ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Maven | GHSA-rpq8-mmwh-q9hm | Directory traversal in Eclipse Mojarra | Directory traversal in Eclipse Mojarra before 2.3.14 allows attackers to read arbitrary files via the loc parameter or con parameter. | {'CVE-2020-6950'} | 2022-04-22T16:01:59.732772Z | 2021-09-01T18:23:58Z | HIGH | null | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-6950', 'https://github.com/eclipse-ee4j/mojarra', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/eclipse-ee4j/mojarra/commit/cefbb9447e7be560e59da2da6bd7cb93776f7741', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/eclipse-ee4j/mojarra/issues/4571', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=550943'} | null |
Maven | GHSA-6phf-73q6-gh87 | Insecure Deserialization in Apache Commons Beanutils | In Apache Commons Beanutils 1.9.2, a special BeanIntrospector class was added which allows suppressing the ability for an attacker to access the classloader via the class property available on all Java objects. We, however were not using this by default characteristic of the PropertyUtilsBean. | {'CVE-2019-10086'} | 2022-04-21T18:03:45.605116Z | 2020-06-15T20:36:17Z | HIGH | null | {'CWE-502'} | {'https://lists.apache.org/thread.html/r6194ced4828deb32023cd314e31f41c61d388b58935d102c7de91f58@%3Cdev.atlas.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0806', 'https://lists.apache.org/thread.html/r513a7a21c422170318115463b399dd58ab447fe0990b13e5884f0825@%3Ccommits.dolphinscheduler.apache.org%3E', 'https://lists.apache.org/thread.html/rb1f76c2c0a4d6efb8a3523974f9d085d5838b73e7bffdf9a8f212997@%3Cissues.nifi.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/rb8dac04cb7e9cc5dedee8dabaa1c92614f590642e5ebf02a145915ba@%3Ccommits.atlas.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4APPGLBWMFAS4WHNLR4LIJ65DJGPV7TF/', 'https://lists.apache.org/thread.html/r2d5f1d88c39bd615271abda63964a0bee9b2b57fef1f84cb4c43032e@%3Cissues.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/r46e536fc98942dce99fadd2e313aeefe90c1a769c5cd85d98df9d098@%3Cissues.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://lists.apache.org/thread.html/a684107d3a78e431cf0fbb90629e8559a36ff8fe94c3a76e620b39fa@%3Cdev.shiro.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0057', 'https://lists.apache.org/thread.html/re2028d4d76ba1db3e3c3a722d6c6034e801cc3b309f69cc166eaa32b@%3Ccommits.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/rd2d2493f4f1af6980d265b8d84c857e2b7ab80a46e1423710c448957@%3Cissues.nifi.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://access.redhat.com/errata/RHSA-2020:0811', 'https://lists.debian.org/debian-lts-announce/2019/08/msg00030.html', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.apache.org/thread.html/r967953a14e05016bc4bcae9ef3dd92e770181158b4246976ed8295c9@%3Cdev.brooklyn.apache.org%3E', 'https://lists.apache.org/thread.html/reee57101464cf7622d640ae013b2162eb864f603ec4093de8240bb8f@%3Cdev.atlas.apache.org%3E', 'https://lists.apache.org/thread.html/r18d8b4f9263e5cad3bbaef0cdba0e2ccdf9201316ac4b85e23eb7ee4@%3Cdev.atlas.apache.org%3E', 'https://lists.apache.org/thread.html/ra87ac17410a62e813cba901fdd4e9a674dd53daaf714870f28e905f1@%3Cdev.atlas.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/c94bc9649d5109a663b2129371dc45753fbdeacd340105548bbe93c3@%3Cdev.shiro.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIUYSL2RSIWZVNSUIXJTIFPIPIF6OAIO/', 'https://lists.apache.org/thread.html/rec74f3a94dd850259c730b4ba6f7b6211222b58900ec088754aa0534@%3Cissues.nifi.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:4317', 'https://access.redhat.com/errata/RHSA-2020:0194', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/5261066cd7adee081ee05c8bf0e96cf0b2eeaced391e19117ae4daa6@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/rae81e0c8ebdf47ffaa85a01240836bfece8a990c48f55c7933162b5c@%3Cdev.atlas.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/956995acee0d8bc046f1df0a55b7fbeb65dd2f82864e5de1078bacb0@%3Cissues.commons.apache.org%3E', 'https://lists.apache.org/thread.html/r43de02fd4a4f52c4bdeff8c02f09625d83cd047498009c1cdab857db@%3Cdev.rocketmq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.apache.org/thread.html/rcc029be4edaaf5b8bb85818aab494e16f312fced07a0f4a202771ba2@%3Cissues.nifi.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/r306c0322aa5c0da731e03f3ce9f07f4745c052c6b73f4e78faf232ca@%3Cdev.atlas.apache.org%3E', 'https://lists.apache.org/thread.html/1f78f1e32cc5614ec0c5b822ba4bd7fc8e8b5c46c8e038b6bd609cb5@%3Cissues.commons.apache.org%3E', 'https://lists.apache.org/thread.html/racd3e7b2149fa2f255f016bd6bffab0fea77b6fb81c50db9a17f78e6@%3Cdev.atlas.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/2fd61dc89df9aeab738d2b49f48d42c76f7d53b980ba04e1d48bce48@%3Cdev.shiro.apache.org%3E', 'http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00007.html', 'https://lists.apache.org/thread.html/ra9a139fdc0999750dcd519e81384bc1fe3946f311b1796221205f51c@%3Ccommits.dolphinscheduler.apache.org%3E', 'https://github.com/apache/commons-beanutils', 'https://access.redhat.com/errata/RHSA-2020:0804', 'https://lists.apache.org/thread.html/3d1ed1a1596c08c4d5fea97b36c651ce167b773f1afc75251ce7a125@%3Ccommits.tinkerpop.apache.org%3E', 'https://lists.apache.org/thread.html/02094ad226dbc17a2368beaf27e61d8b1432f5baf77d0ca995bb78bc@%3Cissues.commons.apache.org%3E', 'http://mail-archives.apache.org/mod_mbox/www-announce/201908.mbox/%3cC628798F-315D-4428-8CB1-4ED1ECC958E4@apache.org%3e', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/ra41fd0ad4b7e1d675c03a5081a16a6603085a4e37d30b866067566fe@%3Cissues.nifi.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0805', 'https://lists.apache.org/thread.html/d6ca9439c53374b597f33b7ec180001625597db48ea30356af01145f@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/re3cd7cb641d7fc6684e4fc3c336a8bad4a01434bb5625a06e3600fd1@%3Cissues.nifi.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10086'} | null |
Maven | GHSA-r4x2-3cq5-hqvp | The defaults settings for the CORS filter provided in Apache Tomcat are insecure and enable 'supportsCredentials' for all origins | The defaults settings for the CORS filter provided in Apache Tomcat 9.0.0.M1 to 9.0.8, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, 7.0.41 to 7.0.88 are insecure and enable 'supportsCredentials' for all origins. It is expected that users of the CORS filter will have configured it appropriately for their environment rather than using it in the default configuration. Therefore, it is expected that most users will not be impacted by this issue. | {'CVE-2018-8014'} | 2022-04-27T13:45:20.891887Z | 2018-10-17T16:32:32Z | CRITICAL | null | {'CWE-1188'} | {'https://seclists.org/bugtraq/2019/Dec/43', 'https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2469', 'http://tomcat.apache.org/security-9.html', 'https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20181018-0002/', 'https://usn.ubuntu.com/3665-1/', 'http://www.securityfocus.com/bid/104203', 'http://www.securitytracker.com/id/1040998', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'https://www.debian.org/security/2019/dsa-4596', 'https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E', 'http://tomcat.apache.org/security-8.html', 'https://access.redhat.com/errata/RHSA-2018:3768', 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E', 'http://www.securitytracker.com/id/1041888', 'https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8014', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.debian.org/debian-lts-announce/2019/08/msg00015.html', 'https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2470', 'https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2018/06/msg00008.html', 'https://github.com/advisories/GHSA-r4x2-3cq5-hqvp', 'https://access.redhat.com/errata/RHSA-2019:2205', 'https://access.redhat.com/errata/RHSA-2019:0450', 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4@%3Cissues.activemq.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:1529', 'https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:0451', 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E', 'http://tomcat.apache.org/security-7.html', 'https://lists.apache.org/thread.html/fbfb713e4f8a4c0f81089b89450828011343593800cae3fb629192b1@%3Cannounce.tomcat.apache.org%3E'} | null |
Maven | GHSA-26gr-cvq3-qxgf | Improper Authentication in Apache Shiro | Apache Shiro before 1.5.2, when using Apache Shiro with Spring dynamic controllers, a specially crafted request may cause an authentication bypass. | {'CVE-2020-1957'} | 2022-04-01T20:31:58.288104Z | 2021-05-07T15:53:18Z | CRITICAL | null | {'CWE-287'} | {'https://lists.apache.org/thread.html/rc8b39ea8b3ef71ddc1cd74ffc866546182683c8adecf19c263fe7ac0@%3Ccommits.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r2d2612c034ab21a3a19d2132d47d3e4aa70105008dd58af62b653040@%3Ccommits.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r17f371fc89d34df2d0c8131473fbc68154290e1be238895648f5a1e6%40%3Cdev.shiro.apache.org%3E', 'https://github.com/apache/shiro', 'https://lists.apache.org/thread.html/rb3982edf8bc8fcaa7a308e25a12d294fb4aac1f1e9d4e14fda639e77@%3Cdev.geode.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/04/msg00014.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1957', 'https://lists.apache.org/thread.html/rc64fb2336683feff3580c3c3a8b28e80525077621089641f2f386b63@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/rab1972d6b177f7b5c3dde9cfb0a40f03bca75f0eaf1d8311e5762cb3@%3Ccommits.shiro.apache.org%3E'} | null |
Maven | GHSA-4cch-wxpw-8p28 | Server-Side Forgery Request can be activated unmarshalling with XStream | ### Impact
The vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream.
### Patches
If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.15.
### Workarounds
The reported vulnerability does not exist running Java 15 or higher.
No user is affected, who followed the recommendation to setup XStream's Security Framework with a whitelist! Anyone relying on XStream's default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability.
Users of XStream 1.4.14 or below who still insist to use XStream default blacklist - despite that clear recommendation - can use a workaround depending on their version in use.
Users of XStream 1.4.14 can simply add two lines to XStream's setup code:
```Java
xstream.denyTypes(new String[]{ "jdk.nashorn.internal.objects.NativeString" });
xstream.denyTypesByRegExp(new String[]{ ".*\\.ReadAllStream\\$FileStream" });
```
Users of XStream 1.4.14 to 1.4.13 can simply add three lines to XStream's setup code:
```Java
xstream.denyTypes(new String[]{ "javax.imageio.ImageIO$ContainsFilter", "jdk.nashorn.internal.objects.NativeString" });
xstream.denyTypes(new Class[]{ java.lang.ProcessBuilder.class });
xstream.denyTypesByRegExp(new String[]{ ".*\\.ReadAllStream\\$FileStream" });
```
Users of XStream 1.4.12 to 1.4.7 who want to use XStream with a black list will have to setup such a list from scratch and deny at least the following types: _javax.imageio.ImageIO$ContainsFilter_, _java.beans.EventHandler_, _java.lang.ProcessBuilder_, _jdk.nashorn.internal.objects.NativeString.class_, _java.lang.Void_ and _void_ and deny several types by name pattern.
```Java
xstream.denyTypes(new String[]{ "javax.imageio.ImageIO$ContainsFilter", "jdk.nashorn.internal.objects.NativeString" });
xstream.denyTypes(new Class[]{ java.lang.ProcessBuilder.class, "jdk.nashorn.internal.objects.NativeString", java.beans.EventHandler.class, java.lang.ProcessBuilder.class, java.lang.Void.class, void.class });
xstream.denyTypesByRegExp(new String[]{ ".*\\$LazyIterator", "javax\\.crypto\\..*", ".*\\.ReadAllStream\\$FileStream" });
```
Users of XStream 1.4.6 or below can register an own converter to prevent the unmarshalling of the currently know critical types of the Java runtime. It is in fact an updated version of the workaround for CVE-2013-7285:
```Java
xstream.registerConverter(new Converter() {
public boolean canConvert(Class type) {
return type != null && (type == java.beans.EventHandler.class || type == java.lang.ProcessBuilder.class
|| type.getName().equals("javax.imageio.ImageIO$ContainsFilter") || type.getName().equals("jdk.nashorn.internal.objects.NativeString")
|| type == java.lang.Void.class || void.class || Proxy.isProxy(type))
|| type.getName().startsWith("javax.crypto.") || type.getName().endsWith("$LazyIterator") || type.getName().endsWith(".ReadAllStream$FileStream"));
}
public Object unmarshal(HierarchicalStreamReader reader, UnmarshallingContext context) {
throw new ConversionException("Unsupported type due to security reasons.");
}
public void marshal(Object source, HierarchicalStreamWriter writer, MarshallingContext context) {
throw new ConversionException("Unsupported type due to security reasons.");
}
}, XStream.PRIORITY_LOW);
```
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [XStream](https://github.com/x-stream/xstream/issues)
* Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user) | {'CVE-2020-26258'} | 2022-03-03T05:12:48.580755Z | 2020-12-21T16:28:42Z | HIGH | null | {'CWE-918'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-26258', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://lists.apache.org/thread.html/r97993e3d78e1f5389b7b172ba9f308440830ce5f051ee62714a0aa34@%3Ccommits.struts.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/12/msg00042.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://www.debian.org/security/2021/dsa-4828', 'https://x-stream.github.io/CVE-2020-26258.html', 'https://security.netapp.com/advisory/ntap-20210409-0005/', 'https://github.com/x-stream/xstream', 'https://github.com/x-stream/xstream/security/advisories/GHSA-4cch-wxpw-8p28'} | null |
Maven | GHSA-8vh8-vc28-m2hf | Potential to access user credentials from the log files when debug logging enabled | A flaw was found in, all under 2.0.20, in the Undertow DEBUG log for io.undertow.request.security. If enabled, an attacker could abuse this flaw to obtain the user's credentials from the log files. | {'CVE-2019-10212'} | 2022-03-03T05:12:47.219379Z | 2019-11-20T01:33:54Z | CRITICAL | null | {'CWE-532'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-10212', 'https://security.netapp.com/advisory/ntap-20220210-0017/', 'https://access.redhat.com/errata/RHSA-2019:2998', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10212', 'https://access.redhat.com/errata/RHSA-2020:0727'} | null |
Maven | GHSA-4pm3-f52j-8ggh | Improper Input Validation in GeoServer | ### Impact
The GeoServer security mechanism can perform an unchecked JNDI lookup, which in turn can be used to perform class deserialization and result in arbitrary code execution. The same can happen while configuring data stores with data sources located in JNDI, or while setting up the disk quota mechanism.
In order to perform any of the above changes, the attack needs to have obtained admin rights and use either the GeoServer GUI, or its REST API.
### Patches
The lookups are going to be restricted in GeoServer 2.21.0, 2.20.4, 2.19.6.
### Workarounds
Protection can be achieved by making the GUI (``geoserver/web``), the REST configuration (``geoserver/rest``) and the embedded GeoWebCache configuration (``geoserver/gwc/rest``) unreachable from remote hosts, in addition to protecting access to the file system where the GeoServer configuration is stored.
| {'CVE-2022-24847'} | 2022-04-22T20:39:10Z | 2022-04-22T20:39:10Z | HIGH | null | {'CWE-20'} | {'https://github.com/geoserver/geoserver/commit/b94a69943992df999d627b21a4ed056fad4569f8', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24847', 'https://github.com/geoserver/geoserver/security/advisories/GHSA-4pm3-f52j-8ggh', 'https://github.com/geoserver/geoserver'} | null |
Maven | GHSA-jgmr-wrwx-mgfj | Exposure of Sensitive Information to an Unauthorized Actor and SQL Injection in Spring Data JPA | This affects Spring Data JPA in versions up to and including 2.1.5, 2.0.13 and 1.11.19. Derived queries using any of the predicates ?startingWith?, ?endingWith? or ?containing? could return more results than anticipated when a maliciously crafted query parameter value is supplied. Also, LIKE expressions in manually defined queries could return unexpected results if the parameter values bound did not have escaped reserved characters properly. | {'CVE-2019-3797'} | 2022-03-03T05:13:54.696088Z | 2019-05-14T04:02:35Z | MODERATE | null | {'CWE-200', 'CWE-89'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-3797', 'https://pivotal.io/security/cve-2019-3797'} | null |
Maven | GHSA-mc84-pj99-q6hh | Improper Handling of Length Parameter Inconsistency in Compress | When reading a specially crafted ZIP archive, Compress can be made to allocate large amounts of memory that finally leads to an out of memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' zip package. | {'CVE-2021-36090'} | 2022-04-22T16:02:00.119403Z | 2021-08-02T16:55:53Z | HIGH | null | {'CWE-130'} | {'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/racd0c0381c8404f298b226cd9db2eaae965b14c9c568224aa3f437ae@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/r9a23d4dbf4e34d498664080bff59f2893b855eb16dae33e4aa92fa53@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/rc4134026d7d7b053d4f9f2205531122732405012c8804fd850a9b26f%40%3Cuser.commons.apache.org%3E', 'https://lists.apache.org/thread.html/rfba19167efc785ad3561e7ef29f340d65ac8f0d897aed00e0731e742@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/rbbf42642c3e4167788a7c13763d192ee049604d099681f765385d99d@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/rdd5412a5b9a25aed2a02c3317052d38a97128314d50bc1ed36e81d38@%3Cuser.ant.apache.org%3E', 'https://lists.apache.org/thread.html/rd4332baaf6debd03d60deb7ec93bee49e5fdbe958cb6800dff7fb00e@%3Cnotifications.skywalking.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36090', 'https://lists.apache.org/thread.html/rb064d705fdfa44b5dae4c366b369ef6597951083196321773b983e71@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rc7df4c2f0bbe2028a1498a46d322c91184f7a369e3e4c57d9518cacf@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/rba65ed5ddb0586f5b12598f55ec7db3633e7b7fede60466367fbf86a@%3Cnotifications.skywalking.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/07/13/4', 'https://lists.apache.org/thread.html/rbe91c512c5385181149ab087b6c909825d34299f5c491c6482a2ed57@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rb5fa2ee61828fa2e42361b58468717e84902dd71c4aea8dc0b865df7@%3Cnotifications.james.apache.org%3E', 'https://lists.apache.org/thread.html/r0e87177f8e78b4ee453cd4d3d8f4ddec6f10d2c27707dd71e12cafc9@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r67ef3c07fe3b8c1b02d48012149d280ad6da8e4cec253b527520fb2b@%3Cdev.poi.apache.org%3E', 'https://lists.apache.org/thread.html/rb6e1fa80d34e5ada45f72655d84bfd90db0ca44ef19236a49198c88c@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/r75ffc7a461e7e7ae77690fa75bd47bb71365c732e0fbcc44da4f8ff5@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/rf93b6bb267580e01deb7f3696f7eaca00a290c66189a658cf7230a1a@%3Cissues.drill.apache.org%3E', 'https://lists.apache.org/thread.html/r9f54c0caa462267e0cc68b49f141e91432b36b23348d18c65bd0d040@%3Cnotifications.skywalking.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/07/13/6', 'https://lists.apache.org/thread.html/r25f4c44616045085bc3cf901bb7e68e445eee53d1966fc08998fc456@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/r3227b1287e5bd8db6523b862c22676b046ad8f4fc96433225f46a2bd@%3Cissues.drill.apache.org%3E', 'https://lists.apache.org/thread.html/r4f03c5de923e3f2a8c316248681258125140514ef3307bfe1538e1ab@%3Cdev.drill.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://security.netapp.com/advisory/ntap-20211022-0001/', 'https://lists.apache.org/thread.html/rf3f0a09fee197168a813966c5816157f6c600a47313a0d6813148ea6@%3Cissues.drill.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r54049b66afbca766b6763c7531e9fe7a20293a112bcb65462a134949@%3Ccommits.drill.apache.org%3E', 'https://lists.apache.org/thread.html/rb7adf3e55359819e77230b4586521e5c6874ce5ed93384bdc14d6aee@%3Cnotifications.skywalking.apache.org%3E', 'https://commons.apache.org/proper/commons-compress/security-reports.html', 'https://lists.apache.org/thread.html/rab292091eadd1ecc63c516e9541a7f241091cf2e652b8185a6059945@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rf2f4d7940371a7c7c5b679f50e28fc7fcc82cd00670ced87e013ac88@%3Ccommits.druid.apache.org%3E'} | null |
Maven | GHSA-vvjc-q5vr-52q6 | Apache Camel's Jackson and JacksonXML unmarshalling operation are vulnerable to Remote Code Execution attacks | Apache Camel's Jackson and JacksonXML unmarshalling operation are vulnerable to Remote Code Execution attacks. | {'CVE-2016-8749'} | 2022-04-26T19:30:18.368427Z | 2018-10-16T23:13:00Z | CRITICAL | null | {'CWE-502'} | {'https://access.redhat.com/errata/RHSA-2017:1832', 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E', 'https://www.github.com/mbechler/marshalsec/blob/master/marshalsec.pdf?raw=true', 'https://nvd.nist.gov/vuln/detail/CVE-2016-8749', 'http://camel.apache.org/security-advisories.data/CVE-2016-8749.txt.asc?version=2&modificationDate=1486565034000&api=v2', 'http://www.securityfocus.com/bid/97179', 'https://github.com/advisories/GHSA-vvjc-q5vr-52q6', 'http://www.openwall.com/lists/oss-security/2017/05/22/2'} | null |
Maven | GHSA-jvfv-hrrc-6q72 | Improper Restriction of XML External Entity Reference in Liquibase | The XMLChangeLogSAXParser() function in Liquibase prior to version 4.8.0 contains an issue that may lead to to Improper Restriction of XML External Entity Reference. | {'CVE-2022-0839'} | 2022-03-18T21:17:01.937148Z | 2022-03-05T00:00:45Z | CRITICAL | null | {'CWE-611'} | {'https://huntr.dev/bounties/f1ae5779-b406-4594-a8a3-d089c68d6e70', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0839', 'https://github.com/liquibase/liquibase/commit/33d9d925082097fb1a3d2fc8e44423d964cd9381', 'https://github.com/liquibase/liquibase'} | null |
Maven | GHSA-fp5r-v3w9-4333 | JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data | JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and TopicConnectionFactoryBindingName configurations causing JMSAppender to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-44228. Note this issue only affects Log4j 1.2 when specifically configured to use JMSAppender, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions. | {'CVE-2021-4104'} | 2022-04-22T15:47:32.613655Z | 2021-12-14T19:49:31Z | HIGH | null | {'CWE-502'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-4104', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://access.redhat.com/security/cve/CVE-2021-4104', 'https://security.netapp.com/advisory/ntap-20211223-0007/', 'https://www.cve.org/CVERecord?id=CVE-2021-44228', 'http://www.openwall.com/lists/oss-security/2022/01/18/3', 'https://github.com/apache/logging-log4j2', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.kb.cert.org/vuls/id/930724', 'https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0033', 'https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126'} | null |
Maven | GHSA-hjm9-576q-399p | Moderate severity vulnerability that affects org.esigate:esigate-core | esigate.org esigate version 5.2 and earlier contains a CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') vulnerability in ESI directive with user specified XSLT that can result in Remote Code Execution. This attack appear to be exploitable via Use of another weakness in backend application to reflect ESI directives. This vulnerability appears to have been fixed in 5.3. | {'CVE-2018-1000854'} | 2022-03-03T05:14:06.020756Z | 2018-12-21T17:46:23Z | CRITICAL | null | {'CWE-74'} | {'https://nvd.nist.gov/vuln/detail/CVE-2018-1000854', 'https://github.com/advisories/GHSA-hjm9-576q-399p', 'https://github.com/esigate/esigate', 'https://github.com/esigate/esigate/issues/209'} | null |
Maven | GHSA-544x-2jx9-4pfg | Path traversal in Apache Karaf | Apache Karaf obr:* commands and run goal on the karaf-maven-plugin have partial path traversal which allows to break out of expected folder. The risk is low as obr:* commands are not very used and the entry is set by user. This has been fixed in revision: https://gitbox.apache.org/repos/asf?p=karaf.git;h=36a2bc4 https://gitbox.apache.org/repos/asf?p=karaf.git;h=52b70cf Mitigation: Apache Karaf users should upgrade to 4.2.15 or 4.3.6 or later as soon as possible, or use correct path. JIRA Tickets: https://issues.apache.org/jira/browse/KARAF-7326 | {'CVE-2022-22932'} | 2022-03-03T05:13:04.428901Z | 2022-01-28T22:25:03Z | MODERATE | null | {'CWE-22'} | {'https://issues.apache.org/jira/browse/KARAF-7326', 'https://github.com/apache/karaf/pull/1485', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22932', 'https://gitbox.apache.org/repos/asf?p=karaf.git;h=36a2bc4', 'https://karaf.apache.org/security/cve-2022-22932.txt', 'https://gitbox.apache.org/repos/asf?p=karaf.git;h=52b70cf', 'https://github.com/apache/karaf'} | null |
Maven | GHSA-7qqr-3pj3-q2f5 | XSS issues in the management interface | In system/workplace/ in Alkacon OpenCms 10.5.4 and 10.5.5, there are multiple Reflected and Stored XSS issues in the management interface. | {'CVE-2019-13236'} | 2022-03-03T05:13:13.905651Z | 2019-11-12T22:58:21Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-13236', 'https://github.com/alkacon/opencms-core/commits/branch_10_5_x', 'http://packetstormsecurity.com/files/154283/Alkacon-OpenCMS-10.5.x-Cross-Site-Scripting.html', 'https://aetsu.github.io/OpenCms', 'https://twitter.com/aetsu/status/1152096227938459648'} | null |
Maven | GHSA-9jg9-6wm2-x7p5 | Server-Side Request Forgery in Karaf | In Karaf, JMX authentication takes place using JAAS and authorization takes place using ACL files. By default, only an "admin" can actually invoke on an MBean. However there is a vulnerability there for someone who is not an admin, but has a "viewer" role. In the 'etc/jmx.acl.cfg', such as role can call get*. It's possible to authenticate as a viewer role + invokes on the MLet getMBeansFromURL method, which goes off to a remote server to fetch the desired MBean, which is then registered in Karaf. At this point the attack fails as "viewer" doesn't have the permission to invoke on the MBean. Still, it could act as a SSRF style attack and also it essentially allows a "viewer" role to pollute the MBean registry, which is a kind of privilege escalation. The vulnerability is low as it's possible to add a ACL to limit access. Users should update to Apache Karaf 4.2.9 or newer. | {'CVE-2020-11980'} | 2022-03-03T05:13:43.239904Z | 2022-02-10T23:04:32Z | MODERATE | null | {'CWE-918'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-11980', 'http://karaf.apache.org/security/cve-2020-11980.txt'} | null |
Maven | GHSA-rwh9-8xx8-4wfm | Cross-site Scripting in OpenCRX | In OpenCRX, versions v4.0.0 through v5.1.0 are vulnerable to reflected Cross-site Scripting (XSS), due to unsanitized parameters in the password reset functionality. This allows execution of external javascript files on any user of the openCRX instance. | {'CVE-2021-25959'} | 2022-03-03T05:14:06.274512Z | 2021-09-30T20:50:21Z | MODERATE | null | {'CWE-79'} | {'https://github.com/opencrx/opencrx', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25959', 'https://github.com/opencrx/opencrx/commit/14e75f95e5f56fbe7ee897bdf5d858788072e818'} | null |
Maven | GHSA-q93h-jc49-78gg | jackson-databind mishandles the interaction between serialization gadgets and typing | FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig (aka ibatis-sqlmap). | {'CVE-2020-9547'} | 2022-03-03T05:12:57.253639Z | 2020-05-15T18:59:10Z | CRITICAL | null | {'CWE-502'} | {'https://lists.apache.org/thread.html/rdd4df698d5d8e635144d2994922bf0842e933809eae259521f3b5097@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/ra3e90712f2d59f8cef03fa796f5adf163d32b81fe7b95385f21790e6@%3Cnotifications.zookeeper.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/issues/2634', 'https://lists.apache.org/thread.html/r4accb2e0de9679174efd3d113a059bab71ff3ec53e882790d21c1cc1@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/03/msg00008.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://github.com/FasterXML/jackson-databind', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://lists.apache.org/thread.html/redbe4f1e21bf080f637cf9fbec47729750a2f443a919765360337428@%3Cnotifications.zookeeper.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20200904-0006/', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://lists.apache.org/thread.html/rc0d5d0f72da1ed6fc5e438b1ddb3fa090c73006b55f873cf845375ab@%3Cnotifications.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/rd5a4457be4623038c3989294429bc063eec433a2e55995d81591e2ca@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r742ef70d126548dcf7de5be5779355c9d76a9aec71d7a9ef02c6398a@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r893a0104e50c1c2559eb9a5812add28ae8c3e5f43712947a9847ec18@%3Cnotifications.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/r35d30db00440ef63b791c4b7f7acb036e14d4a23afa2a249cb66c0fd@%3Cissues.zookeeper.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9547', 'https://lists.apache.org/thread.html/r98c9b6e4c9e17792e2cd1ec3e4aa20b61a791939046d3f10888176bb@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rb6fecb5e96a6d61e175ff49f33f2713798dd05cf03067c169d195596@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r9464a40d25c3ba1a55622db72f113eb494a889656962d098c70c5bb1@%3Cdev.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/rdd49ab9565bec436a896bc00c4b9fc9dce1598e106c318524fbdfec6@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd0e958d6d5c5ee16efed73314cd0e445c8dbb4bdcc80fc9d1d6c11fc@%3Cdev.zookeeper.apache.org%3E'} | null |
Maven | GHSA-q4xf-3pmq-3hw8 | Improper Restriction of XML External Entity Reference in Apache NiFi | In Apache NiFi 1.0.0 to 1.11.4, the notification service manager and various policy authorizer and user group provider objects allowed trusted administrators to inadvertently configure a potentially malicious XML file. The XML file has the ability to make external calls to services (via XXE). | {'CVE-2020-13940'} | 2022-03-03T05:14:17.513693Z | 2022-01-06T20:41:00Z | MODERATE | null | {'CWE-611'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-13940', 'https://nifi.apache.org/security#CVE-2020-13940', 'https://github.com/apache/nifi/commit/7f0416ee8bdcee95e28409cc6fae9c1394c2a798'} | null |
Maven | GHSA-h822-r4r5-v8jg | Polymorphic Typing issue in FasterXML jackson-databind | A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariConfig. | {'CVE-2019-14540'} | 2022-03-03T05:14:00.375729Z | 2019-09-23T18:33:25Z | CRITICAL | null | {'CWE-502'} | {'https://lists.apache.org/thread.html/a4f2c9fb36642a48912cdec6836ec00e497427717c5d377f8d7ccce6@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/40c00861b53bb611dee7d6f35f864aa7d1c1bd77df28db597cbf27e1@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/a360b46061c91c5cad789b6c3190aef9b9f223a2b75c9c9f046fe016@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/dc6b5cad721a4f6b3b62ed1163894941140d9d5656140fb757505ca0@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/e90c3feb21702e68a8c08afce37045adb3870f2bf8223fa403fb93fb@%3Ccommits.hbase.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/blob/master/release-notes/VERSION-2.x', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0160', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14540', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/0fcef7321095ce0bc597d468d150cff3d647f4cb3aef3bd4d20e1c69@%3Ccommits.tinkerpop.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20191004-0002/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q7CANA7KV53JROZDX5Z5P26UG5VN2K43/', 'https://www.debian.org/security/2019/dsa-4542', 'https://lists.apache.org/thread.html/r8aaf4ee16bbaf6204731d4770d96ebb34b258cd79b491f9cdd7f2540@%3Ccommits.nifi.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0159', 'https://access.redhat.com/errata/RHSA-2020:0161', 'https://lists.apache.org/thread.html/ad0d238e97a7da5eca47a014f0f7e81f440ed6bf74a93183825e18b9@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2019/10/msg00001.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3200', 'https://access.redhat.com/errata/RHSA-2020:0164', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://github.com/FasterXML/jackson-databind/issues/2410', 'https://github.com/FasterXML/jackson-databind/issues/2449', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TH5VFUN4P7CCIP7KSEXYA5MUTFCUDUJT/', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0445', 'https://seclists.org/bugtraq/2019/Oct/6', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'} | null |
Maven | GHSA-2vp8-jv5v-6qh6 | Allocation of resources without limits or throttling in keycloak-model-infinispan | A flaw was found in keycloak-model-infinispan in keycloak versions before 14.0.0 where authenticationSessions map in RootAuthenticationSessionEntity grows boundlessly which could lead to a DoS attack. | {'CVE-2021-3637'} | 2022-03-03T05:13:17.545681Z | 2021-07-13T17:43:23Z | HIGH | null | {'CWE-770'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=1979638', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3637'} | null |
Maven | GHSA-mm9x-g8pc-w292 | Denial of Service in Netty | The ZlibDecoders in Netty 4.1.x before 4.1.46 allow for unbounded memory allocation while decoding a ZlibEncoded byte stream. An attacker could send a large ZlibEncoded byte stream to the Netty server, forcing the server to allocate all of its free memory to a single decoder. | {'CVE-2020-11612'} | 2022-04-25T23:17:10.986343Z | 2020-06-15T19:36:16Z | HIGH | null | {'CWE-770', 'CWE-119', 'CWE-400'} | {'https://lists.apache.org/thread.html/r9addb580456807cd11d6f0c6b6373b7d7161d06d2278866c30c7febb@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r7790b9d99696d9eddce8a8c96f13bb68460984294ea6fea3800143e4@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r69b23a94d4ae45394cabae012dd1f4a963996869c44c478eb1c61082@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r866288c2ada00ce148b7307cdf869f15f24302b3eb2128af33830997@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r5b1ad61552591b747cd31b3a908d5ff2e8f2a8a6847583dd6b7b1ee7@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf803b65b4a57589d79cf2e83d8ece0539018d32864f932f63c972844@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rdb69125652311d0c41f6066ff44072a3642cf33a4b5e3c4f9c1ec9c2@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r2958e4d49ee046e1e561e44fdc114a0d2285927501880f15852a9b53@%3Ccommits.druid.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.apache.org/thread.html/rf5b2dfb7401666a19915f8eaef3ba9f5c3386e2066fcd2ae66e16a2f@%3Cdev.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r7641ee788e1eb1be4bb206a7d15f8a64ec6ef23e5ec6132d5a567695@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r5030cd8ea5df1e64cf6a7b633eff145992fbca03e8bfc687cd2427ab@%3Cnotifications.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/rd302ddb501fa02c5119120e5fc21df9a1c00e221c490edbe2d7ad365@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r3ea4918d20d0c1fa26cac74cc7cda001d8990bc43473d062867ef70d@%3Cnotifications.zookeeper.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11612', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/rff8859c0d06b1688344b39097f9685c43b461cf2bc41f60f001704e9@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/09/msg00003.html', 'https://lists.apache.org/thread.html/r88e2b91560c065ed67e62adf8f401c417e4d70256d11ea447215a70c@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r281882fdf9ea89aac02fd2f92786693a956aac2ce9840cce87c7df6b@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r9c30b7fca4baedebcb46d6e0f90071b30cc4a0e074164d50122ec5ec@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/re1ea144e91f03175d661b2d3e97c7d74b912e019613fa90419cf63f4@%3Cissues.zookeeper.apache.org%3E', 'https://github.com/netty/netty/compare/netty-4.1.45.Final...netty-4.1.46.Final', 'https://security.netapp.com/advisory/ntap-20201223-0001/', 'https://github.com/netty/netty/issues/6168', 'https://lists.apache.org/thread.html/r14446ed58208cb6d97b6faa6ebf145f1cf2c70c0886c0c133f4d3b6f@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/raaac04b7567c554786132144bea3dcb72568edd410c1e6f0101742e7@%3Cissues.flink.apache.org%3E', 'https://github.com/netty/netty/pull/9924', 'https://lists.apache.org/thread.html/r5a0b1f0b1c3bcd66f5177fbd6f6de2d0f8cae24a13ab2669f274251a@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/ra98e3a8541a09271f96478d5e22c7e3bd1afdf48641c8be25d62d9f9@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r4a7e4e23bd84ac24abf30ab5d5edf989c02b555e1eca6a2f28636692@%3Cnotifications.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r832724df393a7ef25ca4c7c2eb83ad2d6c21c74569acda5233f9f1ec@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rfd173eac20d5e5f581c8984b685c836dafea8eb2f7ff85f617704cf1@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/ref3943adbc3a8813aee0e3a9dd919bacbb27f626be030a3c6d6c7f83@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/ref2c8a0cbb3b8271e5b9a06457ba78ad2028128627186531730f50ef@%3Cnotifications.zookeeper.apache.org%3E', 'https://www.debian.org/security/2021/dsa-4885', 'https://lists.apache.org/thread.html/r7836bbdbe95c99d4d725199f0c169927d4e87ba57e4beeeb699c097a@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r255ed239e65d0596812362adc474bee96caf7ba042c7ad2f3c62cec7@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r3195127e46c87a680b5d1d3733470f83b886bfd3b890c50df718bed1@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r4f4a14d6a608db447b725ec2e96c26ac9664d83cd879aa21e2cfeb24@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf9f8bcc4ca8d2788f77455ff594468404732a4497baebe319043f4d5@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TS6VX7OMXPDJIU5LRGUAHRK6MENAVJ46/', 'https://lists.apache.org/thread.html/r31424427cc6d7db46beac481bdeed9a823fc20bb1b9deede38557f71@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r8a654f11e1172b0effbfd6f8d5b6ca651ae4ac724a976923c268a42f@%3Ccommits.druid.apache.org%3E'} | null |
Maven | GHSA-r6j9-8759-g62w | Improper Restriction of XML External Entity Reference in jackson-mapper-asl | A flaw was found in org.codehaus.jackson:jackson-mapper-asl:1.9.x libraries. XML external entity vulnerabilities similar to CVE-2016-3720 also affects codehaus jackson-mapper-asl libraries but in different classes. | {'CVE-2019-10172'} | 2022-03-03T05:13:44.341549Z | 2020-02-04T22:39:19Z | HIGH | null | {'CWE-611'} | {'https://lists.apache.org/thread.html/r04ecadefb27cda84b699130b11b96427f1d8a7a4066d8292f7f15ed8@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r1cc8bce2cf3dfce08a64c4fa20bf38d33b56ad995cee2e382f522f83@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r634468eb3218ab02713128ff6f4818c618622b2b3de4d958138dde49@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r43c6f75d203b8afc4fbd6c3200db0384a18a11c59d085b1a9bb0ccfe@%3Cuser.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r80e8882c86c9c17a57396a5ef7c4f08878d629a0291243411be0de3a@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r25e25973e9577c62fd0221b4b52990851adf11cbe33036bd67d4b13d@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r48a32f2dd6976d33f7a12b7e09ec7ea1895f8facba82b565587c28ac@%3Ccommon-issues.hadoop.apache.org%3E', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10172', 'https://lists.apache.org/thread.html/r385c35a7c6f4acaacf37fe22922bb8e2aed9d322d0fa6dc1d45acddb@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r33d25a342af84102903cd9dec8338a5bcba3ecfce10505bdfe793b92@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r0fbf2c60967bc9f73d7f5a62ad3b955789f9a14b950f42e99fca9b4e@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r4bbfa1439d7a4e1712e260bfc3d90f7cf997abfd641cccde6432d4ab@%3Ccommits.cassandra.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/08/msg00039.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10172', 'https://lists.apache.org/thread.html/r4176155240cdc36aad7869932d9c29551742c7fa630f209fb4a8e649@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r08e1b73fabd986dcd2ddd7d09480504d1472264bed2f19b1d2002a9c@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r68acf97f4526ba59a33cc6e592261ea4f85d890f99e79c82d57dd589@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r0066c1e862613de402fee04e81cbe00bcd64b64a2711beb9a13c3b25@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/rb8c09b14fd57d855dc21e0a037dc29258c2cbe9c1966bfff453a02e4@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r5f16a1bd31a7e94ca78eda686179930781aa3a4a990cd55986703581@%3Cdev.hive.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/01/msg00037.html', 'https://lists.apache.org/thread.html/re07c51a8026c11e6e5513bfdc66d52d1c1027053e480fb8073356257@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/rce00a1c60f7df4b10e72fa87827c102f55b074bb91993631df2c21f9@%3Cdev.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rb47911c179c9f3e8ea3f134b5645e63cd20c6fc63bd0b43ab5864bd1@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r1f07e61b3ebabd3e5b4aa97bf1b26d98b793fdfa29a23dac60633f55@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r386966780034aadee69ffd82d44555117c9339545b9ce990fe490a3e@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r500867b74f42230a3d65b8aec31fc93ac390eeae737c91a759ab94cb@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r37eb6579fa0bf94a72b6c978e2fee96f68a2b1b3ac1b1ce60aee86cf@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/rd27730cfc3066dfcf15927c8e800603728d5dedf17eee1f8c6e3507c@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r0d8c3e32a0a2d8a0b6118f5b3487d363afdda80c996d7b930097383d@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/ra37700b842790883b9082e6b281fb7596f571b13078a4856cd38f2c2@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r356592d9874ab4bc9da4754592f8aa6edc894c95e17e58484bc2af7a@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rb036bf32e4dacc49335e3bdc1be8e53d6f54df692ac8e2251a6884bd@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r21ac3570ce865b8f1e5d26e492aeb714a6aaa53a0c9a6f72ef181556@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r1edabcfacdad42d3c830464e9cf07a9a489059a7b7a8642cf055542d@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rd3a34d663e2a25b9ab1e8a1a94712cd5f100f098578aec79af48161e@%3Ccommon-dev.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/re646dcc2739d92117bf9a76a33c600ed3b65e8b4e9b6f441e366b72b@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r6dea2a887f5eb1d68f124d64b14cd1a04f682f06de8cd01b7e4214e0@%3Cissues.hive.apache.org%3E'} | null |
Maven | GHSA-gc79-gh4f-9g6w | Server Side Template Injection in MCMS | MCMS v5.2.5 was discovered to contain a Server Side Template Injection (SSTI) vulnerability via the Template Management module. | {'CVE-2021-46063'} | 2022-03-07T20:47:47.667910Z | 2022-02-19T00:01:24Z | CRITICAL | null | {'CWE-74'} | {'https://github.com/ming-soft/MCMS/issues/59', 'https://nvd.nist.gov/vuln/detail/CVE-2021-46063'} | null |
Maven | GHSA-cccf-7xw3-p2vr | HTTP Request Smuggling in Undertow | A flaw was found in Undertow in versions before 2.1.1.Final, regarding the processing of invalid HTTP requests with large chunk sizes. This flaw allows an attacker to take advantage of HTTP request smuggling. | {'CVE-2020-10719'} | 2022-03-03T05:13:24.949390Z | 2021-04-30T17:28:33Z | MODERATE | null | {'CWE-444'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10719', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10719', 'https://security.netapp.com/advisory/ntap-20220210-0014/'} | null |
Maven | GHSA-h79p-32mx-fjj9 | Apache Camel Netty enables Java deserialization by default | Apache Camel Netty enables Java deserialization by default. Apache Camel 2.22.x, 2.23.x, 2.24.x, 2.25.0, 3.0.0 up to 3.1.0 are affected. 2.x users should upgrade to 2.25.1, 3.x users should upgrade to 3.2.0. | {'CVE-2020-11973'} | 2022-03-03T05:14:08.438804Z | 2020-05-21T21:09:04Z | HIGH | null | {'CWE-502'} | {'https://www.oracle.com/security-alerts/cpujan2021.html', 'http://www.openwall.com/lists/oss-security/2020/05/14/9', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11973', 'https://camel.apache.org/security/CVE-2020-11973.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html'} | null |
Maven | GHSA-cqcf-4g4h-rghf | Cross-site scripting in Apache Archiva | In Apache Archiva before 2.2.4, it is possible to write files to the archiva server at arbitrary locations by using the artifact upload mechanism. Existing files can be overwritten, if the archiva run user has appropriate permission on the filesystem for the target file. | {'CVE-2019-0213'} | 2022-03-03T05:13:26.236991Z | 2019-05-14T04:00:31Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-0213', 'http://www.securityfocus.com/bid/108123', 'https://lists.apache.org/thread.html/0397ddbd17b5257cc1746b31a07294a87221c5ca24e5d19d390e28f3@%3Cusers.archiva.apache.org%3E', 'https://lists.apache.org/thread.html/7bcea134c3d6fa72cdc1052922ac0914f399f63f4690b7937b80127d@%3Cannounce.apache.org%3E', 'https://seclists.org/bugtraq/2019/Apr/47', 'https://lists.apache.org/thread.html/ada0052409d8a4a8c4eb2c7fd6b9cd9423bc753d5fce87eb826662fb@%3Cissues.archiva.apache.org%3E', 'http://archiva.apache.org/security.html#CVE-2019-0213', 'https://lists.apache.org/thread.html/c358754a35473a61477f9d487870581a0dd7054ff95974628fa09f97@%3Cusers.maven.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2019/04/30/7', 'http://packetstormsecurity.com/files/152681/Apache-Archiva-2.2.3-Cross-Site-Scripting.html'} | null |
Maven | GHSA-93c4-vf86-3rj7 | Reflected cross-site scripting in vaadin-menu-bar webjar resources in Vaadin 14 | Missing output sanitization in test sources in `org.webjars.bowergithub.vaadin:vaadin-menu-bar` versions 1.0.0 through 1.2.0 (Vaadin 14.0.0 through 14.4.4) allows remote attackers to execute malicious JavaScript in browser by opening crafted URL. | {'CVE-2021-33611'} | 2022-03-03T05:13:14.212653Z | 2021-11-03T17:33:32Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-33611', 'https://github.com/vaadin/platform', 'https://github.com/vaadin/platform/security/advisories/GHSA-93c4-vf86-3rj7', 'https://github.com/vaadin/vaadin-menu-bar/pull/126', 'https://vaadin.com/security/cve-2021-33611'} | null |
Maven | GHSA-v54f-xcmp-43cr | Deserialization of Untrusted Data in Apache ShardingSphere | In Apache ShardingSphere(incubator) 4.0.0-RC3 and 4.0.0, the ShardingSphere's web console uses the SnakeYAML library for parsing YAML inputs to load datasource configuration. SnakeYAML allows to unmarshal data to a Java type By using the YAML tag. Unmarshalling untrusted data can lead to security flaws of RCE. | {'CVE-2020-1947'} | 2022-03-03T05:13:17.218442Z | 2022-02-10T20:39:47Z | HIGH | null | {'CWE-502'} | {'https://lists.apache.org/thread.html/r4a61a24c119bd820da6fb02100d286f8aae55c8f9b94a346b9bb27d8%40%3Cdev.shardingsphere.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1947'} | null |
Maven | GHSA-76f4-fw33-6j2v | Potential sensitive data exposure in applications using Vaadin 15 | Insecure configuration of default `ObjectMapper` in `com.vaadin:flow-server` versions 3.0.0 through 3.0.5 (Vaadin 15.0.0 through 15.0.4) may expose sensitive data if the application also uses e.g. `@RestController`
- https://vaadin.com/security/cve-2020-36319 | null | 2022-03-03T05:13:31.405266Z | 2021-04-19T14:48:26Z | LOW | null | {'CWE-200'} | {'https://github.com/vaadin/platform/security/advisories/GHSA-76f4-fw33-6j2v', 'https://github.com/vaadin/platform', 'https://vaadin.com/security/cve-2020-36319'} | null |
Maven | GHSA-2g9q-chq2-w8qw | Moderate severity vulnerability that affects org.apache.hive:hive, org.apache.hive:hive-exec, and org.apache.hive:hive-service | Apache Hive 2.1.x before 2.1.2, 2.2.x before 2.2.1, and 2.3.x before 2.3.1 expose an interface through which masking policies can be defined on tables or views, e.g., using Apache Ranger. When a view is created over a given table, the policy enforcement does not happen correctly on the table for masked columns. | {'CVE-2017-12625'} | 2022-03-03T05:13:46.812145Z | 2019-03-14T15:40:16Z | MODERATE | null | {'CWE-200'} | {'http://mail-archives.apache.org/mod_mbox/hive-user/201710.mbox/%3C3791103E-80D5-4E75-AF23-6F8ED54DDEBE%40apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12625', 'http://www.securityfocus.com/bid/101686', 'https://github.com/advisories/GHSA-2g9q-chq2-w8qw'} | null |
Maven | GHSA-j8g6-2wh7-6439 | Apache Tika allows Java code execution for serialized objects embedded in MATLAB files | Apache Tika before 1.14 allows Java code execution for serialized objects embedded in MATLAB files. The issue exists because Tika invokes JMatIO to do native deserialization. | {'CVE-2016-6809'} | 2022-04-26T22:00:06.441947Z | 2018-10-17T15:44:36Z | CRITICAL | null | {'CWE-502'} | {'http://seclists.org/bugtraq/2016/Nov/40', 'https://lists.apache.org/thread.html/d2375da29d89e679abf5d845db76d6f798fdc6f7d44f2c788e8a0fb9@%3Cuser.nutch.apache.org%3E', 'https://lists.apache.org/thread.html/rfd3646bb724b66b1a9ddef69e692da2b7a727a8799551c78eedf0a0f@%3Cissues.lucene.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2016-6809', 'https://github.com/advisories/GHSA-j8g6-2wh7-6439', 'https://dist.apache.org/repos/dist/release/tika/CHANGES-1.14.txt', 'https://lists.apache.org/thread.html/r2f6f6c130b12b7332f323f74d031072b1517065ce28a22346791ffb6@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/e414754a6c57ce7194b731e211cd6b2cbb41f2c7000e3fb9c6b6ec78@%3Cdev.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/91eb639ef619b9a26b40020ca6732e7dbe457f7322ed5f1df49e411a@%3Cdev.nutch.apache.org%3E', 'http://www.securityfocus.com/bid/94247'} | null |
Maven | GHSA-3gp6-hhfw-4gqx | Padding oracle attacks | It was found that all OWASP ESAPI for Java up to version 2.0 RC2 are vulnerable to padding oracle attacks. | {'CVE-2010-3300'} | 2021-06-28T19:05:25Z | 2021-08-13T15:22:24Z | MODERATE | null | {'CWE-649'} | {'https://seclists.org/oss-sec/2010/q3/357', 'https://www.usenix.org/legacy/events/woot10/tech/full_papers/Rizzo.pdf', 'https://nvd.nist.gov/vuln/detail/CVE-2010-3300'} | null |
Maven | GHSA-9x2h-hvg6-4r5p | Improper Authentication in Apache Zeppelin | In Apache Zeppelin prior to 0.8.0 the cron scheduler was enabled by default and could allow users to run paragraphs as other users without authentication. | {'CVE-2018-1317'} | 2022-03-03T05:13:34.081370Z | 2019-04-24T16:06:52Z | HIGH | null | {'CWE-287'} | {'https://lists.apache.org/thread.html/ff6b995a5a3ba8db4d6b14b4d9dd487e7bf2e3bdd5b375b64a25fd06@%3Cusers.zeppelin.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2019/04/23/1', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1317', 'https://zeppelin.apache.org/releases/zeppelin-release-0.8.0.html'} | null |
Maven | GHSA-p435-w4xm-jj8x | Hadoop token in temp file visible to all users in Apache Gobblin | In Apache Gobblin, the Hadoop token is written to a temp file that is visible to all local users on Unix-like systems. This affects versions <= 0.15.0. Users should update to version 0.16.0 which addresses this issue. | {'CVE-2021-36151'} | 2022-03-03T05:13:25.092868Z | 2022-02-06T00:01:07Z | MODERATE | null | {'CWE-200'} | {'https://lists.apache.org/thread/3cdkyxdd6xk05lsvr3l66dsnvhwyo1t0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36151'} | null |
Maven | GHSA-75vw-3m5v-fprh | corenlp is vulnerable to Improper Restriction of XML External Entity Reference | corenlp is vulnerable to Improper Restriction of XML External Entity Reference | {'CVE-2022-0239'} | 2022-03-03T05:12:48.961183Z | 2022-01-21T23:43:11Z | CRITICAL | null | {'CWE-611'} | {'https://huntr.dev/bounties/a717aec2-5646-4a5f-ade0-dadc25736ae3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0239', 'https://github.com/stanfordnlp/corenlp/commit/1940ffb938dc4f3f5bc5f2a2fd8b35aabbbae3dd', 'https://github.com/stanfordnlp/corenlp'} | null |
Maven | GHSA-9r24-gp44-h3pm | High severity vulnerability that affects org.apache.tika:tika-core | From Apache Tika versions 1.7 to 1.17, clients could send carefully crafted headers to tika-server that could be used to inject commands into the command line of the server running tika-server. This vulnerability only affects those running tika-server on a server that is open to untrusted clients. The mitigation is to upgrade to Tika 1.18. | {'CVE-2018-1335'} | 2022-03-03T05:13:12.541167Z | 2018-10-17T15:43:43Z | HIGH | null | null | {'https://access.redhat.com/errata/RHSA-2019:3140', 'http://www.securityfocus.com/bid/104001', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1335', 'https://github.com/advisories/GHSA-9r24-gp44-h3pm', 'https://www.exploit-db.com/exploits/46540/', 'http://packetstormsecurity.com/files/153864/Apache-Tika-1.17-Header-Command-Injection.html', 'https://lists.apache.org/thread.html/b3ed4432380af767effd4c6f27665cc7b2686acccbefeb9f55851dca@%3Cdev.tika.apache.org%3E'} | null |
Maven | GHSA-grg4-wf29-r9vv | Bzip2Decoder doesn't allow setting size restrictions for decompressed data | ### Impact
The Bzip2 decompression decoder function doesn't allow setting size restrictions on the decompressed output data (which affects the allocation size used during decompression).
All users of Bzip2Decoder are affected. The malicious input can trigger an OOME and so a DoS attack
### Workarounds
No workarounds other than not using the `Bzip2Decoder`
### References
Relevant code areas:
https://github.com/netty/netty/blob/netty-4.1.67.Final/codec/src/main/java/io/netty/handler/codec/compression/Bzip2Decoder.java#L80
https://github.com/netty/netty/blob/netty-4.1.67.Final/codec/src/main/java/io/netty/handler/codec/compression/Bzip2Decoder.java#L294
https://github.com/netty/netty/blob/netty-4.1.67.Final/codec/src/main/java/io/netty/handler/codec/compression/Bzip2Decoder.java#L305 | {'CVE-2021-37136'} | 2022-04-22T15:47:10.605187Z | 2021-09-09T17:11:21Z | HIGH | null | {'CWE-400'} | {'https://github.com/netty/netty', 'https://lists.apache.org/thread.html/rfb2bf8597e53364ccab212fbcbb2a4e9f0a9e1429b1dc08023c6868e@%3Cdev.tinkerpop.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://security.netapp.com/advisory/ntap-20220210-0012/', 'https://lists.apache.org/thread.html/r5406eaf3b07577d233b9f07cfc8f26e28369e6bab5edfcab41f28abb@%3Ccommits.druid.apache.org%3E', 'https://github.com/netty/netty/commit/41d3d61a61608f2223bb364955ab2045dd5e4020', 'https://github.com/netty/netty/blob/4.1/codec/src/main/java/io/netty/handler/codec/compression/Bzip2Decoder.java#L80', 'https://lists.apache.org/thread.html/r5e05eba32476c580412f9fbdfc9b8782d5b40558018ac4ac07192a04@%3Ccommits.druid.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37136', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/rd262f59b1586a108e320e5c966feeafbb1b8cdc96965debc7cc10b16@%3Ccommits.druid.apache.org%3E', 'https://github.com/netty/netty/blob/4.1/codec/src/main/java/io/netty/handler/codec/compression/Bzip2Decoder.java#L305', 'https://github.com/netty/netty/security/advisories/GHSA-grg4-wf29-r9vv', 'https://github.com/netty/netty/blob/4.1/codec/src/main/java/io/netty/handler/codec/compression/Bzip2Decoder.java#L294', 'https://lists.apache.org/thread.html/r06a145c9bd41a7344da242cef07977b24abe3349161ede948e30913d@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0@%3Ccommits.druid.apache.org%3E'} | null |
Maven | GHSA-hrmr-f5m6-m9pq | Moderate severity vulnerability that affects org.apache.commons:commons-compress | When reading a specially crafted ZIP archive, the read method of Apache Commons Compress 1.7 to 1.17's ZipArchiveInputStream can fail to return the correct EOF indication after the end of the stream has been reached. When combined with a java.io.InputStreamReader this can lead to an infinite stream, which can be used to mount a denial of service attack against services that use Compress' zip package. | {'CVE-2018-11771'} | 2022-04-25T20:32:06.845258Z | 2018-10-19T16:41:27Z | MODERATE | null | {'CWE-835'} | {'https://lists.apache.org/thread.html/6c79965066c30d4e330e04d911d3761db41b82c89ae38d9a6b37a6f1@%3Cdev.tinkerpop.apache.org%3E', 'http://www.securitytracker.com/id/1041503', 'http://www.securityfocus.com/bid/105139', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/0adb631517766e793e18a59723e2df08ced41eb9a57478f14781c9f7@%3Cdev.tinkerpop.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11771', 'https://lists.apache.org/thread.html/b8da751fc0ca949534cdf2744111da6bb0349d2798fac94b0a50f330@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/b8ef29df0f1d55aa741170748352ae8e425c7b1d286b2f257711a2dd@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/f9cdd32af7d73e943452167d15801db39e8130409ebb9efb243b3f41@%3Ccommits.tinkerpop.apache.org%3E', 'https://lists.apache.org/thread.html/b907e70bc422905d7962fd18f863f746bf7b4e7ed9da25c148580c61@%3Cnotifications.commons.apache.org%3E', 'https://lists.apache.org/thread.html/eeecc1669242b28a3777ae13c68b376b0148d589d3d8170340d61120@%3Cdev.tinkerpop.apache.org%3E', 'https://lists.apache.org/thread.html/35f60d6d0407c13c39411038ba1aca71d92595ed7041beff4d07f2ee@%3Ccommits.tinkerpop.apache.org%3E', 'https://lists.apache.org/thread.html/c7954dc1e8fafd7ca1449f078953b419ebf8936e087f235f3bd024be@%3Ccommits.tinkerpop.apache.org%3E', 'https://lists.apache.org/thread.html/f28052d04cb8dbaae39bfd3dc8438e58c2a8be306a3f381f4728d7c1@%3Ccommits.commons.apache.org%3E', 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/714c6ac1b1b50f8557e7342903ef45f1538a7bc60a0b47d6e48c273d@%3Ccommits.tinkerpop.apache.org%3E', 'https://lists.apache.org/thread.html/3565494c263dfeb4dcb2a71cb24d09a1ca285cd6ac74edc025a3af8a@%3Ccommits.tinkerpop.apache.org%3E', 'https://lists.apache.org/thread.html/e3eae9e6fc021c4c22dda59a335d21c12eecab480b48115a2f098ef6@%3Ccommits.tinkerpop.apache.org%3E'} | null |
Maven | GHSA-fmj2-7wx8-qj4v | Server-side request forgery (SSRF) in Apache XmlGraphics Commons | Apache XmlGraphics Commons 2.4 is vulnerable to server-side request forgery, caused by improper input validation by the XMPParser. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests. | {'CVE-2020-11988'} | 2022-03-03T05:14:07.493019Z | 2022-02-09T00:45:56Z | HIGH | null | {'CWE-20', 'CWE-918'} | {'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.apache.org/thread.html/r2877ae10e8be56a3c52d03e373512ddd32f16b863f24c2e22f5a5ba2@%3Cdev.poi.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JP4XA56DA3BFNRBBLBXM6ZAI5RUVFA33/', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22HESSYU7T4D6GGENUVEX3X3H6FGBECH/', 'https://lists.apache.org/thread.html/ra8f4d6ae402ec020ee3e8c28632c91be131c4d8b4c9c6756a179b12b@%3Cdev.jmeter.apache.org%3E', 'https://issues.apache.org/jira/browse/XGC-122', 'https://lists.apache.org/thread.html/r588d05a0790b40a0eb81088252e1e8c1efb99706631421f17038eb05@%3Cdev.poi.apache.org%3E', 'https://github.com/apache/xmlgraphics-commons/commit/57393912eb87b994c7fed39ddf30fb778a275183', 'https://xmlgraphics.apache.org/security.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11988', 'https://github.com/apache/xmlgraphics-commons/'} | null |
Maven | GHSA-4pc7-vqv5-5r3v | ECP SAML binding bypasses authentication flows | ### Description
A flaw was found in keycloak, where the default ECP binding flow allows other authentication flows to be bypassed. By exploiting this behavior, an attacker can bypass the MFA authentication by sending a SOAP request with an AuthnRequest and Authorization header with the user's credentials. The highest threat from this vulnerability is to confidentiality and integrity.
| {'CVE-2021-3827'} | 2022-04-27T21:32:00.582721Z | 2022-04-27T21:25:59Z | MODERATE | null | null | {'https://github.com/keycloak/keycloak/security/advisories/GHSA-4pc7-vqv5-5r3v', 'https://github.com/keycloak/keycloak'} | null |
Maven | GHSA-h39x-m55c-v55h | Eclipse Vert.x does not properly neutralize '' (forward slashes) sequences that can resolve to an external location | In version from 3.0.0 to 3.5.3 of Eclipse Vert.x, the StaticHandler uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '\' (forward slashes) sequences that can resolve to a location that is outside of that directory when running on Windows Operating Systems. | {'CVE-2018-12542'} | 2022-04-26T22:00:17.148461Z | 2018-10-17T16:20:45Z | CRITICAL | null | {'CWE-22'} | {'https://github.com/vert-x3/vertx-web/issues/1025', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=539171', 'https://github.com/vert-x3/vertx-web', 'https://nvd.nist.gov/vuln/detail/CVE-2018-12542', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://github.com/advisories/GHSA-h39x-m55c-v55h'} | null |
Maven | GHSA-29qj-rvv6-qrmv | Cross-site scripting in RESTEasy | A cross-site scripting (XSS) flaw was found in RESTEasy in versions before 3.11.1.Final and before 4.5.3.Final, where it did not properly handle URL encoding when the RESTEASY003870 exception occurs. An attacker could use this flaw to launch a reflected XSS attack. | {'CVE-2020-10688'} | 2022-03-03T05:13:11.102357Z | 2021-06-15T16:05:22Z | MODERATE | null | {'CWE-79'} | {'https://issues.redhat.com/browse/RESTEASY-2519', 'https://bugzilla.redhat.com/show_bug.cgi?id=1814974', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10688', 'https://github.com/quarkusio/quarkus/issues/7248'} | null |
Maven | GHSA-xgc9-9w4v-h33h | High severity vulnerability that affects org.apache.syncope:syncope-core | An administrator with report and template entitlements in Apache Syncope 1.2.x before 1.2.11 and 2.0.x before 2.0.8 can use XSL Transformations (XSLT) to perform malicious operations, including but not limited to file read, file write, and code execution. | {'CVE-2018-1321'} | 2022-03-03T05:12:33.760197Z | 2018-11-06T23:17:27Z | HIGH | null | {'CWE-20'} | {'http://syncope.apache.org/security.html#CVE-2018-1321:_Remote_code_execution_by_administrators_with_report_and_template_entitlements', 'https://www.exploit-db.com/exploits/45400/', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1321', 'http://www.securityfocus.com/bid/103508', 'https://github.com/advisories/GHSA-xgc9-9w4v-h33h'} | null |
Maven | GHSA-f6vf-pq8c-69m4 | Improper Check for Unusual or Exceptional Conditions in Connect2id Nimbus JOSE+JWT | Connect2id Nimbus JOSE+JWT before v7.9 can throw various uncaught exceptions while parsing a JWT, which could result in an application crash (potential information disclosure) or a potential authentication bypass. | {'CVE-2019-17195'} | 2022-04-22T17:30:33.673642Z | 2019-10-16T18:31:17Z | CRITICAL | null | {'CWE-755', 'CWE-754'} | {'https://lists.apache.org/thread.html/r5e08837e695efd36be73510ce58ec05785dbcea077819d8acc2d990d@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r35f6301a3e6a56259224786dd9c2a935ba27ff6b494d15a3b66efe6a@%3Cdev.avro.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17195', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://bitbucket.org/connect2id/nimbus-jose-jwt/src/master/SECURITY-CHANGELOG.txt', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r2667286c8ceffaf893b16829b9612d8f7c4ee6b30362c6c1b583e3c2@%3Ccommits.druid.apache.org%3E', 'https://connect2id.com/blog/nimbus-jose-jwt-7-9', 'https://lists.apache.org/thread.html/8768553cda5838f59ee3865cac546e824fa740e82d9dc2a7fc44e80d@%3Ccommon-dev.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r33dc233634aedb04fa77db3eb79ea12d15ca4da89fa46a1c585ecb0b@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rcac26c2d4df22341fa6ebbfe93ba1eff77d2dcd3f6106a1dc1f9ac98@%3Cdev.avro.apache.org%3E', 'https://bitbucket.org/connect2id/nimbus-jose-jwt', 'https://lists.apache.org/thread.html/e10d43984f39327e443e875adcd4a5049193a7c010e81971908caf41@%3Ccommon-issues.hadoop.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html'} | null |
Maven | GHSA-hxvf-35w8-f5mw | Cross-Site Request Forgery in Magnolia CMS | An issue in the Login page of Magnolia CMS v6.2.3 and below allows attackers to exploit both an Open Redirect vulnerability and Cross-Site Request Forgery (CSRF) in order to brute force and exfiltrate users' credentials. | {'CVE-2021-46366'} | 2022-02-24T13:18:02Z | 2022-02-12T00:00:37Z | HIGH | null | {'CWE-352'} | {'https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-46366-CSRF%2BOpen%20Redirect-Magnolia%20CMS', 'https://nvd.nist.gov/vuln/detail/CVE-2021-46366', 'https://docs.magnolia-cms.com/product-docs/6.2/Releases/Release-notes-for-Magnolia-CMS-6.2.4.html#_security_advisory'} | null |
Maven | GHSA-rrvx-pwf8-p59p | In Bouncy Castle JCE Provider the DSA key pair generator generates a weak private key if used with default values | In the Bouncy Castle JCE Provider version 1.55 and earlier the DSA key pair generator generates a weak private key if used with default values. If the JCA key pair generator is not explicitly initialised with DSA parameters, 1.55 and earlier generates a private value assuming a 1024 bit key size. In earlier releases this can be dealt with by explicitly passing parameters to the key pair generator. | {'CVE-2016-1000343'} | 2022-04-27T13:30:10.946799Z | 2018-10-17T16:24:22Z | HIGH | null | null | {'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html', 'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://github.com/bcgit/bc-java', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://usn.ubuntu.com/3727-1/', 'https://access.redhat.com/errata/RHSA-2018:2927', 'https://github.com/bcgit/bc-java/commit/50a53068c094d6cff37659da33c9b4505becd389#diff-5578e61500abb2b87b300d3114bdfd7d', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://github.com/advisories/GHSA-rrvx-pwf8-p59p', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000343'} | null |
Maven | GHSA-72j4-94rx-cr6w | Incorrect Permission Assignment for Critical Resource and Permissive List of Allowed Inputs in Keycloak | A flaw was found in all versions of Keycloak before 10.0.0, where the NodeJS adapter did not support the verify-token-audience. This flaw results in some users having access to sensitive information outside of their permissions. | {'CVE-2020-1694'} | 2022-03-03T05:12:16.824866Z | 2022-02-09T00:57:02Z | MODERATE | null | {'CWE-183', 'CWE-732'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-1694', 'https://bugzilla.redhat.com/show_bug.cgi?id=1790759'} | null |
Maven | GHSA-76qr-mmh8-cp8f | Moderate severity vulnerability that affects com.sparkjava:spark-core | In Spark before 2.7.2, a remote attacker can read unintended static files via various representations of absolute or relative pathnames, as demonstrated by file: URLs and directory traversal sequences. NOTE: this product is unrelated to Ignite Realtime Spark. | {'CVE-2018-9159'} | 2022-03-03T05:14:12.096573Z | 2018-10-19T16:56:00Z | MODERATE | null | {'CWE-22'} | {'https://github.com/perwendel/spark/issues/981', 'https://github.com/perwendel/spark/commit/030e9d00125cbd1ad759668f85488aba1019c668', 'https://nvd.nist.gov/vuln/detail/CVE-2018-9159', 'https://access.redhat.com/errata/RHSA-2018:2405', 'https://access.redhat.com/errata/RHSA-2018:2020', 'https://github.com/advisories/GHSA-76qr-mmh8-cp8f', 'https://github.com/perwendel/spark/commit/ce9e11517eca69e58ed4378d1e47a02bd06863cc', 'https://github.com/perwendel/spark', 'https://github.com/perwendel/spark/commit/a221a864db28eb736d36041df2fa6eb8839fc5cd', 'http://sparkjava.com/news#spark-272-released'} | null |
Maven | GHSA-qh2g-7h5p-mxf4 | Credentials bypass in Apache Druid | When LDAP authentication is enabled in Apache Druid 0.17.0, callers of Druid APIs with a valid set of LDAP credentials can bypass the credentialsValidator.userSearch filter barrier that determines if a valid LDAP user is allowed to authenticate with Druid. They are still subject to role-based authorization checks, if configured. Callers of Druid APIs can also retrieve any LDAP attribute values of users that exist on the LDAP server, so long as that information is visible to the Druid server. This information disclosure does not require the caller itself to be a valid LDAP user. | {'CVE-2020-1958'} | 2021-04-05T21:49:45Z | 2022-02-09T22:05:39Z | MODERATE | null | {'CWE-200', 'CWE-74'} | {'https://lists.apache.org/thread.html/r47c90a378efdb3fd07ff7f74095b8eb63b3ca93b8ada5c2661c5e371@%3Ccommits.druid.apache.org%3E', 'https://github.com/apache/druid/commit/dbaabdd24710fef726c5730c609937706f456a44#diff-fab6b7a8a160a405e787690201aade5462961550c97715ab18de6ad07a3edf7e', 'https://lists.apache.org/thread.html/r9d437371793b410f8a8e18f556d52d4bb68e18c537962f6a97f4945e%40%3Cdev.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r1526dbce98a138629a41daa06c13393146ddcaf8f9d273cc49d57681@%3Ccommits.druid.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1958', 'https://lists.apache.org/thread.html/r75e74d39c41c1b95a658b6a9f75fc6fd02b1d1922566a0ee4ee2fdfc@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rffabc9e83cc2831bbee5db32b3965b84b09346a26ebc1012db63d28c@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r026540c617d334007810cd8f0068f617b5c78444be00a31fc1b03390@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r1c32c95543d44559b8d7fd89b0a85f728c80e8b715685bbf788a15a4@%3Ccommits.druid.apache.org%3E', 'https://github.com/apache/druid/pull/9600#issuecomment-607497875', 'https://lists.apache.org/thread.html/rf70876ecafb45b314eff9d040c5281c4adb0cb7771eb029448cfb79b@%3Cannounce.apache.org%3E'} | null |
Maven | GHSA-qjw2-hr98-qgfh | Unsafe Deserialization in jackson-databind | FasterXML jackson-databind 2.x before 2.6.7.5 and from 2.7.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to com.pastdev.httpcomponents.configuration.JndiConfiguration. | {'CVE-2020-24750'} | 2022-04-26T21:00:22.723871Z | 2021-12-09T19:15:36Z | HIGH | null | {'CWE-502'} | {'https://github.com/FasterXML/jackson-databind/commit/2118e71325486c68f089a9761c9d8a11b4ddd1cb', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://security.netapp.com/advisory/ntap-20201009-0003/', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://github.com/FasterXML/jackson-databind', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/FasterXML/jackson-databind/issues/2798', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/FasterXML/jackson-databind/commit/ad5a630174f08d279504bc51ebba8772fd71b86b', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-24750'} | null |
Maven | GHSA-xgjc-49cw-529m | Moderate severity vulnerability that affects org.b3log:symphony | An issue was discovered in b3log Symphony (aka Sym) before v3.4.7. XSS exists via the userIntro and userNickname fields to processor/SettingsProcessor.java. | {'CVE-2019-9142'} | 2021-09-21T22:32:33Z | 2019-03-06T17:35:49Z | MODERATE | null | {'CWE-79'} | {'https://github.com/b3log/symphony', 'https://github.com/b3log/symphony/issues/860', 'https://github.com/advisories/GHSA-xgjc-49cw-529m', 'https://nvd.nist.gov/vuln/detail/CVE-2019-9142'} | null |
Maven | GHSA-pr5m-4w22-8483 | XXS in NanoHTTPD | An issue was discovered in RouterNanoHTTPD.java in NanoHTTPD through 2.3.1. The GeneralHandler class implements a basic GET handler that prints debug information as an HTML page. Any web server that extends this class without implementing its own GET handler is vulnerable to reflected XSS, because the GeneralHandler GET handler prints user input passed through the query string without any sanitization. | {'CVE-2020-13697'} | 2022-03-03T05:13:50.186435Z | 2021-02-25T16:32:34Z | MODERATE | null | {'CWE-79'} | {'https://github.com/NanoHttpd/nanohttpd', 'https://www.vdoo.com/advisories/#CVE-2020-13697', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13697'} | null |
Maven | GHSA-33xh-xch9-p6hj | Incorrect Authorization in Apache Ozone | In Apache Ozone versions prior to 1.2.0, Container related Datanode requests of Ozone Datanode were not properly authorized and can be called by any client. | {'CVE-2021-39233'} | 2021-11-22T18:36:47Z | 2021-11-23T18:17:59Z | CRITICAL | null | {'CWE-863'} | {'https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C394a9a73-44dd-b5db-84d8-607c3226eb00%40apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39233', 'http://www.openwall.com/lists/oss-security/2021/11/19/4'} | null |
Maven | GHSA-8h56-v53h-5hhj | Remote Code Execution - JavaEL Injection (low privileged accounts) in Nexus Repository Manager | Sonatype Nexus Repository before 3.21.2 allows Remote Code Execution. | {'CVE-2020-10204'} | 2022-03-03T05:13:09.628310Z | 2020-04-14T15:27:14Z | HIGH | null | {'CWE-20'} | {'https://securitylab.github.com/advisories/GHSL-2020-011-nxrm-sonatype', 'https://securitylab.github.com/advisories/GHSL-2020-012-nxrm-sonatype', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10204', 'https://support.sonatype.com/hc/en-us/articles/360044356194', 'https://support.sonatype.com/hc/en-us/articles/360044882533'} | null |
Maven | GHSA-wc6f-cjcp-cc33 | Improper Certificate Validation in Apache IoTDB | An issue was found in Apache IoTDB .9.0 to 0.9.1 and 0.8.0 to 0.8.2. When starting IoTDB, the JMX port 31999 is exposed with no certification.Then, clients could execute code remotely. | {'CVE-2020-1952'} | 2022-03-03T05:12:48.566149Z | 2022-01-06T19:45:30Z | HIGH | null | {'CWE-295'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-1952', 'https://lists.apache.org/thread.html/r3d2ff899ead64d2952fdc1fbb1f520ca42011ed2b4c7f786e921f6b9%40%3Cdev.iotdb.apache.org%3E'} | null |
Maven | GHSA-g8jj-899q-8x3j | Cross-site scripting in json-sanitizer | OWASP json-sanitizer before 1.2.1 allows XSS. An attacker who controls a substring of the input JSON, and controls another substring adjacent to a SCRIPT element in which the output is embedded as JavaScript, may be able to confuse the HTML parser as to where the SCRIPT element ends, and cause non-script content to be interpreted as JavaScript. | {'CVE-2020-13973'} | 2022-03-03T05:13:19.979647Z | 2022-02-10T23:04:13Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-13973', 'https://github.com/OWASP/json-sanitizer/pull/20'} | null |
Maven | GHSA-cfqj-9g2g-w7q6 | Cross-site Scripting in Apache JSPWiki | A carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the Denounce plugin, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.11.0 or later. | {'CVE-2021-40369'} | 2022-03-03T05:14:11.870150Z | 2021-12-02T17:49:14Z | MODERATE | null | {'CWE-79'} | {'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2021-40369', 'https://github.com/apache/jspwiki', 'https://lists.apache.org/thread/r2j00nrnpjgcmoxvlv3pgfoq9kzrcsfh', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40369'} | null |
Maven | GHSA-gq67-pp9w-43gp | Cryptographically weak CSRF tokens in Apache MyFaces | In the default configuration, Apache MyFaces Core versions 2.2.0 to 2.2.13, 2.3.0 to 2.3.7, 2.3-next-M1 to 2.3-next-M4, and 3.0.0-RC1 use cryptographically weak implicit and explicit cross-site request forgery (CSRF) tokens. Due to that limitation, it is possible (although difficult) for an attacker to calculate a future CSRF token value and to use that value to trick a user into executing unwanted actions on an application.
Mitigation:
Existing web.xml configuration parameters can be used to direct
MyFaces to use SecureRandom for CSRF token generation:
org.apache.myfaces.RANDOM_KEY_IN_VIEW_STATE_SESSION_TOKEN=secureRandom
org.apache.myfaces.RANDOM_KEY_IN_CSRF_SESSION_TOKEN=secureRandom
org.apache.myfaces.RANDOM_KEY_IN_WEBSOCKET_SESSION_TOKEN=secureRandom | {'CVE-2021-26296'} | 2022-03-03T05:12:05.891893Z | 2021-06-16T17:31:39Z | HIGH | null | {'CWE-330', 'CWE-352'} | {'https://security.netapp.com/advisory/ntap-20210528-0007/', 'http://packetstormsecurity.com/files/161484/Apache-MyFaces-2.x-Cross-Site-Request-Forgery.html', 'http://seclists.org/fulldisclosure/2021/Feb/66', 'https://issues.apache.org/jira/browse/MYFACES-4373', 'https://lists.apache.org/thread.html/r2b73e2356c6155e9ec78fdd8f72a4fac12f3e588014f5f535106ed9b%40%3Cannounce.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26296', 'https://github.com/apache/myfaces/commit/cc6e1cc7b9aa17e52452f7f2657b3af9c421b2b2'} | null |
Maven | GHSA-8c4j-34r4-xr8g | Unsafe Deserialization in jackson-databind | FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS. | {'CVE-2020-36180'} | 2022-04-22T18:30:38.878774Z | 2021-12-09T19:16:18Z | HIGH | null | {'CWE-502'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-36180', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/FasterXML/jackson-databind', 'https://security.netapp.com/advisory/ntap-20210205-0005/', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://github.com/FasterXML/jackson-databind/issues/3004', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'} | null |
Maven | GHSA-xqfj-vm6h-2x34 | Improper Handling of Length Parameter Inconsistency in Compress | When reading a specially crafted TAR archive, Compress can be made to allocate large amounts of memory that finally leads to an out of memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' tar package. | {'CVE-2021-35517'} | 2022-04-22T16:02:00.162972Z | 2021-08-02T16:55:39Z | HIGH | null | {'CWE-770', 'CWE-130'} | {'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/racd0c0381c8404f298b226cd9db2eaae965b14c9c568224aa3f437ae@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/rfba19167efc785ad3561e7ef29f340d65ac8f0d897aed00e0731e742@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/rd4332baaf6debd03d60deb7ec93bee49e5fdbe958cb6800dff7fb00e@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/r605d906b710b95f1bbe0036a53ac6968f667f2c249b6fbabada9a940%40%3Cuser.commons.apache.org%3E', 'https://lists.apache.org/thread.html/rb064d705fdfa44b5dae4c366b369ef6597951083196321773b983e71@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rba65ed5ddb0586f5b12598f55ec7db3633e7b7fede60466367fbf86a@%3Cnotifications.skywalking.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/07/13/3', 'http://www.openwall.com/lists/oss-security/2021/07/13/5', 'https://lists.apache.org/thread.html/r67ef3c07fe3b8c1b02d48012149d280ad6da8e4cec253b527520fb2b@%3Cdev.poi.apache.org%3E', 'https://lists.apache.org/thread.html/rb6e1fa80d34e5ada45f72655d84bfd90db0ca44ef19236a49198c88c@%3Cnotifications.skywalking.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-35517', 'https://lists.apache.org/thread.html/r9f54c0caa462267e0cc68b49f141e91432b36b23348d18c65bd0d040@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/ra393ffdc7c90a4a37ea023946f390285693795013a642d80fba20203@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r54afdab05e01de970649c2d91a993f68a6b00cd73e6e34e16c832d46@%3Cuser.ant.apache.org%3E', 'https://lists.apache.org/thread.html/r31f75743ac173b0a606f8ea6ea53f351f386c44e7bcf78ae04007c29@%3Cissues.flink.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://security.netapp.com/advisory/ntap-20211022-0001/', 'https://lists.apache.org/thread.html/r457b2ed564860996b20d938566fe8bd4bfb7c37be8e205448ccb5975@%3Cannounce.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/rb7adf3e55359819e77230b4586521e5c6874ce5ed93384bdc14d6aee@%3Cnotifications.skywalking.apache.org%3E', 'https://commons.apache.org/proper/commons-compress/security-reports.html'} | null |
Maven | GHSA-4w2q-9hp2-vxj5 | Path Traversal in Caucho Resin | There is a Directory traversal vulnerability in Caucho Resin, as distributed in Resin 4.0.52 - 4.0.56, which allows remote attackers to read files in arbitrary directories via a ; in a pathname within an HTTP request. | {'CVE-2021-44138'} | 2022-04-22T20:30:29.043628Z | 2022-04-05T00:00:28Z | HIGH | null | {'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-44138', 'https://github.com/maybe-why-not/reponame/issues/2'} | null |
Maven | GHSA-w6gv-3r3v-gwgj | Moderate severity vulnerability that affects org.keycloak:keycloak-core | Red Hat Keycloak before version 2.5.1 has an implementation of HMAC verification for JWS tokens that uses a method that runs in non-constant time, potentially leaving the application vulnerable to timing attacks. | {'CVE-2017-2585'} | 2022-03-03T05:13:00.742398Z | 2018-10-18T16:47:41Z | MODERATE | null | {'CWE-200'} | {'http://www.securityfocus.com/bid/97393', 'http://rhn.redhat.com/errata/RHSA-2017-0876.html', 'https://access.redhat.com/errata/RHSA-2017:0873', 'https://nvd.nist.gov/vuln/detail/CVE-2017-2585', 'https://access.redhat.com/errata/RHSA-2017:0872', 'http://www.securitytracker.com/id/1038180', 'https://github.com/advisories/GHSA-w6gv-3r3v-gwgj', 'https://bugzilla.redhat.com/show_bug.cgi?id=1412376'} | null |
Maven | GHSA-v84g-cf5j-xjqx | Path Traversal in Apache James Server | Apache James Server prior to version 3.6.2 contains a path traversal vulnerability. The fix for CVE-2021-40525 does not prepend delimiters upon valid directory validations. Affected implementations include: - maildir mailbox store - Sieve file repository This enables a user to access other users data stores (limited to user names being prefixed by the value of the username being used). | {'CVE-2022-22931'} | 2022-03-03T05:13:36.937321Z | 2022-02-08T00:00:34Z | MODERATE | null | {'CWE-22'} | {'https://lists.apache.org/thread/bp8yql4wws56jlh0vxoowj7foothsmpr', 'https://github.com/apache/james-project/pull/877', 'https://github.com/apache/james-project/pull/877/commits/b1e891a9e5eeadfa1d779ae50f21c73efe4d2fc7', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22931', 'https://www.openwall.com/lists/oss-security/2022/02/07/1', 'https://github.com/apache/james-project'} | null |
Maven | GHSA-2x7v-w2mv-f3rx | Improper Authentication in Atlassian Connect Spring Boot | Broken Authentication in Atlassian Connect Spring Boot (ACSB) in version 1.1.0 before 2.1.3 and from version 2.1.4 before 2.1.5: Atlassian Connect Spring Boot is a Java Spring Boot package for building Atlassian Connect apps. Authentication between Atlassian products and the Atlassian Connect Spring Boot app occurs with a server-to-server JWT or a context JWT. Atlassian Connect Spring Boot versions 1.1.0 before 2.1.3 and versions 2.1.4 before 2.1.5 erroneously accept context JWTs in lifecycle endpoints (such as installation) where only server-to-server JWTs should be accepted, permitting an attacker to send authenticated re-installation events to an app. | {'CVE-2021-26077'} | 2022-03-03T05:13:23.539175Z | 2021-06-16T17:23:12Z | HIGH | null | {'CWE-287'} | {'https://community.developer.atlassian.com/t/action-required-atlassian-connect-vulnerability-allows-bypass-of-app-qsh-verification-via-context-jwts/47072', 'https://confluence.atlassian.com/pages/viewpage.action?pageId=1063555147', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26077'} | null |
Maven | GHSA-v569-g72v-q434 | Low severity vulnerability that affects org.apache.hadoop:hadoop-main | In Apache Hadoop 3.0.0-alpha1 to 3.0.0, 2.9.0, 2.8.0 to 2.8.3, and 2.5.0 to 2.7.5, HDFS exposes extended attribute key/value pairs during listXAttrs, verifying only path-level search access to the directory rather than path-level read permission to the referent. | {'CVE-2018-1296'} | 2022-03-03T05:13:09.939417Z | 2019-02-12T17:26:12Z | HIGH | null | {'CWE-200'} | {'http://www.securityfocus.com/bid/106764', 'https://lists.apache.org/thread.html/a5b15bc76fbdad2ee40761aacf954a13aeef67e305f86d483f267e8e@%3Cuser.hadoop.apache.org%3E', 'https://github.com/advisories/GHSA-v569-g72v-q434', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1296'} | null |
Maven | GHSA-hvpr-9cr6-q5v7 | High severity vulnerability that affects org.apache.camel:camel-snakeyaml | Apache Camel's camel-snakeyaml component is vulnerable to Java object de-serialization vulnerability. De-serializing untrusted data can lead to security flaws. | {'CVE-2017-3159'} | 2022-03-03T05:13:44.515347Z | 2018-10-16T17:21:42Z | HIGH | null | {'CWE-502'} | {'https://www.github.com/mbechler/marshalsec', 'https://github.com/advisories/GHSA-hvpr-9cr6-q5v7', 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E', 'http://www.securityfocus.com/bid/96321', 'https://www.github.com/mbechler/marshalsec/blob/master/marshalsec.pdf?raw=true', 'https://nvd.nist.gov/vuln/detail/CVE-2017-3159', 'http://camel.apache.org/security-advisories.data/CVE-2017-3159.txt.asc?version=1&modificationDate=1486565167000&api=v2', 'http://www.openwall.com/lists/oss-security/2017/05/22/2', 'https://access.redhat.com/errata/RHSA-2017:0868'} | null |
Maven | GHSA-7hjp-97g3-rq93 | Moderate severity vulnerability that affects net.mingsoft:ms-mcms | An issue was discovered in com\mingsoft\cms\action\GeneraterAction.java in MCMS 4.6.5. An attacker can write a .jsp file (in the position parameter) to an arbitrary directory via a ../ Directory Traversal in the url parameter. | {'CVE-2018-18831'} | 2022-03-03T05:13:03.447817Z | 2018-11-01T14:47:04Z | HIGH | null | {'CWE-22'} | {'https://gitee.com/mingSoft/MCMS/issues/IO0K0', 'https://github.com/advisories/GHSA-7hjp-97g3-rq93', 'https://nvd.nist.gov/vuln/detail/CVE-2018-18831'} | null |
Maven | GHSA-3h5r-928v-mxhh | Unauthorized client-side property update in UIDL request handler in Vaadin 10 and 11 | Missing check in UIDL request handler in `com.vaadin:flow-server` versions 1.0.0 through 1.0.5 (Vaadin 10.0.0 through 10.0.7, and 11.0.0 through 11.0.2) allows attacker to update element property values via crafted synchronization message.
- https://vaadin.com/security/cve-2018-25007 | null | 2022-03-03T05:12:44.839218Z | 2021-04-19T14:49:13Z | LOW | null | {'CWE-754'} | {'https://github.com/vaadin/platform', 'https://vaadin.com/security/cve-2018-25007', 'https://github.com/vaadin/platform/security/advisories/GHSA-3h5r-928v-mxhh'} | null |
Maven | GHSA-xx68-jfcg-xmmf | High severity vulnerability that affects commons-fileupload:commons-fileupload | MultipartStream.java in Apache Commons FileUpload before 1.3.1, as used in Apache Tomcat, JBoss Web, and other products, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted Content-Type header that bypasses a loop's intended exit conditions. | {'CVE-2014-0050'} | 2022-03-03T05:13:01.781433Z | 2018-12-21T17:51:42Z | HIGH | null | {'CWE-20'} | {'http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html', 'http://www-01.ibm.com/support/docview.wss?uid=swg21676403', 'http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html', 'http://jvndb.jvn.jp/jvndb/JVNDB-2014-000017', 'https://github.com/advisories/GHSA-xx68-jfcg-xmmf', 'http://www-01.ibm.com/support/docview.wss?uid=swg21681214', 'http://www-01.ibm.com/support/docview.wss?uid=swg21677691', 'http://www-01.ibm.com/support/docview.wss?uid=swg21669554', 'http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-015/index.html', 'http://secunia.com/advisories/59232', 'http://secunia.com/advisories/58976', 'http://www-01.ibm.com/support/docview.wss?uid=swg21676401', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755', 'http://secunia.com/advisories/58075', 'http://rhn.redhat.com/errata/RHSA-2014-0400.html', 'http://secunia.com/advisories/59041', 'http://secunia.com/advisories/60475', 'http://www-01.ibm.com/support/docview.wss?uid=swg21676410', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html', 'http://www.vmware.com/security/advisories/VMSA-2014-0012.html', 'http://www-01.ibm.com/support/docview.wss?uid=swg21676656', 'http://www.ubuntu.com/usn/USN-2130-1', 'http://secunia.com/advisories/59183', 'http://secunia.com/advisories/59187', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917', 'http://packetstormsecurity.com/files/127215/VMware-Security-Advisory-2014-0007.html', 'http://tomcat.apache.org/security-8.html', 'http://www-01.ibm.com/support/docview.wss?uid=swg21676092', 'http://www.securityfocus.com/archive/1/534161/100/0/threaded', 'http://rhn.redhat.com/errata/RHSA-2014-0252.html', 'http://blog.spiderlabs.com/2014/02/cve-2014-0050-exploit-with-boundaries-loops-without-boundaries.html', 'http://mail-archives.apache.org/mod_mbox/commons-dev/201402.mbox/%3C52F373FC.9030907@apache.org%3E', 'http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=1062337', 'http://www-01.ibm.com/support/docview.wss?uid=swg21675432', 'http://seclists.org/fulldisclosure/2014/Dec/23', 'http://rhn.redhat.com/errata/RHSA-2014-0253.html', 'http://secunia.com/advisories/60753', 'http://www-01.ibm.com/support/docview.wss?uid=swg21676853', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html', 'http://www-01.ibm.com/support/docview.wss?uid=swg21676405', 'http://www.securityfocus.com/bid/65400', 'http://www.vmware.com/security/advisories/VMSA-2014-0007.html', 'http://secunia.com/advisories/59185', 'http://secunia.com/advisories/59492', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722', 'http://www.mandriva.com/security/advisories?name=MDVSA-2015:084', 'http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-016/index.html', 'http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-350733.htm', 'http://secunia.com/advisories/59399', 'http://marc.info/?l=bugtraq&m=143136844732487&w=2', 'http://svn.apache.org/r1565143', 'http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html', 'http://secunia.com/advisories/59039', 'http://jvn.jp/en/jp/JVN14876762/index.html', 'http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html', 'http://www-01.ibm.com/support/docview.wss?uid=swg21677724', 'http://www.vmware.com/security/advisories/VMSA-2014-0008.html', 'http://secunia.com/advisories/59725', 'http://www-01.ibm.com/support/docview.wss?uid=swg21676091', 'http://www.debian.org/security/2014/dsa-2856', 'http://www.securityfocus.com/archive/1/532549/100/0/threaded', 'http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-017/index.html', 'https://nvd.nist.gov/vuln/detail/CVE-2014-0050', 'http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html', 'http://secunia.com/advisories/59500', 'http://tomcat.apache.org/security-7.html', 'http://secunia.com/advisories/59184', 'http://advisories.mageia.org/MGASA-2014-0110.html', 'http://secunia.com/advisories/57915'} | null |
Maven | GHSA-4x25-f45x-grv5 | Missing encryption in Apache Directory Studio | While investigating DIRSTUDIO-1219 it was noticed that configured StartTLS encryption was not applied when any SASL authentication mechanism (DIGEST-MD5, GSSAPI) was used. While investigating DIRSTUDIO-1220 it was noticed that any configured SASL confidentiality layer was not applied. This issue affects Apache Directory Studio version 2.0.0.v20210213-M16 and prior versions. | {'CVE-2021-33900'} | 2022-03-03T05:13:27.458624Z | 2021-08-09T20:40:53Z | HIGH | null | {'CWE-311'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-33900', 'https://lists.apache.org/thread.html/rb1dbcc43a5b406e45d335343a1704f4233de613140a01929d102fdc9%40%3Cusers.directory.apache.org%3E'} | null |
Maven | GHSA-8wx2-9q48-vm9r | RFD attack via Content-Disposition header sourced from request input by Spring MVC or Spring WebFlux Application | In Spring Framework, versions 5.2.x prior to 5.2.3, versions 5.1.x prior to 5.1.13, and versions 5.0.x prior to 5.0.16, an application is vulnerable to a reflected file download (RFD) attack when it sets a "Content-Disposition" header in the response where the filename attribute is derived from user supplied input. | {'CVE-2020-5398'} | 2022-03-03T05:12:20.558168Z | 2020-01-21T20:59:09Z | HIGH | null | {'CWE-79', 'CWE-494'} | {'https://lists.apache.org/thread.html/r9f13cccb214495e14648d2c9b8f2c6072fd5219e74502dd35ede81e1@%3Cdev.ambari.apache.org%3E', 'https://lists.apache.org/thread.html/r5c95eff679dfc642e9e4ab5ac6d202248a59cb1e9457cfbe8b729ac5@%3Cissues.ambari.apache.org%3E', 'https://lists.apache.org/thread.html/r6dac0e365d1b2df9a7ffca12b4195181ec14ff0abdf59e1fdb088ce5@%3Ccommits.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/rc05acaacad089613e9642f939b3a44f7199b5537493945c3e045287f@%3Cdev.geode.apache.org%3E', 'https://lists.apache.org/thread.html/rdcaadaa9a68b31b7d093d76eacfaacf6c7a819f976b595c75ad2d4dc@%3Cdev.geode.apache.org%3E', 'https://lists.apache.org/thread.html/rab0de39839b4c208dcd73f01e12899dc453361935a816a784548e048@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/rf8dc72b974ee74f17bce661ea7d124e733a1f4c4f236354ac0cf48e8@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/r0f2d0ae1bad2edb3d4a863d77f3097b5e88cfbdae7b809f4f42d6aad@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r8b496b1743d128e6861ee0ed3c3c48cc56c505b38f84fa5baf7ae33a@%3Cdev.ambari.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.apache.org/thread.html/reaa8a6674baf2724b1b88a621b0d72d9f7a6f5577c88759842c16eb6@%3Ccommits.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r9fb1ee08cf337d16c3364feb0f35a072438c1a956afd7b77859aa090@%3Cissues.karaf.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/r2dfd5b331b46d3f90c4dd63a060e9f04300468293874bd7e41af7163@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r8cc37a60a5056351377ee5f1258f2a4fdd39822a257838ba6bcc1e88@%3Ccommits.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r7361bfe84bde9d233f9800c3a96673e7bd81207549ced0236f07a29d@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r1c679c43fa4f7846d748a937955c7921436d1b315445978254442163@%3Ccommits.ambari.apache.org%3E', 'https://pivotal.io/security/cve-2020-5398', 'https://lists.apache.org/thread.html/r1eccdbd7986618a7319ee7a533bd9d9bf6e8678e59dd4cca9b5b2d7a@%3Cissues.ambari.apache.org%3E', 'https://lists.apache.org/thread.html/r74f81f93a9b69140fe41e236afa7cbe8dfa75692e7ab31a468fddaa0@%3Ccommits.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/rb4d1fc078f086ec2e98b2693e8b358e58a6a4ef903ceed93a1ee2b18@%3Ccommits.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r3765353ff434fd00d8fa5a44734b3625a06eeb2a3fb468da7dfae134@%3Ccommits.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/rc9c7f96f08c8554225dba9050ea5e64bebc129d0d836303143fe3160@%3Cdev.rocketmq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://security.netapp.com/advisory/ntap-20210917-0006/', 'https://lists.apache.org/thread.html/r645408661a8df9158f49e337072df39838fa76da629a7e25a20928a6@%3Cdev.rocketmq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/ra996b56e1f5ab2fed235a8b91fa0cc3cf34c2e9fee290b7fa4380a0d@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/r712a6fce928e24e7b6ec30994a7e115a70f1f6e4cf2c2fbf0347ce46@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/r4b1886e82cc98ef38f582fef7d4ea722e3fcf46637cd4674926ba682@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r881fb5a95ab251106fed38f836257276feb026bfe01290e72ff91c2a@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/r8736185eb921022225a83e56d7285a217fd83f5524bd64a6ca3bf5cc@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r0f3530f7cb510036e497532ffc4e0bd0b882940448cf4e233994b08b@%3Ccommits.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r1bc5d673c01cfbb8e4a91914e9748ead3e5f56b61bca54d314c0419b@%3Cissues.karaf.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5398', 'https://lists.apache.org/thread.html/r1accbd4f31ad2f40e1661d70a4510a584eb3efd1e32e8660ccf46676@%3Ccommits.karaf.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r7d5e518088e2e778928b02bcd3be3b948b59acefe2f0ebb57ec2ebb0@%3Ccommits.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r4639e821ef9ca6ca10887988f410a60261400a7766560e7a97a22efc@%3Ccommits.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r028977b9b9d44a89823639aa3296fb0f0cfdd76b4450df89d3c4fbbf@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/rded5291e25a4c4085a6d43cf262e479140198bf4eabb84986e0a1ef3@%3Cdev.rocketmq.apache.org%3E', 'https://lists.apache.org/thread.html/r27552d2fa10d96f2810c50d16ad1fd1899e37796c81a0c5e7585a02d@%3Cdev.rocketmq.apache.org%3E'} | null |
Maven | GHSA-wrx7-qgmj-mf2q | Server-Side Request Forgery in Apache Kylin | All request mappings in `StreamingCoordinatorController.java` handling `/kylin/api/streaming_coordinator/*` REST API endpoints did not include any security checks, which allowed an unauthenticated user to issue arbitrary requests, such as assigning/unassigning of streaming cubes, creation/modification and deletion of replica sets, to the Kylin Coordinator. For endpoints accepting node details in HTTP message body, unauthenticated (but limited) server-side request forgery (SSRF) can be achieved. This issue affects Apache Kylin Apache Kylin 3 versions prior to 3.1.2. | {'CVE-2021-27738'} | 2022-03-03T05:12:30.838242Z | 2022-01-08T00:43:04Z | MODERATE | null | {'CWE-918'} | {'https://github.com/apache/kylin', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27738', 'https://github.com/apache/kylin/pull/1646', 'http://www.openwall.com/lists/oss-security/2022/01/06/6', 'https://lists.apache.org/thread/vkohh0to2vzwymyb2x13fszs3cs3vd70'} | null |
Maven | GHSA-9fcp-vcq9-9h2h | Moderate severity vulnerability that affects org.craftercms:crafter-studio | A Server-Side Template Injection issue was discovered in Crafter CMS 3.0.18. Attackers with developer privileges may execute OS commands by Creating/Editing a template file (.ftl filetype) that triggers a call to freemarker.template.utility.Execute in the FreeMarker library during rendering of a web page. | {'CVE-2018-19907'} | 2022-03-03T05:13:18.743574Z | 2018-12-19T19:24:18Z | HIGH | null | {'CWE-78'} | {'https://github.com/craftercms/craftercms/issues/2677', 'https://medium.com/@buxuqua/rce-vulnerability-in-crafter-cms-server-side-template-injection-19d8708ce242', 'https://nvd.nist.gov/vuln/detail/CVE-2018-19907', 'https://github.com/advisories/GHSA-9fcp-vcq9-9h2h', 'https://github.com/craftercms/craftercms'} | null |
Maven | GHSA-2467-h365-j7hm | Improper Input Validation in Apache Solr | Reported in SOLR-14515 (private) and fixed in SOLR-14561 (public), released in Solr version 8.6.0. The Replication handler (https://lucene.apache.org/solr/guide/8_6/index-replication.html#http-api-commands-for-the-replicationhandler) allows commands backup, restore and deleteBackup. Each of these take a location parameter, which was not validated, i.e you could read/write to any location the solr user can access. | {'CVE-2020-13941'} | 2022-03-03T05:14:10.130591Z | 2022-02-10T00:31:31Z | MODERATE | null | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-13941', 'https://lists.apache.org/thread.html/rc400db37710ee79378b6c52de3640493ff538c2beb41cefdbbdf2ab8@%3Ccommits.submarine.apache.org%3E', 'https://lists.apache.org/thread.html/r1d4a247329a8478073163567bbc8c8cb6b49c6bfc2bf58153a857af1@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rbcd9dff009ed19ffcc2b09784595fc1098fc802a5472f81795f893be@%3Ccommits.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/rf54e7912b7d2b72c63ec54a7afa4adcbf16268dcc63253767dd67d60%40%3Cgeneral.lucene.apache.org%3E'} | null |
Maven | GHSA-f268-65qc-98vg | Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat | If an HTTP/2 client connecting to Apache Tomcat 10.0.0-M1 to 10.0.0-M7, 9.0.0.M1 to 9.0.37 or 8.5.0 to 8.5.57 exceeded the agreed maximum number of concurrent streams for a connection (in violation of the HTTP/2 protocol), it was possible that a subsequent request made on that connection could contain HTTP headers - including HTTP/2 pseudo headers - from a previous request rather than the intended headers. This could lead to users seeing responses for unexpected resources. | {'CVE-2020-13943'} | 2022-03-03T05:13:04.880921Z | 2022-02-09T23:03:53Z | MODERATE | null | {'CWE-200'} | {'https://www.debian.org/security/2021/dsa-4835', 'http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00002.html', 'https://lists.debian.org/debian-lts-announce/2020/10/msg00019.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13943', 'https://security.netapp.com/advisory/ntap-20201016-0007/', 'https://lists.apache.org/thread.html/r4a390027eb27e4550142fac6c8317cc684b157ae314d31514747f307%40%3Cannounce.tomcat.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html'} | null |
Maven | GHSA-c57f-4vp2-jqhm | Insecure temporary directory usage in frontend build functionality of Vaadin 14 and 15-19 | Insecure temporary directory usage in frontend build functionality of `com.vaadin:flow-server` versions 2.0.9 through 2.5.2 (Vaadin 14.0.3 through Vaadin 14.5.2), 3.0 prior to 6.0 (Vaadin 15 prior to 19), and 6.0.0 through 6.0.5 (Vaadin 19.0.0 through 19.0.4) allows local users to inject malicious code into frontend resources during application rebuilds.
- https://vaadin.com/security/cve-2021-31411 | null | 2022-03-03T05:14:12.224418Z | 2021-05-06T15:27:04Z | MODERATE | null | {'CWE-379'} | {'https://github.com/vaadin/flow', 'https://github.com/vaadin/flow/security/advisories/GHSA-c57f-4vp2-jqhm'} | null |
Maven | GHSA-mh7g-99w9-xpjm | Remote code execution occurs in Apache Solr | Remote code execution occurs in Apache Solr before versions 5.5.5, 6.6.2 and 7.1.0 by exploiting XXE in conjunction with use of a Config API add-listener command to reach the RunExecutableListener class. Elasticsearch, although it uses Lucene, is NOT vulnerable to this. Note that the XML external entity expansion vulnerability occurs in the XML Query Parser which is available, by default, for any query request with parameters deftype=xmlparser and can be exploited to upload malicious data to the /upload request handler or as Blind XXE using ftp wrapper in order to read arbitrary local files from the Solr server. Note also that the second vulnerability relates to remote code execution using the RunExecutableListener available on all affected versions of Solr | {'CVE-2017-12629'} | 2022-04-27T15:16:59.640155Z | 2018-10-17T19:56:17Z | CRITICAL | null | {'CWE-611'} | {'https://lists.apache.org/thread.html/r26c996b068ef6c5e89aa59acb769025cfd343a08e63fbe9e7f3f720f@%3Coak-issues.jackrabbit.apache.org%3E', 'https://www.exploit-db.com/exploits/43009/', 'http://openwall.com/lists/oss-security/2017/10/13/1', 'https://access.redhat.com/errata/RHSA-2018:0002', 'https://access.redhat.com/errata/RHSA-2017:3244', 'https://usn.ubuntu.com/4259-1/', 'https://access.redhat.com/errata/RHSA-2017:3123', 'https://access.redhat.com/errata/RHSA-2017:3124', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12629', 'https://lists.debian.org/debian-lts-announce/2018/01/msg00028.html', 'https://github.com/apache/lucene', 'https://access.redhat.com/errata/RHSA-2018:0003', 'https://access.redhat.com/errata/RHSA-2017:3452', 'https://access.redhat.com/errata/RHSA-2018:0005', 'https://twitter.com/searchtools_avi/status/918904813613543424', 'https://www.debian.org/security/2018/dsa-4124', 'http://mail-archives.us.apache.org/mod_mbox/www-announce/201710.mbox/%3CCAOOKt51UO_6Vy%3Dj8W%3Dx1pMbLW9VJfZyFWz7pAnXJC_OAdSZubA%40mail.gmail.com%3E', 'https://s.apache.org/FJDl', 'https://lists.apache.org/thread.html/r140128dc6bb4f4e0b6a39e962c7ca25a8cbc8e48ed766176c931fccc@%3Cusers.solr.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:0004', 'https://twitter.com/ApacheSolr/status/918731485611401216', 'https://twitter.com/joshbressers/status/919258716297420802', 'http://www.securityfocus.com/bid/101261', 'https://lists.apache.org/thread.html/r95df34bb158375948da82b4dfe9a1b5d528572d586584162f8f5aeef@%3Cusers.solr.apache.org%3E', 'https://github.com/advisories/GHSA-mh7g-99w9-xpjm', 'https://access.redhat.com/errata/RHSA-2017:3451', 'https://lists.apache.org/thread.html/r3da74965aba2b5f5744b7289ad447306eeb2940c872801819faa9314@%3Cusers.solr.apache.org%3E'} | null |
Maven | GHSA-v3cg-h3f6-2242 | Injection in MockServer | MockServer is open source software which enables easy mocking of any system you integrate with via HTTP or HTTPS. An attacker that can trick a victim into visiting a malicious site while running MockServer locally, will be able to run arbitrary code on the MockServer machine. With an overly broad default CORS configuration MockServer allows any site to send cross-site requests. Additionally, MockServer allows you to create dynamic expectations using Javascript or Velocity templates. Both engines may allow an attacker to execute arbitrary code on-behalf of MockServer. By combining these two issues (Overly broad CORS configuration + Script injection), an attacker could serve a malicious page so that if a developer running MockServer visits it, they will get compromised. For more details including a PoC see the referenced GHSL-2021-059. | {'CVE-2021-32827'} | 2022-03-03T05:13:18.700106Z | 2021-08-30T16:24:38Z | MODERATE | null | {'CWE-74'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-32827', 'https://github.com/mock-server/mockserver', 'https://securitylab.github.com/advisories/GHSL-2021-059-mockserver/', 'https://www.oracle.com/security-alerts/cpujan2022.html'} | null |
Maven | GHSA-rrfq-g5fq-fc9c | Moderate severity vulnerability that affects org.apache.hive:hive-exec | In Apache Hive 2.3.3, 3.1.0 and earlier, local resources on HiveServer2 machines are not properly protected against malicious user if ranger, sentry or sql standard authorizer is not in use. | {'CVE-2018-11777'} | 2022-03-03T05:13:35.322805Z | 2018-11-21T22:25:04Z | HIGH | null | null | {'https://lists.apache.org/thread.html/963c8e2516405c9b532b4add16c03b2c5db621e0c83e80f45049cbbb@%3Cdev.hive.apache.org%3E', 'http://www.securityfocus.com/bid/105886', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11777', 'https://github.com/advisories/GHSA-rrfq-g5fq-fc9c'} | null |
Maven | GHSA-6qj8-c27w-rp33 | Cross-site scripting in Apache Syncome EndUser | It was found that the Apache Syncope EndUser UI login page prio to 2.0.15 and 2.1.6 reflects the successMessage parameters. By this mean, a user accessing the Enduser UI could execute javascript code from URL query string. | {'CVE-2019-17557'} | 2022-03-03T05:13:46.256082Z | 2022-01-06T19:38:07Z | LOW | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-17557', 'http://syncope.apache.org/security'} | null |
Maven | GHSA-6wqp-v4v6-c87c | Deserialization of Untrusted Data | An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a specific property), the service has the Oracle JDBC jar in the classpath, and an attacker can provide an LDAP service to access, it is possible to make the service execute a malicious payload. | {'CVE-2018-12023'} | 2022-03-03T05:12:41.002423Z | 2020-06-15T18:44:51Z | HIGH | null | {'CWE-502'} | {'https://access.redhat.com/errata/RHSA-2019:3892', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'https://access.redhat.com/errata/RHSA-2019:1107', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:1106', 'https://access.redhat.com/errata/RHSA-2019:4037', 'https://access.redhat.com/errata/RHSA-2019:1782', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://github.com/FasterXML/jackson-databind', 'https://access.redhat.com/errata/RHSA-2019:1823', 'https://access.redhat.com/errata/RHBA-2019:0959', 'https://github.com/FasterXML/jackson-databind/issues/2058', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://security.netapp.com/advisory/ntap-20190530-0003/', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3140', 'https://seclists.org/bugtraq/2019/May/68', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://access.redhat.com/errata/RHSA-2019:0782', 'https://lists.apache.org/thread.html/7fcf88aff0d1deaa5c3c7be8d58c05ad7ad5da94b59065d8e7c50c5d@%3Cissues.lucene.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3002', 'https://access.redhat.com/errata/RHSA-2019:0877', 'https://github.com/FasterXML/jackson-databind/commit/28badf7ef60ac3e7ef151cd8e8ec010b8479226a', 'https://access.redhat.com/errata/RHSA-2019:1822', 'https://www.blackhat.com/docs/us-16/materials/us-16-Munoz-A-Journey-From-JNDI-LDAP-Manipulation-To-RCE.pdf', 'https://nvd.nist.gov/vuln/detail/CVE-2018-12023', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://access.redhat.com/errata/RHSA-2019:1140', 'http://www.securityfocus.com/bid/105659', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZEDLDUYBSTDY4GWDBUXGJNS2RFYTFVRC/', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://access.redhat.com/errata/RHSA-2019:1797', 'https://access.redhat.com/errata/RHSA-2019:1108', 'https://access.redhat.com/errata/RHSA-2019:2804', 'https://www.debian.org/security/2019/dsa-4452'} | null |
Maven | GHSA-v6wr-fch2-vm5w | Moderate severity vulnerability that affects com.orientechnologies:orientdb-studio | server/network/protocol/http/OHttpSessionManager.java in the Studio component in OrientDB Server Community Edition before 2.0.15 and 2.1.x before 2.1.1 improperly relies on the java.util.Random class for generation of random Session ID values, which makes it easier for remote attackers to predict a value by determining the internal state of the PRNG in this class. | {'CVE-2015-2913'} | 2021-09-20T15:49:26Z | 2018-10-18T17:41:27Z | MODERATE | null | {'CWE-200'} | {'https://www.kb.cert.org/vuls/id/845332', 'https://nvd.nist.gov/vuln/detail/CVE-2015-2913', 'https://github.com/advisories/GHSA-v6wr-fch2-vm5w', 'https://github.com/orientechnologies/orientdb/commit/668ece96be210e742a4e2820a3085b215cf55104', 'https://github.com/orientechnologies/orientdb'} | null |
Maven | GHSA-26v6-w6fw-rh94 | Apache Camel can allow remote attackers to execute arbitrary commands | Apache Camel 2.6.x through 2.14.x, 2.15.x before 2.15.5, and 2.16.x before 2.16.1, when using (1) camel-jetty or (2) camel-servlet as a consumer in Camel routes, allow remote attackers to execute arbitrary commands via a crafted serialized Java object in an HTTP request. | {'CVE-2015-5348'} | 2022-04-26T19:30:07.225902Z | 2018-10-16T23:12:20Z | HIGH | null | null | {'http://camel.apache.org/security-advisories.data/CVE-2015-5348.txt.asc', 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E', 'http://packetstormsecurity.com/files/134946/Apache-Camel-Java-Object-Deserialization.html', 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E', 'http://www.securityfocus.com/archive/1/537147/100/0/threaded', 'http://www.securityfocus.com/bid/80696', 'https://nvd.nist.gov/vuln/detail/CVE-2015-5348', 'https://issues.apache.org/jira/browse/CAMEL-9309', 'https://github.com/advisories/GHSA-26v6-w6fw-rh94', 'http://rhn.redhat.com/errata/RHSA-2016-2035.html'} | null |
Maven | GHSA-qrg9-f472-qwfm | Possible route enumeration in production mode via RouteNotFoundError view in Vaadin 10, 11-14, and 15-19 | Improper sanitization of path in default `RouteNotFoundError` view in `com.vaadin:flow-server` versions 1.0.0 through 1.0.14 (Vaadin 10.0.0 through 10.0.18), 1.1.0 prior to 2.0.0 (Vaadin 11 prior to 14), 2.0.0 through 2.6.1 (Vaadin 14.0.0 through 14.6.1), and 3.0.0 through 6.0.9 (Vaadin 15.0.0 through 19.0.8) allows network attacker to enumerate all available routes via crafted HTTP request when application is running in production mode and no custom handler for `NotFoundException` is provided.
- https://vaadin.com/security/cve-2021-31412 | {'CVE-2021-31412'} | 2022-03-03T05:13:29.271189Z | 2021-06-28T16:55:58Z | MODERATE | null | {'CWE-668', 'CWE-1295'} | {'https://github.com/vaadin/platform/security/advisories/GHSA-qrg9-f472-qwfm', 'https://vaadin.com/security/cve-2021-31412', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31412', 'https://github.com/vaadin/flow/pull/11107'} | null |
Maven | GHSA-pjfr-qf3p-3q25 | When running Apache Tomcat on Windows with HTTP PUTs enabled it was possible to upload a JSP file to the server | When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server. | {'CVE-2017-12615'} | 2022-04-27T13:45:18.719134Z | 2018-10-17T16:30:31Z | HIGH | null | {'CWE-434'} | {'https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:3113', 'https://github.com/advisories/GHSA-pjfr-qf3p-3q25', 'https://access.redhat.com/errata/RHSA-2017:3114', 'https://access.redhat.com/errata/RHSA-2017:3081', 'https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E', 'http://breaktoprotect.blogspot.com/2017/09/the-case-of-cve-2017-12615-tomcat-7-put.html', 'https://access.redhat.com/errata/RHSA-2017:3080', 'https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20171018-0001/', 'https://www.synology.com/support/security/Synology_SA_17_54_Tomcat', 'https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:0465', 'http://www.securityfocus.com/bid/100901', 'https://github.com/breaktoprotect/CVE-2017-12615', 'https://access.redhat.com/errata/RHSA-2018:0466', 'https://www.exploit-db.com/exploits/42953/', 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/8fcb1e2d5895413abcf266f011b9918ae03e0b7daceb118ffbf23f8c@%3Cannounce.tomcat.apache.org%3E', 'http://www.securitytracker.com/id/1039392', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12615'} | null |
Maven | GHSA-5vjc-qx43-r747 | Stored Cross-site Scripting in folder-auth plugin | Folder-based Authorization Strategy Plugin 1.3 and earlier does not escape the names of roles shown on the configuration form.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Overall/Administer permission.
Folder-based Authorization Strategy Plugin 1.4 escapes the names of roles shown on the configuration form.
See https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2646 | null | 2022-03-18T23:57:52Z | 2022-03-18T23:57:52Z | MODERATE | null | {'CWE-79'} | {'https://github.com/jenkinsci/folder-auth-plugin/security/advisories/GHSA-5vjc-qx43-r747', 'https://github.com/jenkinsci/folder-auth-plugin', 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2646'} | null |
Maven | GHSA-9959-6p3m-wxpc | Denial of service in Netty | The SslHandler in Netty before 3.9.2 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted SSLv2Hello message. | {'CVE-2014-3488'} | 2021-09-22T18:44:46Z | 2020-06-30T21:01:31Z | MODERATE | null | {'CWE-119'} | {'https://snyk.io/vuln/SNYK-JAVA-ORGJBOSSNETTY-31630', 'https://github.com/netty/netty', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html', 'https://nvd.nist.gov/vuln/detail/CVE-2014-3488', 'https://github.com/netty/netty/commit/2fa9400a59d0563a66908aba55c41e7285a04994', 'https://github.com/netty/netty/issues/2562', 'http://secunia.com/advisories/59196', 'http://netty.io/news/2014/06/11/3-9-2-Final.html'} | null |
Maven | GHSA-4wjq-69rc-8wcp | Path Traversal in Apache Camel | Apache Camel's File is vulnerable to directory traversal. Camel 2.21.0 to 2.21.3, 2.22.0 to 2.22.2, 2.23.0 and the unsupported Camel 2.x (2.19 and earlier) versions may be also affected. | {'CVE-2019-0194'} | 2022-03-03T05:14:20.941185Z | 2019-05-02T15:21:34Z | HIGH | null | {'CWE-22'} | {'https://lists.apache.org/thread.html/a39441db574ee996f829344491b3211b53c9ed926f00ae5d88943b76@%3Cdev.camel.apache.org%3E', 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/0a163d02169d3d361150e8183df4af33f1a3d8a419b2937ac8e6c66f@%3Cusers.camel.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0194', 'https://lists.apache.org/thread.html/45e23ade8d3cb754615f95975e89e8dc73c59eeac914f07d53acbac6@%3Ccommits.camel.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2019/04/30/2'} | null |
Maven | GHSA-qcc4-3rxf-gf4m | Unauthorized property update in CheckboxGroup component in Vaadin 12-14 and 15-20 | Improper check in `CheckboxGroup` in `com.vaadin:vaadin-checkbox-flow` versions 1.2.0 prior to 2.0.0 (Vaadin 12.0.0 prior to 14.0.0), 2.0.0 prior to 3.0.0 (Vaadin 14.0.0 prior to 14.5.0), 3.0.0 through 4.0.1 (Vaadin 15.0.0 through 17.0.11), 14.5.0 through 14.6.7 (Vaadin 14.5.0 through 14.6.7), and 18.0.0 through 20.0.5 (Vaadin 18.0.0 through 20.0.5) allows attackers to modify the value of a disabled `Checkbox` inside enabled `CheckboxGroup` component via unspecified vectors.
- https://vaadin.com/security/cve-2021-33605 | {'CVE-2021-33605'} | 2022-03-03T05:13:37.300771Z | 2021-08-30T16:16:38Z | MODERATE | null | {'CWE-754'} | {'https://github.com/vaadin/flow-components/pull/1903', 'https://github.com/vaadin/flow-components', 'https://vaadin.com/security/cve-2021-33605', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33605', 'https://github.com/vaadin/flow-components/security/advisories/GHSA-qcc4-3rxf-gf4m'} | null |
Maven | GHSA-62ww-4p3p-7fhj | API information disclosure flaw in Elasticsearch | Elasticsearch versions before 7.11.2 and 6.8.15 contain a document disclosure flaw was found in the Elasticsearch suggester and profile API when Document and Field Level Security are enabled. The suggester and profile API are normally disabled for an index when document level security is enabled on the index. Certain queries are able to enable the profiler and suggester which could lead to disclosing the existence of documents and fields the attacker should not be able to view. | {'CVE-2021-22135'} | 2022-03-03T05:14:05.758743Z | 2021-07-02T18:33:02Z | MODERATE | null | {'CWE-200'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-22135', 'https://discuss.elastic.co/t/elastic-stack-7-12-0-and-6-8-15-security-update/268125', 'https://security.netapp.com/advisory/ntap-20210625-0003/'} | null |
Maven | GHSA-64q9-f38h-9mwx | Protection Mechanism Failure in Jenkins Doktor Plugin | Jenkins Doktor Plugin 0.4.1 and earlier implements functionality that allows agent processes to render files on the controller as Markdown or Asciidoc, and error messages allow attackers able to control agent processes to determine whether a file with a given name exists. | {'CVE-2022-25204'} | 2022-02-24T17:31:28Z | 2022-02-16T00:01:18Z | MODERATE | null | {'CWE-693'} | {'https://github.com/madhead/doktor', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25204', 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2548'} | null |
Maven | GHSA-pq4w-qm9g-qx68 | Insufficient Nonce Validation in Eclipse Milo Client | ### Impact
Credential replay affecting those connected to a server when *all 3* of the following conditions are met:
- `SecurityPolicy` is `None`
- using username/password or X509-based authentication
- the server has a defect causing it to send null/empty or zeroed nonces
### Patches
The problem has been patched in version `0.3.6`. A more relaxed treatment of validation as agreed upon by the OPC UA Security Working Group is implemented in version `0.3.7`.
### Workarounds
Do not use username/password or X509-based authentication with `SecurityPolicy` of `None`.
### References
https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2019-19135.pdf
### For more information
If you have any questions or comments about this advisory:
* Open an issue at [https://github.com/eclipse/milo/issues](https://github.com/eclipse/milo/issues)
* Email [the mailing list](mailto:milo-dev@eclipse.org) | {'CVE-2019-19135'} | 2022-03-03T05:14:20.050313Z | 2020-03-16T22:46:50Z | HIGH | null | {'CWE-330', 'CWE-522'} | {'https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2019-19135.pdf', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19135', 'https://github.com/eclipse/milo/security/advisories/GHSA-pq4w-qm9g-qx68', 'https://opcfoundation.org/security-bulletins/', 'https://github.com/eclipse/milo/commit/cac0e710bf2b8bed9c602fc597e9de1d8903abed'} | null |
Maven | GHSA-q66c-h853-gqw2 | AMQP 0-8, 0-9, 0-91, and 0-10 connection handling in Apache Qpid Java before 6.0.3 might allow remote attackers to bypass authentication | The AMQP 0-8, 0-9, 0-91, and 0-10 connection handling in Apache Qpid Java before 6.0.3 might allow remote attackers to bypass authentication and consequently perform actions via vectors related to connection state logging. | {'CVE-2016-4432'} | 2022-04-26T19:15:09.715948Z | 2018-10-16T19:49:48Z | CRITICAL | null | {'CWE-287'} | {'http://www.securitytracker.com/id/1035983', 'https://nvd.nist.gov/vuln/detail/CVE-2016-4432', 'https://svn.apache.org/viewvc?view=revision&revision=1743393', 'https://svn.apache.org/viewvc?view=revision&revision=1743161', 'https://issues.apache.org/jira/browse/QPID-7257', 'https://github.com/advisories/GHSA-q66c-h853-gqw2', 'http://www.securityfocus.com/archive/1/538508/100/0/threaded', 'http://packetstormsecurity.com/files/137216/Apache-Qpid-Java-Broker-6.0.2-Authentication-Bypass.html', 'http://mail-archives.apache.org/mod_mbox/qpid-users/201605.mbox/%3CCAFEMS4tXDKYxKVMmU0zTb_7uzduoUS4_RePnUwz1tj%2BGQLNw5Q%40mail.gmail.com%3E'} | null |
Maven | GHSA-g4cp-h53p-v3v8 | Allocation of Resources Without Limits or Throttling in Undertow | A flaw was discovered in Undertow in versions before Undertow 2.1.1.Final where certain requests to the "Expect: 100-continue" header may cause an out of memory error. This flaw may potentially lead to a denial of service. | {'CVE-2020-10705'} | 2022-03-03T05:14:01.670383Z | 2021-04-30T17:28:42Z | HIGH | null | {'CWE-770'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=1803241', 'https://security.netapp.com/advisory/ntap-20220210-0014/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10705'} | null |
Maven | GHSA-c43q-5hpj-4crv | Local information disclosure via system temporary directory | ## Impact
Eclipse Jersey 2.28 - 2.33 and Eclipse Jersey 3.0.0 - 3.0.1 contains a local information disclosure vulnerability. This is due to the use of the `File.createTempFile` which creates a file inside of the system temporary directory with the permissions: `-rw-r--r--`. Thus the contents of this file are viewable by all other users locally on the system. As such, if the contents written is security sensitive, it can be disclosed to other local users.
## Workaround
This issue can be mitigated by manually setting the `java.io.tmpdir` system property when launching the JVM.
## Patches
Jersey 2.34 and 3.0.2 forward sets the correct permissions on the temporary file created by Jersey.
### References
- https://github.com/eclipse-ee4j/jersey/pull/4712
- [CWE-378: Creation of Temporary File With Insecure Permissions](https://cwe.mitre.org/data/definitions/378.html)
- [CWE-379: Creation of Temporary File in Directory with Insecure Permissions](https://cwe.mitre.org/data/definitions/379.html)
## Similar Vulnerabilities
Similar, but not the same:
- JUnit 4 - https://github.com/junit-team/junit4/security/advisories/GHSA-269g-pwp5-87pp
- Google Guava - https://github.com/google/guava/issues/4011
- Apache Ant - https://nvd.nist.gov/vuln/detail/CVE-2020-1945
- JetBrains Kotlin Compiler - https://nvd.nist.gov/vuln/detail/CVE-2020-15824
- Eclipse Jetty - https://github.com/eclipse/jetty.project/security/advisories/GHSA-g3wg-6mcf-8jj6
---
Original Disclosure:
> Hello Jersey Security Team,
>
> Utilizing a custom CodeQL query written as a part of the [GitHub Security Lab](https://securitylab.github.com/) [Bug Bounty program](https://securitylab.github.com/bounties), I've unearthed a local temporary file information disclosure vulnerability.
>
> You can see the custom CodeQL query utilized here:
> https://lgtm.com/query/8831016213790320486/
>
> This particular vulnerability exists because on unix-like systems (not including modern versions of MacOS) the system temporary directory is shared between all users. As such, failure to correctly set file permissions and/or verify exclusive creation of directories can lead to either local information disclosure, or local file hijacking by another user.
>
> This vulnerability impacts the following locations in this project's source:
>
> - https://github.com/eclipse-ee4j/jersey/blob/01c6a32a2064aeff2caa8133472e33affeb8a29a/core-common/src/main/java/org/glassfish/jersey/message/internal/FileProvider.java#L64-L73
> - https://github.com/eclipse-ee4j/jersey/blob/01c6a32a2064aeff2caa8133472e33affeb8a29a/media/multipart/src/main/java/org/glassfish/jersey/media/multipart/internal/FormDataParamValueParamProvider.java#L202-L208
>
> This vulnerability exists because of the vulnerability in the `Utils.createTempFile`:
>
> https://github.com/eclipse-ee4j/jersey/blob/01c6a32a2064aeff2caa8133472e33affeb8a29a/core-common/src/main/java/org/glassfish/jersey/message/internal/Utils.java#L42-L53
>
> This is because `File.createTempFile` creates a file inside of the system temporary directory with the permissions: `-rw-r--r--`. Thus the contents of this file are viewable by all other users locally on the system.
>
> If there is sensitive information written to these files, it is disclosed to other local users on this system.
>
> The fix for this vulnerability is to use the `Files` API (instead of the `File` API) to create temporary files/directories as this new API correctly sets the posix file permissions. | {'CVE-2021-28168'} | 2022-04-22T16:02:00.212055Z | 2021-04-23T16:55:01Z | MODERATE | null | {'CWE-732', 'CWE-379', 'CWE-378'} | {'https://lists.apache.org/thread.html/r42fef440487a04cf5e487a9707ef5119d2dd5b809919f25ef4296fc4@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rc288874c330b3af9e29a1a114c5e0d24fff7a79eaa341f551535c8c0@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rc6221670de35b819fe191e7d8f2d17bc000549bd554020cec644b71e@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r96658b899fcdbf04947257d201dc5a0abdbb5fb0a8f4ec0a6c15e70f@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rafc3c4cee534f478cbf8acf91e48373e291a21151f030e8132662a7b@%3Cjira.kafka.apache.org%3E', 'https://github.com/eclipse-ee4j/jersey/pull/4712', 'https://github.com/eclipse-ee4j/jersey/security/advisories/GHSA-c43q-5hpj-4crv', 'https://lists.apache.org/thread.html/r280438f7cb4b3b1c9dfda9d7b05fa2a5cfab68618c6afee8169ecdaa@%3Ccommits.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/ra2722171d569370a9e15147d9f3f6138ad9a188ee879c0156aa2d73a@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r305fb82e5c005143c1e2ec986a19c0a44f42189ab2580344dc955359@%3Cdev.kafka.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/ra3d7cd37fc794981a885332af2f8df0d873753380ea19935d6d847fc@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rd54b42edccc1b993853a9c4943a9b16db763f5e2febf6e64b7d0fe3c@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rdff6939e6c8dd620e20b013d9a35f57d42b3cd19e1d0483d85dfa2fd@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r454f38e85db149869c5a92c993c402260a4f8599bf283f6cfaada972@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r6dadc8fe82071aba841d673ffadf34728bff4357796b1990a66e3af1@%3Ccommits.kafka.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28168', 'https://lists.apache.org/thread.html/ra3290fe51b4546fac195724c4187c4cb7fc5809bc596c2f7e97606f4@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r4066176a7352e021d7a81af460044bde8d57f40e98f8e4a31923af3a@%3Cjira.kafka.apache.org%3E'} | null |
Maven | GHSA-89gc-6cw6-4vch | Spark allows remote attackers to read arbitrary files via a .. (dot dot) in the URI | Directory traversal vulnerability in Spark 2.5 allows remote attackers to read arbitrary files via a .. (dot dot) in the URI. | {'CVE-2016-9177'} | 2022-04-26T18:47:54.553706Z | 2018-10-04T19:53:35Z | HIGH | null | {'CWE-22'} | {'https://access.redhat.com/errata/RHSA-2017:0868', 'https://nvd.nist.gov/vuln/detail/CVE-2016-9177', 'http://seclists.org/fulldisclosure/2016/Nov/13', 'https://github.com/advisories/GHSA-89gc-6cw6-4vch', 'https://github.com/perwendel/spark', 'http://www.securityfocus.com/bid/94218', 'https://github.com/perwendel/spark/issues/700'} | null |
Maven | GHSA-4qq9-rrq6-48ff | Moderate severity vulnerability that affects org.apache.nifi:nifi | The message-page.jsp error page used the value of the HTTP request header X-ProxyContextPath without sanitization, resulting in a reflected XSS attack. Mitigation: The fix to correctly parse and sanitize the request attribute value was applied on the Apache NiFi 1.8.0 release. Users running a prior 1.x release should upgrade to the appropriate release. | {'CVE-2018-17193'} | 2022-03-03T05:13:38.513377Z | 2018-12-20T22:02:39Z | MODERATE | null | {'CWE-79'} | {'https://github.com/advisories/GHSA-4qq9-rrq6-48ff', 'https://nvd.nist.gov/vuln/detail/CVE-2018-17193', 'https://nifi.apache.org/security.html#CVE-2018-17193'} | null |
Maven | GHSA-2fqw-684c-pvp7 | An issue in Atomix v3.1.5 allows attackers to cause a denial of service (DoS) via false link event messages sent to a master ONOS node. | An issue in Atomix v3.1.5 allows attackers to cause a denial of service (DoS) via false link event messages sent to a master ONOS node. | {'CVE-2020-35213'} | 2022-03-03T05:13:57.036337Z | 2021-12-17T20:40:50Z | HIGH | null | {'CWE-74'} | {'https://github.com/atomix/atomix', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35213', 'https://docs.google.com/presentation/d/1i8tVVGE8z9Rtl9UTwktOJpkZwT4kBVLgIk307qMiw_8/edit?usp=sharing'} | null |
Maven | GHSA-j239-4gqg-5j54 | Inadequate Encryption Strength | Primetek Primefaces 5.x is vulnerable to a weak encryption flaw resulting in remote code execution | {'CVE-2017-1000486'} | 2022-03-03T05:14:01.875307Z | 2021-06-03T19:22:22Z | CRITICAL | null | {'CWE-326'} | {'https://nvd.nist.gov/vuln/detail/CVE-2017-1000486', 'https://github.com/primefaces/primefaces/issues/1152', 'https://cryptosense.com/weak-encryption-flaw-in-primefaces/', 'http://blog.mindedsecurity.com/2016/02/rce-in-oracle-netbeans-opensource.html', 'https://www.exploit-db.com/exploits/43733/'} | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.