be configured to require authentication to call the Executor HTTP API using JSON Web Token (JWT). In Apache Mesos versions pre-1.4.2, 1.5.0, 1.5.1, 1.6.0 the comparison of the generated HMAC value against the provided signature in the JWT implementation used is vulnerable to a timing attack because instead of a constant-time string comparison routine a standard `==` operator has been used. A malicious actor can therefore abuse the timing difference of when the JWT validation function returns to reveal the correct HMAC value.
{'CVE-2018-8023'}
2022-03-03T05:14:20.663462Z
2018-10-17T19:54:14Z
MODERATE
null
{'CWE-200'}
{'https://lists.apache.org/thread.html/r0dd7ff197b2e3bdd80a0326587ca3d0c22e10d1dba17c769d6da7d7a@%3Cuser.flink.apache.org%3E', 'https://github.com/advisories/GHSA-c8cc-p3j7-4c7f', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8023', 'https://lists.apache.org/thread.html/9b9d3f6bd09f3ebd2284b82077033bdc71da550a1c4c010c2494acc3@%3Cdev.mesos.apache.org%3E'}
null
Maven
GHSA-jjpq-gp5q-8q6w
Cross-site scripting in Apache Tomcat
The SSI printenv command in Apache Tomcat 9.0.0.M1 to 9.0.0.17, 8.5.0 to 8.5.39 and 7.0.0 to 7.0.93 echoes user provided data without escaping and is, therefore, vulnerable to XSS. SSI is disabled by default. The printenv command is intended for debugging and is unlikely to be present in a production website.
{'CVE-2019-0221'}
2022-03-03T05:14:20.702656Z
2019-05-30T03:30:42Z
MODERATE
null
{'CWE-79'}
{'http://www.securityfocus.com/bid/108545', 'https://seclists.org/bugtraq/2019/Dec/43', 'http://packetstormsecurity.com/files/163457/Apache-Tomcat-9.0.0.M1-Cross-Site-Scripting.html', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00090.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00054.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQTZ5BJ5F4KV6N53SGNKSW3UY5DBIQ46/', 'https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E', 'https://www.debian.org/security/2019/dsa-4596', 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.debian.org/debian-lts-announce/2019/08/msg00015.html', 'https://access.redhat.com/errata/RHSA-2019:3931', 'https://security.netapp.com/advisory/ntap-20190606-0001/', 'https://security.gentoo.org/glsa/202003-43', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0221', 'https://access.redhat.com/errata/RHSA-2019:3929', 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2019/05/msg00044.html', 'https://support.f5.com/csp/article/K13184144?utm_source=f5support&amp;utm_medium=RSS', 'https://usn.ubuntu.com/4128-2/', 'https://usn.ubuntu.com/4128-1/', 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/6e6e9eacf7b28fd63d249711e9d3ccd4e0a83f556e324aee37be5a8c@%3Cannounce.tomcat.apache.org%3E', 'https://wwws.nightwatchcybersecurity.com/2019/05/27/xss-in-ssi-printenv-command-apache-tomcat-cve-2019-0221/', 'http://seclists.org/fulldisclosure/2019/May/50', 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NPHQEL5AQ6LZSZD2Y6TYZ4RC3WI7NXJ3/'}
null
Maven
GHSA-4c7h-f2j9-9c46
Missing permission Phoenix AutoTest Plugin
A missing permission check in Jenkins Pipeline: Phoenix AutoTest Plugin 1.3 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
{'CVE-2022-28158'}
2022-04-05T20:05:40.898501Z
2022-03-30T00:00:21Z
MODERATE
null
{'CWE-862'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-28158', 'http://www.openwall.com/lists/oss-security/2022/03/29/1', 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2685', 'https://github.com/jenkinsci/phoenix-autotest-plugin'}
null
Maven
GHSA-6xq8-pvg4-3mf3
Moderate severity vulnerability that affects org.eclipse.rdf4j:rdf4j-runtime
Eclipse RDF4j version < 2.4.0 Milestone 2 contains a XML External Entity (XXE) vulnerability in RDF4j XML parser parsing RDF files that can result in the disclosure of confidential data, denial of service, server side request forgery, port scanning. This attack appear to be exploitable via Specially crafted RDF file.
{'CVE-2018-1000644'}
2022-03-03T05:13:27.912213Z
2018-10-19T16:54:11Z
CRITICAL
null
{'CWE-611'}
{'https://github.com/advisories/GHSA-6xq8-pvg4-3mf3', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000644', 'https://github.com/eclipse/rdf4j/issues/1056', 'https://github.com/eclipse/rdf4j', 'https://0dd.zone/2018/08/05/rdf4j-XXE/'}
null
Maven
GHSA-36hp-jr8h-556f
Authentication Bypass
When configured to use authentication (`-Dnacos.core.auth.enabled=true`) Nacos uses the `AuthFilter` servlet filter to enforce authentication. This filter has a [backdoor](https://github.com/alibaba/nacos/blob/5fa05aef52f7432aeab19fe53035431b9d8c91d9/core/src/main/java/com/alibaba/nacos/core/auth/AuthFilter.java#L78-L81) that enables Nacos servers to bypass this filter and therefore skip authentication checks. This mechanism relies on the `user-agent` HTTP header so it can be easily spoofed. The following request to the `configuration` endpoint gets rejected as we are not providing any credentials: ``` ❯ curl -X POST "http://127.0.0.1:8848/nacos/v1/cs/configs?dataId=nacos.cfg.dataIdfoo&group=foo&content=helloWorld" {"timestamp":"2020-12-02T14:33:57.154+0000","status":403,"error":"Forbidden","message":"unknown user!","path":"/nacos/v1/cs/configs"} ``` However the following one gets accepted by using the `Nacos-Server` user-agent header: ``` ❯ curl -X POST -A Nacos-Server "http://127.0.0.1:8848/nacos/v1/cs/configs?dataId=nacos.cfg.dataIdfoo&group=foo&content=helloWorld" true ``` #### Impact This issue may allow any user to carry out any administrative tasks on the Nacos server.
{'CVE-2021-29441'}
2022-03-03T05:13:12.548908Z
2021-04-27T20:09:17Z
HIGH
null
{'CWE-290'}
{'https://github.com/advisories/GHSA-36hp-jr8h-556f', 'https://github.com/alibaba/nacos/issues/4701', 'https://github.com/alibaba/nacos/pull/4703', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29441'}
null
Maven
GHSA-xwg3-qrcg-w9x6
Timing side channel vulnerability in UIDL request handler in Vaadin 10, 11-14, and 15-18
Non-constant-time comparison of CSRF tokens in UIDL request handler in `com.vaadin:flow-server` versions 1.0.0 through 1.0.13 (Vaadin 10.0.0 through 10.0.16), 1.1.0 prior to 2.0.0 (Vaadin 11 through 13), 2.0.0 through 2.4.6 (Vaadin 14.0.0 through 14.4.6), 3.0.0 prior to 5.0.0 (Vaadin 15 prior to 18), and 5.0.0 through 5.0.2 (Vaadin 18.0.0 through 18.0.5) allows attacker to guess a security token via timing attack. - https://vaadin.com/security/cve-2021-31404
{'CVE-2021-31404'}
2022-03-03T05:12:25.490160Z
2021-04-19T14:51:25Z
MODERATE
null
{'CWE-208', 'CWE-203'}
{'https://vaadin.com/security/cve-2021-31404', 'https://github.com/vaadin/flow/security/advisories/GHSA-xwg3-qrcg-w9x6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31404', 'https://github.com/vaadin/flow/pull/9875'}
null
Maven
GHSA-c6j7-4fr9-c76p
Incorrect permissions in Apache Ozone
In Apache Ozone before 1.2.0, Ozone Datanode doesn't check the access mode parameter of the block token. Authenticated users with valid READ block token can do any write operation on the same block.
{'CVE-2021-39235'}
2021-11-22T18:37:43Z
2021-11-23T18:17:41Z
MODERATE
null
{'CWE-732'}
{'https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C93f88246-4320-7423-0dac-ec7a07f47455%40apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39235', 'http://www.openwall.com/lists/oss-security/2021/11/19/6'}
null
Maven
GHSA-f96g-24cg-f24w
SQL Injection in odata4j
odata4j 0.7.0 allows ExecuteJPQLQueryCommand.java SQL injection. NOTE: this product is apparently discontinued.
{'CVE-2016-11024'}
2022-03-03T05:14:14.116259Z
2021-05-07T15:52:41Z
HIGH
null
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-11024', 'https://groups.google.com/d/msg/odata4j-discuss/_lBwwXP30g0/Av6zkZMdBwAJ'}
null
Maven
GHSA-fpqp-v323-44xv
Cross-site scripting in Apache Ranger
Policy import functionality in Apache Ranger 0.7.0 to 1.2.0 is vulnerable to a cross-site scripting issue. Upgrade to 2.0.0 or later version of Apache Ranger with the fix.
{'CVE-2019-12397'}
2022-03-03T05:13:34.026677Z
2019-08-16T14:01:35Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-12397', 'https://lists.apache.org/thread.html/ab2de1adad96f5dbd19d976b28715dfc60dbe75e82a74f48be8ef695@%3Cdev.ranger.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2019/08/08/1', 'https://lists.apache.org/thread.html/cbc6346708ef2b9ffb2555637311bf6294923c609c029389fa39de8f@%3Cdev.ranger.apache.org%3E', 'https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger'}
null
Maven
GHSA-9gph-22xh-8x98
Unsafe Deserialization in jackson-databind
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.commons.dbcp.cpdsadapter.DriverAdapterCPDS.
{'CVE-2020-36179'}
2022-04-25T22:16:55.292156Z
2021-12-09T19:15:54Z
HIGH
null
{'CWE-502'}
{'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36179', 'https://github.com/FasterXML/jackson-databind', 'https://security.netapp.com/advisory/ntap-20210205-0005/', 'https://github.com/FasterXML/jackson-databind/issues/3004', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://lists.apache.org/thread.html/rc255f41d9a61d3dc79a51fb5c713de4ae10e71e3673feeb0b180b436@%3Cissues.spark.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}
null
Maven
GHSA-r53v-vm87-f72c
Moderate severity vulnerability that affects org.apache.axis:axis
The getCN function in Apache Axis 1.4 and earlier does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a certificate with a subject that specifies a common name in a field that is not the CN field. NOTE: this issue exists because of an incomplete fix for CVE-2012-5784.
{'CVE-2014-3596'}
2022-03-03T05:12:40.252297Z
2018-10-16T20:50:58Z
MODERATE
null
{'CWE-297'}
{'https://lists.apache.org/thread.html/5e6c92145deddcecf70c3604041dcbd615efa2d37632fc2b9c367780@%3Cjava-dev.axis.apache.org%3E', 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00022.html', 'http://www.openwall.com/lists/oss-security/2014/08/20/2', 'http://rhn.redhat.com/errata/RHSA-2014-1193.html', 'http://secunia.com/advisories/61222', 'https://issues.apache.org/jira/browse/AXIS-2905', 'https://lists.apache.org/thread.html/de2af12dcaba653d02b03235327ca4aa930401813a3cced8e151d29c@%3Cjava-dev.axis.apache.org%3E', 'https://lists.apache.org/thread.html/44d4e88a5fa8ae60deb752029afe9054da87c5f859caf296fcf585e5@%3Cjava-dev.axis.apache.org%3E', 'https://lists.apache.org/thread.html/8aa25c99eeb0693fc229ec87d1423b5ed5d58558618706d8aba1d832@%3Cjava-dev.axis.apache.org%3E', 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00007.html', 'http://www.securityfocus.com/bid/69295', 'https://lists.apache.org/thread.html/a308887782e05da7cf692e4851ae2bd429a038570cbf594e6631cc8d@%3Cjava-dev.axis.apache.org%3E', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/95377', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'http://www.securitytracker.com/id/1030745', 'http://linux.oracle.com/errata/ELSA-2014-1193.html', 'https://nvd.nist.gov/vuln/detail/CVE-2014-3596', 'https://github.com/advisories/GHSA-r53v-vm87-f72c'}
null
Maven
GHSA-2pmw-cvc7-frvh
SQL injection in MCMS
A problem was found in ming-soft MCMS v5.1. There is a sql injection vulnerability in /ms/cms/content/list.do
{'CVE-2021-44868'}
2022-03-07T20:47:19.524489Z
2022-02-18T00:00:34Z
CRITICAL
null
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-44868', 'https://github.com/ming-soft/MCMS/issues/58'}
null
Maven
GHSA-xxgp-pcfc-3vgc
Privilege Escalation in Hibernate Validator
In Hibernate Validator 5.2.x before 5.2.5 final, 5.3.x, and 5.4.x, it was found that when the security manager's reflective permissions, which allows it to access the private members of the class, are granted to Hibernate Validator, a potential privilege escalation can occur. By allowing the calling code to access those private members without the permission an attacker may be able to validate an invalid instance and access the private member value via ConstraintViolation#getInvalidValue().
{'CVE-2017-7536'}
2022-03-31T22:19:43.235684Z
2020-06-15T19:57:48Z
HIGH
null
{'CWE-470'}
{'https://access.redhat.com/errata/RHSA-2017:2810', 'https://access.redhat.com/errata/RHSA-2017:3454', 'http://www.securityfocus.com/bid/101048', 'https://github.com/hibernate/hibernate-validator/commit/0886e89900d343ea20fde5137c9a3086e6da9ac', 'https://access.redhat.com/errata/RHSA-2018:2927', 'https://bugzilla.redhat.com/show_bug.cgi?id=1465573', 'https://access.redhat.com/errata/RHSA-2018:2741', 'https://access.redhat.com/errata/RHSA-2017:2808', 'http://www.securitytracker.com/id/1039744', 'https://access.redhat.com/errata/RHSA-2017:2811', 'https://access.redhat.com/errata/RHSA-2018:2742', 'https://nvd.nist.gov/vuln/detail/CVE-2017-7536', 'https://access.redhat.com/errata/RHSA-2018:2743', 'https://access.redhat.com/errata/RHSA-2017:3458', 'https://access.redhat.com/errata/RHSA-2017:2809', 'https://access.redhat.com/errata/RHSA-2018:3817', 'https://access.redhat.com/errata/RHSA-2017:3455', 'https://access.redhat.com/errata/RHSA-2018:2740', 'https://github.com/hibernate/hibernate-validator', 'https://access.redhat.com/errata/RHSA-2017:3456', 'https://github.com/hibernate/hibernate-validator/commit/0778a5c98b817771a645c6f4ba0b28dd8b5437b', 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:3141'}
null
Maven
GHSA-j23j-q57m-63v3
Denial of service in DataCommunicator class in Vaadin 8
Missing check in `DataCommunicator` class in `com.vaadin:vaadin-server` versions 8.0.0 through 8.14.0 (Vaadin 8.0.0 through 8.14.0) allows authenticated network attacker to cause heap exhaustion by requesting too many rows of data.
null
2022-03-03T05:13:24.743375Z
2021-10-13T18:54:50Z
MODERATE
null
{'CWE-400'}
{'https://github.com/vaadin/framework/security/advisories/GHSA-j23j-q57m-63v3', 'https://vaadin.com/security/cve-2021-33609', 'https://github.com/vaadin/framework/pull/12415'}
null
Maven
GHSA-6jmf-mxwf-r3jc
Exposure of Sensitive Information to an Unauthorized Actor in Apache Kafka
When Connect workers in Apache Kafka 2.0.0, 2.0.1, 2.1.0, 2.1.1, 2.2.0, 2.2.1, or 2.3.0 are configured with one or more config providers, and a connector is created/updated on that Connect cluster to use an externalized secret variable in a substring of a connector configuration property value, then any client can issue a request to the same Connect cluster to obtain the connector's task configuration and the response will contain the plaintext secret rather than the externalized secrets variables.
{'CVE-2019-12399'}
2021-06-15T17:25:57Z
2020-05-12T00:39:27Z
HIGH
null
{'CWE-319'}
{'https://lists.apache.org/thread.html/r47c225db363d1ee2c18c4b3b2f51b63a9789f78c7fa602e5976ecd05@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r6af5ed95726874e9add022955be83c192428c248d1c9a1914aff89d9%40%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rfe90ca0463c199b99c2921410639aed53a172ea8b733eab0dc776262@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rc27d424d0bdeaf31081c3e246db3c66e882243ae3f342dfa845e0261@%3Ccommits.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rde947ee866de6687bc51cdc8dfa6d7e6b3ad4ce8c708c344f773e6dc@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r4b20b40c40d4a4c641e2ef4228098a57935e5782bfdfdf3650e48265@%3Ccommits.druid.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.apache.org/thread.html/r8890b8f18f1de821595792b58b968a89692a255bc20d86d395270740@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r9871a4215b621c1d09deee5eba97f0f44fde01b4363deb1bed0dd160@%3Ccommits.druid.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12399', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/r3154f5adbc905f1f9012a92240c8e00a96628470cc819453b9606d0e@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rda253155601968331b5cf0da4f273813bbd91843c2568a8495d1c662@%3Ccommits.kafka.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2020/01/14/1', 'https://lists.apache.org/thread.html/r2d390dec5f360ec8aa294bef18e1a4385e2a3698d747209216f5a48b@%3Ccommits.druid.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/r4d9e87cdae99e98d7b244cfa53d9d2532d368d3a187fbc87c493dcbe@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r56eb055b544931451283fee51f7e1f5b8ebd3085fed7d77aaba504c9@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r6af5ed95726874e9add022955be83c192428c248d1c9a1914aff89d9@%3Cusers.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r801c68bf987931f35d2e24ecc99f3aa2850fdd8f5ef15fe6c60fecf3@%3Ccommits.druid.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r6af5ed95726874e9add022955be83c192428c248d1c9a1914aff89d9@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r6fa1cff4786dcef2ddd1d717836ef123c878e8321c24855bad24ae0f@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r3203d7f25a6ca56ff3e48c43a6aa7cb60b8e5d57d0eed9f76dc2b7a8@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r0e3a613705d70950aca2bfe9a6265c87503921852d9a3dbce512ca9f@%3Ccommits.druid.apache.org%3E', 'https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEKAFKA-541854'}
null
Maven
GHSA-7hwc-46rm-65jh
Denial of service in XStream
XStream through 1.4.9, when a certain denyTypes workaround is not used, mishandles attempts to create an instance of the primitive type 'void' during unmarshalling, leading to a remote application crash, as demonstrated by an xstream.fromXML("<void/>") call.
{'CVE-2017-7957'}
2022-03-03T05:13:52.552340Z
2020-06-30T22:48:24Z
HIGH
null
{'CWE-20'}
{'http://www.securityfocus.com/bid/100687', 'https://github.com/x-stream/xstream/commit/b3570be2f39234e61f99f9a20640756ea71b1b4', 'https://access.redhat.com/errata/RHSA-2017:2889', 'https://access.redhat.com/errata/RHSA-2017:1832', 'http://www.securitytracker.com/id/1039499', 'https://github.com/x-stream/xstream/commit/6e546ec366419158b1e393211be6d78ab9604ab', 'https://github.com/x-stream/xstream/commit/8542d02d9ac5d384c85f4b33d6c1888c53bd55d', 'https://exchange.xforce.ibmcloud.com/vulnerabilities/125800', 'http://x-stream.github.io/CVE-2017-7957.html', 'http://www.debian.org/security/2017/dsa-3841', 'https://www-prd-trops.events.ibm.com/node/715749', 'https://github.com/x-stream/xstream', 'https://access.redhat.com/errata/RHSA-2017:2888', 'https://nvd.nist.gov/vuln/detail/CVE-2017-7957'}
null
Maven
GHSA-53x6-4x5p-rrvv
Denial of Service in Apache Commons Compress
The file name encoding algorithm used internally in Apache Commons Compress 1.15 to 1.18 can get into an infinite loop when faced with specially crafted inputs. This can lead to a denial of service attack if an attacker can choose the file names inside of an archive created by Compress.
{'CVE-2019-12402'}
2022-04-22T17:45:13.657422Z
2019-10-11T18:41:08Z
HIGH
null
{'CWE-835'}
{'https://lists.apache.org/thread.html/rf5230a049d989dbfdd404b4320a265dceeeba459a4d04ec21873bd55@%3Csolr-user.lucene.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QLJIK2AUOZOWXR3S5XXBUNMOF3RTHTI7/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-12402', 'https://lists.apache.org/thread.html/r7af60fbd8b2350d49d14e53a3ab2801998b9d1af2d6fcac60b060a53@%3Cdev.brooklyn.apache.org%3E', 'https://lists.apache.org/thread.html/r972f82d821b805d04602976a9736c01b6bf218cfe0c3f48b472db488@%3Cissues.flink.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.apache.org/thread.html/rcc35ab6be300365de5ff9587e0479d10d7d7c79070921837e3693162@%3Cissues.flink.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/r4363c994c8bca033569a98da9218cc0c62bb695c1e47a98e5084e5a0@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/rd3f99d732baed459b425fb0a9e9e14f7843c9459b12037e4a9d753b5@%3Cissues.flink.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.apache.org/thread.html/r25422df9ad22fec56d9eeca3ab8bd6d66365e9f6bfe311b64730edf5@%3Cissues.flink.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/re13bd219dd4b651134f6357f12bd07a0344eea7518c577bbdd185265@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/54cc4e9fa6b24520135f6fa4724dfb3465bc14703c7dc7e52353a0ea@%3Ccommits.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/r05cf37c1e1e662e968cfece1102fcd50fe207181fdbf2c30aadfafd3@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r21d64797914001119d2fc766b88c6da181dc2308d20f14e7a7f46117@%3Cissues.flink.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WZB3GB7YXIOUKIOQ27VTIP6KKGJJ3CKL/', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/308cc15f1f1dc53e97046fddbac240e6cd16de89a2746cf257be7f5b@%3Cdev.commons.apache.org%3E', 'https://lists.apache.org/thread.html/r590c15cebee9b8e757e2f738127a9a71e48ede647a3044c504e050a4@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r233267e24519bacd0f9fb9f61a1287cb9f4bcb6e75d83f34f405c521@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r5caf4fcb69d2749225391e61db7216282955204849ba94f83afe011f@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r5103b1c9242c0f812ac96e524344144402cbff9b6e078d1557bc7b1e@%3Cissues.flink.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/rdebc1830d6c09c11d5a4804ca26769dbd292d17d361c61dea50915f0@%3Cissues.flink.apache.org%3E'}
null
Maven
GHSA-g8hw-794c-4j9g
Moderate severity vulnerability that affects org.springframework:spring-core
Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, allow applications to configure Spring MVC to serve static resources (e.g. CSS, JS, images). When static resources are served from a file system on Windows (as opposed to the classpath, or the ServletContext), a malicious user can send a request using a specially crafted URL that can lead a directory traversal attack.
{'CVE-2018-1271'}
2022-03-03T05:13:07.893793Z
2018-10-17T20:07:03Z
MODERATE
null
{'CWE-22'}
{'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://pivotal.io/security/cve-2018-1271', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'http://www.securityfocus.com/bid/103699', 'https://access.redhat.com/errata/RHSA-2018:1320', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1271', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://github.com/advisories/GHSA-g8hw-794c-4j9g', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'https://access.redhat.com/errata/RHSA-2018:2939'}
null
Maven
GHSA-rm7f-mpcj-w4f6
Command injection in Apache Unomi
Apache Unomi prior to version 1.5.5 allows CRLF log injection because of the lack of escaping in the log statements.
{'CVE-2021-31164'}
2022-03-03T05:13:53.205261Z
2021-06-16T17:17:24Z
HIGH
null
{'CWE-74'}
{'http://unomi.apache.org/security/cve-2021-31164', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31164'}
null
Maven
GHSA-qxxx-2pp7-5hmx
A deserialization flaw was discovered in the jackson-databind
A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper.
{'CVE-2017-7525'}
2022-04-26T18:48:01.075465Z
2018-10-16T17:21:35Z
CRITICAL
null
{'CWE-502', 'CWE-184'}
{'https://access.redhat.com/errata/RHSA-2017:2636', 'https://access.redhat.com/errata/RHSA-2017:3454', 'https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03902en_us', 'https://access.redhat.com/errata/RHSA-2017:2546', 'https://github.com/FasterXML/jackson-databind/issues/1599', 'https://access.redhat.com/errata/RHSA-2019:0910', 'https://lists.apache.org/thread.html/c10a2bf0fdc3d25faf17bd191d6ec46b29a353fa9c97bebd7c4e5913@%3Cdev.lucene.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:1836', 'https://lists.apache.org/thread.html/f60afd3c7e9ebaaf70fad4a4beb75cf8740ac959017a31e7006c7486@%3Cdev.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/rf7f87810c38dc9abf9f93989f76008f504cbf7c1a355214640b2d04c@%3Ccommits.cassandra.apache.org%3E', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'https://lists.apache.org/thread.html/5008bcbd45ee65ce39e4220b6ac53d28a24d6bc67d5804e9773a7399@%3Csolr-user.lucene.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:1837', 'https://lists.apache.org/thread.html/b1f33fe5ade396bb903fdcabe9f243f7692c7dfce5418d3743c2d346@%3Cdev.lucene.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:0342', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://access.redhat.com/errata/RHSA-2018:1449', 'https://lists.debian.org/debian-lts-announce/2020/08/msg00039.html', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html', 'https://nvd.nist.gov/vuln/detail/CVE-2017-7525', 'https://github.com/FasterXML/jackson-databind', 'https://access.redhat.com/errata/RHSA-2017:2637', 'https://access.redhat.com/errata/RHSA-2017:2635', 'https://lists.apache.org/thread.html/r68acf97f4526ba59a33cc6e592261ea4f85d890f99e79c82d57dd589@%3Cissues.spark.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/01/msg00037.html', 'https://www.debian.org/security/2017/dsa-4004', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://access.redhat.com/errata/RHSA-2018:0294', 'http://www.securitytracker.com/id/1039744', 'https://github.com/advisories/GHSA-qxxx-2pp7-5hmx', 'https://lists.apache.org/thread.html/c2ed4c0126b43e324cf740012a0edd371fd36096fd777be7bfe7a2a6@%3Cdev.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/c9d5ff20929e8a3c8794facf4c4b326a9c10618812eec356caa20b87@%3Csolr-user.lucene.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:1835', 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/4641ed8616ccc2c1fbddac2c3dc9900c96387bc226eaf0232d61909b@%3Ccommits.cassandra.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=1462702', 'https://access.redhat.com/errata/RHSA-2017:1834', 'https://lists.apache.org/thread.html/r42ac3e39e6265db12d9fc6ae1cd4b5fea7aed9830dc6f6d58228fed7@%3Ccommits.cassandra.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:3458', 'https://access.redhat.com/errata/RHSA-2017:2547', 'http://www.securitytracker.com/id/1039947', 'https://security.netapp.com/advisory/ntap-20171214-0002/', 'https://access.redhat.com/errata/RHSA-2017:3455', 'https://access.redhat.com/errata/RHSA-2017:2477', 'http://www.securityfocus.com/bid/99623', 'https://cwiki.apache.org/confluence/display/WW/S2-055', 'https://access.redhat.com/errata/RHSA-2017:1839', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'https://access.redhat.com/errata/RHSA-2017:3456', 'https://access.redhat.com/errata/RHSA-2017:1840', 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:2858', 'http://www.securitytracker.com/id/1040360', 'https://access.redhat.com/errata/RHSA-2018:1450', 'https://access.redhat.com/errata/RHSA-2017:3141', 'https://access.redhat.com/errata/RHSA-2017:2633', 'https://lists.apache.org/thread.html/3c87dc8bca99a2b3b4743713b33d1de05b1d6b761fdf316224e9c81f@%3Cdev.lucene.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:2638', 'https://lists.apache.org/thread.html/f095a791bda6c0595f691eddd0febb2d396987eec5cbd29120d8c629@%3Csolr-user.lucene.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/issues/1723'}
null
Maven
GHSA-6v7w-535j-rq5m
Moderate severity vulnerability that affects org.springframework:spring-core
Pivotal Spring Framework before 3.2.14 and 4.x before 4.1.7 do not properly process inline DTD declarations when DTD is not entirely disabled, which allows remote attackers to cause a denial of service (memory consumption and out-of-memory errors) via a crafted XML file.
{'CVE-2015-3192'}
2022-03-03T05:14:05.202112Z
2018-10-17T20:29:12Z
MODERATE
null
{'CWE-119'}
{'https://github.com/advisories/GHSA-6v7w-535j-rq5m', 'http://www.securityfocus.com/bid/90853', 'http://www.securitytracker.com/id/1036587', 'http://rhn.redhat.com/errata/RHSA-2016-1593.html', 'http://rhn.redhat.com/errata/RHSA-2016-1592.html', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162015.html', 'https://nvd.nist.gov/vuln/detail/CVE-2015-3192', 'http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162017.html', 'http://rhn.redhat.com/errata/RHSA-2016-2036.html', 'https://jira.spring.io/browse/SPR-13136', 'http://pivotal.io/security/cve-2015-3192', 'https://access.redhat.com/errata/RHSA-2016:1218', 'https://access.redhat.com/errata/RHSA-2016:1219', 'http://rhn.redhat.com/errata/RHSA-2016-2035.html', 'https://lists.debian.org/debian-lts-announce/2019/07/msg00012.html'}
null
Maven
GHSA-rvfc-g8j5-9ccf
Generation of Error Message Containing Sensitive Information in keybloack
A flaw was found in Keycloak 7.0.1. A logged in user can do an account email enumeration attack.
{'CVE-2020-1717'}
2022-03-03T05:12:59.121722Z
2022-02-09T00:59:06Z
MODERATE
null
{'CWE-209'}
{'https://issues.jboss.org/browse/KEYCLOAK-12014', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1717', 'https://bugzilla.redhat.com/show_bug.cgi?id=1796281'}
null
Maven
GHSA-fpj7-9xm6-8hgr
Observable Discrepancy and Observable Timing Discrepancy in Jenkins Configuration as Code Plugin
Jenkins Configuration as Code Plugin 1.55 and earlier used a non-constant time comparison function when validating an authentication token allowing attackers to use statistical methods to obtain a valid authentication token.
{'CVE-2022-23106'}
2022-01-20T14:42:40Z
2022-01-21T23:38:30Z
MODERATE
null
{'CWE-208', 'CWE-203'}
{'https://github.com/jenkinsci/configuration-as-code-plugin', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23106', 'https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2141', 'http://www.openwall.com/lists/oss-security/2022/01/12/6'}
null
Maven
GHSA-j229-2h63-rvh9
Improper Authentication for Keycloak
A flaw was found in the reset credential flow in all Keycloak versions before 8.0.0. This flaw allows an attacker to gain unauthorized access to the application.
{'CVE-2020-1718'}
2022-03-03T05:13:12.802454Z
2022-02-09T00:59:32Z
MODERATE
null
{'CWE-287'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-1718', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1718'}
null
Maven
GHSA-2wqp-jmcc-mc77
Regular expression denial of service (ReDoS) in EmailField component in Vaadin 14 and 15-17
Unsafe validation RegEx in `EmailField` component in `com.vaadin:vaadin-text-field-flow` versions 2.0.4 through 2.3.2 (Vaadin 14.0.6 through 14.4.3), and 3.0.0 through 4.0.2 (Vaadin 15.0.0 through 17.0.10) allows attackers to cause uncontrolled resource consumption by submitting malicious email addresses. - https://vaadin.com/security/cve-2021-31405
{'CVE-2021-31405'}
2022-03-03T05:13:26.495736Z
2021-04-19T14:47:34Z
HIGH
null
{'CWE-400'}
{'https://vaadin.com/security/cve-2021-31405', 'https://github.com/vaadin/flow-components/pull/442', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31405', 'https://github.com/vaadin/platform/security/advisories/GHSA-2wqp-jmcc-mc77'}
null
Maven
GHSA-9q69-g5gc-9fgf
Cross-Site Request Forgery in Vert.x-Web framework
Vert.x-Web framework v4.0 milestone 1-4 does not perform a correct CSRF verification. Instead of comparing the CSRF token in the request with the CSRF token in the cookie, it compares the CSRF token in the cookie against a CSRF token that is stored in the session. An attacker does not even need to provide a CSRF token in the request because the framework does not consider it. The cookies are automatically sent by the browser and the verification will always succeed, leading to a successful CSRF attack.
{'CVE-2020-35217'}
2022-03-03T05:12:53.424338Z
2021-04-22T16:16:18Z
HIGH
null
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35217', 'https://github.com/vert-x3/vertx-web/pull/1613'}
null
Maven
GHSA-xc67-hjx6-cgg6
Installation information leak in Eclipse Jetty
In Eclipse Jetty version 7.x, 8.x, 9.2.27 and older, 9.3.26 and older, and 9.4.16 and older, the server running on any OS and Jetty version combination will reveal the configured fully qualified directory base resource location on the output of the 404 error for not finding a Context that matches the requested path. The default server behavior on jetty-distribution and jetty-home will include at the end of the Handler tree a DefaultHandler, which is responsible for reporting this 404 error, it presents the various configured contexts as HTML for users to click through to. This produced HTML includes output that contains the configured fully qualified directory base resource location for each context.
{'CVE-2019-10247'}
2022-04-21T18:03:54.504211Z
2019-04-23T16:07:12Z
MODERATE
null
{'CWE-200', 'CWE-213'}
{'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10247', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20190509-0003/', 'https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=546577', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4@%3Cissues.activemq.apache.org%3E', 'https://www.debian.org/security/2021/dsa-4949', 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2021/05/msg00016.html', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}
null
Maven
GHSA-c38m-7h53-g9v4
Path traversal in Apache James
Apache James ManagedSieve implementation alongside with the file storage for sieve scripts is vulnerable to path traversal, allowing reading and writing any file. This vulnerability had been patched in Apache James 3.6.1 and higher. We recommend the upgrade. Distributed and Cassandra based products are also not impacted.
{'CVE-2021-40525'}
2022-03-03T05:13:34.419659Z
2022-01-21T23:36:47Z
CRITICAL
null
{'CWE-22'}
{'https://www.openwall.com/lists/oss-security/2022/01/04/4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40525', 'http://www.openwall.com/lists/oss-security/2022/01/04/4', 'http://www.openwall.com/lists/oss-security/2022/02/07/1'}
null
Maven
GHSA-whww-v56c-cgv2
Deserialization of Untrusted Data in Apache Dubbo
This vulnerability can affect all Dubbo users stay on version 2.7.6 or lower. An attacker can send RPC requests with unrecognized service name or method name along with some malicious parameter payloads. When the malicious parameter is deserialized, it will execute some malicious code. More details can be found below.
{'CVE-2020-1948'}
2022-03-03T05:14:10.616964Z
2022-02-10T22:39:17Z
CRITICAL
null
{'CWE-502'}
{'https://nsfocusglobal.com/apache-dubbo-remote-code-execution-vulnerability-cve-2020-1948-threat-alert/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1948', 'https://lists.apache.org/thread.html/rbaa41711b3e7a8cd20e9013737423ddd079ddc12f90180f86e76523c%40%3Csecurity.dubbo.apache.org%3E'}
null
Maven
GHSA-h65f-jvqw-m9fj
Infinite Loop in Apache Xerces Java
There's a vulnerability within the Apache Xerces Java (XercesJ) XML parser when handling specially crafted XML document payloads. This causes, the XercesJ XML parser to wait in an infinite loop, which may sometimes consume system resources for prolonged duration. This vulnerability is present within XercesJ version 2.12.1 and the previous versions.
{'CVE-2022-23437'}
2022-04-22T15:47:14.224790Z
2022-01-27T16:13:07Z
MODERATE
null
{'CWE-91'}
{'http://www.openwall.com/lists/oss-security/2022/01/24/3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23437', 'https://lists.apache.org/thread/6pjwm10bb69kq955fzr1n0nflnjd27dl', 'https://www.oracle.com/security-alerts/cpuapr2022.html'}
null
Maven
GHSA-5cf4-jqwp-584g
Moderate severity vulnerability that affects org.apache.hadoop:hadoop-main
In Apache Hadoop 2.9.0 to 2.9.1, 2.8.3 to 2.8.4, 2.7.5 to 2.7.6, KMS blocking users or granting access to users incorrectly, if the system uses non-default groups mapping mechanisms.
{'CVE-2018-11767'}
2022-03-03T05:12:57.438900Z
2019-03-25T16:17:32Z
HIGH
null
{'CWE-269'}
{'https://lists.apache.org/thread.html/5fb771f66946dd5c99a8a5713347c24873846f555d716f9ac17bccca@%3Cgeneral.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E', 'https://github.com/advisories/GHSA-5cf4-jqwp-584g', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11767', 'https://lists.apache.org/thread.html/246cf223e7dc0c1dff90b78dccb6c3fe94e1a044dbf98e2333393302@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/5a44590b4eedc5e25f5bd3081d1631b52c174b5b99157f7950ddc270@%3Ccommon-dev.hadoop.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20190416-0009/'}
null
Maven
GHSA-xpv2-8ppj-79hh
Expression injection in AviatorScript
AviatorScript through 5.2.7 allows code execution via an expression that is encoded with Byte Code Engineering Library (BCEL).
{'CVE-2021-41862'}
2022-03-03T05:12:50.125425Z
2021-10-04T20:14:31Z
CRITICAL
null
{'CWE-74'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41862', 'https://github.com/killme2008/aviatorscript/issues/421', 'https://github.com/killme2008/aviatorscript'}
null
Maven
GHSA-gw4j-4229-q4px
Server-Side Request Forgery in Apache Dubbo
In Apache Dubbo prior to 2.6.9 and 2.7.10, the usage of parseURL method will lead to the bypass of white host check which can cause open redirect or SSRF vulnerability.
{'CVE-2021-25640'}
2022-03-21T22:00:14.508334Z
2022-03-18T17:56:45Z
MODERATE
null
{'CWE-918'}
{'https://lists.apache.org/thread.html/re4cab8855361a454d2af106fb3dad76259e723015fd7e09cb4f9eb77@%3Cdev.dubbo.apache.org%3E', 'https://lists.apache.org/thread.html/re4cab8855361a454d2af106fb3dad76259e723015fd7e09cb4f9eb77%40%3Cdev.dubbo.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25640'}
null
Maven
GHSA-chp4-rv79-68j3
Apache serialization mechanism does not have a list of classes allowed for serialization/deserialization
In Apache Ignite 2.3 or earlier, the serialization mechanism does not have a list of classes allowed for serialization/deserialization, which makes it possible to run arbitrary code when 3-rd party vulnerable classes are present in Ignite classpath. The vulnerability can be exploited if the one sends a specially prepared form of a serialized object to one of the deserialization endpoints of some Ignite components - discovery SPI, Ignite persistence, Memcached endpoint, socket steamer.
{'CVE-2018-1295'}
2022-04-26T19:15:54.704509Z
2018-10-16T20:53:44Z
CRITICAL
null
{'CWE-502'}
{'http://www.securityfocus.com/bid/103692', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1295', 'https://access.redhat.com/errata/RHSA-2018:2405', 'https://github.com/advisories/GHSA-chp4-rv79-68j3', 'https://lists.apache.org/thread.html/45e7d5e2c6face85aab693f5ae0616563132ff757e5a558da80d0209@%3Cdev.ignite.apache.org%3E'}
null
Maven
GHSA-8crv-49fr-2h6j
Moderate severity vulnerability that affects org.springframework.security:spring-security-core and org.springframework:spring-core
Both Spring Security 3.2.x, 4.0.x, 4.1.0 and the Spring Framework 3.2.x, 4.0.x, 4.1.x, 4.2.x rely on URL pattern mappings for authorization and for mapping requests to controllers respectively. Differences in the strictness of the pattern matching mechanisms, for example with regards to space trimming in path segments, can lead Spring Security to not recognize certain paths as not protected that are in fact mapped to Spring MVC controllers that should be protected. The problem is compounded by the fact that the Spring Framework provides richer features with regards to pattern matching as well as by the fact that pattern matching in each Spring Security and the Spring Framework can easily be customized creating additional differences.
{'CVE-2016-5007'}
2022-03-03T05:14:09.637547Z
2018-10-17T20:30:12Z
HIGH
null
{'CWE-285'}
{'https://github.com/advisories/GHSA-8crv-49fr-2h6j', 'https://nvd.nist.gov/vuln/detail/CVE-2016-5007', 'http://www.securityfocus.com/bid/91687', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html', 'https://pivotal.io/security/cve-2016-5007'}
null
Maven
GHSA-4qw8-pgpr-p9mq
Bash command injection in Apache Zeppelin
bash command injection vulnerability in Apache Zeppelin allows an attacker to inject system commands into Spark interpreter settings. This issue affects Apache Zeppelin Apache Zeppelin version 0.9.0 and prior versions.
{'CVE-2019-10095'}
2022-03-03T05:12:51.431498Z
2021-09-07T22:56:43Z
HIGH
null
{'CWE-77', 'CWE-78'}
{'https://lists.apache.org/thread.html/rdf06e8423833b3daadc30c56a2ff47c48920864d5199476daa897208@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/rd56389ba9cab30a6c976b9a4a6df0f85cbe8fba6a60a3cf6e3ba716b@%3Cusers.zeppelin.apache.org%3E', 'https://github.com/apache/zeppelin', 'https://lists.apache.org/thread.html/rdf06e8423833b3daadc30c56a2ff47c48920864d5199476daa897208%40%3Cusers.zeppelin.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/09/02/1', 'https://lists.apache.org/thread.html/rdf06e8423833b3daadc30c56a2ff47c48920864d5199476daa897208@%3Cusers.zeppelin.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10095'}
null
Maven
GHSA-4mv7-cq75-3qjm
Moderate severity vulnerability that affects org.bouncycastle:bcprov-jdk14 and org.bouncycastle:bcprov-jdk15
The Bouncy Castle Java library before 1.51 does not validate a point is withing the elliptic curve, which makes it easier for remote attackers to obtain private keys via a series of crafted elliptic curve Diffie Hellman (ECDH) key exchanges, aka an "invalid curve attack."
{'CVE-2015-7940'}
2022-03-03T05:13:20.376212Z
2018-10-17T16:27:50Z
MODERATE
null
{'CWE-200'}
{'http://www.debian.org/security/2015/dsa-3417', 'http://www.openwall.com/lists/oss-security/2015/10/22/9', 'http://www.securitytracker.com/id/1037036', 'http://web-in-security.blogspot.ca/2015/09/practical-invalid-curve-attacks.html', 'http://www.openwall.com/lists/oss-security/2015/10/22/7', 'http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html', 'http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html', 'http://rhn.redhat.com/errata/RHSA-2016-2036.html', 'http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html', 'https://usn.ubuntu.com/3727-1/', 'http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00012.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7940', 'http://www.securityfocus.com/bid/79091', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html', 'https://github.com/advisories/GHSA-4mv7-cq75-3qjm', 'http://www.securitytracker.com/id/1037046', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174915.html', 'http://rhn.redhat.com/errata/RHSA-2016-2035.html', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'http://www.securitytracker.com/id/1037053'}
null
Maven
GHSA-cvj4-g3gx-8vqq
Restlet Framework allows remote attackers to access arbitrary files via a crafted REST API HTTP request
Restlet Framework before 2.3.12 allows remote attackers to access arbitrary files via a crafted REST API HTTP request that conducts an XXE attack, because only general external entities (not parameter external entities) are properly considered. This is related to XmlRepresentation, DOMRepresentation, SaxRepresentation, and JacksonRepresentation.
{'CVE-2017-14949'}
2022-04-26T21:37:05Z
2018-10-17T00:04:18Z
HIGH
null
{'CWE-611'}
{'https://github.com/restlet/restlet-framework-java/wiki/XEE-security-enhancements', 'https://lgtm.com/blog/restlet_CVE-2017-14949', 'https://github.com/advisories/GHSA-cvj4-g3gx-8vqq', 'https://nvd.nist.gov/vuln/detail/CVE-2017-14949', 'https://github.com/restlet/restlet-framework-java'}
null
Maven
GHSA-q74r-4xw3-ppx9
Stored cross-site scripting in Grid component in Vaadin 7 and 8
Missing variable sanitization in `Grid` component in `com.vaadin:vaadin-server` versions 7.4.0 through 7.7.19 (Vaadin 7.4.0 through 7.7.19), and 8.0.0 through 8.8.4 (Vaadin 8.0.0 through 8.8.4) allows attacker to inject malicious JavaScript via unspecified vector. - https://vaadin.com/security/cve-2019-25028
{'CVE-2019-25028'}
2022-03-03T05:13:37.458448Z
2021-04-19T14:49:48Z
MODERATE
null
{'CWE-80', 'CWE-79'}
{'https://github.com/vaadin/framework/pull/11645', 'https://vaadin.com/security/cve-2019-25028', 'https://nvd.nist.gov/vuln/detail/CVE-2019-25028', 'https://github.com/vaadin/framework/pull/11644', 'https://github.com/vaadin/framework/security/advisories/GHSA-q74r-4xw3-ppx9'}
null
Maven
GHSA-g644-pr5v-vppf
Insertion of Sensitive Information into Log File in Apache NiFi
In Apache NiFi 1.10.0 to 1.11.4, the NiFi stateless execution engine produced log output which included sensitive property values. When a flow was triggered, the flow definition configuration JSON was printed, potentially containing sensitive values in plaintext.
{'CVE-2020-9486'}
2022-03-03T05:14:10.953929Z
2022-01-06T20:41:02Z
HIGH
null
{'CWE-532'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-9486', 'https://github.com/apache/nifi/commit/148537d64a017b73160b0d49943183c18f883ab0', 'https://nifi.apache.org/security#CVE-2020-9486'}
null
Maven
GHSA-cvx5-m8vg-vxgc
Arbitrary filesystem write access from velocity.
### Impact The velocity scripts is not properly sandboxed against using the Java File API to perform read or write operations on the filesystem. Now writing an attacking script in velocity requires the Script rights in XWiki so not all users can use it, and it also requires finding an XWiki API which returns a File. ### Patches The problem has been patched on versions 12.6.7, 12.10.3 and 13.0RC1. ### Workarounds There's no easy workaround for fixing this vulnerability other than upgrading and being careful when giving Script rights. ### References https://jira.xwiki.org/browse/XWIKI-5168 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki](https://jira.xwiki.org) * Email us at [XWiki Security mailing-list](mailto:security@xwiki.org)
{'CVE-2022-24897'}
2022-05-03T18:01:48.701710Z
2022-04-28T21:16:40Z
HIGH
null
{'CWE-22'}
{'https://github.com/xwiki/xwiki-commons/commit/215951cfb0f808d0bf5b1097c9e7d1e503449ab8', 'https://github.com/xwiki/xwiki-commons', 'https://jira.xwiki.org/browse/XWIKI-5168', 'https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-cvx5-m8vg-vxgc'}
null
Maven
GHSA-59j4-wjwp-mw9m
Sandbox Bypass in Apache Velocity Engine
An attacker that is able to modify Velocity templates may execute arbitrary Java code or run arbitrary system commands with the same privileges as the account running the Servlet container. This applies to applications that allow untrusted users to upload/modify velocity templates running Apache Velocity Engine versions up to 2.2.
{'CVE-2020-13936'}
2022-04-22T18:30:29.314950Z
2022-01-06T20:32:36Z
HIGH
null
{'CWE-20'}
{'https://lists.apache.org/thread.html/rd2a89e17e8a9b451ce655f1a34117752ea1d18a22ce580d8baa824fd@%3Ccommits.druid.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/rbee7270556f4172322936b5ecc9fabf0c09f00d4fa56c9de1963c340@%3Cdev.ws.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2021/03/msg00019.html', 'https://lists.apache.org/thread.html/r52a5129df402352adc34d052bab9234c8ef63596306506a89fdc7328@%3Cusers.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r9dc2505651788ac668299774d9e7af4dc616be2f56fdc684d1170882@%3Cusers.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/reab5978b54a9f4c078402161e30a89c42807b198814acadbe6c862c7@%3Cdev.ws.apache.org%3E', 'https://lists.apache.org/thread.html/r7f209b837217d2a0fe5977fb692e7f15d37fa5de8214bcdc4c21d9a7@%3Ccommits.turbine.apache.org%3E', 'https://lists.apache.org/thread.html/re641197d204765130618086238c73dd2ce5a3f94b33785b587d72726@%3Cdev.ws.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13936', 'https://security.gentoo.org/glsa/202107-52', 'https://lists.apache.org/thread.html/r39de20c7e9c808b1f96790875d33e58c9c0aabb44fd9227e7b3dc5da@%3Cdev.ws.apache.org%3E', 'https://lists.apache.org/thread.html/re8e7482fe54d289fc0229e61cc64947b63b12c3c312e9f25bf6f3b8c@%3Cdev.ws.apache.org%3E', 'https://lists.apache.org/thread.html/r01043f584cbd47959fabe18fff64de940f81a65024bb8dddbda31d9a@%3Cuser.velocity.apache.org%3E', 'https://lists.apache.org/thread.html/rd7e865c87f9043c21d9c1fd9d4df866061d9a08cfc322771160d8058@%3Cdev.ws.apache.org%3E', 'https://lists.apache.org/thread.html/r4cd59453b65d4ac290fcb3b71fdf32b4f1f8989025e89558deb5a245@%3Cdev.ws.apache.org%3E', 'https://lists.apache.org/thread.html/rf7d369de88dc88a1347006a3323b3746d849234db40a8edfd5ebc436@%3Cdev.ws.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r01043f584cbd47959fabe18fff64de940f81a65024bb8dddbda31d9a%40%3Cuser.velocity.apache.org%3E', 'https://github.com/apache/velocity-engine', 'https://lists.apache.org/thread.html/r17cb932fab14801b14e5b97a7f05192f4f366ef260c10d4a8dba8ac9@%3Cdev.ws.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/03/10/1', 'https://lists.apache.org/thread.html/rb042f3b0090e419cc9f5a3d32cf0baff283ccd6fcb1caea61915d6b6@%3Ccommits.velocity.apache.org%3E', 'https://lists.apache.org/thread.html/r3ea4c4c908505b20a4c268330dfe7188b90c84dcf777728d02068ae6@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r0bc98e9cd080b4a13b905c571b9bed87e1a0878d44dbf21487c6cca4@%3Cdev.santuario.apache.org%3E', 'https://lists.apache.org/thread.html/r293284c6806c73f51098001ea86a14271c39f72cd76af9e946d9d9ad@%3Cdev.ws.apache.org%3E'}
null
Maven
GHSA-p99p-726h-c8v5
Moderate severity vulnerability that affects org.apache.juddi:juddi-client
In Apache jUDDI 3.2 through 3.3.4, if using the WADL2Java or WSDL2Java classes, which parse a local or remote XML document and then mediates the data structures into UDDI data structures, there are little protections present against entity expansion and DTD type of attacks. Mitigation is to use 3.3.5.
{'CVE-2018-1307'}
2022-03-03T05:12:52.456432Z
2018-10-19T16:42:15Z
HIGH
null
{'CWE-611'}
{'https://github.com/advisories/GHSA-p99p-726h-c8v5', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1307', 'https://issues.apache.org/jira/browse/JUDDI-987', 'http://juddi.apache.org/security.html'}
null
Maven
GHSA-qg5x-66hp-cw5p
Uncontrolled Resource Consumption in Apache DolphinScheduler
Apache DolphinScheduler user registration is vulnerable to Regular express Denial of Service (ReDoS) attacks. Apache DolphinScheduler users should upgrade to version 2.0.5 or higher.
{'CVE-2022-25598'}
2022-04-05T19:00:44.938606Z
2022-03-31T00:00:23Z
HIGH
null
{'CWE-400'}
{'https://github.com/apache/dolphinscheduler', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25598', 'https://lists.apache.org/thread/hwnw7xr969sg5nv84wz75nfr2c76fl93'}
null
Maven
GHSA-2f88-5hg8-9x2x
Origin Validation Error in Apache Maven
Apache Maven will follow repositories that are defined in a dependency’s Project Object Model (pom) which may be surprising to some users, resulting in potential risk if a malicious actor takes over that repository or is able to insert themselves into a position to pretend to be that repository. Maven is changing the default behavior in 3.8.1+ to no longer follow http (non-SSL) repository references by default. More details available in the referenced urls. If you are currently using a repository manager to govern the repositories used by your builds, you are unaffected by the risks present in the legacy behavior, and are unaffected by this vulnerability and change to default behavior. See this link for more information about repository management: https://maven.apache.org/repository-management.html
{'CVE-2021-26291'}
2022-04-22T16:02:01.187891Z
2021-06-16T17:32:49Z
CRITICAL
null
{'CWE-346'}
{'https://lists.apache.org/thread.html/rcd6c3a36f1dbc130da1b89d0f320db7040de71661a512695a8d513ac@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r78fb6d2cf0ca332cfa43abd4471e75fa6c517ed9cdfcb950bff48d40@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/re75f8b3dbc5faa1640908f87e644d373e00f8b4e6ba3e2ba4bd2c80b@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r71bc13669be84c2ff45b74a67929bc2da905c152e12a39b406e3c2a0@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/ra88a0eba7f84658cefcecc0143fd8bbad52c229ee5dfcbfdde7b6457@%3Cdev.jena.apache.org%3E', 'https://lists.apache.org/thread.html/r08a401f8c98a99f68d061fde6e6659d695f28d60fe4f0413bcb355b0@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/ra9d984eccfd2ae7726671e025f0296bf03786e5cdf872138110ac29b@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r39fa6ec4b7e912d3e04ea68efd23e554ec9c8efa2c96f5b45104fc61@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r2ddabd06d94b60cfb0141e4abb23201c628ab925e30742f61a04d013@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r167dbc42ef7c59802c2ca1ac14735ef9cf687c25208229993d6206fe@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r77af3ac7c3bfbd5454546e13faf7aec21d627bdcf36c9ca240436b94@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r9a027668558264c4897633e66bcb7784099fdec9f9b22c38c2442f00@%3Cusers.maven.apache.org%3E', 'https://lists.apache.org/thread.html/r7212b874e575e59d648980d91bc22e684906aee9b211ab92da9591f5@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r74329c671df713f61ae4620ee2452a0443ccad7f33c60e8ed7d21ff9@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/rc9e441c1576bdc4375d32526d5cf457226928e9c87b9f54ded26271c@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r86aebd0387ae19b740b3eb28bad83fe6aceca0d6257eaa810a6e0002@%3Ccommits.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r0a5e4ff2a7ca7ad8595d7683afbaeb3b8788ba974681907f97e7dc8e@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r07a89b32783f73bda6903c1f9aadeb859e5bef0a4daed6d87db8e4a9@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r0d083314aa3934dd4b6e6970d1f6ee50f6eaa9d867deb2cd96788478@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rdcbad6d8ce72c79827ed8c635f9a62dd919bb21c94a0b64cab2efc31@%3Cissues.karaf.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26291', 'https://lists.apache.org/thread.html/r5ae6aaa8a2ce86145225c3516bb45d315c0454e3765d651527e5df8a@%3Ccommits.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r06db4057b74e0598a412734f693a34a8836ac6f06d16d139e5e1027c@%3Cdev.maven.apache.org%3E', 'https://lists.apache.org/thread.html/rf9abfc0223747a56694825c050cc6b66627a293a32ea926b3de22402@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r30a139c165b3da6e0d5536434ab1550534011b1fdfcd2f5d95892c5b@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/red3bf6cbfd99e36b0c0a4fa1cea1eef1eb300c6bd8f372f497341265@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r340e75c9bb6e8661b89e1cf2c52f4638a18312e57bd884722bc28f52@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rfc27e2727a20a574f39273e0432aa97486a332f9b3068f6ac1346594@%3Cdev.myfaces.apache.org%3E', 'https://lists.apache.org/thread.html/r96cc126d3ee9aa42af9d3bb4baa94828b0a5f656584a50dcc594125f@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r86e1c81e03f441855f127980e9b3d41939d04a7caea2b7ab718e2288@%3Cjira.kafka.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r53cd5de57aaa126038c5301d8f518f3defab3c5b1c7e17c97bad08d8@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r52c6cda14dc6315dc79e72d30109f4589e9c6300ef6dc1a019da32d4@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/rc7ae2530063d1cd1cf8e9fa130d10940760f927168d4063d23b8cd0a@%3Ccommits.kafka.apache.org%3E', 'https://www.whitesourcesoftware.com/resources/blog/maven-security-vulnerability-cve-2021-26291/', 'https://lists.apache.org/thread.html/r4e1619cfefcd031fac62064a3858f5c9229eef907bd5d8ef14c594fc@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r30e9fcba679d164158cc26236704c351954909c18cb2485d11038aa6@%3Cdev.kafka.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/04/23/5', 'https://lists.apache.org/thread.html/rcd37d9214b08067a2e8f2b5b4fd123a1f8cb6008698d11ef44028c21@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r3f0450dcab7e63b5f233ccfbc6fca5f1867a75c8aa2493ea82732381@%3Cdev.jena.apache.org%3E', 'https://lists.apache.org/thread.html/r9a027668558264c4897633e66bcb7784099fdec9f9b22c38c2442f00%40%3Cusers.maven.apache.org%3E', 'https://lists.apache.org/thread.html/rfc0db1f3c375087e69a239f9284ded72d04fbb55849eadde58fa9dc2@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r0556ce5db7231025785477739ee416b169d8aff5ee9bac7854d64736@%3Cannounce.apache.org%3E'}
null
Maven
GHSA-43fp-vwwg-qgv6
Moderate severity vulnerability that affects org.apache.nifi:nifi
When a client request to a cluster node was replicated to other nodes in the cluster for verification, the Content-Length was forwarded. On a DELETE request, the body was ignored, but if the initial request had a Content-Length value other than 0, the receiving nodes would wait for the body and eventually timeout. Mitigation: The fix to check DELETE requests and overwrite non-zero Content-Length header values was applied on the Apache NiFi 1.8.0 release. Users running a prior 1.x release should upgrade to the appropriate release.
{'CVE-2018-17194'}
2022-03-03T05:14:20.578569Z
2018-12-20T22:02:32Z
HIGH
null
{'CWE-20'}
{'https://github.com/advisories/GHSA-43fp-vwwg-qgv6', 'https://nifi.apache.org/security.html#CVE-2018-17194', 'https://nvd.nist.gov/vuln/detail/CVE-2018-17194'}
null
Maven
GHSA-w3gh-g32m-cvhr
High severity vulnerability that affects org.apache.cxf.fediz:fediz-jetty8, org.apache.cxf.fediz:fediz-jetty9, org.apache.cxf.fediz:fediz-spring, org.apache.cxf.fediz:fediz-spring2, and org.apache.cxf.fediz:fediz-spring3
Versions of Apache CXF Fediz prior to 1.4.4 do not fully disable Document Type Declarations (DTDs) when either parsing the Identity Provider response in the application plugins, or in the Identity Provider itself when parsing certain XML-based parameters.
{'CVE-2018-8038'}
2022-03-03T05:13:46.576561Z
2018-10-18T16:56:47Z
HIGH
null
{'CWE-20'}
{'http://www.securitytracker.com/id/1041220', 'https://github.com/advisories/GHSA-w3gh-g32m-cvhr', 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E', 'http://cxf.apache.org/security-advisories.data/CVE-2018-8038.txt.asc', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8038', 'https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/f0a6a05ec3b3a00458da43712b0ff3a2f573175d9bfb39fb0de21424@%3Cdev.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3Ccommits.cxf.apache.org%3E', 'https://github.com/apache/cxf-fediz/commit/b6ed9865d0614332fa419fe4b6d0fe81bc2e660d', 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E'}
null
Maven
GHSA-c77r-6f64-478q
Moderate severity vulnerability that affects org.keycloak:keycloak-core
It was found that while parsing the SAML messages the StaxParserUtil class of keycloak before 2.5.1 replaces special strings for obtaining attribute values with system property. This could allow an attacker to determine values of system properties at the attacked system by formatting the SAML request ID field to be the chosen system property which could be obtained in the "InResponseTo" field in the response.
{'CVE-2017-2582'}
2022-03-03T05:13:38.650900Z
2018-10-18T16:49:40Z
MODERATE
null
{'CWE-200', 'CWE-201'}
{'https://github.com/advisories/GHSA-c77r-6f64-478q', 'https://nvd.nist.gov/vuln/detail/CVE-2017-2582'}
null
Maven
GHSA-xv5h-v7jh-p2qh
Authentication bypass for specific endpoint
The [`ConfigOpsController`](https://github.com/alibaba/nacos/blob/57459227863485d064ff25b3d5e24e714dcf218f/config/src/main/java/com/alibaba/nacos/config/server/controller/ConfigOpsController.java) lets the user perform management operations like querying the database or even wiping it out. While the [`/data/remove`](https://github.com/alibaba/nacos/blob/57459227863485d064ff25b3d5e24e714dcf218f/config/src/main/java/com/alibaba/nacos/config/server/controller/ConfigOpsController.java#L133-L135) endpoint is properly protected with the `@Secured` annotation, the [`/derby`](https://github.com/alibaba/nacos/blob/57459227863485d064ff25b3d5e24e714dcf218f/config/src/main/java/com/alibaba/nacos/config/server/controller/ConfigOpsController.java#L99-L100) endpoint is not protected and can be openly accessed by unauthenticated users. For example, the following request will list the tables of the database: ``` ❯ curl -X GET 'http://console.nacos.io/nacos/v1/cs/ops/derby?sql=select+st.tablename+from+sys.systables+st' {"code":200,"message":null,"data":[{"TABLENAME":"APP_CONFIGDATA_RELATION_PUBS"},{"TABLENAME":"APP_CONFIGDATA_RELATION_SUBS"},{"TABLENAME":"APP_LIST"},{"TABLENAME":"CONFIG_INFO"},{"TABLENAME":"CONFIG_INFO_AGGR"},{"TABLENAME":"CONFIG_INFO_BETA"},{"TABLENAME":"CONFIG_INFO_TAG"},{"TABLENAME":"CONFIG_TAGS_RELATION"},{"TABLENAME":"GROUP_CAPACITY"},{"TABLENAME":"HIS_CONFIG_INFO"},{"TABLENAME":"PERMISSIONS"},{"TABLENAME":"ROLES"},{"TABLENAME":"SYSALIASES"},{"TABLENAME":"SYSCHECKS"},{"TABLENAME":"SYSCOLPERMS"},{"TABLENAME":"SYSCOLUMNS"},{"TABLENAME":"SYSCONGLOMERATES"},{"TABLENAME":"SYSCONSTRAINTS"},{"TABLENAME":"SYSDEPENDS"},{"TABLENAME":"SYSDUMMY1"},{"TABLENAME":"SYSFILES"},{"TABLENAME":"SYSFOREIGNKEYS"},{"TABLENAME":"SYSKEYS"},{"TABLENAME":"SYSPERMS"},{"TABLENAME":"SYSROLES"},{"TABLENAME":"SYSROUTINEPERMS"},{"TABLENAME":"SYSSCHEMAS"},{"TABLENAME":"SYSSEQUENCES"},{"TABLENAME":"SYSSTATEMENTS"},{"TABLENAME":"SYSSTATISTICS"},{"TABLENAME":"SYSTABLEPERMS"},{"TABLENAME":"SYSTABLES"},{"TABLENAME":"SYSTRIGGERS"},{"TABLENAME":"SYSUSERS"},{"TABLENAME":"SYSVIEWS"},{"TABLENAME":"TENANT_CAPACITY"},{"TABLENAME":"TENANT_INFO"},{"TABLENAME":"USERS"}]}% ``` These endpoints are only valid when using embedded storage (derby DB) so this issue should not affect those installations using external storage (e.g. mysql)
{'CVE-2021-29442'}
2022-03-03T05:13:15.557718Z
2021-04-27T20:09:25Z
HIGH
null
{'CWE-306'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29442', 'https://github.com/alibaba/nacos/issues/4463', 'https://github.com/advisories/GHSA-36hp-jr8h-556f', 'https://github.com/alibaba/nacos/pull/4517'}
null
Maven
GHSA-4487-x383-qpph
Moderate severity vulnerability that affects org.springframework:spring-core
Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 and older unsupported versions, provide client-side support for multipart requests. When Spring MVC or Spring WebFlux server application (server A) receives input from a remote client, and then uses that input to make a multipart request to another server (server B), it can be exposed to an attack, where an extra multipart is inserted in the content of the request from server A, causing server B to use the wrong value for a part it expects. This could to lead privilege escalation, for example, if the part content represents a username or user roles.
{'CVE-2018-1272'}
2022-03-03T05:14:14.101094Z
2018-10-17T20:27:47Z
HIGH
null
null
{'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://pivotal.io/security/cve-2018-1272', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'http://www.securityfocus.com/bid/103697', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1272', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://access.redhat.com/errata/RHSA-2018:2669', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'https://access.redhat.com/errata/RHSA-2018:1320', 'https://github.com/advisories/GHSA-4487-x383-qpph'}
null
Maven
GHSA-jgwr-3qm3-26f3
Potential remote code execution in Apache Tomcat
The fix for CVE-2020-9484 was incomplete. When using Apache Tomcat 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41, 8.5.0 to 8.5.61 or 7.0.0. to 7.0.107 with a configuration edge case that was highly unlikely to be used, the Tomcat instance was still vulnerable to CVE-2020-9494. Note that both the previously published prerequisites for CVE-2020-9484 and the previously published mitigations for CVE-2020-9484 also apply to this issue.
{'CVE-2021-25329'}
2022-03-03T05:13:17.256982Z
2021-03-19T20:11:13Z
CRITICAL
null
{'CWE-502'}
{'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://security.netapp.com/advisory/ntap-20210409-0002/', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://github.com/apache/tomcat', 'https://lists.apache.org/thread.html/r8a2ac0e476dbfc1e6440b09dcc782d444ad635d6da26f0284725a5dc@%3Cusers.tomcat.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/03/01/2', 'https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r11ce01e8a4c7269b88f88212f21830edf73558997ac7744f37769b77@%3Cusers.tomcat.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25329', 'https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cusers.tomcat.apache.org%3E', 'https://www.debian.org/security/2021/dsa-4891', 'https://lists.apache.org/thread.html/r732b2ca289dc02df2de820e8775559abd6c207f159e39f559547a085@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/rb51ccd58b2152fc75125b2406fc93e04ca9d34e737263faa6ff0f41f@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cdev.tomcat.apache.org%3E', 'https://github.com/apache/tomcat/commit/6d66e99ef85da93e4d2c2a536ca51aa3418bfaf4', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.debian.org/debian-lts-announce/2021/03/msg00018.html', 'https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/rfe62fbf9d4c314f166fe8c668e50e5d9dd882a99447f26f0367474bf%40%3Cannounce.tomcat.apache.org%3E'}
null
Maven
GHSA-h8w4-qv99-f7vj
High severity vulnerability that affects org.springframework.security.oauth:spring-security-oauth2
Spring Security OAuth, versions 2.3 prior to 2.3.4, and 2.2 prior to 2.2.3, and 2.1 prior to 2.1.3, and 2.0 prior to 2.0.16, and older unsupported versions could be susceptible to a privilege escalation under certain conditions. A malicious user or attacker can craft a request to the approval endpoint that can modify the previously saved authorization request and lead to a privilege escalation on the subsequent approval. This scenario can happen if the application is configured to use a custom approval endpoint that declares AuthorizationRequest as a controller method argument. This vulnerability exposes applications that meet all of the following requirements: Act in the role of an Authorization Server (e.g. @EnableAuthorizationServer) and use a custom Approval Endpoint that declares AuthorizationRequest as a controller method argument. This vulnerability does not expose applications that: Act in the role of an Authorization Server and use the default Approval Endpoint, act in the role of a Resource Server only (e.g. @EnableResourceServer), act in the role of a Client only (e.g. @EnableOAuthClient).
{'CVE-2018-15758'}
2022-03-03T05:13:57.213171Z
2018-10-19T22:00:28Z
HIGH
null
null
{'https://access.redhat.com/errata/RHSA-2019:2413', 'https://pivotal.io/security/cve-2018-15758', 'https://nvd.nist.gov/vuln/detail/CVE-2018-15758', 'https://github.com/advisories/GHSA-h8w4-qv99-f7vj', 'http://www.securityfocus.com/bid/105687'}
null
Maven
GHSA-2hpg-vwqj-6h6w
Authentication bypass in Apache Kylin
Apache Kylin 2.0.0, 2.1.0, 2.2.0, 2.3.0, 2.3.1, 2.3.2, 2.4.0, 2.4.1, 2.5.0, 2.5.1, 2.5.2, 2.6.0, 2.6.1, 2.6.2, 2.6.3, 2.6.4, 2.6.5, 2.6.6, 3.0.0-alpha, 3.0.0-alpha2, 3.0.0-beta, 3.0.0, 3.0.1, 3.0.2, 3.1.0, 4.0.0-alpha has one restful api which exposed Kylin's configuration information without any authentication, so it is dangerous because some confidential information entries will be disclosed to everyone.
{'CVE-2020-13937'}
2022-03-03T05:13:15.260629Z
2022-02-10T20:25:56Z
MODERATE
null
{'CWE-922'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-13937', 'https://lists.apache.org/thread.html/rc592e0dcee5a2615f1d9522af30ef1822c1f863d5e05e7da9d1e57f4%40%3Cuser.kylin.apache.org%3E'}
null
Maven
GHSA-6w39-qhmq-g8cp
CSRF vulnerability in Jenkins Publish Over FTP Plugin
A cross-site request forgery (CSRF) vulnerability in Jenkins Publish Over FTP Plugin 1.16 and earlier allows attackers to connect to an FTP server using attacker-specified credentials.
{'CVE-2022-29050'}
2022-05-04T21:03:09.782938Z
2022-04-13T00:00:16Z
HIGH
null
{'CWE-352'}
{'https://github.com/jenkinsci/publish-over-ftp-plugin', 'https://nvd.nist.gov/vuln/detail/CVE-2022-29050', 'https://github.com/jenkinsci/publish-over-ftp-plugin/commit/b265201428557ab91304e06199ad38221efc23e7', 'https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2321'}
null
Maven
GHSA-65fg-84f6-3jq3
SQL Injection in Log4j 1.2.x
By design, the JDBCAppender in Log4j 1.2.x accepts an SQL statement as a configuration parameter where the values to be inserted are converters from PatternLayout. The message converter, %m, is likely to always be included. This allows attackers to manipulate the SQL by entering crafted strings into input fields or headers of an application that are logged allowing unintended SQL queries to be executed. Note this issue only affects Log4j 1.x when specifically configured to use the JDBCAppender, which is not the default. Beginning in version 2.0-beta8, the JDBCAppender was re-introduced with proper support for parameterized SQL queries and further customization over the columns written to in logs. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.
{'CVE-2022-23305'}
2022-04-22T15:47:06.606772Z
2022-01-21T23:26:47Z
CRITICAL
null
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23305', 'https://lists.apache.org/thread/pt6lh3pbsvxqlwlp4c5l798dv2hkc85y', 'https://logging.apache.org/log4j/1.2/index.html', 'http://www.openwall.com/lists/oss-security/2022/01/18/4', 'https://github.com/apache/logging-log4j1', 'https://security.netapp.com/advisory/ntap-20220217-0007/', 'https://www.oracle.com/security-alerts/cpuapr2022.html'}
null
Maven
GHSA-f9hv-mg5h-xcw9
High severity vulnerability that affects com.fasterxml.jackson.core:jackson-databind
FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the axis2-transport-jms class from polymorphic deserialization.
{'CVE-2018-19360'}
2022-03-03T05:12:35.261196Z
2019-01-04T19:06:57Z
CRITICAL
null
{'CWE-502'}
{'https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html', 'https://access.redhat.com/errata/RHSA-2019:3892', 'https://lists.apache.org/thread.html/37e1ed724a1b0e5d191d98c822c426670bdfde83804567131847d2a3@%3Cdevnull.infra.apache.org%3E', 'https://github.com/advisories/GHSA-f9hv-mg5h-xcw9', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:4037', 'https://access.redhat.com/errata/RHSA-2019:1782', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://nvd.nist.gov/vuln/detail/CVE-2018-19360', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://github.com/FasterXML/jackson-databind/commit/42912cac4753f3f718ece875e4d486f8264c2f2b', 'https://access.redhat.com/errata/RHSA-2019:1823', 'https://access.redhat.com/errata/RHBA-2019:0959', 'http://www.securityfocus.com/bid/107985', 'https://lists.apache.org/thread.html/c70da3cb6e3f03e0ad8013e38b6959419d866c4a7c80fdd34b73f25c@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20190530-0003/', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3140', 'https://seclists.org/bugtraq/2019/May/68', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://access.redhat.com/errata/RHSA-2019:0782', 'https://access.redhat.com/errata/RHSA-2019:3002', 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:0877', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:1822', 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.8', 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://github.com/FasterXML/jackson-databind/issues/2186', 'https://access.redhat.com/errata/RHSA-2019:1797', 'https://issues.apache.org/jira/browse/TINKERPOP-2121', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://access.redhat.com/errata/RHSA-2019:2804', 'https://www.debian.org/security/2019/dsa-4452'}
null
Maven
GHSA-qqv6-5w6p-3pgr
Moderate severity vulnerability that affects org.hswebframework.web:hsweb-commons
An issue was discovered in hsweb 3.0.4. It is a reflected XSS vulnerability due to the absence of type parameter checking in FlowableModelManagerController.java.
{'CVE-2018-20594'}
2022-03-03T05:13:53.425384Z
2019-01-04T17:43:30Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-20594', 'https://github.com/hs-web/hsweb-framework/issues/107', 'https://github.com/hs-web/hsweb-framework/commit/b72a2275ed21240296c6539bae1049c56abb542f', 'https://github.com/hs-web/hsweb-framework', 'https://github.com/advisories/GHSA-qqv6-5w6p-3pgr'}
null
Maven
GHSA-7fr2-94h7-ccg2
An issue in Atomix v3.1.5 allows unauthorized Atomix nodes to join a target cluster via providing configuration information.
An issue in Atomix v3.1.5 allows unauthorized Atomix nodes to join a target cluster via providing configuration information.
{'CVE-2020-35209'}
2022-03-03T05:13:55.439793Z
2021-12-17T20:41:33Z
HIGH
null
null
{'https://docs.google.com/presentation/d/1W5KU7ffh4dheR8iD54ulABImi6byAhSI-OhEKw2adRo/edit?usp=sharing', 'https://github.com/atomix/atomix', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35209'}
null
Maven
GHSA-j823-4qch-3rgm
Deserialization of untrusted data in Jackson Databind
FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interaction between serialization gadgets and typing, related to oadd.org.apache.xalan.lib.sql.JNDIConnectionPool (aka apache/drill).
{'CVE-2020-14060'}
2022-03-03T05:13:24.556259Z
2020-06-18T14:44:46Z
HIGH
null
{'CWE-502'}
{'https://lists.debian.org/debian-lts-announce/2020/07/msg00001.html', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://github.com/FasterXML/jackson-databind/issues/2688', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://security.netapp.com/advisory/ntap-20200702-0003/', 'https://github.com/FasterXML/jackson-databind', 'https://github.com/FasterXML/jackson-databind/commit/d1c67a0396e84c08d0558fbb843b5bd1f26e1921', 'https://nvd.nist.gov/vuln/detail/CVE-2020-14060', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-572314', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html'}
null
Maven
GHSA-f9xh-2qgp-cq57
Unsafe Deserialization in jackson-databind
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource.
{'CVE-2020-36188'}
2022-04-22T18:30:14.555358Z
2021-12-09T19:16:42Z
HIGH
null
{'CWE-502'}
{'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/FasterXML/jackson-databind', 'https://security.netapp.com/advisory/ntap-20210205-0005/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36188', 'https://github.com/FasterXML/jackson-databind/issues/2996', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}
null
Maven
GHSA-vp37-2f9p-3vr3
Cross-site Scripting in OWASP AntiSamy
AntiSamy is a library for performing fast, configurable cleansing of HTML coming from untrusted sources. OWASP AntiSamy before 1.6.7 allows XSS via HTML tag smuggling on STYLE content with crafted input. The output serializer does not properly encode the supposed Cascading Style Sheets (CSS) content. NOTE: this issue exists because of an incomplete fix for CVE-2022-28367.
{'CVE-2022-29577'}
2022-05-04T04:04:21.229446Z
2022-04-23T00:03:04Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-29577', 'https://github.com/nahsra/antisamy/releases/tag/v1.6.7', 'https://github.com/nahsra/antisamy', 'https://github.com/nahsra/antisamy/commit/32e273507da0e964b58c50fd8a4c94c9d9363af0'}
null
Maven
GHSA-w9jg-gvgr-354m
Resource Exhaustion in Spring Security
Spring Security versions 5.5.x prior to 5.5.1, 5.4.x prior to 5.4.7, 5.3.x prior to 5.3.10 and 5.2.x prior to 5.2.11 are susceptible to a Denial-of-Service (DoS) attack via the initiation of the Authorization Request in an OAuth 2.0 Client Web and WebFlux application. A malicious user or attacker can send multiple requests initiating the Authorization Request for the Authorization Code Grant, which has the potential of exhausting system resources using a single session or multiple sessions.
{'CVE-2021-22119'}
2022-03-03T05:12:41.141550Z
2021-07-02T18:33:34Z
HIGH
null
{'CWE-863', 'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-22119', 'https://lists.apache.org/thread.html/ra53677224fe4f04c2599abc88032076faa18dc84b329cdeba85d4cfc@%3Cpluto-scm.portals.apache.org%3E', 'https://tanzu.vmware.com/security/cve-2021-22119', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r163b3e4e39803882f5be05ee8606b2b9812920e196daa2a82997ce14@%3Cpluto-dev.portals.apache.org%3E', 'https://lists.apache.org/thread.html/r3868207b967f926819fe3aa8d33f1666429be589bb4a62104a49f4e3@%3Cpluto-dev.portals.apache.org%3E', 'https://lists.apache.org/thread.html/r89aa1b48a827f5641310305214547f1d6b2101971a49b624737c497f@%3Cpluto-dev.portals.apache.org%3E', 'https://lists.apache.org/thread.html/r08a449010786e0bcffa4b5781b04fcb55d6eafa62cb79b8347680aad@%3Cissues.nifi.apache.org%3E', 'https://github.com/spring-projects/spring-security/pull/9513', 'https://lists.apache.org/thread.html/r390783b3b1c59b978131ac08390bf77fbb3863270cbde59d5b0f5fde@%3Cpluto-dev.portals.apache.org%3E'}
null
Maven
GHSA-wrqf-rrrw-w3mg
Code injection in Apache Druid
Apache Druid includes the ability to execute user-provided JavaScript code embedded in various types of requests. This functionality is intended for use in high-trust environments, and is disabled by default. However, in Druid 0.20.0 and earlier, it is possible for an authenticated user to send a specially-crafted request that forces Druid to run user-provided JavaScript code for that request, regardless of server configuration. This can be leveraged to execute code on the target machine with the privileges of the Druid server process.
{'CVE-2021-25646'}
2022-03-03T05:13:44.303972Z
2021-06-16T17:40:47Z
HIGH
null
{'CWE-732'}
{'https://lists.apache.org/thread.html/r121abe8014d381943b63c60615149d40bde9dc1c868bcee90d0d0848@%3Ccommits.druid.apache.org%3E', 'http://packetstormsecurity.com/files/162345/Apache-Druid-0.20.0-Remote-Command-Execution.html', 'https://lists.apache.org/thread.html/r4f84b542417ea46202867c0a8b3eaf3b4cfed30e09174a52122ba210@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r7dff4790e7a5c697fc0360adf11f5aeb31cd6ad80644fffee690673c@%3Ccommits.druid.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25646', 'https://lists.apache.org/thread.html/r64431c2b97209f566b5dff92415e7afba0ed3bfab4695ebaa8a62e5d@%3Cdev.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r443e2916c612fbd119839c0fc0729327d6031913a75081adac5b43ad@%3Cdev.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r87aa94e28dd21ee2252d30c63f01ab9cb5474ee5bdd98dd8d7d734aa@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r20e0c3b10ae2c05a3aad40f1476713c45bdefc32c920b9986b941d8f@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/rc167d5e57f3120578718a7a458ce3e73b3830ac4efbb1b085bd06b92@%3Cdev.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r04fa1ba93599487c95a8497044d37f8c02a439bfcf92b4567bfb7c8f@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rea9436a4063927a567d698431ddae55e760c3f876c22ac5b9813685f@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rfda8a3aa6ac06a80c5cbfdeae0fc85f88a5984e32ea05e6dda46f866%40%3Cdev.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rfeb775822cd3baef1595b60f6860f5ca849eb1903236483f3297bd5c@%3Ccommits.druid.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/01/29/6', 'https://lists.apache.org/thread.html/ra4225912f501016bc5e0ac44e14b8d6779173a3a1dc7baacaabcc9ba@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r5ef625076982aee7d23c23f07717e626b73f421fba5154d1e4de15e1@%3Ccommits.druid.apache.org%3E'}
null
Maven
GHSA-g23v-p5jq-jvh4
Infinite loop in Apache CFX
A vulnerability in the JsonMapObjectReaderWriter of Apache CXF allows an attacker to submit malformed JSON to a web service, which results in the thread getting stuck in an infinite loop, consuming CPU indefinitely. This issue affects Apache CXF versions prior to 3.4.4; Apache CXF versions prior to 3.3.11.
{'CVE-2021-30468'}
2022-04-22T16:02:00.020875Z
2022-01-06T18:37:14Z
HIGH
null
{'CWE-400', 'CWE-835'}
{'https://lists.apache.org/thread.html/r4a4b6bc0520b69c18d2a59daa6af84ae49f0c22164dccb8538794459@%3Cdev.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/r4a4b6bc0520b69c18d2a59daa6af84ae49f0c22164dccb8538794459@%3Cannounce.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/06/16/2', 'https://lists.apache.org/thread.html/re9e05c6cab5f0dcc827eba4e6fcf26fa0b493e7ca84d62c867a80d03@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/rac07822057521dccf33ab5d136e0e8c599a6e2c8ac75e44ffbdc6e07@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r3f46ae38e4a6e80c069cdb320e0ce831b0a21a12ef0cc92c0943f34a@%3Ccommits.tomee.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'http://cxf.apache.org/security-advisories.data/CVE-2021-30468.txt.asc', 'https://lists.apache.org/thread.html/re5b2a2b77faa22684d47bd2ac6623135c615565328ff40a1ec705448@%3Ccommits.tomee.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r4771084730c4cf6e59eda60b4407122c86f174eb750b24f610ba9ff4@%3Ccommits.tomee.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210917-0002/', 'https://lists.apache.org/thread.html/r4a4b6bc0520b69c18d2a59daa6af84ae49f0c22164dccb8538794459@%3Cusers.cxf.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-30468', 'https://lists.apache.org/thread.html/r54c0f1cbbb9f381dfbedb9ea5e90ecb1c0a15371f40c4b10322ac737@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/ra833f78b3fa577cb43558cf343859a1bf70b1c5ce2353b3877d96422@%3Ccommits.tomee.apache.org%3E'}
null
Maven
GHSA-3pp3-77j6-8ph6
Missing Authentication for Critical Function in Apache NiFi
In Apache NiFi 1.0.0 to 1.11.4, the NiFi download token (one-time password) mechanism used a fixed cache size and did not authenticate a request to create a download token, only when attempting to use the token to access the content. An unauthenticated user could repeatedly request download tokens, preventing legitimate users from requesting download tokens.
{'CVE-2020-9487'}
2022-03-03T05:12:05.656413Z
2022-01-06T20:41:04Z
HIGH
null
{'CWE-306'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-9487', 'https://github.com/apache/nifi/commit/01e42dfb3291c3a3549023edadafd2d8023f3042', 'https://nifi.apache.org/security#CVE-2020-9487'}
null
Maven
GHSA-75xc-qvxh-27f8
Timing side channel vulnerability in UIDL request handler in Vaadin 7 and 8
Non-constant-time comparison of CSRF tokens in UIDL request handler in `com.vaadin:vaadin-server` versions 7.0.0 through 7.7.23 (Vaadin 7.0.0 through 7.7.23), and 8.0.0 through 8.12.2 (Vaadin 8.0.0 through 8.12.2) allows attacker to guess a security token via timing attack - https://vaadin.com/security/cve-2021-31403
{'CVE-2021-31403'}
2022-03-03T05:13:44.786638Z
2021-04-19T14:51:06Z
MODERATE
null
{'CWE-208', 'CWE-203'}
{'https://github.com/vaadin/framework/pull/12188', 'https://github.com/vaadin/framework/pull/12190', 'https://vaadin.com/security/cve-2021-31403', 'https://github.com/vaadin/framework/security/advisories/GHSA-75xc-qvxh-27f8', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31403'}
null
Maven
GHSA-7q9c-h23x-65fq
Moderate severity vulnerability that affects org.springframework.security.oauth:spring-security-oauth2
When processing authorization requests using the whitelabel views in Spring Security OAuth 2.0.0 to 2.0.9 and 1.0.0 to 1.0.5, the response_type parameter value was executed as Spring SpEL which enabled a malicious user to trigger remote code execution via the crafting of the value for response_type.
{'CVE-2016-4977'}
2022-03-03T05:13:14.141279Z
2018-10-18T18:06:22Z
HIGH
null
null
{'https://lists.apache.org/thread.html/5e6dd946635bbcc9e1f2591599ad0fab54f2dc3714196af3b17893f2@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/37d7e820fc65a768de3e096e98382d5529a52a039f093e59357d0bc0@%3Cdev.fineract.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2019/10/16/1', 'https://github.com/advisories/GHSA-7q9c-h23x-65fq', 'https://lists.apache.org/thread.html/0841d849c23418c473ccb9183cbf41a317cb0476e44be48022ce3488@%3Cdev.fineract.apache.org%3E', 'https://pivotal.io/security/cve-2016-4977', 'https://lists.apache.org/thread.html/96c017115069408cec5e82ce1e6293facab398011f6db7e1befbe274@%3Cdev.fineract.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2016-4977'}
null
Maven
GHSA-p5gm-fgfx-hr7h
Gadget chain attack in Nippy
A deserialization flaw is present in Taoensso Nippy before 2.14.2. In some circumstances, it is possible for an attacker to create a malicious payload that, when deserialized, will allow arbitrary code to be executed. This occurs because there is automatic use of the Java Serializable interface.
{'CVE-2020-24164'}
2021-05-04T21:47:51Z
2022-02-10T20:55:10Z
HIGH
null
{'CWE-502'}
{'https://github.com/ptaoussanis/nippy/commit/61fb009fdde2994140f2da2e495ba8af3a873eb2', 'https://github.com/ptaoussanis/nippy/issues/130', 'https://nvd.nist.gov/vuln/detail/CVE-2020-24164'}
null
Maven
GHSA-6x48-j4x4-cqw3
Moderate severity vulnerability that affects org.apache.hadoop:hadoop-main
Apache Hadoop 3.1.0, 3.0.0-alpha to 3.0.2, 2.9.0 to 2.9.1, 2.8.0 to 2.8.4, 2.0.0-alpha to 2.7.6, 0.23.0 to 0.23.11 is exploitable via the zip slip vulnerability in places that accept a zip file.
{'CVE-2018-8009'}
2022-03-03T05:13:27.955245Z
2018-12-21T17:50:29Z
HIGH
null
{'CWE-22'}
{'https://snyk.io/research/zip-slip-vulnerability', 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E', 'https://hadoop.apache.org/cve_list.html#cve-2018-8009-http-cve-mitre-org-cgi-bin-cvename-cgi-name-cve-2018-8009-zip-slip-impact-on-apache-hadoop', 'https://access.redhat.com/errata/RHSA-2019:3892', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8009', 'https://lists.apache.org/thread.html/a1c227745ce30acbcf388c5b0cc8423e8bf495d619cd0fa973f7f38d@%3Cuser.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r4dddf1705dbedfa94392913b2dad1cd2d1d89040facd389eea0b3510@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rb21df54a4e39732ce653d2aa5672e36a792b59eb6717f2a06bb8d02a@%3Ccommits.druid.apache.org%3E', 'http://www.securityfocus.com/bid/105927', 'https://github.com/advisories/GHSA-6x48-j4x4-cqw3'}
null
Maven
GHSA-j53j-gmr9-h8g3
Moderate severity vulnerability that affects org.apache.tika:tika-core
In Apache Tika 1.2 to 1.18, a carefully crafted file can trigger an infinite loop in the IptcAnpaParser.
{'CVE-2018-8017'}
2022-03-03T05:13:03.543724Z
2018-10-17T15:50:31Z
MODERATE
null
{'CWE-835'}
{'https://github.com/advisories/GHSA-j53j-gmr9-h8g3', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8017', 'http://www.securityfocus.com/bid/105513', 'https://lists.apache.org/thread.html/72df7a3f0dda49a912143a1404b489837a11f374dfd1961061873a91@%3Cdev.tika.apache.org%3E', 'https://github.com/apache/tika'}
null
Maven
GHSA-gg9m-fj3v-r58c
REST Plugin in Apache Struts uses an XStreamHandler with an instance of XStream for deserialization without any type filtering
The REST Plugin in Apache Struts 2.1.2 through 2.3.x before 2.3.34 and 2.5.x before 2.5.13 uses an XStreamHandler with an instance of XStream for deserialization without any type filtering, which can lead to Remote Code Execution when deserializing XML payloads.
{'CVE-2017-9805'}
2022-04-26T19:15:51.212536Z
2018-10-16T19:37:56Z
HIGH
null
{'CWE-502'}
{'https://www.kb.cert.org/vuls/id/112992', 'https://lgtm.com/blog/apache_struts_CVE-2017-9805', 'https://nvd.nist.gov/vuln/detail/CVE-2017-9805', 'https://security.netapp.com/advisory/ntap-20170907-0001/', 'https://www.exploit-db.com/exploits/42627/', 'http://www.securityfocus.com/bid/100609', 'https://github.com/advisories/GHSA-gg9m-fj3v-r58c', 'https://blogs.apache.org/foundation/entry/apache-struts-statement-on-equifax', 'http://www.securitytracker.com/id/1039263', 'https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170907-struts2', 'https://struts.apache.org/docs/s2-052.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=1488482', 'http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html', 'https://cwiki.apache.org/confluence/display/WW/S2-052'}
null
Maven
GHSA-227w-wv4j-67h4
Class Loading Vulnerability in Artemis
### Impact This affects all Artemis users who test Java assignments. **Ares is not required.** Students code that gets automatically tested can run arbitrary code in the container, or arbitrary code on the machine of an assessor in case of manual correction. ### Patches The problem cannot be resolved easily in Ares itself. Use the Maven Enforcer Plugin as follows: ```xml <plugin> <groupId>org.apache.maven.plugins</groupId> <artifactId>maven-enforcer-plugin</artifactId> <version>3.0.0</version> <executions> <execution> <id>enforce-no-student-code-in-trusted-packages</id> <phase>process-classes</phase> <goals> <goal>enforce</goal> </goals> </execution> </executions> <configuration> <rules> <requireFilesDontExist> <files> <!-- ADD HERE THE RULES ARES TELLS YOU ARE MISSING --> </files> </requireFilesDontExist> </rules> </configuration> </plugin> ``` This fails the build if student classes reside in such packages that Ares trusts. Trusted packages added in Ares using `@AddTrustedPackage` should be added as well. ### For more information If you have any questions or comments about this advisory: * Open a discussion https://github.com/ls1intum/Ares/discussions * Open an issue in https://github.com/ls1intum/Ares/issues * Email us, see https://github.com/ls1intum/Ares/security/policy ### References See the assignment of Julius that passes the tests in TUM Artemis course: "Test - Praktikum: Grundlagen der Programmierung (Testkurs für Tutoren) - Security Tests" (if that still exists in 2022). Also see #15 for almost the same problem.
null
2022-03-03T05:13:55.319882Z
2022-02-09T22:30:30Z
HIGH
null
{'CWE-653', 'CWE-501'}
{'https://github.com/ls1intum/Ares/issues/15', 'https://github.com/ls1intum/Ares', 'https://github.com/ls1intum/Ares/releases/tag/1.8.0', 'https://github.com/ls1intum/Ares/security/advisories/GHSA-227w-wv4j-67h4'}
null
Maven
GHSA-hxp5-8pgq-mgv9
Missing Authentication for Critical Function in Apache Calcite
"HttpUtils#getURLConnection method disables explicitly hostname verification for HTTPS connections making clients vulnerable to man-in-the-middle attacks. Calcite uses this method internally to connect with Druid and Splunk so information leakage may happen when using the respective Calcite adapters. The method itself is in a utility class so people may use it to create vulnerable HTTPS connections for other applications. From Apache Calcite 1.26 onwards, the hostname verification will be performed using the default JVM truststore."
{'CVE-2020-13955'}
2022-03-03T05:13:26.228267Z
2021-04-22T16:14:14Z
MODERATE
null
{'CWE-295'}
{'https://github.com/apache/calcite/commit/43eeafcbac29d02c72bd520c003cdfc571de2d15', 'https://issues.apache.org/jira/browse/CALCITE-4298', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13955', 'https://lists.apache.org/thread.html/r0b0fbe2038388175951ce1028182d980f9e9a7328be13d52dab70bb3%40%3Cdev.calcite.apache.org%3E'}
null
Maven
GHSA-rf7q-xqm3-6923
Apache Ranger allows remote authenticated administrators to inject arbitrary web script or HTML
Cross-site scripting (XSS) vulnerability in the create user functionality in the policy admin tool in Apache Ranger before 0.6.1 allows remote authenticated administrators to inject arbitrary web script or HTML via vectors related to policies.
{'CVE-2016-5395'}
2022-04-27T14:00:07.089691Z
2018-10-17T17:21:37Z
MODERATE
null
{'CWE-79'}
{'https://github.com/advisories/GHSA-rf7q-xqm3-6923', 'http://www.securityfocus.com/bid/92577', 'https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger', 'https://nvd.nist.gov/vuln/detail/CVE-2016-5395'}
null
Maven
GHSA-5h26-c766-g93v
Cross-Site Scripting
A reflected Cross-Site Scripting (XSS) flaw was found in RESTEasy in all versions of RESTEasy up to 4.6.0.Final, where it did not properly handle URL encoding when calling @javax.ws.rs.PathParam without any @Produces MediaType. This flaw allows an attacker to launch a reflected XSS attack. The highest threat from this vulnerability is to data confidentiality and integrity.
{'CVE-2021-20293'}
2022-03-03T05:14:08.493716Z
2021-06-15T15:59:27Z
HIGH
null
{'CWE-79'}
{'https://security.netapp.com/advisory/ntap-20210727-0005/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20293', 'https://bugzilla.redhat.com/show_bug.cgi?id=1942819'}
null
Maven
GHSA-j7c3-96rf-jrrp
Critical vulnerability in log4j may affect generated PEAR projects
### Impact UIMA PEAR projects that have been generated with the `de.averbis.textanalysis:pear-archetype ` version `2.0.0` have a maven dependency with scope `test` to` log4j 2.8.2` and might be affected by CVE-2021-44228. ### Patches - The issue has been resolved in `de.averbis.textanalysis:pear-archetype ` version `2.0.1`. Please make sure to use `de.averbis.textanalysis:pear-archetype ` version >= `2.0.1` for generating new PEAR projects. - Existing maven PEAR projects can be patched by manually upgrading to `log4j` >= `2.16.0` in `pom.xml`. ### References https://www.lunasec.io/docs/blog/log4j-zero-day/ ### For more information If you have any questions or comments about this advisory: * Open an issue in https://github.com/averbis/pear-archetype/issues
null
2021-12-16T18:57:47Z
2021-12-16T21:01:51Z
CRITICAL
null
null
{'https://github.com/averbis/pear-archetype/commit/6815f5981c836ab8c345a6ff54f29e9f4b67f7eb', 'https://github.com/averbis/pear-archetype', 'https://github.com/averbis/pear-archetype/security/advisories/GHSA-j7c3-96rf-jrrp'}
null
Maven
GHSA-f8vc-wfc8-hxqh
Improper Privilege Management in Apache Hadoop
In Apache Hadoop 3.2.0 to 3.2.1, 3.0.0-alpha1 to 3.1.3, and 2.0.0-alpha to 2.10.0, WebHDFS client might send SPNEGO authorization header to remote URL without proper verification.
{'CVE-2020-9492'}
2022-03-03T05:13:35.486633Z
2022-02-09T22:17:38Z
HIGH
null
{'CWE-863', 'CWE-269'}
{'https://github.com/apache/hadoop', 'https://github.com/apache/hadoop/commit/ca65409836d2949e9a9408d40bec0177b414cd5d', 'https://lists.apache.org/thread.html/r9328eb49305e4cacc80e182bfd8a2efd8e640d940e24f5bfd7d5cb26@%3Cissues.solr.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9492', 'https://lists.apache.org/thread.html/rc0057ebf32b646ab47f7f5744a8948332e015c39044cbb9d87ea76cd@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r513758942356ccd0d14538ba18a09903fc72716d74be1cb727ea91ff%40%3Cgeneral.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r4a57de5215494c35c8304cf114be75d42df7abc6c0c54bf163c3e370@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/rca4516b00b55b347905df45e5d0432186248223f30497db87aba8710@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r49c9ab444ab1107c6a8be8a0d66602dec32a16d96c2631fec8d309fb@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r79201a209df9a4e7f761e537434131b4e39eabec4369a7d668904df4@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r79323adac584edab99fd5e4b52a013844b784a5d4b600da0662b33d6@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rb12afaa421d483863c4175e42e5dbd0673917a3cff73f3fca4f8275f@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/re4129c6b9e0410848bbd3761187ce9c19bc1cd491037b253007df99e@%3Cissues.solr.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210304-0001/', 'https://lists.apache.org/thread.html/r0a534f1cde7555f7208e9f9b791c1ab396d215eaaef283b3a9153429@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r6c2fa7949738e9d39606f1d7cd890c93a2633e3357c9aeaf886ea9a6@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r6341f2a468ced8872a71997aa1786ce036242413484f0fa68dc9ca02@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r941e9be04efe0f455d20aeac88516c0848decd7e7b1d93d5687060f4@%3Ccommits.druid.apache.org%3E'}
null
Maven
GHSA-rcpf-vj53-7h2m
Moderate severity vulnerability that affects org.springframework:spring-core
Spring Framework, versions 5.0.x prior to 5.0.6, versions 4.3.x prior to 4.3.17, and older unsupported versions allows applications to expose STOMP over WebSocket endpoints with a simple, in-memory STOMP broker through the spring-messaging module. A malicious user (or attacker) can craft a message to the broker that can lead to a regular expression, denial of service attack.
{'CVE-2018-1257'}
2022-03-03T05:14:16.104456Z
2018-10-17T20:02:20Z
MODERATE
null
null
{'https://nvd.nist.gov/vuln/detail/CVE-2018-1257', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://pivotal.io/security/cve-2018-1257', 'https://github.com/advisories/GHSA-rcpf-vj53-7h2m', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'https://access.redhat.com/errata/RHSA-2018:3768', 'http://www.securityfocus.com/bid/104260', 'https://access.redhat.com/errata/RHSA-2018:1809'}
null
Maven
GHSA-4w4p-xwrr-9crh
Injection in Apache Syncope
Vulnerability to Server-Side Template Injection on Mail templates for Apache Syncope 2.0.X releases prior to 2.0.15, 2.1.X releases prior to 2.1.6, enabling attackers to inject arbitrary JEXL expressions, leading to Remote Code Execution (RCE) was discovered.
{'CVE-2020-1961'}
2022-03-03T05:14:20.591494Z
2021-06-16T17:18:49Z
HIGH
null
{'CWE-74'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-1961', 'http://syncope.apache.org/security'}
null
Maven
GHSA-fv3m-xhqw-9m79
ballcat-codegen template engine remote code execution injection
### Impact Ballcat Codegen provides the function of online editing code to generate templates. In version < 1.0.0.beta.2, since Velocity and freemarker templates are introduced but input verification is not done, attackers can implement remote code execution through malicious code injection of the template engine. ### Patches The fault is rectified and needs to be upgraded to the latest version.
{'CVE-2022-24881'}
2022-04-27T21:16:49.063003Z
2022-04-27T21:05:15Z
HIGH
null
{'CWE-78'}
{'https://github.com/ballcat-projects/ballcat-codegen/security/advisories/GHSA-fv3m-xhqw-9m79', 'https://github.com/ballcat-projects/ballcat-codegen/issues/5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24881', 'https://github.com/ballcat-projects/ballcat-codegen', 'https://github.com/ballcat-projects/ballcat-codegen/commit/84a7cb38daf0295b93aba21d562ec627e4eb463b'}
null