ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Maven
GHSA-rpq8-mmwh-q9hm
Directory traversal in Eclipse Mojarra
Directory traversal in Eclipse Mojarra before 2.3.14 allows attackers to read arbitrary files via the loc parameter or con parameter.
{'CVE-2020-6950'}
2022-04-22T16:01:59.732772Z
2021-09-01T18:23:58Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-6950', 'https://github.com/eclipse-ee4j/mojarra', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/eclipse-ee4j/mojarra/commit/cefbb9447e7be560e59da2da6bd7cb93776f7741', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/eclipse-ee4j/mojarra/issues/4571', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=550943'}
null
Maven
GHSA-6phf-73q6-gh87
Insecure Deserialization in Apache Commons Beanutils
In Apache Commons Beanutils 1.9.2, a special BeanIntrospector class was added which allows suppressing the ability for an attacker to access the classloader via the class property available on all Java objects. We, however were not using this by default characteristic of the PropertyUtilsBean.
{'CVE-2019-10086'}
2022-04-21T18:03:45.605116Z
2020-06-15T20:36:17Z
HIGH
null
{'CWE-502'}
{'https://lists.apache.org/thread.html/r6194ced4828deb32023cd314e31f41c61d388b58935d102c7de91f58@%3Cdev.atlas.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0806', 'https://lists.apache.org/thread.html/r513a7a21c422170318115463b399dd58ab447fe0990b13e5884f0825@%3Ccommits.dolphinscheduler.apache.org%3E', 'https://lists.apache.org/thread.html/rb1f76c2c0a4d6efb8a3523974f9d085d5838b73e7bffdf9a8f212997@%3Cissues.nifi.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/rb8dac04cb7e9cc5dedee8dabaa1c92614f590642e5ebf02a145915ba@%3Ccommits.atlas.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4APPGLBWMFAS4WHNLR4LIJ65DJGPV7TF/', 'https://lists.apache.org/thread.html/r2d5f1d88c39bd615271abda63964a0bee9b2b57fef1f84cb4c43032e@%3Cissues.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/r46e536fc98942dce99fadd2e313aeefe90c1a769c5cd85d98df9d098@%3Cissues.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://lists.apache.org/thread.html/a684107d3a78e431cf0fbb90629e8559a36ff8fe94c3a76e620b39fa@%3Cdev.shiro.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0057', 'https://lists.apache.org/thread.html/re2028d4d76ba1db3e3c3a722d6c6034e801cc3b309f69cc166eaa32b@%3Ccommits.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/rd2d2493f4f1af6980d265b8d84c857e2b7ab80a46e1423710c448957@%3Cissues.nifi.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://access.redhat.com/errata/RHSA-2020:0811', 'https://lists.debian.org/debian-lts-announce/2019/08/msg00030.html', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.apache.org/thread.html/r967953a14e05016bc4bcae9ef3dd92e770181158b4246976ed8295c9@%3Cdev.brooklyn.apache.org%3E', 'https://lists.apache.org/thread.html/reee57101464cf7622d640ae013b2162eb864f603ec4093de8240bb8f@%3Cdev.atlas.apache.org%3E', 'https://lists.apache.org/thread.html/r18d8b4f9263e5cad3bbaef0cdba0e2ccdf9201316ac4b85e23eb7ee4@%3Cdev.atlas.apache.org%3E', 'https://lists.apache.org/thread.html/ra87ac17410a62e813cba901fdd4e9a674dd53daaf714870f28e905f1@%3Cdev.atlas.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/c94bc9649d5109a663b2129371dc45753fbdeacd340105548bbe93c3@%3Cdev.shiro.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIUYSL2RSIWZVNSUIXJTIFPIPIF6OAIO/', 'https://lists.apache.org/thread.html/rec74f3a94dd850259c730b4ba6f7b6211222b58900ec088754aa0534@%3Cissues.nifi.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:4317', 'https://access.redhat.com/errata/RHSA-2020:0194', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/5261066cd7adee081ee05c8bf0e96cf0b2eeaced391e19117ae4daa6@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/rae81e0c8ebdf47ffaa85a01240836bfece8a990c48f55c7933162b5c@%3Cdev.atlas.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/956995acee0d8bc046f1df0a55b7fbeb65dd2f82864e5de1078bacb0@%3Cissues.commons.apache.org%3E', 'https://lists.apache.org/thread.html/r43de02fd4a4f52c4bdeff8c02f09625d83cd047498009c1cdab857db@%3Cdev.rocketmq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.apache.org/thread.html/rcc029be4edaaf5b8bb85818aab494e16f312fced07a0f4a202771ba2@%3Cissues.nifi.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/r306c0322aa5c0da731e03f3ce9f07f4745c052c6b73f4e78faf232ca@%3Cdev.atlas.apache.org%3E', 'https://lists.apache.org/thread.html/1f78f1e32cc5614ec0c5b822ba4bd7fc8e8b5c46c8e038b6bd609cb5@%3Cissues.commons.apache.org%3E', 'https://lists.apache.org/thread.html/racd3e7b2149fa2f255f016bd6bffab0fea77b6fb81c50db9a17f78e6@%3Cdev.atlas.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/2fd61dc89df9aeab738d2b49f48d42c76f7d53b980ba04e1d48bce48@%3Cdev.shiro.apache.org%3E', 'http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00007.html', 'https://lists.apache.org/thread.html/ra9a139fdc0999750dcd519e81384bc1fe3946f311b1796221205f51c@%3Ccommits.dolphinscheduler.apache.org%3E', 'https://github.com/apache/commons-beanutils', 'https://access.redhat.com/errata/RHSA-2020:0804', 'https://lists.apache.org/thread.html/3d1ed1a1596c08c4d5fea97b36c651ce167b773f1afc75251ce7a125@%3Ccommits.tinkerpop.apache.org%3E', 'https://lists.apache.org/thread.html/02094ad226dbc17a2368beaf27e61d8b1432f5baf77d0ca995bb78bc@%3Cissues.commons.apache.org%3E', 'http://mail-archives.apache.org/mod_mbox/www-announce/201908.mbox/%3cC628798F-315D-4428-8CB1-4ED1ECC958E4@apache.org%3e', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/ra41fd0ad4b7e1d675c03a5081a16a6603085a4e37d30b866067566fe@%3Cissues.nifi.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0805', 'https://lists.apache.org/thread.html/d6ca9439c53374b597f33b7ec180001625597db48ea30356af01145f@%3Cdev.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/re3cd7cb641d7fc6684e4fc3c336a8bad4a01434bb5625a06e3600fd1@%3Cissues.nifi.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10086'}
null
Maven
GHSA-r4x2-3cq5-hqvp
The defaults settings for the CORS filter provided in Apache Tomcat are insecure and enable 'supportsCredentials' for all origins
The defaults settings for the CORS filter provided in Apache Tomcat 9.0.0.M1 to 9.0.8, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, 7.0.41 to 7.0.88 are insecure and enable 'supportsCredentials' for all origins. It is expected that users of the CORS filter will have configured it appropriately for their environment rather than using it in the default configuration. Therefore, it is expected that most users will not be impacted by this issue.
{'CVE-2018-8014'}
2022-04-27T13:45:20.891887Z
2018-10-17T16:32:32Z
CRITICAL
null
{'CWE-1188'}
{'https://seclists.org/bugtraq/2019/Dec/43', 'https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2469', 'http://tomcat.apache.org/security-9.html', 'https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20181018-0002/', 'https://usn.ubuntu.com/3665-1/', 'http://www.securityfocus.com/bid/104203', 'http://www.securitytracker.com/id/1040998', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'https://www.debian.org/security/2019/dsa-4596', 'https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E', 'http://tomcat.apache.org/security-8.html', 'https://access.redhat.com/errata/RHSA-2018:3768', 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E', 'http://www.securitytracker.com/id/1041888', 'https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8014', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.debian.org/debian-lts-announce/2019/08/msg00015.html', 'https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:2470', 'https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2018/06/msg00008.html', 'https://github.com/advisories/GHSA-r4x2-3cq5-hqvp', 'https://access.redhat.com/errata/RHSA-2019:2205', 'https://access.redhat.com/errata/RHSA-2019:0450', 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4@%3Cissues.activemq.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:1529', 'https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:0451', 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E', 'http://tomcat.apache.org/security-7.html', 'https://lists.apache.org/thread.html/fbfb713e4f8a4c0f81089b89450828011343593800cae3fb629192b1@%3Cannounce.tomcat.apache.org%3E'}
null
Maven
GHSA-26gr-cvq3-qxgf
Improper Authentication in Apache Shiro
Apache Shiro before 1.5.2, when using Apache Shiro with Spring dynamic controllers, a specially crafted request may cause an authentication bypass.
{'CVE-2020-1957'}
2022-04-01T20:31:58.288104Z
2021-05-07T15:53:18Z
CRITICAL
null
{'CWE-287'}
{'https://lists.apache.org/thread.html/rc8b39ea8b3ef71ddc1cd74ffc866546182683c8adecf19c263fe7ac0@%3Ccommits.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r2d2612c034ab21a3a19d2132d47d3e4aa70105008dd58af62b653040@%3Ccommits.shiro.apache.org%3E', 'https://lists.apache.org/thread.html/r17f371fc89d34df2d0c8131473fbc68154290e1be238895648f5a1e6%40%3Cdev.shiro.apache.org%3E', 'https://github.com/apache/shiro', 'https://lists.apache.org/thread.html/rb3982edf8bc8fcaa7a308e25a12d294fb4aac1f1e9d4e14fda639e77@%3Cdev.geode.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/04/msg00014.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1957', 'https://lists.apache.org/thread.html/rc64fb2336683feff3580c3c3a8b28e80525077621089641f2f386b63@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/rab1972d6b177f7b5c3dde9cfb0a40f03bca75f0eaf1d8311e5762cb3@%3Ccommits.shiro.apache.org%3E'}
null
Maven
GHSA-4cch-wxpw-8p28
Server-Side Forgery Request can be activated unmarshalling with XStream
### Impact The vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream. ### Patches If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.15. ### Workarounds The reported vulnerability does not exist running Java 15 or higher. No user is affected, who followed the recommendation to setup XStream's Security Framework with a whitelist! Anyone relying on XStream's default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability. Users of XStream 1.4.14 or below who still insist to use XStream default blacklist - despite that clear recommendation - can use a workaround depending on their version in use. Users of XStream 1.4.14 can simply add two lines to XStream's setup code: ```Java xstream.denyTypes(new String[]{ "jdk.nashorn.internal.objects.NativeString" }); xstream.denyTypesByRegExp(new String[]{ ".*\\.ReadAllStream\\$FileStream" }); ``` Users of XStream 1.4.14 to 1.4.13 can simply add three lines to XStream's setup code: ```Java xstream.denyTypes(new String[]{ "javax.imageio.ImageIO$ContainsFilter", "jdk.nashorn.internal.objects.NativeString" }); xstream.denyTypes(new Class[]{ java.lang.ProcessBuilder.class }); xstream.denyTypesByRegExp(new String[]{ ".*\\.ReadAllStream\\$FileStream" }); ``` Users of XStream 1.4.12 to 1.4.7 who want to use XStream with a black list will have to setup such a list from scratch and deny at least the following types: _javax.imageio.ImageIO$ContainsFilter_, _java.beans.EventHandler_, _java.lang.ProcessBuilder_, _jdk.nashorn.internal.objects.NativeString.class_, _java.lang.Void_ and _void_ and deny several types by name pattern. ```Java xstream.denyTypes(new String[]{ "javax.imageio.ImageIO$ContainsFilter", "jdk.nashorn.internal.objects.NativeString" }); xstream.denyTypes(new Class[]{ java.lang.ProcessBuilder.class, "jdk.nashorn.internal.objects.NativeString", java.beans.EventHandler.class, java.lang.ProcessBuilder.class, java.lang.Void.class, void.class }); xstream.denyTypesByRegExp(new String[]{ ".*\\$LazyIterator", "javax\\.crypto\\..*", ".*\\.ReadAllStream\\$FileStream" }); ``` Users of XStream 1.4.6 or below can register an own converter to prevent the unmarshalling of the currently know critical types of the Java runtime. It is in fact an updated version of the workaround for CVE-2013-7285: ```Java xstream.registerConverter(new Converter() { public boolean canConvert(Class type) { return type != null && (type == java.beans.EventHandler.class || type == java.lang.ProcessBuilder.class || type.getName().equals("javax.imageio.ImageIO$ContainsFilter") || type.getName().equals("jdk.nashorn.internal.objects.NativeString") || type == java.lang.Void.class || void.class || Proxy.isProxy(type)) || type.getName().startsWith("javax.crypto.") || type.getName().endsWith("$LazyIterator") || type.getName().endsWith(".ReadAllStream$FileStream")); } public Object unmarshal(HierarchicalStreamReader reader, UnmarshallingContext context) { throw new ConversionException("Unsupported type due to security reasons."); } public void marshal(Object source, HierarchicalStreamWriter writer, MarshallingContext context) { throw new ConversionException("Unsupported type due to security reasons."); } }, XStream.PRIORITY_LOW); ``` ### For more information If you have any questions or comments about this advisory: * Open an issue in [XStream](https://github.com/x-stream/xstream/issues) * Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
{'CVE-2020-26258'}
2022-03-03T05:12:48.580755Z
2020-12-21T16:28:42Z
HIGH
null
{'CWE-918'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-26258', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://lists.apache.org/thread.html/r97993e3d78e1f5389b7b172ba9f308440830ce5f051ee62714a0aa34@%3Ccommits.struts.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/12/msg00042.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'https://www.debian.org/security/2021/dsa-4828', 'https://x-stream.github.io/CVE-2020-26258.html', 'https://security.netapp.com/advisory/ntap-20210409-0005/', 'https://github.com/x-stream/xstream', 'https://github.com/x-stream/xstream/security/advisories/GHSA-4cch-wxpw-8p28'}
null
Maven
GHSA-8vh8-vc28-m2hf
Potential to access user credentials from the log files when debug logging enabled
A flaw was found in, all under 2.0.20, in the Undertow DEBUG log for io.undertow.request.security. If enabled, an attacker could abuse this flaw to obtain the user's credentials from the log files.
{'CVE-2019-10212'}
2022-03-03T05:12:47.219379Z
2019-11-20T01:33:54Z
CRITICAL
null
{'CWE-532'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10212', 'https://security.netapp.com/advisory/ntap-20220210-0017/', 'https://access.redhat.com/errata/RHSA-2019:2998', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10212', 'https://access.redhat.com/errata/RHSA-2020:0727'}
null
Maven
GHSA-4pm3-f52j-8ggh
Improper Input Validation in GeoServer
### Impact The GeoServer security mechanism can perform an unchecked JNDI lookup, which in turn can be used to perform class deserialization and result in arbitrary code execution. The same can happen while configuring data stores with data sources located in JNDI, or while setting up the disk quota mechanism. In order to perform any of the above changes, the attack needs to have obtained admin rights and use either the GeoServer GUI, or its REST API. ### Patches The lookups are going to be restricted in GeoServer 2.21.0, 2.20.4, 2.19.6. ### Workarounds Protection can be achieved by making the GUI (``geoserver/web``), the REST configuration (``geoserver/rest``) and the embedded GeoWebCache configuration (``geoserver/gwc/rest``) unreachable from remote hosts, in addition to protecting access to the file system where the GeoServer configuration is stored.
{'CVE-2022-24847'}
2022-04-22T20:39:10Z
2022-04-22T20:39:10Z
HIGH
null
{'CWE-20'}
{'https://github.com/geoserver/geoserver/commit/b94a69943992df999d627b21a4ed056fad4569f8', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24847', 'https://github.com/geoserver/geoserver/security/advisories/GHSA-4pm3-f52j-8ggh', 'https://github.com/geoserver/geoserver'}
null
Maven
GHSA-jgmr-wrwx-mgfj
Exposure of Sensitive Information to an Unauthorized Actor and SQL Injection in Spring Data JPA
This affects Spring Data JPA in versions up to and including 2.1.5, 2.0.13 and 1.11.19. Derived queries using any of the predicates ?startingWith?, ?endingWith? or ?containing? could return more results than anticipated when a maliciously crafted query parameter value is supplied. Also, LIKE expressions in manually defined queries could return unexpected results if the parameter values bound did not have escaped reserved characters properly.
{'CVE-2019-3797'}
2022-03-03T05:13:54.696088Z
2019-05-14T04:02:35Z
MODERATE
null
{'CWE-200', 'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-3797', 'https://pivotal.io/security/cve-2019-3797'}
null
Maven
GHSA-mc84-pj99-q6hh
Improper Handling of Length Parameter Inconsistency in Compress
When reading a specially crafted ZIP archive, Compress can be made to allocate large amounts of memory that finally leads to an out of memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' zip package.
{'CVE-2021-36090'}
2022-04-22T16:02:00.119403Z
2021-08-02T16:55:53Z
HIGH
null
{'CWE-130'}
{'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/racd0c0381c8404f298b226cd9db2eaae965b14c9c568224aa3f437ae@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/r9a23d4dbf4e34d498664080bff59f2893b855eb16dae33e4aa92fa53@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/rc4134026d7d7b053d4f9f2205531122732405012c8804fd850a9b26f%40%3Cuser.commons.apache.org%3E', 'https://lists.apache.org/thread.html/rfba19167efc785ad3561e7ef29f340d65ac8f0d897aed00e0731e742@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/rbbf42642c3e4167788a7c13763d192ee049604d099681f765385d99d@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/rdd5412a5b9a25aed2a02c3317052d38a97128314d50bc1ed36e81d38@%3Cuser.ant.apache.org%3E', 'https://lists.apache.org/thread.html/rd4332baaf6debd03d60deb7ec93bee49e5fdbe958cb6800dff7fb00e@%3Cnotifications.skywalking.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36090', 'https://lists.apache.org/thread.html/rb064d705fdfa44b5dae4c366b369ef6597951083196321773b983e71@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rc7df4c2f0bbe2028a1498a46d322c91184f7a369e3e4c57d9518cacf@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/rba65ed5ddb0586f5b12598f55ec7db3633e7b7fede60466367fbf86a@%3Cnotifications.skywalking.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/07/13/4', 'https://lists.apache.org/thread.html/rbe91c512c5385181149ab087b6c909825d34299f5c491c6482a2ed57@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rb5fa2ee61828fa2e42361b58468717e84902dd71c4aea8dc0b865df7@%3Cnotifications.james.apache.org%3E', 'https://lists.apache.org/thread.html/r0e87177f8e78b4ee453cd4d3d8f4ddec6f10d2c27707dd71e12cafc9@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r67ef3c07fe3b8c1b02d48012149d280ad6da8e4cec253b527520fb2b@%3Cdev.poi.apache.org%3E', 'https://lists.apache.org/thread.html/rb6e1fa80d34e5ada45f72655d84bfd90db0ca44ef19236a49198c88c@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/r75ffc7a461e7e7ae77690fa75bd47bb71365c732e0fbcc44da4f8ff5@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/rf93b6bb267580e01deb7f3696f7eaca00a290c66189a658cf7230a1a@%3Cissues.drill.apache.org%3E', 'https://lists.apache.org/thread.html/r9f54c0caa462267e0cc68b49f141e91432b36b23348d18c65bd0d040@%3Cnotifications.skywalking.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/07/13/6', 'https://lists.apache.org/thread.html/r25f4c44616045085bc3cf901bb7e68e445eee53d1966fc08998fc456@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/r3227b1287e5bd8db6523b862c22676b046ad8f4fc96433225f46a2bd@%3Cissues.drill.apache.org%3E', 'https://lists.apache.org/thread.html/r4f03c5de923e3f2a8c316248681258125140514ef3307bfe1538e1ab@%3Cdev.drill.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://security.netapp.com/advisory/ntap-20211022-0001/', 'https://lists.apache.org/thread.html/rf3f0a09fee197168a813966c5816157f6c600a47313a0d6813148ea6@%3Cissues.drill.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r54049b66afbca766b6763c7531e9fe7a20293a112bcb65462a134949@%3Ccommits.drill.apache.org%3E', 'https://lists.apache.org/thread.html/rb7adf3e55359819e77230b4586521e5c6874ce5ed93384bdc14d6aee@%3Cnotifications.skywalking.apache.org%3E', 'https://commons.apache.org/proper/commons-compress/security-reports.html', 'https://lists.apache.org/thread.html/rab292091eadd1ecc63c516e9541a7f241091cf2e652b8185a6059945@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rf2f4d7940371a7c7c5b679f50e28fc7fcc82cd00670ced87e013ac88@%3Ccommits.druid.apache.org%3E'}
null
Maven
GHSA-vvjc-q5vr-52q6
Apache Camel's Jackson and JacksonXML unmarshalling operation are vulnerable to Remote Code Execution attacks
Apache Camel's Jackson and JacksonXML unmarshalling operation are vulnerable to Remote Code Execution attacks.
{'CVE-2016-8749'}
2022-04-26T19:30:18.368427Z
2018-10-16T23:13:00Z
CRITICAL
null
{'CWE-502'}
{'https://access.redhat.com/errata/RHSA-2017:1832', 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E', 'https://www.github.com/mbechler/marshalsec/blob/master/marshalsec.pdf?raw=true', 'https://nvd.nist.gov/vuln/detail/CVE-2016-8749', 'http://camel.apache.org/security-advisories.data/CVE-2016-8749.txt.asc?version=2&modificationDate=1486565034000&api=v2', 'http://www.securityfocus.com/bid/97179', 'https://github.com/advisories/GHSA-vvjc-q5vr-52q6', 'http://www.openwall.com/lists/oss-security/2017/05/22/2'}
null
Maven
GHSA-jvfv-hrrc-6q72
Improper Restriction of XML External Entity Reference in Liquibase
The XMLChangeLogSAXParser() function in Liquibase prior to version 4.8.0 contains an issue that may lead to to Improper Restriction of XML External Entity Reference.
{'CVE-2022-0839'}
2022-03-18T21:17:01.937148Z
2022-03-05T00:00:45Z
CRITICAL
null
{'CWE-611'}
{'https://huntr.dev/bounties/f1ae5779-b406-4594-a8a3-d089c68d6e70', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0839', 'https://github.com/liquibase/liquibase/commit/33d9d925082097fb1a3d2fc8e44423d964cd9381', 'https://github.com/liquibase/liquibase'}
null
Maven
GHSA-fp5r-v3w9-4333
JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data
JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and TopicConnectionFactoryBindingName configurations causing JMSAppender to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-44228. Note this issue only affects Log4j 1.2 when specifically configured to use JMSAppender, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.
{'CVE-2021-4104'}
2022-04-22T15:47:32.613655Z
2021-12-14T19:49:31Z
HIGH
null
{'CWE-502'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-4104', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://access.redhat.com/security/cve/CVE-2021-4104', 'https://security.netapp.com/advisory/ntap-20211223-0007/', 'https://www.cve.org/CVERecord?id=CVE-2021-44228', 'http://www.openwall.com/lists/oss-security/2022/01/18/3', 'https://github.com/apache/logging-log4j2', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.kb.cert.org/vuls/id/930724', 'https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0033', 'https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126'}
null
Maven
GHSA-hjm9-576q-399p
Moderate severity vulnerability that affects org.esigate:esigate-core
esigate.org esigate version 5.2 and earlier contains a CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') vulnerability in ESI directive with user specified XSLT that can result in Remote Code Execution. This attack appear to be exploitable via Use of another weakness in backend application to reflect ESI directives. This vulnerability appears to have been fixed in 5.3.
{'CVE-2018-1000854'}
2022-03-03T05:14:06.020756Z
2018-12-21T17:46:23Z
CRITICAL
null
{'CWE-74'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-1000854', 'https://github.com/advisories/GHSA-hjm9-576q-399p', 'https://github.com/esigate/esigate', 'https://github.com/esigate/esigate/issues/209'}
null
Maven
GHSA-544x-2jx9-4pfg
Path traversal in Apache Karaf
Apache Karaf obr:* commands and run goal on the karaf-maven-plugin have partial path traversal which allows to break out of expected folder. The risk is low as obr:* commands are not very used and the entry is set by user. This has been fixed in revision: https://gitbox.apache.org/repos/asf?p=karaf.git;h=36a2bc4 https://gitbox.apache.org/repos/asf?p=karaf.git;h=52b70cf Mitigation: Apache Karaf users should upgrade to 4.2.15 or 4.3.6 or later as soon as possible, or use correct path. JIRA Tickets: https://issues.apache.org/jira/browse/KARAF-7326
{'CVE-2022-22932'}
2022-03-03T05:13:04.428901Z
2022-01-28T22:25:03Z
MODERATE
null
{'CWE-22'}
{'https://issues.apache.org/jira/browse/KARAF-7326', 'https://github.com/apache/karaf/pull/1485', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22932', 'https://gitbox.apache.org/repos/asf?p=karaf.git;h=36a2bc4', 'https://karaf.apache.org/security/cve-2022-22932.txt', 'https://gitbox.apache.org/repos/asf?p=karaf.git;h=52b70cf', 'https://github.com/apache/karaf'}
null
Maven
GHSA-7qqr-3pj3-q2f5
XSS issues in the management interface
In system/workplace/ in Alkacon OpenCms 10.5.4 and 10.5.5, there are multiple Reflected and Stored XSS issues in the management interface.
{'CVE-2019-13236'}
2022-03-03T05:13:13.905651Z
2019-11-12T22:58:21Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-13236', 'https://github.com/alkacon/opencms-core/commits/branch_10_5_x', 'http://packetstormsecurity.com/files/154283/Alkacon-OpenCMS-10.5.x-Cross-Site-Scripting.html', 'https://aetsu.github.io/OpenCms', 'https://twitter.com/aetsu/status/1152096227938459648'}
null
Maven
GHSA-9jg9-6wm2-x7p5
Server-Side Request Forgery in Karaf
In Karaf, JMX authentication takes place using JAAS and authorization takes place using ACL files. By default, only an "admin" can actually invoke on an MBean. However there is a vulnerability there for someone who is not an admin, but has a "viewer" role. In the 'etc/jmx.acl.cfg', such as role can call get*. It's possible to authenticate as a viewer role + invokes on the MLet getMBeansFromURL method, which goes off to a remote server to fetch the desired MBean, which is then registered in Karaf. At this point the attack fails as "viewer" doesn't have the permission to invoke on the MBean. Still, it could act as a SSRF style attack and also it essentially allows a "viewer" role to pollute the MBean registry, which is a kind of privilege escalation. The vulnerability is low as it's possible to add a ACL to limit access. Users should update to Apache Karaf 4.2.9 or newer.
{'CVE-2020-11980'}
2022-03-03T05:13:43.239904Z
2022-02-10T23:04:32Z
MODERATE
null
{'CWE-918'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-11980', 'http://karaf.apache.org/security/cve-2020-11980.txt'}
null
Maven
GHSA-rwh9-8xx8-4wfm
Cross-site Scripting in OpenCRX
In OpenCRX, versions v4.0.0 through v5.1.0 are vulnerable to reflected Cross-site Scripting (XSS), due to unsanitized parameters in the password reset functionality. This allows execution of external javascript files on any user of the openCRX instance.
{'CVE-2021-25959'}
2022-03-03T05:14:06.274512Z
2021-09-30T20:50:21Z
MODERATE
null
{'CWE-79'}
{'https://github.com/opencrx/opencrx', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25959', 'https://github.com/opencrx/opencrx/commit/14e75f95e5f56fbe7ee897bdf5d858788072e818'}
null
Maven
GHSA-q93h-jc49-78gg
jackson-databind mishandles the interaction between serialization gadgets and typing
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig (aka ibatis-sqlmap).
{'CVE-2020-9547'}
2022-03-03T05:12:57.253639Z
2020-05-15T18:59:10Z
CRITICAL
null
{'CWE-502'}
{'https://lists.apache.org/thread.html/rdd4df698d5d8e635144d2994922bf0842e933809eae259521f3b5097@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/ra3e90712f2d59f8cef03fa796f5adf163d32b81fe7b95385f21790e6@%3Cnotifications.zookeeper.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/issues/2634', 'https://lists.apache.org/thread.html/r4accb2e0de9679174efd3d113a059bab71ff3ec53e882790d21c1cc1@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/03/msg00008.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://github.com/FasterXML/jackson-databind', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://lists.apache.org/thread.html/redbe4f1e21bf080f637cf9fbec47729750a2f443a919765360337428@%3Cnotifications.zookeeper.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20200904-0006/', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://lists.apache.org/thread.html/rc0d5d0f72da1ed6fc5e438b1ddb3fa090c73006b55f873cf845375ab@%3Cnotifications.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/rd5a4457be4623038c3989294429bc063eec433a2e55995d81591e2ca@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r742ef70d126548dcf7de5be5779355c9d76a9aec71d7a9ef02c6398a@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r893a0104e50c1c2559eb9a5812add28ae8c3e5f43712947a9847ec18@%3Cnotifications.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/r35d30db00440ef63b791c4b7f7acb036e14d4a23afa2a249cb66c0fd@%3Cissues.zookeeper.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9547', 'https://lists.apache.org/thread.html/r98c9b6e4c9e17792e2cd1ec3e4aa20b61a791939046d3f10888176bb@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rb6fecb5e96a6d61e175ff49f33f2713798dd05cf03067c169d195596@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r9464a40d25c3ba1a55622db72f113eb494a889656962d098c70c5bb1@%3Cdev.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/rdd49ab9565bec436a896bc00c4b9fc9dce1598e106c318524fbdfec6@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd0e958d6d5c5ee16efed73314cd0e445c8dbb4bdcc80fc9d1d6c11fc@%3Cdev.zookeeper.apache.org%3E'}
null
Maven
GHSA-q4xf-3pmq-3hw8
Improper Restriction of XML External Entity Reference in Apache NiFi
In Apache NiFi 1.0.0 to 1.11.4, the notification service manager and various policy authorizer and user group provider objects allowed trusted administrators to inadvertently configure a potentially malicious XML file. The XML file has the ability to make external calls to services (via XXE).
{'CVE-2020-13940'}
2022-03-03T05:14:17.513693Z
2022-01-06T20:41:00Z
MODERATE
null
{'CWE-611'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-13940', 'https://nifi.apache.org/security#CVE-2020-13940', 'https://github.com/apache/nifi/commit/7f0416ee8bdcee95e28409cc6fae9c1394c2a798'}
null
Maven
GHSA-h822-r4r5-v8jg
Polymorphic Typing issue in FasterXML jackson-databind
A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariConfig.
{'CVE-2019-14540'}
2022-03-03T05:14:00.375729Z
2019-09-23T18:33:25Z
CRITICAL
null
{'CWE-502'}
{'https://lists.apache.org/thread.html/a4f2c9fb36642a48912cdec6836ec00e497427717c5d377f8d7ccce6@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/40c00861b53bb611dee7d6f35f864aa7d1c1bd77df28db597cbf27e1@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/a360b46061c91c5cad789b6c3190aef9b9f223a2b75c9c9f046fe016@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/dc6b5cad721a4f6b3b62ed1163894941140d9d5656140fb757505ca0@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/e90c3feb21702e68a8c08afce37045adb3870f2bf8223fa403fb93fb@%3Ccommits.hbase.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/blob/master/release-notes/VERSION-2.x', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0160', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14540', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/0fcef7321095ce0bc597d468d150cff3d647f4cb3aef3bd4d20e1c69@%3Ccommits.tinkerpop.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20191004-0002/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q7CANA7KV53JROZDX5Z5P26UG5VN2K43/', 'https://www.debian.org/security/2019/dsa-4542', 'https://lists.apache.org/thread.html/r8aaf4ee16bbaf6204731d4770d96ebb34b258cd79b491f9cdd7f2540@%3Ccommits.nifi.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0159', 'https://access.redhat.com/errata/RHSA-2020:0161', 'https://lists.apache.org/thread.html/ad0d238e97a7da5eca47a014f0f7e81f440ed6bf74a93183825e18b9@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2019/10/msg00001.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3200', 'https://access.redhat.com/errata/RHSA-2020:0164', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://github.com/FasterXML/jackson-databind/issues/2410', 'https://github.com/FasterXML/jackson-databind/issues/2449', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TH5VFUN4P7CCIP7KSEXYA5MUTFCUDUJT/', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0445', 'https://seclists.org/bugtraq/2019/Oct/6', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}
null
Maven
GHSA-2vp8-jv5v-6qh6
Allocation of resources without limits or throttling in keycloak-model-infinispan
A flaw was found in keycloak-model-infinispan in keycloak versions before 14.0.0 where authenticationSessions map in RootAuthenticationSessionEntity grows boundlessly which could lead to a DoS attack.
{'CVE-2021-3637'}
2022-03-03T05:13:17.545681Z
2021-07-13T17:43:23Z
HIGH
null
{'CWE-770'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=1979638', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3637'}
null
Maven
GHSA-mm9x-g8pc-w292
Denial of Service in Netty
The ZlibDecoders in Netty 4.1.x before 4.1.46 allow for unbounded memory allocation while decoding a ZlibEncoded byte stream. An attacker could send a large ZlibEncoded byte stream to the Netty server, forcing the server to allocate all of its free memory to a single decoder.
{'CVE-2020-11612'}
2022-04-25T23:17:10.986343Z
2020-06-15T19:36:16Z
HIGH
null
{'CWE-770', 'CWE-119', 'CWE-400'}
{'https://lists.apache.org/thread.html/r9addb580456807cd11d6f0c6b6373b7d7161d06d2278866c30c7febb@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r7790b9d99696d9eddce8a8c96f13bb68460984294ea6fea3800143e4@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r69b23a94d4ae45394cabae012dd1f4a963996869c44c478eb1c61082@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r866288c2ada00ce148b7307cdf869f15f24302b3eb2128af33830997@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r5b1ad61552591b747cd31b3a908d5ff2e8f2a8a6847583dd6b7b1ee7@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf803b65b4a57589d79cf2e83d8ece0539018d32864f932f63c972844@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rdb69125652311d0c41f6066ff44072a3642cf33a4b5e3c4f9c1ec9c2@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r2958e4d49ee046e1e561e44fdc114a0d2285927501880f15852a9b53@%3Ccommits.druid.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.apache.org/thread.html/rf5b2dfb7401666a19915f8eaef3ba9f5c3386e2066fcd2ae66e16a2f@%3Cdev.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r7641ee788e1eb1be4bb206a7d15f8a64ec6ef23e5ec6132d5a567695@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r5030cd8ea5df1e64cf6a7b633eff145992fbca03e8bfc687cd2427ab@%3Cnotifications.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/rd302ddb501fa02c5119120e5fc21df9a1c00e221c490edbe2d7ad365@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r3ea4918d20d0c1fa26cac74cc7cda001d8990bc43473d062867ef70d@%3Cnotifications.zookeeper.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11612', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://lists.apache.org/thread.html/rff8859c0d06b1688344b39097f9685c43b461cf2bc41f60f001704e9@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/09/msg00003.html', 'https://lists.apache.org/thread.html/r88e2b91560c065ed67e62adf8f401c417e4d70256d11ea447215a70c@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r281882fdf9ea89aac02fd2f92786693a956aac2ce9840cce87c7df6b@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r9c30b7fca4baedebcb46d6e0f90071b30cc4a0e074164d50122ec5ec@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/re1ea144e91f03175d661b2d3e97c7d74b912e019613fa90419cf63f4@%3Cissues.zookeeper.apache.org%3E', 'https://github.com/netty/netty/compare/netty-4.1.45.Final...netty-4.1.46.Final', 'https://security.netapp.com/advisory/ntap-20201223-0001/', 'https://github.com/netty/netty/issues/6168', 'https://lists.apache.org/thread.html/r14446ed58208cb6d97b6faa6ebf145f1cf2c70c0886c0c133f4d3b6f@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/raaac04b7567c554786132144bea3dcb72568edd410c1e6f0101742e7@%3Cissues.flink.apache.org%3E', 'https://github.com/netty/netty/pull/9924', 'https://lists.apache.org/thread.html/r5a0b1f0b1c3bcd66f5177fbd6f6de2d0f8cae24a13ab2669f274251a@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/ra98e3a8541a09271f96478d5e22c7e3bd1afdf48641c8be25d62d9f9@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r4a7e4e23bd84ac24abf30ab5d5edf989c02b555e1eca6a2f28636692@%3Cnotifications.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r832724df393a7ef25ca4c7c2eb83ad2d6c21c74569acda5233f9f1ec@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rfd173eac20d5e5f581c8984b685c836dafea8eb2f7ff85f617704cf1@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/ref3943adbc3a8813aee0e3a9dd919bacbb27f626be030a3c6d6c7f83@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/ref2c8a0cbb3b8271e5b9a06457ba78ad2028128627186531730f50ef@%3Cnotifications.zookeeper.apache.org%3E', 'https://www.debian.org/security/2021/dsa-4885', 'https://lists.apache.org/thread.html/r7836bbdbe95c99d4d725199f0c169927d4e87ba57e4beeeb699c097a@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r255ed239e65d0596812362adc474bee96caf7ba042c7ad2f3c62cec7@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r3195127e46c87a680b5d1d3733470f83b886bfd3b890c50df718bed1@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r4f4a14d6a608db447b725ec2e96c26ac9664d83cd879aa21e2cfeb24@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf9f8bcc4ca8d2788f77455ff594468404732a4497baebe319043f4d5@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TS6VX7OMXPDJIU5LRGUAHRK6MENAVJ46/', 'https://lists.apache.org/thread.html/r31424427cc6d7db46beac481bdeed9a823fc20bb1b9deede38557f71@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r8a654f11e1172b0effbfd6f8d5b6ca651ae4ac724a976923c268a42f@%3Ccommits.druid.apache.org%3E'}
null
Maven
GHSA-r6j9-8759-g62w
Improper Restriction of XML External Entity Reference in jackson-mapper-asl
A flaw was found in org.codehaus.jackson:jackson-mapper-asl:1.9.x libraries. XML external entity vulnerabilities similar to CVE-2016-3720 also affects codehaus jackson-mapper-asl libraries but in different classes.
{'CVE-2019-10172'}
2022-03-03T05:13:44.341549Z
2020-02-04T22:39:19Z
HIGH
null
{'CWE-611'}
{'https://lists.apache.org/thread.html/r04ecadefb27cda84b699130b11b96427f1d8a7a4066d8292f7f15ed8@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r1cc8bce2cf3dfce08a64c4fa20bf38d33b56ad995cee2e382f522f83@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r634468eb3218ab02713128ff6f4818c618622b2b3de4d958138dde49@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r43c6f75d203b8afc4fbd6c3200db0384a18a11c59d085b1a9bb0ccfe@%3Cuser.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r80e8882c86c9c17a57396a5ef7c4f08878d629a0291243411be0de3a@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r25e25973e9577c62fd0221b4b52990851adf11cbe33036bd67d4b13d@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r48a32f2dd6976d33f7a12b7e09ec7ea1895f8facba82b565587c28ac@%3Ccommon-issues.hadoop.apache.org%3E', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10172', 'https://lists.apache.org/thread.html/r385c35a7c6f4acaacf37fe22922bb8e2aed9d322d0fa6dc1d45acddb@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r33d25a342af84102903cd9dec8338a5bcba3ecfce10505bdfe793b92@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r0fbf2c60967bc9f73d7f5a62ad3b955789f9a14b950f42e99fca9b4e@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r4bbfa1439d7a4e1712e260bfc3d90f7cf997abfd641cccde6432d4ab@%3Ccommits.cassandra.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/08/msg00039.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10172', 'https://lists.apache.org/thread.html/r4176155240cdc36aad7869932d9c29551742c7fa630f209fb4a8e649@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r08e1b73fabd986dcd2ddd7d09480504d1472264bed2f19b1d2002a9c@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r68acf97f4526ba59a33cc6e592261ea4f85d890f99e79c82d57dd589@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r0066c1e862613de402fee04e81cbe00bcd64b64a2711beb9a13c3b25@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/rb8c09b14fd57d855dc21e0a037dc29258c2cbe9c1966bfff453a02e4@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r5f16a1bd31a7e94ca78eda686179930781aa3a4a990cd55986703581@%3Cdev.hive.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/01/msg00037.html', 'https://lists.apache.org/thread.html/re07c51a8026c11e6e5513bfdc66d52d1c1027053e480fb8073356257@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/rce00a1c60f7df4b10e72fa87827c102f55b074bb91993631df2c21f9@%3Cdev.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rb47911c179c9f3e8ea3f134b5645e63cd20c6fc63bd0b43ab5864bd1@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r1f07e61b3ebabd3e5b4aa97bf1b26d98b793fdfa29a23dac60633f55@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r386966780034aadee69ffd82d44555117c9339545b9ce990fe490a3e@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r500867b74f42230a3d65b8aec31fc93ac390eeae737c91a759ab94cb@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/r37eb6579fa0bf94a72b6c978e2fee96f68a2b1b3ac1b1ce60aee86cf@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/rd27730cfc3066dfcf15927c8e800603728d5dedf17eee1f8c6e3507c@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r0d8c3e32a0a2d8a0b6118f5b3487d363afdda80c996d7b930097383d@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/ra37700b842790883b9082e6b281fb7596f571b13078a4856cd38f2c2@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r356592d9874ab4bc9da4754592f8aa6edc894c95e17e58484bc2af7a@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rb036bf32e4dacc49335e3bdc1be8e53d6f54df692ac8e2251a6884bd@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r21ac3570ce865b8f1e5d26e492aeb714a6aaa53a0c9a6f72ef181556@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r1edabcfacdad42d3c830464e9cf07a9a489059a7b7a8642cf055542d@%3Cissues.hive.apache.org%3E', 'https://lists.apache.org/thread.html/rd3a34d663e2a25b9ab1e8a1a94712cd5f100f098578aec79af48161e@%3Ccommon-dev.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/re646dcc2739d92117bf9a76a33c600ed3b65e8b4e9b6f441e366b72b@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/r6dea2a887f5eb1d68f124d64b14cd1a04f682f06de8cd01b7e4214e0@%3Cissues.hive.apache.org%3E'}
null
Maven
GHSA-gc79-gh4f-9g6w
Server Side Template Injection in MCMS
MCMS v5.2.5 was discovered to contain a Server Side Template Injection (SSTI) vulnerability via the Template Management module.
{'CVE-2021-46063'}
2022-03-07T20:47:47.667910Z
2022-02-19T00:01:24Z
CRITICAL
null
{'CWE-74'}
{'https://github.com/ming-soft/MCMS/issues/59', 'https://nvd.nist.gov/vuln/detail/CVE-2021-46063'}
null
Maven
GHSA-cccf-7xw3-p2vr
HTTP Request Smuggling in Undertow
A flaw was found in Undertow in versions before 2.1.1.Final, regarding the processing of invalid HTTP requests with large chunk sizes. This flaw allows an attacker to take advantage of HTTP request smuggling.
{'CVE-2020-10719'}
2022-03-03T05:13:24.949390Z
2021-04-30T17:28:33Z
MODERATE
null
{'CWE-444'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10719', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10719', 'https://security.netapp.com/advisory/ntap-20220210-0014/'}
null
Maven
GHSA-h79p-32mx-fjj9
Apache Camel Netty enables Java deserialization by default
Apache Camel Netty enables Java deserialization by default. Apache Camel 2.22.x, 2.23.x, 2.24.x, 2.25.0, 3.0.0 up to 3.1.0 are affected. 2.x users should upgrade to 2.25.1, 3.x users should upgrade to 3.2.0.
{'CVE-2020-11973'}
2022-03-03T05:14:08.438804Z
2020-05-21T21:09:04Z
HIGH
null
{'CWE-502'}
{'https://www.oracle.com/security-alerts/cpujan2021.html', 'http://www.openwall.com/lists/oss-security/2020/05/14/9', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11973', 'https://camel.apache.org/security/CVE-2020-11973.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html'}
null
Maven
GHSA-cqcf-4g4h-rghf
Cross-site scripting in Apache Archiva
In Apache Archiva before 2.2.4, it is possible to write files to the archiva server at arbitrary locations by using the artifact upload mechanism. Existing files can be overwritten, if the archiva run user has appropriate permission on the filesystem for the target file.
{'CVE-2019-0213'}
2022-03-03T05:13:26.236991Z
2019-05-14T04:00:31Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-0213', 'http://www.securityfocus.com/bid/108123', 'https://lists.apache.org/thread.html/0397ddbd17b5257cc1746b31a07294a87221c5ca24e5d19d390e28f3@%3Cusers.archiva.apache.org%3E', 'https://lists.apache.org/thread.html/7bcea134c3d6fa72cdc1052922ac0914f399f63f4690b7937b80127d@%3Cannounce.apache.org%3E', 'https://seclists.org/bugtraq/2019/Apr/47', 'https://lists.apache.org/thread.html/ada0052409d8a4a8c4eb2c7fd6b9cd9423bc753d5fce87eb826662fb@%3Cissues.archiva.apache.org%3E', 'http://archiva.apache.org/security.html#CVE-2019-0213', 'https://lists.apache.org/thread.html/c358754a35473a61477f9d487870581a0dd7054ff95974628fa09f97@%3Cusers.maven.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2019/04/30/7', 'http://packetstormsecurity.com/files/152681/Apache-Archiva-2.2.3-Cross-Site-Scripting.html'}
null
Maven
GHSA-93c4-vf86-3rj7
Reflected cross-site scripting in vaadin-menu-bar webjar resources in Vaadin 14
Missing output sanitization in test sources in `org.webjars.bowergithub.vaadin:vaadin-menu-bar` versions 1.0.0 through 1.2.0 (Vaadin 14.0.0 through 14.4.4) allows remote attackers to execute malicious JavaScript in browser by opening crafted URL.
{'CVE-2021-33611'}
2022-03-03T05:13:14.212653Z
2021-11-03T17:33:32Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-33611', 'https://github.com/vaadin/platform', 'https://github.com/vaadin/platform/security/advisories/GHSA-93c4-vf86-3rj7', 'https://github.com/vaadin/vaadin-menu-bar/pull/126', 'https://vaadin.com/security/cve-2021-33611'}
null
Maven
GHSA-v54f-xcmp-43cr
Deserialization of Untrusted Data in Apache ShardingSphere
In Apache ShardingSphere(incubator) 4.0.0-RC3 and 4.0.0, the ShardingSphere's web console uses the SnakeYAML library for parsing YAML inputs to load datasource configuration. SnakeYAML allows to unmarshal data to a Java type By using the YAML tag. Unmarshalling untrusted data can lead to security flaws of RCE.
{'CVE-2020-1947'}
2022-03-03T05:13:17.218442Z
2022-02-10T20:39:47Z
HIGH
null
{'CWE-502'}
{'https://lists.apache.org/thread.html/r4a61a24c119bd820da6fb02100d286f8aae55c8f9b94a346b9bb27d8%40%3Cdev.shardingsphere.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1947'}
null
Maven
GHSA-76f4-fw33-6j2v
Potential sensitive data exposure in applications using Vaadin 15
Insecure configuration of default `ObjectMapper` in `com.vaadin:flow-server` versions 3.0.0 through 3.0.5 (Vaadin 15.0.0 through 15.0.4) may expose sensitive data if the application also uses e.g. `@RestController` - https://vaadin.com/security/cve-2020-36319
null
2022-03-03T05:13:31.405266Z
2021-04-19T14:48:26Z
LOW
null
{'CWE-200'}
{'https://github.com/vaadin/platform/security/advisories/GHSA-76f4-fw33-6j2v', 'https://github.com/vaadin/platform', 'https://vaadin.com/security/cve-2020-36319'}
null
Maven
GHSA-2g9q-chq2-w8qw
Moderate severity vulnerability that affects org.apache.hive:hive, org.apache.hive:hive-exec, and org.apache.hive:hive-service
Apache Hive 2.1.x before 2.1.2, 2.2.x before 2.2.1, and 2.3.x before 2.3.1 expose an interface through which masking policies can be defined on tables or views, e.g., using Apache Ranger. When a view is created over a given table, the policy enforcement does not happen correctly on the table for masked columns.
{'CVE-2017-12625'}
2022-03-03T05:13:46.812145Z
2019-03-14T15:40:16Z
MODERATE
null
{'CWE-200'}
{'http://mail-archives.apache.org/mod_mbox/hive-user/201710.mbox/%3C3791103E-80D5-4E75-AF23-6F8ED54DDEBE%40apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12625', 'http://www.securityfocus.com/bid/101686', 'https://github.com/advisories/GHSA-2g9q-chq2-w8qw'}
null
Maven
GHSA-j8g6-2wh7-6439
Apache Tika allows Java code execution for serialized objects embedded in MATLAB files
Apache Tika before 1.14 allows Java code execution for serialized objects embedded in MATLAB files. The issue exists because Tika invokes JMatIO to do native deserialization.
{'CVE-2016-6809'}
2022-04-26T22:00:06.441947Z
2018-10-17T15:44:36Z
CRITICAL
null
{'CWE-502'}
{'http://seclists.org/bugtraq/2016/Nov/40', 'https://lists.apache.org/thread.html/d2375da29d89e679abf5d845db76d6f798fdc6f7d44f2c788e8a0fb9@%3Cuser.nutch.apache.org%3E', 'https://lists.apache.org/thread.html/rfd3646bb724b66b1a9ddef69e692da2b7a727a8799551c78eedf0a0f@%3Cissues.lucene.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2016-6809', 'https://github.com/advisories/GHSA-j8g6-2wh7-6439', 'https://dist.apache.org/repos/dist/release/tika/CHANGES-1.14.txt', 'https://lists.apache.org/thread.html/r2f6f6c130b12b7332f323f74d031072b1517065ce28a22346791ffb6@%3Cissues.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/e414754a6c57ce7194b731e211cd6b2cbb41f2c7000e3fb9c6b6ec78@%3Cdev.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/91eb639ef619b9a26b40020ca6732e7dbe457f7322ed5f1df49e411a@%3Cdev.nutch.apache.org%3E', 'http://www.securityfocus.com/bid/94247'}
null
Maven
GHSA-3gp6-hhfw-4gqx
Padding oracle attacks
It was found that all OWASP ESAPI for Java up to version 2.0 RC2 are vulnerable to padding oracle attacks.
{'CVE-2010-3300'}
2021-06-28T19:05:25Z
2021-08-13T15:22:24Z
MODERATE
null
{'CWE-649'}
{'https://seclists.org/oss-sec/2010/q3/357', 'https://www.usenix.org/legacy/events/woot10/tech/full_papers/Rizzo.pdf', 'https://nvd.nist.gov/vuln/detail/CVE-2010-3300'}
null
Maven
GHSA-9x2h-hvg6-4r5p
Improper Authentication in Apache Zeppelin
In Apache Zeppelin prior to 0.8.0 the cron scheduler was enabled by default and could allow users to run paragraphs as other users without authentication.
{'CVE-2018-1317'}
2022-03-03T05:13:34.081370Z
2019-04-24T16:06:52Z
HIGH
null
{'CWE-287'}
{'https://lists.apache.org/thread.html/ff6b995a5a3ba8db4d6b14b4d9dd487e7bf2e3bdd5b375b64a25fd06@%3Cusers.zeppelin.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2019/04/23/1', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1317', 'https://zeppelin.apache.org/releases/zeppelin-release-0.8.0.html'}
null
Maven
GHSA-p435-w4xm-jj8x
Hadoop token in temp file visible to all users in Apache Gobblin
In Apache Gobblin, the Hadoop token is written to a temp file that is visible to all local users on Unix-like systems. This affects versions <= 0.15.0. Users should update to version 0.16.0 which addresses this issue.
{'CVE-2021-36151'}
2022-03-03T05:13:25.092868Z
2022-02-06T00:01:07Z
MODERATE
null
{'CWE-200'}
{'https://lists.apache.org/thread/3cdkyxdd6xk05lsvr3l66dsnvhwyo1t0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36151'}
null
Maven
GHSA-75vw-3m5v-fprh
corenlp is vulnerable to Improper Restriction of XML External Entity Reference
corenlp is vulnerable to Improper Restriction of XML External Entity Reference
{'CVE-2022-0239'}
2022-03-03T05:12:48.961183Z
2022-01-21T23:43:11Z
CRITICAL
null
{'CWE-611'}
{'https://huntr.dev/bounties/a717aec2-5646-4a5f-ade0-dadc25736ae3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0239', 'https://github.com/stanfordnlp/corenlp/commit/1940ffb938dc4f3f5bc5f2a2fd8b35aabbbae3dd', 'https://github.com/stanfordnlp/corenlp'}
null
Maven
GHSA-9r24-gp44-h3pm
High severity vulnerability that affects org.apache.tika:tika-core
From Apache Tika versions 1.7 to 1.17, clients could send carefully crafted headers to tika-server that could be used to inject commands into the command line of the server running tika-server. This vulnerability only affects those running tika-server on a server that is open to untrusted clients. The mitigation is to upgrade to Tika 1.18.
{'CVE-2018-1335'}
2022-03-03T05:13:12.541167Z
2018-10-17T15:43:43Z
HIGH
null
null
{'https://access.redhat.com/errata/RHSA-2019:3140', 'http://www.securityfocus.com/bid/104001', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1335', 'https://github.com/advisories/GHSA-9r24-gp44-h3pm', 'https://www.exploit-db.com/exploits/46540/', 'http://packetstormsecurity.com/files/153864/Apache-Tika-1.17-Header-Command-Injection.html', 'https://lists.apache.org/thread.html/b3ed4432380af767effd4c6f27665cc7b2686acccbefeb9f55851dca@%3Cdev.tika.apache.org%3E'}
null
Maven
GHSA-grg4-wf29-r9vv
Bzip2Decoder doesn't allow setting size restrictions for decompressed data
### Impact The Bzip2 decompression decoder function doesn't allow setting size restrictions on the decompressed output data (which affects the allocation size used during decompression). All users of Bzip2Decoder are affected. The malicious input can trigger an OOME and so a DoS attack ### Workarounds No workarounds other than not using the `Bzip2Decoder` ### References Relevant code areas: https://github.com/netty/netty/blob/netty-4.1.67.Final/codec/src/main/java/io/netty/handler/codec/compression/Bzip2Decoder.java#L80 https://github.com/netty/netty/blob/netty-4.1.67.Final/codec/src/main/java/io/netty/handler/codec/compression/Bzip2Decoder.java#L294 https://github.com/netty/netty/blob/netty-4.1.67.Final/codec/src/main/java/io/netty/handler/codec/compression/Bzip2Decoder.java#L305
{'CVE-2021-37136'}
2022-04-22T15:47:10.605187Z
2021-09-09T17:11:21Z
HIGH
null
{'CWE-400'}
{'https://github.com/netty/netty', 'https://lists.apache.org/thread.html/rfb2bf8597e53364ccab212fbcbb2a4e9f0a9e1429b1dc08023c6868e@%3Cdev.tinkerpop.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://security.netapp.com/advisory/ntap-20220210-0012/', 'https://lists.apache.org/thread.html/r5406eaf3b07577d233b9f07cfc8f26e28369e6bab5edfcab41f28abb@%3Ccommits.druid.apache.org%3E', 'https://github.com/netty/netty/commit/41d3d61a61608f2223bb364955ab2045dd5e4020', 'https://github.com/netty/netty/blob/4.1/codec/src/main/java/io/netty/handler/codec/compression/Bzip2Decoder.java#L80', 'https://lists.apache.org/thread.html/r5e05eba32476c580412f9fbdfc9b8782d5b40558018ac4ac07192a04@%3Ccommits.druid.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37136', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/rd262f59b1586a108e320e5c966feeafbb1b8cdc96965debc7cc10b16@%3Ccommits.druid.apache.org%3E', 'https://github.com/netty/netty/blob/4.1/codec/src/main/java/io/netty/handler/codec/compression/Bzip2Decoder.java#L305', 'https://github.com/netty/netty/security/advisories/GHSA-grg4-wf29-r9vv', 'https://github.com/netty/netty/blob/4.1/codec/src/main/java/io/netty/handler/codec/compression/Bzip2Decoder.java#L294', 'https://lists.apache.org/thread.html/r06a145c9bd41a7344da242cef07977b24abe3349161ede948e30913d@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0@%3Ccommits.druid.apache.org%3E'}
null
Maven
GHSA-hrmr-f5m6-m9pq
Moderate severity vulnerability that affects org.apache.commons:commons-compress
When reading a specially crafted ZIP archive, the read method of Apache Commons Compress 1.7 to 1.17's ZipArchiveInputStream can fail to return the correct EOF indication after the end of the stream has been reached. When combined with a java.io.InputStreamReader this can lead to an infinite stream, which can be used to mount a denial of service attack against services that use Compress' zip package.
{'CVE-2018-11771'}
2022-04-25T20:32:06.845258Z
2018-10-19T16:41:27Z
MODERATE
null
{'CWE-835'}
{'https://lists.apache.org/thread.html/6c79965066c30d4e330e04d911d3761db41b82c89ae38d9a6b37a6f1@%3Cdev.tinkerpop.apache.org%3E', 'http://www.securitytracker.com/id/1041503', 'http://www.securityfocus.com/bid/105139', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/0adb631517766e793e18a59723e2df08ced41eb9a57478f14781c9f7@%3Cdev.tinkerpop.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11771', 'https://lists.apache.org/thread.html/b8da751fc0ca949534cdf2744111da6bb0349d2798fac94b0a50f330@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/b8ef29df0f1d55aa741170748352ae8e425c7b1d286b2f257711a2dd@%3Cdev.creadur.apache.org%3E', 'https://lists.apache.org/thread.html/f9cdd32af7d73e943452167d15801db39e8130409ebb9efb243b3f41@%3Ccommits.tinkerpop.apache.org%3E', 'https://lists.apache.org/thread.html/b907e70bc422905d7962fd18f863f746bf7b4e7ed9da25c148580c61@%3Cnotifications.commons.apache.org%3E', 'https://lists.apache.org/thread.html/eeecc1669242b28a3777ae13c68b376b0148d589d3d8170340d61120@%3Cdev.tinkerpop.apache.org%3E', 'https://lists.apache.org/thread.html/35f60d6d0407c13c39411038ba1aca71d92595ed7041beff4d07f2ee@%3Ccommits.tinkerpop.apache.org%3E', 'https://lists.apache.org/thread.html/c7954dc1e8fafd7ca1449f078953b419ebf8936e087f235f3bd024be@%3Ccommits.tinkerpop.apache.org%3E', 'https://lists.apache.org/thread.html/f28052d04cb8dbaae39bfd3dc8438e58c2a8be306a3f381f4728d7c1@%3Ccommits.commons.apache.org%3E', 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/714c6ac1b1b50f8557e7342903ef45f1538a7bc60a0b47d6e48c273d@%3Ccommits.tinkerpop.apache.org%3E', 'https://lists.apache.org/thread.html/3565494c263dfeb4dcb2a71cb24d09a1ca285cd6ac74edc025a3af8a@%3Ccommits.tinkerpop.apache.org%3E', 'https://lists.apache.org/thread.html/e3eae9e6fc021c4c22dda59a335d21c12eecab480b48115a2f098ef6@%3Ccommits.tinkerpop.apache.org%3E'}
null
Maven
GHSA-fmj2-7wx8-qj4v
Server-side request forgery (SSRF) in Apache XmlGraphics Commons
Apache XmlGraphics Commons 2.4 is vulnerable to server-side request forgery, caused by improper input validation by the XMPParser. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.
{'CVE-2020-11988'}
2022-03-03T05:14:07.493019Z
2022-02-09T00:45:56Z
HIGH
null
{'CWE-20', 'CWE-918'}
{'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.apache.org/thread.html/r2877ae10e8be56a3c52d03e373512ddd32f16b863f24c2e22f5a5ba2@%3Cdev.poi.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JP4XA56DA3BFNRBBLBXM6ZAI5RUVFA33/', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22HESSYU7T4D6GGENUVEX3X3H6FGBECH/', 'https://lists.apache.org/thread.html/ra8f4d6ae402ec020ee3e8c28632c91be131c4d8b4c9c6756a179b12b@%3Cdev.jmeter.apache.org%3E', 'https://issues.apache.org/jira/browse/XGC-122', 'https://lists.apache.org/thread.html/r588d05a0790b40a0eb81088252e1e8c1efb99706631421f17038eb05@%3Cdev.poi.apache.org%3E', 'https://github.com/apache/xmlgraphics-commons/commit/57393912eb87b994c7fed39ddf30fb778a275183', 'https://xmlgraphics.apache.org/security.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11988', 'https://github.com/apache/xmlgraphics-commons/'}
null
Maven
GHSA-4pc7-vqv5-5r3v
ECP SAML binding bypasses authentication flows
### Description A flaw was found in keycloak, where the default ECP binding flow allows other authentication flows to be bypassed. By exploiting this behavior, an attacker can bypass the MFA authentication by sending a SOAP request with an AuthnRequest and Authorization header with the user's credentials. The highest threat from this vulnerability is to confidentiality and integrity.
{'CVE-2021-3827'}
2022-04-27T21:32:00.582721Z
2022-04-27T21:25:59Z
MODERATE
null
null
{'https://github.com/keycloak/keycloak/security/advisories/GHSA-4pc7-vqv5-5r3v', 'https://github.com/keycloak/keycloak'}
null
Maven
GHSA-h39x-m55c-v55h
Eclipse Vert.x does not properly neutralize '' (forward slashes) sequences that can resolve to an external location
In version from 3.0.0 to 3.5.3 of Eclipse Vert.x, the StaticHandler uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '\' (forward slashes) sequences that can resolve to a location that is outside of that directory when running on Windows Operating Systems.
{'CVE-2018-12542'}
2022-04-26T22:00:17.148461Z
2018-10-17T16:20:45Z
CRITICAL
null
{'CWE-22'}
{'https://github.com/vert-x3/vertx-web/issues/1025', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=539171', 'https://github.com/vert-x3/vertx-web', 'https://nvd.nist.gov/vuln/detail/CVE-2018-12542', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://github.com/advisories/GHSA-h39x-m55c-v55h'}
null
Maven
GHSA-29qj-rvv6-qrmv
Cross-site scripting in RESTEasy
A cross-site scripting (XSS) flaw was found in RESTEasy in versions before 3.11.1.Final and before 4.5.3.Final, where it did not properly handle URL encoding when the RESTEASY003870 exception occurs. An attacker could use this flaw to launch a reflected XSS attack.
{'CVE-2020-10688'}
2022-03-03T05:13:11.102357Z
2021-06-15T16:05:22Z
MODERATE
null
{'CWE-79'}
{'https://issues.redhat.com/browse/RESTEASY-2519', 'https://bugzilla.redhat.com/show_bug.cgi?id=1814974', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10688', 'https://github.com/quarkusio/quarkus/issues/7248'}
null
Maven
GHSA-xgc9-9w4v-h33h
High severity vulnerability that affects org.apache.syncope:syncope-core
An administrator with report and template entitlements in Apache Syncope 1.2.x before 1.2.11 and 2.0.x before 2.0.8 can use XSL Transformations (XSLT) to perform malicious operations, including but not limited to file read, file write, and code execution.
{'CVE-2018-1321'}
2022-03-03T05:12:33.760197Z
2018-11-06T23:17:27Z
HIGH
null
{'CWE-20'}
{'http://syncope.apache.org/security.html#CVE-2018-1321:_Remote_code_execution_by_administrators_with_report_and_template_entitlements', 'https://www.exploit-db.com/exploits/45400/', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1321', 'http://www.securityfocus.com/bid/103508', 'https://github.com/advisories/GHSA-xgc9-9w4v-h33h'}
null
Maven
GHSA-f6vf-pq8c-69m4
Improper Check for Unusual or Exceptional Conditions in Connect2id Nimbus JOSE+JWT
Connect2id Nimbus JOSE+JWT before v7.9 can throw various uncaught exceptions while parsing a JWT, which could result in an application crash (potential information disclosure) or a potential authentication bypass.
{'CVE-2019-17195'}
2022-04-22T17:30:33.673642Z
2019-10-16T18:31:17Z
CRITICAL
null
{'CWE-755', 'CWE-754'}
{'https://lists.apache.org/thread.html/r5e08837e695efd36be73510ce58ec05785dbcea077819d8acc2d990d@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r35f6301a3e6a56259224786dd9c2a935ba27ff6b494d15a3b66efe6a@%3Cdev.avro.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17195', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://bitbucket.org/connect2id/nimbus-jose-jwt/src/master/SECURITY-CHANGELOG.txt', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r2667286c8ceffaf893b16829b9612d8f7c4ee6b30362c6c1b583e3c2@%3Ccommits.druid.apache.org%3E', 'https://connect2id.com/blog/nimbus-jose-jwt-7-9', 'https://lists.apache.org/thread.html/8768553cda5838f59ee3865cac546e824fa740e82d9dc2a7fc44e80d@%3Ccommon-dev.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/r33dc233634aedb04fa77db3eb79ea12d15ca4da89fa46a1c585ecb0b@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rcac26c2d4df22341fa6ebbfe93ba1eff77d2dcd3f6106a1dc1f9ac98@%3Cdev.avro.apache.org%3E', 'https://bitbucket.org/connect2id/nimbus-jose-jwt', 'https://lists.apache.org/thread.html/e10d43984f39327e443e875adcd4a5049193a7c010e81971908caf41@%3Ccommon-issues.hadoop.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html'}
null
Maven
GHSA-hxvf-35w8-f5mw
Cross-Site Request Forgery in Magnolia CMS
An issue in the Login page of Magnolia CMS v6.2.3 and below allows attackers to exploit both an Open Redirect vulnerability and Cross-Site Request Forgery (CSRF) in order to brute force and exfiltrate users' credentials.
{'CVE-2021-46366'}
2022-02-24T13:18:02Z
2022-02-12T00:00:37Z
HIGH
null
{'CWE-352'}
{'https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-46366-CSRF%2BOpen%20Redirect-Magnolia%20CMS', 'https://nvd.nist.gov/vuln/detail/CVE-2021-46366', 'https://docs.magnolia-cms.com/product-docs/6.2/Releases/Release-notes-for-Magnolia-CMS-6.2.4.html#_security_advisory'}
null
Maven
GHSA-rrvx-pwf8-p59p
In Bouncy Castle JCE Provider the DSA key pair generator generates a weak private key if used with default values
In the Bouncy Castle JCE Provider version 1.55 and earlier the DSA key pair generator generates a weak private key if used with default values. If the JCA key pair generator is not explicitly initialised with DSA parameters, 1.55 and earlier generates a private value assuming a 1024 bit key size. In earlier releases this can be dealt with by explicitly passing parameters to the key pair generator.
{'CVE-2016-1000343'}
2022-04-27T13:30:10.946799Z
2018-10-17T16:24:22Z
HIGH
null
null
{'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html', 'https://security.netapp.com/advisory/ntap-20181127-0004/', 'https://github.com/bcgit/bc-java', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://usn.ubuntu.com/3727-1/', 'https://access.redhat.com/errata/RHSA-2018:2927', 'https://github.com/bcgit/bc-java/commit/50a53068c094d6cff37659da33c9b4505becd389#diff-5578e61500abb2b87b300d3114bdfd7d', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://github.com/advisories/GHSA-rrvx-pwf8-p59p', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000343'}
null
Maven
GHSA-72j4-94rx-cr6w
Incorrect Permission Assignment for Critical Resource and Permissive List of Allowed Inputs in Keycloak
A flaw was found in all versions of Keycloak before 10.0.0, where the NodeJS adapter did not support the verify-token-audience. This flaw results in some users having access to sensitive information outside of their permissions.
{'CVE-2020-1694'}
2022-03-03T05:12:16.824866Z
2022-02-09T00:57:02Z
MODERATE
null
{'CWE-183', 'CWE-732'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-1694', 'https://bugzilla.redhat.com/show_bug.cgi?id=1790759'}
null
Maven
GHSA-76qr-mmh8-cp8f
Moderate severity vulnerability that affects com.sparkjava:spark-core
In Spark before 2.7.2, a remote attacker can read unintended static files via various representations of absolute or relative pathnames, as demonstrated by file: URLs and directory traversal sequences. NOTE: this product is unrelated to Ignite Realtime Spark.
{'CVE-2018-9159'}
2022-03-03T05:14:12.096573Z
2018-10-19T16:56:00Z
MODERATE
null
{'CWE-22'}
{'https://github.com/perwendel/spark/issues/981', 'https://github.com/perwendel/spark/commit/030e9d00125cbd1ad759668f85488aba1019c668', 'https://nvd.nist.gov/vuln/detail/CVE-2018-9159', 'https://access.redhat.com/errata/RHSA-2018:2405', 'https://access.redhat.com/errata/RHSA-2018:2020', 'https://github.com/advisories/GHSA-76qr-mmh8-cp8f', 'https://github.com/perwendel/spark/commit/ce9e11517eca69e58ed4378d1e47a02bd06863cc', 'https://github.com/perwendel/spark', 'https://github.com/perwendel/spark/commit/a221a864db28eb736d36041df2fa6eb8839fc5cd', 'http://sparkjava.com/news#spark-272-released'}
null
Maven
GHSA-qh2g-7h5p-mxf4
Credentials bypass in Apache Druid
When LDAP authentication is enabled in Apache Druid 0.17.0, callers of Druid APIs with a valid set of LDAP credentials can bypass the credentialsValidator.userSearch filter barrier that determines if a valid LDAP user is allowed to authenticate with Druid. They are still subject to role-based authorization checks, if configured. Callers of Druid APIs can also retrieve any LDAP attribute values of users that exist on the LDAP server, so long as that information is visible to the Druid server. This information disclosure does not require the caller itself to be a valid LDAP user.
{'CVE-2020-1958'}
2021-04-05T21:49:45Z
2022-02-09T22:05:39Z
MODERATE
null
{'CWE-200', 'CWE-74'}
{'https://lists.apache.org/thread.html/r47c90a378efdb3fd07ff7f74095b8eb63b3ca93b8ada5c2661c5e371@%3Ccommits.druid.apache.org%3E', 'https://github.com/apache/druid/commit/dbaabdd24710fef726c5730c609937706f456a44#diff-fab6b7a8a160a405e787690201aade5462961550c97715ab18de6ad07a3edf7e', 'https://lists.apache.org/thread.html/r9d437371793b410f8a8e18f556d52d4bb68e18c537962f6a97f4945e%40%3Cdev.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r1526dbce98a138629a41daa06c13393146ddcaf8f9d273cc49d57681@%3Ccommits.druid.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1958', 'https://lists.apache.org/thread.html/r75e74d39c41c1b95a658b6a9f75fc6fd02b1d1922566a0ee4ee2fdfc@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rffabc9e83cc2831bbee5db32b3965b84b09346a26ebc1012db63d28c@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r026540c617d334007810cd8f0068f617b5c78444be00a31fc1b03390@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r1c32c95543d44559b8d7fd89b0a85f728c80e8b715685bbf788a15a4@%3Ccommits.druid.apache.org%3E', 'https://github.com/apache/druid/pull/9600#issuecomment-607497875', 'https://lists.apache.org/thread.html/rf70876ecafb45b314eff9d040c5281c4adb0cb7771eb029448cfb79b@%3Cannounce.apache.org%3E'}
null
Maven
GHSA-qjw2-hr98-qgfh
Unsafe Deserialization in jackson-databind
FasterXML jackson-databind 2.x before 2.6.7.5 and from 2.7.x before 2.9.10.6 mishandles the interaction between serialization gadgets and typing, related to com.pastdev.httpcomponents.configuration.JndiConfiguration.
{'CVE-2020-24750'}
2022-04-26T21:00:22.723871Z
2021-12-09T19:15:36Z
HIGH
null
{'CWE-502'}
{'https://github.com/FasterXML/jackson-databind/commit/2118e71325486c68f089a9761c9d8a11b4ddd1cb', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://security.netapp.com/advisory/ntap-20201009-0003/', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://github.com/FasterXML/jackson-databind', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/FasterXML/jackson-databind/issues/2798', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/FasterXML/jackson-databind/commit/ad5a630174f08d279504bc51ebba8772fd71b86b', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-24750'}
null
Maven
GHSA-xgjc-49cw-529m
Moderate severity vulnerability that affects org.b3log:symphony
An issue was discovered in b3log Symphony (aka Sym) before v3.4.7. XSS exists via the userIntro and userNickname fields to processor/SettingsProcessor.java.
{'CVE-2019-9142'}
2021-09-21T22:32:33Z
2019-03-06T17:35:49Z
MODERATE
null
{'CWE-79'}
{'https://github.com/b3log/symphony', 'https://github.com/b3log/symphony/issues/860', 'https://github.com/advisories/GHSA-xgjc-49cw-529m', 'https://nvd.nist.gov/vuln/detail/CVE-2019-9142'}
null
Maven
GHSA-pr5m-4w22-8483
XXS in NanoHTTPD
An issue was discovered in RouterNanoHTTPD.java in NanoHTTPD through 2.3.1. The GeneralHandler class implements a basic GET handler that prints debug information as an HTML page. Any web server that extends this class without implementing its own GET handler is vulnerable to reflected XSS, because the GeneralHandler GET handler prints user input passed through the query string without any sanitization.
{'CVE-2020-13697'}
2022-03-03T05:13:50.186435Z
2021-02-25T16:32:34Z
MODERATE
null
{'CWE-79'}
{'https://github.com/NanoHttpd/nanohttpd', 'https://www.vdoo.com/advisories/#CVE-2020-13697', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13697'}
null
Maven
GHSA-33xh-xch9-p6hj
Incorrect Authorization in Apache Ozone
In Apache Ozone versions prior to 1.2.0, Container related Datanode requests of Ozone Datanode were not properly authorized and can be called by any client.
{'CVE-2021-39233'}
2021-11-22T18:36:47Z
2021-11-23T18:17:59Z
CRITICAL
null
{'CWE-863'}
{'https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C394a9a73-44dd-b5db-84d8-607c3226eb00%40apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39233', 'http://www.openwall.com/lists/oss-security/2021/11/19/4'}
null
Maven
GHSA-8h56-v53h-5hhj
Remote Code Execution - JavaEL Injection (low privileged accounts) in Nexus Repository Manager
Sonatype Nexus Repository before 3.21.2 allows Remote Code Execution.
{'CVE-2020-10204'}
2022-03-03T05:13:09.628310Z
2020-04-14T15:27:14Z
HIGH
null
{'CWE-20'}
{'https://securitylab.github.com/advisories/GHSL-2020-011-nxrm-sonatype', 'https://securitylab.github.com/advisories/GHSL-2020-012-nxrm-sonatype', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10204', 'https://support.sonatype.com/hc/en-us/articles/360044356194', 'https://support.sonatype.com/hc/en-us/articles/360044882533'}
null
Maven
GHSA-wc6f-cjcp-cc33
Improper Certificate Validation in Apache IoTDB
An issue was found in Apache IoTDB .9.0 to 0.9.1 and 0.8.0 to 0.8.2. When starting IoTDB, the JMX port 31999 is exposed with no certification.Then, clients could execute code remotely.
{'CVE-2020-1952'}
2022-03-03T05:12:48.566149Z
2022-01-06T19:45:30Z
HIGH
null
{'CWE-295'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-1952', 'https://lists.apache.org/thread.html/r3d2ff899ead64d2952fdc1fbb1f520ca42011ed2b4c7f786e921f6b9%40%3Cdev.iotdb.apache.org%3E'}
null
Maven
GHSA-g8jj-899q-8x3j
Cross-site scripting in json-sanitizer
OWASP json-sanitizer before 1.2.1 allows XSS. An attacker who controls a substring of the input JSON, and controls another substring adjacent to a SCRIPT element in which the output is embedded as JavaScript, may be able to confuse the HTML parser as to where the SCRIPT element ends, and cause non-script content to be interpreted as JavaScript.
{'CVE-2020-13973'}
2022-03-03T05:13:19.979647Z
2022-02-10T23:04:13Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-13973', 'https://github.com/OWASP/json-sanitizer/pull/20'}
null
Maven
GHSA-cfqj-9g2g-w7q6
Cross-site Scripting in Apache JSPWiki
A carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to the Denounce plugin, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.11.0 or later.
{'CVE-2021-40369'}
2022-03-03T05:14:11.870150Z
2021-12-02T17:49:14Z
MODERATE
null
{'CWE-79'}
{'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2021-40369', 'https://github.com/apache/jspwiki', 'https://lists.apache.org/thread/r2j00nrnpjgcmoxvlv3pgfoq9kzrcsfh', 'https://nvd.nist.gov/vuln/detail/CVE-2021-40369'}
null
Maven
GHSA-gq67-pp9w-43gp
Cryptographically weak CSRF tokens in Apache MyFaces
In the default configuration, Apache MyFaces Core versions 2.2.0 to 2.2.13, 2.3.0 to 2.3.7, 2.3-next-M1 to 2.3-next-M4, and 3.0.0-RC1 use cryptographically weak implicit and explicit cross-site request forgery (CSRF) tokens. Due to that limitation, it is possible (although difficult) for an attacker to calculate a future CSRF token value and to use that value to trick a user into executing unwanted actions on an application. Mitigation: Existing web.xml configuration parameters can be used to direct MyFaces to use SecureRandom for CSRF token generation: org.apache.myfaces.RANDOM_KEY_IN_VIEW_STATE_SESSION_TOKEN=secureRandom org.apache.myfaces.RANDOM_KEY_IN_CSRF_SESSION_TOKEN=secureRandom org.apache.myfaces.RANDOM_KEY_IN_WEBSOCKET_SESSION_TOKEN=secureRandom
{'CVE-2021-26296'}
2022-03-03T05:12:05.891893Z
2021-06-16T17:31:39Z
HIGH
null
{'CWE-330', 'CWE-352'}
{'https://security.netapp.com/advisory/ntap-20210528-0007/', 'http://packetstormsecurity.com/files/161484/Apache-MyFaces-2.x-Cross-Site-Request-Forgery.html', 'http://seclists.org/fulldisclosure/2021/Feb/66', 'https://issues.apache.org/jira/browse/MYFACES-4373', 'https://lists.apache.org/thread.html/r2b73e2356c6155e9ec78fdd8f72a4fac12f3e588014f5f535106ed9b%40%3Cannounce.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26296', 'https://github.com/apache/myfaces/commit/cc6e1cc7b9aa17e52452f7f2657b3af9c421b2b2'}
null
Maven
GHSA-8c4j-34r4-xr8g
Unsafe Deserialization in jackson-databind
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.cpdsadapter.DriverAdapterCPDS.
{'CVE-2020-36180'}
2022-04-22T18:30:38.878774Z
2021-12-09T19:16:18Z
HIGH
null
{'CWE-502'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-36180', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/FasterXML/jackson-databind', 'https://security.netapp.com/advisory/ntap-20210205-0005/', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://github.com/FasterXML/jackson-databind/issues/3004', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}
null
Maven
GHSA-xqfj-vm6h-2x34
Improper Handling of Length Parameter Inconsistency in Compress
When reading a specially crafted TAR archive, Compress can be made to allocate large amounts of memory that finally leads to an out of memory error even for very small inputs. This could be used to mount a denial of service attack against services that use Compress' tar package.
{'CVE-2021-35517'}
2022-04-22T16:02:00.162972Z
2021-08-02T16:55:39Z
HIGH
null
{'CWE-770', 'CWE-130'}
{'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/racd0c0381c8404f298b226cd9db2eaae965b14c9c568224aa3f437ae@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/rfba19167efc785ad3561e7ef29f340d65ac8f0d897aed00e0731e742@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/rd4332baaf6debd03d60deb7ec93bee49e5fdbe958cb6800dff7fb00e@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/r605d906b710b95f1bbe0036a53ac6968f667f2c249b6fbabada9a940%40%3Cuser.commons.apache.org%3E', 'https://lists.apache.org/thread.html/rb064d705fdfa44b5dae4c366b369ef6597951083196321773b983e71@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/rba65ed5ddb0586f5b12598f55ec7db3633e7b7fede60466367fbf86a@%3Cnotifications.skywalking.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/07/13/3', 'http://www.openwall.com/lists/oss-security/2021/07/13/5', 'https://lists.apache.org/thread.html/r67ef3c07fe3b8c1b02d48012149d280ad6da8e4cec253b527520fb2b@%3Cdev.poi.apache.org%3E', 'https://lists.apache.org/thread.html/rb6e1fa80d34e5ada45f72655d84bfd90db0ca44ef19236a49198c88c@%3Cnotifications.skywalking.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-35517', 'https://lists.apache.org/thread.html/r9f54c0caa462267e0cc68b49f141e91432b36b23348d18c65bd0d040@%3Cnotifications.skywalking.apache.org%3E', 'https://lists.apache.org/thread.html/ra393ffdc7c90a4a37ea023946f390285693795013a642d80fba20203@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/r54afdab05e01de970649c2d91a993f68a6b00cd73e6e34e16c832d46@%3Cuser.ant.apache.org%3E', 'https://lists.apache.org/thread.html/r31f75743ac173b0a606f8ea6ea53f351f386c44e7bcf78ae04007c29@%3Cissues.flink.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://security.netapp.com/advisory/ntap-20211022-0001/', 'https://lists.apache.org/thread.html/r457b2ed564860996b20d938566fe8bd4bfb7c37be8e205448ccb5975@%3Cannounce.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/rb7adf3e55359819e77230b4586521e5c6874ce5ed93384bdc14d6aee@%3Cnotifications.skywalking.apache.org%3E', 'https://commons.apache.org/proper/commons-compress/security-reports.html'}
null
Maven
GHSA-4w2q-9hp2-vxj5
Path Traversal in Caucho Resin
There is a Directory traversal vulnerability in Caucho Resin, as distributed in Resin 4.0.52 - 4.0.56, which allows remote attackers to read files in arbitrary directories via a ; in a pathname within an HTTP request.
{'CVE-2021-44138'}
2022-04-22T20:30:29.043628Z
2022-04-05T00:00:28Z
HIGH
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-44138', 'https://github.com/maybe-why-not/reponame/issues/2'}
null
Maven
GHSA-w6gv-3r3v-gwgj
Moderate severity vulnerability that affects org.keycloak:keycloak-core
Red Hat Keycloak before version 2.5.1 has an implementation of HMAC verification for JWS tokens that uses a method that runs in non-constant time, potentially leaving the application vulnerable to timing attacks.
{'CVE-2017-2585'}
2022-03-03T05:13:00.742398Z
2018-10-18T16:47:41Z
MODERATE
null
{'CWE-200'}
{'http://www.securityfocus.com/bid/97393', 'http://rhn.redhat.com/errata/RHSA-2017-0876.html', 'https://access.redhat.com/errata/RHSA-2017:0873', 'https://nvd.nist.gov/vuln/detail/CVE-2017-2585', 'https://access.redhat.com/errata/RHSA-2017:0872', 'http://www.securitytracker.com/id/1038180', 'https://github.com/advisories/GHSA-w6gv-3r3v-gwgj', 'https://bugzilla.redhat.com/show_bug.cgi?id=1412376'}
null
Maven
GHSA-v84g-cf5j-xjqx
Path Traversal in Apache James Server
Apache James Server prior to version 3.6.2 contains a path traversal vulnerability. The fix for CVE-2021-40525 does not prepend delimiters upon valid directory validations. Affected implementations include: - maildir mailbox store - Sieve file repository This enables a user to access other users data stores (limited to user names being prefixed by the value of the username being used).
{'CVE-2022-22931'}
2022-03-03T05:13:36.937321Z
2022-02-08T00:00:34Z
MODERATE
null
{'CWE-22'}
{'https://lists.apache.org/thread/bp8yql4wws56jlh0vxoowj7foothsmpr', 'https://github.com/apache/james-project/pull/877', 'https://github.com/apache/james-project/pull/877/commits/b1e891a9e5eeadfa1d779ae50f21c73efe4d2fc7', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22931', 'https://www.openwall.com/lists/oss-security/2022/02/07/1', 'https://github.com/apache/james-project'}
null
Maven
GHSA-2x7v-w2mv-f3rx
Improper Authentication in Atlassian Connect Spring Boot
Broken Authentication in Atlassian Connect Spring Boot (ACSB) in version 1.1.0 before 2.1.3 and from version 2.1.4 before 2.1.5: Atlassian Connect Spring Boot is a Java Spring Boot package for building Atlassian Connect apps. Authentication between Atlassian products and the Atlassian Connect Spring Boot app occurs with a server-to-server JWT or a context JWT. Atlassian Connect Spring Boot versions 1.1.0 before 2.1.3 and versions 2.1.4 before 2.1.5 erroneously accept context JWTs in lifecycle endpoints (such as installation) where only server-to-server JWTs should be accepted, permitting an attacker to send authenticated re-installation events to an app.
{'CVE-2021-26077'}
2022-03-03T05:13:23.539175Z
2021-06-16T17:23:12Z
HIGH
null
{'CWE-287'}
{'https://community.developer.atlassian.com/t/action-required-atlassian-connect-vulnerability-allows-bypass-of-app-qsh-verification-via-context-jwts/47072', 'https://confluence.atlassian.com/pages/viewpage.action?pageId=1063555147', 'https://nvd.nist.gov/vuln/detail/CVE-2021-26077'}
null
Maven
GHSA-v569-g72v-q434
Low severity vulnerability that affects org.apache.hadoop:hadoop-main
In Apache Hadoop 3.0.0-alpha1 to 3.0.0, 2.9.0, 2.8.0 to 2.8.3, and 2.5.0 to 2.7.5, HDFS exposes extended attribute key/value pairs during listXAttrs, verifying only path-level search access to the directory rather than path-level read permission to the referent.
{'CVE-2018-1296'}
2022-03-03T05:13:09.939417Z
2019-02-12T17:26:12Z
HIGH
null
{'CWE-200'}
{'http://www.securityfocus.com/bid/106764', 'https://lists.apache.org/thread.html/a5b15bc76fbdad2ee40761aacf954a13aeef67e305f86d483f267e8e@%3Cuser.hadoop.apache.org%3E', 'https://github.com/advisories/GHSA-v569-g72v-q434', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1296'}
null
Maven
GHSA-hvpr-9cr6-q5v7
High severity vulnerability that affects org.apache.camel:camel-snakeyaml
Apache Camel's camel-snakeyaml component is vulnerable to Java object de-serialization vulnerability. De-serializing untrusted data can lead to security flaws.
{'CVE-2017-3159'}
2022-03-03T05:13:44.515347Z
2018-10-16T17:21:42Z
HIGH
null
{'CWE-502'}
{'https://www.github.com/mbechler/marshalsec', 'https://github.com/advisories/GHSA-hvpr-9cr6-q5v7', 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E', 'http://www.securityfocus.com/bid/96321', 'https://www.github.com/mbechler/marshalsec/blob/master/marshalsec.pdf?raw=true', 'https://nvd.nist.gov/vuln/detail/CVE-2017-3159', 'http://camel.apache.org/security-advisories.data/CVE-2017-3159.txt.asc?version=1&modificationDate=1486565167000&api=v2', 'http://www.openwall.com/lists/oss-security/2017/05/22/2', 'https://access.redhat.com/errata/RHSA-2017:0868'}
null
Maven
GHSA-7hjp-97g3-rq93
Moderate severity vulnerability that affects net.mingsoft:ms-mcms
An issue was discovered in com\mingsoft\cms\action\GeneraterAction.java in MCMS 4.6.5. An attacker can write a .jsp file (in the position parameter) to an arbitrary directory via a ../ Directory Traversal in the url parameter.
{'CVE-2018-18831'}
2022-03-03T05:13:03.447817Z
2018-11-01T14:47:04Z
HIGH
null
{'CWE-22'}
{'https://gitee.com/mingSoft/MCMS/issues/IO0K0', 'https://github.com/advisories/GHSA-7hjp-97g3-rq93', 'https://nvd.nist.gov/vuln/detail/CVE-2018-18831'}
null
Maven
GHSA-3h5r-928v-mxhh
Unauthorized client-side property update in UIDL request handler in Vaadin 10 and 11
Missing check in UIDL request handler in `com.vaadin:flow-server` versions 1.0.0 through 1.0.5 (Vaadin 10.0.0 through 10.0.7, and 11.0.0 through 11.0.2) allows attacker to update element property values via crafted synchronization message. - https://vaadin.com/security/cve-2018-25007
null
2022-03-03T05:12:44.839218Z
2021-04-19T14:49:13Z
LOW
null
{'CWE-754'}
{'https://github.com/vaadin/platform', 'https://vaadin.com/security/cve-2018-25007', 'https://github.com/vaadin/platform/security/advisories/GHSA-3h5r-928v-mxhh'}
null
Maven
GHSA-xx68-jfcg-xmmf
High severity vulnerability that affects commons-fileupload:commons-fileupload
MultipartStream.java in Apache Commons FileUpload before 1.3.1, as used in Apache Tomcat, JBoss Web, and other products, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted Content-Type header that bypasses a loop's intended exit conditions.
{'CVE-2014-0050'}
2022-03-03T05:13:01.781433Z
2018-12-21T17:51:42Z
HIGH
null
{'CWE-20'}
{'http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html', 'http://www-01.ibm.com/support/docview.wss?uid=swg21676403', 'http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html', 'http://jvndb.jvn.jp/jvndb/JVNDB-2014-000017', 'https://github.com/advisories/GHSA-xx68-jfcg-xmmf', 'http://www-01.ibm.com/support/docview.wss?uid=swg21681214', 'http://www-01.ibm.com/support/docview.wss?uid=swg21677691', 'http://www-01.ibm.com/support/docview.wss?uid=swg21669554', 'http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-015/index.html', 'http://secunia.com/advisories/59232', 'http://secunia.com/advisories/58976', 'http://www-01.ibm.com/support/docview.wss?uid=swg21676401', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05324755', 'http://secunia.com/advisories/58075', 'http://rhn.redhat.com/errata/RHSA-2014-0400.html', 'http://secunia.com/advisories/59041', 'http://secunia.com/advisories/60475', 'http://www-01.ibm.com/support/docview.wss?uid=swg21676410', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html', 'http://www.vmware.com/security/advisories/VMSA-2014-0012.html', 'http://www-01.ibm.com/support/docview.wss?uid=swg21676656', 'http://www.ubuntu.com/usn/USN-2130-1', 'http://secunia.com/advisories/59183', 'http://secunia.com/advisories/59187', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917', 'http://packetstormsecurity.com/files/127215/VMware-Security-Advisory-2014-0007.html', 'http://tomcat.apache.org/security-8.html', 'http://www-01.ibm.com/support/docview.wss?uid=swg21676092', 'http://www.securityfocus.com/archive/1/534161/100/0/threaded', 'http://rhn.redhat.com/errata/RHSA-2014-0252.html', 'http://blog.spiderlabs.com/2014/02/cve-2014-0050-exploit-with-boundaries-loops-without-boundaries.html', 'http://mail-archives.apache.org/mod_mbox/commons-dev/201402.mbox/%3C52F373FC.9030907@apache.org%3E', 'http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html', 'https://bugzilla.redhat.com/show_bug.cgi?id=1062337', 'http://www-01.ibm.com/support/docview.wss?uid=swg21675432', 'http://seclists.org/fulldisclosure/2014/Dec/23', 'http://rhn.redhat.com/errata/RHSA-2014-0253.html', 'http://secunia.com/advisories/60753', 'http://www-01.ibm.com/support/docview.wss?uid=swg21676853', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html', 'http://www-01.ibm.com/support/docview.wss?uid=swg21676405', 'http://www.securityfocus.com/bid/65400', 'http://www.vmware.com/security/advisories/VMSA-2014-0007.html', 'http://secunia.com/advisories/59185', 'http://secunia.com/advisories/59492', 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722', 'http://www.mandriva.com/security/advisories?name=MDVSA-2015:084', 'http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-016/index.html', 'http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-350733.htm', 'http://secunia.com/advisories/59399', 'http://marc.info/?l=bugtraq&m=143136844732487&w=2', 'http://svn.apache.org/r1565143', 'http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html', 'http://secunia.com/advisories/59039', 'http://jvn.jp/en/jp/JVN14876762/index.html', 'http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html', 'http://www-01.ibm.com/support/docview.wss?uid=swg21677724', 'http://www.vmware.com/security/advisories/VMSA-2014-0008.html', 'http://secunia.com/advisories/59725', 'http://www-01.ibm.com/support/docview.wss?uid=swg21676091', 'http://www.debian.org/security/2014/dsa-2856', 'http://www.securityfocus.com/archive/1/532549/100/0/threaded', 'http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS14-017/index.html', 'https://nvd.nist.gov/vuln/detail/CVE-2014-0050', 'http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html', 'http://secunia.com/advisories/59500', 'http://tomcat.apache.org/security-7.html', 'http://secunia.com/advisories/59184', 'http://advisories.mageia.org/MGASA-2014-0110.html', 'http://secunia.com/advisories/57915'}
null
Maven
GHSA-4x25-f45x-grv5
Missing encryption in Apache Directory Studio
While investigating DIRSTUDIO-1219 it was noticed that configured StartTLS encryption was not applied when any SASL authentication mechanism (DIGEST-MD5, GSSAPI) was used. While investigating DIRSTUDIO-1220 it was noticed that any configured SASL confidentiality layer was not applied. This issue affects Apache Directory Studio version 2.0.0.v20210213-M16 and prior versions.
{'CVE-2021-33900'}
2022-03-03T05:13:27.458624Z
2021-08-09T20:40:53Z
HIGH
null
{'CWE-311'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-33900', 'https://lists.apache.org/thread.html/rb1dbcc43a5b406e45d335343a1704f4233de613140a01929d102fdc9%40%3Cusers.directory.apache.org%3E'}
null
Maven
GHSA-8wx2-9q48-vm9r
RFD attack via Content-Disposition header sourced from request input by Spring MVC or Spring WebFlux Application
In Spring Framework, versions 5.2.x prior to 5.2.3, versions 5.1.x prior to 5.1.13, and versions 5.0.x prior to 5.0.16, an application is vulnerable to a reflected file download (RFD) attack when it sets a "Content-Disposition" header in the response where the filename attribute is derived from user supplied input.
{'CVE-2020-5398'}
2022-03-03T05:12:20.558168Z
2020-01-21T20:59:09Z
HIGH
null
{'CWE-79', 'CWE-494'}
{'https://lists.apache.org/thread.html/r9f13cccb214495e14648d2c9b8f2c6072fd5219e74502dd35ede81e1@%3Cdev.ambari.apache.org%3E', 'https://lists.apache.org/thread.html/r5c95eff679dfc642e9e4ab5ac6d202248a59cb1e9457cfbe8b729ac5@%3Cissues.ambari.apache.org%3E', 'https://lists.apache.org/thread.html/r6dac0e365d1b2df9a7ffca12b4195181ec14ff0abdf59e1fdb088ce5@%3Ccommits.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/rc05acaacad089613e9642f939b3a44f7199b5537493945c3e045287f@%3Cdev.geode.apache.org%3E', 'https://lists.apache.org/thread.html/rdcaadaa9a68b31b7d093d76eacfaacf6c7a819f976b595c75ad2d4dc@%3Cdev.geode.apache.org%3E', 'https://lists.apache.org/thread.html/rab0de39839b4c208dcd73f01e12899dc453361935a816a784548e048@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/rf8dc72b974ee74f17bce661ea7d124e733a1f4c4f236354ac0cf48e8@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/r0f2d0ae1bad2edb3d4a863d77f3097b5e88cfbdae7b809f4f42d6aad@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r8b496b1743d128e6861ee0ed3c3c48cc56c505b38f84fa5baf7ae33a@%3Cdev.ambari.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.apache.org/thread.html/reaa8a6674baf2724b1b88a621b0d72d9f7a6f5577c88759842c16eb6@%3Ccommits.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r9fb1ee08cf337d16c3364feb0f35a072438c1a956afd7b77859aa090@%3Cissues.karaf.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/r2dfd5b331b46d3f90c4dd63a060e9f04300468293874bd7e41af7163@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r8cc37a60a5056351377ee5f1258f2a4fdd39822a257838ba6bcc1e88@%3Ccommits.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r7361bfe84bde9d233f9800c3a96673e7bd81207549ced0236f07a29d@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r1c679c43fa4f7846d748a937955c7921436d1b315445978254442163@%3Ccommits.ambari.apache.org%3E', 'https://pivotal.io/security/cve-2020-5398', 'https://lists.apache.org/thread.html/r1eccdbd7986618a7319ee7a533bd9d9bf6e8678e59dd4cca9b5b2d7a@%3Cissues.ambari.apache.org%3E', 'https://lists.apache.org/thread.html/r74f81f93a9b69140fe41e236afa7cbe8dfa75692e7ab31a468fddaa0@%3Ccommits.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/rb4d1fc078f086ec2e98b2693e8b358e58a6a4ef903ceed93a1ee2b18@%3Ccommits.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r3765353ff434fd00d8fa5a44734b3625a06eeb2a3fb468da7dfae134@%3Ccommits.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/rc9c7f96f08c8554225dba9050ea5e64bebc129d0d836303143fe3160@%3Cdev.rocketmq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://security.netapp.com/advisory/ntap-20210917-0006/', 'https://lists.apache.org/thread.html/r645408661a8df9158f49e337072df39838fa76da629a7e25a20928a6@%3Cdev.rocketmq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://lists.apache.org/thread.html/ra996b56e1f5ab2fed235a8b91fa0cc3cf34c2e9fee290b7fa4380a0d@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/r712a6fce928e24e7b6ec30994a7e115a70f1f6e4cf2c2fbf0347ce46@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/r4b1886e82cc98ef38f582fef7d4ea722e3fcf46637cd4674926ba682@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r881fb5a95ab251106fed38f836257276feb026bfe01290e72ff91c2a@%3Ccommits.servicecomb.apache.org%3E', 'https://lists.apache.org/thread.html/r8736185eb921022225a83e56d7285a217fd83f5524bd64a6ca3bf5cc@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r0f3530f7cb510036e497532ffc4e0bd0b882940448cf4e233994b08b@%3Ccommits.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r1bc5d673c01cfbb8e4a91914e9748ead3e5f56b61bca54d314c0419b@%3Cissues.karaf.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5398', 'https://lists.apache.org/thread.html/r1accbd4f31ad2f40e1661d70a4510a584eb3efd1e32e8660ccf46676@%3Ccommits.karaf.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r7d5e518088e2e778928b02bcd3be3b948b59acefe2f0ebb57ec2ebb0@%3Ccommits.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r4639e821ef9ca6ca10887988f410a60261400a7766560e7a97a22efc@%3Ccommits.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/r028977b9b9d44a89823639aa3296fb0f0cfdd76b4450df89d3c4fbbf@%3Cissues.karaf.apache.org%3E', 'https://lists.apache.org/thread.html/rded5291e25a4c4085a6d43cf262e479140198bf4eabb84986e0a1ef3@%3Cdev.rocketmq.apache.org%3E', 'https://lists.apache.org/thread.html/r27552d2fa10d96f2810c50d16ad1fd1899e37796c81a0c5e7585a02d@%3Cdev.rocketmq.apache.org%3E'}
null
Maven
GHSA-wrx7-qgmj-mf2q
Server-Side Request Forgery in Apache Kylin
All request mappings in `StreamingCoordinatorController.java` handling `/kylin/api/streaming_coordinator/*` REST API endpoints did not include any security checks, which allowed an unauthenticated user to issue arbitrary requests, such as assigning/unassigning of streaming cubes, creation/modification and deletion of replica sets, to the Kylin Coordinator. For endpoints accepting node details in HTTP message body, unauthenticated (but limited) server-side request forgery (SSRF) can be achieved. This issue affects Apache Kylin Apache Kylin 3 versions prior to 3.1.2.
{'CVE-2021-27738'}
2022-03-03T05:12:30.838242Z
2022-01-08T00:43:04Z
MODERATE
null
{'CWE-918'}
{'https://github.com/apache/kylin', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27738', 'https://github.com/apache/kylin/pull/1646', 'http://www.openwall.com/lists/oss-security/2022/01/06/6', 'https://lists.apache.org/thread/vkohh0to2vzwymyb2x13fszs3cs3vd70'}
null
Maven
GHSA-9fcp-vcq9-9h2h
Moderate severity vulnerability that affects org.craftercms:crafter-studio
A Server-Side Template Injection issue was discovered in Crafter CMS 3.0.18. Attackers with developer privileges may execute OS commands by Creating/Editing a template file (.ftl filetype) that triggers a call to freemarker.template.utility.Execute in the FreeMarker library during rendering of a web page.
{'CVE-2018-19907'}
2022-03-03T05:13:18.743574Z
2018-12-19T19:24:18Z
HIGH
null
{'CWE-78'}
{'https://github.com/craftercms/craftercms/issues/2677', 'https://medium.com/@buxuqua/rce-vulnerability-in-crafter-cms-server-side-template-injection-19d8708ce242', 'https://nvd.nist.gov/vuln/detail/CVE-2018-19907', 'https://github.com/advisories/GHSA-9fcp-vcq9-9h2h', 'https://github.com/craftercms/craftercms'}
null
Maven
GHSA-2467-h365-j7hm
Improper Input Validation in Apache Solr
Reported in SOLR-14515 (private) and fixed in SOLR-14561 (public), released in Solr version 8.6.0. The Replication handler (https://lucene.apache.org/solr/guide/8_6/index-replication.html#http-api-commands-for-the-replicationhandler) allows commands backup, restore and deleteBackup. Each of these take a location parameter, which was not validated, i.e you could read/write to any location the solr user can access.
{'CVE-2020-13941'}
2022-03-03T05:14:10.130591Z
2022-02-10T00:31:31Z
MODERATE
null
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-13941', 'https://lists.apache.org/thread.html/rc400db37710ee79378b6c52de3640493ff538c2beb41cefdbbdf2ab8@%3Ccommits.submarine.apache.org%3E', 'https://lists.apache.org/thread.html/r1d4a247329a8478073163567bbc8c8cb6b49c6bfc2bf58153a857af1@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rbcd9dff009ed19ffcc2b09784595fc1098fc802a5472f81795f893be@%3Ccommits.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/rf54e7912b7d2b72c63ec54a7afa4adcbf16268dcc63253767dd67d60%40%3Cgeneral.lucene.apache.org%3E'}
null
Maven
GHSA-f268-65qc-98vg
Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat
If an HTTP/2 client connecting to Apache Tomcat 10.0.0-M1 to 10.0.0-M7, 9.0.0.M1 to 9.0.37 or 8.5.0 to 8.5.57 exceeded the agreed maximum number of concurrent streams for a connection (in violation of the HTTP/2 protocol), it was possible that a subsequent request made on that connection could contain HTTP headers - including HTTP/2 pseudo headers - from a previous request rather than the intended headers. This could lead to users seeing responses for unexpected resources.
{'CVE-2020-13943'}
2022-03-03T05:13:04.880921Z
2022-02-09T23:03:53Z
MODERATE
null
{'CWE-200'}
{'https://www.debian.org/security/2021/dsa-4835', 'http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00002.html', 'https://lists.debian.org/debian-lts-announce/2020/10/msg00019.html', 'http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13943', 'https://security.netapp.com/advisory/ntap-20201016-0007/', 'https://lists.apache.org/thread.html/r4a390027eb27e4550142fac6c8317cc684b157ae314d31514747f307%40%3Cannounce.tomcat.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html'}
null
Maven
GHSA-c57f-4vp2-jqhm
Insecure temporary directory usage in frontend build functionality of Vaadin 14 and 15-19
Insecure temporary directory usage in frontend build functionality of `com.vaadin:flow-server` versions 2.0.9 through 2.5.2 (Vaadin 14.0.3 through Vaadin 14.5.2), 3.0 prior to 6.0 (Vaadin 15 prior to 19), and 6.0.0 through 6.0.5 (Vaadin 19.0.0 through 19.0.4) allows local users to inject malicious code into frontend resources during application rebuilds. - https://vaadin.com/security/cve-2021-31411
null
2022-03-03T05:14:12.224418Z
2021-05-06T15:27:04Z
MODERATE
null
{'CWE-379'}
{'https://github.com/vaadin/flow', 'https://github.com/vaadin/flow/security/advisories/GHSA-c57f-4vp2-jqhm'}
null
Maven
GHSA-mh7g-99w9-xpjm
Remote code execution occurs in Apache Solr
Remote code execution occurs in Apache Solr before versions 5.5.5, 6.6.2 and 7.1.0 by exploiting XXE in conjunction with use of a Config API add-listener command to reach the RunExecutableListener class. Elasticsearch, although it uses Lucene, is NOT vulnerable to this. Note that the XML external entity expansion vulnerability occurs in the XML Query Parser which is available, by default, for any query request with parameters deftype=xmlparser and can be exploited to upload malicious data to the /upload request handler or as Blind XXE using ftp wrapper in order to read arbitrary local files from the Solr server. Note also that the second vulnerability relates to remote code execution using the RunExecutableListener available on all affected versions of Solr
{'CVE-2017-12629'}
2022-04-27T15:16:59.640155Z
2018-10-17T19:56:17Z
CRITICAL
null
{'CWE-611'}
{'https://lists.apache.org/thread.html/r26c996b068ef6c5e89aa59acb769025cfd343a08e63fbe9e7f3f720f@%3Coak-issues.jackrabbit.apache.org%3E', 'https://www.exploit-db.com/exploits/43009/', 'http://openwall.com/lists/oss-security/2017/10/13/1', 'https://access.redhat.com/errata/RHSA-2018:0002', 'https://access.redhat.com/errata/RHSA-2017:3244', 'https://usn.ubuntu.com/4259-1/', 'https://access.redhat.com/errata/RHSA-2017:3123', 'https://access.redhat.com/errata/RHSA-2017:3124', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12629', 'https://lists.debian.org/debian-lts-announce/2018/01/msg00028.html', 'https://github.com/apache/lucene', 'https://access.redhat.com/errata/RHSA-2018:0003', 'https://access.redhat.com/errata/RHSA-2017:3452', 'https://access.redhat.com/errata/RHSA-2018:0005', 'https://twitter.com/searchtools_avi/status/918904813613543424', 'https://www.debian.org/security/2018/dsa-4124', 'http://mail-archives.us.apache.org/mod_mbox/www-announce/201710.mbox/%3CCAOOKt51UO_6Vy%3Dj8W%3Dx1pMbLW9VJfZyFWz7pAnXJC_OAdSZubA%40mail.gmail.com%3E', 'https://s.apache.org/FJDl', 'https://lists.apache.org/thread.html/r140128dc6bb4f4e0b6a39e962c7ca25a8cbc8e48ed766176c931fccc@%3Cusers.solr.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:0004', 'https://twitter.com/ApacheSolr/status/918731485611401216', 'https://twitter.com/joshbressers/status/919258716297420802', 'http://www.securityfocus.com/bid/101261', 'https://lists.apache.org/thread.html/r95df34bb158375948da82b4dfe9a1b5d528572d586584162f8f5aeef@%3Cusers.solr.apache.org%3E', 'https://github.com/advisories/GHSA-mh7g-99w9-xpjm', 'https://access.redhat.com/errata/RHSA-2017:3451', 'https://lists.apache.org/thread.html/r3da74965aba2b5f5744b7289ad447306eeb2940c872801819faa9314@%3Cusers.solr.apache.org%3E'}
null
Maven
GHSA-v3cg-h3f6-2242
Injection in MockServer
MockServer is open source software which enables easy mocking of any system you integrate with via HTTP or HTTPS. An attacker that can trick a victim into visiting a malicious site while running MockServer locally, will be able to run arbitrary code on the MockServer machine. With an overly broad default CORS configuration MockServer allows any site to send cross-site requests. Additionally, MockServer allows you to create dynamic expectations using Javascript or Velocity templates. Both engines may allow an attacker to execute arbitrary code on-behalf of MockServer. By combining these two issues (Overly broad CORS configuration + Script injection), an attacker could serve a malicious page so that if a developer running MockServer visits it, they will get compromised. For more details including a PoC see the referenced GHSL-2021-059.
{'CVE-2021-32827'}
2022-03-03T05:13:18.700106Z
2021-08-30T16:24:38Z
MODERATE
null
{'CWE-74'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32827', 'https://github.com/mock-server/mockserver', 'https://securitylab.github.com/advisories/GHSL-2021-059-mockserver/', 'https://www.oracle.com/security-alerts/cpujan2022.html'}
null
Maven
GHSA-rrfq-g5fq-fc9c
Moderate severity vulnerability that affects org.apache.hive:hive-exec
In Apache Hive 2.3.3, 3.1.0 and earlier, local resources on HiveServer2 machines are not properly protected against malicious user if ranger, sentry or sql standard authorizer is not in use.
{'CVE-2018-11777'}
2022-03-03T05:13:35.322805Z
2018-11-21T22:25:04Z
HIGH
null
null
{'https://lists.apache.org/thread.html/963c8e2516405c9b532b4add16c03b2c5db621e0c83e80f45049cbbb@%3Cdev.hive.apache.org%3E', 'http://www.securityfocus.com/bid/105886', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11777', 'https://github.com/advisories/GHSA-rrfq-g5fq-fc9c'}
null
Maven
GHSA-6qj8-c27w-rp33
Cross-site scripting in Apache Syncome EndUser
It was found that the Apache Syncope EndUser UI login page prio to 2.0.15 and 2.1.6 reflects the successMessage parameters. By this mean, a user accessing the Enduser UI could execute javascript code from URL query string.
{'CVE-2019-17557'}
2022-03-03T05:13:46.256082Z
2022-01-06T19:38:07Z
LOW
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-17557', 'http://syncope.apache.org/security'}
null
Maven
GHSA-6wqp-v4v6-c87c
Deserialization of Untrusted Data
An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a specific property), the service has the Oracle JDBC jar in the classpath, and an attacker can provide an LDAP service to access, it is possible to make the service execute a malicious payload.
{'CVE-2018-12023'}
2022-03-03T05:12:41.002423Z
2020-06-15T18:44:51Z
HIGH
null
{'CWE-502'}
{'https://access.redhat.com/errata/RHSA-2019:3892', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'https://access.redhat.com/errata/RHSA-2019:1107', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:1106', 'https://access.redhat.com/errata/RHSA-2019:4037', 'https://access.redhat.com/errata/RHSA-2019:1782', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://github.com/FasterXML/jackson-databind', 'https://access.redhat.com/errata/RHSA-2019:1823', 'https://access.redhat.com/errata/RHBA-2019:0959', 'https://github.com/FasterXML/jackson-databind/issues/2058', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://security.netapp.com/advisory/ntap-20190530-0003/', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3140', 'https://seclists.org/bugtraq/2019/May/68', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://access.redhat.com/errata/RHSA-2019:0782', 'https://lists.apache.org/thread.html/7fcf88aff0d1deaa5c3c7be8d58c05ad7ad5da94b59065d8e7c50c5d@%3Cissues.lucene.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3002', 'https://access.redhat.com/errata/RHSA-2019:0877', 'https://github.com/FasterXML/jackson-databind/commit/28badf7ef60ac3e7ef151cd8e8ec010b8479226a', 'https://access.redhat.com/errata/RHSA-2019:1822', 'https://www.blackhat.com/docs/us-16/materials/us-16-Munoz-A-Journey-From-JNDI-LDAP-Manipulation-To-RCE.pdf', 'https://nvd.nist.gov/vuln/detail/CVE-2018-12023', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://access.redhat.com/errata/RHSA-2019:1140', 'http://www.securityfocus.com/bid/105659', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZEDLDUYBSTDY4GWDBUXGJNS2RFYTFVRC/', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://access.redhat.com/errata/RHSA-2019:1797', 'https://access.redhat.com/errata/RHSA-2019:1108', 'https://access.redhat.com/errata/RHSA-2019:2804', 'https://www.debian.org/security/2019/dsa-4452'}
null
Maven
GHSA-v6wr-fch2-vm5w
Moderate severity vulnerability that affects com.orientechnologies:orientdb-studio
server/network/protocol/http/OHttpSessionManager.java in the Studio component in OrientDB Server Community Edition before 2.0.15 and 2.1.x before 2.1.1 improperly relies on the java.util.Random class for generation of random Session ID values, which makes it easier for remote attackers to predict a value by determining the internal state of the PRNG in this class.
{'CVE-2015-2913'}
2021-09-20T15:49:26Z
2018-10-18T17:41:27Z
MODERATE
null
{'CWE-200'}
{'https://www.kb.cert.org/vuls/id/845332', 'https://nvd.nist.gov/vuln/detail/CVE-2015-2913', 'https://github.com/advisories/GHSA-v6wr-fch2-vm5w', 'https://github.com/orientechnologies/orientdb/commit/668ece96be210e742a4e2820a3085b215cf55104', 'https://github.com/orientechnologies/orientdb'}
null
Maven
GHSA-26v6-w6fw-rh94
Apache Camel can allow remote attackers to execute arbitrary commands
Apache Camel 2.6.x through 2.14.x, 2.15.x before 2.15.5, and 2.16.x before 2.16.1, when using (1) camel-jetty or (2) camel-servlet as a consumer in Camel routes, allow remote attackers to execute arbitrary commands via a crafted serialized Java object in an HTTP request.
{'CVE-2015-5348'}
2022-04-26T19:30:07.225902Z
2018-10-16T23:12:20Z
HIGH
null
null
{'http://camel.apache.org/security-advisories.data/CVE-2015-5348.txt.asc', 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E', 'http://packetstormsecurity.com/files/134946/Apache-Camel-Java-Object-Deserialization.html', 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E', 'http://www.securityfocus.com/archive/1/537147/100/0/threaded', 'http://www.securityfocus.com/bid/80696', 'https://nvd.nist.gov/vuln/detail/CVE-2015-5348', 'https://issues.apache.org/jira/browse/CAMEL-9309', 'https://github.com/advisories/GHSA-26v6-w6fw-rh94', 'http://rhn.redhat.com/errata/RHSA-2016-2035.html'}
null
Maven
GHSA-qrg9-f472-qwfm
Possible route enumeration in production mode via RouteNotFoundError view in Vaadin 10, 11-14, and 15-19
Improper sanitization of path in default `RouteNotFoundError` view in `com.vaadin:flow-server` versions 1.0.0 through 1.0.14 (Vaadin 10.0.0 through 10.0.18), 1.1.0 prior to 2.0.0 (Vaadin 11 prior to 14), 2.0.0 through 2.6.1 (Vaadin 14.0.0 through 14.6.1), and 3.0.0 through 6.0.9 (Vaadin 15.0.0 through 19.0.8) allows network attacker to enumerate all available routes via crafted HTTP request when application is running in production mode and no custom handler for `NotFoundException` is provided. - https://vaadin.com/security/cve-2021-31412
{'CVE-2021-31412'}
2022-03-03T05:13:29.271189Z
2021-06-28T16:55:58Z
MODERATE
null
{'CWE-668', 'CWE-1295'}
{'https://github.com/vaadin/platform/security/advisories/GHSA-qrg9-f472-qwfm', 'https://vaadin.com/security/cve-2021-31412', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31412', 'https://github.com/vaadin/flow/pull/11107'}
null
Maven
GHSA-pjfr-qf3p-3q25
When running Apache Tomcat on Windows with HTTP PUTs enabled it was possible to upload a JSP file to the server
When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.
{'CVE-2017-12615'}
2022-04-27T13:45:18.719134Z
2018-10-17T16:30:31Z
HIGH
null
{'CWE-434'}
{'https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2017:3113', 'https://github.com/advisories/GHSA-pjfr-qf3p-3q25', 'https://access.redhat.com/errata/RHSA-2017:3114', 'https://access.redhat.com/errata/RHSA-2017:3081', 'https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E', 'http://breaktoprotect.blogspot.com/2017/09/the-case-of-cve-2017-12615-tomcat-7-put.html', 'https://access.redhat.com/errata/RHSA-2017:3080', 'https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20171018-0001/', 'https://www.synology.com/support/security/Synology_SA_17_54_Tomcat', 'https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:0465', 'http://www.securityfocus.com/bid/100901', 'https://github.com/breaktoprotect/CVE-2017-12615', 'https://access.redhat.com/errata/RHSA-2018:0466', 'https://www.exploit-db.com/exploits/42953/', 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/8fcb1e2d5895413abcf266f011b9918ae03e0b7daceb118ffbf23f8c@%3Cannounce.tomcat.apache.org%3E', 'http://www.securitytracker.com/id/1039392', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12615'}
null
Maven
GHSA-5vjc-qx43-r747
Stored Cross-site Scripting in folder-auth plugin
Folder-based Authorization Strategy Plugin 1.3 and earlier does not escape the names of roles shown on the configuration form. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Overall/Administer permission. Folder-based Authorization Strategy Plugin 1.4 escapes the names of roles shown on the configuration form. See https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2646
null
2022-03-18T23:57:52Z
2022-03-18T23:57:52Z
MODERATE
null
{'CWE-79'}
{'https://github.com/jenkinsci/folder-auth-plugin/security/advisories/GHSA-5vjc-qx43-r747', 'https://github.com/jenkinsci/folder-auth-plugin', 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2646'}
null
Maven
GHSA-9959-6p3m-wxpc
Denial of service in Netty
The SslHandler in Netty before 3.9.2 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted SSLv2Hello message.
{'CVE-2014-3488'}
2021-09-22T18:44:46Z
2020-06-30T21:01:31Z
MODERATE
null
{'CWE-119'}
{'https://snyk.io/vuln/SNYK-JAVA-ORGJBOSSNETTY-31630', 'https://github.com/netty/netty', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html', 'https://nvd.nist.gov/vuln/detail/CVE-2014-3488', 'https://github.com/netty/netty/commit/2fa9400a59d0563a66908aba55c41e7285a04994', 'https://github.com/netty/netty/issues/2562', 'http://secunia.com/advisories/59196', 'http://netty.io/news/2014/06/11/3-9-2-Final.html'}
null
Maven
GHSA-4wjq-69rc-8wcp
Path Traversal in Apache Camel
Apache Camel's File is vulnerable to directory traversal. Camel 2.21.0 to 2.21.3, 2.22.0 to 2.22.2, 2.23.0 and the unsupported Camel 2.x (2.19 and earlier) versions may be also affected.
{'CVE-2019-0194'}
2022-03-03T05:14:20.941185Z
2019-05-02T15:21:34Z
HIGH
null
{'CWE-22'}
{'https://lists.apache.org/thread.html/a39441db574ee996f829344491b3211b53c9ed926f00ae5d88943b76@%3Cdev.camel.apache.org%3E', 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/0a163d02169d3d361150e8183df4af33f1a3d8a419b2937ac8e6c66f@%3Cusers.camel.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0194', 'https://lists.apache.org/thread.html/45e23ade8d3cb754615f95975e89e8dc73c59eeac914f07d53acbac6@%3Ccommits.camel.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2019/04/30/2'}
null
Maven
GHSA-qcc4-3rxf-gf4m
Unauthorized property update in CheckboxGroup component in Vaadin 12-14 and 15-20
Improper check in `CheckboxGroup` in `com.vaadin:vaadin-checkbox-flow` versions 1.2.0 prior to 2.0.0 (Vaadin 12.0.0 prior to 14.0.0), 2.0.0 prior to 3.0.0 (Vaadin 14.0.0 prior to 14.5.0), 3.0.0 through 4.0.1 (Vaadin 15.0.0 through 17.0.11), 14.5.0 through 14.6.7 (Vaadin 14.5.0 through 14.6.7), and 18.0.0 through 20.0.5 (Vaadin 18.0.0 through 20.0.5) allows attackers to modify the value of a disabled `Checkbox` inside enabled `CheckboxGroup` component via unspecified vectors. - https://vaadin.com/security/cve-2021-33605
{'CVE-2021-33605'}
2022-03-03T05:13:37.300771Z
2021-08-30T16:16:38Z
MODERATE
null
{'CWE-754'}
{'https://github.com/vaadin/flow-components/pull/1903', 'https://github.com/vaadin/flow-components', 'https://vaadin.com/security/cve-2021-33605', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33605', 'https://github.com/vaadin/flow-components/security/advisories/GHSA-qcc4-3rxf-gf4m'}
null
Maven
GHSA-62ww-4p3p-7fhj
API information disclosure flaw in Elasticsearch
Elasticsearch versions before 7.11.2 and 6.8.15 contain a document disclosure flaw was found in the Elasticsearch suggester and profile API when Document and Field Level Security are enabled. The suggester and profile API are normally disabled for an index when document level security is enabled on the index. Certain queries are able to enable the profiler and suggester which could lead to disclosing the existence of documents and fields the attacker should not be able to view.
{'CVE-2021-22135'}
2022-03-03T05:14:05.758743Z
2021-07-02T18:33:02Z
MODERATE
null
{'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-22135', 'https://discuss.elastic.co/t/elastic-stack-7-12-0-and-6-8-15-security-update/268125', 'https://security.netapp.com/advisory/ntap-20210625-0003/'}
null
Maven
GHSA-64q9-f38h-9mwx
Protection Mechanism Failure in Jenkins Doktor Plugin
Jenkins Doktor Plugin 0.4.1 and earlier implements functionality that allows agent processes to render files on the controller as Markdown or Asciidoc, and error messages allow attackers able to control agent processes to determine whether a file with a given name exists.
{'CVE-2022-25204'}
2022-02-24T17:31:28Z
2022-02-16T00:01:18Z
MODERATE
null
{'CWE-693'}
{'https://github.com/madhead/doktor', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25204', 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2548'}
null
Maven
GHSA-pq4w-qm9g-qx68
Insufficient Nonce Validation in Eclipse Milo Client
### Impact Credential replay affecting those connected to a server when *all 3* of the following conditions are met: - `SecurityPolicy` is `None` - using username/password or X509-based authentication - the server has a defect causing it to send null/empty or zeroed nonces ### Patches The problem has been patched in version `0.3.6`. A more relaxed treatment of validation as agreed upon by the OPC UA Security Working Group is implemented in version `0.3.7`. ### Workarounds Do not use username/password or X509-based authentication with `SecurityPolicy` of `None`. ### References https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2019-19135.pdf ### For more information If you have any questions or comments about this advisory: * Open an issue at [https://github.com/eclipse/milo/issues](https://github.com/eclipse/milo/issues) * Email [the mailing list](mailto:milo-dev@eclipse.org)
{'CVE-2019-19135'}
2022-03-03T05:14:20.050313Z
2020-03-16T22:46:50Z
HIGH
null
{'CWE-330', 'CWE-522'}
{'https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2019-19135.pdf', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19135', 'https://github.com/eclipse/milo/security/advisories/GHSA-pq4w-qm9g-qx68', 'https://opcfoundation.org/security-bulletins/', 'https://github.com/eclipse/milo/commit/cac0e710bf2b8bed9c602fc597e9de1d8903abed'}
null
Maven
GHSA-q66c-h853-gqw2
AMQP 0-8, 0-9, 0-91, and 0-10 connection handling in Apache Qpid Java before 6.0.3 might allow remote attackers to bypass authentication
The AMQP 0-8, 0-9, 0-91, and 0-10 connection handling in Apache Qpid Java before 6.0.3 might allow remote attackers to bypass authentication and consequently perform actions via vectors related to connection state logging.
{'CVE-2016-4432'}
2022-04-26T19:15:09.715948Z
2018-10-16T19:49:48Z
CRITICAL
null
{'CWE-287'}
{'http://www.securitytracker.com/id/1035983', 'https://nvd.nist.gov/vuln/detail/CVE-2016-4432', 'https://svn.apache.org/viewvc?view=revision&revision=1743393', 'https://svn.apache.org/viewvc?view=revision&revision=1743161', 'https://issues.apache.org/jira/browse/QPID-7257', 'https://github.com/advisories/GHSA-q66c-h853-gqw2', 'http://www.securityfocus.com/archive/1/538508/100/0/threaded', 'http://packetstormsecurity.com/files/137216/Apache-Qpid-Java-Broker-6.0.2-Authentication-Bypass.html', 'http://mail-archives.apache.org/mod_mbox/qpid-users/201605.mbox/%3CCAFEMS4tXDKYxKVMmU0zTb_7uzduoUS4_RePnUwz1tj%2BGQLNw5Q%40mail.gmail.com%3E'}
null
Maven
GHSA-g4cp-h53p-v3v8
Allocation of Resources Without Limits or Throttling in Undertow
A flaw was discovered in Undertow in versions before Undertow 2.1.1.Final where certain requests to the "Expect: 100-continue" header may cause an out of memory error. This flaw may potentially lead to a denial of service.
{'CVE-2020-10705'}
2022-03-03T05:14:01.670383Z
2021-04-30T17:28:42Z
HIGH
null
{'CWE-770'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=1803241', 'https://security.netapp.com/advisory/ntap-20220210-0014/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10705'}
null
Maven
GHSA-c43q-5hpj-4crv
Local information disclosure via system temporary directory
## Impact Eclipse Jersey 2.28 - 2.33 and Eclipse Jersey 3.0.0 - 3.0.1 contains a local information disclosure vulnerability. This is due to the use of the `File.createTempFile` which creates a file inside of the system temporary directory with the permissions: `-rw-r--r--`. Thus the contents of this file are viewable by all other users locally on the system. As such, if the contents written is security sensitive, it can be disclosed to other local users. ## Workaround This issue can be mitigated by manually setting the `java.io.tmpdir` system property when launching the JVM. ## Patches Jersey 2.34 and 3.0.2 forward sets the correct permissions on the temporary file created by Jersey. ### References - https://github.com/eclipse-ee4j/jersey/pull/4712 - [CWE-378: Creation of Temporary File With Insecure Permissions](https://cwe.mitre.org/data/definitions/378.html) - [CWE-379: Creation of Temporary File in Directory with Insecure Permissions](https://cwe.mitre.org/data/definitions/379.html) ## Similar Vulnerabilities Similar, but not the same: - JUnit 4 - https://github.com/junit-team/junit4/security/advisories/GHSA-269g-pwp5-87pp - Google Guava - https://github.com/google/guava/issues/4011 - Apache Ant - https://nvd.nist.gov/vuln/detail/CVE-2020-1945 - JetBrains Kotlin Compiler - https://nvd.nist.gov/vuln/detail/CVE-2020-15824 - Eclipse Jetty - https://github.com/eclipse/jetty.project/security/advisories/GHSA-g3wg-6mcf-8jj6 --- Original Disclosure: > Hello Jersey Security Team, > > Utilizing a custom CodeQL query written as a part of the [GitHub Security Lab](https://securitylab.github.com/) [Bug Bounty program](https://securitylab.github.com/bounties), I've unearthed a local temporary file information disclosure vulnerability. > > You can see the custom CodeQL query utilized here: > https://lgtm.com/query/8831016213790320486/ > > This particular vulnerability exists because on unix-like systems (not including modern versions of MacOS) the system temporary directory is shared between all users. As such, failure to correctly set file permissions and/or verify exclusive creation of directories can lead to either local information disclosure, or local file hijacking by another user. > > This vulnerability impacts the following locations in this project's source: > > - https://github.com/eclipse-ee4j/jersey/blob/01c6a32a2064aeff2caa8133472e33affeb8a29a/core-common/src/main/java/org/glassfish/jersey/message/internal/FileProvider.java#L64-L73 > - https://github.com/eclipse-ee4j/jersey/blob/01c6a32a2064aeff2caa8133472e33affeb8a29a/media/multipart/src/main/java/org/glassfish/jersey/media/multipart/internal/FormDataParamValueParamProvider.java#L202-L208 > > This vulnerability exists because of the vulnerability in the `Utils.createTempFile`: > > https://github.com/eclipse-ee4j/jersey/blob/01c6a32a2064aeff2caa8133472e33affeb8a29a/core-common/src/main/java/org/glassfish/jersey/message/internal/Utils.java#L42-L53 > > This is because `File.createTempFile` creates a file inside of the system temporary directory with the permissions: `-rw-r--r--`. Thus the contents of this file are viewable by all other users locally on the system. > > If there is sensitive information written to these files, it is disclosed to other local users on this system. > > The fix for this vulnerability is to use the `Files` API (instead of the `File` API) to create temporary files/directories as this new API correctly sets the posix file permissions.
{'CVE-2021-28168'}
2022-04-22T16:02:00.212055Z
2021-04-23T16:55:01Z
MODERATE
null
{'CWE-732', 'CWE-379', 'CWE-378'}
{'https://lists.apache.org/thread.html/r42fef440487a04cf5e487a9707ef5119d2dd5b809919f25ef4296fc4@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rc288874c330b3af9e29a1a114c5e0d24fff7a79eaa341f551535c8c0@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rc6221670de35b819fe191e7d8f2d17bc000549bd554020cec644b71e@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r96658b899fcdbf04947257d201dc5a0abdbb5fb0a8f4ec0a6c15e70f@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rafc3c4cee534f478cbf8acf91e48373e291a21151f030e8132662a7b@%3Cjira.kafka.apache.org%3E', 'https://github.com/eclipse-ee4j/jersey/pull/4712', 'https://github.com/eclipse-ee4j/jersey/security/advisories/GHSA-c43q-5hpj-4crv', 'https://lists.apache.org/thread.html/r280438f7cb4b3b1c9dfda9d7b05fa2a5cfab68618c6afee8169ecdaa@%3Ccommits.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/ra2722171d569370a9e15147d9f3f6138ad9a188ee879c0156aa2d73a@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r305fb82e5c005143c1e2ec986a19c0a44f42189ab2580344dc955359@%3Cdev.kafka.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/ra3d7cd37fc794981a885332af2f8df0d873753380ea19935d6d847fc@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rd54b42edccc1b993853a9c4943a9b16db763f5e2febf6e64b7d0fe3c@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rdff6939e6c8dd620e20b013d9a35f57d42b3cd19e1d0483d85dfa2fd@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r454f38e85db149869c5a92c993c402260a4f8599bf283f6cfaada972@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r6dadc8fe82071aba841d673ffadf34728bff4357796b1990a66e3af1@%3Ccommits.kafka.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28168', 'https://lists.apache.org/thread.html/ra3290fe51b4546fac195724c4187c4cb7fc5809bc596c2f7e97606f4@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r4066176a7352e021d7a81af460044bde8d57f40e98f8e4a31923af3a@%3Cjira.kafka.apache.org%3E'}
null
Maven
GHSA-89gc-6cw6-4vch
Spark allows remote attackers to read arbitrary files via a .. (dot dot) in the URI
Directory traversal vulnerability in Spark 2.5 allows remote attackers to read arbitrary files via a .. (dot dot) in the URI.
{'CVE-2016-9177'}
2022-04-26T18:47:54.553706Z
2018-10-04T19:53:35Z
HIGH
null
{'CWE-22'}
{'https://access.redhat.com/errata/RHSA-2017:0868', 'https://nvd.nist.gov/vuln/detail/CVE-2016-9177', 'http://seclists.org/fulldisclosure/2016/Nov/13', 'https://github.com/advisories/GHSA-89gc-6cw6-4vch', 'https://github.com/perwendel/spark', 'http://www.securityfocus.com/bid/94218', 'https://github.com/perwendel/spark/issues/700'}
null
Maven
GHSA-4qq9-rrq6-48ff
Moderate severity vulnerability that affects org.apache.nifi:nifi
The message-page.jsp error page used the value of the HTTP request header X-ProxyContextPath without sanitization, resulting in a reflected XSS attack. Mitigation: The fix to correctly parse and sanitize the request attribute value was applied on the Apache NiFi 1.8.0 release. Users running a prior 1.x release should upgrade to the appropriate release.
{'CVE-2018-17193'}
2022-03-03T05:13:38.513377Z
2018-12-20T22:02:39Z
MODERATE
null
{'CWE-79'}
{'https://github.com/advisories/GHSA-4qq9-rrq6-48ff', 'https://nvd.nist.gov/vuln/detail/CVE-2018-17193', 'https://nifi.apache.org/security.html#CVE-2018-17193'}
null
Maven
GHSA-2fqw-684c-pvp7
An issue in Atomix v3.1.5 allows attackers to cause a denial of service (DoS) via false link event messages sent to a master ONOS node.
An issue in Atomix v3.1.5 allows attackers to cause a denial of service (DoS) via false link event messages sent to a master ONOS node.
{'CVE-2020-35213'}
2022-03-03T05:13:57.036337Z
2021-12-17T20:40:50Z
HIGH
null
{'CWE-74'}
{'https://github.com/atomix/atomix', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35213', 'https://docs.google.com/presentation/d/1i8tVVGE8z9Rtl9UTwktOJpkZwT4kBVLgIk307qMiw_8/edit?usp=sharing'}
null
Maven
GHSA-j239-4gqg-5j54
Inadequate Encryption Strength
Primetek Primefaces 5.x is vulnerable to a weak encryption flaw resulting in remote code execution
{'CVE-2017-1000486'}
2022-03-03T05:14:01.875307Z
2021-06-03T19:22:22Z
CRITICAL
null
{'CWE-326'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-1000486', 'https://github.com/primefaces/primefaces/issues/1152', 'https://cryptosense.com/weak-encryption-flaw-in-primefaces/', 'http://blog.mindedsecurity.com/2016/02/rce-in-oracle-netbeans-opensource.html', 'https://www.exploit-db.com/exploits/43733/'}
null