diff --git "a/github-advisory-2019.csv" "b/github-advisory-2019.csv" new file mode 100644--- /dev/null +++ "b/github-advisory-2019.csv" @@ -0,0 +1,4997 @@ +schema_version,id,modified,published,withdrawn,aliases,summary,details,severity,affected,references,database_specific +1.4.0,GHSA-4vr3-9v7h-5f8v,2021-12-03T14:36:23Z,2019-06-18T15:38:41Z,,[],Low severity vulnerability that affects Gw2Sharp,"## Leaking cached authenticated requests + +### Impact +If you've been using one `MemoryCacheMethod` object in multiple instances of `Gw2WebApiClient` and are requesting authenticated endpoints with different access tokens, then you are likely to run into this bug. + +When using an instance of `MemoryCacheMethod` and using it with multiple instances of `Gw2WebApiClient`, there's a possibility that cached authenticated responses are leaking to another request to the same endpoint, but with a different Guild Wars 2 access token. The latter request wouldn't start however, and would return the first cached response immediately. This means that the second response (or later responses) may contain the same data as the first response, therefore leaking data from another authenticated endpoint. + +The occurence of this is limited however. The Guild Wars 2 API doesn't use the `Expires` header on most (if not all) authenticated endpoints. This header is checked when caching responses. If this header isn't available, the response isn't cached at all. You should still update to at least version 0.3.1 in order to be certain that it won't happen. + +### Patches +This bug has been fixed in version 0.3.1. When using an authenticated endpoint, it will prepend the SHA-1 hash of the access token to the cache id. + +### Workarounds +For version 0.3.0 and lower, you can use one separate instance of `MemoryCacheMethod` per `Gw2WebApiClient` if you need to use it. + +### For more information +If you have any questions or comments about this advisory, you can open an issue in [the Gw2Sharp repository](https://github.com/Archomeda/Gw2Sharp) or contact me on [Discord](https://discord.gg/hNcpDT3). +",[],"[{'package': {'ecosystem': 'NuGet', 'name': 'Gw2Sharp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/Archomeda/Gw2Sharp/security/advisories/GHSA-4vr3-9v7h-5f8v'}, {'type': 'PACKAGE', 'url': 'https://github.com/Archomeda/Gw2Sharp'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4vr3-9v7h-5f8v'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:59:21Z', 'nvd_published_at': None}" +1.4.0,GHSA-6fmm-47qc-p4m4,2023-09-07T21:41:55Z,2019-06-13T16:12:26Z,,['CVE-2019-5438'],Unauthorized File Access in harp,"All versions of `harp` are vulnerable to Unauthorized File Access. If a symlink in the project's base directory points to a file outside of the directory, the file is served. This could allow an attacker to access sensitive files on the server. + + +## Recommendation + +No fix is currently available. Consider using an alternative module until a fix is made available.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'harp'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.40.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5438'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/530289'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/816'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-13T16:10:29Z', 'nvd_published_at': None}" +1.4.0,GHSA-pm52-wwrw-c282,2021-08-16T14:32:10Z,2019-06-13T18:59:06Z,,[],Command Injection in wiki-plugin-datalog,"Versions of `wiki-plugin-datalog` prior to 0.1.6 are vulnerable to Command Injection. The package failed to sanitize URLs on the curl endpoint, allowing attackers to inject commands and possibly achieving Remote Code Execution on the system. + + +## Recommendation + +Upgrade to version 0.1.6 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'wiki-plugin-datalog'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/WardCunningham/wiki-plugin-datalog/commit/020aa6201319e5b76301a61b65268c94dc242fa7'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-WIKIPLUGINDATALOG-449540'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/926'}]","{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-13T18:50:56Z', 'nvd_published_at': None}" +1.4.0,GHSA-cj6j-32rg-45r2,2021-08-04T19:54:08Z,2019-06-06T15:29:25Z,,['CVE-2019-10077'],Cross-site Scripting in JSPWiki,"A carefully crafted InterWiki link could trigger an XSS vulnerability on Apache JSPWiki 2.9.0 to 2.11.0.M3, which could lead to session hijacking.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.jspwiki:jspwiki-war'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.11.0.M4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.11.0.M3'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.jspwiki:jspwiki-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.11.0.M4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.11.0.M3'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10077'}, {'type': 'WEB', 'url': 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-10077'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-29T19:05:35Z', 'nvd_published_at': '2019-05-20T21:29:00Z'}" +1.4.0,GHSA-mmf6-6597-3v6m,2021-04-12T21:32:14Z,2019-06-13T20:18:28Z,,['CVE-2019-11269'],Open Redirect in Spring Security OAuth,"Spring Security OAuth versions 2.3 prior to 2.3.6, 2.2 prior to 2.2.5, 2.1 prior to 2.1.5, and 2.0 prior to 2.0.18, as well as older unsupported versions could be susceptible to an open redirector attack that can leak an authorization code. A malicious user or attacker can craft a request to the authorization endpoint using the authorization code grant type, and specify a manipulated redirection URI via the redirect_uri parameter. This can cause the authorization server to redirect the resource owner user-agent to a URI under the control of the attacker with the leaked authorization code.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security.oauth:spring-security-oauth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.18'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security.oauth:spring-security-oauth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security.oauth:spring-security-oauth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security.oauth:spring-security-oauth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11269'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2019-11269'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/153299/Spring-Security-OAuth-2.3-Open-Redirection.html'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-13T20:17:53Z', 'nvd_published_at': '2019-06-12T15:29:00Z'}" +1.4.0,GHSA-68hw-vfh7-xvg8,2021-08-16T15:25:07Z,2019-06-13T20:38:09Z,,['CVE-2019-10157'],Forced Logout in keycloak-connect,"Versions of `keycloak-connect` prior to 4.4.0 are vulnerable to Forced Logout. The package fails to validate JWT signatures on the `/k_logout` route, allowing attackers to logout users and craft malicious JWTs with NBF values that prevent user access indefinitely. + + +## Recommendation + +Upgrade to version 4.4.0 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'keycloak-connect'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.8.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10157'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak-nodejs-connect/commit/55e54b55d05ba636bc125a8f3d39f0052d13f8f6'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10157'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-KEYCLOAKNODEJSCONNECT-449920'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/978'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/108734'}]","{'cwe_ids': ['CWE-287', 'CWE-345'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-13T20:28:41Z', 'nvd_published_at': '2019-06-12T14:29:00Z'}" +1.4.0,GHSA-mxjr-xmcg-fg7w,2021-08-17T15:41:58Z,2019-06-27T17:25:21Z,,[],Arbitrary Code Injection in mobile-icon-resizer,"mobile-icon-resizer resizes large images for use as icons for iOS and Android. + +mobile-icon-resizer has a code execution vulnerability in versions before 0.4.3. + +mobile-icon-resizer takes an options object as an argument to define the resulting icons as such: +``` +var options = { + config: './config.js' +} +resize(options, function(err){}); +``` +config.js would need to be a file on the filesystem and look something like: +``` +var config = { + iOS: { + ""images"": [ + /* iOS image definitions are not vulnerable */ + ] + }, + android: { + ""images"" : [ + { + ""baseRatio"" : ""console.log('Executing script as baseRatio property')"", + ""folder"" : ""drawable-ldpi"" + }, + { + ""ratio"" : ""console.log('Executing script as ratio property')"", + ""folder"" : ""drawable-mdpi"" + }, + /* other android image defintiions ... */ + ] + } +}; + +exports = module.exports = config; +``` +The parameters `ratio` and `baseRatio` are passed directly to `eval()`, thus allowing dynamic javascript payloads to be executed. + + +## Recommendation + +Update to version 0.4.3 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'mobile-icon-resizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.0'}, {'fixed': '0.4.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/muzzley/mobile-icon-resizer/issues/8'}, {'type': 'WEB', 'url': 'https://github.com/muzzley/mobile-icon-resizer/commit/a6c50f884bd282d74ab77e1fce6317d5d0dd2f0f'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:mobile-icon-resizer:20160408'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/317'}]","{'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-27T15:58:50Z', 'nvd_published_at': None}" +1.4.0,GHSA-3xc7-xg67-pw99,2021-08-04T20:54:45Z,2019-06-05T20:43:10Z,,[],Sensitive Data Exposure in sequelize-cli,"Versions of `sequelize-cli` prior to 5.5.0 are vulnerable to Sensitive Data Exposure. The function `filteredURL()` does not properly sanitize the `config.password` value which may cause passwords with special characters to be logged in plain text. + + +## Recommendation + +Upgrade to version 5.5.0 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'sequelize-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.4.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/sequelize/cli/issues/172'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/cli/pull/722'}, {'type': 'WEB', 'url': 'https://github.com/FelixLC/cli/commit/da59652c061a798282e18efad0b6d0afefa15465'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SEQUELIZECLI-174320'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/825'}]","{'cwe_ids': ['CWE-532'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2019-06-05T20:42:54Z', 'nvd_published_at': None}" +1.4.0,GHSA-h9x2-5rm7-x4gm,2020-08-31T18:09:18Z,2019-06-03T17:28:23Z,,['CVE-2015-9238'],Insecure Comparison in secure-compare,"Versions of `secure-compare` prior to 3.0.1 are affected by a vulnerability that results in the package always returning true when comparing two strings of the same length, despite differences in the contents of those strings. + + +## Recommendation + +Upgrade to version 3.0.1 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'secure-compare'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-9238'}, {'type': 'WEB', 'url': 'https://github.com/vdemedes/secure-compare/pull/1'}, {'type': 'WEB', 'url': 'https://github.com/vadimdemedes/secure-compare/commit/dd1ff1ac0122de7e0af4f00c61ed73261062394a'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/50'}]","{'cwe_ids': ['CWE-697'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-03T17:22:37Z', 'nvd_published_at': None}" +1.4.0,GHSA-68gr-cmcp-g3mj,2021-08-16T23:34:10Z,2019-06-14T16:39:31Z,,[],Directory Traversal in lactate,"A crafted `GET` request can be leveraged to traverse the directory structure of a host using the lactate web server package, and request arbitrary files outside of the specified web root. This allows for a remote attacker to gain access to arbitrary files on the filesystem that the process has access to read. + +Mitigating factors: +Only files that the user running `lactate` has permission to read will be accessible via this vulnerability. + + +[Proof of concept](https://hackerone.com/reports/296645): +Please globally install the `lactate` package and `cd` to a directory you wish to serve assets from. Next, run `lactate -p 8081` to start serving files from this location. + +The following cURL request can be used to demonstrate this vulnerability by requesting the target `/etc/passwd` file: + +``` +curl ""http://127.0.0.1:8081/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd"" +``` +``` +root:x:0:0:root:/root:/bin/bash +daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin +bin:x:2:2:bin:/bin:/usr/sbin/nologin +sys:x:3:3:sys:/dev:/usr/sbin/nologin +[...] +``` + + +## Recommendation + +As there is currently no fix for this issue selecting an alternative static web server would be the best choice.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'lactate'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.13.12'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/RetireJS/retire.js/commit/800c8140884eaa5753a49308f560c925fe97b9a5'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/296645'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:lactate:20180123'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/560'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-14T16:39:14Z', 'nvd_published_at': None}" +1.4.0,GHSA-52mh-p2m2-w625,2021-08-04T21:01:39Z,2019-06-07T20:56:59Z,,['CVE-2019-12741'],Cross-site Scripting in HAPI FHIR,"XSS exists in the HAPI FHIR testpage overlay module of the HAPI FHIR library before 3.8.0. The attack involves unsanitized HTTP parameters being output in a form page, allowing attackers to leak cookies and other sensitive information from ca/uhn/fhir/to/BaseController.java via a specially crafted URL. (This module is not generally used in production systems so the attack surface is expected to be low, but affected systems are recommended to upgrade immediately.)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'ca.uhn.hapi.fhir:hapi-fhir-base'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12741'}, {'type': 'WEB', 'url': 'https://github.com/jamesagnew/hapi-fhir/issues/1335'}, {'type': 'WEB', 'url': 'https://github.com/jamesagnew/hapi-fhir/commit/8f41159eb147eeb964cad68b28eff97acac6ea9a'}, {'type': 'WEB', 'url': 'https://github.com/jamesagnew/hapi-fhir/releases/tag/v3.8.0'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-07T14:35:54Z', 'nvd_published_at': '2019-06-05T15:29:00Z'}" +1.4.0,GHSA-74cr-77xc-8g6r,2021-08-16T15:28:22Z,2019-06-13T20:37:39Z,,[],Prototype Pollution in @apollo/gateway,"Versions of `@apollo/gateway` prior to 0.6.2 are vulnerable to Prototype Pollution. The package uses deepMerge() to merge objects, which may allow attackers to alter the Object prototype through queries with GraphQL aliases. Carefully constructed payloads can override properties of all objects in the application. This may lead to Denial of Service or may be chained with other vulnerabilities leading to Remote Code Execution. + + +## Recommendation + +Upgrade to version 0.6.2 or later. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': '@apollo/gateway'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/apollographql/apollo-server/pull/2779'}, {'type': 'WEB', 'url': 'https://github.com/apollographql/apollo-server/commit/cea7397582a293af6a5f60947da34b95e669c6c1'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-APOLLOGATEWAY-174915'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/917'}]","{'cwe_ids': ['CWE-1321', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-13T20:37:08Z', 'nvd_published_at': None}" +1.4.0,GHSA-984p-xq9m-4rjw,2021-08-04T21:03:16Z,2019-06-07T21:01:53Z,,[],Rate Limiting Bypass in express-brute,"All versions of `express-brute` are vulnerable to Rate Limiting Bypass. Concurrent requests may lead to race conditions that cause the package to incorrectly count requests. This may allow an attacker to bypass the rate limiting provided by the package and execute requests without limiting. + + +## Recommendation + +No fix is currently available. Consider using an alternative module until a fix is made available.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'express-brute'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/AdamPflug/express-brute/issues/46'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-EXPRESSBRUTE-174457'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/823'}]","{'cwe_ids': ['CWE-77'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-07T21:01:37Z', 'nvd_published_at': None}" +1.4.0,GHSA-gc94-6w89-hpqr,2021-09-16T20:59:56Z,2019-06-12T16:37:07Z,,[],Command Injection in fs-path,"All versions of `fs-path` are vulnerable to command injection is unsanitized user input is passed in. + + +## Recommendation + +No fix is currently available for this vulnerability. It is our recommendation to not install or use this module until a fix is available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'fs-path'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.25'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pillys/fs-path/pull/5'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/324491'}, {'type': 'PACKAGE', 'url': 'https://github.com/pillys/fs-path'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/661'}]","{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-12T16:34:26Z', 'nvd_published_at': None}" +1.4.0,GHSA-3fc5-9x9m-vqc4,2021-08-04T21:25:59Z,2019-06-03T17:31:32Z,,[],Privilege Escalation in express-cart,"Versions of `express-cart` before 1.1.6 are vulnerable to privilege escalation. This vulnerability can be exploited so that normal users can escalate their privilege and add new administrator users. + + +## Recommendation + +Update to version 1.1.6 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'express-cart'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/mrvautin/expressCart/commit/baccaae9b0b72f00b10c5453ca00231340ad3e3b'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/343626'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/469.json'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:express-cart:20180712'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/730'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-06-03T17:30:55Z', 'nvd_published_at': None}" +1.4.0,GHSA-28xh-wpgr-7fm8,2020-08-31T18:31:51Z,2019-06-20T15:35:49Z,,[],Command Injection in open,"Versions of `open` before 6.0.0 are vulnerable to command injection when unsanitized user input is passed in. + +The package does come with the following warning in the readme: + +``` +The same care should be taken when calling open as if you were calling child_process.exec directly. If it is an executable it will run in a new shell. +``` + + +## Recommendation + +`open` is now the deprecated `opn` package. Upgrading to the latest version is likely have unwanted effects since it now has a very different API but will prevent this vulnerability.",[],"[{'package': {'ecosystem': 'npm', 'name': 'open'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pwnall/node-open/issues/68'}, {'type': 'WEB', 'url': 'https://github.com/pwnall/node-open/issues/69'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/319473'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/663'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-06-20T15:35:06Z', 'nvd_published_at': None}" +1.4.0,GHSA-f698-m2v9-5fh3,2020-08-31T18:35:50Z,2019-06-04T20:11:44Z,,[],Command Injection in opencv,"Versions of `opencv`prior to 6.1.0 are vulnerable to Command Injection. The utils/ script find-opencv.js does not validate user input allowing attackers to execute arbitrary commands. + + +## Recommendation + +Upgrade to version 6.1.0. +",[],"[{'package': {'ecosystem': 'npm', 'name': 'opencv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.1.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/peterbraden/node-opencv/commit/81a4b8620188e89f7e4fc985f3c89b58d4bcc86b#diff-dab2f6d17b2fd005a9425e97172dc8cb'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/789'}]","{'cwe_ids': ['CWE-77'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2019-06-04T20:11:26Z', 'nvd_published_at': None}" +1.4.0,GHSA-f7qw-5pvg-mmwp,2021-08-16T14:36:47Z,2019-06-13T18:58:44Z,,[],Prototype Pollution in lutils-merge,"All versions of `lutils-merge` are vulnerable to Prototype Pollution. The merge() function fails to prevent user input to alter an Object's prototype, allowing attackers to modify override properties of all objects in the application. This may lead to Denial of Service or may be chained with other vulnerabilities leading to Remote Code Execution. + + +## Recommendation + +The package is deprecated and no fixes are available. Consider using an alternative package. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'lutils-merge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/nfour/lutils-merge/issues/1'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/439107'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-LUTILSMERGE-174783'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/893'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-13T18:58:27Z', 'nvd_published_at': None}" +1.4.0,GHSA-q42p-pg8m-cqh6,2021-08-04T20:54:05Z,2019-06-05T14:07:48Z,,[],Prototype Pollution in handlebars,"Versions of `handlebars` prior to 4.0.14 are vulnerable to Prototype Pollution. Templates may alter an Objects' prototype, thus allowing an attacker to execute arbitrary code on the server. + + +## Recommendation + +For handlebars 4.1.x upgrade to 4.1.2 or later. +For handlebars 4.0.x upgrade to 4.0.14 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'handlebars'}, 'ecosystem_specific': {'affected_functions': ['handlebars.helpers.lookup']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'handlebars'}, 'ecosystem_specific': {'affected_functions': ['handlebars.helpers.lookup']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.14'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'handlebars'}, 'ecosystem_specific': {'affected_functions': ['handlebars.helpers.lookup']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.7'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/handlebars-lang/handlebars.js/issues/1495'}, {'type': 'WEB', 'url': 'https://github.com/handlebars-lang/handlebars.js/commit/0d6d8c335ad81bad1b672fc56b6a44f6aa472dac'}, {'type': 'WEB', 'url': 'https://github.com/handlebars-lang/handlebars.js/commit/7372d4e9dffc9d70c09671aa28b9392a1577fd86'}, {'type': 'WEB', 'url': 'https://github.com/handlebars-lang/handlebars.js/commit/85c8783b34fc6d36145d8b53885ad0b9e3c3f9c4'}, {'type': 'WEB', 'url': 'https://github.com/handlebars-lang/handlebars.js/commit/cd38583216dce3252831916323202749431c773e'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-HANDLEBARS-173692'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/755'}]","{'cwe_ids': ['CWE-471'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-05T13:55:39Z', 'nvd_published_at': None}" +1.4.0,GHSA-8w57-jfpm-945m,2023-04-11T00:26:58Z,2019-06-11T16:16:07Z,,[],Denial of Service in http-proxy-agent,"Versions of `http-proxy-agent` before 2.1.0 are vulnerable to denial of service and uninitialized memory leak when unsanitized options are passed to `Buffer`. An attacker may leverage these unsanitized options to consume system resources. + + +## Recommendation + +Update to version 2.1.0 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'http-proxy-agent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0'}]}]}]","[{'type': 'WEB', 'url': 'https://hackerone.com/reports/321631'}, {'type': 'WEB', 'url': 'https://github.com/TooTallNate/node-http-proxy-agent/blob/2.0.0/index.js#L80'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/607'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-11T16:11:38Z', 'nvd_published_at': None}" +1.4.0,GHSA-28hp-fgcr-2r4h,2021-02-24T18:32:36Z,2019-06-27T17:25:42Z,,[],Cross-Site Scripting via JSONP,"JSONP allows untrusted resource URLs, which provides a vector for attack by malicious actors.",[],"[{'package': {'ecosystem': 'npm', 'name': 'angular'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/angular/angular.js/commit/6476af83cd0418c84e034a955b12a842794385c4'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1630'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-27T15:51:47Z', 'nvd_published_at': None}" +1.4.0,GHSA-74cp-qw7f-7hpw,2020-08-31T18:36:24Z,2019-06-05T14:10:23Z,,[],Path Traversal in statics-server,"All versions of `statics-server` are vulnerable to Path Traversal. Due to insufficient input sanitization, attackers can access server files by using relative paths. + + +## Recommendation + +No fix is currently available. Consider using an alternative module until a fix is made available. +",[],"[{'package': {'ecosystem': 'npm', 'name': 'statics-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.9'}]}]}]","[{'type': 'WEB', 'url': 'https://hackerone.com/reports/355456'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/805'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-05T13:49:00Z', 'nvd_published_at': None}" +1.4.0,GHSA-wfp9-vr4j-f49j,2023-04-21T19:34:39Z,2019-06-04T20:04:27Z,,[],NoSQL Injection in sequelize,"Versions of `sequelize` prior to 4.12.0 are vulnerable to NoSQL Injection. Query operators such as `$gt` are not properly sanitized and may allow an attacker to alter data queries, leading to NoSQL Injection. + + +## Recommendation + +Upgrade to version 4.12.0 or later",[],"[{'package': {'ecosystem': 'npm', 'name': 'sequelize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.12.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/issues/7310'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/pull/8240'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/commit/ccb99daedb69e8750a241436415ccac8abef358d'}, {'type': 'PACKAGE', 'url': 'https://github.com/sequelize/sequelize'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SEQUELIZE-174147'}]","{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-04T20:04:00Z', 'nvd_published_at': None}" +1.4.0,GHSA-jwgx-9mmh-684w,2022-02-11T21:13:16Z,2019-06-13T20:02:56Z,,['CVE-2019-3888'],Credential exposure through log files in Undertow,"A vulnerability was found in Undertow web server before 2.0.21. An information exposure of plain text credentials through log files because Connectors.executeRootHandler:402 logs the HttpServerExchange object at ERROR level using UndertowLogger.REQUEST_LOGGER.undertowRequestFailed(t, exchange)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.21'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3888'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2439'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2998'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0727'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3888'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220210-0019/'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/108739'}]","{'cwe_ids': ['CWE-532'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-06-13T20:02:23Z', 'nvd_published_at': '2019-06-12T14:29:00Z'}" +1.4.0,GHSA-76wm-422q-92mq,2021-08-17T13:42:04Z,2019-06-20T16:06:11Z,,['CVE-2019-8324'],Code injection in RubyGems,"An issue was discovered in RubyGems 2.6 and later through 3.0.2. A crafted gem with a multi-line name is not handled correctly. Therefore, an attacker could inject arbitrary code to the stub line of gemspec, which is eval-ed by code in ensure_loadable_spec during the preinstall check.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'rubygems-update'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.7.9'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rubygems-update'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8324'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1972'}, {'type': 'WEB', 'url': 'https://blog.rubygems.org/2019/03/05/security-advisories-2019-03.html'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rubygems-update/CVE-2019-8324.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/08/msg00027.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html'}]","{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-20T16:01:22Z', 'nvd_published_at': None}" +1.4.0,GHSA-8948-ffc6-jg52,2021-08-04T20:58:53Z,2019-06-06T15:32:21Z,,[],Insecure Default Configuration in redbird,"Versions of `redbird` prior to 0.9.1 have a vulnerable default configuration of allowing TLS 1.0 connections on `lib/proxy.js`. The package does not provide an option to disable TLS 1.0 which is deprecated and vulnerable. + + +## Recommendation + +Upgrade to version 0.9.1 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'redbird'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.9.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/OptimalBits/redbird/pull/207'}, {'type': 'WEB', 'url': 'https://github.com/OptimalBits/redbird/commit/39c7a2da84a2ddddfe046ea80e98800518920516'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-REDBIRD-174455'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/828'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-06T13:06:37Z', 'nvd_published_at': None}" +1.4.0,GHSA-wxhq-pm8v-cw75,2020-08-31T18:35:40Z,2019-06-05T20:50:16Z,,[],Regular Expression Denial of Service in clean-css,"Version of `clean-css` prior to 4.1.11 are vulnerable to Regular Expression Denial of Service (ReDoS). Untrusted input may cause catastrophic backtracking while matching regular expressions. This can cause the application to be unresponsive leading to Denial of Service. + + +## Recommendation + +Upgrade to version 4.1.11 or higher.",[],"[{'package': {'ecosystem': 'npm', 'name': 'clean-css'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.11'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/jakubpawlowicz/clean-css/commit/2929bafbf8cdf7dccb24e0949c70833764fa87e3'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/785'}]","{'cwe_ids': ['CWE-1333'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2019-06-05T20:49:47Z', 'nvd_published_at': None}" +1.4.0,GHSA-57cf-349j-352g,2020-08-31T18:31:27Z,2019-06-12T16:37:00Z,,[],Out-of-bounds Read in npmconf,"Versions of `npmconf` before 2.1.3 allocate and write to disk uninitialized memory contents when a typed number is passed as input on Node.js 4.x. + + +## Recommendation + +Update to version 2.1.3 or later. Consider switching to another config storage mechanism, as npmconf is deprecated and should not be used.",[],"[{'package': {'ecosystem': 'npm', 'name': 'npmconf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.3'}]}]}]","[{'type': 'WEB', 'url': 'https://hackerone.com/reports/320269'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/653'}]","{'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-12T16:35:03Z', 'nvd_published_at': None}" +1.4.0,GHSA-4vmm-mhcq-4x9j,2021-08-16T16:06:38Z,2019-06-14T16:15:14Z,,[],Sandbox Bypass Leading to Arbitrary Code Execution in constantinople,"Versions of `constantinople` prior to 3.1.1 are vulnerable to a sandbox bypass which can lead to arbitrary code execution. + + +## Recommendation + +Update to version 3.1.1 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'constantinople'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/pugjs/constantinople/commit/01d409c0d081dfd65223e6b7767c244156d35f7f'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1577703'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:constantinople:20180421'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/568'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-06-14T16:14:40Z', 'nvd_published_at': None}" +1.4.0,GHSA-5v72-xg48-5rpm,2021-08-04T21:29:05Z,2019-06-04T19:37:52Z,,[],Denial of Service in ws,"Affected versions of `ws` can crash when a specially crafted `Sec-WebSocket-Extensions` header containing `Object.prototype` property names as extension or parameter names is sent. + +## Proof of concept + +``` +const WebSocket = require('ws'); +const net = require('net'); + +const wss = new WebSocket.Server({ port: 3000 }, function () { + const payload = 'constructor'; // or ',;constructor' + + const request = [ + 'GET / HTTP/1.1', + 'Connection: Upgrade', + 'Sec-WebSocket-Key: test', + 'Sec-WebSocket-Version: 8', + `Sec-WebSocket-Extensions: ${payload}`, + 'Upgrade: websocket', + '\r\n' + ].join('\r\n'); + + const socket = net.connect(3000, function () { + socket.resume(); + socket.write(request); + }); +}); +``` + + +## Recommendation + +Update to version 3.3.1 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'ws'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.6'}, {'fixed': '1.1.5'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ws'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '3.3.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/websockets/ws/commit/c4fe46608acd61fbf7397eadc47378903f95b78a'}, {'type': 'WEB', 'url': 'https://github.com/websockets/ws/commit/f8fdcd40ac8be7318a6ee41f5ceb7e77c995b407'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:ws:20171108'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/550'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/550/versions'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-04T19:37:42Z', 'nvd_published_at': None}" +1.4.0,GHSA-cxx2-fp39-rf3r,2021-08-04T19:53:10Z,2019-06-06T15:29:22Z,,['CVE-2019-10076'],Cross-Site Scripting in JSPWiki,"A carefully crafted malicious attachment could trigger an XSS vulnerability on Apache JSPWiki 2.9.0 to 2.11.0.M3, which could lead to session hijacking.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.jspwiki:jspwiki-war'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.11.0.M4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.11.0.M3'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.jspwiki:jspwiki-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.11.0.M4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.11.0.M3'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10076'}, {'type': 'WEB', 'url': 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-10076'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/aac253cfc33c0429b528e2fcbe82d3a42d742083c528f58d192dfd16@%3Ccommits.jspwiki.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/05/19/4'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/108437'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-29T19:05:23Z', 'nvd_published_at': None}" +1.4.0,GHSA-g45g-g52h-39rg,2023-01-23T20:02:18Z,2019-06-07T20:56:42Z,,['CVE-2019-12732'],Cross-site Scripting in Chartkick,The Chartkick gem through 3.1.0 for Ruby allows XSS.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'chartkick'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12732'}, {'type': 'WEB', 'url': 'https://github.com/ankane/chartkick/issues/488'}, {'type': 'PACKAGE', 'url': 'https://github.com/ankane/chartkick'}, {'type': 'WEB', 'url': 'https://github.com/ankane/chartkick/blob/master/CHANGELOG.md'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-07T10:49:06Z', 'nvd_published_at': '2019-06-06T15:29:00Z'}" +1.4.0,GHSA-hpfq-8wx8-cgqw,2020-08-31T18:41:56Z,2019-06-13T18:59:18Z,,[],Cross-Site Scripting in ids-enterprise,"Versions of `ids-enterprise` prior to 4.18.2 are vulnerable to Cross-Site Scripting (XSS). The `modal` component fails to sanitize input to the `title` attribute, which may allow attackers to execute arbitrary JavaScript. + + +## Recommendation + +Upgrade to version 4.18.2 or later",[],"[{'package': {'ecosystem': 'npm', 'name': 'ids-enterprise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.18.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/infor-design/enterprise-ng/issues/511'}, {'type': 'WEB', 'url': 'https://github.com/infor-design/enterprise/commit/9b57aaa0321bf2e5baa6c4c5c1eb3b8312e215c4'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/957'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-13T18:49:52Z', 'nvd_published_at': None}" +1.4.0,GHSA-q4hg-rmq2-52q9,2021-04-12T18:23:31Z,2019-06-26T01:09:40Z,,['CVE-2019-10072'],Improper Locking in Apache Tomcat,The fix for CVE-2019-0199 was incomplete and did not address HTTP/2 connection window exhaustion on write in Apache Tomcat versions 9.0.0.M1 to 9.0.19 and 8.5.0 to 8.5.40 . By not sending WINDOW_UPDATE messages for the connection window (stream 0) clients were able to cause server-side threads to block eventually leading to thread exhaustion and a DoS.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0.M1'}, {'fixed': '9.0.20'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.5.0'}, {'fixed': '8.5.40'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10072'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3929'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3931'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/df1a2c1b87c8a6c500ecdbbaf134c7f1491c8d79d98b48c6b9f0fa6a@%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190625-0002/'}, {'type': 'WEB', 'url': 'https://support.f5.com/csp/article/K17321505'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4128-1/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4128-2/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4680'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}, {'type': 'WEB', 'url': 'https://www.synology.com/security/advisory/Synology_SA_19_29'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00013.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/108874'}]","{'cwe_ids': ['CWE-667'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-26T00:56:45Z', 'nvd_published_at': '2019-06-21T18:15:00Z'}" +1.4.0,GHSA-m734-r4g6-34f9,2021-08-04T20:47:58Z,2019-06-04T19:36:17Z,,[],NoSQL Injection in loopback-connector-mongodb,"Versions of `loopback-connector-mongodb` before 3.6.0 are vulnerable to NoSQL injection. + +MongoDB Connector for LoopBack fails to properly sanitize a filter passed to query the database by allowing the dangerous `$where` property to be passed to the MongoDB Driver. The Driver allows the special `$where` property in a filter to execute JavaScript (client can pass in a malicious script) on the database Driver. This is an [intended feature of MongoDB](https://docs.mongodb.com/manual/core/server-side-javascript/) unless disabled ([instructions here](https://docs.mongodb.com/manual/core/server-side-javascript/#disable-server-side-js)). + +A proof of concept malicious query: + +``` +GET /POST filter={""where"": {""$where"": ""function(){sleep(5000); return this.title.contains('Hello');}""}} +``` + +The above makes the database sleep for 5 seconds and then returns all “Posts” with the title containing the word `Hello`. + + + + +## Recommendation + +Update to version 3.6.0 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'loopback-connector-mongodb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/strongloop/loopback-connector-mongodb/issues/403'}, {'type': 'WEB', 'url': 'https://github.com/strongloop/loopback-connector-mongodb/pull/452'}, {'type': 'WEB', 'url': 'https://github.com/strongloop/loopback-connector-mongodb/commit/ee24cd08b8ccc32711264831c71b1da628df357b'}, {'type': 'WEB', 'url': 'https://loopback.io/doc/en/lb3/Security-advisory-08-15-2018.html'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/696'}]","{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-04T19:35:47Z', 'nvd_published_at': None}" +1.4.0,GHSA-2479-qvv7-47qq,2022-09-13T22:16:02Z,2019-06-13T16:22:13Z,,['CVE-2019-1020012'],Parse Server before v3.4.1 vulnerable to Denial of Service,"### Impact + +If a POST request is made to /parse/classes/_Audience (or other volatile class), any subsuquent POST requests result in an internal server error (500). + + +### Patches +Afflicted installations will also have to remove the offending collection from their database. + +Yes, patched in 3.4.1 + +### Workarounds + +Yes, user can apply: https://github.com/parse-community/parse-server/commit/8709daf698ea69b59268cb66f0f7cee75b52daa5 + +### References +Nothing other than this advisory at this time + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [parse-server](https://github.com/parse-community/parse-server) +* Email us at [security@parseplatform.org](mailto:security@parseplatform.org) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/security/advisories/GHSA-2479-qvv7-47qq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1020012'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2479-qvv7-47qq'}, {'type': 'PACKAGE', 'url': 'https://github.com/parse-community/parse-server'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-PARSESERVER-455635'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1113'}]","{'cwe_ids': ['CWE-444'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:51:19Z', 'nvd_published_at': None}" +1.4.0,GHSA-r6v3-hpxj-r8rv,2021-07-27T20:55:27Z,2019-06-07T20:56:27Z,,['CVE-2019-12761'],Code Injection in PyXDG,A code injection issue was discovered in PyXDG before 0.26 via crafted Python code in a Category element of a Menu XML document in a .menu file. XDG_CONFIG_DIRS must be set up to trigger xdg.Menu.parse parsing within the directory containing this file. This is due to a lack of sanitization in xdg/Menu.py before an eval call.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'pyxdg'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.26'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12761'}, {'type': 'WEB', 'url': 'https://gist.github.com/dhondta/b45cd41f4186110a354dc7272916feba'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/06/msg00006.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/08/msg00003.html'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PYTHON-PYXDG-174562'}]","{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-07T10:24:55Z', 'nvd_published_at': '2019-06-06T19:29:00Z'}" +1.4.0,GHSA-3p92-886g-qxpq,2021-08-04T21:27:04Z,2019-06-04T15:42:32Z,,[],Remote Memory Exposure in floody,"Versions of `floody` before 0.1.1 are vulnerable to remote memory exposure. + +.write(number)` in the affected `floody` versions passes a number to Buffer constructor, appending a chunk of uninitialized memory. + +Proof of Concept: + +``` +var f = require('floody')(process.stdout); +f.write(USERSUPPLIEDINPUT); +'f.stop(); + + +## Recommendation + +Update to version 0.1.1 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'floody'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/soldair/node-floody/commit/6c44722312131f4ac8a1af40f0f861c85efe01b0'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:floody:20160115'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/601'}]","{'cwe_ids': ['CWE-201'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-04T15:40:44Z', 'nvd_published_at': None}" +1.4.0,GHSA-hxcm-v35h-mg2x,2021-02-25T17:25:43Z,2019-06-07T21:12:50Z,,[],Prototype Pollution,A vulnerability was found in querystringify before 2.0.0. It's possible to override built-in properties of the resulting query string object if a malicious string is inserted in the query string.,[],"[{'package': {'ecosystem': 'npm', 'name': 'querystringify'}, 'ecosystem_specific': {'affected_functions': ['querystringify.parse']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/unshiftio/querystringify/pull/19'}, {'type': 'WEB', 'url': 'https://github.com/unshiftio/querystringify/commit/422eb4f6c7c28ee5f100dcc64177d3b68bb2b080'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-07T21:11:35Z', 'nvd_published_at': None}" +1.4.0,GHSA-49r3-3h96-rwj6,2020-08-31T18:41:54Z,2019-06-13T19:09:31Z,,[],Cross-Site Scripting in ids-enterprise,"Versions of `ids-enterprise` prior to 4.18.2 are vulnerable to Cross-Site Scripting (XSS). The `soho-dropdown` component does not properly encode its output and may allow attackers to execute arbitrary JavaScript. + + +## Recommendation + +Upgrade to version 4.18.2 or later",[],"[{'package': {'ecosystem': 'npm', 'name': 'ids-enterprise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.18.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/infor-design/enterprise-ng/issues/503'}, {'type': 'WEB', 'url': 'https://github.com/infor-design/enterprise/commit/6bd74d8f38c268b22f31e8169316e065e0093362'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/956'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-13T19:09:01Z', 'nvd_published_at': None}" +1.4.0,GHSA-fr32-gr5c-xq5c,2023-08-28T13:19:04Z,2019-06-20T16:06:04Z,,['CVE-2019-8321'],RubyGems Escape sequence injection vulnerability in verbose,"An issue was discovered in RubyGems 2.6 and later through 3.0.2. Since Gem::UserInteraction#verbose calls say without escaping, escape sequence injection is possible.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'rubygems-update'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.7.9'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rubygems-update'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8321'}, {'type': 'WEB', 'url': 'https://blog.rubygems.org/2019/03/05/security-advisories-2019-03.html'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rubygems-update/CVE-2019-8321.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/08/msg00027.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html'}]","{'cwe_ids': ['CWE-88'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-20T16:00:39Z', 'nvd_published_at': None}" +1.4.0,GHSA-vc6r-4x6g-mmqc,2020-08-31T18:33:45Z,2019-06-11T16:16:23Z,,[],Path Traversal in m-server,"Versions of `m-server` before 1.4.2 are vulnerable to path traversal allowing a remote attacker to display content of arbitrary files from the server. + + +## Recommendation + +Update to version 1.4.2 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'm-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/nunnly/m-server/commit/01f13f040d1961ca3146dce7e2db990156e65e9a'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/319795'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/468.json'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/731'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-11T16:09:28Z', 'nvd_published_at': None}" +1.4.0,GHSA-g74r-ffvr-5q9f,2020-08-31T18:29:17Z,2019-06-03T17:26:44Z,,[],Memory Exposure in concat-stream,"Versions of `concat-stream` before 1.5.2 are vulnerable to memory exposure if userp provided input is passed into `write()` + +Versions <1.3.0 are not affected due to not using unguarded Buffer constructor. + + + +## Recommendation + +Update to version 1.5.2, 1.4.11, 1.3.2 or later. + +If you are unable to update make sure user provided input into the `write()` function is not a number.",[],"[{'package': {'ecosystem': 'npm', 'name': 'concat-stream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'concat-stream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.11'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'concat-stream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/maxogden/concat-stream/pull/47'}, {'type': 'WEB', 'url': 'https://github.com/maxogden/concat-stream/pull/47/commits/3e285ba5e5b10b7c98552217f5c1023829efe69e'}, {'type': 'WEB', 'url': 'https://gist.github.com/ChALkeR/c2d2fd3f1d72d51ad883df195be03a85'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/597'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-03T17:26:24Z', 'nvd_published_at': None}" +1.4.0,GHSA-crfx-5phg-hmw9,2020-08-31T18:41:52Z,2019-06-13T18:59:12Z,,[],Cross-Site Scripting in ids-enterprise,"Versions of `ids-enterprise` prior to 4.18.2 are vulnerable to Cross-Site Scripting (XSS). Script tags in the `soho-autocomplete` component are not properly encoded and may allow attackers to execute arbitrary JavaScript. + + +## Recommendation + +Upgrade to version 4.18.2 or later",[],"[{'package': {'ecosystem': 'npm', 'name': 'ids-enterprise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.18.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/infor-design/enterprise-ng/issues/502'}, {'type': 'WEB', 'url': 'https://github.com/infor-design/enterprise/commit/ce7b335bb614a6720867abf5b8eb351deb13aed1'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/955'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-13T18:47:35Z', 'nvd_published_at': None}" +1.4.0,GHSA-qx4v-6gc5-f2vv,2021-02-25T17:20:28Z,2019-06-20T14:32:56Z,,[],Regular Expression Denial of Service,"A Regular Expression Denial of Service vulnerability was discovered in esm before 3.1.0. The issue is that esm's find-indexes is using the unescaped identifiers in a regex, which, in this case, causes an infinite loop.",[],"[{'package': {'ecosystem': 'npm', 'name': 'esm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/standard-things/esm/issues/694'}, {'type': 'WEB', 'url': 'https://github.com/standard-things/esm/commit/c41e001d81a5a52b0d2d1722b1c2af04d997c05b'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-20T14:17:20Z', 'nvd_published_at': None}" +1.4.0,GHSA-v2p6-4mp7-3r9v,2020-08-31T18:34:16Z,2019-06-14T16:26:22Z,,[],Regular Expression Denial of Service in underscore.string,"Versions of `underscore.string` prior to *3.3.5* are vulnerable to Regular Expression Denial of Service (ReDoS). + +The function `unescapeHTML` is vulnerable to ReDoS due to an overly-broad regex. The slowdown is approximately 2s for 50,000 characters but grows exponentially with larger inputs. + + +## Recommendation + +Upgrade to version 3.3.5 or higher.",[],"[{'package': {'ecosystem': 'npm', 'name': 'underscore.string'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/epeli/underscore.string/issues/510'}, {'type': 'WEB', 'url': 'https://github.com/epeli/underscore.string/pull/517'}, {'type': 'WEB', 'url': 'https://github.com/epeli/underscore.string/commit/f486cd684c94c12db48b45d52b1472a1b9661029'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/745'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-14T16:24:01Z', 'nvd_published_at': None}" +1.4.0,GHSA-886v-mm6p-4m66,2021-09-07T15:24:35Z,2019-06-05T09:48:02Z,,[],High severity vulnerability that affects gun,"## Urgent Upgrade + +The static file server module included with GUN had a **serious vulnerability**: + + - Using `curl --path-as-is` allowed reads on any parent directory or files. + +This did not work via the browser or via curl without as-is option. + + ### Fixed + +This has been fixed since version `0.2019.416` and higher. + + ### Who Was Effected? + +Most NodeJS users who use the default setup, such as: + + - `npm start` + - `node examples/http.js` + - `Heroku` 1-click-deploy + - `Docker` + - `Now` + +If you have a custom NodeJS code then you are probably safe *unless* you have something like `require('http').createServer(Gun.serve(__dirname))` in it. + +If you have not upgraded, it is **mandatory** or else it is highly likely your environment variables and AWS (or other) keys could be leaked. + + ### Credit + +It was reported and fixed by [JK0N](https://github.com/amark/gun/pull/527), but I did not understand the `--path-as-is` condition. + +Joonas Loppi from [function61](http://function61.com) rediscovered it and explained the urgency to me to fix it. +",[],"[{'package': {'ecosystem': 'npm', 'name': 'gun'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2019.416'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/amark/gun/security/advisories/GHSA-886v-mm6p-4m66'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-886v-mm6p-4m66'}, {'type': 'PACKAGE', 'url': 'https://github.com/amark/gun'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:24:52Z', 'nvd_published_at': None}" +1.4.0,GHSA-4wm8-fjv7-j774,2023-08-28T13:17:43Z,2019-06-20T16:08:21Z,,['CVE-2019-8325'],RubyGems Escape sequence injection in errors,"An issue was discovered in RubyGems 2.6 and later through 3.0.2. Since Gem::CommandManager#run calls alert_error without escaping, escape sequence injection is possible. (There are many ways to cause an error.)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'rubygems-update'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.7.9'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rubygems-update'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8325'}, {'type': 'WEB', 'url': 'https://blog.rubygems.org/2019/03/05/security-advisories-2019-03.html'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rubygems-update/CVE-2019-8325.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/08/msg00027.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html'}]","{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-20T16:04:35Z', 'nvd_published_at': None}" +1.4.0,GHSA-4859-gpc7-4j66,2021-08-04T20:55:57Z,2019-06-05T21:24:29Z,,[],Command Injection in dot,All versions of dot are vulnerable to Command Injection. The template compilation may execute arbitrary commands if an attacker can inject code in the template or if a Prototype Pollution-like vulnerability can be exploited to alter an Object's prototype.,[],"[{'package': {'ecosystem': 'npm', 'name': 'dot'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.2'}]}]}]","[{'type': 'WEB', 'url': 'https://hackerone.com/reports/390929'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/798'}]","{'cwe_ids': ['CWE-77'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-05T21:24:18Z', 'nvd_published_at': None}" +1.4.0,GHSA-6394-6h9h-cfjg,2021-02-25T17:23:12Z,2019-06-07T21:12:35Z,,[],Regular Expression Denial of Service,"A Regular Expression vulnerability was found in nwmatcher before 1.4.4. The fix replacing multiple repeated instances of the ""\s*"" pattern.",[],"[{'package': {'ecosystem': 'npm', 'name': 'nwmatcher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/dperini/nwmatcher/commit/9dcc2b039beeabd18327a5ebaa537625872e16f0'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-07T21:11:09Z', 'nvd_published_at': None}" +1.4.0,GHSA-vpq5-4rc8-c222,2020-08-31T18:36:22Z,2019-06-05T14:10:45Z,,[],Denial of Service in canvas,"Versions of `canvas` prior to 1.6.10 are vulnerable to Denial of Service. Processing malicious JPEGs or GIFs could crash the node process. + + +## Recommendation + +Upgrade to version 1.6.10",[],"[{'package': {'ecosystem': 'npm', 'name': 'canvas'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.10'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/Automattic/node-canvas/commit/c3e4ccb1c404da01e83fe5eb3626bf55f7f55957'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/315037'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/804'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-05T12:48:28Z', 'nvd_published_at': None}" +1.4.0,GHSA-x9p2-fxq6-2m5f,2021-08-16T23:44:47Z,2019-06-20T14:33:07Z,,[],Reverse Tabnapping in swagger-ui,"Versions of `swagger-ui` prior to 3.18.0 are vulnerable to [Reverse Tabnapping](https://www.owasp.org/index.php/Reverse_Tabnabbing). The package uses `target='_blank'` in anchor tags, allowing attackers to access `window.opener` for the original page. This is commonly used for phishing attacks. + + +## Recommendation + +Upgrade to version 3.18.0 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'swagger-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.18.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/swagger-api/swagger-ui/pull/4789'}, {'type': 'WEB', 'url': 'https://github.com/swagger-api/swagger-ui/commit/3f4cae3334fdd492a373f4453bd03a9ebd87becf'}, {'type': 'WEB', 'url': 'https://github.com/swagger-api/swagger-ui/releases/tag/v3.18.0'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SWAGGERUI-449808'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/975'}]","{'cwe_ids': ['CWE-1022'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-20T14:13:56Z', 'nvd_published_at': None}" +1.4.0,GHSA-m8fw-534v-xm85,2020-08-31T18:31:00Z,2019-06-04T15:43:29Z,,[],Cross-Site Scripting (XSS) in cloudcmd,"Versions of `cloudcmd` before 9.1.6 are vulnerable to cross-site scripting (XSS) when listing files in a directory. The attacker must control the name of a file for this vulnerability to be exploitable. + + +## Recommendation + +Update to version 9.1.6 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'cloudcmd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.1.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/coderaiser/cloudcmd/commit/23f4d4702cd3d473977285f26ea2ae7206b45f38'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/341044'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/341044)'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/642'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-04T15:43:12Z', 'nvd_published_at': None}" +1.4.0,GHSA-mf6x-7mm4-x2g7,2021-03-19T20:59:51Z,2019-06-20T18:22:32Z,,['CVE-2018-21270'],Out-of-bounds Read in stringstream,"All versions of `stringstream` are vulnerable to out-of-bounds read as it allocates uninitialized Buffers when number is passed in input stream on Node.js 4.x and below. + + +## Recommendation + +No fix is currently available for this vulnerability. It is our recommendation to not install or use this module if user input is being passed in to `stringstream`.",[],"[{'package': {'ecosystem': 'npm', 'name': 'stringstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.6'}]}]}]","[{'type': 'WEB', 'url': 'https://hackerone.com/reports/321670'}, {'type': 'WEB', 'url': 'https://github.com/mhart/StringStream/blob/v0.0.5/stringstream.js#L32'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/664'}]","{'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-20T18:22:00Z', 'nvd_published_at': '2020-12-03T21:15:00Z'}" +1.4.0,GHSA-xf5p-87ch-gxw2,2022-08-02T17:43:57Z,2019-06-05T14:10:03Z,,[],Marked ReDoS due to email addresses being evaluated in quadratic time,"Versions of `marked` from 0.3.14 until 0.6.2 are vulnerable to Regular Expression Denial of Service. Email addresses may be evaluated in quadratic time, allowing attackers to potentially crash the node process due to resource exhaustion. + + +## Recommendation + +Upgrade to version 0.6.2 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'marked'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.14'}, {'fixed': '0.6.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/markedjs/marked/pull/1460'}, {'type': 'WEB', 'url': 'https://github.com/markedjs/marked/commit/b15e42b67cec9ded8505e9d68bb8741ad7a9590d'}, {'type': 'PACKAGE', 'url': 'https://github.com/markedjs/marked'}, {'type': 'WEB', 'url': 'https://github.com/markedjs/marked/releases/tag/v0.6.2'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MARKED-174116'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/812'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-05T13:50:35Z', 'nvd_published_at': None}" +1.4.0,GHSA-6cc5-2vg4-cc7m,2023-08-31T09:10:55Z,2019-06-10T18:05:06Z,,['CVE-2019-12387'],Twisted CRLF Injection,"In Twisted before 19.2.1, twisted.web did not validate or sanitize URIs or HTTP methods, allowing an attacker to inject invalid characters such as CRLF.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'twisted'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.2.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12387'}, {'type': 'WEB', 'url': 'https://github.com/twisted/twisted/commit/6c61fc4503ae39ab8ecee52d10f10ee2c371d7e2'}, {'type': 'PACKAGE', 'url': 'https://github.com/twisted/twisted'}, {'type': 'WEB', 'url': 'https://labs.twistedmatrix.com/2019/06/twisted-1921-released.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2G5RPDQ4BNB336HL6WW5ZJ344MAWNN7N/'}, {'type': 'WEB', 'url': 'https://twistedmatrix.com/pipermail/twisted-python/2019-June/032352.html'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4308-1/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4308-2/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00030.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00042.html'}]","{'cwe_ids': ['CWE-74', 'CWE-93'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-10T18:04:12Z', 'nvd_published_at': '2019-06-10T12:29:00Z'}" +1.4.0,GHSA-73cw-jxmm-qpgh,2020-08-31T18:31:31Z,2019-06-11T16:40:48Z,,[],Path Traversal in localhost-now,"All versions of `localhost-now` are vulnerable to path traversal. This vulnerability is a bypass to the path traversal fix introduced in version 1.0.2 + +Proof of concept: + +``` +$ curl -v --path-as-is ""http://IP:5432/..././..././..././..././..././..././..././..././..././..././etc/passwd"" +``` + + +## Recommendation + +No fix is currently available for this vulnerability. It is our recommendation to not install or use this module until a fix is available. + ",[],"[{'package': {'ecosystem': 'npm', 'name': 'localhost-now'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]","[{'type': 'WEB', 'url': 'https://hackerone.com/reports/329837'}, {'type': 'WEB', 'url': 'https://github.com/DCKT/localhost-now/blob/master/lib/app.js#L17'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/655'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-11T16:40:34Z', 'nvd_published_at': None}" +1.4.0,GHSA-8j8c-7jfh-h6hx,2020-08-31T18:36:43Z,2019-06-04T20:14:07Z,,[],Code Injection in js-yaml,"Versions of `js-yaml` prior to 3.13.1 are vulnerable to Code Injection. The `load()` function may execute arbitrary code injected through a malicious YAML file. Objects that have `toString` as key, JavaScript code as value and are used as explicit mapping keys allow attackers to execute the supplied code through the `load()` function. The `safeLoad()` function is unaffected. + +An example payload is +`{ toString: ! 'function (){return Date.now()}' } : 1` +which returns the object +{ + ""1553107949161"": 1 +} + + +## Recommendation + +Upgrade to version 3.13.1.",[],"[{'package': {'ecosystem': 'npm', 'name': 'js-yaml'}, 'ecosystem_specific': {'affected_functions': ['js-yaml.load']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.13.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/nodeca/js-yaml/pull/480'}, {'type': 'WEB', 'url': 'https://github.com/nodeca/js-yaml/pull/480/commits/e18afbf1edcafb7add2c4c7b22abc8d6ebc2fa61'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/813'}]","{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-04T20:13:53Z', 'nvd_published_at': None}" +1.4.0,GHSA-wrw9-m778-g6mc,2020-08-31T18:29:15Z,2019-06-03T17:27:57Z,,[],Memory Exposure in bl,"Versions of `bl` before 0.9.5 and 1.0.1 are vulnerable to memory exposure. + +`bl.append(number)` in the affected `bl` versions passes a number to Buffer constructor, appending a chunk of uninitialized memory + + +## Recommendation + +Update to version 0.9.5, 1.0.1 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'bl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.5'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'bl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.1'}]}], 'versions': ['1.0.0']}]","[{'type': 'WEB', 'url': 'https://github.com/rvagg/bl/pull/22'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/596'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-03T17:23:00Z', 'nvd_published_at': None}" +1.4.0,GHSA-5x32-c9mf-49cc,2023-08-28T13:16:23Z,2019-06-20T16:06:15Z,,['CVE-2019-8320'],RubyGems Delete directory using symlink when decompressing tar,"A Directory Traversal issue was discovered in RubyGems 2.7.6 and later through 3.0.2. Before making new directories or touching files (which now include path-checking code for symlinks), it would delete the target destination. If that destination was hidden behind a symlink, a malicious gem could delete arbitrary files on the user's machine, presuming the attacker could guess at paths. Given how frequently gem is run as sudo, and how predictable paths are on modern systems (/tmp, /usr, etc.), this could likely lead to data loss or an unusable system.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'rubygems-update'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.6'}, {'fixed': '2.7.9'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rubygems-update'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8320'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/317321'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1429'}, {'type': 'WEB', 'url': 'https://blog.rubygems.org/2019/03/05/security-advisories-2019-03.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/rubygems/rubygems'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rubygems-update/CVE-2019-8320.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/08/msg00027.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-20T16:02:48Z', 'nvd_published_at': None}" +1.4.0,GHSA-fqfj-cmh6-hj49,2023-07-05T19:06:46Z,2019-06-13T16:15:56Z,,['CVE-2019-11027'],ruby-openid SSRF via claimed_id request,"Ruby OpenID (aka ruby-openid) through 2.8.0 is vulnerable to SSRF. Ruby-openid performs discovery first, and then verification. This allows an attacker to change the URL used for discovery and trick the server into connecting to the URL, which might be a private server not publicly accessible. Severity can range from medium to critical, depending on how a web application developer chose to employ the ruby-openid library. Developers who based their OpenID integration heavily on the ""example app"" provided by the project are at highest risk.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'ruby-openid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11027'}, {'type': 'WEB', 'url': 'https://github.com/openid/ruby-openid/issues/122'}, {'type': 'WEB', 'url': 'https://github.com/openid/ruby-openid/commit/d181a8a2099c64365a1d24b29f6b6b646673a131'}, {'type': 'PACKAGE', 'url': 'https://github.com/openid/ruby-openid'}, {'type': 'WEB', 'url': 'https://github.com/openid/ruby-openid/releases/tag/v2.9.0'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/ruby-openid/CVE-2019-11027.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/10/msg00014.html'}, {'type': 'WEB', 'url': 'https://marc.info/?l=openid-security&m=155154717027534&w=2'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202003-09'}]","{'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-06-13T15:45:16Z', 'nvd_published_at': None}" +1.4.0,GHSA-q22g-8fr4-qpj4,2021-08-04T21:36:58Z,2019-06-06T15:32:15Z,,['CVE-2019-12041'],Regular Expression Denial of Service in remarkable,lib/common/html_re.js in remarkable 1.7.1 allows Regular Expression Denial of Service (ReDoS) via a CDATA section.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'remarkable'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12041'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/remarkable/issues/331'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/remarkable/pull/335#issuecomment-515958379'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/remarkable/commit/287dfbf22e70790c8b709ae37a5be0523597673c'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-REMARKABLE-174639'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-06T15:21:06Z', 'nvd_published_at': '2019-05-13T13:29:00Z'}" +1.4.0,GHSA-4qhx-g9wp-g9m6,2021-09-16T21:00:23Z,2019-06-14T16:09:01Z,,[],Failure to sanitize quotes which can lead to sql injection in squel,"All versions of `squel` are vulnerable to sql injection. + +The `squel` package does not properly escape user provided input when provided using the `setFields` method. This could lead to sql injection if the query was then executed. + +Proof of concept demonstrating the injection of a single quote into a generated sql statement from user provided input. +``` +> console.log(squel.insert().into('buh').setFields({foo: ""bar'baz""}).toString()); +INSERT INTO buh (foo) VALUES ('bar'baz') +``` + + +## Recommendation + +There is no fix at this time and the issue has been reported publicly. Consider using another query builder that provides strong guarantees for input sanitization to prevent sql injection attacks.",[],"[{'package': {'ecosystem': 'npm', 'name': 'squel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.13.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/hiddentao/squel/issues/350'}, {'type': 'PACKAGE', 'url': 'https://github.com/hiddentao/squel'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/575'}]","{'cwe_ids': ['CWE-74', 'CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-06-14T16:08:38Z', 'nvd_published_at': None}" +1.4.0,GHSA-gm9g-2g8v-fvxj,2021-09-16T20:59:20Z,2019-06-06T15:32:28Z,,[],Prototype Pollution in upmerge,"All versions of `upmerge` are vulnerable to Prototype Pollution. The merge() function fails to prevent user input to alter an Object's prototype, allowing attackers to modify override properties of all objects in the application. This may lead to Denial of Service or may be chained with other vulnerabilities leading to Remote Code Execution. + + +## Recommendation + +No fix is currently available. Consider using an alternative module until a fix is made available. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'upmerge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.8'}]}]}]","[{'type': 'WEB', 'url': 'https://hackerone.com/reports/439120'}, {'type': 'PACKAGE', 'url': 'https://github.com/jazzfog/UpMerge'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-UPMERGE-174133'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/809'}]","{'cwe_ids': ['CWE-345', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-06T10:04:57Z', 'nvd_published_at': None}" +1.4.0,GHSA-mh37-8c3g-3fgc,2023-08-28T13:22:21Z,2019-06-20T16:06:00Z,,['CVE-2019-8322'],RubyGems Escape sequence injection vulnerability in gem owner,"An issue was discovered in RubyGems 2.6 and later through 3.0.2. The gem owner command outputs the contents of the API response directly to stdout. Therefore, if the response is crafted, escape sequence injection may occur.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'rubygems-update'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.7.9'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rubygems-update'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8322'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/315087'}, {'type': 'WEB', 'url': 'https://blog.rubygems.org/2019/03/05/security-advisories-2019-03.html'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rubygems-update/CVE-2019-8322.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/08/msg00027.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html'}]","{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-20T16:00:00Z', 'nvd_published_at': None}" +1.4.0,GHSA-xc7v-wxcw-j472,2020-08-31T18:29:19Z,2019-06-03T17:08:26Z,,[],Memory Exposure in tunnel-agent,"Versions of `tunnel-agent` before 0.6.0 are vulnerable to memory exposure. + +This is exploitable if user supplied input is provided to the auth value and is a number. + +Proof-of-concept: +```js +require('request')({ + method: 'GET', + uri: 'http://www.example.com', + tunnel: true, + proxy:{ + protocol: 'http:', + host:'127.0.0.1', + port:8080, + auth:USERSUPPLIEDINPUT // number + } +}); +``` + + +## Recommendation + +Update to version 0.6.0 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'tunnel-agent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/request/tunnel-agent/commit/9ca95ec7219daface8a6fc2674000653de0922c0'}, {'type': 'WEB', 'url': 'https://gist.github.com/ChALkeR/fd6b2c445834244e7d440a043f9d2ff4'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/598'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-03T17:08:06Z', 'nvd_published_at': None}" +1.4.0,GHSA-8v5f-hp78-jgxq,2020-08-31T18:37:26Z,2019-06-06T15:30:33Z,,[],Signature Verification Bypass in jwt-simple,"Versions of `jwt-simple` prior to 0.5.3 are vulnerable to Signature Verification Bypass. If no algorithm is specified in the `decode()` function, the packages uses the algorithm in the JWT to decode tokens. This allows an attacker to create a HS256 (symmetric algorithm) JWT with the server's public key as secret, and the package will verify it as HS256 instead of RS256 (asymmetric algorithm). + + +## Recommendation + +Upgrade to version 0.5.3 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'jwt-simple'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/hokaccha/node-jwt-simple/commit/ead36e1d687645da9c3be8befdaaef622ea33106'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/831'}]","{'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-06T09:42:36Z', 'nvd_published_at': None}" +1.4.0,GHSA-xggx-fx6w-v7ch,2021-08-04T20:41:46Z,2019-06-04T15:42:15Z,,['CVE-2019-3802'],Improper Neutralization of Wildcards or Matching Symbols,"This affects Spring Data JPA in versions up to and including 2.1.6, 2.0.14 and 1.11.20. ExampleMatcher using ExampleMatcher.StringMatcher.STARTING, ExampleMatcher.StringMatcher.ENDING or ExampleMatcher.StringMatcher.CONTAINING could return more results than anticipated when a maliciously crafted example value is supplied.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.data:spring-data-jpa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.data:spring-data-jpa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.14'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.data:spring-data-jpa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.22'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3802'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2019-3802'}]","{'cwe_ids': ['CWE-155', 'CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-04T15:38:52Z', 'nvd_published_at': '2019-06-03T14:29:00Z'}" +1.4.0,GHSA-38cg-gg9j-q9j9,2021-08-17T15:33:33Z,2019-06-27T17:25:57Z,,['CVE-2019-3875'],Improper Certificate Validation and Insufficient Verification of Data Authenticity in Keycloak,"A vulnerability was found in keycloak before 6.0.2. The X.509 authenticator supports the verification of client certificates through the CRL, where the CRL list can be obtained from the URL provided in the certificate itself (CDP) or through the separately configured path. The CRL are often available over the network through unsecured protocols ('http' or 'ldap') and hence the caller should verify the signature and possibly the certification path. Keycloak currently doesn't validate signatures on CRL, which can result in a possibility of various attacks like man-in-the-middle.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3875'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3875'}]","{'cwe_ids': ['CWE-295', 'CWE-345'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-27T15:43:10Z', 'nvd_published_at': '2019-06-12T14:29:00Z'}" +1.4.0,GHSA-cff4-rrq6-h78w,2020-08-31T18:31:41Z,2019-06-03T17:31:26Z,,[],Command Injection in command-exists,"Versions of `command-exists` before 1.2.4 are vulnerable to command injection. This is exploitable if user input is provided to this module. + + +## Recommendation + +Update to version 1.2.4 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'command-exists'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/mathisonian/command-exists/commit/7ca91ba71604df6817a28c93d7776af9c49c431a'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/324453'}, {'type': 'WEB', 'url': 'https://github.com/mathisonian/command-exists/blob/v1.2.2/lib/command-exists.js#L49-L94'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/659'}]","{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-06-03T17:28:56Z', 'nvd_published_at': None}" +1.4.0,GHSA-pgcr-7wm4-mcv6,2021-08-04T21:28:00Z,2019-06-04T15:42:45Z,,[],Sensitive Data Exposure in pem,"Versions of `pem` before 1.13.2 expose sensitive data when the `readPkcs12` is used. + +The `readPkcs12` function reads the certificate and key data from a pkcs12 file using the encryption password. As part of this process it creates a globally readable file with a filename of 20 random 0-f characters in the temporary directory containing the password which is then read by OpenSSL. The file containing the password is never cleaned up after it is used giving access to the pkcs12 password to any other users with access to read files from the system. + + + +## Recommendation + +Update to version 1.13.2 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'pem'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/Dexus/pem/pull/217'}, {'type': 'WEB', 'url': 'https://github.com/Dexus/pem/commit/bed1190e4a08692ac903ae6043489f1f76bc67eb'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-PEM-173687'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/723'}]","{'cwe_ids': ['CWE-200'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-06-04T15:41:30Z', 'nvd_published_at': None}" +1.4.0,GHSA-hwcx-9p4j-7hwj,2021-08-16T15:20:04Z,2019-06-13T20:22:30Z,,['CVE-2019-5442'],XML Entity Expansion in Pippo,"XML Entity Expansion (Billion Laughs Attack) on Pippo 1.12.0 results in Denial of Service.Entities are created recursively and large amounts of heap memory is taken. Eventually, the JVM process will run out of memory. Otherwise, if the OS does not bound the memory on that process, memory will continue to be exhausted and will affect other processes on the system.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'ro.pippo:pippo-jaxb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.12.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5442'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/506791'}]","{'cwe_ids': ['CWE-776'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-13T20:22:17Z', 'nvd_published_at': '2019-06-12T16:29:00Z'}" +1.4.0,GHSA-w7q7-vjp8-7jv4,2020-08-31T18:36:13Z,2019-06-06T15:30:16Z,,[],SQL Injection in typeorm,"Versions of `typeorm` before 0.1.15 are vulnerable to SQL Injection. Field names are not properly validated allowing attackers to inject SQL statements and execute arbitrary SQL queries. + + +## Recommendation + +Upgrade to version 0.1.15",[],"[{'package': {'ecosystem': 'npm', 'name': 'typeorm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.15'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/typeorm/typeorm/commit/d46c8b0e6c0db56bb5976a4917e9f67a43715111'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/319458'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/800'}]","{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-05T21:25:43Z', 'nvd_published_at': None}" +1.4.0,GHSA-j9f8-8h89-j69x,2021-08-04T21:06:49Z,2019-06-11T16:16:34Z,,[],Remote Code Execution in node-os-utils,"Versions of `node-os-utils` prior to 1.1.0 are vulnerable to Remote Code Execution. Due to insufficient input validation an attacker could run arbitrary commands on the server thus rendering the package vulnerable to Remote Code Execution. + + +## Recommendation + +Upgrade to version 1.1.0 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'node-os-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/SunilWang/node-os-utils/issues/2'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NODEOSUTILS-173696'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/784'}]","{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-11T16:08:05Z', 'nvd_published_at': None}" +1.4.0,GHSA-3h4r-pjv6-cph9,2023-08-28T13:23:44Z,2019-06-20T16:05:57Z,,['CVE-2019-8323'],RubyGems Escape sequence injection vulnerability in api response handling,"An issue was discovered in RubyGems 2.6 and later through 3.0.2. Gem::GemcutterUtilities#with_response may output the API response to stdout as it is. Therefore, if the API side modifies the response, escape sequence injection may occur.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'rubygems-update'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.7.9'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rubygems-update'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8323'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/315081'}, {'type': 'WEB', 'url': 'https://blog.rubygems.org/2019/03/05/security-advisories-2019-03.html'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rubygems-update/CVE-2019-8323.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/08/msg00027.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html'}]","{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-20T15:59:33Z', 'nvd_published_at': None}" +1.4.0,GHSA-p426-qw2p-v95v,2021-08-17T14:51:31Z,2019-06-26T01:09:35Z,,['CVE-2017-15694'],Argument Injection in Apache Geode server,"When an Apache Geode server versions 1.0.0 to 1.8.0 is operating in secure mode, a user with write permissions for specific data regions can modify internal cluster metadata. A malicious user could modify this data in a way that affects the operation of the cluster.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.geode:geode-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15694'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/311505e7b7a045aaa246f0a1935703acacf41b954621b1363c40bf6f@%3Cuser.geode.apache.org%3E'}]","{'cwe_ids': ['CWE-88'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-26T00:48:24Z', 'nvd_published_at': '2019-06-21T16:15:00Z'}" +1.4.0,GHSA-c35v-qwqg-87jc,2022-08-03T16:27:53Z,2019-06-06T15:32:32Z,,[],express-basic-auth Timing Attack due to native string comparison instead of constant time string comparison,"Versions of `express-basic-auth` prior to 1.1.7 are vulnerable to Timing Attacks. The package uses native string comparison instead of a constant time string comparison, which may lead to Timing Attacks. Timing Attacks can be used to increase the efficiency of brute-force attacks by removing the exponential increase in entropy gained from longer secrets. + + +## Recommendation + +Upgrade to version 1.1.7 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'express-basic-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.7'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/webpack-contrib/webpack-bundle-analyzer/issues/263'}, {'type': 'WEB', 'url': 'https://github.com/LionC/express-basic-auth/pull/20'}, {'type': 'WEB', 'url': 'https://github.com/LionC/express-basic-auth/pull/21'}, {'type': 'WEB', 'url': 'https://github.com/LionC/express-basic-auth/commit/00bb29fdd638f5cda8025d4398be97d528ce3f6f'}, {'type': 'PACKAGE', 'url': 'https://github.com/LionC/express-basic-auth'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-EXPRESSBASICAUTH-174345'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/827'}]","{'cwe_ids': ['CWE-208'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2019-06-06T09:51:04Z', 'nvd_published_at': None}" +1.4.0,GHSA-2pr6-76vf-7546,2021-08-04T21:32:56Z,2019-06-05T14:35:29Z,,[],Denial of Service in js-yaml,"Versions of `js-yaml` prior to 3.13.0 are vulnerable to Denial of Service. By parsing a carefully-crafted YAML file, the node process stalls and may exhaust system resources leading to a Denial of Service. + + +## Recommendation + +Upgrade to version 3.13.0.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'js-yaml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.13.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/nodeca/js-yaml/issues/475'}, {'type': 'WEB', 'url': 'https://github.com/nodeca/js-yaml/commit/a567ef3c6e61eb319f0bfc2671d91061afb01235'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-JSYAML-173999'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/788'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/788/versions'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-05T13:52:07Z', 'nvd_published_at': None}" +1.4.0,GHSA-v33x-prhc-gph5,2021-06-09T20:12:57Z,2019-06-27T17:24:58Z,,['CVE-2019-11272'],Insufficiently Protected Credentials and Improper Authentication in Spring Security,"Spring Security, versions 4.2.x up to 4.2.12, and older unsupported versions support plain text passwords using PlaintextPasswordEncoder. If an application using an affected version of Spring Security is leveraging PlaintextPasswordEncoder and a user has a null encoded password, a malicious user (or attacker) can authenticate using a password of ?null?.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.13'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.12'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-cas'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.13.RELEASE'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.12.RELEASE'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11272'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/07/msg00008.html'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2019-11272'}]","{'cwe_ids': ['CWE-287', 'CWE-522'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-27T17:23:36Z', 'nvd_published_at': '2019-06-26T14:15:00Z'}" +1.4.0,GHSA-22mf-97vh-x8rw,2021-12-03T14:35:56Z,2019-06-13T16:12:57Z,2019-07-03T16:48:55Z,['CVE-2019-12760'],TODO,"** DISPUTED ** A deserialization vulnerability exists in the way parso through 0.4.0 handles grammar parsing from the cache. Cache loading relies on pickle and, provided that an evil pickle can be written to a cache grammar file and that its parsing can be triggered, this flaw leads to Arbitrary Code Execution. NOTE: This is disputed because ""the cache directory is not under control of the attacker in any common configuration.""",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'parso'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12760'}, {'type': 'WEB', 'url': 'https://gist.github.com/dhondta/f71ae7e5c4234f8edfd2f12503a5dcc7'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-13T15:48:35Z', 'nvd_published_at': '2019-06-06T19:29:00Z'}" +1.4.0,GHSA-46hv-7769-j7rx,2023-09-07T21:43:42Z,2019-06-13T16:12:22Z,,['CVE-2019-5437'],Unauthorized File Access in harp,"Affected versions of `harp` are vulnerable to Unauthorized File Access. The package states that it ignores files and directories with names that start with an underscore, such as `_secret-folder`. If the underscore character is URL encoded the server delivers the file. + +## Recommendation + +Upgrade to version `0.40.2` or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'harp'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.40.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5437'}, {'type': 'WEB', 'url': 'https://github.com/sintaxi/harp/commit/1ec790baeeb2bfdb4584f1998af3d10a8fa31210'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/453820'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/807'}]","{'cwe_ids': ['CWE-548'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-13T16:10:40Z', 'nvd_published_at': None}" +1.4.0,GHSA-h6ch-v84p-w6p9,2021-02-24T19:27:02Z,2019-06-13T18:58:54Z,,[],Regular Expression Denial of Service (ReDoS),"A vulnerability was found in diff before v3.5.0, the affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) attacks.",[],"[{'package': {'ecosystem': 'npm', 'name': 'diff'}, 'ecosystem_specific': {'affected_functions': ['diff.parsePatch']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/kpdecker/jsdiff/commit/2aec4298639bf30fb88a00b356bf404d3551b8c0'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1552148'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:diff:20180305'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1631'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vulnerability-database/WS-2018-0590'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-13T18:54:38Z', 'nvd_published_at': None}" +1.4.0,GHSA-g95f-p29q-9xw4,2021-08-04T21:35:07Z,2019-06-06T15:30:30Z,,[],Regular Expression Denial of Service in braces,"Versions of `braces` prior to 2.3.1 are vulnerable to Regular Expression Denial of Service (ReDoS). Untrusted input may cause catastrophic backtracking while matching regular expressions. This can cause the application to be unresponsive leading to Denial of Service. + + +## Recommendation + +Upgrade to version 2.3.1 or higher.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'braces'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/micromatch/braces/commit/abdafb0cae1e0c00f184abbadc692f4eaa98f451'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:braces:20180219'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/786'}]","{'cwe_ids': ['CWE-185', 'CWE-400'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2019-06-06T09:40:51Z', 'nvd_published_at': None}" +1.4.0,GHSA-86p3-4gfq-38f2,2021-08-04T21:31:03Z,2019-06-05T14:10:34Z,,[],Denial of Service in url-relative,"All versions of `url-relative` are vulnerable to Denial of Service. If the values `to` and `from` are equal, the function hangs and never returns. This may cause a Denial of Service. + + +## Recommendation + +No fix is currently available. Consider using an alternative module until a fix is made available.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'url-relative'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/junosuarez/url-relative/issues/3'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-URLRELATIVE-173691'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/783'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-05T13:46:47Z', 'nvd_published_at': None}" +1.4.0,GHSA-8f93-rv4p-x4jw,2020-08-31T18:31:48Z,2019-06-12T16:36:52Z,,[],SQL Injection in sql,"All versions of `sql` are vulnerable to sql injection as it does not properly escape parameters when building SQL queries. + + +## Recommendation + +No fix is currently available for this vulnerability. It is our recommendation to not install or use this module until a fix is available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'sql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.78.0'}]}]}]","[{'type': 'WEB', 'url': 'https://hackerone.com/reports/319465'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/662'}]","{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-12T16:36:34Z', 'nvd_published_at': None}" +1.4.0,GHSA-hp5r-mhgp-56c9,2021-08-04T20:00:07Z,2019-06-06T15:29:29Z,,['CVE-2019-10078'],Cross-site Scriptin in JSPWiki,"A carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki 2.9.0 to 2.11.0.M3, which could lead to session hijacking. Initial reporting indicated ReferredPagesPlugin, but further analysis showed that multiple plugins were vulnerable.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.jspwiki:jspwiki-war'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.11.0.M4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.11.0.M3'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.jspwiki:jspwiki-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.11.0.M4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.11.0.M3'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10078'}, {'type': 'WEB', 'url': 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-10078'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-29T19:05:49Z', 'nvd_published_at': '2019-05-20T21:29:00Z'}" +1.4.0,GHSA-rv49-54qp-fw42,2020-08-31T18:36:18Z,2019-06-06T15:30:20Z,,[],Path Traversal in servey,"Versions of `servey` prior to 3.x are vulnerable to Path Traversal. Due to insufficient input sanitization, attackers can access server files by using relative paths. + + +## Recommendation + +Upgrade to the latest version",[],"[{'package': {'ecosystem': 'npm', 'name': 'servey'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/typeorm/typeorm/commit/d46c8b0e6c0db56bb5976a4917e9f67a43715111'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/355501'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/802'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-06T08:47:21Z', 'nvd_published_at': None}" +1.4.0,GHSA-f7r3-p866-q9qr,2022-08-03T16:34:42Z,2019-06-03T17:27:49Z,,[],ircdkit vulnerable to Denial of Service due to unhandled connection end event,"Versions of `ircdkit` 1.0.3 and prior are vulnerable to a remote denial of service. + + +## Recommendation + +Upgrade to version 1.0.4.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'ircdkit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.3'}}]","[{'type': 'WEB', 'url': 'https://github.com/Twipped/ircdkit/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/Twipped/ircdkit/pull/2/commits/595ed02cde517fad57854d2ac2855a09a626e665'}, {'type': 'WEB', 'url': 'https://github.com/Twipped/ircdkit/commit/f0cc6dc913ec17b499fa33a676bb72c624456f2c'}, {'type': 'PACKAGE', 'url': 'https://github.com/Twipped/ircdkit'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-IRCDKIT-173688'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/735'}]","{'cwe_ids': ['CWE-400'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2019-06-03T17:27:33Z', 'nvd_published_at': None}" +1.4.0,GHSA-xm7f-x4wx-wmgv,2020-08-31T18:31:36Z,2019-06-04T15:47:43Z,,[],Out-of-bounds Read in byte,"Versions of `byte` before 1.4.1 allocate uninitialized buffers and read data from them past the initialized length + + + +## Recommendation + +Update to version 1.4.1 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'byte'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/node-modules/byte/pull/3'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/330351'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/657'}]","{'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-04T15:47:01Z', 'nvd_published_at': None}" +1.4.0,GHSA-7rp2-fm2h-wchj,2023-09-05T13:11:53Z,2019-06-10T18:43:25Z,,['CVE-2019-12308'],Django Cross-site Scripting in AdminURLFieldWidget,"An issue was discovered in Django 1.11 before 1.11.21, 2.1 before 2.1.9, and 2.2 before 2.2.2. The clickable Current URL value displayed by the AdminURLFieldWidget displays the provided value without validating it as a safe URL. Thus, an unvalidated value stored in the database, or a value provided as a URL query parameter payload, could result in an clickable JavaScript link.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.21'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.9'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12308'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/dev/releases/1.11.21/'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/dev/releases/2.1.9/'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/dev/releases/2.2.2/'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/dev/releases/security/'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/django-announce/GEbHU7YoVz8'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2019/jun/03/security-releases/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/06/03/2'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-10T18:41:42Z', 'nvd_published_at': '2019-06-03T17:29:00Z'}" +1.4.0,GHSA-83rx-c8cr-6j8q,2021-08-04T21:33:58Z,2019-06-05T20:48:55Z,,[],Insecure Default Configuration in tesseract.js,"Versions of `tesseract.js` prior to 1.0.19 default to using a third-party proxy. Requests may be proxied through `crossorigin.me` which clearly states is not suitable for production use. This may lead to instability and privacy violations. + + +## Recommendation + +Upgrade to version 1.0.19 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'tesseract.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.19'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/naptha/tesseract.js/pull/267'}, {'type': 'WEB', 'url': 'https://github.com/naptha/tesseract.js/commit/679eba055f2a4271558e86beec3d1b70cae3fb28'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-TESSERACTJS-174085'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/792'}]","{'cwe_ids': ['CWE-829'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-05T20:48:43Z', 'nvd_published_at': None}" +1.4.0,GHSA-w457-6q6x-cgp9,2022-06-06T17:16:15Z,2019-12-26T17:58:13Z,,['CVE-2019-19919'],Prototype Pollution in handlebars,"Versions of `handlebars` prior to 3.0.8 or 4.3.0 are vulnerable to Prototype Pollution leading to Remote Code Execution. Templates may alter an Objects' `__proto__` and `__defineGetter__` properties, which may allow an attacker to execute arbitrary code through crafted payloads. + + +## Recommendation + +Upgrade to version 3.0.8, 4.3.0 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'handlebars'}, 'ecosystem_specific': {'affected_functions': ['handlebars.compile']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19919'}, {'type': 'WEB', 'url': 'https://github.com/wycats/handlebars.js/issues/1558'}, {'type': 'WEB', 'url': 'https://github.com/wycats/handlebars.js/commit/2078c727c627f25d4a149962f05c1e069beb18bc'}, {'type': 'WEB', 'url': 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19919'}, {'type': 'PACKAGE', 'url': 'https://github.com/wycats/handlebars.js'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1164'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2021-14'}]","{'cwe_ids': ['CWE-1321', 'CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-12-26T17:55:40Z', 'nvd_published_at': '2019-12-20T23:15:00Z'}" +1.4.0,GHSA-24r8-fm9r-cpj2,2021-01-08T20:10:19Z,2019-12-05T18:40:51Z,,['CVE-2019-16771'],Low severity vulnerability that affects com.linecorp.armeria:armeria,"## Multiple timing attack vulnerabilities leading to the recovery of secrets based on the use of non-constant time compare function + +### Impact + +String comparison method in multiple authentication validation in Armeria were known to be vulnerable to timing attacks. This vulnerability is caused by the insecure implementation of `equals` method from `java.lang.String`. While this attack is not practically possible, an attacker still has a potential to attack if the victim's server validates user by using `equals` method. + +We would like to thank @chrsow for pointing out the issue. + +## Potentially vulnerable codes + +https://github.com/line/armeria/blob/f0d870fde1088114070be31b67f7df0a21e835c6/core/src/main/java/com/linecorp/armeria/server/auth/OAuth2Token.java#L54 +https://github.com/line/armeria/blob/f0d870fde1088114070be31b67f7df0a21e835c6/core/src/main/java/com/linecorp/armeria/server/auth/BasicToken.java#L64 + +### Patches + +There are two options to patch this issue. + +1. Remove `equals` method; it has been exclusively used for test cases and was never used in any OSS projects that are using Armeria. (But it is worth noting that there are possibilities of closed projects authenticating users by utilizing `equals` method) + +2. Use `MessageDigest.isEqual` to compare the credential instead. + +### Workarounds + +1. Update to the latest version (TBD) + +2-1. Users can prevent these vulnerabilities by modifying and implementing timing attack preventions by themselves. + +2-2. Precisely speaking, it is possible to compare credentials by securely comparing them after calling methods to directly return the input (namely `Object. accessToken()`, `Object.username()` and `Object.password()`). + +### References +- https://cwe.mitre.org/data/definitions/208.html +- https://security.stackexchange.com/questions/111040/should-i-worry-about-remote-timing-attacks-on-string-comparison + +### Side Note + +Since it is a theoretical attack, there is no PoC available from neither the vendor nor the security team.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.linecorp.armeria:armeria'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.97.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/line/armeria/security/advisories/GHSA-24r8-fm9r-cpj2'}, {'type': 'WEB', 'url': 'https://github.com/line/armeria/security/advisories/GHSA-35fr-h7jr-hh86'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16771'}, {'type': 'WEB', 'url': 'https://github.com/line/armeria/commit/b597f7a865a527a84ee3d6937075cfbb4470ed20'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-24r8-fm9r-cpj2'}]","{'cwe_ids': ['CWE-113'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:51:26Z', 'nvd_published_at': None}" +1.4.0,GHSA-wjx8-cgrm-hh8p,2023-04-25T16:32:33Z,2019-12-17T22:53:10Z,,['CVE-2019-19745'],Unrestricted file uploads in Contao,"### Impact + +A back end user with access to the form generator can upload arbitrary files and execute them on the server. + +### Patches + +Update to Contao 4.4.46 or 4.8.6. + +### Workarounds + +Configure your web server so it does not execute PHP files and other scripts in the Contao file upload directory. + +### References + +https://contao.org/en/security-advisories/unrestricted-file-uploads + +### For more information + +If you have any questions or comments about this advisory, open an issue in [contao/contao](https://github.com/contao/contao/issues/new/choose). +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'contao/core-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.4.46'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'contao/core-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.5.0'}, {'fixed': '4.8.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/contao/contao/security/advisories/GHSA-wjx8-cgrm-hh8p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19745'}, {'type': 'WEB', 'url': 'https://contao.org/en/news.html'}, {'type': 'WEB', 'url': 'https://contao.org/en/security-advisories/unrestricted-file-uploads.html'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/contao/core-bundle/CVE-2019-19745.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/contao/contao'}]","{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-12-17T19:42:31Z', 'nvd_published_at': None}" +1.4.0,GHSA-3fjq-93xj-3f3f,2021-01-08T20:02:20Z,2019-12-06T23:20:26Z,,['CVE-2019-16772'],Cross-Site Scripting in serialize-to-js,"Versions of `serialize-to-js` prior to 3.0.1 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize serialized regular expressions. This vulnerability does not affect Node.js applications. + + +## Recommendation + +Upgrade to version 3.0.1 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'serialize-to-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/commenthol/serialize-to-js/security/advisories/GHSA-3fjq-93xj-3f3f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16772'}, {'type': 'WEB', 'url': 'https://github.com/commenthol/serialize-to-js/commit/181d7d583ae5293cd47cc99b14ad13352875f3e3'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3fjq-93xj-3f3f'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1429'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:55:02Z', 'nvd_published_at': None}" +1.4.0,GHSA-pg36-wpm5-g57p,2022-04-25T23:10:28Z,2019-12-20T23:03:57Z,,['CVE-2019-16785'],HTTP Request Smuggling: LF vs CRLF handling in Waitress,"### Impact + +Waitress implemented a &quot;MAY&quot; part of the RFC7230 (https://tools.ietf.org/html/rfc7230#section-3.5) which states: + + Although the line terminator for the start-line and header fields is + the sequence CRLF, a recipient MAY recognize a single LF as a line + terminator and ignore any preceding CR. + +Unfortunately if a front-end server does not parse header fields with an LF the same way as it does those with a CRLF it can lead to the front-end and the back-end server parsing the same HTTP message in two different ways. This can lead to a potential for HTTP request smuggling/splitting whereby Waitress may see two requests while the front-end server only sees a single HTTP message. + +Example: + +``` +Content-Length: 100[CRLF] +X-Header: x[LF]Content-Length: 0[CRLF] +``` + +Would get treated by Waitress as if it were: + +``` +Content-Length: 100 +X-Header: x +Content-Length: 0 +``` + +This could potentially get used by attackers to split the HTTP request and smuggle a second request in the body of the first. + + +### Patches + +This issue is fixed in Waitress 1.4.0. This brings a range of changes to harden Waitress against potential HTTP request confusions, and may change the behaviour of Waitress behind non-conformist proxies. + +Waitress no longer implements the MAY part of the specification and instead requires that all lines are terminated correctly with CRLF. If any lines are found with a bare CR or LF a 400 Bad Request is sent back to the requesting entity. + +The Pylons Project recommends upgrading as soon as possible, while validating that the changes in Waitress don&#39;t cause any changes in behavior. + +### Workarounds + +Various reverse proxies may have protections against sending potentially bad HTTP requests to the backend, and or hardening against potential issues like this. If the reverse proxy doesn&#39;t use HTTP/1.1 for connecting to the backend issues are also somewhat mitigated, as HTTP pipelining does not exist in HTTP/1.0 and Waitress will close the connection after every single request (unless the Keep Alive header is explicitly sent... so this is not a fool proof security method) + +### Issues/more security issues: + +* open an issue at https://github.com/Pylons/waitress/issues (if not sensitive or security related) +* email the Pylons Security mailing list: pylons-project-security@googlegroups.com (if security related)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'waitress'}, 'ecosystem_specific': {'affected_functions': ['waitress.parser.HTTPRequestParser.parse_header', 'waitress.parser.get_header_lines', 'waitress.receiver.ChunkedReceiver', 'waitress.receiver.ChunkedReceiver.received']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/security/advisories/GHSA-pg36-wpm5-g57p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16785'}, {'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/commit/8eba394ad75deaf9e5cd15b78a3d16b12e6b0eba'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0720'}, {'type': 'WEB', 'url': 'https://docs.pylonsproject.org/projects/waitress/en/latest/#security-fixes'}, {'type': 'PACKAGE', 'url': 'https://github.com/Pylons/waitress'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/05/msg00011.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GVDHR2DNKCNQ7YQXISJ45NT4IQDX3LJ7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYEOTGWJZVKPRXX2HBNVIYWCX73QYPM5/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}]","{'cwe_ids': ['CWE-444'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-12-20T23:01:44Z', 'nvd_published_at': '2019-12-20T23:15:00Z'}" +1.4.0,GHSA-xhh6-956q-4q69,2021-07-28T16:28:00Z,2019-12-02T18:08:19Z,,['CVE-2019-18888'],Argument injection in a MimeTypeGuesser in Symfony,"An issue was discovered in Symfony 2.8.0 through 2.8.50, 3.4.0 through 3.4.34, 4.2.0 through 4.2.11, and 4.3.0 through 4.3.7. If an application passes unvalidated user input as the file for which MIME type validation should occur, then arbitrary arguments are passed to the underlying file command. This is related to symfony/http-foundation (and symfony/mime in 4.3.x).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/http-foundation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.8.52'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/http-foundation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.35'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/http-foundation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.2.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/http-foundation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/mime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.8.52'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.35'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.2.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-18888'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/http-foundation/CVE-2019-18888.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/mime/CVE-2019-18888.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-18888.yaml'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/releases/tag/v4.3.8'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZNXRVHDQBNZQUCNRVZICPPBFRAUWUJX/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UED22BOXTL2SSFMGYKA64ZFHGLLJG3EA/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXEAOEANNIVYANTMOJ42NKSU6BGNBULZ/'}, {'type': 'WEB', 'url': 'https://symfony.com/blog/cve-2019-18888-prevent-argument-injection-in-a-mimetypeguesser'}, {'type': 'WEB', 'url': 'https://symfony.com/blog/symfony-4-3-8-released'}, {'type': 'WEB', 'url': 'https://symfony.com/cve-2019-18888'}]","{'cwe_ids': ['CWE-20', 'CWE-88'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-12-01T19:46:13Z', 'nvd_published_at': '2019-11-21T23:15:00Z'}" +1.4.0,GHSA-3r8j-pmch-5j2h,2021-01-08T21:20:32Z,2019-12-05T19:57:04Z,,['CVE-2019-16768'],Internal exception message exposure for login action in Sylius,"## Internal exception message exposure for login action + +### Impact +Exception messages from internal exceptions (like database exception) are wrapped by `\Symfony\Component\Security\Core\Exception\AuthenticationServiceException` and propagated through the system to UI. Therefore, some internal system information may leak and be visible to the customer. + +A validation message with the exception details will be presented to the user when one will try to log into the shop. + +### Patches +_Has the problem been patched? What versions should users upgrade to?_ + +### Workarounds +The `src/Sylius/Bundle/UiBundle/Resources/views/Security/_login.html.twig` file should be overridden and lines https://github.com/Sylius/Sylius/blob/1.4/src/Sylius/Bundle/UiBundle/Resources/views/Security/_login.html.twig#L13-L17 should be replaced with +```twig + {% if last_error %} +
+ {{ messages.error(last_error.messageKey) }} +
+ {% endif %} +``` + +The `messageKey` field should be used instead of the `message`.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'sylius/sylius'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.14'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/sylius'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/sylius'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/sylius'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '1.6.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/Sylius/Sylius/security/advisories/GHSA-3r8j-pmch-5j2h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16768'}, {'type': 'WEB', 'url': 'https://github.com/Sylius/Sylius/commit/be245302dfc594d8690fe50dd47631d186aa945f'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3r8j-pmch-5j2h'}]","{'cwe_ids': ['CWE-209'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:06Z', 'nvd_published_at': None}" +1.4.0,GHSA-5pm8-492c-92p5,2023-01-26T20:23:44Z,2019-12-02T18:04:11Z,,['CVE-2019-18841'],Prototype Pollution in chartkick,"Affected versions of `@polymer/polymer` are vulnerable to prototype pollution. The package fails to prevent modification of object prototypes through chart options containing a payload such as `{""__proto__"": {""polluted"": true}}`. It is possible to achieve the same results if a chart loads data from a malicious server. + + +## Recommendation + +Upgrade to version 3.2.0 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'chartkick'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'chartkick'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.2.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.1.3'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-18841'}, {'type': 'WEB', 'url': 'https://github.com/ankane/chartkick.js/issues/117'}, {'type': 'WEB', 'url': 'https://github.com/ankane/chartkick/commit/b810936bbf687bc74c5b6dba72d2397a399885fa'}, {'type': 'WEB', 'url': 'https://chartkick.com'}, {'type': 'WEB', 'url': 'https://github.com/ankane/chartkick/blob/master/CHANGELOG.md'}, {'type': 'WEB', 'url': 'https://github.com/ankane/chartkick/commits/master'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/chartkick/CVE-2019-18841.yml'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/chartkick/'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-11-27T02:43:23Z', 'nvd_published_at': '2019-11-11T01:15:00Z'}" +1.4.0,GHSA-3c45-wgjp-7v9r,2023-08-31T09:50:49Z,2019-12-17T22:52:34Z,,['CVE-2014-7143'],Python Twisted trustRoot is not respected in HTTP client,Python Twisted 14.0.0 `trustRoot` is not respected in HTTP client,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'twisted'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0.0'}, {'fixed': '14.0.1'}]}], 'versions': ['14.0.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-7143'}, {'type': 'WEB', 'url': 'https://github.com/twisted/twisted/commit/3b5942252f5f3e45862a0e12b266ab29e243cc33'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-7143'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/96135'}, {'type': 'PACKAGE', 'url': 'https://github.com/twisted/twisted'}, {'type': 'WEB', 'url': 'https://security-tracker.debian.org/tracker/CVE-2014-7143'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/09/22/2'}]","{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-12-17T01:47:21Z', 'nvd_published_at': None}" +1.4.0,GHSA-hvmf-r92r-27hr,2021-08-19T16:04:59Z,2019-12-04T21:26:28Z,,['CVE-2019-19118'],Django allows unintended model editing,"Django 2.1 before 2.1.15 and 2.2 before 2.2.8 allows unintended model editing. A Django model admin displaying inline related models, where the user has view-only permissions to a parent model but edit permissions to the inline model, would be presented with an editing UI, allowing POST requests, for updating the inline model. Directly editing the view-only parent model was not possible, but the parent model's save() method was called, triggering potential side effects, and causing pre and post-save signal handlers to be invoked. (To resolve this, the Django admin is adjusted to require edit permissions on the parent model in order for inline models to be editable.)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.15'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19118'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/103ebe2b5ff1b2614b85a52c239f471904d26244'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/36f580a17f0b3cb087deadf3b65eea024f479c21'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/dev/releases/security/'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/django-announce/GjGqDvtNmWQ'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6R4HD22PVEVQ45H2JA2NXH443AYJOPL5/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202004-17'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20191217-0003/'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2019/dec/02/security-releases/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/12/02/1'}]","{'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-04T19:44:26Z', 'nvd_published_at': None}" +1.4.0,GHSA-v63x-xc9j-hhvq,2021-07-28T16:43:29Z,2019-12-11T02:01:44Z,,['CVE-2019-10769'],Sandbox Breakout / Arbitrary Code Execution in safer-eval,"All versions of `safer-eval` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context and is not suited to process arbitrary user input. This may allow attackers to execute arbitrary code in the system. + + +## Recommendation + +The package is not meant to receive user input. Consider using an alternative package until a fix is made available.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'safer-eval'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/commenthol/safer-eval/security/advisories/GHSA-v63x-xc9j-hhvq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10769'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-v63x-xc9j-hhvq'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SAFEREVAL-534901'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1428'}]","{'cwe_ids': ['CWE-20', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:57Z', 'nvd_published_at': '2019-12-06T23:15:00Z'}" +1.4.0,GHSA-x92h-wmg2-6hp7,2021-08-19T15:18:27Z,2019-12-02T18:10:24Z,,['CVE-2019-10913'],Invalid HTTP method overrides allow possible XSS or other attacks in Symfony,"In Symfony before 2.7.51, 2.8.x before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, HTTP Methods provided as verbs or using the override header may be treated as trusted input, but they are not validated, possibly causing SQL injection or XSS. This is related to symfony/http-foundation.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/http-foundation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.51'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/http-foundation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.50'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/http-foundation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.26'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/http-foundation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/http-foundation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.51'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.50'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.26'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10913'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/commit/944e60f083c3bffbc6a0b5112db127a10a66a8ec'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/http-foundation/CVE-2019-10913.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10913.yaml'}, {'type': 'WEB', 'url': 'https://symfony.com/blog/cve-2019-10913-reject-invalid-http-method-overrides'}, {'type': 'WEB', 'url': 'https://symfony.com/cve-2019-10913'}]","{'cwe_ids': ['CWE-79', 'CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-12-01T19:49:35Z', 'nvd_published_at': None}" +1.4.0,GHSA-2mrj-435v-c2cr,2020-06-16T20:41:51Z,2019-12-02T18:15:31Z,2020-06-16T20:15:24Z,[],possible DoS caused by malformed signature decoding in Pure-Python ECDSA,**Withdrawn:** Duplicate of GHSA-pwfw-mgfj-7g3g.,[],"[{'package': {'ecosystem': 'PyPI', 'name': 'ecdsa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14853'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14853'}, {'type': 'WEB', 'url': 'https://github.com/warner/python-ecdsa/releases/tag/python-ecdsa-0.13.3'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Dec/33'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4588'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-02T01:15:50Z', 'nvd_published_at': None}" +1.4.0,GHSA-4328-8hgf-7wjr,2022-08-11T00:00:45Z,2019-12-13T15:39:32Z,,['CVE-2019-16777'],npm Vulnerable to Global node_modules Binary Overwrite,"Versions of the npm CLI prior to 6.13.4 are vulnerable to a Global node_modules Binary Overwrite. It fails to prevent existing globally-installed binaries to be overwritten by other package installations. + +For example, if a package was installed globally and created a `serve` binary, any subsequent installs of packages that also create a `serve` binary would overwrite the first binary. This will not overwrite system binaries but only binaries put into the global node_modules directory. + +This behavior is still allowed in local installations and also through install scripts. This vulnerability bypasses a user using the --ignore-scripts install option. + + +## Recommendation + +Upgrade to version 6.13.4 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'npm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.13.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/npm/cli/security/advisories/GHSA-4328-8hgf-7wjr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16777'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHEA-2020:0330'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0573'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0579'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0597'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0602'}, {'type': 'WEB', 'url': 'https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4328-8hgf-7wjr'}, {'type': 'PACKAGE', 'url': 'https://github.com/npm/cli'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202003-48'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1437'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00027.html'}]","{'cwe_ids': ['CWE-22', 'CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:57:02Z', 'nvd_published_at': '2019-12-13T01:15:00Z'}" +1.4.0,GHSA-4mvc-qc5w-v5qr,2023-09-20T19:22:55Z,2019-12-17T22:53:34Z,,['CVE-2019-19712'],Information disclosure in the Contao backend,"### Impact + +Backend users can manipulate the details view URL to show pages and articles that have not been enabled for them. + +### Patches + +Update to Contao 4.4.46 or 4.8.6. + +### Workarounds + +None. + +### References + +https://contao.org/en/security-advisories/information-disclosure-in-the-back-end + +### For more information + +If you have any questions or comments about this advisory, open an issue in [contao/contao](https://github.com/contao/contao/issues/new/choose). +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'contao/core-bundle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.4.46'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'contao/core-bundle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.5.0'}, {'fixed': '4.8.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/contao/contao/security/advisories/GHSA-4mvc-qc5w-v5qr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19712'}, {'type': 'WEB', 'url': 'https://contao.org/en/security-advisories/information-disclosure-in-the-back-end.html'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/contao/core-bundle/CVE-2019-19712.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/contao/contao'}]","{'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-17T19:35:52Z', 'nvd_published_at': None}" +1.4.0,GHSA-q58g-455p-8vw9,2021-10-29T14:10:27Z,2019-12-16T19:30:17Z,,['CVE-2019-16779'],"In RubyGem excon, interrupted Persistent Connections May Leak Response Data","### Impact +There was a race condition around persistent connections, where a connection which is interrupted (such as by a timeout) would leave data on the socket. Subsequent requests would then read this data, returning content from the previous response. The race condition window appears to be short, and it would be difficult to purposefully exploit this. + +### Patches +The problem has been patched in 0.71.0, users should upgrade to this or a newer version (if one exists). + +### Workarounds +Users can workaround the problem by disabling persistent connections, though this may cause performance implications. + +### References +See the [patch](https://github.com/excon/excon/commit/ccb57d7a422f020dc74f1de4e8fb505ab46d8a29) for further details. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [excon/issues](https://github.com/excon/excon/issues) +* Email us at [geemus+github@gmail.com](mailto:geemus+github@gmail.com)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'excon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.71.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/excon/excon/security/advisories/GHSA-q58g-455p-8vw9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16779'}, {'type': 'WEB', 'url': 'https://github.com/excon/excon/commit/ccb57d7a422f020dc74f1de4e8fb505ab46d8a29'}, {'type': 'PACKAGE', 'url': 'https://github.com/excon/excon'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/excon/CVE-2019-16779.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/01/msg00015.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00021.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00062.html'}]","{'cwe_ids': ['CWE-362', 'CWE-664'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-16T19:28:10Z', 'nvd_published_at': '2019-12-16T20:15:00Z'}" +1.4.0,GHSA-m6cx-g6qm-p2cx,2021-10-21T21:16:09Z,2019-12-13T15:39:19Z,,['CVE-2019-16775'],Arbitrary File Write in npm,"Versions of the npm CLI prior to 6.13.3 are vulnerable to an Arbitrary File Write. It fails to prevent access to folders outside of the intended node_modules folder through the bin field. A properly constructed entry in the package.json bin field would allow a package publisher to create files on a user's system when the package is installed. It is only possible to affect files that the user running `npm install` has access to and it is not possible to over write files that already exist on disk. + +This behavior is still possible through install scripts. This vulnerability bypasses a user using the --ignore-scripts install option. + + +## Recommendation + +Upgrade to version 6.13.3 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'npm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.13.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/npm/cli/security/advisories/GHSA-m6cx-g6qm-p2cx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16775'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHEA-2020:0330'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0573'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0579'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0597'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0602'}, {'type': 'WEB', 'url': 'https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-m6cx-g6qm-p2cx'}, {'type': 'PACKAGE', 'url': 'https://github.com/npm/cli'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1434'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00027.html'}]","{'cwe_ids': ['CWE-59', 'CWE-61'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T16:30:50Z', 'nvd_published_at': '2019-12-13T01:15:00Z'}" +1.4.0,GHSA-rh46-3fgc-mvrf,2021-08-19T16:05:30Z,2019-12-04T21:25:28Z,,['CVE-2019-19507'],Validation bypass is possible in Json Pattern Validator,"In jpv (aka Json Pattern Validator) before 2.1.1, compareCommon() can be bypassed because certain internal attributes can be overwritten via a conflicting name, as demonstrated by 'constructor': {'name':'Array'}. This affects validate(). Hence, a crafted payload can overwrite this builtin attribute to manipulate the type detection result.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'jpv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19507'}, {'type': 'WEB', 'url': 'https://github.com/manvel-khnkoyan/jpv/issues/6'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/jpv'}]","{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-04T19:47:26Z', 'nvd_published_at': None}" +1.4.0,GHSA-qhrx-hcm6-pmrw,2023-01-17T13:55:02Z,2019-12-02T18:12:26Z,,['CVE-2019-11458'],Unsafe deserialization in SmtpTransport in CakePHP,An issue was discovered in SmtpTransport in CakePHP 3.7.6. An unserialized object with modified internal properties can trigger arbitrary file overwriting upon destruction.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.5.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.6.0'}, {'fixed': '3.6.15'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.7.0'}, {'fixed': '3.7.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11458'}, {'type': 'WEB', 'url': 'https://github.com/cakephp/cakephp/commit/1a74e798309192a9895c9cedabd714ceee345f4e'}, {'type': 'WEB', 'url': 'https://bakery.cakephp.org/2019/04/23/cakephp_377_3615_3518_released.html'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/cakephp/cakephp/CVE-2019-11458.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/cakephp/cakephp'}, {'type': 'WEB', 'url': 'https://github.com/cakephp/cakephp/commits/master'}, {'type': 'WEB', 'url': 'https://github.com/cakephp/cakephp/compare/3.7.6...3.7.7'}, {'type': 'WEB', 'url': 'https://github.com/cakephp/cakephp/releases'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-12-02T00:51:02Z', 'nvd_published_at': None}" +1.4.0,GHSA-484f-743f-6jx2,2022-07-05T18:07:34Z,2019-12-12T22:50:20Z,,['CVE-2019-16774'],Object injection in cookie driver in phpfastcache,"### Impact +An possible object injection has been discovered in cookie driver prior 5.0.13 versions (of 5.x releases). + +### Patches +The issue has been addressed by enforcing JSON conversion when deserializing + +### Workarounds +If you can't fix it, use another driver such as ""Files"" (Filesystem) + +### References +Fixing release: https://github.com/PHPSocialNetwork/phpfastcache/releases/tag/5.0.13 + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [the issue tracker](https://github.com/PHPSocialNetwork/phpfastcache/issues) +* Email us at [security@geolim4.com](mailto:security@geolim4.com) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'phpfastcache/phpfastcache'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.13'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/PHPSocialNetwork/phpfastcache/security/advisories/GHSA-484f-743f-6jx2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16774'}, {'type': 'WEB', 'url': 'https://github.com/PHPSocialNetwork/phpfastcache/commit/c4527205cb7a402b595790c74310791f5b04a1a4'}, {'type': 'PACKAGE', 'url': 'https://github.com/PHPSocialNetwork/phpfastcache'}, {'type': 'WEB', 'url': 'https://github.com/PHPSocialNetwork/phpfastcache/releases/tag/5.0.13'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-484f-743f-6jx2'}]","{'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:57:47Z', 'nvd_published_at': None}" +1.4.0,GHSA-6xc2-mj39-q599,2022-08-02T15:09:07Z,2019-12-02T18:20:41Z,,['CVE-2019-18818'],Strapi allows unauthenticated attacker to reset admin password without valid reset token,"Versions of `strapi` prior to 3.0.0-beta.17.5 are vulnerable to Privilege Escalation. The password reset routes allows an unauthenticated attacker to reset an admin's password without providing a valid password reset token. + + +## Recommendation + +Upgrade to version 3.0.0-beta.17.5 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'strapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0-beta.17.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.0-beta.17.4'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-18818'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/pull/4443'}, {'type': 'WEB', 'url': 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18818'}, {'type': 'PACKAGE', 'url': 'https://github.com/strapi/strapi'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/releases/tag/v3.0.0-beta.17.5'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1311'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/163939/Strapi-3.0.0-beta-Authentication-Bypass.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/163950/Strapi-CMS-3.0.0-beta.17.4-Remote-Code-Execution.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/165896/Strapi-CMS-3.0.0-beta.17.4-Privilege-Escalation.html'}]","{'cwe_ids': ['CWE-640'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-12-02T17:36:24Z', 'nvd_published_at': '2019-11-07T22:15:00Z'}" +1.4.0,GHSA-x8qc-rrcw-4r46,2022-08-10T23:58:46Z,2019-12-13T15:39:26Z,,['CVE-2019-16776'],npm symlink reference outside of node_modules,"Versions of the npm CLI prior to 6.13.3 are vulnerable to a symlink reference outside of node_modules. It is possible for packages to create symlinks to files outside of the`node_modules` folder through the `bin` field upon installation. A properly constructed entry in the package.json bin field would allow a package publisher to create a symlink pointing to arbitrary files on a user’s system when the package is installed. Only files accessible by the user running the `npm install` are affected. + +This behavior is still possible through install scripts. This vulnerability bypasses a user using the --ignore-scripts install option. + + +## Recommendation + +Upgrade to version 6.13.3 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'npm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.13.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/npm/cli/security/advisories/GHSA-x8qc-rrcw-4r46'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16776'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHEA-2020:0330'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0573'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0579'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0597'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0602'}, {'type': 'WEB', 'url': 'https://blog.npmjs.org/post/189618601100/binary-planting-with-the-npm-cli'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-x8qc-rrcw-4r46'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z36UKPO5F3PQ3Q2POMF5LEKXWAH5RUFP/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1436'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00027.html'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:02:49Z', 'nvd_published_at': '2019-12-13T01:15:00Z'}" +1.4.0,GHSA-79gr-58r3-pwm3,2023-09-21T19:46:51Z,2019-12-02T18:07:16Z,,['CVE-2019-18889'],Symfony Unsafe Cache Serialization Could Enable RCE,"An issue was discovered in Symfony 3.4.0 through 3.4.34, 4.2.0 through 4.2.11, and 4.3.0 through 4.3.7. Serializing certain cache adapter interfaces could result in remote code injection. This is related to symfony/cache.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/cache'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.4.35'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/cache'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.2.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/cache'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.4.35'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.2.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-18889'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/cache/CVE-2019-18889.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-18889.yaml'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/releases/tag/v4.3.8'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UED22BOXTL2SSFMGYKA64ZFHGLLJG3EA/'}, {'type': 'WEB', 'url': 'https://symfony.com/blog/cve-2019-18889-forbid-serializing-abstractadapter-and-tagawareadapter-instances'}, {'type': 'WEB', 'url': 'https://symfony.com/blog/symfony-4-3-8-released'}, {'type': 'WEB', 'url': 'https://symfony.com/cve-2019-18889'}]","{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-12-01T19:45:07Z', 'nvd_published_at': None}" +1.4.0,GHSA-844w-j86r-4x2j,2021-11-01T14:12:42Z,2019-12-16T20:17:10Z,,['CVE-2019-16778'],Heap buffer overflow in `UnsortedSegmentSum` in TensorFlow,"### Impact + +A heap buffer overflow in `UnsortedSegmentSum` can be produced when the `Index` template argument is `int32`. In this case `data_size` and `num_segments` fields are truncated from `int64` to `int32` and can produce negative numbers, resulting in accessing out of bounds heap memory. + +This is unlikely to be exploitable and was detected and fixed internally. We are making the security advisory only to notify users that it is better to update to TensorFlow 1.15 or 2.0 or later as these versions already have this fixed. + +### Patches + +Patched by db4f9717c41bccc3ce10099ab61996b246099892 and released in all official releases after 1.15 and 2.0. + +### For more information +Please consult [`SECURITY.md`](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-gpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-844w-j86r-4x2j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16778'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/db4f9717c41bccc3ce10099ab61996b246099892'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2019-002.md'}]","{'cwe_ids': ['CWE-122', 'CWE-681'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2019-12-16T20:16:12Z', 'nvd_published_at': '2019-12-16T21:15:00Z'}" +1.4.0,GHSA-hrqr-hxpp-chr3,2021-11-03T14:59:03Z,2019-12-18T19:01:31Z,,['CVE-2019-16782'],Possible Information Leak / Session Hijack Vulnerability in Rack,"There's a possible information leak / session hijack vulnerability in Rack. Attackers may be able to find and hijack sessions by using timing attacks targeting the session id. Session ids are usually stored and indexed in a database that uses some kind of scheme for speeding up lookups of that session id. By carefully measuring the amount of time it takes to look up a session, an attacker may be able to find a valid session id and hijack the session. + +The session id itself may be generated randomly, but the way the session is indexed by the backing store does not use a secure comparison. + +### Impact + +The session id stored in a cookie is the same id that is used when querying the backing session storage engine. Most storage mechanisms (for example a database) use some sort of indexing in order to speed up the lookup of that id. By carefully timing requests and session lookup failures, an attacker may be able to perform a timing attack to determine an existing session id and hijack that session. + +## Releases + +The 1.6.12 and 2.0.8 releases are available at the normal locations. + +### Workarounds + +There are no known workarounds. + +### Patches + +To aid users who aren't able to upgrade immediately we have provided patches for +the two supported release series. They are in git-am format and consist of a +single changeset. + +* 1-6-session-timing-attack.patch - Patch for 1.6 series +* 2-0-session-timing-attack.patch - Patch for 2.6 series + +### Credits + +Thanks Will Leinweber for reporting this!","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.12'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.8'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/rack/rack/security/advisories/GHSA-hrqr-hxpp-chr3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16782'}, {'type': 'WEB', 'url': 'https://github.com/rack/rack/commit/7fecaee81f59926b6e1913511c90650e76673b38'}, {'type': 'PACKAGE', 'url': 'https://github.com/rack/rack'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2019-16782.yml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HZXMWILCICQLA2BYSP6I2CRMUG53YBLX/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00016.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/12/18/2'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/12/18/3'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/12/19/3'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/04/08/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/04/09/2'}]","{'cwe_ids': ['CWE-203', 'CWE-208'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-18T19:01:07Z', 'nvd_published_at': '2019-12-18T20:15:00Z'}" +1.4.0,GHSA-m5ff-3wj3-8ph4,2019-12-26T16:34:06Z,2019-12-26T16:34:38Z,,[],HTTP Request Smuggling: Invalid whitespace characters in headers in Waitress,"### Impact + +If a proxy server is used in front of waitress, an invalid request may be sent by an attacker that bypasses the front-end and is parsed differently by waitress leading to a potential for HTTP request smuggling. + +``` +Content-Length: 10 +Transfer-Encoding: [\x0b]chunked +``` + +For clarity: + +``` +0x0b == vertical tab +``` + +Would get parsed by Waitress as being a `chunked` request, but a front-end server would use the `Content-Length` instead as the `Transfer-Encoding` header is considered invalid due to containing invalid characters. + +If a front-end server does HTTP pipelining to a backend Waitress server this could lead to HTTP request splitting which may lead to potential cache poisoning or unexpected information disclosure. + +### Patches + +Please upgrade to Waitress 1.4.1 which fixes this issue with stricter HTTP field validation. + +Waitress 1.4.1 due to this change has become much more strict in what is allowed in header values, while the maintainers don't believe that these changes will cause any issues, it may cause failures with non-conformist reverse proxies or clients, and it is highly recommend that users validate the changes in their environment and make sure it won't cause any unacceptable failures. + +### Workarounds + +You may enable additional protections on front-end servers, those that follow RFC7230 correctly would drop the request with a 400 Bad Request. + +Waitress will now correctly responds to the request with a 400 Bad Request, and will drop the connection to avoid any potential HTTP pipelining issues. + +### References + +This was mentioned in https://portswigger.net/research/http-desync-attacks-what-happened-next and was specifically mentioned as being an issue in HAProxy which did not properly filter it in this article: https://nathandavison.com/blog/haproxy-http-request-smuggling + +### Thanks + +The Pylons Project would like to thank ZeddYu Lu for doing extended testing against Waitress 1.4.0 and bringing this to our attention! + +### For more information + +If you have any questions or comments about this advisory: + +* open an issue at https://github.com/Pylons/waitress/issues (if not sensitive or security related) +* email the Pylons Security mailing list: pylons-project-security@googlegroups.com (if security related)",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'waitress'}, 'ecosystem_specific': {'affected_functions': ['waitress.parser.HTTPRequestParser.parse_header']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/security/advisories/GHSA-m5ff-3wj3-8ph4'}, {'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/commit/11d9e138125ad46e951027184b13242a3c1de017'}]","{'cwe_ids': ['CWE-444'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-12-26T16:34:06Z', 'nvd_published_at': None}" +1.4.0,GHSA-fpff-384j-vxq7,2021-08-19T15:10:08Z,2019-12-02T18:05:13Z,,['CVE-2019-10763'],Data leakage via SQL Injection in Pimcore,"pimcore/pimcore before 6.3.0 is vulnerable to SQL Injection. An attacker with limited privileges (classes permission) can achieve a SQL injection that can lead in data leakage. The vulnerability can be exploited via 'id', 'storeId', 'pageSize' and 'tables' parameters, using a payload for trigger a time based or error based sql injection.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10763'}, {'type': 'WEB', 'url': 'https://blog.certimetergroup.com/it/articolo/security/sql_injection_in_pimcore_6.2.3'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PHP-PIMCOREPIMCORE-480391'}]","{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-27T02:55:07Z', 'nvd_published_at': None}" +1.4.0,GHSA-6rmq-x2hv-vxpp,2023-09-08T14:19:06Z,2019-12-02T18:11:25Z,,['CVE-2019-6338'],Drupal core third-party PEAR Archive_Tar library is vulnerable to Deserialization of Untrusted Data,"In Drupal Core versions 7.x prior to 7.62, 8.6.x prior to 8.6.6 and 8.5.x prior to 8.5.9; Drupal core uses the third-party PEAR Archive_Tar library. This library has released a security update which impacts some Drupal configurations. Refer to CVE-2018-1000888 for details","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'drupal/drupal'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.62.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'drupal/drupal'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.5.9'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'drupal/drupal'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.6.0'}, {'fixed': '8.6.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-6338'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/drupal/drupal/CVE-2019-6338.yaml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/02/msg00032.html'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4370'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2019-001'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106706'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-12-02T00:34:49Z', 'nvd_published_at': None}" +1.4.0,GHSA-4vpc-5jx4-cfqg,2021-07-28T15:49:16Z,2019-12-02T18:09:21Z,,['CVE-2019-18886'],User enumeration leak using switch user functionality in Symfony,An issue was discovered in Symfony 4.2.0 to 4.2.11 and 4.3.0 to 4.3.7. The ability to enumerate users was possible due to different handling depending on whether the user existed when making unauthorized attempts to use the switch users functionality. This is related to symfony/security.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.2.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/security-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.2.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-18886'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/security-http/CVE-2019-18886.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-18886.yaml'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/releases/tag/v4.3.8'}, {'type': 'WEB', 'url': 'https://symfony.com/blog/cve-2019-18886-prevent-user-enumeration-using-switch-user-functionality'}, {'type': 'WEB', 'url': 'https://symfony.com/blog/symfony-4-3-8-released'}, {'type': 'WEB', 'url': 'https://symfony.com/cve-2019-18886'}]","{'cwe_ids': ['CWE-200', 'CWE-203'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-01T19:47:26Z', 'nvd_published_at': '2019-11-21T18:15:00Z'}" +1.4.0,GHSA-g2xc-35jw-c63p,2022-04-25T23:07:24Z,2019-12-20T23:04:18Z,,['CVE-2019-16786'],HTTP Request Smuggling: Invalid Transfer-Encoding in Waitress,"### Impact + +Waitress would parse the `Transfer-Encoding` header and only look for a single string value, if that value was not `chunked` it would fall through and use the `Content-Length` header instead. + +According to the HTTP standard `Transfer-Encoding` should be a comma separated list, with the inner-most encoding first, followed by any further transfer codings, ending with `chunked`. + +Requests sent with: + +``` +Transfer-Encoding: gzip, chunked +``` + +Would incorrectly get ignored, and the request would use a `Content-Length` header instead to determine the body size of the HTTP message. + +This could allow for Waitress to treat a single request as multiple requests in the case of HTTP pipelining. + +### Patches + +This issue is fixed in Waitress 1.4.0. This brings a range of changes to harden Waitress against potential HTTP request confusions, and may change the behaviour of Waitress behind non-conformist proxies. + +Waitress will now return a 501 Not Implemented error if the `Transfer-Encoding` is not `chunked` or contains multiple elements. Waitress does not support any transfer codings such as `gzip` or `deflate`. + +The Pylons Project recommends upgrading as soon as possible, while validating that the changes in Waitress don't cause any changes in behavior. + +### Workarounds + +Various reverse proxies may have protections against sending potentially bad HTTP requests to the backend, and or hardening against potential issues like this. If the reverse proxy doesn't use HTTP/1.1 for connecting to the backend issues are also somewhat mitigated, as HTTP pipelining does not exist in HTTP/1.0 and Waitress will close the connection after every single request (unless the Keep Alive header is explicitly sent... so this is not a fool proof security method). + +### Issues/more security issues: + +* open an issue at https://github.com/Pylons/waitress/issues (if not sensitive or security related) +* email the Pylons Security mailing list: pylons-project-security@googlegroups.com (if security related)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'waitress'}, 'ecosystem_specific': {'affected_functions': ['waitress.parser.HTTPRequestParser.received', 'waitress.parser.HTTPRequestParser.parse_header', 'waitress.parser.get_header_lines', 'waitress.receiver.ChunkedReceiver', 'waitress.receiver.ChunkedReceiver.received', 'waitress.utilities.find_double_newline', 'waitress.utilities.Error']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/security/advisories/GHSA-g2xc-35jw-c63p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16786'}, {'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/commit/f11093a6b3240fc26830b6111e826128af7771c3'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0720'}, {'type': 'WEB', 'url': 'https://docs.pylonsproject.org/projects/waitress/en/latest/#security-fixes'}, {'type': 'PACKAGE', 'url': 'https://github.com/Pylons/waitress'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/05/msg00011.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GVDHR2DNKCNQ7YQXISJ45NT4IQDX3LJ7/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LYEOTGWJZVKPRXX2HBNVIYWCX73QYPM5/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}]","{'cwe_ids': ['CWE-444'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-12-20T23:01:53Z', 'nvd_published_at': '2019-12-20T23:15:00Z'}" +1.4.0,GHSA-h9rv-jmmf-4pgx,2021-01-08T18:42:22Z,2019-12-05T18:44:37Z,,['CVE-2019-16769'],Cross-Site Scripting in serialize-javascript,"Versions of `serialize-javascript` prior to 2.1.1 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize serialized regular expressions. This vulnerability does not affect Node.js applications. + + +## Recommendation + +Upgrade to version 2.1.1 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'serialize-javascript'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/yahoo/serialize-javascript/security/advisories/GHSA-h9rv-jmmf-4pgx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16769'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h9rv-jmmf-4pgx'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1426'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:51Z', 'nvd_published_at': None}" +1.4.0,GHSA-6rjc-4pwr-3vp7,2021-08-19T15:34:42Z,2019-12-02T18:14:30Z,,['CVE-2019-10771'],Cross-Site Scripting in iobroker.web,"Versions of `iobroker.web` prior to 2.4.10 are vulnerable to Cross-Site Scripting. The package fails to escape URL parameters that may be reflected in the server response. This can be used by attackers to execute arbitrary JavaScript in the victim's browser. + + +## Recommendation + +Upgrade to version 2.4.10 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'iobroker.web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10771'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-IOBROKERWEB-534971'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1345'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-02T01:13:05Z', 'nvd_published_at': None}" +1.4.0,GHSA-9xcj-c8cr-8c3c,2022-10-07T20:34:53Z,2019-12-26T18:22:26Z,,['CVE-2019-17563'],"In Apache Tomcat, when using FORM authentication there was a narrow window where an attacker could perform a session fixation attack","When using FORM authentication with Apache Tomcat 9.0.0.M1 to 9.0.29, 8.5.0 to 8.5.49 and 7.0.0 to 7.0.98 there was a narrow window where an attacker could perform a session fixation attack. The window was considered too narrow for an exploit to be practical but, erring on the side of caution, this issue has been treated as a security vulnerability.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.99'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.5.50'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.0.30'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17563'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/8b4c1db8300117b28a0f3f743c0b9e3f964687a690cdf9662a884bbd%40%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/reb9a66f176df29b9a832caa95ebd9ffa3284e8f4922ec4fa3ad8eb2e@%3Cissues.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/01/msg00024.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Dec/43'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202003-43'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200107-0001/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4251-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4596'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4680'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00013.html'}]","{'cwe_ids': ['CWE-384'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-12-26T18:22:01Z', 'nvd_published_at': '2019-12-23T17:15:00Z'}" +1.4.0,GHSA-4ppp-gpcr-7qf6,2022-03-24T17:52:19Z,2019-12-20T23:04:35Z,,[],HTTP Request Smuggling: Content-Length Sent Twice in Waitress,"### Impact + +Waitress would header fold a double `Content-Length` header and due to being unable to cast the now comma separated value to an integer would set the `Content-Length` to 0 internally. + +So a request with: + +``` +Content-Length: 10 +Content-Length: 10 +``` + +would get transformed to: + +``` +Content-Length: 10, 10 +``` + +Which would Waitress would then internally set to `Content-Lenght: 0`. + +Waitress would then treat the request as having no body, thereby treating the body of the request as a new request in HTTP pipelining. + +### Patches + +This issue is fixed in Waitress 1.4.0. This brings a range of changes to harden Waitress against potential HTTP request confusions, and may change the behaviour of Waitress behind non-conformist proxies. + +The Pylons Project recommends upgrading as soon as possible, while validating that the changes in Waitress don't cause any changes in behavior. + +### Workarounds + +Various reverse proxies may have protections against sending potentially bad HTTP requests to the backend, and or hardening against potential issues like this. If the reverse proxy doesn't use HTTP/1.1 for connecting to the backend issues are also somewhat mitigated, as HTTP pipelining does not exist in HTTP/1.0 and Waitress will close the connection after every single request (unless the Keep Alive header is explicitly sent... so this is not a fool proof security method). + +### Issues/more security issues: + +* open an issue at https://github.com/Pylons/waitress/issues (if not sensitive or security related) +* email the Pylons Security mailing list: pylons-project-security@googlegroups.com (if security related)",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'waitress'}, 'ecosystem_specific': {'affected_functions': ['waitress.parser.HTTPRequestParser.parse_header']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/security/advisories/GHSA-4ppp-gpcr-7qf6'}, {'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/commit/575994cd42e83fd772a5f7ec98b2c56751bd3f65'}, {'type': 'WEB', 'url': 'https://docs.pylonsproject.org/projects/waitress/en/latest/#security-fixes'}, {'type': 'PACKAGE', 'url': 'https://github.com/Pylons/waitress'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j7j6-7hfx-5522'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/waitress/PYSEC-2020-178.yaml'}]","{'cwe_ids': ['CWE-444'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-12-20T23:02:03Z', 'nvd_published_at': None}" +1.4.0,GHSA-cmch-296j-wfvw,2021-08-19T15:11:15Z,2019-12-02T18:06:14Z,,['CVE-2019-10767'],Arbitrary File Write in iobroker.js-controller,"Versions of `iobroker.controller` prior to 2.0.25 are vulnerable to Path Traversal. The package fails to restrict access to folders outside of the intended `/adapter/` folder, which may allow attackers to include arbitrary files in the system. An attacker would need to be authenticated to perform the attack but the package has authentication disabled by default. + + +## Recommendation + +Upgrade to version 2.0.25 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'iobroker.js-controller'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.25'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10767'}, {'type': 'WEB', 'url': 'https://github.com/ioBroker/ioBroker.js-controller/commit/f6e292c6750a491a5000d0f851b2fede4f9e2fda'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-IOBROKERJSCONTROLLER-534881'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1419'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-11-27T03:26:55Z', 'nvd_published_at': None}" +1.4.0,GHSA-26p8-xrj2-mv53,2021-08-19T16:02:34Z,2019-12-02T18:18:37Z,,['CVE-2019-10083'],Apache NiFi process group information disclosure,"When updating a Process Group via the API in NiFi versions 1.3.0 to 1.9.2, the response to the request includes all of its contents (at the top most level, not recursively). The response included details about processors and controller services which the user may not have had read access to.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi-web-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.10.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.10.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10083'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security.html#CVE-2019-10083'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-02T17:30:21Z', 'nvd_published_at': None}" +1.4.0,GHSA-h47j-hc6x-h3qq,2023-09-12T18:35:46Z,2019-12-30T19:30:31Z,,['CVE-2019-10758'],Remote Code Execution Vulnerability in NPM mongo-express,"### Impact + +Remote code execution on the host machine by any authenticated user. + +### Proof Of Concept + +Launching mongo-express on a Mac, pasting the following into the ""create index"" field will pop open the Mac calculator: + +```javascript +this.constructor.constructor(""return process"")().mainModule.require('child_process').execSync('/Applications/Calculator.app/Contents/MacOS/Calculator') +``` + +### Patches +Users should upgrade to version `0.54.0` + +### Workarounds +_Is there a way for users to fix or remediate the vulnerability without upgrading?_ + +### References +[Snyk Security Advisory](https://snyk.io/vuln/SNYK-JS-MONGOEXPRESS-473215) +[CVE](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10758) + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [example link to repo](http://example.com) +* Email us at [example email address](mailto:example@example.com) + +#### Thanks + +@JLLeitschuh for finding and reporting this vulnerability","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'mongo-express'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.54.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/mongo-express/mongo-express/security/advisories/GHSA-h47j-hc6x-h3qq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10758'}, {'type': 'WEB', 'url': 'https://github.com/mongo-express/mongo-express/pull/522'}, {'type': 'WEB', 'url': 'https://github.com/mongo-express/mongo-express/commit/7d365141deadbd38fa961cd835ce68eab5731494'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MONGOEXPRESS-473215'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-12-30T19:29:02Z', 'nvd_published_at': None}" +1.4.0,GHSA-7xxv-wpxj-mx5v,2023-09-05T14:45:56Z,2019-12-02T18:03:09Z,,['CVE-2019-19275'],typed-ast Out-of-bounds Read,"typed_ast 1.3.0 and 1.3.1 has an ast_for_arguments out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not execute) Python code. (This issue also affected certain Python 3.8.0-alpha prereleases.)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'typed-ast'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.4.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.1'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19275'}, {'type': 'WEB', 'url': 'https://github.com/python/cpython/commit/a4d78362397fc3bced6ea80fbc7b5f4827aec55e'}, {'type': 'WEB', 'url': 'https://github.com/python/cpython/commit/dcfcd146f8e6fc5c2fc16a4c192a0c5f5ca8c53c'}, {'type': 'WEB', 'url': 'https://github.com/python/typed_ast/commit/156afcb26c198e162504a57caddfe0acd9ed7dce'}, {'type': 'WEB', 'url': 'https://github.com/python/typed_ast/commit/dc317ac9cff859aa84eeabe03fb5004982545b3b'}, {'type': 'WEB', 'url': 'https://bugs.python.org/issue36495'}, {'type': 'PACKAGE', 'url': 'https://github.com/python/typed_ast'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5H4Q6LFVRX7SFXLBEJMNQFI4T5SCEA/'}]","{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-11-27T02:25:57Z', 'nvd_published_at': None}" +1.4.0,GHSA-4x6v-rwh4-55jw,2023-09-08T19:57:36Z,2019-12-02T18:16:34Z,,['CVE-2019-18954'],Pomelo allows external control of critical state data,"Pomelo v2.2.5 allows external control of critical state data. A malicious user input can corrupt arbitrary methods and attributes in `template/game-server/app/servers/connector/handler/entryHandler.js` because certain internal attributes can be overwritten via a conflicting name. Hence, a malicious attacker can manipulate internal attributes by adding additional attributes to user input.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'pomelo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-18954'}, {'type': 'WEB', 'url': 'https://github.com/NetEase/pomelo/issues/1149'}, {'type': 'WEB', 'url': 'https://github.com/cl0udz/vulnerabilities/tree/master/pomelo-critical-state-manipulation'}]","{'cwe_ids': ['CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-02T01:20:21Z', 'nvd_published_at': None}" +1.4.0,GHSA-hh3j-x4mc-g48r,2022-04-19T18:42:25Z,2019-12-26T18:22:36Z,,['CVE-2019-12418'],Insufficiently Protected Credentials in Apache Tomcat,"When Apache Tomcat 9.0.0.M1 to 9.0.28, 8.5.0 to 8.5.47, 7.0.0 and 7.0.97 is configured with the JMX Remote Lifecycle Listener, a local attacker without access to the Tomcat process or configuration files is able to manipulate the RMI registry to perform a man-in-the-middle attack to capture user names and passwords used to access the JMX interface. The attacker can then use these credentials to access the JMX interface and gain complete control over the Tomcat instance.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.99'}]}], 'database_specific': {'last_known_affected_version_range': '< 7.0.98'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.5.49'}]}], 'database_specific': {'last_known_affected_version_range': '< 8.5.48'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.0.29'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12418'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/43530b91506e2e0c11cfbe691173f5df8c48f51b98262426d7493b67%40%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/01/msg00024.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/03/msg00029.html'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Dec/43'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202003-43'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20200107-0001/'}, {'type': 'WEB', 'url': 'https://support.f5.com/csp/article/K10107360?utm_source=f5support&utm_medium=RSS'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4251-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4596'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2020/dsa-4680'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00013.html'}]","{'cwe_ids': ['CWE-522'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-12-26T18:22:10Z', 'nvd_published_at': '2019-12-23T18:15:00Z'}" +1.4.0,GHSA-35fr-h7jr-hh86,2021-04-27T18:03:07Z,2019-12-06T18:55:47Z,,[],Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting') in Armeria,"Versions of Armeria 0.85.0 through and including 0.96.0 are vulnerable to HTTP response splitting, which allows remote attackers to inject arbitrary HTTP headers via CRLF sequences when unsanitized data is used to populate the headers of an HTTP response. + +### Impact + +1. Cross-User Defacement +2. Cache Poisoning +3. Cross-Site Scripting (XSS) +4. Page Hijacking + + +### Root Cause + +The root cause is due to the usage of Netty without the HTTP header validation. + +https://github.com/line/armeria/blob/f0d870fde1088114070be31b67f7df0a21e835c6/core/src/main/java/com/linecorp/armeria/common/DefaultHttpHeaders.java#L23 + +### Patches + +This vulnerability has been patched in 0.97.0. + +### References + +[CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting')](https://cwe.mitre.org/data/definitions/113.html) +https://github.com/ratpack/ratpack/security/advisories/GHSA-mvqp-q37c-wf9j + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [GitHub](https://github.com/line/armeria/issues)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.linecorp.armeria:armeria'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.85.0'}, {'fixed': '0.97.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/line/armeria/security/advisories/GHSA-35fr-h7jr-hh86'}]","{'cwe_ids': ['CWE-113', 'CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-27T18:03:07Z', 'nvd_published_at': None}" +1.4.0,GHSA-5h9j-q6j2-253f,2021-06-15T17:23:03Z,2019-12-02T18:13:28Z,,['CVE-2019-17632'],Unescaped exception messages in error responses in Jetty,"In Eclipse Jetty versions 9.4.21.v20190926, 9.4.22.v20191022, and 9.4.23.v20191118, the generation of default unhandled Error response content (in text/html and text/json Content-Type) does not escape Exception messages in stacktraces included in error output.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.4.21.v20190926'}, {'fixed': '9.4.24.v20191120'}]}], 'versions': ['9.4.21.v20190926']}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.4.22.v20191022'}, {'fixed': '9.4.24.v20191120'}]}], 'versions': ['9.4.22.v20191022']}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.4.23.v20191118'}, {'fixed': '9.4.24.v20191120'}]}], 'versions': ['9.4.23.v20191118']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17632'}, {'type': 'WEB', 'url': 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=553443'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SAITZ27GKPD2CCNHGT2VBT4VWIBUJJNS/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-02T01:09:14Z', 'nvd_published_at': '2019-11-25T22:15:00Z'}" +1.4.0,GHSA-hm6q-r2jc-cpqh,2023-09-06T20:10:25Z,2019-12-16T19:29:33Z,,['CVE-2019-19771'],lodahs is malware,"All versions of this package contained malware. The package was designed to find and exfiltrate cryptocurrency wallets. + + +## Recommendation + +Any computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. + +The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'lodahs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19771'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1417'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/lodahs'}]","{'cwe_ids': ['CWE-506'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-12-15T14:26:04Z', 'nvd_published_at': '2019-12-12T20:15:00Z'}" +1.4.0,GHSA-m3jw-62m7-jjcm,2023-09-05T14:46:42Z,2019-12-02T18:02:02Z,,['CVE-2019-19274'],typed-ast Out-of-bounds Read,"typed_ast 1.3.0 and 1.3.1 has a handle_keywordonly_args out-of-bounds read. An attacker with the ability to cause a Python interpreter to parse Python source (but not necessarily execute it) may be able to crash the interpreter process. This could be a concern, for example, in a web-based service that parses (but does not execute) Python code. (This issue also affected certain Python 3.8.0-alpha prereleases.)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'typed-ast'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.4.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.1'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19274'}, {'type': 'WEB', 'url': 'https://github.com/python/cpython/commit/a4d78362397fc3bced6ea80fbc7b5f4827aec55e'}, {'type': 'WEB', 'url': 'https://github.com/python/cpython/commit/dcfcd146f8e6fc5c2fc16a4c192a0c5f5ca8c53c'}, {'type': 'WEB', 'url': 'https://github.com/python/typed_ast/commit/156afcb26c198e162504a57caddfe0acd9ed7dce'}, {'type': 'WEB', 'url': 'https://github.com/python/typed_ast/commit/dc317ac9cff859aa84eeabe03fb5004982545b3b'}, {'type': 'WEB', 'url': 'https://bugs.python.org/issue36495'}, {'type': 'PACKAGE', 'url': 'https://github.com/python/typed_ast'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG5H4Q6LFVRX7SFXLBEJMNQFI4T5SCEA/'}]","{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-11-27T02:13:07Z', 'nvd_published_at': None}" +1.4.0,GHSA-744r-vv2g-2x6g,2021-06-15T17:22:36Z,2019-12-02T18:17:36Z,,['CVE-2019-10080'],Apache NiFi information disclosure by XXE,"The XMLFileLookupService in NiFi versions 1.3.0 to 1.9.2 allowed trusted users to inadvertently configure a potentially malicious XML file. The XML file has the ability to make external calls to services (via XXE) and reveal information such as the versions of Java, Jersey, and Apache that the NiFI instance uses.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.10.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.10.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10080'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi/pull/3507'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security.html#CVE-2019-10080'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}]","{'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-02T17:27:21Z', 'nvd_published_at': '2019-11-19T22:15:00Z'}" +1.4.0,GHSA-fmqw-vqh5-cwq9,2021-08-19T16:03:16Z,2019-12-02T18:19:39Z,,['CVE-2019-12421'],Apache NiFi user log out issue,"When using an authentication mechanism other than PKI, when the user clicks Log Out in NiFi versions 1.0.0 to 1.9.2, NiFi invalidates the authentication token on the client side but not on the server side. This permits the user's client-side token to be used for up to 12 hours after logging out to make API requests to NiFi.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi-web-security'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.10.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi-web-api'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.10.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12421'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi/pull/3362'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi/commit/cf6f5172503ce438c6c22c334c9367f774db7b24'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security.html#CVE-2019-12421'}]","{'cwe_ids': ['CWE-613'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-12-02T17:32:47Z', 'nvd_published_at': None}" +1.4.0,GHSA-7xx3-m584-x994,2021-01-08T19:12:47Z,2019-12-05T19:26:37Z,,['CVE-2019-16770'],A poorly-behaved client could use keepalive requests to monopolize Puma's reactor and create a denial of service attack,"## Keepalive thread overload/DoS + +### Impact + +A poorly-behaved client could use keepalive requests to monopolize Puma's reactor and create a denial of service attack. + +If more keepalive connections to Puma are opened than there are threads available, additional connections will wait permanently if the attacker sends requests frequently enough. + +### Patches + +This vulnerability is patched in Puma 4.3.1 and 3.12.2. + +### Workarounds + +Reverse proxies in front of Puma could be configured to always allow less than X keepalive connections to a Puma cluster or process, where X is the number of threads configured in Puma's thread pool. + +### For more information + +If you have any questions or comments about this advisory: + +* Open an issue at [puma](github.com/puma/puma).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'puma'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.12.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puma'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/puma/puma/security/advisories/GHSA-7xx3-m584-x994'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16770'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7xx3-m584-x994'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/puma/CVE-2019-16770.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/05/msg00034.html'}]","{'cwe_ids': ['CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:51Z', 'nvd_published_at': '2019-12-05T20:15:00Z'}" +1.4.0,GHSA-jc43-qrrp-98f5,2023-04-25T16:31:36Z,2019-12-17T22:53:40Z,,['CVE-2019-19714'],Insert tag injection in the Contao login module,"### Impact + +It is possible to inject insert tags into the login module which will be replaced when the page is rendered. + +### Patches + +Update to Contao 4.8.6. + +### Workarounds + +None. + +### References + +https://contao.org/en/security-advisories/insert-tag-injection-in-the-login-module + +### For more information + +If you have any questions or comments about this advisory, open an issue in [contao/contao](https://github.com/contao/contao/issues/new/choose). +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'contao/core-bundle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.8.4'}, {'fixed': '4.8.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/contao/contao/security/advisories/GHSA-jc43-qrrp-98f5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19714'}, {'type': 'WEB', 'url': 'https://contao.org/en/security-advisories/insert-tag-injection-in-the-login-module.html'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/contao/core-bundle/CVE-2019-19714.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/contao/contao'}]","{'cwe_ids': ['CWE-116'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-12-17T19:35:29Z', 'nvd_published_at': None}" +1.4.0,GHSA-42fp-4hm3-j8r7,2021-08-31T21:37:18Z,2019-01-04T17:46:08Z,,['CVE-2017-5934'],Moderate severity vulnerability that affects moin,Cross-site scripting (XSS) vulnerability in the link dialogue in GUI editor in MoinMoin before 1.9.10 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'moin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-5934'}, {'type': 'WEB', 'url': 'https://github.com/moinwiki/moin-1.9/commit/70955a8eae091cc88fd9a6e510177e70289ec024'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-42fp-4hm3-j8r7'}, {'type': 'PACKAGE', 'url': 'https://github.com/moinwiki/moin-1.9'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/10/msg00007.html'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3794-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2018/dsa-4318'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2018-10/msg00024.html'}, {'type': 'WEB', 'url': 'http://moinmo.in/SecurityFixes'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:59Z', 'nvd_published_at': None}" +1.4.0,GHSA-45r8-3495-x6rm,2022-09-17T00:06:13Z,2019-01-04T17:43:36Z,,['CVE-2018-18893'],Jinjava calls getClass,"Jinjava before 2.4.6 does not block the getClass method, related to com/hubspot/jinjava/el/ext/JinjavaBeanELResolver.java.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.hubspot.jinjava:jinjava'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-18893'}, {'type': 'WEB', 'url': 'https://github.com/HubSpot/jinjava/pull/230'}, {'type': 'PACKAGE', 'url': 'https://github.com/HubSpot/jinjava'}, {'type': 'WEB', 'url': 'https://github.com/HubSpot/jinjava/blob/master/CHANGES.md'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-45r8-3495-x6rm'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:57:27Z', 'nvd_published_at': None}" +1.4.0,GHSA-4rm3-4mq4-mfwr,2022-09-14T22:29:42Z,2019-01-04T17:43:22Z,,['CVE-2018-20595'],Cross-Site Request Forgery (CSRF) in hswebframework.web:hsweb-commons,A CSRF issue was discovered in web/authorization/oauth2/controller/OAuth2ClientController.java in hsweb 3.0.4 because the state parameter in the request is not compared with the state parameter in the session after user authentication is successful.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.hswebframework.web:hsweb-commons'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20595'}, {'type': 'WEB', 'url': 'https://github.com/hs-web/hsweb-framework/issues/107'}, {'type': 'WEB', 'url': 'https://github.com/hs-web/hsweb-framework/commit/40929e9b0d336a26281a5ed2e0e721d54dd8d2f2'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4rm3-4mq4-mfwr'}, {'type': 'PACKAGE', 'url': 'https://github.com/hs-web/hsweb-framework'}]","{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:59:04Z', 'nvd_published_at': None}" +1.4.0,GHSA-wr5r-m8pc-85j9,2020-06-16T22:01:07Z,2019-01-25T16:18:49Z,,['CVE-2019-3772'],Low severity vulnerability that affects org.springframework.integration:spring-integration-ws and org.springframework.integration:spring-integration-xml,"Spring Integration (spring-integration-xml and spring-integration-ws modules), versions 4.3.18, 5.0.10, 5.1.1, and older unsupported versions, were susceptible to XML External Entity Injection (XXE) when receiving XML data from untrusted sources.",[],"[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.integration:spring-integration-xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.19'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.integration:spring-integration-xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.integration:spring-integration-xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}, {'fixed': '5.1.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.integration:spring-integration-ws'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.19'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.integration:spring-integration-ws'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.integration:spring-integration-ws'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}, {'fixed': '5.1.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3772'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wr5r-m8pc-85j9'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2019-3772'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106749'}]","{'cwe_ids': ['CWE-611'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:07Z', 'nvd_published_at': None}" +1.4.0,GHSA-m9mq-p2f9-cfqv,2023-08-08T10:24:53Z,2019-01-04T17:46:30Z,,['CVE-2018-7753'],Bleach URI Scheme Restriction Bypass,"An issue was discovered in Bleach 2.1.x before 2.1.3. Attributes that have URI values weren't properly sanitized if the values contained character entities. Using character entities, it was possible to construct a URI value with a scheme that was not allowed that would slide through unsanitized.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'bleach'}, 'ecosystem_specific': {'affected_functions': ['bleach.sanitizer.BleachSanitizerFilter.allow_token']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-7753'}, {'type': 'WEB', 'url': 'https://github.com/mozilla/bleach/commit/c5df5789ec3471a31311f42c2d19fc2cf21b35ef'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/892252'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-m9mq-p2f9-cfqv'}, {'type': 'PACKAGE', 'url': 'https://github.com/mozilla/bleach'}, {'type': 'WEB', 'url': 'https://github.com/mozilla/bleach/releases/tag/v2.1.3'}]","{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:45:43Z', 'nvd_published_at': None}" +1.4.0,GHSA-2x54-j4m3-r6wx,2023-08-07T15:57:08Z,2019-01-04T17:44:48Z,,['CVE-2019-3575'],sqla-yaml-fixtures is vulnerable to Code Injection,Sqla_yaml_fixtures versions up to 0.9.1 allows local users to execute arbitrary python code via the fixture_text argument in `sqla_yaml_fixtures.load`.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'sqla-yaml-fixtures'}, 'ecosystem_specific': {'affected_functions': ['sqla_yaml_fixtures.load']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.9.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3575'}, {'type': 'WEB', 'url': 'https://github.com/schettino72/sqla_yaml_fixtures/issues/20'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2x54-j4m3-r6wx'}, {'type': 'PACKAGE', 'url': 'https://github.com/schettino72/sqla_yaml_fixtures'}]","{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:16Z', 'nvd_published_at': None}" +1.4.0,GHSA-6qvp-r6r3-9p7h,2023-08-26T00:01:34Z,2019-01-17T14:05:03Z,,['CVE-2018-14404'],Nokogiri NULL Pointer Dereference,A NULL pointer dereference vulnerability exists in the `xpath.c:xmlXPathCompOpEval()` function of libxml2 through 2.9.8 when parsing an invalid XPath expression in the `XPATH_OP_AND` or `XPATH_OP_OR` case. Applications processing untrusted XSL format inputs with the use of the libxml2 library may be vulnerable to a denial of service attack due to a crash of the application.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14404'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/issues/1785'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1543'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=901817'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1595985'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2018-14404.yml'}, {'type': 'WEB', 'url': 'https://gitlab.gnome.org/GNOME/libxml2/issues/10'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/09/msg00035.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190719-0002/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3739-1/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3739-2/'}]","{'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:20:04Z', 'nvd_published_at': None}" +1.4.0,GHSA-4p24-vmcr-4gqj,2023-08-25T23:47:33Z,2019-01-17T13:57:27Z,,['CVE-2016-10735'],Bootstrap XSS vulnerability,"In Bootstrap 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible in the data-target attribute. Note that this is a different vulnerability than CVE-2018-14041. + +See https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0/ for more info.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'bootstrap'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'bootstrap'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-beta'}, {'fixed': '4.0.0-beta.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10735'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/issues/20184'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/pull/23679'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/pull/23687'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/pull/26460'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:1076'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:1570'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1456'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3023'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0132'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0133'}, {'type': 'WEB', 'url': 'https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0/'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap-sass/CVE-2016-10735.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/twbs/bootstrap'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:39Z', 'nvd_published_at': '2019-01-09T05:29:00Z'}" +1.4.0,GHSA-8222-6fc8-mhvf,2021-06-15T16:59:20Z,2019-01-25T16:18:52Z,,['CVE-2019-3773'],Vulnerability that affects org.springframework.ws:spring-ws and org.springframework.ws:spring-xml,"Spring Web Services, versions 2.4.3, 3.0.4, and older unsupported versions of all three projects, were susceptible to XML External Entity Injection (XXE) when receiving XML data from untrusted sources.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.ws:spring-ws'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.ws:spring-ws'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.4'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.ws:spring-xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.ws:spring-xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.4'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3773'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8222-6fc8-mhvf'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2019-3773'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2021.html'}]","{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:54Z', 'nvd_published_at': '2019-01-18T22:29:00Z'}" +1.4.0,GHSA-r28v-mw67-m5p9,2023-09-05T12:37:34Z,2019-01-04T17:50:07Z,,['CVE-2018-7536'],Django Denial-of-service possibility in urlize and urlizetrunc template filters,"An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. The `django.utils.html.urlize()` function was extremely slow to evaluate certain inputs due to catastrophic backtracking vulnerabilities in two regular expressions (only one regular expression for Django 1.8.x). The `urlize()` function is used to implement the urlize and urlizetrunc template filters, which were thus vulnerable.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11'}, {'fixed': '1.11.11'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8'}, {'fixed': '1.8.19'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-7536'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/1ca63a66ef3163149ad822701273e8a1844192c2'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/abf89d729f210c692a50e0ad3f75fb6bec6fae16'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/e157315da3ae7005fa0683ffc9751dbeca7306c8'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2927'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0051'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0082'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0265'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-r28v-mw67-m5p9'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/03/msg00006.html'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3591-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2018/dsa-4161'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2018/mar/06/security-releases/'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/103361'}]","{'cwe_ids': ['CWE-185'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:53:19Z', 'nvd_published_at': '2018-03-09T20:29:00Z'}" +1.4.0,GHSA-mc23-976p-j42x,2022-12-18T23:44:26Z,2019-01-14T16:19:55Z,,['CVE-2019-0542'],xterm vulnerable to remote code execution ,A remote code execution vulnerability exists in Xterm.js when the component mishandles special characters.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'xterm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'xterm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.9.0'}, {'fixed': '3.9.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'xterm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10.0'}, {'fixed': '3.10.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0542'}, {'type': 'WEB', 'url': 'https://github.com/xtermjs/xterm.js/commit/3592c641cd0348e0b698e8a180aea2072c6bcd9a'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:0959'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1422'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2551'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2552'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mc23-976p-j42x'}, {'type': 'PACKAGE', 'url': 'https://github.com/xtermjs/xterm.js'}, {'type': 'WEB', 'url': 'https://github.com/xtermjs/xterm.js/releases/tag/3.8.1'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106434'}]","{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:45:48Z', 'nvd_published_at': '2019-01-09T15:29:00Z'}" +1.4.0,GHSA-f9hv-mg5h-xcw9,2023-06-12T22:34:10Z,2019-01-04T19:06:57Z,,['CVE-2018-19360'],Deserialization of Untrusted Data in jackson-databind due to polymorphic deserialization,FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the axis2-transport-jms class from polymorphic deserialization.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.11.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.8.11.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.9.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.9.4'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19360'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2186'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/42912cac4753f3f718ece875e4d486f8264c2f2b'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:0959'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0782'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0877'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1782'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1797'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1822'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1823'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2804'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2858'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3002'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3140'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3149'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3892'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:4037'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.8'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-f9hv-mg5h-xcw9'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/TINKERPOP-2121'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/37e1ed724a1b0e5d191d98c822c426670bdfde83804567131847d2a3@%3Cdevnull.infra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/c70da3cb6e3f03e0ad8013e38b6959419d866c4a7c80fdd34b73f25c@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/May/68'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190530-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4452'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/107985'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:16Z', 'nvd_published_at': None}" +1.4.0,GHSA-4q69-q4q7-x82c,2023-09-06T20:01:34Z,2019-01-04T17:41:46Z,,['CVE-2017-18353'],rendertron can remotely shut down Chrome instance,Rendertron 1.0.0 includes an `_ah/stop` route to shutdown the Chrome instance responsible for serving render requests to all users. Visiting this route with a GET request allows any unauthorized remote attacker to disable the core service of the application.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'rendertron'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-18353'}, {'type': 'WEB', 'url': 'https://github.com/GoogleChrome/rendertron/pull/88'}, {'type': 'WEB', 'url': 'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/chromium/issues/detail?id=759111'}, {'type': 'PACKAGE', 'url': 'https://github.com/GoogleChrome/rendertron'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4q69-q4q7-x82c'}]","{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:46Z', 'nvd_published_at': None}" +1.4.0,GHSA-77rc-x84q-pv4f,2022-09-14T22:41:33Z,2019-01-25T16:19:19Z,,['CVE-2018-20245'],Improper Certificate Validation in Apache Airflow,The LDAP auth backend (airflow.contrib.auth.backends.ldap_auth) prior to Apache Airflow 1.10.1 was misconfigured and contained improper checking of exceptions which disabled server certificate checking.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20245'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-77rc-x84q-pv4f'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b549c7573b342a6e457e5a3225c33054244343927bbfb2a4cdc4cf73@%3Cdev.airflow.apache.org%3E'}]","{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:21:58Z', 'nvd_published_at': None}" +1.4.0,GHSA-3wc8-659g-r88q,2020-06-16T20:56:44Z,2019-01-25T16:18:56Z,,['CVE-2019-3774'],Low severity vulnerability that affects org.springframework.batch:spring-batch-core,"Spring Batch versions 3.0.9, 4.0.1, 4.1.0, and older unsupported versions, were susceptible to XML External Entity Injection (XXE) when receiving XML data from untrusted sources.",[],"[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.batch:spring-batch-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.batch:spring-batch-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.batch:spring-batch-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.1'}]}], 'versions': ['4.1.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3774'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3wc8-659g-r88q'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r01292194daa9ed3117b34dabec0c26929f6db13b9613fc144f720d52@%3Cissues.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0153a08177fcfac7584c7b9ea3027f1e8f18f770126f905b9989190e@%3Cissues.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r08e7ddc354bdcbf95d88399f18b3d804865034f8bc706095e594b29f@%3Cissues.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2349237482bcec43632d9d78d7d2804520d9a82f4d8b1fd96bb616b8@%3Cissues.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r47c7f67a3067ec09262eef0705abc42ea1b646699d9198bcaf8dad02@%3Cissues.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5fbb63e405d2211c16524d33f52e3b122109d3bc88d5f74623fb212d@%3Ccommits.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r78645ca0eef44a276e144447fb2087db758b1fb8826d0330b3f0da1a@%3Cissues.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r79991aeb5d0c53c67e400e037c72758a06607752ca2f23b5302dd61f@%3Cissues.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r96d90e59bb12af5e5c631dcf7d7d80857a52bf3dc44d5b85553e7fc4@%3Cissues.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra329bb85da9da93ac6f9b5fc0fc5446a3af0ee2a62c5de484da0af54@%3Ccommits.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra62a3bf48ab4e0e9aaed970b03d79a73224d68a4275858c707542f6c@%3Cissues.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra8c7573911082e9968f4835943045ad0952232bb6314becf23dc3de5@%3Cissues.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raae74a9290784e20e86fcd4e2525fa8700aeed6f65f3613b5b04bb11@%3Ccommits.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb9fe3ae33246d7f11604a1c85c861cb013a1e32248a43a0c22457107@%3Cissues.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcd26a5409af7356b5f69b2fafae3cf621bff8bf155f50e9ccf9ed5f6@%3Cissues.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcd4945d66d8bb2fc92396af56a70ede4af983a2c98166f1281338346@%3Cissues.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ree71c6425d2cc0e36b77bda6902965a657c1e09c7229459811d66474@%3Cissues.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf83697efcbcfe1131e31bbc7025cb3ee1db5d9185e9481093b2ef961@%3Cissues.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfea6eebfebb13bc015f258e7fa31d4e24a4202601be3b307da28d530@%3Ccommits.servicemix.apache.org%3E'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2019-3774'}]","{'cwe_ids': ['CWE-611'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:44Z', 'nvd_published_at': None}" +1.4.0,GHSA-9gqg-3fxr-9hv7,2023-08-30T23:28:15Z,2019-01-25T16:19:09Z,,['CVE-2017-17836'],Apache Airflow vulnerable to XSS,"In Apache Airflow 1.8.2 and earlier, an experimental Airflow feature displayed authenticated cookies, as well as passwords to databases used by Airflow. An attacker who has limited access to airflow, weather it be via XSS or by leaving a machine unlocked can exfil all credentials from the system.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.8.2'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-17836'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9gqg-3fxr-9hv7'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ade4d54ebf614f68dc81a08891755e60ea58ba88e0209233eeea5f57@%3Cdev.airflow.apache.org%3E'}]","{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:37Z', 'nvd_published_at': None}" +1.4.0,GHSA-38rv-5jqc-m2cv,2023-09-01T20:25:56Z,2019-01-04T17:48:09Z,,['CVE-2017-0906'],Recurly vulnerable to SSRF,"The Recurly Client Python Library before 2.0.5, 2.1.16, 2.2.22, 2.3.1, 2.4.5, 2.5.1, 2.6.2 is vulnerable to a Server-Side Request Forgery vulnerability in the `Resource.get` method that could result in compromise of API keys or other critical resources.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]}], 'versions': ['2.5.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.5'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.22'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.16'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'recurly'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0906'}, {'type': 'WEB', 'url': 'https://github.com/recurly/recurly-client-python/commit/049c74699ce93cf126feff06d632ea63fba36742'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/288635'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-38rv-5jqc-m2cv'}]","{'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:38Z', 'nvd_published_at': None}" +1.4.0,GHSA-3mgp-fx93-9xv5,2023-01-23T20:33:58Z,2019-01-17T13:57:34Z,,['CVE-2018-20676'],XSS vulnerability that affects bootstrap,"In Bootstrap before 3.4.0, XSS is possible in the tooltip data-viewport attribute.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'bootstrap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20676'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/issues/27044'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/issues/27915#issuecomment-452196628'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/pull/27047'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/commit/2a5ba23ce8f041f3548317acc992ed8a736b609d'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:1076'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:1570'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1456'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3023'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0132'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0133'}, {'type': 'WEB', 'url': 'https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0/'}, {'type': 'PACKAGE', 'url': 'https://github.com/twbs/bootstrap'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:55:33Z', 'nvd_published_at': '2019-01-09T05:29:00Z'}" +1.4.0,GHSA-7qqv-r2q4-jxhm,2021-09-03T21:43:07Z,2019-01-14T16:19:31Z,,['CVE-2018-1000809'],High severity vulnerability that affects privacyIDEA,privacyIDEA version 2.23.1 and earlier contains a Improper Input Validation vulnerability in token validation api that can result in Denial-of-Service. This attack appear to be exploitable via http request with user=&pass= to /validate/check url. This vulnerability appears to have been fixed in 2.23.2.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'privacyIDEA'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.23.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000809'}, {'type': 'WEB', 'url': 'https://github.com/privacyidea/privacyidea/issues/1227'}, {'type': 'WEB', 'url': 'https://github.com/privacyidea/privacyidea/commit/a3edc09beffa2104f357fe24971ea3211ce40751'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7qqv-r2q4-jxhm'}, {'type': 'PACKAGE', 'url': 'https://github.com/privacyidea/privacyidea'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:21Z', 'nvd_published_at': None}" +1.4.0,GHSA-68wv-rjrm-576p,2022-09-14T22:40:56Z,2019-01-25T16:19:14Z,,['CVE-2017-17835'],Cross-Site Request Forgery (CSRF) in Apache Airflow,"In Apache Airflow 1.8.2 and earlier, a CSRF vulnerability allowed for a remote command injection on a default install of Airflow.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.8.2'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-17835'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-68wv-rjrm-576p'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ade4d54ebf614f68dc81a08891755e60ea58ba88e0209233eeea5f57@%3Cdev.airflow.apache.org%3E'}]","{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:18:39Z', 'nvd_published_at': None}" +1.4.0,GHSA-ph58-4vrj-w6hr,2023-01-23T21:29:22Z,2019-01-17T13:57:56Z,,['CVE-2018-20677'],bootstrap Cross-site Scripting vulnerability,"In Bootstrap before 3.4.0, XSS is possible in the affix configuration target property.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'bootstrap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20677'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/issues/27045'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/issues/27915#issuecomment-452140906'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/issues/27915#issuecomment-452196628'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/pull/27047'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/commit/2a5ba23ce8f041f3548317acc992ed8a736b609d'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:1076'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:1570'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1456'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3023'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0132'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0133'}, {'type': 'WEB', 'url': 'https://blog.getbootstrap.com/2018/12/13/bootstrap-3-4-0/'}, {'type': 'PACKAGE', 'url': 'https://github.com/twbs/bootstrap'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e@%3Cdev.superset.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:11Z', 'nvd_published_at': '2019-01-09T05:29:00Z'}" +1.4.0,GHSA-mx9v-gmh4-mgqw,2022-09-14T22:31:36Z,2019-01-04T19:07:01Z,,['CVE-2018-19361'],Deserialization of Untrusted Data in jackson-databind,FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the openjpa class from polymorphic deserialization.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.9.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.9.4'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.11.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.8.11.2'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19361'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2186'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/42912cac4753f3f718ece875e4d486f8264c2f2b'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:0959'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0782'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0877'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1782'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1797'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1822'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1823'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2804'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2858'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3002'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3140'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3149'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3892'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:4037'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.8'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mx9v-gmh4-mgqw'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/TINKERPOP-2121'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/37e1ed724a1b0e5d191d98c822c426670bdfde83804567131847d2a3@%3Cdevnull.infra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/c70da3cb6e3f03e0ad8013e38b6959419d866c4a7c80fdd34b73f25c@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/May/68'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190530-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4452'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/107985'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:38Z', 'nvd_published_at': None}" +1.4.0,GHSA-j87c-cj65-vmh5,2023-09-06T20:06:31Z,2019-01-04T17:41:51Z,,['CVE-2017-18354'],rendertron LFI vulnerability,Rendertron 1.0.0 allows for alternative protocols such as 'file://' introducing a Local File Inclusion (LFI) bug where arbitrary files can be read by a remote attacker.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'rendertron'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-18354'}, {'type': 'WEB', 'url': 'https://github.com/GoogleChrome/rendertron/pull/88'}, {'type': 'WEB', 'url': 'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/chromium/issues/detail?id=759111'}, {'type': 'PACKAGE', 'url': 'https://github.com/GoogleChrome/rendertron'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j87c-cj65-vmh5'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:38Z', 'nvd_published_at': None}" +1.4.0,GHSA-xvwv-6wvx-px9x,2023-09-01T21:13:18Z,2019-01-04T17:47:21Z,,['CVE-2017-1000484'],Plone Open Redirect,"By linking to a specific url in Plone 2.5-5.1rc1 with a parameter, an attacker could send you to his own website. On its own this is not so bad: the attacker could more easily link directly to his own website instead. But in combination with another attack, you could be sent to the Plone login form and login, then get redirected to the specific url, and then get a second redirect to the attacker website. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.16'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000484'}, {'type': 'WEB', 'url': 'https://github.com/plone/Products.CMFPlone/issues/2232'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xvwv-6wvx-px9x'}, {'type': 'PACKAGE', 'url': 'https://github.com/plone/Plone'}, {'type': 'WEB', 'url': 'https://plone.org/security/hotfix/20171128/an-open-redirection-when-calling-a-specific-url'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:04:39Z', 'nvd_published_at': None}" +1.4.0,GHSA-mvjj-gqq2-p4hw,2023-09-13T19:45:25Z,2019-01-04T19:05:35Z,,['CVE-2018-6341'],Cross-Site Scripting in react-dom,"Affected versions of `react-dom` are vulnerable to Cross-Site Scripting (XSS). The package fails to validate attribute names in HTML tags which may lead to Cross-Site Scripting in specific scenarios. This may allow attackers to execute arbitrary JavaScript in the victim's browser. To be affected by this vulnerability, the application needs to: +- be a server-side React app +- be rendered to HTML using `ReactDOMServer` +- include an attribute name from user input in an HTML tag + + +## Recommendation + +If you are using `react-dom` 16.0.x, upgrade to 16.0.1 or later. +If you are using `react-dom` 16.1.x, upgrade to 16.1.2 or later. +If you are using `react-dom` 16.2.x, upgrade to 16.2.1 or later. +If you are using `react-dom` 16.3.x, upgrade to 16.3.3 or later. +If you are using `react-dom` 16.4.x, upgrade to 16.4.2 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'react-dom'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '16.0.0'}, {'fixed': '16.0.1'}]}], 'versions': ['16.0.0']}, {'package': {'ecosystem': 'npm', 'name': 'react-dom'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '16.1.0'}, {'fixed': '16.1.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'react-dom'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '16.2.0'}, {'fixed': '16.2.1'}]}], 'versions': ['16.2.0']}, {'package': {'ecosystem': 'npm', 'name': 'react-dom'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '16.3.0'}, {'fixed': '16.3.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'react-dom'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '16.4.0'}, {'fixed': '16.4.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-6341'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mvjj-gqq2-p4hw'}, {'type': 'WEB', 'url': 'https://reactjs.org/blog/2018/08/01/react-v-16-4-2.html'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:react-dom:20180802'}, {'type': 'WEB', 'url': 'https://twitter.com/reactjs/status/1024745321987887104'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1421'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:15Z', 'nvd_published_at': None}" +1.4.0,GHSA-chj8-5xgw-wcvj,2021-09-09T18:04:45Z,2019-01-07T19:14:46Z,,['CVE-2016-8750'],Moderate severity vulnerability that affects org.apache.karaf:apache-karaf,"Apache Karaf prior to 4.0.8 used the LDAPLoginModule to authenticate users to a directory via LDAP. However, it did not encoding usernames properly and hence was vulnerable to LDAP injection attacks leading to a denial of service.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.karaf:apache-karaf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-8750'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1322'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-chj8-5xgw-wcvj'}, {'type': 'WEB', 'url': 'https://karaf.apache.org/security/cve-2016-8750.txt'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/103098'}]","{'cwe_ids': ['CWE-90'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:31:46Z', 'nvd_published_at': None}" +1.4.0,GHSA-98gj-wwxm-cj3h,2023-08-07T16:27:52Z,2019-01-04T17:47:50Z,,['CVE-2017-16876'],mistune Cross-site scripting (XSS) vulnerability,"Cross-site scripting (XSS) vulnerability in the _keyify function in mistune.py in Mistune before 0.8.1 allows remote attackers to inject arbitrary web script or HTML by leveraging failure to escape the ""key"" argument.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'mistune'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16876'}, {'type': 'WEB', 'url': 'https://github.com/lepture/mistune/commit/5f06d724bc05580e7f203db2d4a4905fc1127f98'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1524596'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-98gj-wwxm-cj3h'}, {'type': 'PACKAGE', 'url': 'https://github.com/lepture/mistune'}, {'type': 'WEB', 'url': 'https://github.com/lepture/mistune/blob/master/CHANGES.rst'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NUR3GMHQBMA3UC4PFMCK6GCLOQC4LQQC/'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:52Z', 'nvd_published_at': None}" +1.4.0,GHSA-vx85-mj8c-4qm6,2023-09-11T18:30:27Z,2019-01-17T13:56:33Z,,['CVE-2018-11798'],Apache Thrift Node.js static web server sandbox escape,The Apache Thrift Node.js static web server in versions 0.9.2 through 0.11.0 have been determined to contain a security vulnerability in which a remote user has the ability to access files outside the set webservers docroot path.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.thrift:libthrift'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.2'}, {'fixed': '0.12.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11798'}, {'type': 'WEB', 'url': 'https://github.com/apache/thrift/pull/1606'}, {'type': 'WEB', 'url': 'https://github.com/apache/thrift/commit/2a2b72f6c8aef200ecee4984f011e06052288ff2'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1545'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3140'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vx85-mj8c-4qm6'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/THRIFT-4647'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6e9edd282684896cedf615fb67a02bebfe6007f2d5baf03ba52e34fd@%3Cuser.thrift.apache.org%3E'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227094236/http://www.securityfocus.com/bid/106501'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}]","{'cwe_ids': ['CWE-538'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:46Z', 'nvd_published_at': None}" +1.4.0,GHSA-37hp-765x-j95x,2023-09-05T14:07:04Z,2019-01-04T17:50:26Z,,['CVE-2017-7233'],Django Open redirect and possible XSS attack via user-supplied numeric redirect URLs,"Django 1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18 relies on user input in some cases to redirect the user to an ""on success"" URL. The security check for these redirects (namely ``django.utils.http.is_safe_url()``) considered some numeric URLs ""safe"" when they shouldn't be, aka an open redirect vulnerability. Also, if a developer relies on ``is_safe_url()`` to provide safe redirect targets and puts such a URL into a link, they could suffer from an XSS attack.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10'}, {'fixed': '1.10.7'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.9'}, {'fixed': '1.9.13'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8'}, {'fixed': '1.8.18'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7233'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1445'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1451'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1462'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1470'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1596'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3093'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2927'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-37hp-765x-j95x'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2017/apr/04/security-releases/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2017/dsa-3835'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/97406'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1038177'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:21Z', 'nvd_published_at': None}" +1.4.0,GHSA-c8hm-7hpq-7jhg,2021-06-10T23:51:07Z,2019-01-04T19:07:03Z,,['CVE-2018-19362'],High severity vulnerability that affects com.fasterxml.jackson.core:jackson-databind,FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspecified impact by leveraging failure to block the jboss-common-core class from polymorphic deserialization.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.11.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.8.11.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.9.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.9.4'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19362'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2186'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/42912cac4753f3f718ece875e4d486f8264c2f2b'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:0959'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0782'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0877'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1782'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1797'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1822'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1823'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2804'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2858'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3002'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3140'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3149'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3892'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:4037'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.8'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c8hm-7hpq-7jhg'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/TINKERPOP-2121'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/37e1ed724a1b0e5d191d98c822c426670bdfde83804567131847d2a3@%3Cdevnull.infra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/c70da3cb6e3f03e0ad8013e38b6959419d866c4a7c80fdd34b73f25c@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/May/68'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190530-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4452'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/107985'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:35Z', 'nvd_published_at': None}" +1.4.0,GHSA-4gq5-ch57-c2mg,2023-09-13T18:31:09Z,2019-01-04T19:09:49Z,,['CVE-2018-14719'],Arbitrary Code Execution in jackson-databind,"FasterXML jackson-databind 2.x before 2.9.7, 2.8.11.3, and 2.7.9.5 might allow remote attackers to execute arbitrary code by leveraging failure to block the blaze-ds-opt and blaze-ds-core classes from polymorphic deserialization.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.11.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.8.11.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.7.9.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.9.4'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14719'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2097'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:0959'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0782'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0877'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1782'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1797'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1822'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1823'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2804'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2858'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3002'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3140'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3149'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3892'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:4037'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.7'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/May/68'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190530-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4452'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:21Z', 'nvd_published_at': '2019-01-02T18:29:00Z'}" +1.4.0,GHSA-cq9c-55r7-455x,2022-09-14T22:34:31Z,2019-01-07T19:14:51Z,,['CVE-2018-11787'],Improper Authentication in Apache Karaf,"In Apache Karaf version prior to 3.0.9, 4.0.9, 4.1.1, when the webconsole feature is installed in Karaf, it is available at .../system/console and requires authentication to access it. One part of the console is a Gogo shell/console that gives access to the command line console of Karaf via a Web browser, and when navigated to it is available at .../system/console/gogo. Trying to go directly to that URL does require authentication. And optional bundle that some applications use is the Pax Web Extender Whiteboard, it is part of the pax-war feature and perhaps others. When it is installed, the Gogo console becomes available at another URL .../gogo/, and that URL is not secured giving access to the Karaf console to unauthenticated users. A mitigation for the issue is to manually stop/uninstall Gogo plugin bundle that is installed with the webconsole feature, although of course this removes the console from the .../system/console application, not only from the unauthenticated endpoint. One could also stop/uninstall the Pax Web Extender Whiteboard, but other components/applications may require it and so their functionality would be reduced/compromised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.karaf:apache-karaf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.9'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.karaf:apache-karaf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.9'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.karaf:apache-karaf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.1'}]}], 'versions': ['4.1.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11787'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cq9c-55r7-455x'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/KARAF-4993'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/d9ba4c3104ba32225646879a057b75b54430f349c246c85469037d3c@%3Cdev.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'http://karaf.apache.org/security/cve-2018-11787.txt'}]","{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:32:22Z', 'nvd_published_at': None}" +1.4.0,GHSA-29gp-92wp-94q8,2022-08-03T19:36:45Z,2019-01-04T17:41:20Z,,['CVE-2018-6342'],react-dev-utils on Windows vulnerable to Remote Code Execution,"`react-dev-utils` on Windows is vulnerable to remote code execution. + + +## Recommendation + +Update to one of the following versions, depending on the release line that you are using. +- 1.0.4 +- 2.0.2 +- 3.1.2 +- 4.2.2 +- 5.0.2 +- 6.0.0-next.a671462c",[],"[{'package': {'ecosystem': 'npm', 'name': 'react-dev-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'react-dev-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'react-dev-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'react-dev-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.2.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'react-dev-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-6342'}, {'type': 'WEB', 'url': 'https://github.com/facebook/create-react-app/pull/4866'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-29gp-92wp-94q8'}, {'type': 'PACKAGE', 'url': 'https://github.com/facebook/create-react-app'}, {'type': 'WEB', 'url': 'https://github.com/facebook/create-react-app/releases/tag/v1.1.5'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/695'}]","{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:51:46Z', 'nvd_published_at': '2018-12-31T22:29:00Z'}" +1.4.0,GHSA-2f9x-5v75-3qv4,2023-09-05T14:06:09Z,2019-01-04T17:50:00Z,,['CVE-2018-7537'],Django Denial-of-service possibility in truncatechars_html and truncatewords_html template filters,"An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. If django.utils.text.Truncator's chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0'}, {'fixed': '2.0.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11'}, {'fixed': '1.11.11'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8'}, {'fixed': '1.8.19'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-7537'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2927'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0265'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2f9x-5v75-3qv4'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/03/msg00006.html'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3591-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2018/dsa-4161'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2018/mar/06/security-releases/'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/103357'}]","{'cwe_ids': ['CWE-185'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:51:51Z', 'nvd_published_at': None}" +1.4.0,GHSA-h4hv-m4h4-mhwg,2023-09-05T18:19:49Z,2019-01-04T17:50:17Z,,['CVE-2017-7234'],Django open redirect,"A maliciously crafted URL to a Django (1.10 before 1.10.7, 1.9 before 1.9.13, and 1.8 before 1.8.18) site using the `django.views.static.serve()` view could redirect to any other domain, aka an open redirect vulnerability.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10'}, {'fixed': '1.10.7'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.9'}, {'fixed': '1.9.13'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8'}, {'fixed': '1.8.18'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7234'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h4hv-m4h4-mhwg'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20170429023907/http://www.securitytracker.com/id/1038177'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20170526042328/http://www.securityfocus.com/bid/97401'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2017/apr/04/security-releases/'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2017/dsa-3835'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:38:44Z', 'nvd_published_at': None}" +1.4.0,GHSA-j88m-953w-8r2c,2023-09-06T20:07:11Z,2019-01-07T19:14:21Z,,['CVE-2017-18352'],rendertron XSS vulnerability,Error reporting within Rendertron 1.0.0 allows reflected Cross Site Scripting (XSS) from invalid URLs.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'rendertron'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-18352'}, {'type': 'WEB', 'url': 'https://github.com/GoogleChrome/rendertron/pull/88'}, {'type': 'WEB', 'url': 'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/chromium/issues/detail?id=759111'}, {'type': 'PACKAGE', 'url': 'https://github.com/GoogleChrome/rendertron'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j88m-953w-8r2c'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:41Z', 'nvd_published_at': None}" +1.4.0,GHSA-q485-j897-qc27,2022-09-14T22:34:12Z,2019-01-07T19:14:34Z,,['CVE-2018-20433'],XML External Entity Reference in mchange:c3p0,c3p0 0.9.5.2 allows XXE in extractXmlConfigFromInputStream in com/mchange/v2/c3p0/cfg/C3P0ConfigXmlUtils.java during initialization.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.mchange:c3p0'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.5.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.5.2'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20433'}, {'type': 'WEB', 'url': 'https://github.com/zhutougg/c3p0/commit/2eb0ea97f745740b18dd45e4a909112d4685f87b'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q485-j897-qc27'}, {'type': 'PACKAGE', 'url': 'https://github.com/zhutougg/c3p0'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2018/12/msg00021.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFIVX6HOVNLAM7W3SUAMHYRNLCVQSAWR/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQ47OFV57Y2DAHMGA5H3JOL4WHRWRFN4/'}]","{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:54Z', 'nvd_published_at': None}" +1.4.0,GHSA-92wj-x78c-m4fx,2023-09-11T22:40:24Z,2019-01-07T19:14:49Z,,['CVE-2018-11788'],XML External Entity Reference in Apache Karaf,"Apache Karaf provides a features deployer, which allows users to ""hot deploy"" a features XML by dropping the file directly in the deploy folder. The features XML is parsed by XMLInputFactory class. Apache Karaf XMLInputFactory class doesn't contain any mitigation codes against XXE. This is a potential security risk as an user can inject external XML entities in Apache Karaf version prior to 4.1.7 or 4.2.2. It has been fixed in Apache Karaf 4.1.7 and 4.2.2 releases.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.karaf.specs:org.apache.karaf.specs.java.xml'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.karaf.specs:org.apache.karaf.specs.java.xml'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11788'}, {'type': 'WEB', 'url': 'https://github.com/apache/karaf/commit/0c36c50bc158739c8fc8543122a6740c54adafca'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/karaf'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227101219/https://www.securityfocus.com/bid/106479/'}, {'type': 'WEB', 'url': 'http://karaf.apache.org/security/cve-2018-11788.txt'}]","{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:16Z', 'nvd_published_at': None}" +1.4.0,GHSA-9r8w-6x8c-6jr9,2023-09-05T17:57:28Z,2019-01-04T17:50:34Z,,['CVE-2017-12794'],Django vulnerable to XSS on 500 pages,"In Django 1.10.x before 1.10.8 and 1.11.x before 1.11.5, HTML autoescaping was disabled in a portion of the template for the technical 500 debug page. Given the right circumstances, this allowed a cross-site scripting attack. This vulnerability shouldn't affect most production sites since you shouldn't run with `DEBUG = True` (which makes this page accessible) in your production settings.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed': '1.10.8'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12794'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9r8w-6x8c-6jr9'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3559-1/'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20170927072701/http://www.securitytracker.com/id/1039264'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227150819/http://www.securityfocus.com/bid/100643'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2017/sep/05/security-releases/'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:31Z', 'nvd_published_at': None}" +1.4.0,GHSA-jhjh-ghwx-6h7r,2023-09-01T09:30:29Z,2019-01-17T13:56:18Z,,['CVE-2017-1002157'],modulemd uses an unsafe function for processing externally provided data,"modulemd 1.3.1 and earlier uses an unsafe function for processing externally provided data, leading to remote code execution.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'modulemd'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1002157'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jhjh-ghwx-6h7r'}, {'type': 'PACKAGE', 'url': 'https://github.com/xsuchy/modulemd'}, {'type': 'WEB', 'url': 'https://pagure.io/modulemd/issue/55'}]","{'cwe_ids': ['CWE-20', 'CWE-242'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:31Z', 'nvd_published_at': '2019-01-10T21:29:00Z'}" +1.4.0,GHSA-x2w5-5m2g-7h5m,2023-06-12T22:34:49Z,2019-01-04T19:09:46Z,,['CVE-2018-14720'],XML External Entity Reference (XXE) in jackson-databind,FasterXML jackson-databind 2.x before 2.9.7 might allow attackers to conduct external XML entity (XXE) attacks by leveraging failure to block unspecified JDK classes from polymorphic deserialization.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.11.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.8.11.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.9.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.9.2'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14720'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2097'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:0959'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0782'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1106'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1107'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1108'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1140'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1822'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1823'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2858'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3149'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3892'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:4037'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.7'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-x2w5-5m2g-7h5m'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6a78f88716c3c57aa74ec05764a37ab3874769a347805903b393b286@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/82b01bfb6787097427ce97cec6a7127e93718bc05d1efd5eaffc228f@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ba973114605d936be276ee6ce09dfbdbf78aa56f6cdc6e79bfa7b8df@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/May/68'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190530-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4452'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}]","{'cwe_ids': ['CWE-502', 'CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:50Z', 'nvd_published_at': None}" +1.4.0,GHSA-rprw-h62v-c2w7,2023-09-05T17:58:47Z,2019-01-04T17:45:26Z,,['CVE-2017-18342'],PyYAML insecurely deserializes YAML strings leading to arbitrary code execution,"In PyYAML before 4.1, the `yaml.load()` API could execute arbitrary code. In other words, `yaml.safe_load` is not used.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'PyYAML'}, 'ecosystem_specific': {'affected_functions': ['yaml.load', 'yaml.dump', 'safe_dump_all', 'safe_dump', 'yaml.CSafeLoader', 'yaml.CLoader', 'yaml.CSafeDumper', 'yaml.CDumper', 'yaml.SafeDumper', 'yaml.Dumper', 'yaml.SafeLoader', 'yaml.Loader']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-18342'}, {'type': 'WEB', 'url': 'https://github.com/marshmallow-code/apispec/issues/278'}, {'type': 'WEB', 'url': 'https://github.com/yaml/pyyaml/issues/193'}, {'type': 'WEB', 'url': 'https://github.com/yaml/pyyaml/pull/74'}, {'type': 'WEB', 'url': 'https://github.com/yaml/pyyaml/commit/7b68405c81db889f83c32846462b238ccae5be80'}, {'type': 'PACKAGE', 'url': 'https://github.com/yaml/pyyaml'}, {'type': 'WEB', 'url': 'https://github.com/yaml/pyyaml/blob/master/CHANGES'}, {'type': 'WEB', 'url': 'https://github.com/yaml/pyyaml/wiki/PyYAML-yaml.load(input)-Deprecation'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEX7IPV5P2QJITAMA5Z63GQCZA5I6NVZ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSQQMRUQSXBSUXLCRD3TSZYQ7SEZRKCE/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6JCFGEIEOFMWWIXGHSELMKQDD4CV2BA/'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202003-45'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:26Z', 'nvd_published_at': None}" +1.4.0,GHSA-wjxj-f8rg-99wx,2023-03-01T20:05:50Z,2019-01-17T13:56:40Z,,['CVE-2018-1320'],Improper Input Validation in Apache Thrift,Apache Thrift Java client library versions 0.5.0 prior to 0.9.3-1 and 0.10.0 prior to 0.12.0 can bypass SASL negotiation isComplete validation in the org.apache.thrift.transport.TSaslTransport class. An assert used to determine if the SASL handshake had successfully completed could be disabled in production settings making the validation incomplete.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.thrift:libthrift'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.5.0'}, {'fixed': '0.9.3-1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.thrift:libthrift'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.10.0'}, {'fixed': '0.12.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1320'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2413'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/thrift'}, {'type': 'WEB', 'url': 'https://github.com/apache/thrift/releases/tag/0.9.3.1'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/THRIFT-4506'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/07c3cd5a2953a4b253eee4437b1397b1603d0f886437e19b657d2c54@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/187684ac8b94d55256253f5220cb55e8bd568afdf9a8a86e9bbb66c9@%3Cdevnull.infra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/3d3b6849fcf4cd1e87703b3dde0d57aabeb9ba0193dc0cf3c97f545d@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6b07f6f618155c777191b4fad8ade0f0cf4ed4c12a1a746ce903d816@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/8be5b16c02567fff61b1284e5df433a4e38617bc7de4804402bf62be@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/da5234b5e78f1c99190407f791dfe1bf6c58de8d30d15974a9669be3@%3Cuser.thrift.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/dbe3a39b48900318ad44494e8721f786901ba4520cd412c7698f534f@%3Cdev.storm.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/dfee89880c84874058c6a584d8128468f8d3c2ac25068ded91073adc@%3Cuser.storm.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/e825ff2f4e129c0ecdb6a19030b53c1ccdf810a8980667628d0c6a80@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r09c3dcdccf4b74ad13bda79b354e6b793255ccfe245cca1b8cee23f5@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1015eaadef8314daa9348aa423086a732cfeb998ceb5d42605c9b0b5@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2278846f7ab06ec07a0aa31457235e0ded9191b216cba55f3f315f16@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r261972a3b14cf6f1dcd94b1b265e9ef644a38ccdf0d0238fa0c4d459@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3d71a6dbb063aa61ba81278fe622b20bfe7501bb3821c27695641ac3@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4d3f1d3e333d9c2b2f6e6ae8ed8750d4de03410ac294bcd12c7eefa3@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/02/msg00008.html'}, {'type': 'WEB', 'url': 'https://support.f5.com/csp/article/K36361684'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227094237/http://www.securityfocus.com/bid/106551'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/07/24/3'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106551'}]","{'cwe_ids': ['CWE-20', 'CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:45Z', 'nvd_published_at': '2019-01-07T17:29:00Z'}" +1.4.0,GHSA-cf66-xwfp-gvc4,2022-04-06T20:39:38Z,2019-01-04T17:40:59Z,,['CVE-2018-14732'],Missing Origin Validation in webpack-dev-server,"Versions of `webpack-dev-server` before 3.1.10 are missing origin validation on the websocket server. This vulnerability allows a remote attacker to steal a developer's source code because the origin of requests to the websocket server that is used for Hot Module Replacement (HMR) are not validated. + + +## Recommendation +For `webpack-dev-server` update to version 3.1.11 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'webpack-dev-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.11'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14732'}, {'type': 'WEB', 'url': 'https://github.com/webpack/webpack-dev-server/issues/1445'}, {'type': 'WEB', 'url': 'https://github.com/webpack/webpack-dev-server/issues/1620'}, {'type': 'WEB', 'url': 'https://github.com/webpack/webpack-dev-server/commit/f18e5adf123221a1015be63e1ca2491ca45b8d10'}, {'type': 'PACKAGE', 'url': 'https://github.com/webpack/webpack-dev-server'}, {'type': 'WEB', 'url': 'https://github.com/webpack/webpack-dev-server/blob/master/CHANGELOG.md#3111-2018-12-21'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/725'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:31:15Z', 'nvd_published_at': None}" +1.4.0,GHSA-qqv6-5w6p-3pgr,2021-09-16T20:04:03Z,2019-01-04T17:43:30Z,,['CVE-2018-20594'],Moderate severity vulnerability that affects org.hswebframework.web:hsweb-commons,An issue was discovered in hsweb 3.0.4. It is a reflected XSS vulnerability due to the absence of type parameter checking in FlowableModelManagerController.java.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.hswebframework.web:hsweb-commons'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20594'}, {'type': 'WEB', 'url': 'https://github.com/hs-web/hsweb-framework/issues/107'}, {'type': 'WEB', 'url': 'https://github.com/hs-web/hsweb-framework/commit/b72a2275ed21240296c6539bae1049c56abb542f'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qqv6-5w6p-3pgr'}, {'type': 'PACKAGE', 'url': 'https://github.com/hs-web/hsweb-framework'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:34Z', 'nvd_published_at': None}" +1.4.0,GHSA-8fg4-j562-mjrc,2022-09-14T22:38:08Z,2019-01-25T16:19:01Z,,['CVE-2017-15720'],Improper Input Validation in Apache Airflow resulting in Remote Code Execution,"In Apache Airflow 1.8.2 and earlier, an authenticated user can execute code remotely on the Airflow webserver by creating a special object.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.8.2'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15720'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8fg4-j562-mjrc'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ade4d54ebf614f68dc81a08891755e60ea58ba88e0209233eeea5f57@%3Cdev.airflow.apache.org%3E'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:25:26Z', 'nvd_published_at': None}" +1.4.0,GHSA-9mxf-g3x6-wv74,2022-09-14T22:31:12Z,2019-01-04T19:07:06Z,,['CVE-2018-14721'],Server-Side Request Forgery (SSRF) in jackson-databind,FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.11.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.8.11.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.9.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.9.4'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14721'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2097'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:0959'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0782'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1106'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1107'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1108'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1140'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1822'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1823'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2858'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3149'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3892'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:4037'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.7'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9mxf-g3x6-wv74'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/May/68'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190530-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4452'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}]","{'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:04Z', 'nvd_published_at': None}" +1.4.0,GHSA-337x-4q8g-prc5,2023-09-05T18:43:33Z,2019-01-14T16:20:05Z,,['CVE-2019-3498'],Improper Input Validation in Django,"In Django 1.11.x before 1.11.18, 2.0.x before 2.0.10, and 2.1.x before 2.1.5, an Improper Neutralization of Special Elements in Output Used by a Downstream Component issue exists in `django.views.defaults.page_not_found()`, leading to content spoofing (in a 404 error page) if a user fails to recognize that a crafted URL has malicious content.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.18'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.10'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3498'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/dev/releases/security/'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-337x-4q8g-prc5'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/django-announce/VYU7xQQTEPQ'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/01/msg00005.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HVXDOVCXLD74SHR2BENGCE2OOYYYWJHZ/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3851-1/'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227094237/http://www.securityfocus.com/bid/106453'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4363'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2019/jan/04/security-releases/'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:52Z', 'nvd_published_at': '2019-01-09T23:29:00Z'}" +1.4.0,GHSA-645p-88qh-w398,2023-09-14T14:00:55Z,2019-01-04T19:06:55Z,,['CVE-2018-14718'],Arbitrary Code Execution in jackson-databind,"FasterXML jackson-databind 2.x before 2.9.7, 2.8.11.3, 2.7.9.5, and 2.6.7.3 might allow remote attackers to execute arbitrary code by leveraging failure to block the slf4j-ext class from polymorphic deserialization.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.11.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.8.11.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.9.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.9.4'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.6.7.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14718'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2097'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/87d29af25e82a249ea15858e2d4ecbf64091db44'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:0959'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0782'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0877'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1782'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1797'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1822'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1823'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2804'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2858'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3002'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3140'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3149'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3892'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:4037'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.7'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-645p-88qh-w398'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6a78f88716c3c57aa74ec05764a37ab3874769a347805903b393b286@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/82b01bfb6787097427ce97cec6a7127e93718bc05d1efd5eaffc228f@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ba973114605d936be276ee6ce09dfbdbf78aa56f6cdc6e79bfa7b8df@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1d4a247329a8478073163567bbc8c8cb6b49c6bfc2bf58153a857af1@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/03/msg00005.html'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/May/68'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190530-0003/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4452'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106601'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:17:52Z', 'nvd_published_at': '2019-01-02T18:29:00Z'}" +1.4.0,GHSA-mh24-7wvg-v88g,2023-09-01T09:46:45Z,2019-01-30T20:56:26Z,,['CVE-2019-6802'],CRLF Injection in pypiserver,CRLF Injection in pypiserver 1.2.5 and below allows attackers to set arbitrary HTTP headers and possibly conduct XSS attacks via a `%0d%0a` in a URI.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'pypiserver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.2.5'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-6802'}, {'type': 'WEB', 'url': 'https://github.com/pypiserver/pypiserver/issues/237'}, {'type': 'WEB', 'url': 'https://github.com/pypiserver/pypiserver/commit/1375a67c55a9b8d4619df30d2a1c0b239d7357e6'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mh24-7wvg-v88g'}, {'type': 'PACKAGE', 'url': 'https://github.com/pypiserver/pypiserver'}]","{'cwe_ids': ['CWE-74', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:14Z', 'nvd_published_at': '2019-01-25T04:29:00Z'}" +1.4.0,GHSA-54mg-vgrp-mwx9,2021-08-04T15:01:30Z,2019-05-14T04:01:37Z,,['CVE-2019-11808'],Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in Ratpack,"Ratpack versions before 1.6.1 generate a session ID using a cryptographically weak PRNG in the JDK's ThreadLocalRandom. This means that if an attacker can determine a small window for the server start time and obtain a session ID value, they can theoretically determine the sequence of session IDs.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.ratpack:ratpack-session'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.ratpack:ratpack-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.ratpack:ratpack-groovy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11808'}, {'type': 'WEB', 'url': 'https://github.com/ratpack/ratpack/issues/1448'}, {'type': 'WEB', 'url': 'https://github.com/ratpack/ratpack/commit/f2b63eb82dd71194319fd3945f5edf29b8f3a42d'}, {'type': 'WEB', 'url': 'https://github.com/ratpack/ratpack/releases/tag/v1.6.1'}]","{'cwe_ids': ['CWE-338'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2019-05-14T03:48:09Z', 'nvd_published_at': '2019-05-07T07:29:00Z'}" +1.4.0,GHSA-jgmr-wrwx-mgfj,2021-08-03T21:46:37Z,2019-05-14T04:02:35Z,,['CVE-2019-3797'],Exposure of Sensitive Information to an Unauthorized Actor and SQL Injection in Spring Data JPA,"This affects Spring Data JPA in versions up to and including 2.1.5, 2.0.13 and 1.11.19. Derived queries using any of the predicates ?startingWith?, ?endingWith? or ?containing? could return more results than anticipated when a maliciously crafted query parameter value is supplied. Also, LIKE expressions in manually defined queries could return unexpected results if the parameter values bound did not have escaped reserved characters properly.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.data:spring-data-jpa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.20'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.data:spring-data-jpa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.14'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.data:spring-data-jpa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3797'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2019-3797'}]","{'cwe_ids': ['CWE-200', 'CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-10T04:22:00Z', 'nvd_published_at': '2019-05-06T16:29:00Z'}" +1.4.0,GHSA-wv67-9jq7-8r69,2021-08-03T21:47:43Z,2019-05-14T04:02:45Z,,['CVE-2019-5432'],Improper Input Validation and Buffer Over-read in mqtt-packet,"A specifically malformed MQTT Subscribe packet crashes MQTT Brokers using the mqtt-packet module versions < 3.5.1, 4.0.0 - 4.1.3, 5.0.0 - 5.6.1, 6.0.0 - 6.1.2 for decoding.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'mqtt-packet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'mqtt-packet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'mqtt-packet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.6.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'mqtt-packet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.1.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5432'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/541354'}]","{'cwe_ids': ['CWE-125', 'CWE-126'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-10T04:24:12Z', 'nvd_published_at': '2019-05-06T17:29:00Z'}" +1.4.0,GHSA-2xv3-h762-ccxv,2020-08-31T18:31:05Z,2019-05-29T19:18:02Z,,[],Out-of-bounds Read in concat-with-sourcemaps,"Versions of `concat-with-sourcemaps` before 1.0.6 allocates uninitialized Buffers when a number is passed as a separator. + + +## Recommendation + +Update to version 1.0.6 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'concat-with-sourcemaps'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.6'}]}]}]","[{'type': 'WEB', 'url': 'https://hackerone.com/reports/320166'}, {'type': 'WEB', 'url': 'https://github.com/floridoo/concat-with-sourcemaps/blob/v1.0.5/index.js#L18'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/644'}]","{'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-29T19:17:27Z', 'nvd_published_at': None}" +1.4.0,GHSA-37pw-qw47-4jxm,2021-05-11T16:17:59Z,2019-05-31T16:09:15Z,,['CVE-2018-8029'],Privilege escalation vulnerability in Apache Hadoop,"In Apache Hadoop versions 3.0.0-alpha1 to 3.1.0, 2.9.0 to 2.9.1, and 2.2.0 to 2.8.4, a user who can escalate to yarn user can possibly run arbitrary commands as root user.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.8.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8029'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/0b8d58e02dbd0fb8bf7320c514fe58da1d6728bdc150f1ba04e0d9fc@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/17084c09e6dedf60efe08028b429c92ffd28aacc28454e4fa924578a@%3Cgeneral.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a0164b87660223a2d491f83c88f905fe1a9fa8dc795148d9b0d968c8@%3Cdev.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a97c53a81e639ca2fc7b8f61a4fcd1842c2a78544041244a7c624727@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4dddf1705dbedfa94392913b2dad1cd2d1d89040facd389eea0b3510@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb21df54a4e39732ce653d2aa5672e36a792b59eb6717f2a06bb8d02a@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190617-0001/'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/108518'}]","{'cwe_ids': ['CWE-285'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-31T16:08:38Z', 'nvd_published_at': None}" +1.4.0,GHSA-6qh5-wx38-q92g,2020-08-31T18:22:04Z,2019-05-30T17:15:59Z,,[],Directory Traversal in ltt.js,"Affected versions of `ltt.js` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system. + +Example request: +``` +GET /../../../../../../../../../../etc/passwd HTTP/1.1 +host:foo +``` + + +## Recommendation + +No patch is available for this vulnerability. + +It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.",[],"[{'package': {'ecosystem': 'npm', 'name': 'ltt.js'}, 'versions': ['1.0.0']}]","[{'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/blob/master/directory-traversal/ltt.js'}, {'type': 'WEB', 'url': 'https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/ltt.js'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/411'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-30T17:15:20Z', 'nvd_published_at': None}" +1.4.0,GHSA-72fv-qgj6-2w2p,2021-08-03T21:27:01Z,2019-05-01T18:37:08Z,,['CVE-2015-9286'],Cross-site Scripting in NodeBB,Controllers.outgoing in controllers/index.js in NodeBB before 0.7.3 has outgoing XSS.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'nodebb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-9286'}, {'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/pull/3371'}, {'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/compare/56b79a9...4de7529'}, {'type': 'WEB', 'url': 'https://vulners.com/securityvulns/SECURITYVULNS:DOC:32625'}, {'type': 'WEB', 'url': 'https://www.vulnerability-lab.com/get_content.php?id=1608'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-01T18:20:32Z', 'nvd_published_at': '2019-04-30T14:29:00Z'}" +1.4.0,GHSA-g86p-hgx5-2pfh,2022-03-04T21:16:27Z,2019-05-29T18:48:11Z,,['CVE-2019-12300'],Improper Authentication in Buildbot,"Buildbot before 1.8.2 and 2.x before 2.3.1 accepts a user-submitted authorization token from OAuth and uses it to authenticate a user. If an attacker has a token allowing them to read the user details of a victim, they can login as the victim.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'buildbot'}, 'ecosystem_specific': {'affected_functions': ['buildbot.www.oauth2.OAuth2Auth.acceptToken']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'buildbot'}, 'ecosystem_specific': {'affected_functions': ['buildbot.www.oauth2.OAuth2Auth.acceptToken']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12300'}, {'type': 'PACKAGE', 'url': 'https://github.com/buildbot/buildbot'}, {'type': 'WEB', 'url': 'https://github.com/buildbot/buildbot/wiki/OAuth-vulnerability-in-using-submitted-authorization-token-for-authentication'}]","{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-05-29T18:47:56Z', 'nvd_published_at': '2019-05-23T15:30:00Z'}" +1.4.0,GHSA-8v67-x8q5-3x3g,2021-08-04T14:53:05Z,2019-05-14T04:01:27Z,,['CVE-2018-19048'],Cross-Site Scripting in simditor,"Versions of `simditor` prior to 2.3.22 are vulnerable to Cross-Site Scripting. The package does not sanitize user input that is rendered with `innerHTML`, allowing attackers to execute arbitrary JavaScript. + + +## Recommendation + +Upgrade to version 2.3.22 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'simditor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.22'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19048'}, {'type': 'WEB', 'url': 'https://github.com/mycolorway/simditor/commit/ef01a643cbb7f8163535d6bfb71135f80ec6a6fd'}, {'type': 'WEB', 'url': 'https://github.com/hkglue/simditor_demo.git'}, {'type': 'WEB', 'url': 'https://github.com/hkglue/simditor_dom_xss/blob/master/README.md'}, {'type': 'WEB', 'url': 'https://github.com/mycolorway/simditor/releases/tag/v2.3.22'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SIMDITOR-174638'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/884'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-14T01:08:11Z', 'nvd_published_at': None}" +1.4.0,GHSA-5f7m-mmpc-qhh4,2022-08-03T20:30:06Z,2019-05-23T09:27:00Z,,[],mysql Node.JS Module Vulnerable to Remote Memory Exposure,"Versions of `mysql` before 2.14.0 are vulnerable to remove memory exposure. + +Affected versions of `mysql` package allocate and send an uninitialized memory over the network when a number is provided as a password. + +Only `mysql` running on Node.js versions below 6.0.0 are affected due to a throw added in newer node.js versions. + +Proof of Concept: + +``` +require('mysql').createConnection({ + host: 'localhost', + user: 'user', + password : USERPROVIDEDINPUT, // number + database : 'my_db' +}).connect(); +``` + + + +## Recommendation + +Update to version 2.14.0 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'mysql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-alpha8'}, {'fixed': '2.14.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/mysqljs/mysql/commit/192fe45593ba5768534afb6f2154432ca67a5002'}, {'type': 'WEB', 'url': 'https://github.com/mysqljs/mysql/commit/310c6a7d1b2e14b63b572dbfbfa10128f20c6d52'}, {'type': 'PACKAGE', 'url': 'https://github.com/mysqljs/mysql'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/602'}]","{'cwe_ids': ['CWE-201'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-23T07:40:10Z', 'nvd_published_at': None}" +1.4.0,GHSA-7jfh-2xc9-ccv7,2020-08-31T18:29:45Z,2019-05-31T23:46:40Z,,[],Cross-Site Scripting in public,"All versions of `public` are vulnerable to stored cross-site scripting (XSS). + + +## Recommendation + +No fix is currently available for this vulnerability. It is our recommendation to not install or use this module at this time.",[],"[{'package': {'ecosystem': 'npm', 'name': 'public'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'public'}, 'versions': ['0.1.5']}]","[{'type': 'WEB', 'url': 'https://hackerone.com/reports/316346'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/609'}]","{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2019-05-31T23:44:38Z', 'nvd_published_at': None}" +1.4.0,GHSA-j59f-6m4q-62h6,2021-08-04T21:17:50Z,2019-05-30T17:28:48Z,,[],Improper Key Verification in ipns,"Versions 0.1.1 or 0.1.2 of `ipns` are vulnerable to improper key validation. This is due to the public key verification was not being performed properly, resulting in any key being valid. + + +## Recommendation + +Update to version 0.1.3 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/'}]","[{'package': {'ecosystem': 'npm', 'name': 'ipns'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ipfs/js-ipns/commit/33684e356f1f2fdcd99b2fb85fcc5d52223769a0'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/693'}]","{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-30T17:28:19Z', 'nvd_published_at': None}" +1.4.0,GHSA-p72p-rjr2-r439,2020-08-31T18:35:03Z,2019-05-29T20:24:02Z,,[],Server-Side Request Forgery in terriajs-server,"Versions of `terriajs-server`prior to 2.7.4 are vulnerable to Server-Side Request Forgery (SSRF). If an attacker has access to a server whitelisted by the terriajs-server proxy or if the attacker is able to modify the DNS records of a domain whitelisted by the terriajs-server proxy, the attacker can use the terriajs-server proxy to access any HTTP-accessible resources that are accessible to the server, including private resources in the hosting environment. + + +## Recommendation + +Upgrade to version 2.7.4 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'terriajs-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/TerriaJS/terriajs-server/commit/3cbc48475f50a53962f605491d0e60648a29bdf0'}, {'type': 'WEB', 'url': 'https://medium.com/terria/security-vulnerability-in-terriajs-server-82c8bf4da0a5'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/768'}]","{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-29T20:23:25Z', 'nvd_published_at': None}" +1.4.0,GHSA-xrmp-99wj-p6jc,2021-08-04T21:21:43Z,2019-05-31T23:43:09Z,,[],Prototype Pollution in deap,"Versions of `deap` before 1.0.1 are vulnerable to prototype pollution. + + +## Recommendation + +Update to version 1.0.1 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'deap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}]","[{'type': 'WEB', 'url': 'https://hackerone.com/reports/310446'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:deap:20180415'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/611'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-31T23:42:34Z', 'nvd_published_at': None}" +1.4.0,GHSA-cqcf-4g4h-rghf,2021-05-11T16:14:58Z,2019-05-14T04:00:31Z,,['CVE-2019-0213'],Cross-site scripting in Apache Archiva,"In Apache Archiva before 2.2.4, it is possible to write files to the archiva server at arbitrary locations by using the artifact upload mechanism. Existing files can be overwritten, if the archiva run user has appropriate permission on the filesystem for the target file.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.archiva:archiva'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0213'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/0397ddbd17b5257cc1746b31a07294a87221c5ca24e5d19d390e28f3@%3Cusers.archiva.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/7bcea134c3d6fa72cdc1052922ac0914f399f63f4690b7937b80127d@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ada0052409d8a4a8c4eb2c7fd6b9cd9423bc753d5fce87eb826662fb@%3Cissues.archiva.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/c358754a35473a61477f9d487870581a0dd7054ff95974628fa09f97@%3Cusers.maven.apache.org%3E'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Apr/47'}, {'type': 'WEB', 'url': 'http://archiva.apache.org/security.html#CVE-2019-0213'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/152681/Apache-Archiva-2.2.3-Cross-Site-Scripting.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/04/30/7'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/108123'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-03T15:36:51Z', 'nvd_published_at': '2019-04-30T22:29:00Z'}" +1.4.0,GHSA-42xw-2xvc-qx8m,2021-07-27T20:36:18Z,2019-05-29T18:04:45Z,,['CVE-2019-10742'],Denial of Service in axios,"Versions of `axios` prior to 0.18.1 are vulnerable to Denial of Service. If a request exceeds the `maxContentLength` property, the package prints an error but does not stop the request. This may cause high CPU usage and lead to Denial of Service. + + +## Recommendation + +Upgrade to 0.18.1 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'axios'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.18.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.18.0'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10742'}, {'type': 'WEB', 'url': 'https://github.com/axios/axios/issues/1098'}, {'type': 'WEB', 'url': 'https://github.com/axios/axios/pull/1485'}, {'type': 'WEB', 'url': 'https://github.com/axios/axios/commit/acabfbdf00a58bb866c9d070e8a10d1d0dbeb572'}, {'type': 'WEB', 'url': 'https://app.snyk.io/vuln/SNYK-JS-AXIOS-174505'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-AXIOS-174505'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/880'}]","{'cwe_ids': ['CWE-20', 'CWE-755'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-14T15:22:47Z', 'nvd_published_at': '2019-05-07T19:29:00Z'}" +1.4.0,GHSA-vmhw-fhj6-m3g5,2020-08-31T18:31:33Z,2019-05-31T23:46:33Z,,[],Path Traversal in angular-http-server,"Versions of `angular-http-server` before 1.4.4 are vulnerable to path traversal. + + +## Recommendation + +Update to version 1.4.4 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'angular-http-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/simonh1000/angular-http-server/commit/8bafc9577161469f5dea01e0b98ea9c525d063e9'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/330349'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/656'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-31T23:44:08Z', 'nvd_published_at': None}" +1.4.0,GHSA-ww4x-rwq6-qpgf,2023-08-29T14:15:24Z,2019-05-29T19:11:31Z,,['CVE-2015-9284'],OmniAuth Ruby gem Cross-site Request Forgery in request phase,"The request phase of the OmniAuth Ruby gem (1.9.2 and earlier) is vulnerable to Cross-Site Request Forgery when used as part of the Ruby on Rails framework, allowing accounts to be connected without user intent, user interaction, or feedback to the user. This permits a secondary account to be able to sign into the web application as the primary account. + +As of v2 OmniAuth no longer has the vulnerable configuration by default, but it is still possible to configure OmniAuth in such a way that the web application becomes vulnerable to Cross-Site Request Forgery. There is a recommended remediation described [here](https://github.com/omniauth/omniauth/wiki/Resolving-CVE-2015-9284).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'omniauth'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.9.2'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-9284'}, {'type': 'WEB', 'url': 'https://github.com/omniauth/omniauth/issues/1031'}, {'type': 'WEB', 'url': 'https://github.com/omniauth/omniauth-rails/pull/1'}, {'type': 'WEB', 'url': 'https://github.com/omniauth/omniauth/pull/809'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/commit/aef9f623c0be838234d53baf18977564804da397'}, {'type': 'PACKAGE', 'url': 'https://github.com/omniauth/omniauth'}, {'type': 'WEB', 'url': 'https://github.com/omniauth/omniauth/releases/tag/v1.9.2'}, {'type': 'WEB', 'url': 'https://github.com/omniauth/omniauth/releases/tag/v2.0.0'}, {'type': 'WEB', 'url': 'https://github.com/omniauth/omniauth/wiki/Resolving-CVE-2015-9284'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/omniauth/CVE-2015-9284.yml'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2015/05/26/11'}]","{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-29T19:10:54Z', 'nvd_published_at': None}" +1.4.0,GHSA-xf7w-r453-m56c,2021-08-04T20:12:16Z,2019-05-30T17:19:34Z,,['CVE-2019-13173'],Arbitrary File Overwrite in fstream,"Versions of `fstream` prior to 1.0.12 are vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system and a file that matches the hardlink will overwrite the system's file with the contents of the extracted file. The `fstream.DirWriter()` function is vulnerable. + + +## Recommendation + +Upgrade to version 1.0.12 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'fstream'}, 'ecosystem_specific': {'affected_functions': ['fstream.DirWriter']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.12'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-13173'}, {'type': 'WEB', 'url': 'https://github.com/npm/fstream/commit/6a77d2fa6e1462693cf8e46f930da96ec1b0bb22'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4123-1/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/886'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00010.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00052.html'}]","{'cwe_ids': ['CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-30T17:17:33Z', 'nvd_published_at': None}" +1.4.0,GHSA-jj6g-7j8p-7gf2,2020-08-31T18:29:43Z,2019-05-30T21:03:24Z,,[],Cross-Site Scripting in bracket-template,"All versions of `bracket-template` are vulnerable to stored cross-site scripting (XSS). This is exploitable when a variable passed in via a GET parameter is used in a template. + + +## Recommendation + +No fix is currently available for this vulnerability. It is our recommendation to not install or use this module at this time.",[],"[{'package': {'ecosystem': 'npm', 'name': 'bracket-template'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.5'}]}]}]","[{'type': 'WEB', 'url': 'https://hackerone.com/reports/317125'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/608'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-30T21:02:27Z', 'nvd_published_at': None}" +1.4.0,GHSA-h896-mx9x-g32g,2022-11-17T17:55:41Z,2019-05-29T18:15:50Z,,['CVE-2019-0188'],XML External Entity injection in Apache Camel,"Apache Camel prior to 2.24.0 contains an XML external entity injection (XXE) vulnerability (CWE-611) due to using an outdated vulnerable JSON-lib library. This affects only the camel-xmljson component, which was removed.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.24.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-xmljson'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.23.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0188'}, {'type': 'WEB', 'url': 'https://github.com/apache/camel/blob/master/docs/user-manual/en/security-advisories/CVE-2019-0188.txt.asc'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/TAMAYA-410'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/00118387610522b107cbdcec5369ddd512b576ff0236a02bfca12f44@%3Cusers.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/45349f8bd98c1c13a84beddede18fe79b8619ebab99d90f1fb43d7ab@%3Cdev.tamaya.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/61601cda2c5f9832184ea14647b0c0589c94126a460c8eb196be1313@%3Ccommits.tamaya.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/63d1cec8541befeb59dbed23a6b227bdcca7674aa234fb43354dac82@%3Ccommits.tamaya.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6fefbd90f7fb4c8412d85ea3e9e97a4b76b47e206f502c73c29dc0b7@%3Ccommits.tamaya.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/84ba9b79e801a4148dde73d1969cdae0247d11ff63de7ce11b394dc5@%3Ccommits.tamaya.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/eed73fc18d4fa3e2341cd0ab101b47f06b16c7efc1cb73791c524c9d@%3Cdev.tamaya.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/fe74d173689600d9a395d026f0bf5d154c0bf7bd195ecfbc2c987036@%3Cdev.tamaya.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}, {'type': 'WEB', 'url': 'http://jvn.jp/en/jp/JVN71498764/index.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/05/24/2'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/108422'}]","{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-29T18:15:06Z', 'nvd_published_at': '2019-05-28T19:29:00Z'}" +1.4.0,GHSA-78j5-gcmf-vqc8,2021-10-06T22:02:18Z,2019-05-29T18:02:59Z,,['CVE-2019-14772'],Cross-Site Scripting (XSS) in Verdaccio,"### Impact +What kind of vulnerability is it? Who is impacted? + +Cross-Site Scripting XSS, malicious packages with content Javascript that might be executed in the User Interface stealing user credentials. + +### Patches +Has the problem been patched? What versions should users upgrade to? + +Users that still using `v3` must upgrade to **>3.12.0** or those have no problem to migrate to a major version **>=4.0.0** also fix the issue. + +### Workarounds +Is there a way for users to fix or remediate the vulnerability without upgrading? + +No, the users must update. + +### References +Are there any links users can visit to find out more? + +https://www.npmjs.com/advisories/832 +https://www.npmjs.com/advisories/833 + +The issue was reported by the NPMJS Security Team + +### For more information +If you have any questions or comments about this advisory: +* Read the Security Policy to find the ways to be in contact with us. +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'verdaccio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.12.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/verdaccio/verdaccio/security/advisories/GHSA-78j5-gcmf-vqc8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14772'}, {'type': 'PACKAGE', 'url': 'https://github.com/verdaccio/verdaccio'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/832'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/833'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-05-28T21:00:51Z', 'nvd_published_at': None}" +1.4.0,GHSA-6qqf-vvcr-7qrv,2020-08-31T18:34:48Z,2019-05-23T09:27:22Z,,[],Cryptographically Weak PRNG in generate-password,"Affected versions of generate-password generate random values that are biased towards certain characters depending on the chosen character sets. This may result in guessable passwords. + + +## Recommendation + +Update to version 1.4.1 or later. +",[],"[{'package': {'ecosystem': 'npm', 'name': 'generate-password'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/brendanashworth/generate-password/pull/26'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/762'}]","{'cwe_ids': ['CWE-338'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-23T07:38:39Z', 'nvd_published_at': None}" +1.4.0,GHSA-36m4-6v6m-4vpr,2023-09-08T19:21:19Z,2019-05-29T18:04:55Z,,['CVE-2019-12043'],Cross-site Scripting in remarkable,"In remarkable 1.7.1, lib/parser_inline.js mishandles URL filtering, which allows attackers to trigger XSS via unprintable characters, as demonstrated by a `\x0ejavascript:` URL.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'remarkable'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12043'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/remarkable/issues/332'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/remarkable/commit/49e87b7ae2dc323d83606792a749fb207595249e'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-14T01:14:15Z', 'nvd_published_at': '2019-05-13T14:29:00Z'}" +1.4.0,GHSA-2hw2-62cp-p9p7,2021-07-27T20:54:44Z,2019-05-29T18:54:11Z,,['CVE-2019-0201'],Access control bypass in Apache ZooKeeper,"An issue is present in Apache ZooKeeper 1.0.0 to 3.4.13 and 3.5.0-alpha to 3.5.4-beta. ZooKeeper?s getACL() command doesn?t check any permission when retrieves the ACLs of the requested node and returns all information contained in the ACL Id field as plaintext string. DigestAuthenticationProvider overloads the Id field with the hash value that is used for user authentication. As a consequence, if Digest Authentication is in use, the unsalted hash value will be disclosed by getACL() request for unauthenticated or unprivileged users.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.zookeeper:zookeeper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '3.4.14'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.zookeeper:zookeeper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5.0'}, {'fixed': '3.5.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0201'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3140'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3892'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:4352'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/ZOOKEEPER-1392'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5d9a1cf41a5880557bf680b7321b4ab9a4d206c601ffb15fef6f196a@%3Ccommits.accumulo.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f6112882e30a31992a79e0a8c31ac179e9d0de7c708de3a9258d4391@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r40f32125c1d97ad82404cc918171d9e0fcf78e534256674e9da1eb4b@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/05/msg00033.html'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Jun/13'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190619-0001/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4461'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://zookeeper.apache.org/security.html#CVE-2019-0201'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/108427'}]","{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-29T18:53:55Z', 'nvd_published_at': '2019-05-23T14:29:00Z'}" +1.4.0,GHSA-27v7-qhfv-rqq8,2021-08-31T20:56:47Z,2019-05-30T17:26:30Z,,[],Insecure Credential Storage in web3,"All versions of `web3` are vulnerable to Insecure Credential Storage. The package stores encrypted wallets in local storage and requires a password to load the wallet. Once the wallet is loaded, the private key is accessible via LocalStorage. Exploiting this vulnerability likely requires a Cross-Site Scripting vulnerability to access the private key. + + +## Recommendation + +No fix is currently available. Consider using an alternative module until a fix is made available.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'web3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ethereum/web3.js/issues/2739'}, {'type': 'PACKAGE', 'url': 'https://github.com/ethereum/web3.js'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-WEB3-174533'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/877'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2019-05-30T17:25:54Z', 'nvd_published_at': None}" +1.4.0,GHSA-qr32-j4j6-3m7r,2020-08-31T18:20:27Z,2019-05-29T20:23:00Z,,['CVE-2017-16087'],Command Injection in fs-git,"Affected versions of `fs-git` do not sanitize strings passed into the `buildCommand` method, resulting in arbitrary code execution. + + +## Recommendation + +Update to version 1.0.2 or later. ",[],"[{'package': {'ecosystem': 'npm', 'name': 'fs-git'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16087'}, {'type': 'WEB', 'url': 'https://github.com/vvakame/fs-git/commit/eb5f70efa5cfbff1ab299fa7daaa5de549243998'}, {'type': 'WEB', 'url': 'https://github.com/vvakame/fs-git/commit/eb5f70efa5cfbff1ab299fa7daaa5de549243998#diff-13b5b151431c7e7a17f273559ed212d5'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/360'}]","{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-29T20:22:06Z', 'nvd_published_at': None}" +1.4.0,GHSA-f554-x222-wgf7,2021-08-04T15:07:00Z,2019-05-29T18:05:03Z,,['CVE-2013-7285'],Command Injection in Xstream,"Xstream API versions up to 1.4.6 and version 1.4.10, if the security framework has not been initialized, may allow a remote attacker to run arbitrary shell commands by manipulating the processed input stream when unmarshaling XML or any supported format. e.g. JSON.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7285'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6d3d34adcf3dfc48e36342aa1f18ce3c20bb8e4c458a97508d5bfed1@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/dcf8599b80e43a6b60482607adb76c64672772dc2d9209ae2170f369@%3Cissues.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.mail-archive.com/user@xstream.codehaus.org/msg00604.html'}, {'type': 'WEB', 'url': 'https://www.mail-archive.com/user@xstream.codehaus.org/msg00607.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/CVE-2013-7285.html'}, {'type': 'WEB', 'url': 'http://blog.diniscruz.com/2013/12/xstream-remote-code-execution-exploit.html'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2014/q1/69'}, {'type': 'WEB', 'url': 'http://web.archive.org/web/20140204133306/http://blog.diniscruz.com/2013/12/xstream-remote-code-execution-exploit.html'}]","{'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-05-15T23:13:58Z', 'nvd_published_at': '2019-05-15T17:29:00Z'}" +1.4.0,GHSA-g99m-3m46-4gm9,2021-08-03T21:31:13Z,2019-05-14T04:00:47Z,,['CVE-2018-17202'],Infinite Loop in Apache Sanselan,"Certain input files could make the code to enter into an infinite loop when Apache Sanselan 0.97-incubator was used to parse them, which could be used in a DoS attack. Note that Apache Sanselan (incubating) was renamed to Apache Commons Imaging.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.sanselan:sanselan'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.97-incubator'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17202'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/69204376d12205b0d2d90e6fcbeebb99b894e6db88c8ff565c4e1efa@%3Cdev.commons.apache.org%3E'}]","{'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-09T15:07:18Z', 'nvd_published_at': '2019-05-06T18:29:00Z'}" +1.4.0,GHSA-jxgm-9f58-w4xp,2021-07-27T20:35:40Z,2019-05-14T04:00:21Z,,['CVE-2019-0214'],Improper Input Validation in Apache Archiva,"In Apache Archiva 2.0.0 - 2.2.3, it is possible to write files to the archiva server at arbitrary locations by using the artifact upload mechanism. Existing files can be overwritten, if the archiva run user has appropriate permission on the filesystem for the target file.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.archiva:archiva'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0214'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/18b670afc2f83034f47ebeb2f797c350fe60f1f2b33c95b95f467ef8@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/239349b6dd8f66cf87a70c287b03af451dea158b776d3dfc550b4f0e@%3Cusers.maven.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5851cb0214f22ba681fb445870eeb6b01afd1fb614e45a22978d7dda@%3Cusers.archiva.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ada0052409d8a4a8c4eb2c7fd6b9cd9423bc753d5fce87eb826662fb@%3Cissues.archiva.apache.org%3E'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Apr/48'}, {'type': 'WEB', 'url': 'http://archiva.apache.org/security.html#CVE-2019-0214'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/152684/Apache-Archiva-2.2.3-File-Write-Delete.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/04/30/8'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/108124'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-03T15:33:48Z', 'nvd_published_at': '2019-04-30T22:29:00Z'}" +1.4.0,GHSA-4wjq-69rc-8wcp,2022-11-17T17:45:21Z,2019-05-02T15:21:34Z,,['CVE-2019-0194'],Path Traversal in Apache Camel,"Apache Camel's File is vulnerable to directory traversal. Camel 2.21.0 to 2.21.3, 2.22.0 to 2.22.2, 2.23.0 and the unsupported Camel 2.x (2.19 and earlier) versions may be also affected.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.21.0'}, {'fixed': '2.21.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.21.3'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.22.0'}, {'fixed': '2.22.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.23.0'}, {'fixed': '2.23.1'}]}], 'versions': ['2.23.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0194'}, {'type': 'WEB', 'url': 'https://github.com/apache/camel/pull/2700'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/camel'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/CAMEL-13042'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/0a163d02169d3d361150e8183df4af33f1a3d8a419b2937ac8e6c66f@%3Cusers.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/45e23ade8d3cb754615f95975e89e8dc73c59eeac914f07d53acbac6@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a39441db574ee996f829344491b3211b53c9ed926f00ae5d88943b76@%3Cdev.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/04/30/2'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-02T15:00:07Z', 'nvd_published_at': '2019-04-30T22:29:00Z'}" +1.4.0,GHSA-87mg-h5r3-hw88,2021-09-16T21:01:13Z,2019-05-30T17:23:28Z,,[],Cross-Site Scripting in bootbox,"All version of `bootbox` are vulnerable to Cross-Site Scripting. The package does not sanitize user input in the provided dialog boxes, allowing attackers to inject HTML code and execute arbitrary JavaScript. + + +## Recommendation + +Sanitize user input being passed to `bootbox` or consider using an alternative package.",[],"[{'package': {'ecosystem': 'npm', 'name': 'bootbox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.5.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/makeusabrew/bootbox/issues/661'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/508446'}, {'type': 'PACKAGE', 'url': 'https://github.com/makeusabrew/bootbox'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/882'}]","{'cwe_ids': ['CWE-64', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-30T17:22:56Z', 'nvd_published_at': None}" +1.4.0,GHSA-5ww9-j83m-q7qx,2023-09-13T16:21:31Z,2019-05-23T09:32:24Z,,['CVE-2019-12086'],Information exposure in FasterXML jackson-databind,"A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint, the service has the mysql-connector-java jar (8.0.14 or earlier) in the classpath, and an attacker can host a crafted MySQL server reachable by the victim, an attacker can send a crafted JSON message that allows them to read arbitrary local files on the server. This occurs because of missing com.mysql.cj.jdbc.admin.MiniAdmin validation.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.9.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12086'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2326'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2858'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2935'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2936'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2937'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2938'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2998'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3044'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3045'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3046'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3050'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3149'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3200'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson/wiki/Jackson-Release-2.9.9'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/3f99ae8dcdbd69438cb733d745ee3ad5e852068490719a66509b4592@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/88cd25375805950ae7337e669b0cb0eeda98b9604c1b8d806dccbad2@%3Creviews.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rda99599896c3667f2cc9e9d34c7b6ef5d2bbed1f4801e1d75a2b0679@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/05/msg00030.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OVRZDN2T6AZ6DJCZJ3VSIQIVHBVMVWBL/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TXRVXNRFHJSQWFHPRJQRI5UPMZ63B544/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKUALE2TUCKEKOHE2D342PQXN4MWCSLC/'}, {'type': 'WEB', 'url': 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/May/68'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190530-0003/'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227030031/http://www.securityfocus.com/bid/109227'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200808181049/http://russiansecurity.expert/2016/04/20/mysql-connect-file-read/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4452'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-22T04:34:56Z', 'nvd_published_at': '2019-05-17T17:29:00Z'}" +1.4.0,GHSA-h9gj-rqrw-x4fq,2021-06-15T17:07:00Z,2019-05-14T04:02:24Z,,['CVE-2019-0227'],Server Side Request Forgery in Apache Axis,"A Server Side Request Forgery (SSRF) vulnerability affected the Apache Axis 1.4 distribution that was last released in 2006. Security and bug commits commits continue in the projects Axis 1.x Subversion repository, legacy users are encouraged to build from source. The successor to Axis 1.x is Axis2, the latest version is 1.7.9 and is not vulnerable to this issue.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.axis:axis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0227'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3a5baf5d76f1f2181be7f54da3deab70d7a38b5660b387583d05a8cd@%3Cjava-user.axis.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://rhinosecuritylabs.com/application-security/cve-2019-0227-expired-domain-rce-apache-axis/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}]","{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-03T15:21:34Z', 'nvd_published_at': '2019-05-01T21:29:00Z'}" +1.4.0,GHSA-j44m-qm6p-hp7m,2021-08-03T21:28:27Z,2019-05-01T18:37:31Z,,['CVE-2018-20834'],Arbitrary File Overwrite in tar,"Versions of `tar` prior to 4.4.2 for 4.x and 2.2.2 for 2.x are vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system, and a file that matches the hardlink will overwrite the system's file with the contents of the extracted file. + + +## Recommendation + +For tar 4.x, upgrade to version 4.4.2 or later. +For tar 2.x, upgrade to version 2.2.2 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'tar'}, 'ecosystem_specific': {'affected_functions': ['tar.Unpack']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '4.4.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'tar'}, 'ecosystem_specific': {'affected_functions': ['tar.Extract']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20834'}, {'type': 'WEB', 'url': 'https://github.com/npm/node-tar/commit/7ecef07da6a9e72cc0c4d0c9c6a8e85b6b52395d'}, {'type': 'WEB', 'url': 'https://github.com/npm/node-tar/commit/b0c58433c22f5e7fe8b1c76373f27e3f81dcd4c8'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/344595'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1821'}, {'type': 'WEB', 'url': 'https://github.com/npm/node-tar/commits/v2.2.2'}, {'type': 'WEB', 'url': 'https://github.com/npm/node-tar/compare/58a8d43...a5f7779'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/803'}]","{'cwe_ids': ['CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-01T18:35:41Z', 'nvd_published_at': None}" +1.4.0,GHSA-xm28-fw2x-fqv2,2021-08-04T21:19:17Z,2019-05-31T23:08:14Z,,[],Denial of Service in foreman,"All versions of `foreman` are vulnerable to Regular Expression Denial of Service when requests to it are made with a specially crafted path. + + +## Recommendation + +Upgrade to version 3.0.1.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'foreman'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.1'}]}]}]","[{'type': 'WEB', 'url': 'https://hackerone.com/reports/320586'}, {'type': 'WEB', 'url': 'https://github.com/strongloop/node-foreman/blob/v2.0.0/forward.js#L30'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:foreman:20180429'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/645'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-31T23:07:09Z', 'nvd_published_at': None}" +1.4.0,GHSA-4x49-w62v-76q7,2021-08-03T21:40:51Z,2019-05-23T08:39:23Z,,['CVE-2019-3799'],Path Traversal in Spring Cloud Config,"Spring Cloud Config, versions 2.1.x prior to 2.1.2, versions 2.0.x prior to 2.0.4, and versions 1.4.x prior to 1.4.6, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead a directory traversal attack.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.cloud:spring-cloud-config-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.cloud:spring-cloud-config-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.cloud:spring-cloud-config-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3799'}, {'type': 'WEB', 'url': 'https://github.com/mpgn/CVE-2019-3799'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2019-3799'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-10T04:20:45Z', 'nvd_published_at': '2019-05-06T16:29:00Z'}" +1.4.0,GHSA-j4mr-9xw3-c9jx,2020-08-31T18:31:43Z,2019-05-31T23:47:01Z,,[],Out-of-bounds Read in base64-url,"Versions of `base64-url` before 2.0.0 are vulnerable to out-of-bounds read as it allocates uninitialized Buffers when number is passed in input. + + +## Recommendation + +Update to version 2.0.0 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'base64-url'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://hackerone.com/reports/321692'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/660'}]","{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-31T23:45:33Z', 'nvd_published_at': None}" +1.4.0,GHSA-jjpq-gp5q-8q6w,2021-06-15T17:08:11Z,2019-05-30T03:30:42Z,,['CVE-2019-0221'],Cross-site scripting in Apache Tomcat,"The SSI printenv command in Apache Tomcat 9.0.0.M1 to 9.0.0.17, 8.5.0 to 8.5.39 and 7.0.0 to 7.0.93 echoes user provided data without escaping and is, therefore, vulnerable to XSS. SSI is disabled by default. The printenv command is intended for debugging and is unlikely to be present in a production website.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.0.17'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.5.40'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat.embed:tomcat-embed-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.94'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0221'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3929'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3931'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6e6e9eacf7b28fd63d249711e9d3ccd4e0a83f556e324aee37be5a8c@%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/05/msg00044.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/08/msg00015.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NPHQEL5AQ6LZSZD2Y6TYZ4RC3WI7NXJ3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQTZ5BJ5F4KV6N53SGNKSW3UY5DBIQ46/'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Dec/43'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202003-43'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190606-0001/'}, {'type': 'WEB', 'url': 'https://support.f5.com/csp/article/K13184144?utm_source=f5support&utm_medium=RSS'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4128-1/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4128-2/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4596'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://wwws.nightwatchcybersecurity.com/2019/05/27/xss-in-ssi-printenv-command-apache-tomcat-cve-2019-0221/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00090.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00054.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/163457/Apache-Tomcat-9.0.0.M1-Cross-Site-Scripting.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2019/May/50'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/108545'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-30T03:30:07Z', 'nvd_published_at': '2019-05-28T22:29:00Z'}" +1.4.0,GHSA-pgr8-jg6h-8gw6,2021-08-04T15:26:36Z,2019-05-23T09:26:20Z,,[],Cross-Site Scripting in webpack-bundle-analyzer,"Versions of `webpack-bundle-analyzer` prior to 3.3.2 are vulnerable to Cross-Site Scripting. The package uses `JSON.stringify()` without properly escaping input which may lead to Cross-Site Scripting. + + +## Recommendation + +Upgrade to version 3.3.2 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'webpack-bundle-analyzer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/webpack-contrib/webpack-bundle-analyzer/issues/263'}, {'type': 'WEB', 'url': 'https://github.com/webpack-contrib/webpack-bundle-analyzer/pull/264'}, {'type': 'WEB', 'url': 'https://github.com/webpack-contrib/webpack-bundle-analyzer/commit/20f2b4c553ee343f491faf63e39427fba9908c7c'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-WEBPACKBUNDLEANALYZER-174190'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/826'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-23T07:34:50Z', 'nvd_published_at': None}" +1.4.0,GHSA-x2mc-8fgj-3wmr,2021-08-03T21:27:51Z,2019-05-01T18:37:18Z,,['CVE-2018-20835'],Improper Input Validation in tar-fs,"A vulnerability was found in tar-fs before 1.16.2. An Arbitrary File Overwrite issue exists when extracting a tarball containing a hardlink to a file that already exists on the system, in conjunction with a later plain file with the same name as the hardlink. This plain file content replaces the existing file content.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'tar-fs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20835'}, {'type': 'WEB', 'url': 'https://github.com/mafintosh/tar-fs/commit/06672828e6fa29ac8551b1b6f36c852a9a3c58a2'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/344595'}, {'type': 'WEB', 'url': 'https://github.com/mafintosh/tar-fs/compare/d590fc7...a35ce2f'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-01T18:25:25Z', 'nvd_published_at': '2019-04-30T19:29:00Z'}" +1.4.0,GHSA-gh4g-3gm9-5wrq,2021-08-04T16:06:35Z,2019-05-29T18:38:08Z,,['CVE-2019-12313'],Cross-Site Scripting in shave,"Versions of `shave` prior to 2.5.3 are vulnerable to Cross-Site Scripting. The `shave` package overwrites HTML elements and in doing so fails to properly encode the output. If encoded HTML input is passed into `shave` the output will be decoded which may lead to Cross-Site Scripting. + + +## Recommendation + +Upgrade to version 2.5.3 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'shave'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12313'}, {'type': 'WEB', 'url': 'https://github.com/dollarshaveclub/shave/commit/da7371b0531ba14eae48ef1bb1456a3de4cfa954#diff-074799b511e4b61923dfd3f2a3bf9b54R67'}, {'type': 'WEB', 'url': 'https://github.com/dollarshaveclub/shave/compare/852b537...da7371b'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/822'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-29T18:37:51Z', 'nvd_published_at': None}" +1.4.0,GHSA-rjx9-2936-9ffx,2021-08-03T22:54:50Z,2019-05-14T04:01:06Z,,['CVE-2018-17201'],Improper Input Validation in Apache Sanselan,"Certain input files could make the code hang when Apache Sanselan 0.97-incubator was used to parse them, which could be used in a DoS attack. Note that Apache Sanselan (incubating) was renamed to Apache Commons Imaging.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.sanselan:sanselan'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.97-incubator'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17201'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/cd37861963aa6d2694c8947d464c99614d3e1a9db6c1a2a8b7b5840a@%3Cdev.commons.apache.org%3E'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-09T15:10:25Z', 'nvd_published_at': '2019-05-06T18:29:00Z'}" +1.4.0,GHSA-vm59-329q-p468,2021-08-03T21:30:31Z,2019-05-14T04:00:37Z,,['CVE-2018-8035'],Cross-site Scripting in Apache UIMA,"This vulnerability relates to the user's browser processing of DUCC webpage input data.The javascript comprising Apache UIMA DUCC (<= 2.2.2) which runs in the user's browser does not sufficiently filter user supplied inputs, which may result in unintended execution of user supplied javascript code.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.uima:uima-ducc-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.2'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8035'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2f49681259b375d53431605f1c557ef8a3ed0af01a488d2e1b330053@%3Cdev.uima.apache.org%3E'}, {'type': 'WEB', 'url': 'https://uima.apache.org/security_report'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/108195'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-03T15:42:34Z', 'nvd_published_at': '2019-05-01T21:29:00Z'}" +1.4.0,GHSA-23gj-368h-92pq,2021-08-04T15:17:12Z,2019-05-29T18:05:11Z,,['CVE-2019-11082'],Path Traversal in DKPro Core,"core/api/datasets/internal/actions/Explode.java in the Dataset API in DKPro Core through 1.10.0 allows Directory Traversal, resulting in the overwrite of local files with the contents of an archive.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'de.tudarmstadt.ukp.dkpro.core:de.tudarmstadt.ukp.dkpro.core.api.datasets-asl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.10.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11082'}, {'type': 'WEB', 'url': 'https://github.com/dkpro/dkpro-core/issues/1325'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-16T15:34:40Z', 'nvd_published_at': '2019-05-10T16:29:00Z'}" +1.4.0,GHSA-2hwp-g4g7-mwwj,2020-08-31T18:35:05Z,2019-05-29T20:25:35Z,,[],Reflected Cross-Site Scripting in jquery.terminal,"Versions of `jquery.terminal` prior to 1.21.0 are vulnerable to Reflected Cross-Site Scripting. If the application has either of the options `anyLinks` or `invokeMethods` set to true, the application may execute arbitrary JavaScript through crafted malicious payloads due to insufficient sanitization. + + +## Recommendation + +Upgrade to version 1.21.0 or later",[],"[{'package': {'ecosystem': 'npm', 'name': 'jquery.terminal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.21.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/jcubic/jquery.terminal/commit/c8b7727d21960031b62a4ef1ed52f3c634046211'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/769'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-05-29T20:24:48Z', 'nvd_published_at': None}" +1.4.0,GHSA-8xqr-4cpm-wx7g,2020-08-31T18:31:14Z,2019-05-31T23:47:27Z,,[],Cross-Site Scripting in react-svg,"Versions of `react-svg` before 2.2.18 are vulnerable to cross-site scripting (xss). This is due to the fact that scripts found in SVG files are run by default. + + +## Recommendation + +Update to version 2.2.18 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'react-svg'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.18'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/tanem/react-svg/pull/57'}, {'type': 'WEB', 'url': 'https://github.com/tanem/react-svg/pull/57/commits/ec7de5d678f53a085cee1348cb1aa069c9fc42fb'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/648'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-05-31T23:44:58Z', 'nvd_published_at': None}" +1.4.0,GHSA-g996-q5r8-w7g2,2023-09-21T18:22:10Z,2019-11-12T23:00:53Z,,['CVE-2019-10909'],Symfony Cross-site Scripting (XSS) vulnerability,"In Symfony before 2.7.51, 2.8.x before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, validation messages are not escaped, which can lead to XSS when user input is included. This is related to symfony/framework-bundle.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.51'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.50'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.26'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/framework-bundle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.51'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/framework-bundle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.50'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/framework-bundle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.26'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/framework-bundle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/framework-bundle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.15'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.6.0'}, {'fixed': '8.6.15'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10909'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/commit/ab4d05358c3d0dd1a36fc8c306829f68e3dd84e2'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/framework-bundle/CVE-2019-10909.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10909.yaml'}, {'type': 'WEB', 'url': 'https://symfony.com/blog/cve-2019-10909-escape-validation-messages-in-the-php-templating-engine'}, {'type': 'WEB', 'url': 'https://symfony.com/cve-2019-10909'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2019-005'}, {'type': 'WEB', 'url': 'https://www.synology.com/security/advisory/Synology_SA_19_19'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-12T16:48:32Z', 'nvd_published_at': '2019-05-16T22:29:00Z'}" +1.4.0,GHSA-cff7-6h4q-q5pj,2023-08-25T23:33:30Z,2019-11-14T15:25:51Z,,['CVE-2019-18848'],JSON-jwt Gem lacked element count during splitting of JWE string,The json-jwt gem before 1.11.0 for Ruby lacks an element count during the splitting of a JWE string.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'json-jwt'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-18848'}, {'type': 'WEB', 'url': 'https://github.com/nov/json-jwt/commit/ada16e772906efdd035e3df49cb2ae372f0f948a'}, {'type': 'PACKAGE', 'url': 'https://github.com/nov/json-jwt'}, {'type': 'WEB', 'url': 'https://github.com/nov/json-jwt/compare/v1.10.2...v1.11.0'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/json-jwt/CVE-2019-18848.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/10/msg00001.html'}]","{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-11-14T15:24:51Z', 'nvd_published_at': '2019-11-12T15:15:00Z'}" +1.4.0,GHSA-fm68-89m8-4gjj,2023-09-06T13:49:44Z,2019-11-12T22:59:47Z,,['CVE-2019-8233'],Composer JavaScript injection possible via html comments,"In Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1, an unauthenticated user can inject arbitrary JavaScript code as a result of the sanitization engine ignoring HTML comments.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3'}, {'fixed': '2.3.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8233'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-12T22:12:25Z', 'nvd_published_at': None}" +1.4.0,GHSA-425c-ccf3-3jrr,2021-01-08T19:57:59Z,2019-11-15T23:10:35Z,,['CVE-2019-16762'],Critical severity vulnerability that affects slpjs,"## Validator parsing discrepancy due to string encoding + +### Impact +A specially crafted Bitcoin script can cause a discrepancy between the specified SLP consensus rules and the validation result of the slpjs npm package. An attacker could create a specially crafted Bitcoin script in order to cause a hard-fork from the SLP consensus. + +### Patches +All versions > 0.21.3 are patched. + +### Workarounds +Upgrade to any version >= 0.21.4. + +### References +The bug was located and fixed [here](https://github.com/simpleledger/slpjs/commit/ac8809b42e47790a6f0205991b36f2699ed10c84#diff-fe58606994c412ba56a65141a7aa4a62L701). + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in the [slpjs repo](https://github.com/simpleledger/slpjs/issues) +* Email us at [info@slp.cash](mailto:info@slp.cash)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'slpjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.21.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/simpleledger/slpjs/security/advisories/GHSA-425c-ccf3-3jrr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16762'}, {'type': 'WEB', 'url': 'https://github.com/simpleledger/slpjs/commit/ac8809b42e47790a6f0205991b36f2699ed10c84#diff-fe58606994c412ba56a65141a7aa4a62L701'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-425c-ccf3-3jrr'}]","{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:55Z', 'nvd_published_at': None}" +1.4.0,GHSA-68wg-qv6r-j4vp,2021-08-18T22:44:59Z,2019-11-20T17:44:54Z,,['CVE-2019-10766'],SQL Injection in usmanhalalit/pixie,"Pixie versions 1.0.x before 1.0.3, and 2.0.x before 2.0.2 allow SQL Injection in the limit() function due to improper sanitization.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'usmanhalalit/pixie'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'usmanhalalit/pixie'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10766'}, {'type': 'WEB', 'url': 'https://github.com/usmanhalalit/pixie/commit/9bd991021abbcbfb19347a07dca8b7e518b8abc9'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PHP-USMANHALALITPIXIE-534879'}]","{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-11-20T17:42:50Z', 'nvd_published_at': None}" +1.4.0,GHSA-pf8f-w267-mq2h,2023-01-23T20:22:08Z,2019-11-15T20:26:59Z,,['CVE-2019-18978'],The rack-cors rubygem may allow directory traveral,An issue was discovered in the rack-cors (aka Rack CORS Middleware) gem before 1.0.4 for Ruby. It allows ../ directory traversal to access private resources because resource matching does not ensure that pathnames are in a canonical format.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'rack-cors'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-18978'}, {'type': 'WEB', 'url': 'https://github.com/cyu/rack-cors/commit/e4d4fc362a4315808927011cbe5afcfe5486f17d'}, {'type': 'PACKAGE', 'url': 'https://github.com/cyu/rack-cors'}, {'type': 'WEB', 'url': 'https://github.com/cyu/rack-cors/compare/v1.0.3...v1.0.4'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/02/msg00004.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/10/msg00000.html'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4571-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4918'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-15T20:26:35Z', 'nvd_published_at': '2019-11-14T21:15:00Z'}" +1.4.0,GHSA-cj8p-53v9-2c26,2023-09-11T14:59:52Z,2019-11-08T15:28:11Z,,['CVE-2019-15485'],Cross-site Scripting in Bolt,Bolt before 3.6.10 has XSS via createFolder or createFile in `Controller/Async/FilesystemManager.php`.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'bolt/bolt'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15485'}, {'type': 'WEB', 'url': 'https://github.com/bolt/bolt/pull/7800'}, {'type': 'WEB', 'url': 'https://github.com/bolt/bolt/releases/tag/v3.6.10'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-10-01T18:00:46Z', 'nvd_published_at': '2019-08-23T13:15:00Z'}" +1.4.0,GHSA-89px-ww3j-g2mm,2021-01-08T21:28:08Z,2019-11-29T17:05:59Z,,['CVE-2019-16766'],2FA bypass in Wagtail through new device path,"## 2FA bypass through new device path + +### Impact +If someone gains access to someone's Wagtail login credentials, they can log into the CMS and bypass the 2FA check by changing the URL. They can then add a new device and gain full access to the CMS. + +### Patches +This problem has been patched in version 1.3.0. + +### Workarounds +There is no workaround at the moment. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [github.com/labd/wagtail-2fa](https://github.com/labd/wagtail-2fa) +* Email us at [security@labdigital.nl](mailto:security@labdigital.nl)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'wagtail-2fa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/labd/wagtail-2fa/security/advisories/GHSA-89px-ww3j-g2mm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16766'}, {'type': 'WEB', 'url': 'https://github.com/labd/wagtail-2fa/commit/13b12995d35b566df08a17257a23863ab6efb0ca'}, {'type': 'WEB', 'url': 'https://github.com/labd/wagtail-2fa/commit/a6711b29711729005770ff481b22675b35ff5c81'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-89px-ww3j-g2mm'}]","{'cwe_ids': ['CWE-290', 'CWE-304'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:25:10Z', 'nvd_published_at': None}" +1.4.0,GHSA-j9xp-92vc-559j,2021-08-18T22:09:33Z,2019-11-06T17:11:10Z,,['CVE-2019-10748'],SQL Injection in sequelize,"Affected versions of `sequelize` are vulnerable to SQL Injection. The package fails to sanitize JSON path keys in the MariaDB and MySQL dialects, which may allow attackers to inject SQL statements and execute arbitrary SQL queries. + + +## Recommendation + +If you are using `sequelize` 5.x, upgrade to version 5.8.11 or later. +If you are using `sequelize` 4.x, upgrade to version 4.44.3 or later. +If you are using `sequelize` 3.x, upgrade to version 3.35.1 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'sequelize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.35.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'sequelize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.44.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'sequelize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.8.11'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10748'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/pull/11089,'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/commit/a72a3f5,'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SEQUELIZE-450221'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1018'}]","{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-11-05T19:59:46Z', 'nvd_published_at': None}" +1.4.0,GHSA-852q-xxj4-x2rx,2021-08-17T22:41:38Z,2019-11-08T20:05:45Z,,['CVE-2019-15537'],SQL Injection in SimpleSAMLphp,The proxystatistics module before 3.1.0 for SimpleSAMLphp allows SQL Injection in lib/Auth/Process/DatabaseCommand.php.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'cesnet/simplesamlphp-module-proxystatistics'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15537'}, {'type': 'WEB', 'url': 'https://github.com/CESNET/proxystatistics-simplesamlphp-module/pull/18'}, {'type': 'WEB', 'url': 'https://github.com/CESNET/proxystatistics-simplesamlphp-module/releases/tag/v3.1.0'}]","{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-09-25T12:51:13Z', 'nvd_published_at': '2019-08-23T18:15:00Z'}" +1.4.0,GHSA-9xr8-8hmc-389f,2021-08-18T22:47:15Z,2019-11-22T13:45:33Z,,[],Cross-Site Scripting in vant,"Versions of `vant` prior to 2.1.8 are vulnerable to Cross-Site Scripting. The text value of the `Picker` component column is not sanitized, which may allow attackers to execute arbitrary JavaScript in a victim's browser. + + +## Recommendation + +Upgrade to version 2.1.8 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'vant'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.8'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/youzan/vant/issues/4270'}, {'type': 'WEB', 'url': 'https://github.com/youzan/vant/pull/4278/commits/d777b78c7dc2c904f474d057ea88449cfe2ca13a'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-VANT-460461'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1157'}]","{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-11-21T04:18:24Z', 'nvd_published_at': None}" +1.4.0,GHSA-m52x-29pq-w3vv,2022-08-03T13:00:22Z,2019-11-22T18:18:03Z,,['CVE-2019-16763'],Pannellum Cross-Site Scripting due to data not being sanitized for URIs or vbscript,"Versions of `pannellum` prior to 2.5.6 are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize URLs for data URIs, which may allow attackers to execute arbitrary code in a victim's browser. + + +## Recommendation + +Upgrade to version 2.5.6 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'pannellum'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/mpetroff/pannellum/security/advisories/GHSA-m52x-29pq-w3vv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16763'}, {'type': 'WEB', 'url': 'https://github.com/mpetroff/pannellum/commit/cc2f3d99953de59db908e0c6efd1c2c17f7c6914'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-m52x-29pq-w3vv'}, {'type': 'PACKAGE', 'url': 'https://github.com/mpetroff/pannellum'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1418'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:44:55Z', 'nvd_published_at': None}" +1.4.0,GHSA-4j6x-w426-6rc6,2020-06-16T20:58:26Z,2019-11-08T17:31:17Z,,[],Default Express middleware security check is ignored in production,"## Default Express middleware security check is ignored in production + +### Impact +All Cube.js deployments that use affected versions of `@cubejs-backend/api-gateway` with default express authentication middleware in production environment are affected. + +### Patches +@cubejs-backend/api-gateway@0.11.17 + +### Workarounds +Override default authentication express middleware: https://cube.dev/docs/@cubejs-backend-server-core#options-reference-check-auth-middleware + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in https://github.com/cube-js/cube.js/issues +* Reach out us in community Slack: https://slack.cube.dev/ + +",[],"[{'package': {'ecosystem': 'npm', 'name': '@cubejs-backend/api-gateway'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.11.0'}, {'fixed': '0.11.17'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.11.16'}}]","[{'type': 'WEB', 'url': 'https://github.com/cube-js/cube.js/security/advisories/GHSA-4j6x-w426-6rc6'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4j6x-w426-6rc6'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:26Z', 'nvd_published_at': None}" +1.4.0,GHSA-cg8j-8w52-735v,2021-12-03T14:39:16Z,2019-11-12T23:01:25Z,,['CVE-2019-12204'],Missing warning can lead to unauthenticated admin access in SilverStripe,"In SilverStripe through 4.3.3, a missing warning about leaving install.php in a public webroot can lead to unauthenticated admin access.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed': '4.4.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed': '4.4.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12204'}, {'type': 'WEB', 'url': 'https://forum.silverstripe.org/c/releases'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/silverstripe/cms'}, {'type': 'WEB', 'url': 'https://packagist.org/packages/silverstripe/framework'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/CVE-2019-12204'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-10-01T18:05:09Z', 'nvd_published_at': None}" +1.4.0,GHSA-pwrf-q7h8-jjr7,2021-05-10T17:22:09Z,2019-11-08T20:06:24Z,,['CVE-2019-16403'],Authorization Bypass Through User-Controlled Key in Bagisto,"In Webkul Bagisto before 0.1.5, the functionalities for customers to change their own values (such as address, review, orders, etc.) can also be manipulated by other customers.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'bagisto/bagisto'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16403'}, {'type': 'WEB', 'url': 'https://github.com/bagisto/bagisto/issues/749'}]","{'cwe_ids': ['CWE-639'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-09-25T12:47:46Z', 'nvd_published_at': '2019-09-18T12:15:00Z'}" +1.4.0,GHSA-hx83-rpqf-m267,2021-08-18T22:42:32Z,2019-11-20T01:38:00Z,,['CVE-2018-11768'],user/group information can be corrupted across storing in fsimage and reading back from fsimage,"In Apache Hadoop 3.1.0 to 3.1.1, 3.0.0-alpha1 to 3.0.3, 2.9.0 to 2.9.1, and 2.0.0-alpha to 2.8.4, the user/group information can be corrupted across storing in fsimage and reading back from fsimage.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.8.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11768'}, {'type': 'WEB', 'url': 'https://hadoop.apache.org/cve_list.html'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2067a797b330530a6932f4b08f703b3173253d0a2b7c8c524e54adaf@%3Cgeneral.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2c9cc65864be0058a5d5ed2025dfb9c700bf23d352b0c826c36ff96a@%3Chdfs-dev.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/72ca514e01cd5f08151e74f9929799b4cbe1b6e9e6cd24faa72ffcc6@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/9b609d4392d886711e694cf40d86f770022baf42a1b1aa97e8244c87@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/caacbbba2dcc1105163f76f3dfee5fbd22e0417e0783212787086378@%3Cgeneral.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ceb16af9139ab0fea24aef935b6321581976887df7ad632e9a515dda@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ea6d2dfbefab8ebe46be18b05136b83ae53b7866f1bc60c680a2b600@%3Chdfs-dev.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f20bb4e055d8394fc525cc7772fb84096f706389043e76220c8a29a4@%3Chdfs-dev.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r02e39d7beb32eebcdbb4b516e95f67d71c90d5d462b26f4078d21eeb@%3Cdev.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r02e39d7beb32eebcdbb4b516e95f67d71c90d5d462b26f4078d21eeb@%3Cuser.flink.apache.org%3E'}]","{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-11-19T03:28:12Z', 'nvd_published_at': None}" +1.4.0,GHSA-fxp8-7h5w-h235,2021-08-18T22:27:14Z,2019-11-12T22:58:11Z,,['CVE-2019-13234'],XSS in search engine,"In the Alkacon OpenCms Apollo Template 10.5.4 and 10.5.5, there is XSS in the search engine.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.opencms:opencms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-13234'}, {'type': 'WEB', 'url': 'https://aetsu.github.io/OpenCms'}, {'type': 'WEB', 'url': 'https://github.com/alkacon/apollo-template/commits/branch_10_5_x'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/154298/Alkacon-OpenCMS-10.5.x-Cross-Site-Scripting.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-12T22:29:42Z', 'nvd_published_at': None}" +1.4.0,GHSA-6r58-4xgr-gm6m,2023-09-20T09:57:17Z,2019-11-12T23:01:59Z,,['CVE-2019-12617'],SilverStripe Priviledge escalation through cache pollution,"In SilverStripe through 4.3.3, there is access escalation for CMS users with limited access through permission cache pollution.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed': '4.4.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12617'}, {'type': 'WEB', 'url': 'https://forum.silverstripe.org/c/releases'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/blog/tag/release'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/CVE-2019-12617'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2019-11-12T22:50:54Z', 'nvd_published_at': None}" +1.4.0,GHSA-mr6r-82x4-f4jj,2021-08-18T22:40:49Z,2019-11-20T01:34:50Z,,['CVE-2019-10764'],Timing attacks might allow practical recovery of the long-term private key,"In elliptic-php versions priot to 1.0.6, Timing attacks might be possible which can result in practical recovery of the long-term private key generated by the library under certain conditions. Leakage of a bit-length of the scalar during scalar multiplication is possible on an elliptic curve which might allow practical recovery of the long-term private key.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'simplito/elliptic-php'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10764'}, {'type': 'WEB', 'url': 'https://github.com/simplito/elliptic-php/commit/15652609aa55968d56685c2a9120535ccdc00fd9'}, {'type': 'WEB', 'url': 'https://minerva.crocs.fi.muni.cz/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PHP-SIMPLITOELLIPTICPHP-534576'}]","{'cwe_ids': ['CWE-203'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-11-19T03:07:02Z', 'nvd_published_at': None}" +1.4.0,GHSA-vrcf-g539-x6h3,2022-03-23T20:24:50Z,2019-11-20T01:37:13Z,,['CVE-2019-17206'],Uncontrolled deserialization of a pickled object in rediswrapper allows attackers to execute arbitrary scripts,Uncontrolled deserialization of a pickled object in models.py in Frost Ming rediswrapper (aka Redis Wrapper) before 0.3.0 allows attackers to execute arbitrary scripts.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'rediswrapper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17206'}, {'type': 'WEB', 'url': 'https://github.com/frostming/rediswrapper/pull/1'}, {'type': 'WEB', 'url': 'https://github.com/frostming/rediswrapper/commit/748f60bafd857c24f65683426f665350e2c3f91b'}, {'type': 'PACKAGE', 'url': 'https://github.com/frostming/rediswrapper'}, {'type': 'WEB', 'url': 'https://github.com/frostming/rediswrapper/compare/v0.2.1...v0.3.0'}, {'type': 'WEB', 'url': 'https://github.com/frostming/rediswrapper/releases/tag/v0.3.0'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-11-19T03:20:13Z', 'nvd_published_at': None}" +1.4.0,GHSA-5whq-j5qg-wjvp,2021-08-18T22:33:30Z,2019-11-18T17:16:06Z,,['CVE-2019-12562'],Stored Cross-Site Scripting vulnerability in admin component of DotNetNuke,Cross-site scripting (XSS) is possible in DNN (formerly DotNetNuke) before 9.4.0 by remote authenticated users via the Display Name field in the admin notification function.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'DotNetNuke.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12562'}, {'type': 'WEB', 'url': 'https://mayaseven.com/cve-2019-12562-stored-cross-site-scripting-in-dotnetnuke-dnn-version-v9-3-2/'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/154673/DotNetNuke-Cross-Site-Scripting.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-18T14:39:24Z', 'nvd_published_at': None}" +1.4.0,GHSA-rc75-cf5c-mxvh,2021-08-18T22:08:17Z,2019-11-06T17:06:28Z,,['CVE-2019-10755'],Use of Cryptographically Weak Pseudo-Random Number Generator in org.pac4j:pac4j-saml,The SAML identifier generated within SAML2Utils.java was found to make use of the apache commons-lang3 RandomStringUtils class which makes them predictable due to RandomStringUtils PRNG's algorithm not being cryptographically strong. This issue only affects the 3.X release of pac4j-saml.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.pac4j:pac4j-saml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10755'}, {'type': 'WEB', 'url': 'https://github.com/pac4j/pac4j/commit/34d5b1028a2db201ee81ec51b52a782fe073f609'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGPAC4J-467407'}]","{'cwe_ids': ['CWE-338'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-05T19:56:04Z', 'nvd_published_at': '2019-09-23T23:15:00Z'}" +1.4.0,GHSA-9ggp-4jpr-7ppj,2021-02-17T19:47:06Z,2019-11-20T01:35:53Z,2021-02-17T19:44:50Z,[],Possible remote code execution via a remote procedure call,"Withdrawn: duplicate of GHSA-pj4g-4488-wmxm + +## Original Description + +In RPyC 4.1.x through 4.1.1, a remote attacker can dynamically modify object attributes to construct a remote procedure call that executes code for an RPyC service with default configuration settings.",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'rpyc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16328'}, {'type': 'WEB', 'url': 'https://github.com/tomerfiliba/rpyc'}, {'type': 'WEB', 'url': 'https://rpyc.readthedocs.io/en/latest/docs/security.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00046.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00004.html'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-11-19T03:15:00Z', 'nvd_published_at': None}" +1.4.0,GHSA-89ch-hqf9-rgp3,2019-11-15T20:11:29Z,2019-11-12T22:59:28Z,,['CVE-2019-8121'],Using JS libraries with known security vulnerabilities,"An insecure component vulnerability exists in Magento 2.1 prior to 2.1.19, Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3. Magento 2 codebase leveraged outdated versions of JS libraries (Bootstrap, jquery, Knockout) with known security vulnerabilities.",[],"[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3'}, {'fixed': '2.3.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8121'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/magento/product-community-edition/CVE-2019-8121.yaml'}, {'type': 'WEB', 'url': 'https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-11-12T22:13:41Z', 'nvd_published_at': None}" +1.4.0,GHSA-xcrg-29h7-h4cj,2022-04-19T20:14:24Z,2019-11-20T01:38:52Z,,['CVE-2018-19277'],XXE in PHPSpreadsheet due to encoding issue,securityScan() in PHPOffice PhpSpreadsheet through 1.5.0 allows a bypass of protection mechanisms for XXE via UTF-7 encoding in a .xlsx file,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'phpoffice/phpspreadsheet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19277'}, {'type': 'WEB', 'url': 'https://github.com/MewesK/TwigSpreadsheetBundle/issues/18'}, {'type': 'WEB', 'url': 'https://github.com/PHPOffice/PhpSpreadsheet/issues/771'}, {'type': 'PACKAGE', 'url': 'https://github.com/PHPOffice/PhpSpreadsheet'}, {'type': 'WEB', 'url': 'https://www.bishopfox.com/news/2018/11/phpoffice-versions/'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-contrib-2021-043'}]","{'cwe_ids': ['CWE-91'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-11-19T03:40:52Z', 'nvd_published_at': '2018-11-14T11:29:00Z'}" +1.4.0,GHSA-2598-2f59-rmhq,2021-08-18T22:10:20Z,2019-11-08T17:05:17Z,,['CVE-2019-10749'],SQL Injection in sequelize,"Versions of `sequelize` prior to 3.35.1 are vulnerable to SQL Injection. The package fails to sanitize JSON path keys in the Postgres dialect, which may allow attackers to inject SQL statements and execute arbitrary SQL queries. + + +## Recommendation + +Upgrade to version 3.35.1 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'sequelize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.35.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10749'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/commit/ee4017379db0059566ecb5424274ad4e2d66bc68'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SEQUELIZE-450222'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1017'}]","{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-11-07T23:29:06Z', 'nvd_published_at': None}" +1.4.0,GHSA-wmx6-vxcf-c3gr,2021-01-08T20:11:31Z,2019-11-15T23:10:19Z,,['CVE-2019-16761'],Validation Bypass in slp-validate,"Versions of `slp-validate` prior to 1.0.1 are vulnerable to a validation bypass. Bitcoin scripts may cause the validation result from `slp-validate` to differ from the specified SLP consensus. This allows an attacker to create a Bitcoin script that causes a hard-fork from the SLP consensus. + + +## Recommendation + +Upgrade to version 1.0.1 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'slp-validate'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.1'}]}], 'versions': ['1.0.0']}]","[{'type': 'WEB', 'url': 'https://github.com/simpleledger/slp-validate/security/advisories/GHSA-wmx6-vxcf-c3gr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16761'}, {'type': 'WEB', 'url': 'https://github.com/simpleledger/slp-validate/commit/50ad96c2798dad6b9f9a13333dd05232defe5730#diff-fe58606994c412ba56a65141a7aa4a62L123'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wmx6-vxcf-c3gr'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1422'}]","{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:49:38Z', 'nvd_published_at': None}" +1.4.0,GHSA-h7qw-mxrm-c6h2,2021-08-18T22:35:44Z,2019-11-20T01:33:05Z,,['CVE-2016-6485'],Unauthenticated crypto and weak IV in Magento\Framework\Encryption,"The __construct function in Framework/Encryption/Crypt.php in Magento 2 uses the PHP rand function to generate a random number for the initialization vector, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by guessing the value.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0'}, {'fixed': '2.2.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6485'}, {'type': 'WEB', 'url': 'https://github.com/magento/magento2/pull/15017'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/magento/product-community-edition/CVE-2016-6485.yaml'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/07/19/3'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/07/27/14'}]","{'cwe_ids': ['CWE-327'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-11-19T01:07:44Z', 'nvd_published_at': None}" +1.4.0,GHSA-7qqr-3pj3-q2f5,2021-08-18T22:25:15Z,2019-11-12T22:58:21Z,,['CVE-2019-13236'],XSS issues in the management interface,"In system/workplace/ in Alkacon OpenCms 10.5.4 and 10.5.5, there are multiple Reflected and Stored XSS issues in the management interface.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.opencms:opencms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-13236'}, {'type': 'WEB', 'url': 'https://aetsu.github.io/OpenCms'}, {'type': 'WEB', 'url': 'https://github.com/alkacon/opencms-core/commits/branch_10_5_x'}, {'type': 'WEB', 'url': 'https://twitter.com/aetsu/status/1152096227938459648'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/154283/Alkacon-OpenCMS-10.5.x-Cross-Site-Scripting.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-12T22:28:30Z', 'nvd_published_at': None}" +1.4.0,GHSA-pgwj-prpq-jpc2,2023-09-21T18:19:26Z,2019-11-18T17:27:31Z,,['CVE-2019-10910'],Symfony Service IDs Allow Injection,"In Symfony before 2.7.51, 2.8.x before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, when service ids allow user input, this could allow for SQL Injection and remote code execution. This is related to symfony/dependency-injection.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/dependency-injection'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.51'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/dependency-injection'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.50'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/dependency-injection'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.26'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/dependency-injection'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/dependency-injection'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/proxy-manager-bridge'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.51'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/proxy-manager-bridge'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.50'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/proxy-manager-bridge'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.26'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/proxy-manager-bridge'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/proxy-manager-bridge'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.51'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.50'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.26'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10910'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/commit/d2fb5893923292a1da7985f0b56960b5bb10737b'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/dependency-injection/CVE-2019-10910.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/proxy-manager-bridge/CVE-2019-10910.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10910.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/symfony/symfony'}, {'type': 'WEB', 'url': 'https://symfony.com/blog/cve-2019-10910-check-service-ids-are-valid'}, {'type': 'WEB', 'url': 'https://symfony.com/cve-2019-10910'}, {'type': 'WEB', 'url': 'https://www.synology.com/security/advisory/Synology_SA_19_19'}]","{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-11-18T14:06:00Z', 'nvd_published_at': '2019-05-16T22:29:00Z'}" +1.4.0,GHSA-3q5x-7mxp-rp6j,2021-08-18T22:23:57Z,2019-11-12T22:59:32Z,,['CVE-2019-8135'],Remote code execution via vulnerable Symphony dependecy injection,"A remote code execution vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. Dependency injection through Symphony framework allows service identifiers to be derived from user controlled data, which can lead to remote code execution.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3'}, {'fixed': '2.3.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8135'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/magento/product-community-edition/CVE-2019-8135.yaml'}, {'type': 'WEB', 'url': 'https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}]","{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-11-12T22:13:36Z', 'nvd_published_at': None}" +1.4.0,GHSA-cw6w-q88j-6mqf,2021-06-15T17:21:24Z,2019-11-08T17:12:59Z,,['CVE-2019-12419'],Potential session hijack in Apache CXF ,"Apache CXF before 3.3.4 and 3.2.11 provides all of the components that are required to build a fully fledged OpenId Connect service. There is a vulnerability in the access token services, where it does not validate that the authenticated principal is equal to that of the supplied clientId parameter in the request. If a malicious client was able to somehow steal an authorization code issued to another client, then they could exploit this vulnerability to obtain an access token for the other client.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.0'}, {'fixed': '3.3.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12419'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r861eb1a9e0250e9150215b17f0263edf62becd5e20fc96251cff59f6@%3Cdev.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re7593a274ee0a85d304d5d42c66fc0081c94d7f22bc96a1084d43b80@%3Cdev.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ree5fc719e330f82ae38a2b0050c91f18ed5b878312dc0b9e0b9815be@%3Cdev.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'http://cxf.apache.org/security-advisories.data/CVE-2019-12419.txt.asc'}]","{'cwe_ids': ['CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-11-07T23:18:50Z', 'nvd_published_at': '2019-11-06T21:15:00Z'}" +1.4.0,GHSA-89r3-rcpj-h7w6,2023-03-06T20:46:38Z,2019-11-18T17:19:03Z,,['CVE-2019-0207'],Path traversal attack on Windows platforms,"Tapestry processes assets `/assets/ctx` using classes chain `StaticFilesFilter -> AssetDispatcher -> ContextResource`, which doesn't filter the character `\`, so attacker can perform a path traversal attack to read any files on Windows platform.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tapestry:tapestry-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.4.0'}, {'fixed': '5.4.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0207'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/765be3606d865de513f6df9288842c3cf58b09a987c617a535f2b99d@%3Cusers.tapestry.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/bac8d6f9e1b4059b319d9cba6f33219a99b81623476ec896138f851c@%3Cusers.tapestry.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7d9c54beb1dc97dcccc58d9b5d31f0f7166f9a25ad1beba5f8091e0c@%3Ccommits.tapestry.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r87523dd07886223aa086edc25fe9b8ddb9c1090f7db25b068dc30843@%3Ccommits.tapestry.apache.org%3E'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-11-18T14:18:47Z', 'nvd_published_at': '2019-09-16T17:15:00Z'}" +1.4.0,GHSA-36hf-6hp2-9g4c,2022-04-19T20:07:03Z,2019-11-12T22:58:14Z,,['CVE-2019-13237'],Local file inclusion allows unauthorized access to internal resources in Alkacon OpenCms,"In Alkacon OpenCms 10.5.4 and 10.5.5, there are multiple resources vulnerable to Local File Inclusion that allow an attacker to access server resources: clearhistory.jsp, convertxml.jsp, group_new.jsp, loginmessage.jsp, xmlcontentrepair.jsp, and /system/workplace/admin/history/settings/index.jsp.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.opencms:opencms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-13237'}, {'type': 'WEB', 'url': 'https://aetsu.github.io/OpenCms'}, {'type': 'PACKAGE', 'url': 'https://github.com/alkacon/opencms-core'}, {'type': 'WEB', 'url': 'https://github.com/alkacon/opencms-core/commits/branch_10_5_x'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/154281/Alkacon-OpenCMS-10.5.x-Local-File-Inclusion.html'}]","{'cwe_ids': ['CWE-200', 'CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-12T22:29:08Z', 'nvd_published_at': '2019-08-27T12:15:00Z'}" +1.4.0,GHSA-gjmw-vf9h-g25v,2023-09-14T14:55:23Z,2019-11-13T00:32:38Z,,['CVE-2019-17531'],jackson-databind polymorphic typing issue,"A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 prior to 2.9.10.1, 2.8.11.5, and 2.6.7.3. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the apache-log4j-extra (version 1.2.x) jar in the classpath, and an attacker can provide a JNDI service to access, it is possible to make the service execute a malicious payload. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.10.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.8.11.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.7.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17531'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2498'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/b5a304a98590b6bb766134f9261e6566dcbbb6d0'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:4192'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0159'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0160'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0161'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0164'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0445'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b3c90d38f99db546de60fea65f99a924d540fae2285f014b79606ca5@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r392099ed2757ff2e383b10440594e914d080511d7da1c8fed0612c1f@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/12/msg00013.html'}, {'type': 'WEB', 'url': 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20191024-0005/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-11-13T00:30:58Z', 'nvd_published_at': '2019-10-12T21:15:00Z'}" +1.4.0,GHSA-m553-9wmx-533h,2022-11-17T20:00:22Z,2019-11-08T20:05:31Z,,['CVE-2019-16197'],Cross-site scripting in Dolibarr,"In htdocs/societe/card.php in Dolibarr 10.0.1, the value of the User-Agent HTTP header is copied into the HTML document as plain text between tags, leading to XSS.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16197'}, {'type': 'WEB', 'url': 'https://github.com/Dolibarr/dolibarr/commit/c53be23122fc6e7c3c8d65ee8ba979c566380964'}, {'type': 'PACKAGE', 'url': 'https://github.com/Dolibarr/dolibarr'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/154481/Dolibarr-ERP-CRM-10.0.1-Cross-Site-Scripting.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-09-25T13:02:38Z', 'nvd_published_at': '2019-09-16T13:15:00Z'}" +1.4.0,GHSA-6g88-vr3v-76mf,2021-08-18T22:35:10Z,2019-11-20T01:31:31Z,,['CVE-2019-19010'],Eval injection in Supybot/Limnoria,Eval injection in the Math plugin of Limnoria (before 2019.11.09) and Supybot (through 2018-05-09) allows remote unprivileged attackers to disclose information or possibly have unspecified other impact via the calc and icalc IRC commands.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'limnoria'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2019.11.09'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19010'}, {'type': 'WEB', 'url': 'https://github.com/ProgVal/Limnoria/commit/3848ae78de45b35c029cc333963d436b9d2f0a35'}, {'type': 'WEB', 'url': 'https://github.com/ProgVal/Limnoria/wiki/math-eval-vulnerability'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/54CQM2TEXRADLE77VOMCPHL5PBHR3ZWJ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5P2AGND54UIJV3WHOYO2YINIXSDGAAPO/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DRNOUHFEN75QAIKT4Y3HDN3TT5LSIWN2/'}]","{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-11-18T18:01:34Z', 'nvd_published_at': None}" +1.4.0,GHSA-89mq-4x47-5v83,2022-01-04T19:51:20Z,2019-11-20T15:29:43Z,,['CVE-2019-10768'],Prototype Pollution in angular,"Versions of `angular ` prior to 1.7.9 are vulnerable to prototype pollution. The deprecated API function `merge()` does not restrict the modification of an Object's prototype in the , which may allow an attacker to add or modify an existing property that will exist on all objects. + + + + +## Recommendation + +Upgrade to version 1.7.9 or later. The function was already deprecated and upgrades are not expected to break functionality.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'angular'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10768'}, {'type': 'WEB', 'url': 'https://github.com/angular/angular.js/pull/16913'}, {'type': 'WEB', 'url': 'https://github.com/angular/angular.js/commit/add78e62004e80bb1e16ab2dfe224afa8e513bc3'}, {'type': 'PACKAGE', 'url': 'https://github.com/angular/angular.js'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ANGULAR-534884'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1343'}]","{'cwe_ids': ['CWE-1321', 'CWE-20', 'CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-11-20T00:51:05Z', 'nvd_published_at': '2019-11-19T21:15:00Z'}" +1.4.0,GHSA-427g-2r83-3ccm,2021-07-28T15:37:48Z,2019-11-12T22:59:24Z,,['CVE-2019-8126'],Information disclosure through processing of external XML entities,"An XML entity injection vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated admin user can craft document type definition for an XML representing XML layout. The crafted document type definition and XML layout allow processing of external entities which can lead to information disclosure.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3'}, {'fixed': '2.3.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8126'}, {'type': 'WEB', 'url': 'https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}]","{'cwe_ids': ['CWE-611', 'CWE-776'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-12T22:13:59Z', 'nvd_published_at': '2019-11-05T23:15:00Z'}" +1.4.0,GHSA-jqwc-jm56-wcwj,2021-05-11T16:19:11Z,2019-11-08T17:07:42Z,,['CVE-2018-21030'],Cross-site scripting in Jupyter Notebook,"Jupyter Notebook before 5.5.0 does not use a CSP header to treat served files as belonging to a separate origin. Thus, for example, an XSS payload can be placed in an SVG document.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'notebook'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.5.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-21030'}, {'type': 'WEB', 'url': 'https://github.com/jupyter/notebook/pull/3341'}, {'type': 'WEB', 'url': 'https://github.com/jupyter/notebook/releases/tag/5.5.0'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/11/msg00033.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-07T23:25:31Z', 'nvd_published_at': '2019-10-31T15:15:00Z'}" +1.4.0,GHSA-2p6p-v69p-9mm9,2021-08-18T22:26:42Z,2019-11-12T22:58:16Z,,['CVE-2019-13235'],XSS in login form,"In the Alkacon OpenCms Apollo Template 10.5.4 and 10.5.5, there is XSS in the Login form.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.opencms:opencms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-13235'}, {'type': 'WEB', 'url': 'https://aetsu.github.io/OpenCms'}, {'type': 'WEB', 'url': 'https://github.com/alkacon/apollo-template/commits/branch_10_5_x'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/154298/Alkacon-OpenCMS-10.5.x-Cross-Site-Scripting.html'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-12T22:28:41Z', 'nvd_published_at': None}" +1.4.0,GHSA-xm6j-x342-gwq9,2021-07-27T22:02:46Z,2019-11-12T23:01:05Z,,['CVE-2019-16409'],Unpublished files are exposed publicly,"In the Versioned Files module through 2.0.3 for SilverStripe 3.x, unpublished versions of files are publicly exposed to anyone who can guess their URL. This guess could be highly informed by a basic understanding of the symbiote/silverstripe-versionedfiles source code. (Users who upgrade from SilverStripe 3.x to 4.x and had Versioned Files installed have no further need for this module, because the 4.x release has built-in versioning. However, nothing in the upgrade process automates the destruction of these insecure artefacts, nor alerts the user to the criticality of destruction.)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'symbiote/silverstripe-versionedfiles'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16409'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-framework'}, {'type': 'WEB', 'url': 'https://github.com/symbiote/silverstripe-versionedfiles'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/cve-2019-16409'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-12T22:54:36Z', 'nvd_published_at': '2019-09-26T16:15:00Z'}" +1.4.0,GHSA-jvx5-rm6q-gx7p,2021-08-18T22:29:09Z,2019-11-12T23:01:50Z,,['CVE-2019-12245'],Lack of access control on upoaded files,SilverStripe through 4.3.3 has incorrect access control for protected files uploaded via Upload::loadIntoFile(). An attacker may be able to guess a filename in silverstripe/assets via the AssetControlExtension.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.7.0'}, {'fixed': '3.7.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed': '4.4.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12245'}, {'type': 'WEB', 'url': 'https://forum.silverstripe.org/c/releases'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/CVE-2019-12245'}]","{'cwe_ids': ['CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-12T22:50:39Z', 'nvd_published_at': None}" +1.4.0,GHSA-w7r7-r8r9-vrg2,2021-08-18T22:28:15Z,2019-11-12T23:01:39Z,,['CVE-2019-12203'],Session fixation in change password form,"SilverStripe through 4.3.3 allows session fixation in the ""change password"" form.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.7.0'}, {'fixed': '3.7.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed': '4.4.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12203'}, {'type': 'WEB', 'url': 'https://forum.silverstripe.org/c/releases'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-framework/blob/4/docs/en/04_Changelogs/4.4.4.md#444'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/CVE-2019-12203'}]","{'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-12T22:50:24Z', 'nvd_published_at': None}" +1.4.0,GHSA-q3p4-gw7r-wqjc,2023-08-30T22:38:05Z,2019-11-22T13:45:22Z,,['CVE-2019-12417'],Apache Airflow vulnerable to XSS and local file disclosure,A malicious admin user could edit the state of objects in the Airflow metadata database to execute arbitrary javascript on certain page views. This also presented a Local File Disclosure vulnerability to any file readable by the webserver process.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12417'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f3aa5ff9c7cdb5424b6463c9013f6cf5db83d26c66ea77130cbbe1bc@%3Cusers.airflow.apache.org%3E'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-21T04:09:18Z', 'nvd_published_at': None}" +1.4.0,GHSA-62fx-3v4f-mwxm,2021-08-18T22:23:23Z,2019-11-12T22:59:40Z,,['CVE-2019-8133'],Bypass of sitemp access restrictions,"A security bypass vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. A user with privileges to generate sitemaps can bypass configuration that restricts directory access. The bypass allows overwrite of a subset of configuration files which can lead to denial of service.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3'}, {'fixed': '2.3.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8133'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/magento/product-community-edition/CVE-2019-8133.yaml'}, {'type': 'WEB', 'url': 'https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-12T22:13:08Z', 'nvd_published_at': None}" +1.4.0,GHSA-8vh8-vc28-m2hf,2022-02-11T21:12:59Z,2019-11-20T01:33:54Z,,['CVE-2019-10212'],Potential to access user credentials from the log files when debug logging enabled,"A flaw was found in, all under 2.0.20, in the Undertow DEBUG log for io.undertow.request.security. If enabled, an attacker could abuse this flaw to obtain the user's credentials from the log files.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.20'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10212'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2998'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0727'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10212'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220210-0017/'}]","{'cwe_ids': ['CWE-532'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-11-19T02:49:57Z', 'nvd_published_at': '2019-10-02T19:15:00Z'}" +1.4.0,GHSA-58p8-9g59-q2hr,2021-06-15T17:20:53Z,2019-11-08T17:15:11Z,,['CVE-2019-12406'],Potential DOS attack due to unrestricted attachment count in messages,"Apache CXF before 3.3.4 and 3.2.11 does not restrict the number of message attachments present in a given message. This leaves open the possibility of a denial of service type attack, where a malicious user crafts a message containing a very large number of message attachments. From the 3.3.4 and 3.2.11 releases, a default limit of 50 message attachments is enforced. This is configurable via the message property ""attachment-max-count"".","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.0'}, {'fixed': '3.3.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:apache-cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:apache-cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.0'}, {'fixed': '3.3.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12406'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r92238967ba2783d3ab5a483f2e17f5fdaa8ace98990f69f9e8e15de0@%3Cissues.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rabc395b38acb7f2465bfbf0bc16d6e1e95720c89bea87abe8808eeea@%3Cissues.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb2a6dab1f781f55326543c56dc29ea677759439ddfeba920c83037e6@%3Cissues.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca465c9d1e1969281338522b76701c85a07abd045c494261137236e0@%3Cissues.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'http://cxf.apache.org/security-advisories.data/CVE-2019-12406.txt.asc'}]","{'cwe_ids': ['CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-07T23:18:17Z', 'nvd_published_at': '2019-11-06T21:15:00Z'}" +1.4.0,GHSA-xv69-f7x5-r4qw,2023-09-06T13:45:11Z,2019-11-12T22:59:43Z,,['CVE-2019-8145'],Magento Cross-Site Scripting via Attribute Set Name,"A stored cross-site scripting (XSS) vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated user can inject arbitrary JavaScript code into the attribute set name when listing the products.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3'}, {'fixed': '2.3.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8145'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/magento/product-community-edition/CVE-2019-8145.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-11-12T22:12:58Z', 'nvd_published_at': None}" +1.4.0,GHSA-c3gv-9cxf-6f57,2023-08-25T21:37:28Z,2019-11-05T23:58:25Z,,['CVE-2019-15587'],Loofah Allows Cross-site Scripting,"In the Loofah gem for Ruby through v2.3.0, unsanitized JavaScript may occur in sanitized output when a crafted SVG element is republished.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'loofah'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15587'}, {'type': 'WEB', 'url': 'https://github.com/flavorjones/loofah/issues/171'}, {'type': 'WEB', 'url': 'https://github.com/flavorjones/loofah/commit/0c6617af440879ce97440f6eb6c58636456dc8ec'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/709009'}, {'type': 'PACKAGE', 'url': 'https://github.com/flavorjones/loofah'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/loofah/CVE-2019-15587.yml'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4WK2UG7ORKRQOJ6E4XJ2NVIHYJES6BYZ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMCWPLYPNIWYAY443IZZJ4IHBBLIHBP5/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20191122-0003/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4498-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4554'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-10-24T20:44:29Z', 'nvd_published_at': '2019-10-22T21:15:00Z'}" +1.4.0,GHSA-6268-v434-45m5,2021-08-17T22:39:50Z,2019-11-08T20:06:08Z,,['CVE-2019-16126'],Cross-site Scripting in Grav,Grav through 1.6.15 allows (Stored) Cross-Site Scripting due to JavaScript execution in SVG images.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'getgrav/grav'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.0-beta.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.7.0-beta.7'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16126'}, {'type': 'WEB', 'url': 'https://github.com/getgrav/grav/issues/2657'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-09-25T12:48:38Z', 'nvd_published_at': '2019-09-09T02:15:00Z'}" +1.4.0,GHSA-pqm6-cgwr-x6pf,2021-08-18T22:14:37Z,2019-11-08T20:06:46Z,,['CVE-2019-3465'],Signature validation bypass in XmlSecLibs,"Rob Richards XmlSecLibs, all versions prior to v3.0.3, as used for example by SimpleSAMLphp, performed incorrect validation of cryptographic signatures in XML messages, allowing an authenticated attacker to impersonate others or elevate privileges by creating a crafted XML message.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'robrichards/xmlseclibs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'robrichards/xmlseclibs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3465'}, {'type': 'WEB', 'url': 'https://github.com/robrichards/xmlseclibs/commit/0a53d3c3aa87564910cae4ed01416441d3ae0db5'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/11/msg00003.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7KID7C4AZPYYIZQIPSLANP4R2RQR6YK3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AB34ILMJ67CUROBOR6YPKB46VHXLOAJ4/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BBKVDUZ7G5ZOUO4BFJWLNJ6VOKBQJX5U/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BNFMY5RRLU63P25HEBVDO5KAVI7TX7JV/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ESKJTWLE7QZBQ3EKMYXKMBQG3JDEJWM6/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HBE2SJSXG7J4XYLJ2H6HC2VPPOG2OMUN/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MAWOVYLZKYDCQBLQEJCFAAD3KQTBPHXE/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCSR3V6LNWJAD37VQB6M2K7P4RQSCVFG/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XBSSRV5Q7JFCYO46A3EN624UZ4KXFQ2M/'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Nov/8'}, {'type': 'WEB', 'url': 'https://simplesamlphp.org/security/201911-01'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4560'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2019-09'}]","{'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-11-08T17:45:46Z', 'nvd_published_at': None}" +1.4.0,GHSA-fmmc-742q-jg75,2023-09-14T14:55:20Z,2019-11-13T00:32:27Z,,['CVE-2019-16943'],jackson-databind polymorphic typing issue,"A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 prior to 2.9.10.1, 2.8.11.5, and 2.6.7.3. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the p6spy (3.8.6) jar in the classpath, and an attacker can find an RMI service endpoint to access, it is possible to make the service execute a malicious payload. This issue exists because of com.p6spy.engine.spy.P6DataSource mishandling.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.10.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.8.11.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.7.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16943'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2478'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/328a0f833daf6baa443ac3b37c818a0204714b0b'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/bc67eb11a7cf57561f861ff16f879f1fceb5779f'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0159'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0160'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0161'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0164'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0445'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5ec8d8d485c2c8ac55ea425f4cd96596ef37312532712639712ebcdd@%3Ccommits.iceberg.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6788e4c991f75b89d290ad06b463fcd30bcae99fee610345a35b7bc6@%3Cissues.iceberg.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r392099ed2757ff2e383b10440594e914d080511d7da1c8fed0612c1f@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/10/msg00001.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q7CANA7KV53JROZDX5Z5P26UG5VN2K43/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TH5VFUN4P7CCIP7KSEXYA5MUTFCUDUJT/'}, {'type': 'WEB', 'url': 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Oct/6'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20191017-0006/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4542'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-11-13T00:30:39Z', 'nvd_published_at': '2019-10-01T17:15:00Z'}" +1.4.0,GHSA-vvwv-h69m-wg6f,2023-09-11T13:38:04Z,2019-11-20T01:39:57Z,,['CVE-2019-12331'],XXE in PHPSpreadsheet due to incomplete fix for previous encoding issue,PHPOffice PhpSpreadsheet before 1.8.0 has an XXE issue. The XmlScanner decodes the sheet1.xml from an .xlsx to utf-8 if something else than UTF-8 is declared in the header. This was a security measurement to prevent CVE-2018-19277 but the fix is not sufficient. By double-encoding the the xml payload to utf-7 it is possible to bypass the check for the string ?`,`;`,`{`,`}` + +Bash has a neat but not well known feature known as ""Bash Brace Expansion"", wherein a sub-command can be executed without spaces by running it between a set of `{}` and using the `,` instead of ` ` to seperate arguments. Because of this, full command injection is possible even though it was initially thought to be impossible. + +``` + const quote = require('shell-quote').quote; + console.log(quote(['a;{echo,test,123,234}'])); + // Actual ""a;{echo,test,123,234}"" + // Expected ""a\;\{echo,test,123,234\}"" + // Functional Equivalent ""a; echo 'test' '123' '1234'"" +``` + + + +## Recommendation + +Update to version 1.6.1 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'shell-quote'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10541'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qg8p-v9q4-gh34'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/117'}]","{'cwe_ids': ['CWE-78', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:49Z', 'nvd_published_at': '2018-05-31T20:29:00Z'}" +1.4.0,GHSA-j336-34q7-cgj3,2021-01-08T18:38:24Z,2019-02-18T23:42:06Z,,['CVE-2016-10684'],Downloads Resources over HTTP in healthcenter,"Affected versions of `healthcenter` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `healthcenter`. + + +## Recommendation + +This package has been deprecated, and moved to a new package on npm: [`appmetrics`](https://npmjs.com/package/appmetrics). + +In order to mitigate this vulnerability, please install the `appmetrics` package in place of `healthcenter` via the following commands: +``` +npm uninstall healthcenter -s +npm install appmetrics -s +```",[],"[{'package': {'ecosystem': 'npm', 'name': 'healthcenter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10684'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j336-34q7-cgj3'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/288'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:41:39Z', 'nvd_published_at': None}" +1.4.0,GHSA-wq7q-7vfh-2x3h,2023-09-07T18:55:53Z,2019-02-18T23:54:09Z,,['CVE-2016-10566'],install-nw downloads Resources over HTTP,"Affected versions of `install-nw` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `install-nw`. + + +## Recommendation + +Update to version 1.1.5 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'install-nw'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10566'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wq7q-7vfh-2x3h'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/204'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:58Z', 'nvd_published_at': None}" +1.4.0,GHSA-cr8h-x88h-jwj2,2023-09-12T20:45:07Z,2019-02-18T23:44:45Z,,['CVE-2016-10663'],wixtoolset downloads Resources over HTTP,"Affected versions of `wixtoolset` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `wixtoolset`. + + +## Recommendation + +No patch is currently available for this vulnerability, and the package has not seen an update since 2015. + +The best mitigation is currently to avoid using this package, using a different package if available. + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'wixtoolset'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10663'}, {'type': 'WEB', 'url': 'https://github.com/wixtoolset/issues/issues/6187'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cr8h-x88h-jwj2'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/264'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:32:48Z', 'nvd_published_at': None}" +1.4.0,GHSA-x5ph-4fr4-g7fw,2021-01-08T00:47:45Z,2019-02-18T23:54:21Z,,['CVE-2016-10560'],Downloads Resources over HTTP in galenframework-cli,"Affected versions of `galenframework-cli` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `galenframework-cli`. + + +## Recommendation + +Update to version 2.3.1 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'galenframework-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10560'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-x5ph-4fr4-g7fw'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/170'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:02:14Z', 'nvd_published_at': None}" +1.4.0,GHSA-649c-x44h-4q7v,2023-09-11T18:35:47Z,2019-02-07T18:14:37Z,,['CVE-2018-16480'],Tnantoka/public XSS Vulnerability,"A XSS vulnerability was found in module public <0.1.4 that allows malicious Javascript code to run in the browser, due to the absence of sanitization of the file/folder names before rendering.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'public'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16480'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/329950'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-649c-x44h-4q7v'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/public'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:17:59Z', 'nvd_published_at': None}" +1.4.0,GHSA-4r4m-hjwj-43p8,2023-09-07T22:50:46Z,2019-02-18T23:39:50Z,,['CVE-2016-10536'],Insecure Defaults Allow MITM Over TLS in engine.io-client,"Affected versions of `engine.io-client` do not verify certificates by default, and as such may be vulnerable to Man-in-the-Middle attacks. + +The vulnerability is related to the way that node.js handles the `rejectUnauthorized` setting. If the value is something that evaluates to false, such as undefined or null, certificate verification will be disabled. + + + +## Recommendation + +Update to version 1.6.9 or later. + +If you are unable to upgrade, ensure all calls to socket.io to have a `rejectedUnauthorized: true` flag.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'engine.io-client'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10536'}, {'type': 'WEB', 'url': 'https://github.com/socketio/engine.io-client/commit/2c55b278a491bf45313ecc0825cf800e2f7ff5c1'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4r4m-hjwj-43p8'}, {'type': 'WEB', 'url': 'https://www.cigital.com/blog/node-js-socket-io/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/99'}]","{'cwe_ids': ['CWE-300'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:54Z', 'nvd_published_at': None}" +1.4.0,GHSA-rqwh-c535-j9hw,2021-01-08T01:57:52Z,2019-02-18T23:47:09Z,,['CVE-2016-10638'],Downloads Resources over HTTP in js-given,"Affected versions of `js-given` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `js-given`. + + +## Recommendation + +Update to version 0.0.18 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'js-given'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.18'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10638'}, {'type': 'WEB', 'url': 'https://github.com/jsGiven/jsGiven/commit/92f750739c7b9b6e704e562ad34e2ad148acad64)'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rqwh-c535-j9hw'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/241'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:34Z', 'nvd_published_at': None}" +1.4.0,GHSA-6pwf-whc8-hjf6,2021-01-08T19:20:39Z,2019-02-18T23:35:18Z,,['CVE-2016-10573'],Downloads Resources over HTTP in baryton-saxophone,"Affected versions of `baryton-saxophone` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `baryton-saxophone`. + + +## Recommendation + +Update to version 3.0.1 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'baryton-saxophone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10573'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6pwf-whc8-hjf6'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/240'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:19:59Z', 'nvd_published_at': None}" +1.4.0,GHSA-3vv5-42wr-m32g,2021-01-08T19:58:45Z,2019-02-18T23:57:00Z,,['CVE-2016-10627'],Downloads Resources over HTTP in scala-bin,"Affected versions of `scala-bin` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `scala-bin`. + + +## Recommendation + +No patch is currently available for this vulnerability. + +The best mitigation is currently to avoid using this package, using a different package if available. + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.",[],"[{'package': {'ecosystem': 'npm', 'name': 'scala-bin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.3.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10627'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3vv5-42wr-m32g'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/227'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:35Z', 'nvd_published_at': None}" +1.4.0,GHSA-mpww-j7xj-cj35,2021-01-08T18:26:48Z,2019-02-18T23:45:07Z,,['CVE-2016-10658'],Downloads Resources over HTTP in native-opencv,"Affected versions of `native-opencv` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `native-opencv`. + + +## Recommendation + +No patch is currently available for this vulnerability, and the package has not seen an update since 2015. + +The best mitigation is currently to avoid using this package, using a different package if available. + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.",[],"[{'package': {'ecosystem': 'npm', 'name': 'native-opencv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10658'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mpww-j7xj-cj35'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/263'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:45Z', 'nvd_published_at': None}" +1.4.0,GHSA-2v7q-2xqx-f4q5,2020-08-31T18:11:09Z,2019-02-18T23:54:32Z,,['CVE-2016-10553'],Potential SQL Injection in sequelize,"Affected versions of `sequelize` are vulnerable to SQL Injection when user input is passed into `findOne` or into a statement such as `where: ""user input""`. + + + +## Recommendation + +Update to version 3.0.0 or later. + +Version 3.0.0 will introduce a number of breaking changes. +Thankfully, the project authors have provided a 2.x -> 3.x [upgrade guide](https://github.com/sequelize/sequelize/wiki/Upgrade-from-2.0-to-3.0) to ease this transition. + +If upgrading is not an option, it is also possible to mitigate this by ensuring that all uses of `where: ""input""` and `findOne(""input"")` are properly sanitized, such as by the use of a wrapper function.",[],"[{'package': {'ecosystem': 'npm', 'name': 'sequelize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.1.3'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10553'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2v7q-2xqx-f4q5'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/blob/master/changelog.md#300'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/109'}]","{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:00Z', 'nvd_published_at': None}" +1.4.0,GHSA-6jx3-rqcx-g3ww,2021-01-08T19:21:29Z,2019-02-18T23:33:48Z,,['CVE-2016-10603'],Downloads Resources over HTTP in air-sdk,"Affected versions of `air-sdk` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `air-sdk`. + + +## Recommendation + +No patch is currently available for this vulnerability, and the package hasn't seen an update since 2015. + +The best mitigation is currently to avoid using this package, using a different package if available. + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.",[],"[{'package': {'ecosystem': 'npm', 'name': 'air-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '16.0.0-272-9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10603'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6jx3-rqcx-g3ww'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/200'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:19:39Z', 'nvd_published_at': None}" +1.4.0,GHSA-v569-g72v-q434,2022-09-14T22:43:31Z,2019-02-12T17:26:12Z,,['CVE-2018-1296'],Exposure of Sensitive Information to an Unauthorized Actor in Hadoop,"In Apache Hadoop 3.0.0-alpha1 to 3.0.0, 2.9.0, 2.8.0 to 2.8.3, and 2.5.0 to 2.7.5, HDFS exposes extended attribute key/value pairs during listXAttrs, verifying only path-level search access to the directory rather than path-level read permission to the referent.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.1'}]}], 'versions': ['2.9.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1296'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-v569-g72v-q434'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a5b15bc76fbdad2ee40761aacf954a13aeef67e305f86d483f267e8e@%3Cuser.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106764'}]","{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:41Z', 'nvd_published_at': None}" +1.4.0,GHSA-476p-r2wx-2wch,2021-01-08T19:56:27Z,2019-02-18T23:47:05Z,,['CVE-2016-10650'],Downloads Resources over HTTP in ntfserver,"Affected versions of `ntfserver` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `ntfserver`. + + +## Recommendation + +No patch is currently available for this vulnerability. + +The best mitigation is currently to avoid using this package, using a different package if available. + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.",[],"[{'package': {'ecosystem': 'npm', 'name': 'ntfserver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10650'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-476p-r2wx-2wch'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/253'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:57:43Z', 'nvd_published_at': None}" +1.4.0,GHSA-g7w9-vm5m-48q8,2021-01-08T18:48:48Z,2019-02-18T23:42:09Z,,['CVE-2016-10683'],Downloads Resources over HTTP in arcanist,"Affected versions of `arcanist` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `arcanist`. + + +## Recommendation + +No patch is currently available for this vulnerability. + +The best mitigation is currently to avoid using this package, using a different package if available. + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.",[],"[{'package': {'ecosystem': 'npm', 'name': 'arcanist'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10683'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-g7w9-vm5m-48q8'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/286'}]","{'cwe_ids': ['CWE-311'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:36:22Z', 'nvd_published_at': None}" +1.4.0,GHSA-m8pw-h8qj-rgj9,2023-09-08T22:26:39Z,2019-02-18T23:44:24Z,,['CVE-2016-10673'],ipip-coffee downloads Resources over HTTP,"Affected versions of `ipip-coffee` insecurely download resources over HTTP. + +In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. This could impact the integrity and availability of the data being used to make geolocation decisions by an application. + + +## Recommendation + +No patch is currently available for this vulnerability. + +The best mitigation is currently to avoid using this package, using a different package if available. + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'ipip-coffee'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10673'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-m8pw-h8qj-rgj9'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/279'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:45:31Z', 'nvd_published_at': None}" +1.4.0,GHSA-qrmc-fj45-qfc2,2020-08-31T18:43:30Z,2019-02-07T18:03:28Z,,['CVE-2018-16492'],Prototype Pollution in extend,"Versions of `extend` prior to 3.0.2 (for 3.x) and 2.0.2 (for 2.x) are vulnerable to Prototype Pollution. The `extend()` function allows attackers to modify the prototype of Object causing the addition or modification of an existing property that will exist on all objects. + + + + +## Recommendation + +If you're using `extend` 3.x upgrade to 3.0.2 or later. +If you're using `extend` 2.x upgrade to 2.0.2 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'extend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'extend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16492'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/381185'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qrmc-fj45-qfc2'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/996'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:44Z', 'nvd_published_at': None}" +1.4.0,GHSA-q52j-4q2q-hcj6,2021-09-16T19:31:28Z,2019-02-18T23:39:39Z,,['CVE-2016-10532'],Authentication Bypass in console-io,"Affected versions of the `console-io` package do not configure the underlying websocket library to require authentication, resulting in an authentication bypass vulnerability. As `console-io` allows terminal access on the server via a web page, an authentication bypass is essentially remote code execution. + + + +## Recommendation + +Update to version 2.3.0 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'console-io'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10532'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q52j-4q2q-hcj6'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/90'}]","{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:51:03Z', 'nvd_published_at': None}" +1.4.0,GHSA-w364-8vfv-gvf5,2021-01-08T01:57:02Z,2019-02-18T23:44:52Z,,['CVE-2016-10661'],Downloads Resources over HTTP in phantomjs-cheniu,"Affected versions of `phantomjs-cheniu` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `phantomjs-cheniu`. + + +## Recommendation + +No patch is currently available for this vulnerability. + +As this package is just a fork of Medium's [`phantomjs-prebuilt`](https://github.com/Medium/phantomjs) package, the best mitigation is currently to install the `Medium` version of [`phantomjs-prebuilt`](https://github.com/Medium/phantomjs). This can be done via the following command: +``` +npm i phantomjs-prebuilt +```",[],"[{'package': {'ecosystem': 'npm', 'name': 'phantomjs-cheniu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10661'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-w364-8vfv-gvf5'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/262'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:59:17Z', 'nvd_published_at': None}" +1.4.0,GHSA-cgpp-wm2h-6hqx,2020-08-31T18:11:18Z,2019-02-18T23:54:28Z,,['CVE-2016-10551'],SQL Injection in waterline-sequel,"Affected versions of `waterline-sequel` are vulnerable to SQL injection in cases where user input is passed into the `like`, `contains`, `startsWith`, or `endsWith` methods. + + + +## Recommendation + +Upgrade to at least version 0.5.1",[],"[{'package': {'ecosystem': 'npm', 'name': 'waterline-sequel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10551'}, {'type': 'WEB', 'url': 'https://github.com/balderdashy/waterline/issues/1219#issuecomment-157294530'}, {'type': 'WEB', 'url': 'https://github.com/balderdashy/waterline-sequel/pull/66'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cgpp-wm2h-6hqx'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/115'}]","{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:31:36Z', 'nvd_published_at': None}" +1.4.0,GHSA-mm7h-323r-9p4g,2020-08-31T18:14:15Z,2019-02-18T23:50:33Z,,['CVE-2016-10596'],Downloads Resources over HTTP in imageoptim,"imageoptim is a Node.js wrapper for some images compression algorithms. + +imageoptim downloads zipped resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested tarball with an attacker controlled tarball if the attacker is on the network or positioned in between the user and the remote server. + + +## Recommendation + +No fix is currently available for this vulnerability. + +It is our recommendation to not install or use this module at this time.",[],"[{'package': {'ecosystem': 'npm', 'name': 'imageoptim'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.5.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10596'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mm7h-323r-9p4g'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/194'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:38Z', 'nvd_published_at': None}" +1.4.0,GHSA-6p48-xfj3-jw67,2021-01-08T19:21:01Z,2019-02-18T23:56:54Z,,['CVE-2016-10621'],Downloads Resources over HTTP in fibjs,"Affected versions of `fibjs` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `fibjs`. + + +## Recommendation + +No patch is currently available for this vulnerability. + +The best mitigation is currently to avoid using this package, using a different package if available. + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.",[],"[{'package': {'ecosystem': 'npm', 'name': 'fibjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10621'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6p48-xfj3-jw67'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/217'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:19:54Z', 'nvd_published_at': None}" +1.4.0,GHSA-3w76-x94r-pw44,2021-01-08T20:11:24Z,2019-02-18T23:42:16Z,,['CVE-2016-10676'],Downloads Resources over HTTP in rs-brightcove,"Affected versions of `rs-brightcove` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `rs-brightcove`. + + +## Recommendation + +No patch is currently available for this vulnerability. + +The best mitigation is currently to avoid using this package, using a different package if available. + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.",[],"[{'package': {'ecosystem': 'npm', 'name': 'rs-brightcove'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10676'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3w76-x94r-pw44'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/273'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:49:34Z', 'nvd_published_at': None}" +1.4.0,GHSA-fvxv-9xxr-h7wj,2023-08-30T23:25:08Z,2019-02-07T18:02:21Z,,['CVE-2018-11760'],Pyspark User Impersonation Vulnerability,"When using PySpark , it's possible for a different local user to connect to the Spark application and impersonate the user running the Spark application. This affects versions 1.x, 2.0.x, 2.1.x, 2.2.0 to 2.2.2, and 2.3.0 to 2.3.1.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'pyspark'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'pyspark'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.2'}, {'fixed': '2.2.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11760'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fvxv-9xxr-h7wj'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/spark/'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/pyspark/PYSEC-2019-169.yaml'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6d015e56b3a3da968f86e0b6acc69f17ecc16b499389e12d8255bf6e@%3Ccommits.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a86ee93d07b6f61b82b61a28049aed311f5cc9420d26cc95f1a9de7b@%3Cuser.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227091119/http://www.securityfocus.com/bid/106786'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200925111106/https://issues.apache.org/jira/browse/SPARK-26802'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:35:31Z', 'nvd_published_at': '2019-02-04T17:29:00Z'}" +1.4.0,GHSA-vvwp-3f54-xc39,2021-01-08T01:57:11Z,2019-02-18T23:57:05Z,,['CVE-2016-10635'],Downloads Resources over HTTP in broccoli-closure,"Affected versions of `broccoli-closure` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `broccoli-closure`. + + +## Recommendation + +Update to version 1.3.1 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'broccoli-closure'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10635'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vvwp-3f54-xc39'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/242'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:29Z', 'nvd_published_at': None}" +1.4.0,GHSA-4q79-fch7-g78q,2021-01-08T19:54:30Z,2019-02-18T23:48:11Z,,['CVE-2016-10606'],Downloads Resources over HTTP in grunt-webdriver-qunit,"Affected versions of `grunt-webdriver-qunit` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `grunt-webdriver-qunit`. + + +## Recommendation + +No patch is currently available for this vulnerability, and the package author has marked the package as deprecated. + +The best mitigation is currently to avoid using this package, using a different package if available. + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.",[],"[{'package': {'ecosystem': 'npm', 'name': 'grunt-webdriver-qunit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10606'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4q79-fch7-g78q'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/207'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:49Z', 'nvd_published_at': None}" +1.4.0,GHSA-8p52-7cxv-6c95,2021-01-08T19:08:24Z,2019-02-18T23:56:47Z,,['CVE-2016-10615'],Downloads Resources over HTTP in curses,"Affected versions of `curses` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `curses`. + + +## Recommendation + +No patch is currently available for this vulnerability, and the package has not been updated since 2013. + +The best mitigation is currently to avoid using this package, using a different package if available. + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.",[],"[{'package': {'ecosystem': 'npm', 'name': 'curses'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10615'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8p52-7cxv-6c95'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/215'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:04Z', 'nvd_published_at': None}" +1.4.0,GHSA-g95j-p8f6-pwh4,2023-09-13T19:39:29Z,2019-02-18T23:56:58Z,,['CVE-2016-10625'],headless-browser-lite downloads Resources over HTTP,"Affected versions of `headless-browser-lite` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `headless-browser-lite`. + + +## Recommendation + +Update to version 2015.4.18-a or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'headless-browser-lite'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2015.4.18-a'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2015.4.3-10'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10625'}, {'type': 'WEB', 'url': 'https://github.com/kaizhu256/node-phantomjs-lite/commit/96f766e5674e8462b5f5bbd4494390988f0a3916'}, {'type': 'WEB', 'url': 'https://github.com/kaizhu256/node-phantomjs-lite/commit/f6e2a9489446a1dabe175aa8c14a1c55ca824520'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-g95j-p8f6-pwh4'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/230'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:36:41Z', 'nvd_published_at': None}" +1.4.0,GHSA-5m9c-634g-47vq,2022-08-03T21:20:09Z,2019-02-18T23:35:01Z,,['CVE-2016-10581'],steroids downloads resources over HTTP,"Affected versions of `steroids` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `steroids`. + + +## Recommendation + +This vulnerability was discovered and reported in 2016, yet has not seen a patch issued as of 03/2018. As of 08/2022, [the package is marked as deprecated](https://www.npmjs.com/package/steroids) and the GitHub repository is no longer publicly available. + +The best path forward for mitigating this issue is to attempt to use an alternative module that is actively maintained and which provides similar functionality, such as the native PhoneGap API.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'steroids'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.1.27'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10581'}, {'type': 'PACKAGE', 'url': 'https://github.com/AppGyver/steroids'}, {'type': 'WEB', 'url': 'https://github.com/AppGyver/steroids/blob/master/package.json#L101'}, {'type': 'WEB', 'url': 'https://github.com/AppGyver/steroids/blob/master/package.json#L103-L104'}, {'type': 'WEB', 'url': 'https://github.com/AppGyver/steroids/blob/master/package.json#L74'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/168'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:16:36Z', 'nvd_published_at': None}" +1.4.0,GHSA-p2hm-8725-c8x8,2021-01-08T18:24:35Z,2019-02-18T23:50:58Z,,['CVE-2016-10590'],Downloads Resources over HTTP in cue-sdk-node,"Affected versions of `cue-sdk-node` insecurely download an executable over an unencrypted HTTP connection. +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `cue-sdk-node`. + + +## Recommendation + +No patch is currently available for this vulnerability. + +The best mitigation is currently to avoid using this package, using a different package if available. + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.",[],"[{'package': {'ecosystem': 'npm', 'name': 'cue-sdk-node'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10590'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-p2hm-8725-c8x8'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/190'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:46Z', 'nvd_published_at': None}" +1.4.0,GHSA-qjvf-rmwg-64fr,2021-01-08T01:58:29Z,2019-02-18T23:47:20Z,,['CVE-2016-10630'],Downloads Resources over HTTP in install-g-test,"Affected versions of `install-g-test` insecurely download resources over HTTP. + +In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution. + + +## Recommendation + +No patch is currently available for this vulnerability. + +The best mitigation is currently to avoid using this package, using a different package if available. + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.",[],"[{'package': {'ecosystem': 'npm', 'name': 'install-g-test'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.12'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10630'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qjvf-rmwg-64fr'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/228'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:14Z', 'nvd_published_at': None}" +1.4.0,GHSA-5q75-cxcq-wr26,2022-09-14T22:43:55Z,2019-02-12T17:26:07Z,,['CVE-2018-20242'],Cross-site Scripting in jspwiki-war,"A carefully crafted URL could trigger an XSS vulnerability on Apache JSPWiki, from versions up to 2.10.5, which could lead to session hijacking.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.jspwiki:jspwiki-war'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.0.M1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.10.5'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20242'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5q75-cxcq-wr26'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/8ee4644432c0a433c5c514a57d940cf6dcb0a0094acd97b36290f0b4@%3Cuser.jspwiki.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/aac253cfc33c0429b528e2fcbe82d3a42d742083c528f58d192dfd16@%3Ccommits.jspwiki.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/e42d6e93384d4a33e939989cd00ea2a06ccf1e7bb1e6bdd3bf5187c1@%3Ccommits.jspwiki.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106804'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:17:01Z', 'nvd_published_at': None}" +1.4.0,GHSA-856x-cp3q-47vg,2020-08-31T18:10:42Z,2019-02-18T23:58:13Z,,['CVE-2016-10530'],Insecure Default Configuration in airbrake,"Affected versions of `airbrake` default to sending environment variables over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible for them to capture and read these environment variables, which may result in leaking sensitive information. + + +## Recommendation + +Update to version 0.4.0 or later, or upgrade from the now-deprecated `airbrake` module to its replacement, [`airbrake-js`](https://www.npmjs.com/package/airbrake-js).",[],"[{'package': {'ecosystem': 'npm', 'name': 'airbrake'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10530'}, {'type': 'WEB', 'url': 'https://github.com/airbrake/node-airbrake/issues/70'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-856x-cp3q-47vg'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/96'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:24:24Z', 'nvd_published_at': None}" +1.4.0,GHSA-rhvc-x32h-5526,2020-08-31T18:10:30Z,2019-02-18T23:39:32Z,,['CVE-2016-10529'],No CSRF Validation in droppy,"Affected versions of `droppy` are vulnerable to cross-site socket forgery. The package does not perform verification for cross-domain websocket requests, and as a result, an attacker can create a web page that opens up a websocket connection on behalf of the user visiting the page. The attacker can then perform any action that the target user could, including adding a new admin account under their control, or deleting others. + + +## Recommendation + +Update to version 3.5.0 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'droppy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10529'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rhvc-x32h-5526'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/91'}]","{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:03Z', 'nvd_published_at': None}" +1.4.0,GHSA-9gqh-q4cx-f2h9,2023-09-07T20:38:26Z,2019-02-18T23:50:41Z,,['CVE-2016-10594'],ipip downloads Resources over HTTP,"Affected versions of `ipip` insecurely downloads resources over HTTP. + +In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution. + + +## Recommendation + +No patch is currently available for this vulnerability, and the README states that the package is deprecated. + +The best mitigation is currently to avoid using this package, using a different package if available. + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'ipip'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10594'}, {'type': 'PACKAGE', 'url': 'https://github.com/ChiChou/node-ipip'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/184'}]","{'cwe_ids': ['CWE-269', 'CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:40Z', 'nvd_published_at': None}" +1.4.0,GHSA-ff29-f57w-2mm3,2021-01-08T18:53:25Z,2019-02-18T23:54:03Z,,['CVE-2016-10568'],Downloads Resources over HTTP in geoip-lite-country,"Affected versions of `geoip-lite-country` insecurely downloads resources over HTTP. + +In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution. + + +## Recommendation + +Update to version 1.1.4 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'geoip-lite-country'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10568'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-ff29-f57w-2mm3'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/183'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:23Z', 'nvd_published_at': None}" +1.4.0,GHSA-6fvw-7vch-x489,2021-01-08T19:44:43Z,2019-02-18T23:44:36Z,,['CVE-2016-10667'],Downloads Resources over HTTP in selenium-portal,"Affected versions of `selenium-portal` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `selenium-portal`. + + +## Recommendation + +No patch is currently available for this vulnerability, and the package has not seen an update since 2014. + +The best mitigation is currently to avoid using this package, using a different package if available. + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.",[],"[{'package': {'ecosystem': 'npm', 'name': 'selenium-portal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.1-2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10667'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6fvw-7vch-x489'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/260'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:19:08Z', 'nvd_published_at': None}" +1.4.0,GHSA-5p26-hw7f-3cpr,2023-09-12T20:39:48Z,2019-02-07T18:14:44Z,,['CVE-2018-16481'],Cross-Site Scripting in html-pages,"All versions of `html-pages` are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize folder names, allowing attackers to execute arbitrary JavaScript in the victim's browser through folders with names containing malicious code. + + +## Recommendation + +No fix is currently available. Consider using an alternative package until a fix is made available.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'html-pages'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16481'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/330356'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1001'}]","{'cwe_ids': ['CWE-64', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:16:48Z', 'nvd_published_at': None}" +1.4.0,GHSA-g84j-95x2-7g67,2021-01-08T18:48:34Z,2019-02-18T23:44:50Z,,['CVE-2016-10662'],Downloads Resources over HTTP in tomita,"Affected versions of `tomita` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `tomita`. + + +## Recommendation + +No patch is currently available for this vulnerability. + +The best mitigation is currently to avoid using this package, using a different package if available. + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.",[],"[{'package': {'ecosystem': 'npm', 'name': 'tomita'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10662'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-g84j-95x2-7g67'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/267'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:36:25Z', 'nvd_published_at': None}" +1.4.0,GHSA-92qm-hc53-jjrj,2023-09-07T20:05:24Z,2019-02-18T23:34:17Z,,['CVE-2016-10593'],ibapi downloads Resources over HTTP,"Affected versions of `ibapi` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `ibapi`. + + +## Recommendation + +No patch is currently available for this vulnerability. + +The best mitigation is currently to avoid using this package, using a different package if available. + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'ibapi'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.6.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10593'}, {'type': 'WEB', 'url': 'https://gitlord.com/commitdiff/~dchem%2Fnode-ibapi-addon.git/c00dd7c98cca0423052148337e523eeb7776da68'}, {'type': 'PACKAGE', 'url': 'https://gitlord.com/r/~dchem/node-ibapi-addon.git'}, {'type': 'WEB', 'url': 'https://gitlord.com/summary/~dchem%2Fnode-ibapi-addon.git'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/182'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/ibapi/v/2.5.6'}]","{'cwe_ids': ['CWE-269', 'CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:06Z', 'nvd_published_at': None}" +1.4.0,GHSA-65q2-x652-xx84,2023-09-07T20:08:09Z,2019-02-18T23:50:04Z,,['CVE-2016-10605'],dalek-browser-ie downloads Resources over HTTP,"Affected versions of `dalek-browser-ie` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `dalek-browser-ie`. + + +## Recommendation + +No patch is currently available for this vulnerability, and the package author has marked the package as deprecated. + +The best mitigation is currently to avoid using this package, using a different package if available. + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'dalek-browser-ie'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10605'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-65q2-x652-xx84'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/209'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:18:08Z', 'nvd_published_at': None}" +1.4.0,GHSA-6q8q-rvf4-m4pg,2023-09-06T20:03:16Z,2019-02-18T23:50:14Z,,['CVE-2016-10604'],dalek-browser-chrome Downloads Resources over HTTP,"Affected versions of `dalek-browser-chrome` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `dalek-browser-chrome`. + + +## Recommendation + +No patch is currently available for this vulnerability. + +The best mitigation is currently to avoid using this package, using a different package if available - the author of `dalek` recommends [`TestCafé`](http://devexpress.github.io/testcafe/). + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'dalek-browser-chrome'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.11'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10604'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6q8q-rvf4-m4pg'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/199'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:20:01Z', 'nvd_published_at': None}" +1.4.0,GHSA-hjgp-8ffr-hwwr,2023-09-13T23:02:01Z,2019-02-18T23:51:19Z,,['CVE-2016-10582'],closurecompiler downloads Resources over HTTP,"Affected versions of `closurecompiler` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `closurecompiler`. + + +## Recommendation + +Update to version 1.6.1 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'closurecompiler'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.6.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10582'}, {'type': 'WEB', 'url': 'https://github.com/dcodeIO/ClosureCompiler.js/commit/e59848f5975e5b15279c044daf9cff8ff192bae6'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hjgp-8ffr-hwwr'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/169'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:40:33Z', 'nvd_published_at': None}" +1.4.0,GHSA-6663-c963-2gqg,2020-08-31T18:11:28Z,2019-02-18T23:58:35Z,,['CVE-2016-10542'],DoS due to excessively large websocket message in ws,"Affected versions of `ws` do not appropriately limit the size of incoming websocket payloads, which may result in a denial of service condition when the node process crashes after receiving a large payload. + + + +## Recommendation + +Update to version 1.1.1 or later. +Alternatively, set the `maxpayload` option for the `ws` server to a value smaller than 256MB.",[],"[{'package': {'ecosystem': 'npm', 'name': 'ws'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10542'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/node/issues/7388'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6663-c963-2gqg'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/120'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:18:11Z', 'nvd_published_at': None}" +1.4.0,GHSA-4xc9-xhrj-v574,2020-08-31T18:35:33Z,2019-02-07T18:16:48Z,,['CVE-2018-16487'],Prototype Pollution in lodash,"Versions of `lodash` before 4.17.5 are vulnerable to prototype pollution. + +The vulnerable functions are 'defaultsDeep', 'merge', and 'mergeWith' which allow a malicious user to modify the prototype of `Object` via `{constructor: {prototype: {...}}}` causing the addition or modification of an existing property that will exist on all objects. + + + + +## Recommendation + +Update to version 4.17.11 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'lodash'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.17.11'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16487'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/380873'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4xc9-xhrj-v574'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190919-0004/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/782'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:59:41Z', 'nvd_published_at': None}" +1.4.0,GHSA-fwhp-2hqr-6g72,2021-01-08T18:50:49Z,2019-02-18T23:42:01Z,,['CVE-2016-10685'],Downloads Resources over HTTP in pk-app-wonderbox,"Affected versions of `pk-app-wonderbox` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `pk-app-wonderbox`. + + +## Recommendation + +No patch is currently available for this vulnerability. + +The best mitigation is currently to avoid using this package, using a different package if available. + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.",[],"[{'package': {'ecosystem': 'npm', 'name': 'pk-app-wonderbox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10685'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-fwhp-2hqr-6g72'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/289'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:35:33Z', 'nvd_published_at': None}" +1.4.0,GHSA-32f7-cmr3-vpjv,2020-06-17T15:14:32Z,2019-02-07T18:18:30Z,2020-06-17T15:14:32Z,[],Moderate severity vulnerability that affects aioxmpp,**Withdrawn:** Duplicate of GHSA-6m9g-jr8c-cqw3,[],"[{'package': {'ecosystem': 'PyPI', 'name': 'aioxmpp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/horazont/aioxmpp/security/advisories/GHSA-6m9g-jr8c-cqw3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1000007'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-32f7-cmr3-vpjv'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-17T15:14:32Z', 'nvd_published_at': None}" +1.4.0,GHSA-rwvj-jgc4-fqq5,2021-01-08T01:57:44Z,2019-02-18T23:34:05Z,,['CVE-2016-10597'],Downloads Resources over HTTP in cobalt-cli,"Affected versions of `cobalt-cli` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `cobalt-cli`. + + +## Recommendation + +No patch is currently available for this vulnerability. + +The best mitigation is currently to avoid using this package, using a different package if available. + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.",[],"[{'package': {'ecosystem': 'npm', 'name': 'cobalt-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.5.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10597'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-rwvj-jgc4-fqq5'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/197'}]","{'cwe_ids': ['CWE-269', 'CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:17Z', 'nvd_published_at': None}" +1.4.0,GHSA-wx3q-6x7x-jjw4,2023-09-14T17:58:55Z,2019-02-18T23:44:39Z,,['CVE-2016-10664'],mystem downloads Resources over HTTP,"Affected versions of `mystem` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `mystem`. + + +## Recommendation + +No patch is currently available for this vulnerability. + +The best mitigation is currently to avoid using this package, using a different package if available. + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'mystem'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10664'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wx3q-6x7x-jjw4'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/259'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:32Z', 'nvd_published_at': None}" +1.4.0,GHSA-cmj2-m9m2-6726,2021-01-08T18:57:39Z,2019-02-18T23:47:11Z,,['CVE-2016-10636'],Downloads Resources over HTTP in grunt-ccompiler,"Affected versions of `grunt-ccompiler` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `grunt-ccompiler`. + + +## Recommendation + +No patch is currently available for this vulnerability, and the repository has been deleted from the owner's github account. + +The best mitigation is currently to avoid using this package, using a different package if available. + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.",[],"[{'package': {'ecosystem': 'npm', 'name': 'grunt-ccompiler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10636'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cmj2-m9m2-6726'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/239'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:32:01Z', 'nvd_published_at': None}" +1.4.0,GHSA-gf8v-vxf9-7c66,2023-09-11T22:40:34Z,2019-02-18T23:44:26Z,,['CVE-2016-10672'],cloudpub-redis downloads Resources over HTTP,"Affected versions of `cloudpub-redis` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `cloudpub-redis`. + + +## Recommendation + +No patch is currently available for this vulnerability. + +The best mitigation is currently to avoid using this package, using a different package if available. + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'cloudpub-redis'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10672'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gf8v-vxf9-7c66'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/282'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:04Z', 'nvd_published_at': None}" +1.4.0,GHSA-432j-4fw9-2g6f,2023-09-07T22:50:22Z,2019-02-18T23:44:33Z,,['CVE-2016-10668'],libsbml downloads Resources over HTTP,"Affected versions of `libsbml` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `libsbml`. + + +## Recommendation + +No patch is currently available for this vulnerability, and the package has not seen an update since 2013. + +The best mitigation is currently to avoid using this package, using a different package if available. + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'libsbml'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10668'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-432j-4fw9-2g6f'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/272'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:57:05Z', 'nvd_published_at': None}" +1.4.0,GHSA-qmv4-jgp7-mf68,2022-08-03T21:27:52Z,2019-02-18T23:40:10Z,,['CVE-2016-10549'],Sails before 0.12.7 vulnerable to Broken CORS,"Affected versions of `sails` have an issue with the CORS configuration where the value of the origin header is reflected as the value for the `Access-Control-Allow-Origin` header. This may allow an attacker to make AJAX requests to vulnerable hosts through cross-site scripting or a malicious HTML Document, effectively bypassing the Same Origin Policy. + +## Mitigating Factors + +This is only an issue when `allRoutes` is set to `true` and `origin` is set to `*` or left commented out in the sails CORS config file. + +The problem can be compounded when the cors `credentials` setting is not provided, because at that point authenticated cross domain requests are possible. + + +## Recommendation + +Update to version 0.12.7 or later. + +As this vulnerability is primarily a user error, the patch for the vulnerability will simply cause the application to write an error message to the console when a vulnerable configuration is used in a production environment. + +Writing a proper CORS configuration is still the responsibility of the user, so it is necessary to check for the error message after installing the patch. Be sure you are not using `allRoutes: true` with `origin:'*'`, and that you uncomment `origin` and set it to a reasonable value. Ensure that if `origin` is set to `*` that you truly mean for all other websites to be able to make cross-domain requests to your API. + +Likewise, ensure `credentials` is uncommented out and set to the appropriate value. Make sure to explicitly set which origins may request resources via CORS.",[],"[{'package': {'ecosystem': 'npm', 'name': 'sails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10549'}, {'type': 'WEB', 'url': 'https://github.com/balderdashy/sails/commit/0057123a0321be6758845abbeb4290bf418ce542'}, {'type': 'PACKAGE', 'url': 'https://github.com/balderdashy/sails'}, {'type': 'WEB', 'url': 'https://github.com/balderdashy/sails/releases/tag/v0.12.7'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/148'}, {'type': 'WEB', 'url': 'http://sailsjs.org/documentation/concepts/security/cors'}, {'type': 'WEB', 'url': 'http://sailsjs.org/documentation/reference/configuration/sails-config-cors'}]","{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:24Z', 'nvd_published_at': None}" +1.4.0,GHSA-rv95-4wxj-6fqq,2023-09-05T09:29:43Z,2019-02-07T18:18:22Z,,['CVE-2017-18361'],Pylons Colander Denial of Service vulnerability,"In Pylons Colander through 1.6, the URL validator allows an attacker to potentially cause an infinite loop thereby causing a denial of service via an unclosed parenthesis.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'colander'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-18361'}, {'type': 'WEB', 'url': 'https://github.com/Pylons/colander/issues/290'}, {'type': 'WEB', 'url': 'https://github.com/Pylons/colander/pull/323'}, {'type': 'WEB', 'url': 'https://github.com/Pylons/colander/commit/98805557c10ab5ff3016ed09aa2d48c49b9df40b'}, {'type': 'PACKAGE', 'url': 'https://github.com/Pylons/colander'}]","{'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:55:55Z', 'nvd_published_at': None}" +1.4.0,GHSA-j6p2-cx3w-6jcp,2023-09-13T23:00:58Z,2019-02-18T23:39:55Z,,['CVE-2016-10537'],Cross-Site Scripting in backbone,"Affected versions of `backbone` are vulnerable to cross-site scripting when users are allowed to supply input to the `Model#Escape` function, and the output is then written to the DOM. + +The vulnerability occurs as a result of the regular expression used to encode metacharacters failing to take HTML Entities such as `<` into account. + + +## Recommendation + +Update to version 0.5.0 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'backbone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10537'}, {'type': 'WEB', 'url': 'https://github.com/jashkenas/backbone/commit/0cdc525961d3fa98e810ffae6bcc8e3838e36d93'}, {'type': 'WEB', 'url': 'https://backbonejs.org/#changelog'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j6p2-cx3w-6jcp'}, {'type': 'WEB', 'url': 'https://github.com/jashkenas/backbone/compare/0.3.3...0.5.0#diff-0d56d0d310de7ff18b3cef9c2f8f75dcL1008'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/108'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:17Z', 'nvd_published_at': None}" +1.4.0,GHSA-x2jc-pwfj-h9p3,2020-08-31T18:11:14Z,2019-02-18T23:54:28Z,,['CVE-2016-10554'],SQL Injection in sequelize,"Affected versions of `sequelize` use MySQL's backslash-based escape syntax when connecting to SQLite, despite the fact that SQLite uses PostgreSQL's escape syntax, which can result in a SQL Injection vulnerability. + + +## Recommendation + +Update to version 1.7.0-alpha3 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'sequelize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.7.0-alpha2'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10554'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/commit/c876192aa6ce1f67e22b26a4d175b8478615f42d'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-x2jc-pwfj-h9p3'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/113'}]","{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:45Z', 'nvd_published_at': None}" +1.4.0,GHSA-2mhh-w6q8-5hxw,2020-08-31T18:09:55Z,2019-02-18T23:56:42Z,,['CVE-2016-10518'],Remote Memory Disclosure in ws,"Versions of `ws` prior to 1.0.1 are affected by a remote memory disclosure vulnerability. + +In certain rare circumstances, applications which allow users to control the arguments of a `client.ping()` call will cause `ws` to send the contents of an allocated but non-zero-filled buffer to the server. This may disclose sensitive information that still exists in memory after previous use of the memory for other tasks. + + + +## Proof of Concept +``` +var ws = require('ws') + +var server = new ws.Server({ port: 9000 }) +var client = new ws('ws://localhost:9000') + +client.on('open', function () { + console.log('open') + client.ping(50) // this sends a non-zeroed buffer of 50 bytes + + client.on('pong', function (data) { + console.log('got pong') + console.log(data) // Data from the client. + }) +}) +``` + + +## Recommendation + +Update to version 1.0.1 or greater.",[],"[{'package': {'ecosystem': 'npm', 'name': 'ws'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10518'}, {'type': 'WEB', 'url': 'https://github.com/websockets/ws/commit/29293ed11b679e0366fa0f6bb9310b330dafd795'}, {'type': 'WEB', 'url': 'https://gist.github.com/c0nrad/e92005446c480707a74a'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2mhh-w6q8-5hxw'}, {'type': 'WEB', 'url': 'https://github.com/websockets/ws/releases/tag/1.0.1'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/67'}]","{'cwe_ids': ['CWE-201'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:34Z', 'nvd_published_at': None}" +1.4.0,GHSA-vfvf-mqq8-rwqc,2023-09-07T22:23:29Z,2019-02-18T23:58:20Z,,['CVE-2016-10531'],Sanitization bypass using HTML Entities in marked,"Affected versions of `marked` are susceptible to a cross-site scripting vulnerability in link components when `sanitize:true` is configured. + +## Proof of Concept + +This flaw exists because link URIs containing HTML entities get processed in an abnormal manner. Any HTML Entities get parsed on a best-effort basis and included in the resulting link, while if that parsing fails that character is omitted. + +For example: + +A link URI such as +``` +javascript֍ocument;alert(1) +``` +Renders a valid link that when clicked will execute `alert(1)`. + + +## Recommendation + +Update to version 0.3.6 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'marked'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10531'}, {'type': 'WEB', 'url': 'https://github.com/chjj/marked/pull/592'}, {'type': 'WEB', 'url': 'https://github.com/chjj/marked/pull/592/commits/2cff85979be8e7a026a9aca35542c470cf5da523'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vfvf-mqq8-rwqc'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/101'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:57:38Z', 'nvd_published_at': None}" +1.4.0,GHSA-j3cr-j9jx-mf4p,2021-01-08T18:37:50Z,2019-02-18T23:47:07Z,,['CVE-2016-10639'],Downloads Resources over HTTP in redis-srvr,"Affected versions of `redis-srvr` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `redis-srvr`. + + +## Recommendation + +No patch is currently available for this vulnerability, and the package has not seen an update since 2014. + +The best mitigation is currently to avoid using this package, using a different package if available. + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.",[],"[{'package': {'ecosystem': 'npm', 'name': 'redis-srvr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.8.17-beta.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10639'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j3cr-j9jx-mf4p'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/238'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:41:50Z', 'nvd_published_at': None}" +1.4.0,GHSA-69r7-cw26-px6h,2021-01-08T19:45:57Z,2019-02-18T23:42:14Z,,['CVE-2016-10677'],Downloads Resources over HTTP in google-closure-tools-latest,"Affected versions of `google-closure-tools-latest` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `google-closure-tools-latest`. + + +## Recommendation + +No patch is currently available for this vulnerability. + +The best mitigation is currently to avoid using this package, and instead install the [closure compiler](https://github.com/google/closure-compiler) manually. + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.",[],"[{'package': {'ecosystem': 'npm', 'name': 'google-closure-tools-latest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10677'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-69r7-cw26-px6h'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/274'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:18:49Z', 'nvd_published_at': None}" +1.4.0,GHSA-2mvm-66q7-m256,2021-01-08T20:07:08Z,2019-02-18T23:40:25Z,,['CVE-2016-10559'],Downloads Resources over HTTP in selenium-download,"Affected versions of `selenium-download` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `selenium-download`. + + +## Recommendation + +Update to version 2.0.7 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'selenium-download'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10559'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2mvm-66q7-m256'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/164'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:38Z', 'nvd_published_at': None}" +1.4.0,GHSA-455m-q3h9-34pf,2021-01-08T21:17:34Z,2019-02-18T23:44:29Z,,['CVE-2016-10670'],Downloads Resources over HTTP in windows-seleniumjar-mirror,"Affected versions of `windows-seleniumjar-mirror` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `windows-seleniumjar-mirror`. + + +## Recommendation + +No patch is currently available for this vulnerability. + +Currently, the best mitigation is to download the selenium jar file manually from [seleniumHQ](https://www.seleniumhq.org/download/). + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.",[],"[{'package': {'ecosystem': 'npm', 'name': 'windows-seleniumjar-mirror'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.52.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10670'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-455m-q3h9-34pf'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/281'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:57:22Z', 'nvd_published_at': None}" +1.4.0,GHSA-g3xp-v2ff-x5c3,2020-08-31T18:12:48Z,2019-02-18T23:54:18Z,,['CVE-2016-10563'],Downloads Resources over HTTP in go-ipfs-dep,"Affected versions of `go-ipfs-deps` insecurely download resources over HTTP. + +In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution. + + +## Recommendation + +Update to version 0.4.4 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'go-ipfs-dep'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10563'}, {'type': 'WEB', 'url': 'https://github.com/diasdavid/go-ipfs-dep/pull/12'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-g3xp-v2ff-x5c3'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/156'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:36:02Z', 'nvd_published_at': None}" +1.4.0,GHSA-675m-85rw-j3w4,2023-09-07T18:30:55Z,2019-02-07T18:17:12Z,,['CVE-2018-16489'],Prototype Pollution in just-extend,"Versions of `just-extend` before 4.0.0 are vulnerable to prototype pollution. Provided certain input `just-extend` can add or modify properties of the `Object` prototype. These properties will be present on all objects. + + +## Recommendation + +Update to version `4.0.0` or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'just-extend'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16489'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/430291'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-675m-85rw-j3w4'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/780'}]","{'cwe_ids': ['CWE-1321', 'CWE-400'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:18:13Z', 'nvd_published_at': None}" +1.4.0,GHSA-769c-qphh-g3wm,2021-01-08T20:58:40Z,2019-02-18T23:51:09Z,,['CVE-2016-10586'],Downloads Resources over HTTP in macaca-chromedriver,"Affected versions of `macaca-chromedriver` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `macaca-chromedriver`. + + +## Recommendation + +Update to version 1.0.29 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'macaca-chromedriver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.29'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10586'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-769c-qphh-g3wm'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/180'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:21:34Z', 'nvd_published_at': None}" +1.4.0,GHSA-xj62-87pg-vcv3,2023-09-13T22:47:33Z,2019-02-18T23:38:51Z,,['CVE-2016-10521'],Regular Expression Denial of Service in jshamcrest,"The `jshamcrest` package is affected by a regular expression denial of service vulnerability when certain types of user input are passed in to the emailAddress validator. + + +## Proof of concept + +```js +var js = require('jshamcrest') +var emailAddress = new js.JsHamcrest.Matchers.emailAddress(); + + +var genstr = function (len, chr) { + var result = """"; + for (i=0; i<=len; i++) { + result = result + chr; + } + + return result; +} + + +for (i=1;i<=10000000;i=i+1) { + console.log(""COUNT: "" + i); + var str = '66666666666666666666666666666@ffffffffffffffffffffffffffffffff.' + genstr(i, 'a') + '{' + console.log(""LENGTH: "" + str.length); + var start = process.hrtime(); + emailAddress.matches(str) + + var end = process.hrtime(start); + console.log(end); +} +``` + +### Results +It takes about 116 characters to get a 1.6 second event loop block. +``` +[ 1, 633084590 ] +COUNT: 51 +LENGTH: 116 +``` + +# Timeline +- October 25, 2015 - Vulnerability Identified +- October 25, 2015 - Maintainers notified (no response) + + +## Recommendation + +The `jshamcrest` package currently has no patched versions available. + +At this time, the best available mitigation is to use an alternative module that is actively maintained and provides similar functionality. There are [multiple modules fitting this criteria available on npm.](https://www.npmjs.com/search?q=validator).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'jshamcrest'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.7.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10521'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xj62-87pg-vcv3'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/53'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:03:34Z', 'nvd_published_at': None}" +1.4.0,GHSA-7vrq-vg6p-32fw,2021-09-16T20:44:26Z,2019-02-18T23:34:48Z,,['CVE-2016-10585'],Downloads Resources over HTTP in libxl,"Affected versions of `libxl` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `libxl`. + + +## Recommendation + +The module author recommends installing the bindings using a pinned and verified version of SDK instead of the automated download. More information is available in the modules [README](https://www.npmjs.com/package/libxl).",[],"[{'package': {'ecosystem': 'npm', 'name': 'libxl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.4.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10585'}, {'type': 'PACKAGE', 'url': 'https://github.com/DirtyHairy/node-libxl'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7vrq-vg6p-32fw'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/178'}]","{'cwe_ids': ['CWE-269', 'CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:35Z', 'nvd_published_at': None}" +1.4.0,GHSA-3627-w2qr-5fxr,2023-09-13T19:16:39Z,2019-02-18T23:52:07Z,,['CVE-2016-10576'],fuseki downloads Resources over HTTP,"Affected versions of `fuseki` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `fuseki`. + + +## Recommendation + +Update to version 1.0.1 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'fuseki'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10576'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3627-w2qr-5fxr'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/278'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:54:09Z', 'nvd_published_at': None}" +1.4.0,GHSA-3q32-j57w-q4w7,2021-08-31T21:22:06Z,2019-02-20T15:40:13Z,,['CVE-2019-8903'],Path Traversal in total.js,"Affected versions of `total.js` are vulnerable to Path Traversal. Due to insufficient input sanitization in URLs, attackers can access server files outside the `/public` folder by using relative paths. +The files served are limited to these file types: `flac`, `jpg`, `jpeg`, `png`, `gif`, `ico`, `js`, `css`, `txt`, `xml`, `woff`, `woff2`, `otf`, `ttf`, `eot`, `svg`, `zip`, `rar`, `pdf`, `docx`, `xlsx`, `doc`, `xls`, `html`, `htm`, `appcache`, `manifest`, `map`, `ogv`, `ogg`, `mp4`, `mp3`, `webp`, `webm`, `swf`, `package`, `json`, `md`, `m4v`, `jsx`, `heif`, `heic`. + + +## Recommendation + +- If you are using version 2.1.x, upgrade to 2.1.1 or later. +- If you are using version 2.2.x, upgrade to 2.2.1 or later. +- If you are using version 2.3.x, upgrade to 2.3.1 or later. +- If you are using version 2.4.x, upgrade to 2.4.1 or later. +- If you are using version 2.5.x, upgrade to 2.5.1 or later. +- If you are using version 2.6.x, upgrade to 2.6.3 or later. +- If you are using version 2.7.x, upgrade to 2.7.1 or later. +- If you are using version 2.8.x, upgrade to 2.8.1 or later. +- If you are using version 2.9.x, upgrade to 2.9.5 or later. +- If you are using version 3.0.x, upgrade to 3.0.1 or later. +- If you are using version 3.1.x, upgrade to 3.1.1 or later. +- If you are using version 3.2.x, upgrade to 3.2.4 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'total.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8903'}, {'type': 'WEB', 'url': 'https://github.com/totaljs/framework/commit/c37cafbf3e379a98db71c1125533d1e8d5b5aef7'}, {'type': 'WEB', 'url': 'https://github.com/totaljs/framework/commit/de16238d13848149f5d1dae51f54e397a525932b'}, {'type': 'WEB', 'url': 'https://blog.certimetergroup.com/it/articolo/security/total.js-directory-traversal-cve-2019-8903'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3q32-j57w-q4w7'}, {'type': 'PACKAGE', 'url': 'https://github.com/totaljs/framework'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1026'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:55:54Z', 'nvd_published_at': None}" +1.4.0,GHSA-899g-6q6w-7v94,2023-09-12T20:43:11Z,2019-02-18T23:58:00Z,,['CVE-2018-16485'],m-server Vulnerable to Directory Traversal,Path Traversal vulnerability in module m-server <1.4.1 allows malicious user to access unauthorized content of any file in the directory tree e.g. /etc/passwd by appending slashes to the URL request.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'm-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16485'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/319795'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-899g-6q6w-7v94'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:25:05Z', 'nvd_published_at': None}" +1.4.0,GHSA-8r98-rqg5-4vm3,2023-09-08T21:30:12Z,2019-02-18T23:56:50Z,,['CVE-2016-10618'],node-browser downloads Resources over HTTP,"Affected versions of `node-browser` insecurely downloads resources over HTTP. + +In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution. + + +## Recommendation + +No patch is currently available for this vulnerability. + +The best mitigation is currently to avoid using this package, using a different package if available. + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'node-browser'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10618'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8r98-rqg5-4vm3'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/214'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:36Z', 'nvd_published_at': None}" +1.4.0,GHSA-4x5j-v9v9-w8gw,2021-01-08T19:52:32Z,2019-02-18T23:47:40Z,,['CVE-2016-10614'],Downloads Resources over HTTP in httpsync,"Affected versions of `httpsync` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `httpsync`. + + +## Recommendation + +No patch is currently available for this vulnerability. + +The best mitigation is currently to avoid using this package, using a different package if available. + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.",[],"[{'package': {'ecosystem': 'npm', 'name': 'httpsync'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10614'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4x5j-v9v9-w8gw'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/210'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:59:38Z', 'nvd_published_at': None}" +1.4.0,GHSA-jppx-hw2f-8gx4,2023-09-07T18:26:30Z,2019-02-18T23:33:30Z,,['CVE-2016-10609'],chromedriver126 downloads Resources over HTTP,"Affected versions of `chromedriver126` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `chromedriver126`. + + +## Recommendation + +No patch is currently available for this vulnerability. + +The best mitigation is currently to avoid using this package, using a different package if available. + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'chromedriver126'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.15'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10609'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jppx-hw2f-8gx4'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/203'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:44:03Z', 'nvd_published_at': None}" +1.4.0,GHSA-x268-6jhm-2mx8,2023-09-07T22:29:08Z,2019-02-18T23:42:22Z,,['CVE-2016-10675'],libsbmlsim downloads Resources over HTTP,"Affected versions of `libsbmlsim` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `libsbmlsim`. + + +## Recommendation + +No patch is currently available for this vulnerability. + +The best mitigation is currently to avoid using this package, using a different package if available. + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'libsbmlsim'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10675'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-x268-6jhm-2mx8'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/275'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:35Z', 'nvd_published_at': None}" +1.4.0,GHSA-c4qp-h3m6-785f,2023-09-07T18:20:20Z,2019-02-18T23:51:59Z,,['CVE-2016-10577'],ibm_db downloads Resources over HTTP,"Affected versions of `ibm_db` insecurely download resources over HTTP. + +In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution. + + +## Recommendation + +Update to version 1.0.2 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'ibm_db'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10577'}, {'type': 'WEB', 'url': 'https://github.com/ibmdb/node-ibm_db/commit/d7e2d4b4cbeb6f067df8bba7d0b2ac5d40fcfc19#diff-315091eb1586966006e05ebc21cd2a94'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c4qp-h3m6-785f'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/163'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:14Z', 'nvd_published_at': None}" +1.4.0,GHSA-wr2c-ppj9-f2fv,2021-01-08T01:15:00Z,2019-02-18T23:33:54Z,,['CVE-2016-10601'],Downloads Resources over HTTP in webdrvr,"Affected versions of `webdrvr` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `webdrvr`. + + +## Recommendation + +No patch is currently available for this vulnerability. + +The best mitigation is currently to avoid using this package, using a different package if available. + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.",[],"[{'package': {'ecosystem': 'npm', 'name': 'webdrvr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.43.0-1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10601'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wr2c-ppj9-f2fv'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/193'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:05Z', 'nvd_published_at': None}" +1.4.0,GHSA-8gf4-pcj6-54rp,2021-06-11T12:35:08Z,2019-02-18T23:47:53Z,,['CVE-2016-10611'],Downloads Resources over HTTP in strider-sauce,"Affected versions of `strider-sauce` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `strider-sauce`. + + + +## Recommendation + +While the package author has created a patch for this vulnerability, they have not yet published it to npm or bumped the version number. + +In order to resolve the vulnerability, you will need to install the module manually from github: +``` +npm install github:Strider-CD/strider-sauce#5ff6d65 +``` + +As this vulnerability does not have a version bump included with the patch, it is possible that you have received a report for a vulnerable package, yet have installed the patched version and are no longer vulnerable. If that is the case, this advisory can be disregarded.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'strider-sauce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.6.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10611'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8gf4-pcj6-54rp'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/202'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:25:35Z', 'nvd_published_at': None}" +1.4.0,GHSA-pp4v-55vr-9gxh,2023-09-12T18:42:41Z,2019-02-18T23:39:13Z,,['CVE-2016-10527'],Regular Expression Denial of Service in riot-compiler,"Affected versions of `riot-compiler` are susceptible to a regular expression denial of service vulnerability. + + +## Recommendation + +Update to version 2.3.22 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'riot-compiler'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.22'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10527'}, {'type': 'WEB', 'url': 'https://github.com/riot/compiler/issues/46'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pp4v-55vr-9gxh'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/86'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:41Z', 'nvd_published_at': None}" +1.4.0,GHSA-hw4r-xr38-hm8j,2021-01-08T18:39:28Z,2019-02-18T23:47:59Z,,['CVE-2016-10610'],Downloads Resources over HTTP in unicode-json,"Affected versions of `unicode-json` insecurely downloads resources over HTTP. + +In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution. + + +## Recommendation + +Install version 2.0.0 or greater.",[],"[{'package': {'ecosystem': 'npm', 'name': 'unicode-json'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10610'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hw4r-xr38-hm8j'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/206'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:41:11Z', 'nvd_published_at': None}" +1.4.0,GHSA-h4mc-r4f4-hcf4,2022-08-03T21:15:02Z,2019-02-18T23:34:37Z,,['CVE-2016-10589'],selenium-binaries downloads resources over HTTP,"Versions of `selenium-binaries` prior to 0.15.0 insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `selenium-binaries`. + + +## Recommendation + +A fix for this vulnerability is available on the `master` branch of the repository as part of version 0.15.0. + +Another mitigation currently available is to use an alternate package, such as [selenium-webdriver](https://www.npmjs.com/package/selenium-webdriver), the official selenium bindings for node.js. ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'selenium-binaries'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10589'}, {'type': 'WEB', 'url': 'https://github.com/spunjs/selenium-binaries/pull/33'}, {'type': 'WEB', 'url': 'https://github.com/spunjs/selenium-binaries/commit/be37e82a3c43a4f1679d66cf9467085ec9994c47'}, {'type': 'PACKAGE', 'url': 'https://github.com/spunjs/selenium-binaries'}, {'type': 'WEB', 'url': 'https://www.huntr.dev/bounties/1-npm-selenium-binaries/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/175'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:38:48Z', 'nvd_published_at': None}" +1.4.0,GHSA-2r5h-gh4x-8hp9,2020-08-31T18:11:21Z,2019-02-18T23:40:14Z,,['CVE-2016-10552'],Resources Downloaded over Insecure Protocol in igniteui,"Affected versions of `igniteui` download Javascript and CSS resources over an unencrypted HTTP connection. An attacker with a privileged network position can intercept and view or modify any content sent or recieved over an unencrypted HTTP connection. + + + + +## Recommendation + +The `igniteui` package has been deprecated by the package author and now exists under [`ignite-ui`](https://preview.npmjs.com/package/ignite-ui), which should be used in place of this package.",[],"[{'package': {'ecosystem': 'npm', 'name': 'igniteui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10552'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2r5h-gh4x-8hp9'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/116'}]","{'cwe_ids': ['CWE-311'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:53Z', 'nvd_published_at': None}" +1.4.0,GHSA-r36x-p5pv-9mfx,2023-09-12T18:32:15Z,2019-02-18T23:45:25Z,,['CVE-2016-10652'],prebuild-lwip downloads Resources over HTTP,"Affected versions of `prebuild-lwip` insecurely download resources over HTTP. + +In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution. + + +## Recommendation + +No patch is currently available for this vulnerability. + +The best mitigation is currently to avoid using this package, using a different package if available. + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'prebuild-lwip'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10652'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-r36x-p5pv-9mfx'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/248'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:53:29Z', 'nvd_published_at': None}" +1.4.0,GHSA-9v3m-8fp8-mj99,2023-08-25T23:40:57Z,2019-02-22T20:54:47Z,,['CVE-2019-8331'],Bootstrap Vulnerable to Cross-Site Scripting,"Versions of `bootstrap` prior to 3.4.1 for 3.x and 4.3.1 for 4.x are vulnerable to Cross-Site Scripting (XSS). The `data-template` attribute of the tooltip and popover plugins lacks input sanitization and may allow attacker to execute arbitrary JavaScript. + + +## Recommendation + +For `bootstrap` 4.x upgrade to 4.3.1 or later. +For `bootstrap` 3.x upgrade to 3.4.1 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'bootstrap'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'bootstrap-sass'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.1'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Bootstrap.Less'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.1'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'bootstrap'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.1'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'bootstrap'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.1'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'bootstrap.sass'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'bootstrap'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'bootstrap'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'bootstrap-sass'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.4.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8331'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/pull/28236'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1456'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3023'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3024'}, {'type': 'WEB', 'url': 'https://blog.getbootstrap.com/2019/02/13/bootstrap-4-3-1-and-3-4-1/'}, {'type': 'WEB', 'url': 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8331'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/bootstrap/CVE-2019-8331.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/twbs/bootstrap'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/releases/tag/v3.4.1'}, {'type': 'WEB', 'url': 'https://github.com/twbs/bootstrap/releases/tag/v4.3.1'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/10f0f3aefd51444d1198c65f44ffdf2d78ca3359423dbc1c168c9731@%3Cdev.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/17ff53f7999e74fbe3cc0ceb4e1c3b00b180b7c5afec8e978837bc49@%3Cuser.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/52bafac05ad174000ea465fe275fd3cc7bd5c25535a7631c0bc9bfb2@%3Cuser.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/52e0e6b5df827ee7f1e68f7cc3babe61af3b2160f5d74a85469b7b0e@%3Cdev.superset.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/54df3aeb4239b64b50b356f0ca6f986e3c4ca5b84c515dce077c7854@%3Cuser.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3dc0cac8d856bca02bd6997355d7ff83027dcfc82f8646a29b89b714@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd0e44e8ef71eeaaa3cf3d1b8b41eb25894372e2995ec908ce7624d26@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/May/18'}, {'type': 'WEB', 'url': 'https://support.f5.com/csp/article/K24383845'}, {'type': 'WEB', 'url': 'https://support.f5.com/csp/article/K24383845?utm_source=f5support&utm_medium=RSS'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227083900/http://www.securityfocus.com/bid/107375'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2021-14'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/156743/OctoberCMS-Insecure-Dependencies.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2019/May/10'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2019/May/11'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2019/May/13'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:39Z', 'nvd_published_at': '2019-02-20T16:29:00Z'}" +1.4.0,GHSA-jfgq-g48x-jq83,2021-01-08T18:35:18Z,2019-02-18T23:54:20Z,,['CVE-2016-10562'],Downloads Resources over HTTP in iedriver,"Affected versions of `iedriver` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `iedriver`. + + +## Recommendation + +Update to iedriver version 3.0.0 or greater.",[],"[{'package': {'ecosystem': 'npm', 'name': 'iedriver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10562'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jfgq-g48x-jq83'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/174'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:16Z', 'nvd_published_at': None}" +1.4.0,GHSA-hc94-2wfr-4pwf,2023-09-12T18:47:00Z,2019-02-18T23:40:19Z,,['CVE-2016-10557'],appium-chromedriver downloads Resources over HTTP,"Affected versions of `appium-chromedriver` insecurely download resources over HTTP. + +In scenarios where an attacker has a privileged network position, they can modify or read items send over HTTP at will. In this case, that includes the chromedriver binary, which may result in remote code execution if overwritten with a malicious binary. + + +## Recommendation + +Update to version 2.9.4 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'appium-chromedriver'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10557'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hc94-2wfr-4pwf'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/162'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:54Z', 'nvd_published_at': None}" +1.4.0,GHSA-vcph-57hv-89c4,2021-01-08T01:57:33Z,2019-02-18T23:42:11Z,,['CVE-2016-10678'],Downloads Resources over HTTP in serc.js,"Affected versions of `serc.js` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `serc.js`. + + +## Recommendation + +No patch is currently available for this vulnerability. + +The best mitigation is currently to avoid using this package, using a different package if available. + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.",[],"[{'package': {'ecosystem': 'npm', 'name': 'serc.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10678'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vcph-57hv-89c4'}, {'type': 'WEB', 'url': 'https://github.com/nowk/serc.js/blob/master/scripts/install.js#L5'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/277'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:57:22Z', 'nvd_published_at': None}" +1.4.0,GHSA-4v2c-g2xc-47fv,2021-01-08T19:53:43Z,2019-02-18T23:54:38Z,,['CVE-2016-10682'],Downloads Resources over HTTP in massif,"Affected versions of `massif` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `massif`. + + +## Recommendation + +No patch is currently available for this vulnerability, and the package has not seen an update since 2013. + +The best mitigation is currently to avoid using this package, using a different package if available. + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.",[],"[{'package': {'ecosystem': 'npm', 'name': 'massif'}, 'versions': ['0.0.1-1']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10682'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4v2c-g2xc-47fv'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/290'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:59:10Z', 'nvd_published_at': None}" +1.4.0,GHSA-722q-3g9x-vp8q,2021-01-08T19:18:41Z,2019-02-18T23:54:41Z,,['CVE-2016-10666'],Downloads Resources over HTTP in tomita-parser,"Affected versions of `tomita-parser` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `tomita-parser`. + + +## Recommendation + +No patch is currently available for this vulnerability, and the package has not seen an update since 2015. + +The best mitigation is currently to avoid using this package, using a different package if available. + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.",[],"[{'package': {'ecosystem': 'npm', 'name': 'tomita-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10666'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-722q-3g9x-vp8q'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/261'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:20:50Z', 'nvd_published_at': None}" +1.4.0,GHSA-mgr2-3mpv-43gc,2021-09-16T20:55:30Z,2019-02-18T23:47:37Z,,['CVE-2016-10616'],Downloads Resources over HTTP in openframe-image,"Affected versions of `openframe-image` insecurely downloads resources over HTTP. + +In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution. + + +## Recommendation + +No patch is currently available for this vulnerability. + +The best mitigation is currently to avoid using this package, using a different package if available. + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.",[],"[{'package': {'ecosystem': 'npm', 'name': 'openframe-image'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10616'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenframeProject/Openframe-Image'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mgr2-3mpv-43gc'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/218'}]","{'cwe_ids': ['CWE-269', 'CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:06Z', 'nvd_published_at': None}" +1.4.0,GHSA-w9mf-24h3-9wxf,2021-01-08T01:56:52Z,2019-02-18T23:41:58Z,,['CVE-2016-10689'],Downloads Resources over HTTP in windows-iedriver,"Affected versions of `windows-iedriver` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `windows-iedriver`. + + +## Recommendation + +No patch is currently available for this vulnerability. + +The best mitigation is currently to avoid using this package, using a different package if available. + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.",[],"[{'package': {'ecosystem': 'npm', 'name': 'windows-iedriver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.48.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10689'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-w9mf-24h3-9wxf'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/293'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:00Z', 'nvd_published_at': None}" +1.4.0,GHSA-gc6c-5v9w-xmhw,2021-01-08T18:48:13Z,2019-02-18T23:51:27Z,,['CVE-2016-10580'],Downloads Resources over HTTP in nodewebkit,"Affected versions of `nodewebkit` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `nodewebkit`. + + +## Recommendation + +No patch is currently available, and the package author has deprecated this package. + +The best path forward in mitigating this vulnerability is to use the [official installer](https://www.npmjs.com/nw) instead of this package, as per the package author's instructions.",[],"[{'package': {'ecosystem': 'npm', 'name': 'nodewebkit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.11.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10580'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gc6c-5v9w-xmhw'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/173'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:36:46Z', 'nvd_published_at': None}" +1.4.0,GHSA-4pf7-579w-f4gm,2023-09-07T20:13:05Z,2019-02-18T23:57:04Z,,['CVE-2016-10633'],dwebp-bin downloads Resources over HTTP,"Affected versions of `dwebp-bin` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `dwebp-bin`. + + +## Recommendation + +No patch is currently available for this vulnerability. + +The best mitigation is currently to avoid using this package, using a different package if available. + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'dwebp-bin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10633'}, {'type': 'PACKAGE', 'url': 'https://github.com/1000ch/dwebp-bin'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-4pf7-579w-f4gm'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/232'}]","{'cwe_ids': ['CWE-269', 'CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:58:42Z', 'nvd_published_at': None}" +1.4.0,GHSA-qjf4-7642-c57p,2021-01-08T21:18:41Z,2019-02-18T23:51:52Z,,['CVE-2016-10578'],Downloads Resources over HTTP in unicode,"Affected versions of `unicode` insecurely download resources over HTTP. + +In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution. + + +## Recommendation + +Update to version 9.0.0 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'unicode'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10578'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qjf4-7642-c57p'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/161'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:52:12Z', 'nvd_published_at': None}" +1.4.0,GHSA-97gv-3p2c-xw7j,2022-02-11T17:08:46Z,2019-02-18T23:39:06Z,,['CVE-2016-10524'],Denial of Service and Content Injection in i18n-node-angular,"Versions of `i18n-node-angular` prior to 1.4.0 are affected by denial of service and cross-site scripting vulnerabilities. The vulnerabilities exist in a REST endpoint that was created for development purposes, but was not disabled in production in affected versions. + + +## Recommendation + +Update to version 1.4.0 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'i18n-node-angular'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10524'}, {'type': 'WEB', 'url': 'https://github.com/oliversalzburg/i18n-node-angular/commit/877720d2d9bb90dc8233706e81ffa03f99fc9dc8'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-97gv-3p2c-xw7j'}, {'type': 'PACKAGE', 'url': 'https://github.com/oliversalzburg/i18n-node-angular'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/80'}]","{'cwe_ids': ['CWE-400', 'CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:47Z', 'nvd_published_at': '2018-05-31T20:29:00Z'}" +1.4.0,GHSA-g3r2-65gc-qpqc,2021-01-08T18:50:02Z,2019-02-18T23:38:45Z,,['CVE-2016-10523'],Denial of Service in mqtt-packet,"Versions of `mqtt-packet` prior to 3.4.6, or 4.x prior to 4.0.5 are affected by a denial of service vulnerability wherein specific sequences of MQTT packets can crash the application. + + + + +## Recommendation + +Version 3.x: Update to version 3.4.6 or later. +Version 4.x: Update to version 4.0.5 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'mqtt-packet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.6'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'mqtt-packet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10523'}, {'type': 'WEB', 'url': 'https://github.com/mcollina/mosca/issues/393'}, {'type': 'WEB', 'url': 'https://github.com/mqttjs/mqtt-packet/pull/8'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-g3r2-65gc-qpqc'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/75'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:36:00Z', 'nvd_published_at': None}" +1.4.0,GHSA-m2w9-rm58-mhm9,2021-01-08T18:32:04Z,2019-02-18T23:47:06Z,,['CVE-2016-10640'],Downloads Resources over HTTP in node-thulac,"Affected versions of `node-thulac` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `node-thulac`. + + +## Recommendation + +No patch is currently available for this vulnerability. + +The best mitigation is currently to avoid using this package, using a different package if available. + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.",[],"[{'package': {'ecosystem': 'npm', 'name': 'node-thulac'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10640'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-m2w9-rm58-mhm9'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/236'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:44:38Z', 'nvd_published_at': None}" +1.4.0,GHSA-7c9w-qmrq-ff8r,2020-08-31T18:35:12Z,2019-02-07T18:14:21Z,,['CVE-2018-16479'],Path Traversal in http-live-simulator,"Versions of `http-live-simulator` prior to 1.0.7 are vulnerable to Path Traversal. Due to insufficient input sanitization, attackers can access server files by using relative paths. For example: `curl --path-as-is http://localhost:8080//../../../../etc/passwd`. + + +## Recommendation + +Upgrade to version 1.0.7",[],"[{'package': {'ecosystem': 'npm', 'name': 'http-live-simulator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16479'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/411405'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7c9w-qmrq-ff8r'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/486.json'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/772'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:23Z', 'nvd_published_at': None}" +1.4.0,GHSA-7xvg-m3vx-2hhv,2021-01-08T19:13:15Z,2019-02-18T23:50:26Z,,['CVE-2016-10600'],Downloads Resources over HTTP in webrtc-native,"Affected versions of `webrtc-native` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `webrtc-native`. + + +## Recommendation + +No direct patch is currently available for this vulnerability. + +However, if the native components of `webrtc-native` are built from source, this avoids download the precompiled binary, therefore mitigating the insecure download. + +The package author has provided instructions for building from source [here](https://github.com/vmolsa/webrtc-native/wiki/Getting-started#building-from-source).",[],"[{'package': {'ecosystem': 'npm', 'name': 'webrtc-native'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10600'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7xvg-m3vx-2hhv'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/176'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:47Z', 'nvd_published_at': None}" +1.4.0,GHSA-wj36-v8j4-pc7c,2022-09-14T22:42:42Z,2019-02-07T18:16:03Z,,['CVE-2018-16483'],Authentication Bypass by Spoofing in express-cart,A deficiency in the access control in module express-cart <=1.1.5 allows unprivileged users to add new users to the application as administrators.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'express-cart'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16483'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/343626'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wj36-v8j4-pc7c'}]","{'cwe_ids': ['CWE-290'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:40Z', 'nvd_published_at': None}" +1.4.0,GHSA-mg8r-9g6j-hwv9,2021-09-15T18:58:17Z,2019-02-18T23:39:00Z,,['CVE-2016-10525'],Authentication Bypass in hapi-auth-jwt2,"Versions of `hapi-auth-jwt2` prior to version 5.1.2 are affected by a complete authentication bypass vulnerability when in the `try` authentication mode. + + +## Recommendation + +Update to version 5.1.2 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'hapi-auth-jwt2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.1'}, {'fixed': '5.1.2'}]}], 'versions': ['5.1.1']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10525'}, {'type': 'WEB', 'url': 'https://github.com/dwyl/hapi-auth-jwt2/issues/111'}, {'type': 'WEB', 'url': 'https://github.com/dwyl/hapi-auth-jwt2/pull/112'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mg8r-9g6j-hwv9'}, {'type': 'PACKAGE', 'url': 'https://github.com/dwyl/hapi-auth-jwt2'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/81'}]","{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:04Z', 'nvd_published_at': None}" +1.4.0,GHSA-gmxv-xf2q-6j8m,2023-09-13T19:48:12Z,2019-02-07T18:16:16Z,,['CVE-2018-16484'],Cross-Site Scripting in m-server,"Versions of `m-server` before 1.4.2 are vulnerable to stored cross-site scripting. This vulnerability is exploitable if an attacker is able to control the name of a file that `m-server` is serving. + + +## Recommendation + +Update to version 1.4.2 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'm-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16484'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/319794'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gmxv-xf2q-6j8m'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/467.json'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/729'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:41Z', 'nvd_published_at': None}" +1.4.0,GHSA-xj6f-x7jm-85ff,2023-09-11T18:33:13Z,2019-02-18T23:41:54Z,,['CVE-2016-10690'],openframe-ascii-image downloads Resources over HTTP,"Affected versions of `openframe-ascii-image` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `openframe-ascii-image`. + + +## Recommendation + +No patch is currently available for this vulnerability. + +The best mitigation is currently to avoid using this package, using a different package if available. + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'openframe-ascii-image'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10690'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xj6f-x7jm-85ff'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/298'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:03:37Z', 'nvd_published_at': None}" +1.4.0,GHSA-v5v3-8jqf-vg27,2021-01-08T01:57:37Z,2019-02-18T23:54:22Z,,['CVE-2016-10558'],Downloads Resources over HTTP in aerospike,"Affected versions of `aerospike` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `aerospike`. + + +## Recommendation + +Update to version 2.4.2 or later",[],"[{'package': {'ecosystem': 'npm', 'name': 'aerospike'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10558'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-v5v3-8jqf-vg27'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/167'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:51Z', 'nvd_published_at': None}" +1.4.0,GHSA-6v7p-j23v-4xmw,2023-09-12T20:31:02Z,2019-02-18T23:48:03Z,,['CVE-2016-10608'],robot-js downloads Resources over HTTP,"Affected versions of `robot-js` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `robot-js`. + + +## Recommendation + +No patch is currently available for this vulnerability. + +The best mitigation is currently to avoid using this package, using a different package if available. + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'robot-js'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10608'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6v7p-j23v-4xmw'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/201'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:20:15Z', 'nvd_published_at': None}" +1.4.0,GHSA-5w4p-h4gm-3w26,2021-01-08T19:47:58Z,2019-02-18T23:50:53Z,,['CVE-2016-10592'],Downloads Resources over HTTP in jser-stat,"Affected versions of `jser-stat` insecurely downloads resources over HTTP. + +In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution. + + +## Recommendation + +No patch is currently available for this vulnerability. + +The best mitigation is currently to avoid using this package, using a different package if available. + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.",[],"[{'package': {'ecosystem': 'npm', 'name': 'jser-stat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10592'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5w4p-h4gm-3w26'}, {'type': 'WEB', 'url': 'https://github.com/jser/stat-js/blob/master/data/url-mapping.js'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/188'}]","{'cwe_ids': ['CWE-311'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:17:26Z', 'nvd_published_at': None}" +1.4.0,GHSA-vqmr-957g-r7w3,2023-09-07T00:06:15Z,2019-02-12T15:36:39Z,,['CVE-2017-18355'],Rendertron discloses absolute paths of files,"Installed packages are exposed by node_modules in Rendertron 1.0.0, allowing remote attackers to read absolute paths on the server by examining the ""_where"" attribute of package.json files.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'rendertron'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-18355'}, {'type': 'WEB', 'url': 'https://github.com/GoogleChrome/rendertron/pull/88'}, {'type': 'WEB', 'url': 'https://github.com/GoogleChrome/rendertron/commit/8d70628c96ae72eff6eebb451d26fc9ed6b58b0e'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/chromium/issues/detail?id=759111'}, {'type': 'PACKAGE', 'url': 'https://github.com/GoogleChrome/rendertron'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vqmr-957g-r7w3'}]","{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:12Z', 'nvd_published_at': None}" +1.4.0,GHSA-2hpj-g53m-9gj6,2023-09-08T20:52:07Z,2019-02-18T23:58:03Z,,['CVE-2016-10583'],closure-util downloads Resources over HTTP,"Affected versions of `closure-util` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `closure-util`. + + +## Recommendation + +To mitigate this issue: +1. Install the package using npm's `--ignore-scripts` flag. +2. Navigate to the package directory, and open `default-config.json` in a text editor +3. Change the download URLs in the `compiler_url` and `library_url` to `https` equivalents +4. run `npm i` in the package directory.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'closure-util'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.0-beta.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10583'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2hpj-g53m-9gj6'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/165'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:08Z', 'nvd_published_at': None}" +1.4.0,GHSA-59m2-j944-839w,2023-09-07T20:12:38Z,2019-02-18T23:45:13Z,,['CVE-2016-10655'],clang-extra downloads Resources over HTTP,"Affected versions of `clang-extra` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `clang-extra`. + + +## Recommendation + +No patch is currently available for this vulnerability. The package author stated that no patch is possible until llvm provides HTTPS support, and a patch would be possible if that ever happened in the future. + +The best mitigation option is to reduce the risk of exploitation as much as possible. This can be done by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'clang-extra'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10655'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-59m2-j944-839w'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/265'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:00:22Z', 'nvd_published_at': None}" +1.4.0,GHSA-735c-r4vc-6gm9,2021-09-16T20:41:21Z,2019-02-18T23:56:45Z,,['CVE-2016-10613'],Downloads Resources over HTTP in bionode-sra,"Affected versions of `bionode-sra` insecurely downloads resources over HTTP. + +In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution. + + +## Recommendation + +No patch is currently available for this vulnerability. + +The best mitigation is currently to avoid using this package, using a different package if available. The author of this package has suggested using [urllib-sync](https://www.npmjs.com/package/urllib-sync). + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.",[],"[{'package': {'ecosystem': 'npm', 'name': 'bionode-sra'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10613'}, {'type': 'PACKAGE', 'url': 'https://github.com/bionode/bionode-sra'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/211'}]","{'cwe_ids': ['CWE-269', 'CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:21:02Z', 'nvd_published_at': None}" +1.4.0,GHSA-f757-9c4x-chff,2023-09-13T22:48:59Z,2019-02-18T23:54:44Z,,['CVE-2016-10659'],poco downloads Resources over HTTP,"Affected versions of `poco` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `poco`. + + +## Recommendation + +No patch is currently available for this vulnerability. + +The best mitigation is currently to avoid using this package, using a different package if available. + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'poco'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10659'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-f757-9c4x-chff'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/271'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:33:54Z', 'nvd_published_at': None}" +1.4.0,GHSA-2wrq-wmqf-8vcc,2020-08-31T18:14:19Z,2019-02-18T23:35:48Z,,['CVE-2016-10565'],Downloads Resources over HTTP in operadriver,"operadriver is a Opera Driver for Selenium. + +operadriver versions below 0.2.3 download binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested binary with an attacker controlled binary if the attacker is on the network or positioned in between the user and the remote server. + + +## Recommendation + +Update to version 0.2.3 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'operadriver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10565'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2wrq-wmqf-8vcc'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/196'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:53:10Z', 'nvd_published_at': None}" +1.4.0,GHSA-45j8-pm75-5v8x,2020-08-31T18:42:22Z,2019-02-07T18:18:04Z,,['CVE-2018-16493'],Path Traversal in simplehttpserver,"Versions of `simplehttpserver` prior to 0.2.1 are vulnerable to Path Traversal. Due to insufficient input sanitization, attackers can access server files by using relative paths. + + +## Recommendation + +Upgrade to version 0.2.1 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'static-resource-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.7.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16493'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/357109'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/432600'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-45j8-pm75-5v8x'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/967'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/968'}]","{'cwe_ids': ['CWE-548'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:57:24Z', 'nvd_published_at': None}" +1.4.0,GHSA-jh5w-6964-x5cf,2020-08-31T18:12:58Z,2019-02-18T23:58:05Z,,['CVE-2016-10579'],Downloads Resources over HTTP in chromedriver,"Affected versions of `chromedriver` insecurely download resources over HTTP. + +In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. This may result in arbitrary code execution if an attacker intercepts and modifies the downloaded binary file, replacing it with a malicious one. + + + +## Recommendation + +Update to version 2.26.1 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'chromedriver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.26.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10579'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-jh5w-6964-x5cf'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/160'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:43:26Z', 'nvd_published_at': None}" +1.4.0,GHSA-7r8m-45gc-m2c8,2021-01-08T19:14:34Z,2019-02-18T23:52:14Z,,['CVE-2016-10572'],Downloads Resources over HTTP in mongodb-instance,"Affected versions of `mongodb-instance` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `mongodb-instance`. + + +## Recommendation + +Update to version 0.0.3 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'mongodb-instance'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10572'}, {'type': 'WEB', 'url': 'https://github.com/Janpot/mongodb-instance/commit/c8fea750f8020ace8410c442b2684b33a9fddd3b)'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7r8m-45gc-m2c8'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/235'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:26Z', 'nvd_published_at': None}" +1.4.0,GHSA-hv96-xxx2-5v7w,2021-06-10T23:26:24Z,2019-02-18T23:51:04Z,,['CVE-2016-10588'],Downloads Resources over HTTP in nw,"Affected versions of `nw` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `nw`. + + +## Recommendation + +Update to version 0.23.6-1 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'nw'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.23.6-1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.23.6-sdk'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10588'}, {'type': 'WEB', 'url': 'https://github.com/nwjs/npm-installer/commit/adb4df1e012d38a3872578d484291b9af07aad5b'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hv96-xxx2-5v7w'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/166'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:40:58Z', 'nvd_published_at': None}" +1.4.0,GHSA-f5mh-hq6h-whxv,2021-01-08T21:04:46Z,2019-02-18T23:38:29Z,,['CVE-2016-10561'],Directory Traversal in bitty,"Affected versions of `bitty` are vulnerable to directory traversal via the URL path in GET requests. + + +## Recommendation + +The `bitty` package is not currently maintained, and has not seen an update since 2015. + +At this time, the best available mitigation is to use an alternative module that is actively maintained and provides similar functionality, such as [serve](https://www.npmjs.com/package/serve).",[],"[{'package': {'ecosystem': 'npm', 'name': 'bitty'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10561'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-f5mh-hq6h-whxv'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/150'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:33:49Z', 'nvd_published_at': None}" +1.4.0,GHSA-747p-jfqv-f43r,2021-06-11T14:04:48Z,2019-02-18T23:47:26Z,,['CVE-2016-10626'],Downloads Resources over HTTP in mystem3,"Affected versions of `mystem3` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `mystem3`. + + +## Recommendation + +Update to version 1.0.8 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'mystem3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.7'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10626'}, {'type': 'WEB', 'url': 'https://github.com/koorchik/node-mystem3/commit/4bd31c0e0110afc327c414d7ebfc2ffe738cbad2'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-747p-jfqv-f43r'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/229'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:21:20Z', 'nvd_published_at': None}" +1.4.0,GHSA-mq7g-6rv4-pj95,2021-01-08T18:26:10Z,2019-02-18T23:35:23Z,,['CVE-2016-10569'],Downloads Resources over HTTP in embedza,"Affected versions of `embedza` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `embedza`. + + +## Recommendation + +Update to version 1.2.4 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'embedza'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10569'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mq7g-6rv4-pj95'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/187'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:57Z', 'nvd_published_at': None}" +1.4.0,GHSA-xg5r-8j97-2wrj,2020-08-31T18:10:25Z,2019-02-18T23:39:22Z,,['CVE-2016-10528'],Directory Traversal in restafary,"Affected versions of `restafary` are susceptible to a directory traversal vulnerability when a root path is specified in the configuration. + + +Proof of Concept + +``` +curl -i -s -k -X 'GET' -H 'Authorization: Basic YWRtaW46cGFzc3dvcmQ=' 'http://localhost:8000/api/v1/fs/..%2f..%2fetc/passwd' +``` + + +## Recommendation + +Update to version 1.6.1 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'restafary'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10528'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xg5r-8j97-2wrj'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/89'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:03:10Z', 'nvd_published_at': None}" +1.4.0,GHSA-5pq8-2q24-mj3p,2021-01-08T19:48:52Z,2019-02-18T23:45:03Z,,['CVE-2016-10660'],Downloads Resources over HTTP in fis-parser-sass-bin,"Affected versions of `fis-parser-sass-bin` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `fis-parser-sass-bin`. + + +## Recommendation + +No patch is currently available for this vulnerability. + +The best mitigation is currently to avoid using this package, using a different package if available. + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.",[],"[{'package': {'ecosystem': 'npm', 'name': 'fis-parser-sass-bin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10660'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5pq8-2q24-mj3p'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/269'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:16:56Z', 'nvd_published_at': None}" +1.4.0,GHSA-h466-j336-74wx,2023-09-07T18:22:30Z,2019-02-07T18:17:26Z,,['CVE-2018-16490'],Prototype Pollution in mpath,"Versions of `mpath` before 0.5.1 are vulnerable to prototype pollution. Provided certain input `mpath` can add or modify properties of the `Object` prototype. These properties will be present on all objects. + + +## Recommendation + +Update to version `0.5.1` or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'mpath'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16490'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/390860'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h466-j336-74wx'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/779'}]","{'cwe_ids': ['CWE-1321', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:38:42Z', 'nvd_published_at': None}" +1.4.0,GHSA-g2pf-qjgf-6fw3,2021-09-16T20:41:43Z,2019-02-18T23:33:42Z,,['CVE-2016-10607'],Downloads Resources over HTTP in openframe-glslviewer,"Affected versions of `openframe-glslviewer` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `openframe-glslviewer`. + + +## Recommendation + +No patch is currently available for this vulnerability, and the package hasn't been updated since 2014. + +The best mitigation is currently to avoid using this package, using a different package if available. + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.",[],"[{'package': {'ecosystem': 'npm', 'name': 'openframe-glslviewer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10607'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenframeProject/Openframe-glslViewer'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-g2pf-qjgf-6fw3'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/208'}]","{'cwe_ids': ['CWE-269', 'CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:35:55Z', 'nvd_published_at': None}" +1.4.0,GHSA-x56r-5r34-qg74,2023-09-11T18:32:24Z,2019-02-18T23:47:47Z,,['CVE-2016-10612'],dalek-browser-ie-canary downloads Resources over HTTP,"Affected versions of `dalek-browser-ie-canary` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `dalek-browser-ie-canary`. + + +## Recommendation + +No patch is currently available for this vulnerability, and the package author has marked the package as deprecated. + +The best mitigation is currently to avoid using this package, using a different package if available. + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'dalek-browser-ie-canary'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.4-2014-04-04-12-11-49'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10612'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-x56r-5r34-qg74'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/205'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:02:09Z', 'nvd_published_at': None}" +1.4.0,GHSA-q43m-ffwr-rpcc,2021-01-08T18:18:07Z,2019-02-18T23:58:24Z,,['CVE-2016-10534'],SSL Validation Defaults to False in electron-packager,"Affected versions of `electron-packager` configure the generated application to disable SSL certificate verification by default. + +This could allow an attacker with a privileged network position to launch a Man In The Middle (MITM) attack on the install process, intercepting the step where electron-packager downloads Electron for supported target platforms and architectures, and replacing the valid download with a tampered malicious one. + +This only affects users using the electron-packager CLI. The strict-ssl option defaults to true for the node.js API. + + +## Recommendation + +1. Update to version 7.0.0 or later. +2. Delete the `electron-download` cache folder, which is by default located at `~/.electron`.",[],"[{'package': {'ecosystem': 'npm', 'name': 'electron-packager'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.1'}, {'fixed': '7.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10534'}, {'type': 'WEB', 'url': 'https://github.com/electron-userland/electron-packager/issues/333'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q43m-ffwr-rpcc'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/104'}]","{'cwe_ids': ['CWE-295'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:50:47Z', 'nvd_published_at': None}" +1.4.0,GHSA-9jf3-f2pg-7868,2023-09-11T21:50:14Z,2019-02-18T23:57:01Z,,['CVE-2016-10629'],nw-with-arm downloads Resources over HTTP,"Affected versions of `nw-with-arm` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `nw-with-arm`. + + +## Recommendation + +No patch is currently available for this vulnerability. + +The best mitigation is currently to avoid using this package, using a different package if available. + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'nw-with-arm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.14.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10629'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9jf3-f2pg-7868'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/226'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:54Z', 'nvd_published_at': None}" +1.4.0,GHSA-7p6h-3fmw-539q,2023-09-11T18:11:23Z,2019-02-18T23:47:27Z,,['CVE-2016-10624'],selenium-chromedriver Downloads Resources over HTTP,"Affected versions of `selenium-chromedriver` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `selenium-chromedriver`. + + +## Recommendation + +No patch is currently available for this vulnerability, and the author has marked the package as deprecated. + +The best mitigation is currently to avoid using this package, using a different package if available. + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised yo","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'selenium-chromedriver'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10624'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-7p6h-3fmw-539q'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/222'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:23:02Z', 'nvd_published_at': None}" +1.4.0,GHSA-qx9m-27wh-7fjg,2021-01-08T01:58:11Z,2019-02-18T23:57:03Z,,['CVE-2016-10631'],Downloads Resources over HTTP in jvminstall,"Affected versions of `jvminstall` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `jvminstall`. + + +## Recommendation + +No patch is currently available for this vulnerability. + +The best mitigation is currently to avoid using this package, using a different package if available. + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.",[],"[{'package': {'ecosystem': 'npm', 'name': 'jvminstall'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10631'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qx9m-27wh-7fjg'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/225'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:53:11Z', 'nvd_published_at': None}" +1.4.0,GHSA-h7pc-85cg-wmch,2021-01-08T18:42:35Z,2019-02-18T23:35:10Z,,['CVE-2016-10575'],Downloads Resources over HTTP in kindlegen,"Affected versions of `kindlegen` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `kindlegen`. + + +## Recommendation + +Update to version 1.1.0 or greater.",[],"[{'package': {'ecosystem': 'npm', 'name': 'kindlegen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10575'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h7pc-85cg-wmch'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/251'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:25Z', 'nvd_published_at': None}" +1.4.0,GHSA-mq76-m7gv-xhfm,2023-09-07T20:37:17Z,2019-02-18T23:34:00Z,,['CVE-2016-10599'],sauce-connect downloads Resources over HTTP,"Affected versions of `sauce-connect` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `sauce-connect`. + + +## Recommendation + +No patch is currently available for this vulnerability, and this package has not been updated since 2013. + +The best mitigation is currently to avoid using this package, using a different package if available. + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'sauce-connect'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10599'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mq76-m7gv-xhfm'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/186'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:55Z', 'nvd_published_at': None}" +1.4.0,GHSA-9c2p-jw8p-f84v,2023-09-11T21:48:29Z,2019-02-18T23:54:24Z,,['CVE-2016-10556'],SQL Injection in sequelize,"Affected versions of `sequelize` cast arrays to strings and fail to properly escape the resulting SQL statement, resulting in a SQL injection vulnerability. + + +## Proof of Concept +In Postgres, SQLite, and Microsoft SQL Server there is an issue where arrays are treated as strings and improperly escaped. + +Example Query: +``` +database.query('SELECT * FROM TestTable WHERE Name IN (:names)', { + replacements: { + names: directCopyOfUserInput + } +}); +``` + +If the user inputs the value of `:names` as: +``` +[""test"", ""'); DELETE TestTable WHERE Id = 1 --')""] +``` + +The resulting SQL statement will be: +```sql +SELECT Id FROM Table WHERE Name IN ('test', '\'); DELETE TestTable WHERE Id = 1 --') +``` +As the backslash has no special meaning in PostgreSQL, MSSQL, or SQLite, the statement will delete the record in TestTable with an Id of 1. + + +## Recommendation + +Update to version 3.20.0 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'sequelize'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.20.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.19.3'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10556'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/issues/5671'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/commit/23952a2b020cc3571f090e67dae7feb084e1be71'}, {'type': 'WEB', 'url': 'https://github.com/sequelize/sequelize/commits/v3.20.0?after=62e4dacb28a779a190a3e042b971dcd8c7926e49+34&branch=v3.20.0&qualified_name=refs%2Ftags%2Fv3.20.0'}]","{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:12Z', 'nvd_published_at': None}" +1.4.0,GHSA-cvx3-pqmj-x57x,2023-09-05T23:25:04Z,2019-02-18T23:47:13Z,,['CVE-2016-10634'],scalajs-standalone-bin Downloads Resources over HTTP,"Affected versions of `scalajs-standalone-bin` insecurely download an executable over an unencrypted HTTP connection. + +In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `scalajs-standalone-bin`. + + +## Recommendation + +No patch is currently available for this vulnerability. + +The best mitigation is currently to avoid using this package, using a different package if available. + +Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.",[],"[{'package': {'ecosystem': 'npm', 'name': 'scalajs-standalone-bin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.4.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-10634'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cvx3-pqmj-x57x'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/231'}]","{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:32:59Z', 'nvd_published_at': None}" +1.4.0,GHSA-5qfv-rr79-chx5,2022-11-17T18:22:53Z,2019-08-27T17:37:33Z,,['CVE-2019-15488'],Cross-site Scripting in Ignite Realtime Openfire,Ignite Realtime Openfire before 4.4.1 has reflected XSS via an LDAP setup test.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.igniterealtime.openfire:xmppserver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15488'}, {'type': 'WEB', 'url': 'https://github.com/igniterealtime/Openfire/pull/1441'}, {'type': 'PACKAGE', 'url': 'https://github.com/igniterealtime/Openfire'}, {'type': 'WEB', 'url': 'https://github.com/igniterealtime/Openfire/compare/cd0a573...5e5d9e5'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-08-27T16:49:15Z', 'nvd_published_at': '2019-08-23T13:15:00Z'}" +1.4.0,GHSA-f5f4-m7qp-w6gc,2023-09-11T20:37:33Z,2019-08-27T17:40:33Z,,['CVE-2019-15477'],Cross-site Scripting in Jooby,Jooby before 1.6.4 has XSS via the default error handler.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.jooby:jooby'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15477'}, {'type': 'WEB', 'url': 'https://github.com/jooby-project/jooby/pull/1368'}, {'type': 'WEB', 'url': 'https://github.com/jooby-project/jooby/commit/34856a738829d8fedca4ed27bd6ff413af87186f'}, {'type': 'PACKAGE', 'url': 'https://github.com/jooby-project/jooby'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-08-27T17:11:57Z', 'nvd_published_at': '2019-08-23T13:15:00Z'}" +1.4.0,GHSA-3gm7-v7vw-866c,2021-03-31T21:07:31Z,2019-08-01T19:17:35Z,,['CVE-2019-0193'],XML External Entity (XXE) Injection in Apache Solr,"In Apache Solr, the DataImportHandler, an optional but popular module to pull in data from databases and other sources, has a feature in which the whole DIH configuration can come from a request's ""dataConfig"" parameter. The debug mode of the DIH admin screen uses this to allow convenient debugging / development of a DIH config. Since a DIH config can contain scripts, this parameter is a security risk. Starting with version 8.2.0 of Solr, use of this parameter requires setting the Java System property ""enable.dih.dataConfigParam"" to true.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0193'}, {'type': 'WEB', 'url': 'https://github.com/apache/lucene-solr/commit/02c693f3713add1b4891cbaa87127de3a55c10f7'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/SOLR-13669'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/1addbb49a1fc0947fb32ca663d76d93cfaade35a4848a76d4b4ded9c@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/42cc4d334ba33905b872a0aa00d6a481391951c8b1450f01b077ce74@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/55880d48e38ba9e8c41a3b9e41051dbfdef63b86b0cfeb32967edf03@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6f2d61bd8732224c5fd3bdd84798f8e01e4542d3ee2f527a52a81b83@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/7143983363f0ba463475be4a8b775077070a08dbf075449b7beb51ee@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/9b0e7a7e3e18d0724f511403b364fc082ff56e3134d84cfece1c82fc@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a6e3c09dba52b86d3a1273f82425973e1b0623c415d0e4f121d89eab@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/e85f735fad06a0fb46e74b7e6e9ce7ded20b59637cd9f993310f814d@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r140128dc6bb4f4e0b6a39e962c7ca25a8cbc8e48ed766176c931fccc@%3Cusers.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r19d23e8640236a3058b4d6c23e5cd663fde182255f5a9d63e0606a66@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1d4a247329a8478073163567bbc8c8cb6b49c6bfc2bf58153a857af1@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r339865b276614661770c909be1dd7e862232e3ef0af98bfd85686b51@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r33aed7ad4ee9833c4190a44e2b106efd2deb19504b85e012175540f6@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3da74965aba2b5f5744b7289ad447306eeb2940c872801819faa9314@%3Cusers.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r95df34bb158375948da82b4dfe9a1b5d528572d586584162f8f5aeef@%3Cusers.solr.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb34d820c21f1708c351f9035d6bc7daf80bfb6ef99b34f7af1d2f699@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc400db37710ee79378b6c52de3640493ff538c2beb41cefdbbdf2ab8@%3Ccommits.submarine.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/10/msg00013.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2020/08/msg00025.html'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGAPACHESOLR-536063'}]","{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-01T19:07:49Z', 'nvd_published_at': '2019-08-01T14:15:00Z'}" +1.4.0,GHSA-66rh-8fw6-59q6,2022-08-03T16:21:27Z,2019-08-21T16:15:13Z,,['CVE-2019-10745'],assign-deep Vulnerable to Prototype Pollution,"Versions of `assign-deep` prior to 1.0.1 and 0.4.8 are vulnerable to Prototype Pollution. The `assign` function fails to validate which Object properties it updates. This allows attackers to modify the prototype of Object, causing the addition or modification of an existing property on all objects. + +## Recommendation + +Upgrade to versions 1.0.1, 0.4.8, or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'assign-deep'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.8'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'assign-deep'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.1'}]}], 'versions': ['1.0.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10745'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/assign-deep/commit/8e3cc4a34246733672c71e96532105384937e56c'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/assign-deep/commit/90bf1c551d05940898168d04066bbf15060f50cc'}, {'type': 'PACKAGE', 'url': 'https://github.com/jonschlinkert/assign-deep'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ASSIGNDEEP-450211'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1014'}]","{'cwe_ids': ['CWE-1321', 'CWE-20', 'CWE-915'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-21T15:53:43Z', 'nvd_published_at': '2019-08-20T19:15:00Z'}" +1.4.0,GHSA-cwqq-w8c3-r2jw,2021-08-17T21:57:17Z,2019-08-23T00:04:56Z,,['CVE-2019-14262'],Uncontrolled Resource Consumption in MetadataExtractor,MetadataExtractor 2.1.0 allows stack consumption.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'MetadataExtractor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.1.0'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14262'}, {'type': 'WEB', 'url': 'https://github.com/drewnoakes/metadata-extractor-dotnet/pull/190'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-22T15:04:25Z', 'nvd_published_at': '2019-07-25T05:15:00Z'}" +1.4.0,GHSA-rch7-f4h5-x9rj,2021-08-17T21:32:42Z,2019-08-23T00:04:52Z,,[],Identity Spoofing in libp2p-secio,"Affected versions of `libp2p-secio` does not correctly verify that the `PeerId` of `DstPeer` matches the `PeerId` discovered in the crypto handshake, resulting in a high severity identity spoofing vulnerability. + + +## Recommendation + +Update to version 0.9.0 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'libp2p-secio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/libp2p/js-libp2p-secio/pull/95'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:libp2p-secio:20180115'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/558'}]","{'cwe_ids': ['CWE-290'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-08-22T14:56:33Z', 'nvd_published_at': None}" +1.4.0,GHSA-v9qg-3j8p-r63v,2021-05-10T18:17:48Z,2019-08-06T01:43:31Z,,['CVE-2019-14235'],Uncontrolled Recursion in Django,"An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. If passed certain inputs, django.utils.encoding.uri_to_iri could lead to significant memory usage due to a recursion when repercent-encoding invalid UTF-8 octet sequences.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.23'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.11'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14235'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/dev/releases/security/'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/django-announce/jIoju2-KLDs'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Aug/15'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202004-17'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190828-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4498'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2019/aug/01/security-releases/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html'}]","{'cwe_ids': ['CWE-674'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-06T01:34:47Z', 'nvd_published_at': '2019-08-02T15:15:00Z'}" +1.4.0,GHSA-mfwh-gqx8-c787,2021-05-05T22:58:08Z,2019-08-06T01:43:40Z,,['CVE-2019-10088'],Allocation of Resources Without Limits or Throttling in Apache Tika,A carefully crafted or corrupt zip file can cause an OOM in Apache Tika's RecursiveParserWrapper in versions 1.7-1.21. Users should upgrade to 1.22 or later.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tika:tika-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7'}, {'fixed': '1.22'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10088'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/1c63555609b737c20d1bbfa4a3e73ec488e3408a84e2f5e47e1b7e08@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/39723d8227b248781898c200aa24b154683673287b150a204b83787d@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/da9ee189d1756f8508d0f2386d8e25aca5a6df541739829232be8a94@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/fb6c84fd387de997e5e366d50b0ca331a328c466432c80f8c5eed33d@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190828-0004/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}]","{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-06T01:42:46Z', 'nvd_published_at': '2019-08-02T19:15:00Z'}" +1.4.0,GHSA-6r97-cj55-9hrq,2021-08-17T20:41:46Z,2019-08-16T14:00:34Z,,['CVE-2019-14234'],SQL Injection in Django,"An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. Due to an error in shallow key transformation, key and index lookups for django.contrib.postgres.fields.JSONField, and key lookups for django.contrib.postgres.fields.HStoreField, were subject to SQL injection. This could, for example, be exploited via crafted use of ""OR 1=1"" in a key or index name to return all records, using a suitably crafted dictionary, with dictionary expansion, as the **kwargs passed to the QuerySet.filter() function.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.23'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.11'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14234'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/4f5b58f5cd3c57fee9972ab074f8dc6895d8f387'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/ed682a24fca774818542757651bfba576c3fc3ef'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/f74b3ae3628c26e1b4f8db3d13a91d52a833a975'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/django-announce/jIoju2-KLDs'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2019/aug/01/security-releases/'}]","{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-08-09T15:26:25Z', 'nvd_published_at': '2019-08-09T13:15:00Z'}" +1.4.0,GHSA-4q98-wr72-h35w,2021-08-17T22:16:39Z,2019-08-27T17:41:33Z,,['CVE-2019-12400'],Improper input validation in Apache Santuario XML Security for Java,"In version 2.0.3 Apache Santuario XML Security for Java, a caching mechanism was introduced to speed up creating new XML documents using a static pool of DocumentBuilders. However, if some untrusted code can register a malicious implementation with the thread context class loader first, then this implementation might be cached and re-used by Apache Santuario - XML Security for Java, leading to potential security flaws when validating signed documents, etc. The vulnerability affects Apache Santuario - XML Security for Java 2.0.x releases from 2.0.3 and all 2.1.x releases before 2.1.4.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.santuario:xmlsec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.3'}, {'fixed': '2.1.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12400'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0804'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0805'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0806'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0811'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/8e814b925bf580bc527d96ff51e72ffe5bdeaa4b8bf5b89498cab24c@%3Cdev.santuario.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/edaa7edb9c58e5f5bd0c950f2b6232b62b15f5c44ad803e8728308ce@%3Cdev.santuario.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r107bffb06a5e27457fe9af7dfe3a233d0d36c6c2f5122f117eb7f626@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1c07a561426ec5579073046ad7f4207cdcef452bb3100abaf908e0cd@%3Ccommits.santuario.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcdc0da94fe21b26493eae47ca987a290bdf90c721a7a42491fdd41d4@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf82be0a7c98cd3545e20817bb96ed05551ea0020acbaf9a469fef402@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf958cea96236de8829940109ae07e870aa3d59235345421e4924ff03@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190910-0003/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}, {'type': 'WEB', 'url': 'http://santuario.apache.org/secadv.data/CVE-2019-12400.asc?version=1&modificationDate=1566573083000&api=v2'}]","{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-08-27T17:17:13Z', 'nvd_published_at': '2019-08-23T21:15:00Z'}" +1.4.0,GHSA-4mq5-mj59-qq9c,2021-05-05T22:55:27Z,2019-08-06T01:43:38Z,,['CVE-2019-10093'],Allocation of Resources Without Limits or Throttling in Apache Tika,"In Apache Tika 1.19 to 1.21, a carefully crafted 2003ml or 2006ml file could consume all available SAXParsers in the pool and lead to very long hangs. Apache Tika users should upgrade to 1.22 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tika:tika-parsers'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.19'}, {'fixed': '1.22'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10093'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/39723d8227b248781898c200aa24b154683673287b150a204b83787d@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a5a44eff1b9eda3bc69d22943a1030c43d376380c75d3ab04d0c1a21@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/da9ee189d1756f8508d0f2386d8e25aca5a6df541739829232be8a94@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/fb6c84fd387de997e5e366d50b0ca331a328c466432c80f8c5eed33d@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190828-0004/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}]","{'cwe_ids': ['CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-08-06T01:42:09Z', 'nvd_published_at': '2019-08-02T19:15:00Z'}" +1.4.0,GHSA-65p8-3hm4-h9h8,2021-08-17T21:23:49Z,2019-08-23T00:04:48Z,,[],Denial of Service in rgb2hex,"All versions of `rgb2hex` are vulnerable to Regular Expression Denial of Service (ReDoS) when an attacker can pass in a specially crafted invalid color value. + + +## Recommendation + +Update to version 0.1.6 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'rgb2hex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.6'}]}]}]","[{'type': 'WEB', 'url': 'https://hackerone.com/reports/319629'}, {'type': 'WEB', 'url': 'https://github.com/christian-bromann/rgb2hex/blob/v0.1.0/index.js#L25'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:rgb2hex:20180429'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/647'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-08-22T14:26:35Z', 'nvd_published_at': None}" +1.4.0,GHSA-25pc-85qf-6j69,2021-08-17T20:24:21Z,2019-08-01T19:17:53Z,,['CVE-2018-11779'],Deserialization of Untrusted Data in Apache Storm,"In Apache Storm versions 1.1.0 to 1.2.2, when the user is using the storm-kafka-client or storm-kafka modules, it is possible to cause the Storm UI daemon to deserialize user provided bytes into a Java class.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.storm:storm-kafka'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.2.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.storm:storm-kafka-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.2.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11779'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/3e4f704c4bd9296405a07a0290b8cbb6cbf5046e277efe6d93280a98@%3Cuser.storm.apache.org%3E'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-08-01T17:52:52Z', 'nvd_published_at': '2019-07-26T00:15:00Z'}" +1.4.0,GHSA-6fpp-rgj9-8rwc,2023-09-13T17:18:23Z,2019-08-01T19:18:00Z,,['CVE-2019-14379'],Deserialization of untrusted data in FasterXML jackson-databind,"SubTypeValidator.java in FasterXML jackson-databind before 2.9.9.2, 2.8.11.4, and 2.7.9.6 mishandles default typing when ehcache is used (because of net.sf.ehcache.transaction.manager.DefaultTransactionManagerLookup), leading to remote code execution.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.9.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.11.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.9.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14379'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2387'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/ad418eeb974e357f2797aef64aa0e3ffaaa6125b'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:2824'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2743'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2858'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2935'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2936'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2937'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2938'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2998'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3044'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3045'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3046'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3050'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3149'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3200'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3292'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3297'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3901'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0727'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/compare/jackson-databind-2.9.9.1...jackson-databind-2.9.9.2'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/0d4b630d9ee724aee50703397d9d1afa2b2befc9395ba7797d0ccea9@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/0fcef7321095ce0bc597d468d150cff3d647f4cb3aef3bd4d20e1c69@%3Ccommits.tinkerpop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2766188be238a446a250ef76801037d452979152d85bce5e46805815@%3Cissues.iceberg.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2d2a76440becb610b9a9cb49b15eac3934b02c2dbcaacde1000353e4@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/34717424b4d08b74f65c09a083d6dd1cb0763f37a15d6de135998c1d@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/525bcf949a4b0da87a375cbad2680b8beccde749522f24c49befe7fb@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/56c8042873595b8c863054c7bfccab4bf2c01c6f5abedae249d914b9@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5ecc333113b139429f4f05000d4aa2886974d4df3269c1dd990bb319@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5fc0e16b7af2590bf1e97c76c136291c4fdb244ee63c65c485c9a7a1@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6788e4c991f75b89d290ad06b463fcd30bcae99fee610345a35b7bc6@%3Cissues.iceberg.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/689c6bcc6c7612eee71e453a115a4c8581e7b718537025d4b265783d@%3Cissues.iceberg.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/75f482fdc84abe6d0c8f438a76437c335a7bbeb5cddd4d70b4bc0cbf@%3Cissues.iceberg.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/859815b2e9f1575acbb2b260b73861c16ca49bca627fa0c46419051f@%3Cissues.iceberg.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/8723b52c2544e6cb804bc8a36622c584acd1bd6c53f2b6034c9fea54@%3Cissues.iceberg.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/87e46591de8925f719664a845572d184027258c5a7af0a471b53c77b@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/940b4c3fef002461b89a050935337056d4a036a65ef68e0bbd4621ef@%3Cdev.struts.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/99944f86abefde389da9b4040ea2327c6aa0b53a2ff9352bd4cfec17@%3Cissues.iceberg.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/d161ff3d59c5a8213400dd6afb1cce1fac4f687c32d1e0c0bfbfaa2d@%3Cissues.iceberg.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/e25e734c315f70d8876a846926cfe3bfa1a4888044f146e844caf72f@%3Ccommits.ambari.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ee0a051428d2c719acfa297d0854a189ea5e284ef3ed491fa672f4be@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f17f63b0f8a57e4a5759e01d25cffc0548f0b61ff5c6bfd704ad2f2a@%3Ccommits.ambari.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/08/msg00011.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OVRZDN2T6AZ6DJCZJ3VSIQIVHBVMVWBL/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TXRVXNRFHJSQWFHPRJQRI5UPMZ63B544/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKUALE2TUCKEKOHE2D342PQXN4MWCSLC/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190814-0001/'}, {'type': 'WEB', 'url': 'https://support.apple.com/kb/HT213189'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2022/Mar/23'}]","{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-08-01T15:38:02Z', 'nvd_published_at': '2019-07-29T12:15:00Z'}" +1.4.0,GHSA-gq9m-qvpx-68hc,2023-08-31T09:34:57Z,2019-08-21T16:15:24Z,,['CVE-2019-14806'],Pallets Werkzeug Insufficient Entropy,"Pallets Werkzeug before 0.15.3, when used with Docker, has insufficient debugger PIN randomness because Docker containers share the same machine id.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'werkzeug'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14806'}, {'type': 'WEB', 'url': 'https://github.com/pallets/werkzeug/commit/00bc43b1672e662e5e3b8cecd79e67fc968fa246'}, {'type': 'PACKAGE', 'url': 'https://github.com/pallets/werkzeug'}, {'type': 'WEB', 'url': 'https://github.com/pallets/werkzeug/blob/7fef41b120327d3912fbe12fb64f1951496fcf3e/src/werkzeug/debug/__init__.py#L168'}, {'type': 'WEB', 'url': 'https://palletsprojects.com/blog/werkzeug-0-15-3-released/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00034.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00047.html'}]","{'cwe_ids': ['CWE-331'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-21T16:01:59Z', 'nvd_published_at': '2019-08-09T15:15:00Z'}" +1.4.0,GHSA-xc6x-cq47-9chw,2021-08-26T15:33:46Z,2019-08-16T14:03:35Z,,['CVE-2019-1258'],Vulnerability in Azure Active Directory Authentication Library,"An elevation of privilege vulnerability exists in Azure Active Directory Authentication Library On-Behalf-Of flow, in the way the library caches tokens, aka 'Azure Active Directory Authentication Library Elevation of Privilege Vulnerability'.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'microsoft.identitymodel.clients.activedirectory'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.1.1'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1258'}, {'type': 'PACKAGE', 'url': 'https://github.com/AzureAD/azure-activedirectory-library-for-dotnet'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1258'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-15T15:29:27Z', 'nvd_published_at': None}" +1.4.0,GHSA-w69w-jvc7-wjgv,2023-09-25T10:52:27Z,2019-08-01T19:18:16Z,,['CVE-2019-10184'],Undertow Missing Authorization when requesting a protected directory without trailing slash,undertow before version 2.0.23.Final is vulnerable to an information leak issue. Web apps may have their directory structures predicted through requests without trailing slashes via the api.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-servlet'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.23'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10184'}, {'type': 'WEB', 'url': 'https://github.com/undertow-io/undertow/pull/794'}, {'type': 'WEB', 'url': 'https://github.com/undertow-io/undertow/commit/5fa7ac68c0e4251c93056d9982db5e794e04ebfa'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2935'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2936'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2937'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2938'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2998'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3044'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3045'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3046'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3050'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0727'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10184'}, {'type': 'WEB', 'url': 'https://issues.redhat.com/browse/UNDERTOW-1578'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220210-0016/'}]","{'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-01T15:23:26Z', 'nvd_published_at': '2019-07-25T21:15:00Z'}" +1.4.0,GHSA-65rm-h285-5cc5,2023-08-31T09:13:38Z,2019-08-16T14:02:35Z,,['CVE-2019-12855'],Improper Certificate Validation in Twisted,"In words.protocols.jabber.xmlstream in Twisted through 19.2.1, XMPP support did not verify certificates when used with TLS, allowing an attacker to MITM connections.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'twisted'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.7.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12855'}, {'type': 'WEB', 'url': 'https://github.com/twisted/twisted/pull/1147'}, {'type': 'PACKAGE', 'url': 'https://github.com/twisted/twisted'}, {'type': 'WEB', 'url': 'https://twistedmatrix.com/trac/ticket/9561'}]","{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-12T15:06:23Z', 'nvd_published_at': '2019-06-16T12:29:00Z'}" +1.4.0,GHSA-333g-rpr4-7hxq,2023-08-28T21:39:41Z,2019-08-20T14:29:03Z,,['CVE-2019-15224'],rest-client Gem Contains Malicious Code,"The rest-client gem 1.6.10 through 1.6.13 for Ruby, as distributed on RubyGems.org, included a code-execution backdoor inserted by a third party. +Users of an affected version should consider downgrading to the last non-affected version of 1.6.9, or upgrading to 1.7.x. +Additionally, a set of other minor gems have been partially or completely yanked and are included in this advisory. +These include cron_parser, coin_base, blockchain_wallet, awesome-bot, doge-coin, capistrano-colors, bitcoin_vanity, lita_coin, coming-soon, and omniauth_amazon.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'rest-client'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.10'}, {'fixed': '1.7.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.6.13'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'cron_parser'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.13'}, {'last_affected': '1.0.14'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'cron_parser'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['0.1.4']}, {'package': {'ecosystem': 'RubyGems', 'name': 'coin_base'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'blockchain_wallet'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'awesome-bot'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'doge-coin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'capistrano-colors'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'bitcoin_vanity'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'coming-soon'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'omniauth_amazon'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15224'}, {'type': 'WEB', 'url': 'https://github.com/rest-client/rest-client/issues/713'}, {'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems.org/issues/2097'}, {'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems.org/wiki/Gems-yanked-and-accounts-locked#19-aug-2019'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/blockchain_wallet/CVE-2019-15224.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/coin_base/CVE-2019-15224.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/doge-coin/CVE-2019-15224.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/lita_coin/CVE-2019-15224.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/omniauth_amazon/CVE-2019-15224.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rest-client/CVE-2019-15224.yml'}]","{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-08-20T14:27:19Z', 'nvd_published_at': '2019-08-19T23:15:00Z'}" +1.4.0,GHSA-8j4w-5fw4-rm27,2021-08-17T22:18:25Z,2019-08-27T17:45:33Z,,['CVE-2019-10750'],Prototype Pollution in deeply,"Versions of `deeply` prior to 1.0.1 are vulnerable to Prototype Pollution. The package fails to validate which Object properties it updates. This allows attackers to modify the prototype of Object, causing the addition or modification of an existing property on all objects. + + + + +## Recommendation + +Upgrade to version 3.1.0 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'deeply'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10750'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DEEPLY-451026'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1030'}]","{'cwe_ids': ['CWE-400'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-08-27T17:28:49Z', 'nvd_published_at': None}" +1.4.0,GHSA-4p8f-mmfj-r45g,2023-08-25T20:28:23Z,2019-08-21T16:15:04Z,,['CVE-2018-20975'],Cross-site scripting in fat_free_crm,Fat Free CRM before 0.18.1 has XSS in the `tags_helpe`r in `app/helpers/tags_helper.rb`.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'fat_free_crm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.18.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20975'}, {'type': 'WEB', 'url': 'https://github.com/fatfreecrm/fat_free_crm/commit/6d60bc8ed010c4eda05d6645c64849f415f68d65'}, {'type': 'WEB', 'url': 'https://github.com/fatfreecrm/fat_free_crm/compare/v0.17.3...v0.18.1'}, {'type': 'WEB', 'url': 'https://github.com/fatfreecrm/fat_free_crm/releases/tag/v0.18.1'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/fat_free_crm/CVE-2018-20975.yml'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-08-21T15:48:24Z', 'nvd_published_at': '2019-08-20T13:15:00Z'}" +1.4.0,GHSA-xqh8-5j36-4556,2022-06-15T18:39:04Z,2019-08-26T16:59:45Z,,['CVE-2019-15658'],SQL Injection in connect-pg-simple,"### Impact +An unlikely SQL injection if the case of an unsanitized table name input. + +### Patches +The user should upgrade to `6.0.1`. Due to its low impact a backport has not been made to the `5.x` branch. + +### Workarounds +If there is no likelihood that the `tableName` or `schemaName` options sent to the constructor could be of an unsanitized nature, then no workaround is needed. Else the input could be sanitized and escaped before sending it in. Take note though that such an escaping would need to be removed when upgrading to `6.0.1` or later, to avoid double escaping. + +### References +* [Security issue disclosure](https://github.com/voxpelli/node-connect-pg-simple/issues/151) + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [voxpelli/node-connect-pg-simple](https://github.com/voxpelli/node-connect-pg-simple) +* Email maintainer at [pelle@kodfabrik.se](mailto:pelle@kodfabrik.se) +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'connect-pg-simple'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/voxpelli/node-connect-pg-simple/security/advisories/GHSA-xqh8-5j36-4556'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15658'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xqh8-5j36-4556'}, {'type': 'PACKAGE', 'url': 'https://github.com/voxpelli/node-connect-pg-simple'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CONNECTPGSIMPLE-460154'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1153'}]","{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:04:11Z', 'nvd_published_at': None}" +1.4.0,GHSA-jvpp-hxjj-5ccc,2021-08-17T20:27:34Z,2019-08-01T19:17:45Z,,['CVE-2015-7559'],Improper Input Validation and Missing Authentication for Critical Function in Apache ActiveMQ,It was found that the Apache ActiveMQ client before 5.15.5 exposed a remote shutdown command in the ActiveMQConnection class. An attacker logged into a compromised broker could use this flaw to achieve denial of service on a connected client.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.activemq:activemq-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.15.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7559'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2015-7559'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/AMQ-6470'}]","{'cwe_ids': ['CWE-20', 'CWE-306'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-08-01T19:05:30Z', 'nvd_published_at': '2019-08-01T14:15:00Z'}" +1.4.0,GHSA-fpqp-v323-44xv,2021-08-17T20:42:32Z,2019-08-16T14:01:35Z,,['CVE-2019-12397'],Cross-site scripting in Apache Ranger,Policy import functionality in Apache Ranger 0.7.0 to 1.2.0 is vulnerable to a cross-site scripting issue. Upgrade to 2.0.0 or later version of Apache Ranger with the fix.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ranger:ranger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7.0'}, {'fixed': '2.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.2.0'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12397'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/RANGER/Vulnerabilities+found+in+Ranger'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ab2de1adad96f5dbd19d976b28715dfc60dbe75e82a74f48be8ef695@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/cbc6346708ef2b9ffb2555637311bf6294923c609c029389fa39de8f@%3Cdev.ranger.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/08/08/1'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-08-09T15:38:43Z', 'nvd_published_at': '2019-08-08T18:15:00Z'}" +1.4.0,GHSA-mm7m-xg4h-6m52,2021-05-05T22:59:41Z,2019-08-06T01:43:35Z,,['CVE-2019-10094'],Allocation of Resources Without Limits or Throttling in Apache Tika,"A carefully crafted package/compressed file that, when unzipped/uncompressed yields the same file (a quine), causes a StackOverflowError in Apache Tika's RecursiveParserWrapper in versions 1.7-1.21. Apache Tika users should upgrade to 1.22 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tika:tika-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7'}, {'fixed': '1.22'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10094'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/39723d8227b248781898c200aa24b154683673287b150a204b83787d@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/da9ee189d1756f8508d0f2386d8e25aca5a6df541739829232be8a94@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/fb6c84fd387de997e5e366d50b0ca331a328c466432c80f8c5eed33d@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/fe876a649d9d36525dd097fe87ff4dcb3b82bb0fbb3a3d71fb72ef61@%3Cdev.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}]","{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-06T01:41:24Z', 'nvd_published_at': '2019-08-02T19:15:00Z'}" +1.4.0,GHSA-8cpw-73f2-w58m,2021-08-17T22:13:00Z,2019-08-27T17:38:33Z,,['CVE-2019-15482'],Cross-Site Scripting in selectize-plugin-a11y,"Versions of `selectize-plugin-a11y ` prior to 1.1.0 are vulnerable to Cross-Site Scripting. The `accessibility.liveRegion.speak` function does not sanitize the `msg` variable before rendering it as HTML. If this variable is controlled by user input it allows attackers to execute arbitrary JavaScript in a victim's browser. + + +## Recommendation + +Upgrade to version 1.1.0 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'selectize-plugin-a11y'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15482'}, {'type': 'WEB', 'url': 'https://github.com/SLMNBJ/selectize-plugin-a11y/pull/9'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1145'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/selectize-plugin-a11y/v/1.1.0'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-08-27T17:01:49Z', 'nvd_published_at': None}" +1.4.0,GHSA-c4qh-4vgv-qc6g,2023-09-05T13:07:51Z,2019-08-06T01:43:29Z,,['CVE-2019-14232'],Django Denial-of-service in django.utils.text.Truncator,"An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. If `django.utils.text.Truncator`'s chars() and words() methods were passed the html=True argument, they were extremely slow to evaluate certain inputs due to a catastrophic backtracking vulnerability in a regular expression. The chars() and words() methods are used to implement the truncatechars_html and truncatewords_html template filters, which were thus vulnerable.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.23'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.11'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14232'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/dev/releases/security/'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-db/tree/main/vulns/django/PYSEC-2019-11.yaml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/django-announce/jIoju2-KLDs'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Aug/15'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202004-17'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190828-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4498'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2019/aug/01/security-releases/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-06T01:34:33Z', 'nvd_published_at': None}" +1.4.0,GHSA-hfmf-q43v-2ffj,2021-08-17T22:08:26Z,2019-08-23T21:42:18Z,,['CVE-2019-9154'],Improper Key Verification in openpgp,"Versions of `openpgp` prior to 4.2.0 are vulnerable to Improper Key Verification. The OpenPGP standard allows signature packets to have subpackets which may be hashed or unhashed. Unhashed subpackets are not cryptographically protected and cannot be trusted. The `openpgp` package does not verify whether a subpacket is hashed. Furthermore, due to the order of parsing a signature packet information from unhashed subpackets overwrites information from hashed subpackets. This may allow an attacker to modify the contents of a key certification signature or revocation signature. Doing so could convince a victim to use an obsolete key for encryption. An attack require a victim to import a manipulated key or update an existing key with a manipulated version. + + +## Recommendation + +Upgrade to version 4.2.0 or later. +If you are upgrading from a version <4.0.0 it is highly recommended to read the `High-Level API Changes` section of the `openpgp` 4.0.0 release: https://github.com/openpgpjs/openpgpjs/releases/tag/v4.0.0","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'openpgp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.2'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-9154'}, {'type': 'WEB', 'url': 'https://github.com/openpgpjs/openpgpjs/pull/797'}, {'type': 'WEB', 'url': 'https://github.com/openpgpjs/openpgpjs/pull/797/commits/47138eed61473e13ee8f05931119d3e10542c5e1'}, {'type': 'WEB', 'url': 'https://github.com/openpgpjs/openpgpjs/releases/tag/v4.2.0'}, {'type': 'WEB', 'url': 'https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-openpgp-js/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-OPENPGP-460247'}, {'type': 'WEB', 'url': 'https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/Mailvelope_Extensions/Mailvelope_Extensions_pdf.html#download=1'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1161'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/154191/OpenPGP.js-4.2.0-Signature-Bypass-Invalid-Curve-Attack.html'}]","{'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-23T21:41:08Z', 'nvd_published_at': None}" +1.4.0,GHSA-qwqc-28w3-fww6,2021-08-17T22:06:12Z,2019-08-23T21:42:20Z,,['CVE-2019-9153'],Message Signature Bypass in openpgp,"Versions of `openpgp` prior to 4.2.0 are vulnerable to Message Signature Bypass. The package fails to verify that a message signature is of type `text`. This allows an attacker to to construct a message with a signature type that only verifies subpackets without additional input (such as `standalone` or `timestamp`). For example, an attacker that captures a `standalone` signature packet from a victim can construct arbitrary signed messages that would be verified correctly. + + +## Recommendation + +Upgrade to version 4.2.0 or later. +If you are upgrading from a version <4.0.0 it is highly recommended to read the `High-Level API Changes` section of the `openpgp` 4.0.0 release: https://github.com/openpgpjs/openpgpjs/releases/tag/v4.0.0","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'openpgp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.2'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-9153'}, {'type': 'WEB', 'url': 'https://github.com/openpgpjs/openpgpjs/pull/797/commits/327d3e5392a6f59a4270569d200c7f7a2bfc4cbc'}, {'type': 'WEB', 'url': 'https://github.com/openpgpjs/openpgpjs/pull/816'}, {'type': 'WEB', 'url': 'https://github.com/openpgpjs/openpgpjs/releases/tag/v4.2.0'}, {'type': 'WEB', 'url': 'https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-openpgp-js/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-OPENPGP-460248'}, {'type': 'WEB', 'url': 'https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/Mailvelope_Extensions/Mailvelope_Extensions_pdf.html#download=1'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1160'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/154191/OpenPGP.js-4.2.0-Signature-Bypass-Invalid-Curve-Attack.html'}]","{'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-23T21:40:54Z', 'nvd_published_at': None}" +1.4.0,GHSA-x65c-4fgj-5fc3,2021-08-17T21:58:07Z,2019-08-23T00:05:00Z,,['CVE-2019-14653'],Cross-site Scripting in pandao,pandao Editor.md 1.5.0 allows XSS via an attribute of an ABBR or SUP element.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'editor.md'}, 'versions': ['1.5.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14653'}, {'type': 'WEB', 'url': 'https://github.com/pandao/editor.md/issues/715'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-08-22T15:07:56Z', 'nvd_published_at': '2019-08-03T14:15:00Z'}" +1.4.0,GHSA-h5jv-4p7w-64jg,2023-09-05T13:10:54Z,2019-08-06T01:43:33Z,,['CVE-2019-14233'],Django Denial-of-service in strip_tags(),"An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. Due to the behaviour of the underlying HTMLParser, django.utils.html.strip_tags would be extremely slow to evaluate certain inputs containing large sequences of nested incomplete HTML entities.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.23'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.11'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14233'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/dev/releases/security/'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/django-announce/jIoju2-KLDs'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STVX7X7IDWAH5SKE6MBMY3TEI6ZODBTK/'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Aug/15'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202004-17'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190828-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4498'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2019/aug/01/security-releases/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-06T01:36:05Z', 'nvd_published_at': '2019-08-02T15:15:00Z'}" +1.4.0,GHSA-77jf-fjjf-xcww,2021-07-27T21:15:18Z,2019-08-23T21:42:22Z,,['CVE-2019-9155'],Invalid Curve Attack in openpgp,"Versions of `openpgp` prior to 4.3.0 are vulnerable to an Invalid Curve Attack. The package's implementation of ECDH fails to verify the validity of the communication partner's public key. The package calculates the resulting key secret based on an altered curve instead of the specified elliptic curve. Attackers may exfiltrate the victim's private key by choosing the altered curve. An attack requires the attacker being able to initiate message decryption and record the result. Furthermore the victim's key must offer an ECDH public key. + + +## Recommendation + +Upgrade to version 4.3.0 or later. +If you are upgrading from a version <4.0.0 it is highly recommended to read the `High-Level API Changes` section of the `openpgp` 4.0.0 release: https://github.com/openpgpjs/openpgpjs/releases/tag/v4.0.0","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'openpgp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-9155'}, {'type': 'WEB', 'url': 'https://github.com/openpgpjs/openpgpjs/pull/853'}, {'type': 'WEB', 'url': 'https://github.com/openpgpjs/openpgpjs/pull/853/commits/7ba4f8c655e7fd7706e8d7334e44b40fdf56c43e'}, {'type': 'WEB', 'url': 'https://github.com/openpgpjs/openpgpjs/releases/tag/v4.3.0'}, {'type': 'WEB', 'url': 'https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-openpgp-js/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-OPENPGP-460225'}, {'type': 'WEB', 'url': 'https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/Mailvelope_Extensions/Mailvelope_Extensions_pdf.html#download=1'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1159'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/154191/OpenPGP.js-4.2.0-Signature-Bypass-Invalid-Curve-Attack.html'}]","{'cwe_ids': ['CWE-327'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-08-23T21:39:35Z', 'nvd_published_at': '2019-08-22T16:15:00Z'}" +1.4.0,GHSA-jp6r-xcjj-5h7r,2021-08-17T22:11:11Z,2019-08-27T17:36:32Z,,['CVE-2019-15532'],Cross-Site Scripting in cyberchef,"Versions of `cyberchef` prior to 8.31.3 are vulnerable to Cross-Site Scripting. In `Text Encoding Brute Force` the table rows are created by concatenating the `value` variable unsanitized in the HTML code. If this variable is controlled by user input it allows attackers to execute arbitrary JavaScript in a victim's browser. + + +## Recommendation + +Upgrade to version 8.31.3 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'cyberchef'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.31.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15532'}, {'type': 'WEB', 'url': 'https://github.com/gchq/CyberChef/issues/539'}, {'type': 'WEB', 'url': 'https://github.com/gchq/CyberChef/issues/544'}, {'type': 'WEB', 'url': 'https://github.com/gchq/CyberChef/commit/01f0625d6a177f9c5df9281f12a27c814c2d8bcf'}, {'type': 'WEB', 'url': 'https://github.com/gchq/CyberChef/compare/v8.31.1...v8.31.2'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CYBERCHEF-460296'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1149'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-08-27T15:50:14Z', 'nvd_published_at': None}" +1.4.0,GHSA-xjjg-vmw6-c2p9,2021-08-17T22:17:50Z,2019-08-27T17:44:33Z,,['CVE-2019-10751'],Open Redirect in httpie,"All versions of the HTTPie package prior to version 1.0.3 are vulnerable to Open Redirect that allows an attacker to write an arbitrary file with supplied filename and content to the current directory, by redirecting a request from HTTP to a crafted URL pointing to a server in his or hers control.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'httpie'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10751'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PYTHON-HTTPIE-460107'}]","{'cwe_ids': ['CWE-601'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-27T17:27:00Z', 'nvd_published_at': '2019-08-23T17:15:00Z'}" +1.4.0,GHSA-vx6v-2rg6-865h,2023-04-20T21:51:43Z,2019-08-27T17:39:33Z,,['CVE-2019-15486'],Cross-site Scripting in django-js-reverse,django-js-reverse (aka Django JS Reverse) before 0.9.1 has XSS via js_reverse_inline.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'django-js-reverse'}, 'ecosystem_specific': {'affected_functions': ['django_js_reverse.core.generate_js']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15486'}, {'type': 'WEB', 'url': 'https://github.com/ierror/django-js-reverse/pull/81'}, {'type': 'WEB', 'url': 'https://github.com/ierror/django-js-reverse/commit/78d6aff2276f2d341f643b095515f8aaba5e67c2'}, {'type': 'WEB', 'url': 'https://github.com/ierror/django-js-reverse/commit/a3b57d1e4424e2fadabcd526d170c4868d55159c'}, {'type': 'PACKAGE', 'url': 'https://github.com/ierror/django-js-reverse'}, {'type': 'WEB', 'url': 'https://github.com/ierror/django-js-reverse/compare/v0.9.0...v0.9.1'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-08-27T17:04:03Z', 'nvd_published_at': '2019-08-23T13:15:00Z'}" +1.4.0,GHSA-mr7p-25v2-35wr,2023-08-30T19:56:34Z,2019-08-23T21:53:51Z,,['CVE-2019-14751'],NLTK Vulnerable To Path Traversal,"NLTK Downloader before 3.4.5 is vulnerable to a directory traversal, allowing attackers to write arbitrary files via a `../` (dot dot slash) in an NLTK package (ZIP archive) that is mishandled during extraction.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'nltk'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14751'}, {'type': 'WEB', 'url': 'https://github.com/nltk/nltk/commit/f59d7ed8df2e0e957f7f247fe218032abdbe9a10'}, {'type': 'WEB', 'url': 'https://github.com/mssalvatore/CVE-2019-14751_PoC'}, {'type': 'WEB', 'url': 'https://github.com/nltk/nltk/blob/3.4.5/ChangeLog'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QI4IJGLZQ5S7C5LNRNROHAO2P526XE3D/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZGZSSEJH7RHH3RBUEVWWYT75QU67J7SE/'}, {'type': 'WEB', 'url': 'https://salvatoresecurity.com/zip-slip-in-nltk-cve-2019-14751/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00054.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00001.html'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-23T21:48:38Z', 'nvd_published_at': '2019-08-22T16:15:00Z'}" +1.4.0,GHSA-3gx7-xhv7-5mx3,2021-08-31T21:04:30Z,2019-08-26T16:59:56Z,,['CVE-2019-15657'],Arbitrary Code Execution in eslint-utils,"Versions of `eslint-utils` >=1.2.0 or <1.4.1 are vulnerable to Arbitrary Code Execution. The `getStaticValue` does not properly sanitize user input allowing attackers to supply malicious input that executes arbitrary code during the linting process. The `getStringIfConstant` and `getPropertyName` functions are not affected. + + +## Recommendation + +Upgrade to version 1.4.1 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'eslint-utils'}, 'ecosystem_specific': {'affected_functions': ['eslint-utils.getStaticValue']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.4.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/mysticatea/eslint-utils/security/advisories/GHSA-3gx7-xhv7-5mx3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15657'}, {'type': 'WEB', 'url': 'https://github.com/mysticatea/eslint-utils/commit/08158db1c98fd71cf0f32ddefbc147e2620e724c'}, {'type': 'WEB', 'url': 'https://eslint.org/blog/2019/08/eslint-v6.2.1-released'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3gx7-xhv7-5mx3'}, {'type': 'PACKAGE', 'url': 'https://github.com/mysticatea/eslint-utils'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1118'}]","{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:55:11Z', 'nvd_published_at': None}" +1.4.0,GHSA-cr5j-953j-xw5p,2023-08-28T14:05:24Z,2019-08-19T19:27:23Z,,['CVE-2019-5477'],Nokogiri Command Injection Vulnerability,A command injection vulnerability in Nokogiri v1.10.3 and earlier allows commands to be executed in a subprocess via Ruby's `Kernel.open` method. Processes are vulnerable only if the undocumented method `Nokogiri::CSS::Tokenizer#load_file` is being called with unsafe user input as the filename. This vulnerability appears in code generated by the Rexical gem versions v1.0.6 and earlier. Rexical is used by Nokogiri to generate lexical scanner code for parsing CSS queries. The underlying vulnerability was addressed in Rexical v1.0.7 and Nokogiri upgraded to this version of Rexical in Nokogiri v1.10.4.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rexical'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5477'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/issues/1915'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/commit/5d30128343573a9428c86efc758ba2c66e9f12dc'}, {'type': 'WEB', 'url': 'https://github.com/tenderlove/rexical/commit/a652474dbc66be350055db3e8f9b3a7b3fd75926'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/650835'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2019-5477.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rexical/CVE-2019-5477.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/sparklemotion/nokogiri'}, {'type': 'WEB', 'url': 'https://github.com/tenderlove/rexical/blob/master/CHANGELOG.rdoc'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/09/msg00027.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/10/msg00018.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/10/msg00019.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202006-05'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4175-1/'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-08-19T19:26:57Z', 'nvd_published_at': '2019-08-16T16:15:00Z'}" +1.4.0,GHSA-8rf6-w2mx-4xjh,2021-12-03T14:37:54Z,2019-08-19T23:45:47Z,2019-08-20T14:13:17Z,['CVE-2019-15149'],TODO,"** DISPUTED ** core.py in Mitogen before 0.2.8 has a typo that drops the unidirectional-routing protection mechanism in the case of a child that is initiated by another child. The Ansible extension is unaffected. NOTE: the vendor disputes this issue because it is exploitable only in conjunction with hypothetical other factors, i.e., an affected use case within a library caller, and a bug in the message receiver policy code that led to reliance on this extra protection mechanism.",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'mitogen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15149'}, {'type': 'WEB', 'url': 'https://github.com/dw/mitogen/commit/5924af1566763e48c42028399ea0cd95c457b3dc'}, {'type': 'PACKAGE', 'url': 'https://github.com/dw/mitogen'}, {'type': 'WEB', 'url': 'https://mitogen.networkgenomics.com/changelog.html#v0-2-8-2019-08-18'}]","{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-08-19T23:45:21Z', 'nvd_published_at': '2019-08-18T20:15:00Z'}" +1.4.0,GHSA-fhjf-83wg-r2j9,2021-07-27T21:26:01Z,2019-08-27T17:42:33Z,,['CVE-2019-10746'],Prototype Pollution in mixin-deep,"Versions of `mixin-deep` prior to 2.0.1 or 1.3.2 are vulnerable to Prototype Pollution. The `mixinDeep` function fails to validate which Object properties it updates. This allows attackers to modify the prototype of Object, causing the addition or modification of an existing property on all objects. + + + + +## Recommendation + +If you are using `mixin-deep` 2.x, upgrade to version 2.0.1 or later. +If you are using `mixin-deep` 1.x, upgrade to version 1.3.2 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'mixin-deep'}, 'ecosystem_specific': {'affected_functions': ['mixin-deep']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'mixin-deep'}, 'ecosystem_specific': {'affected_functions': ['mixin-deep']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.1'}]}], 'versions': ['2.0.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10746'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/mixin-deep/commit/8f464c8ce9761a8c9c2b3457eaeee9d404fa7af9'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/mixin-deep/commit/90ee1fab375fccfd9b926df718243339b4976d50'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BFNIVG2XYFPZJY3DYYBJASZ7ZMKBMIJT/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UXRA365KZCUNXMU3KDH5JN5BEPNIGUKC/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-MIXINDEEP-450212'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1013'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}]","{'cwe_ids': ['CWE-88'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-08-27T17:21:43Z', 'nvd_published_at': '2019-08-23T17:15:00Z'}" +1.4.0,GHSA-5q54-8p9j-x74j,2021-08-17T21:59:57Z,2019-08-23T00:05:03Z,,['CVE-2019-14517'],Cross-site Scripting in pandao editor.md,pandao Editor.md 1.5.0 allows XSS via the Javascript: string.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'editor.md'}, 'versions': ['1.5.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14517'}, {'type': 'WEB', 'url': 'https://github.com/pandao/editor.md/issues/709'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-08-22T15:08:06Z', 'nvd_published_at': '2019-08-01T23:15:00Z'}" +1.4.0,GHSA-fp5j-3fpf-mhj5,2021-07-27T20:59:48Z,2019-08-08T15:18:22Z,,['CVE-2019-10099'],Sensitive data written to disk unencrypted in Spark,"Prior to Spark 2.3.3, in certain situations Spark would write user data to local disk unencrypted, even if spark.io.encryption.enabled=true. This includes cached blocks that are fetched to disk (controlled by spark.maxRemoteBlockSizeFetchToMem); in SparkR, using parallelize; in Pyspark, using broadcast and parallelize; and use of python udfs.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-core_2.11'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10099'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/c2a39c207421797f82823a8aff488dcd332d9544038307bf69a2ba9e@%3Cuser.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra216b7b0dd82a2c12c2df9d6095e689eb3f3d28164e6b6587da69fae@%3Ccommits.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rabe1d47e2bf8b8f6d9f3068c8d2679731d57fa73b3a7ed1fa82406d2@%3Cissues.spark.apache.org%3E'}]","{'cwe_ids': ['CWE-312'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-08T15:16:27Z', 'nvd_published_at': '2019-08-07T17:15:00Z'}" +1.4.0,GHSA-3j5x-7ccf-ppgm,2023-09-01T19:51:44Z,2019-08-21T16:15:33Z,,['CVE-2018-20858'],Cross-site scripting in recommender-xblock,"Recommender before 1.3.1 allows XSS. It is possible for a learner to craft a fake resource to recommender, that includes script which could possibly steal credentials from staff if they are lured into viewing the recommended resource.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'recommender-xblock'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20858'}, {'type': 'WEB', 'url': 'https://github.com/edx/RecommenderXBlock/pull/2'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/openedx-announce/SF8Sn6MuUTg'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-08-21T16:05:04Z', 'nvd_published_at': '2019-08-09T16:15:00Z'}" +1.4.0,GHSA-4g88-fppr-53pp,2021-08-17T22:17:11Z,2019-08-27T17:43:33Z,,['CVE-2019-10747'],Prototype Pollution in set-value,"Versions of `set-value` prior to 3.0.1 or 2.0.1 are vulnerable to Prototype Pollution. The `set` function fails to validate which Object properties it updates. This allows attackers to modify the prototype of Object, causing the addition or modification of an existing property on all objects. + + + + +## Recommendation + +If you are using `set-value` 3.x, upgrade to version 3.0.1 or later. +If you are using `set-value` 2.x, upgrade to version 2.0.1 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'set-value'}, 'ecosystem_specific': {'affected_functions': ['set-value']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'set-value'}, 'ecosystem_specific': {'affected_functions': ['set-value']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.1'}]}], 'versions': ['3.0.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10747'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/set-value/commit/95e9d9923f8a8b4a01da1ea138fcc39ec7b6b15f'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/set-value/commit/cb12f14955dde6e61829d70d1851bfea6a3c31ad'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b46f35559c4a97cf74d2dd7fe5a48f8abf2ff37f879083920af9b292@%3Cdev.drat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3EJ36KV6MXQPUYTFCCTDY54E5Y7QP3AV/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E3HNLQZQINMZK6GYB2UTKK4VU7WBV2OT/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SETVALUE-450213'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1012'}]","{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-08-27T17:24:50Z', 'nvd_published_at': None}" +1.4.0,GHSA-gwp4-hfv6-p7hw,2023-09-13T17:26:54Z,2019-08-01T19:18:06Z,,['CVE-2019-14439'],Deserialization of untrusted data in FasterXML jackson-databind,"A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9.2, 2.8.11.14, 2.7.9.6, and 2.6.7.3. This occurs when Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the logback jar in the classpath.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.9.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.11.14'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.9.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.7.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14439'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2389'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/ad418eeb974e357f2797aef64aa0e3ffaaa6125b'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3200'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/compare/jackson-databind-2.9.9.1...jackson-databind-2.9.9.2'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/0d4b630d9ee724aee50703397d9d1afa2b2befc9395ba7797d0ccea9@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2d2a76440becb610b9a9cb49b15eac3934b02c2dbcaacde1000353e4@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/34717424b4d08b74f65c09a083d6dd1cb0763f37a15d6de135998c1d@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/3f99ae8dcdbd69438cb733d745ee3ad5e852068490719a66509b4592@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/56c8042873595b8c863054c7bfccab4bf2c01c6f5abedae249d914b9@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5ecc333113b139429f4f05000d4aa2886974d4df3269c1dd990bb319@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5fc0e16b7af2590bf1e97c76c136291c4fdb244ee63c65c485c9a7a1@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/87e46591de8925f719664a845572d184027258c5a7af0a471b53c77b@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/940b4c3fef002461b89a050935337056d4a036a65ef68e0bbd4621ef@%3Cdev.struts.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ee0a051428d2c719acfa297d0854a189ea5e284ef3ed491fa672f4be@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/08/msg00011.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OVRZDN2T6AZ6DJCZJ3VSIQIVHBVMVWBL/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TXRVXNRFHJSQWFHPRJQRI5UPMZ63B544/'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Oct/6'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190814-0001/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4542'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-01T15:37:50Z', 'nvd_published_at': '2019-07-30T11:15:00Z'}" +1.4.0,GHSA-7vvr-h4p5-m7fh,2023-08-07T15:09:13Z,2019-07-26T16:10:20Z,,['CVE-2018-19801'],Aubio is vulnerable to a NULL pointer dereference in new_aubio_filterbank,aubio v0.4.0 to v0.4.8 has a NULL pointer dereference in `new_aubio_filterbank` via invalid n_filters.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'aubio'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.0'}, {'fixed': '0.4.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19801'}, {'type': 'PACKAGE', 'url': 'https://github.com/aubio/aubio'}, {'type': 'WEB', 'url': 'https://github.com/aubio/aubio/blob/0.4.9/ChangeLog'}]","{'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-07-25T16:08:17Z', 'nvd_published_at': '2019-06-07T17:29:00Z'}" +1.4.0,GHSA-c6jq-h4jp-72pr,2023-08-07T14:56:40Z,2019-07-26T16:10:25Z,,['CVE-2018-19802'],Aubio is vulnerable to a NULL pointer dereference in new_aubio_notes function,aubio v0.4.0 to v0.4.8 has a new_aubio_onset NULL pointer dereference in `new_aubio_notes` function within `src/notes/notes.c`.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'aubio'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.0'}, {'fixed': '0.4.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19802'}, {'type': 'WEB', 'url': 'https://github.com/aubio/aubio/commit/c5ee1307bdc004e43302abeca1802c2692b33a8e'}, {'type': 'PACKAGE', 'url': 'https://github.com/aubio/aubio'}, {'type': 'WEB', 'url': 'https://github.com/aubio/aubio/blob/0.4.9/ChangeLog'}]","{'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-07-25T16:08:26Z', 'nvd_published_at': '2019-06-07T17:29:00Z'}" +1.4.0,GHSA-9ccv-p7fg-m73x,2023-09-01T19:56:21Z,2019-07-18T15:38:41Z,,['CVE-2019-1010017'],XML Injection in python-libnmap,"### Description + +python-libnmap is affected by a Billion-Laughs -style XML injection vulnerability. + +### PoC + +```python +ty = NmapParser() + +payload = """""" + + + + + +]> +&lol3; +"""""" + +ty.parse(payload) +```","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'python-libnmap'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010017'}, {'type': 'WEB', 'url': 'https://github.com/savon-noir/python-libnmap/issues/87'}, {'type': 'WEB', 'url': 'https://github.com/savon-noir/python-libnmap/commit/71b707758851e4b622f87d9a73266e06f60aeab4'}]","{'cwe_ids': ['CWE-91'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-07-18T15:38:22Z', 'nvd_published_at': '2019-07-15T03:15:00Z'}" +1.4.0,GHSA-j3jp-gvr5-7hwq,2022-09-17T00:18:27Z,2019-07-30T20:47:25Z,,['CVE-2019-13611'],python-engineio vulnerable to Cross-Site Request Forgery (CSRF) ,"## WebSocket cross-origin vulnerability + +### Impact +This is a Cross-Site Request Forgery (CSRF) vulnerability. It affects Socket.IO and Engine.IO web servers that authenticate clients using cookies. + +### Patches +python-engineio version 3.9.0 patches this vulnerability by adding server-side Origin header checks. + +### Workarounds +Do not use cookies for client authentication, or else add a CSRF token to the connection URL. + +### References +https://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF) +https://www.christian-schneider.net/CrossSiteWebSocketHijacking.html + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [python-engineio](http://github.com/miguelgrinberg/python-engineio)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'python-engineio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.8.2'}}]","[{'type': 'WEB', 'url': 'https://github.com/miguelgrinberg/python-engineio/security/advisories/GHSA-j3jp-gvr5-7hwq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-13611'}, {'type': 'WEB', 'url': 'https://github.com/miguelgrinberg/python-engineio/issues/128'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j3jp-gvr5-7hwq'}, {'type': 'PACKAGE', 'url': 'https://github.com/miguelgrinberg/python-engineio'}]","{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:41:53Z', 'nvd_published_at': None}" +1.4.0,GHSA-ffq8-576r-v26g,2023-08-08T09:11:04Z,2019-07-05T21:11:05Z,,['CVE-2016-6581'],HPACK Denial of Service vulnerability (HPACK Bomb),"A HTTP/2 implementation built using any version of the Python HPACK library between v1.0.0 and v2.2.0 could be targeted for a denial of service attack, specifically a so-called ""HPACK Bomb"" attack. This attack occurs when an attacker inserts a header field that is exactly the size of the HPACK dynamic header table into the dynamic header table. The attacker can then send a header block that is simply repeated requests to expand that field in the dynamic table. This can lead to a gigantic compression ratio of 4,096 or better, meaning that 16kB of data can decompress to 64MB of data on the target machine.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'hpack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '2.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6581'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-ffq8-576r-v26g'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-hyper/hpack'}, {'type': 'WEB', 'url': 'http://python-hyper.org/projects/hpack/en/stable/security/CVE-2016-6581.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/92315'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:34:33Z', 'nvd_published_at': None}" +1.4.0,GHSA-rqp5-pg7w-832p,2023-08-25T21:06:23Z,2019-07-31T04:21:27Z,,['CVE-2019-14281'],datagrid contains code Injection backdoor,"The datagrid gem 1.0.6 for Ruby, as distributed on RubyGems.org, included a code-execution backdoor inserted by a third party.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'datagrid'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['1.0.6']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14281'}, {'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems.org/issues/2072'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/datagrid/CVE-2019-14281.yml'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/datagrid/versions'}]","{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-07-31T03:56:22Z', 'nvd_published_at': '2019-07-26T05:15:00Z'}" +1.4.0,GHSA-grmf-4fq6-2r79,2023-08-07T14:47:53Z,2019-07-26T16:10:28Z,,['CVE-2018-19800'],aubio Buffer Overflow vulnerability,aubio v0.4.0 to v0.4.8 has a Buffer Overflow in `new_aubio_tempo`.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'aubio'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.0'}, {'fixed': '0.4.9'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19800'}, {'type': 'WEB', 'url': 'https://github.com/aubio/aubio/commit/b1559f4c9ce2b304d8d27ffdc7128b6795ca82e5'}, {'type': 'PACKAGE', 'url': 'https://github.com/aubio/aubio'}, {'type': 'WEB', 'url': 'https://github.com/aubio/aubio/blob/0.4.9/ChangeLog'}]","{'cwe_ids': ['CWE-119'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-07-25T16:08:33Z', 'nvd_published_at': '2019-06-07T17:29:00Z'}" +1.4.0,GHSA-wg9m-gw3h-hg83,2023-07-05T20:09:55Z,2019-07-16T00:42:27Z,,['CVE-2019-13146'],field_test gem contains injection vulnerability,"The field_test gem 0.3.0 for Ruby has unvalidated input. A method call that is expected to return a value from a certain set of inputs can be made to return any input, which can be dangerous depending on how applications use it. If an application treats arbitrary variants as trusted, this can lead to a variety of potential vulnerabilities like SQL injection or cross-site scripting (XSS).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'field_test'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.0'}, {'fixed': '0.3.1'}]}], 'versions': ['0.3.0']}]","[{'type': 'WEB', 'url': 'https://github.com/ankane/field_test/issues/17'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/field_test/CVE-2019-13146.yml'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210115194802/http://www.securityfocus.com/bid/109114'}, {'type': 'ADVISORY', 'url': 'https://web.archive.org/web/20220526020623/https://nvd.nist.gov/vuln/detail/CVE-2019-13146'}]","{'cwe_ids': ['CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-07-15T23:48:32Z', 'nvd_published_at': '2019-07-09T18:15:00Z'}" +1.4.0,GHSA-hrj5-qp7x-rpg6,2023-01-25T22:46:17Z,2019-07-26T16:10:15Z,,['CVE-2019-1010191'],SQL Injection in marginalia,"marginalia < 1.6 is affected by SQL Injection. The impact is an injection of any SQL queries when a user controller argument is added as a component. This issue affects users that add a component that is user controller, for instance a parameter or a header. The attack vector is inputting of SQL to a vulnerable vector (header, http parameter, etc). The fixed version is 1.6.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'marginalia'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010191'}, {'type': 'WEB', 'url': 'https://github.com/basecamp/marginalia/pull/73'}, {'type': 'PACKAGE', 'url': 'https://github.com/basecamp/marginalia'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/marginalia/CVE-2019-1010191.yml'}]","{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-07-25T16:03:29Z', 'nvd_published_at': '2019-07-24T14:15:00Z'}" +1.4.0,GHSA-5p5w-j3g7-w4wv,2021-06-11T14:24:18Z,2019-07-05T21:11:18Z,,['CVE-2017-11429'],Authentication bypass via incorrect XML canonicalization and DOM traversal in saml2-js,"Versions of `saml2-js` prior to 1.12.4 or 2.0.2 are vulnerable to authentication bypass. + +The `saml2-js` library may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers. + +Security Assertion Markup Language (SAML) is an XML-based markup language for security assertions regarding authentication and permissions, most commonly used for single sign-on (SSO) services. + +Some XML DOM traversal and canonicalization APIs may be inconsistent in handling of comments within XML nodes. Incorrect use of these APIs by some SAML libraries results in incorrect parsing of the inner text of XML nodes such that any inner text after the comment is lost prior to cryptographically signing the SAML message. Text after the comment therefore has no impact on the signature on the SAML message. + +A remote attacker can modify SAML content for a SAML service provider without invalidating the cryptographic signature, which may allow attackers to bypass primary authentication for the affected SAML service provider + + +## Recommendation + +If you use 1.x upgrade to version 1.12.4 or greater +If you use 2.x upgrade to version 2.02 or greater","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'saml2-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'saml2-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-11429'}, {'type': 'WEB', 'url': 'https://duo.com/blog/duo-finds-saml-vulnerabilities-affecting-multiple-implementations'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5p5w-j3g7-w4wv'}, {'type': 'WEB', 'url': 'https://www.kb.cert.org/vuls/id/475445'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/567'}]","{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:16:53Z', 'nvd_published_at': None}" +1.4.0,GHSA-94hm-8q65-rmxm,2023-08-29T14:57:21Z,2019-07-05T21:11:43Z,,['CVE-2017-11430'],OmniAuth-SAML authentication bypass via incorrect XML canonicalization and DOM traversal,"OmniAuth OmniAuth-SAML 1.9.0 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'omniauth-saml'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-11430'}, {'type': 'WEB', 'url': 'https://duo.com/blog/duo-finds-saml-vulnerabilities-affecting-multiple-implementations'}, {'type': 'PACKAGE', 'url': 'https://github.com/omniauth/omniauth-saml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/omniauth-saml/CVE-2017-11430.yml'}, {'type': 'WEB', 'url': 'https://www.kb.cert.org/vuls/id/475445'}]","{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:27Z', 'nvd_published_at': None}" +1.4.0,GHSA-j657-59rv-qwm6,2022-12-03T04:03:29Z,2019-07-31T04:22:27Z,,['CVE-2019-5457'],Cross-Site Scripting in min-http-server,"All versions of `min-http-server` are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code. + + +## Recommendation + +No fix is currently available, consider using an alternative package until a fix is made available.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'min-http-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5457'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/570568'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1111'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-07-31T03:41:34Z', 'nvd_published_at': '2019-07-30T21:15:00Z'}" +1.4.0,GHSA-hf4p-jm7r-vjjj,2021-08-17T19:40:00Z,2019-07-26T16:10:39Z,,['CVE-2018-15890'],Deserialization of Untrusted Data in EthereumJ,"An issue was discovered in EthereumJ 1.8.2. There is Unsafe Deserialization in ois.readObject in mine/Ethash.java and decoder.readObject in crypto/ECKey.java. When a node syncs and mines a new block, arbitrary OS commands can be run on the server.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.ethereum:ethereumj-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.12.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-15890'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/ethereumj/issues/1161'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/ethereumj'}, {'type': 'WEB', 'url': 'https://github.com/frohoff/ysoserial/'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-07-26T09:08:20Z', 'nvd_published_at': '2019-06-20T17:15:00Z'}" +1.4.0,GHSA-mcg9-64cp-xwp7,2021-08-17T15:47:23Z,2019-07-05T21:08:09Z,,['CVE-2019-9827'],Server-Side Request Forgery in Hawt Hawtio,"Hawt Hawtio through 2.5.0 is vulnerable to SSRF, allowing a remote attacker to trigger an HTTP request from an affected server to an arbitrary host via the initial /proxy/ substring of a URI.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.hawt:hawtio-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-9827'}, {'type': 'WEB', 'url': 'https://www.ciphertechs.com/hawtio-advisory/'}]","{'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-07-05T20:47:20Z', 'nvd_published_at': '2019-07-03T21:15:00Z'}" +1.4.0,GHSA-h92m-42h4-82f6,2021-01-08T21:22:27Z,2019-07-05T21:06:58Z,,['CVE-2019-16791'],High severity vulnerability that affects postfix-mta-sts-resolver,"## Incorrect query parsing + +### Impact +All users of versions prior to 0.5.1 can receive incorrect response from daemon under rare conditions, rendering downgrade of effective STS policy. + +### Patches +Problem has been patched in version 0.5.1 + +### Workarounds +Users may remediate this vulnerability without upgrading by applying [these patches](https://gist.github.com/Snawoot/b9da85d6b26dea5460673b29df1adc6b) to older suppoorted versions. + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [postfix-mta-sts-resolver repo](https://github.com/Snawoot/postfix-mta-sts-resolver) +* Email me at [vladislav at vm-0 dot com](mailto:vladislav-ex-gh-advisory@vm-0.com)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'postfix-mta-sts-resolver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/Snawoot/postfix-mta-sts-resolver/security/advisories/GHSA-h92m-42h4-82f6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16791'}, {'type': 'WEB', 'url': 'https://gist.github.com/Snawoot/b9da85d6b26dea5460673b29df1adc6b'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h92m-42h4-82f6'}]","{'cwe_ids': ['CWE-757'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:39:43Z', 'nvd_published_at': None}" +1.4.0,GHSA-mfv8-q39f-mgfg,2021-04-12T21:50:38Z,2019-07-16T00:52:26Z,,['CVE-2019-1020005'],Cross-site Scripting in invenio-communities,"## Cross-Site Scripting (XSS) vulnerability in Jinja templates + +### Impact +A Cross-Site Scripting (XSS) vulnerability was discovered in two Jinja templates in the Invenio-Communities module. The vulnerability allows a user to create a new community and include script element tags inside the description and page fields. + +### Patches +The problem has been patched in v1.0.0a20. + +### For more information +If you have any questions or comments about this advisory: +* Email us at [info@inveniosoftware.org](mailto:info@inveniosoftware.org)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'invenio-communities'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0a20'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.0a19'}}]","[{'type': 'WEB', 'url': 'https://github.com/inveniosoftware/invenio-communities/security/advisories/GHSA-mfv8-q39f-mgfg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1020005'}, {'type': 'WEB', 'url': 'https://github.com/inveniosoftware/invenio-communities/commit/505da72c5acd7dfbd4148f884c73c9c3372b76f4'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mfv8-q39f-mgfg'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:46:01Z', 'nvd_published_at': None}" +1.4.0,GHSA-xx3h-j3cx-8qfj,2021-08-17T15:50:15Z,2019-07-05T21:08:20Z,,['CVE-2018-18326'],Insufficient Entropy in DotNetNuke,"DNN (aka DotNetNuke) 9.2 through 9.2.2 incorrectly converts encryption key source values, resulting in lower than expected entropy. NOTE: this issue exists because of an incomplete fix for CVE-2018-15812.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'DotNetNuke.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-18326'}, {'type': 'WEB', 'url': 'https://github.com/dnnsoftware/Dnn.Platform/releases'}, {'type': 'WEB', 'url': 'https://www.dnnsoftware.com/community/security/security-center'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/157080/DotNetNuke-Cookie-Deserialization-Remote-Code-Execution.html'}]","{'cwe_ids': ['CWE-331'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-07-05T20:59:37Z', 'nvd_published_at': '2019-07-03T17:15:00Z'}" +1.4.0,GHSA-j3g9-6fx5-gjv7,2021-08-17T15:49:30Z,2019-07-05T21:08:16Z,,['CVE-2018-18325'],Inadequate Encryption Strength in DotNetNuke,DNN (aka DotNetNuke) 9.2 through 9.2.2 uses a weak encryption algorithm to protect input parameters. NOTE: this issue exists because of an incomplete fix for CVE-2018-15811.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'DotNetNuke.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-18325'}, {'type': 'WEB', 'url': 'https://github.com/dnnsoftware/Dnn.Platform/releases'}, {'type': 'WEB', 'url': 'https://www.dnnsoftware.com/community/security/security-center'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/157080/DotNetNuke-Cookie-Deserialization-Remote-Code-Execution.html'}]","{'cwe_ids': ['CWE-326'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-07-05T20:59:02Z', 'nvd_published_at': '2019-07-03T17:15:00Z'}" +1.4.0,GHSA-7j93-2h6r-hm49,2023-02-01T09:19:41Z,2019-07-31T04:22:36Z,,['CVE-2019-5458'],Cross-Site Scripting in http-file-server,"All versions of `http-file-server` are vulnerable to Cross-Site Scripting (XSS). The package fails to sanitize filenames, allowing attackers to execute arbitrary JavaScript in the victim's browser through files with names containing malicious code. + + +## Recommendation + +No fix is currently available. Consider using an alternative package until a fix is made available.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'http-file-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5458'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/570563'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1110'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-07-31T03:41:20Z', 'nvd_published_at': '2019-07-30T21:15:00Z'}" +1.4.0,GHSA-jf85-cpcp-j695,2023-09-05T22:24:55Z,2019-07-10T19:45:23Z,,['CVE-2019-10744'],Prototype Pollution in lodash,"Versions of `lodash` before 4.17.12 are vulnerable to Prototype Pollution. The function `defaultsDeep` allows a malicious user to modify the prototype of `Object` via `{constructor: {prototype: {...}}}` causing the addition or modification of an existing property that will exist on all objects. + +## Recommendation + +Update to version 4.17.12 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'lodash'}, 'ecosystem_specific': {'affected_functions': ['lodash.defaultsDeep']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.17.12'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'lodash-es'}, 'ecosystem_specific': {'affected_functions': ['lodash.defaultsDeep']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.17.14'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'lodash-amd'}, 'ecosystem_specific': {'affected_functions': ['lodash.defaultsDeep']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.17.13'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'lodash.template'}, 'ecosystem_specific': {'affected_functions': ['lodash.defaultsDeep']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'lodash.merge'}, 'ecosystem_specific': {'affected_functions': ['lodash.defaultsDeep']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'lodash.mergewith'}, 'ecosystem_specific': {'affected_functions': ['lodash.defaultsDeep']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'lodash.defaultsdeep'}, 'ecosystem_specific': {'affected_functions': ['lodash.defaultsDeep']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10744'}, {'type': 'WEB', 'url': 'https://github.com/lodash/lodash/pull/4336'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3024'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20191004-0005/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-LODASH-450202'}, {'type': 'WEB', 'url': 'https://support.f5.com/csp/article/K47105354?utm_source=f5support&utm_medium=RSS'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1065'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}]","{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-07-10T19:41:11Z', 'nvd_published_at': '2019-07-26T00:15:00Z'}" +1.4.0,GHSA-vxh3-mvv7-265j,2021-04-12T21:46:33Z,2019-07-16T00:52:15Z,,['CVE-2019-1020003'],Cross-site scripting invenio-records,"## Cross-Site Scripting (XSS) vulnerability in administration interface + +### Impact +A Cross-Site Scripting (XSS) vulnerability was discovered when rendering JSON for a record in the administration interface. The vulnerability could be exploited by e.g. a user who had access to upload a new record, that an admin user would then later view in the admin interface. + +### Patches +All supported versions of Invenio-Records have been patched. You should upgrade to either v1.0.1, v1.1.1 or v1.2.2 + +### For more information +If you have any questions or comments about this advisory: +* Email us at [info@inveniosoftware.org](mailto:info@inveniosoftware.org)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'invenio-records'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'invenio-records'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.1'}]}], 'versions': ['1.1.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'invenio-records'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/inveniosoftware/invenio-records/security/advisories/GHSA-vxh3-mvv7-265j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1020003'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vxh3-mvv7-265j'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:55Z', 'nvd_published_at': None}" +1.4.0,GHSA-x64g-wjmw-w328,2023-02-09T19:26:17Z,2019-07-05T21:10:52Z,,['CVE-2015-5306'],Injection vulnerability that affects ironic-discoverd,"OpenStack Ironic Inspector (aka ironic-inspector or ironic-discoverd), when debug mode is enabled, might allow remote attackers to access the Flask console and execute arbitrary Python code by triggering an error.",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'python-ironic-inspector-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5306'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2015:1929'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2015:2685'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2015-5306'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/ironic-inspector/+bug/1506419'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1273698'}, {'type': 'WEB', 'url': 'https://opendev.org/openstack/ironic-inspector/commit/77d0052c5133034490386fbfadfdb1bdb49aa44f'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-2685.html'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:02:22Z', 'nvd_published_at': '2015-11-25T20:59:00Z'}" +1.4.0,GHSA-4g4c-8gqh-m4vm,2023-08-29T14:11:16Z,2019-07-16T00:41:55Z,,['CVE-2019-13589'],paranoid2 gem Code backdoor,"The paranoid2 gem 1.1.6 for Ruby, as distributed on RubyGems.org, included a code-execution backdoor inserted by a third party. The current version, without this backdoor, is 1.1.5.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'paranoid2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['1.1.6']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-13589'}, {'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems.org/issues/2051'}, {'type': 'PACKAGE', 'url': 'https://github.com/anjlab/paranoid2'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/paranoid2/CVE-2019-13589.yml'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/paranoid2/versions'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-RUBY-PARANOID2-451600'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/109281'}]","{'cwe_ids': ['CWE-829'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-07-15T23:22:39Z', 'nvd_published_at': '2019-07-14T16:15:00Z'}" +1.4.0,GHSA-5h5r-ffc4-c455,2023-03-06T22:51:34Z,2019-07-08T20:32:35Z,,['CVE-2019-13354'],strong_password Ruby gem malicious version causing Remote Code Execution vulnerability,"The strong_password gem 0.0.7 for Ruby, as distributed on RubyGems.org, included a code-execution backdoor inserted by a third party. Version 0.0.8 does not contain the backdoor.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'strong_password'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.7'}, {'fixed': '0.0.8'}]}], 'versions': ['0.0.7']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-13354'}, {'type': 'WEB', 'url': 'https://benjamin-bouchet.com/blog/vulnerabilite-dans-la-gem-strong_password-0-0-7/'}, {'type': 'PACKAGE', 'url': 'https://github.com/bdmac/strong_password'}, {'type': 'WEB', 'url': 'https://github.com/bdmac/strong_password/releases'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/strong_password/CVE-2019-13354.yml'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/strong_password/versions'}, {'type': 'WEB', 'url': 'https://withatwist.dev/strong-password-rubygem-hijacked.html'}]","{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-07-08T20:32:08Z', 'nvd_published_at': None}" +1.4.0,GHSA-6677-83pp-f862,2021-08-17T18:13:29Z,2019-07-16T00:42:02Z,,['CVE-2019-13506'],Cross-Site Scripting in @nuxt/devalue,"Versions of `@nuxt/devalue` prior to 1.2.3 are vulnerable to Cross-Site Scripting. Due to insufficient input sanitization attacker may inject arbitrary JavaScript code through object keys. + + +## Recommendation + +Upgrade to version 1.2.3 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': '@nuxt/devalue'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-13506'}, {'type': 'WEB', 'url': 'https://github.com/Rich-Harris/devalue/issues/19'}, {'type': 'WEB', 'url': 'https://github.com/nuxt/devalue/pull/8'}, {'type': 'WEB', 'url': 'https://github.com/nuxt/nuxt.js/commit/0d5dfe71917191c5b07f373896311f2d8f6b75be'}, {'type': 'WEB', 'url': 'https://github.com/nuxt/devalue/releases/tag/v1.2.3'}, {'type': 'WEB', 'url': 'https://github.com/nuxt/nuxt.js/compare/c0776eb...8d14cd4'}, {'type': 'WEB', 'url': 'https://github.com/nuxt/nuxt.js/releases/tag/v2.6.2'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/814'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-07-15T23:34:55Z', 'nvd_published_at': None}" +1.4.0,GHSA-8w3j-g983-8jh5,2021-06-11T15:37:15Z,2019-07-11T14:23:09Z,,['CVE-2019-1020013'],Sensitive Data Exposure in parse-server,"Versions of parse-server prior to 3.6.0 could allow an account enumeration attack via account linking. +`ParseError.ACCOUNT_ALREADY_LINKED(208)` was thrown BEFORE the AuthController checks the password and throws a `ParseError.SESSION_MISSING(206)` for Insufficient auth. An attacker can guess ids and get information about linked accounts/email addresses. + +### For more information +If you have any questions or comments about this advisory, +Open an issue in the [parse-server](https://github.com/parse-community/parse-server) +[Parse Community Vulnerability Disclosure Program](https://github.com/parse-community/parse-server/blob/master/SECURITY.md)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/security/advisories/GHSA-8w3j-g983-8jh5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1020013'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/commit/73b0f9a339b81f5d757725dc557955a7b670a3ec'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8w3j-g983-8jh5'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-PARSESERVER-455637'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1114'}, {'type': 'WEB', 'url': 'https://www.owasp.org/index.php/Testing_for_User_Enumeration_and_Guessable_User_Account_(OWASP-AT-002)#Description_of_the_Issue'}]","{'cwe_ids': ['CWE-209'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:26:49Z', 'nvd_published_at': None}" +1.4.0,GHSA-5frh-8cmj-gc59,2022-09-17T01:02:30Z,2019-07-17T19:14:18Z,,['CVE-2019-1167'],System.Management.Automation subject to bypass via script debugging,"## Microsoft Security Advisory CVE-2019-1167: Windows Defender Application Control Security Feature Bypass Vulnerability + +# Microsoft Security Advisory CVE-2019-1167: Windows Defender Application Control Security Feature Bypass Vulnerability + +## Executive Summary + +A security feature bypass vulnerability exists in Windows Defender Application Control (WDAC) which could allow an attacker to bypass WDAC enforcement. +An attacker who successfully exploited this vulnerability could circumvent PowerShell Core Constrained Language Mode on the machine. + + To exploit the vulnerability, +an attacker would first have access to the local machine where PowerShell is running in Constrained Language mode. +By doing that an attacker could leverage script debugging to abuse signed modules in an unintended way. + +The update addresses the vulnerability by correcting how PowerShell functions in Constrained Language Mode. +System administrators are advised to update PowerShell Core to an unaffected version (see [affected software](#user-content-affected-software).) + +## Discussion + +Please use PowerShell/PowerShell#TBD for discussion of this advisory. + +## Affected Software + +The vulnerability affects PowerShell Core prior to the following versions: + +| PowerShell Core Version | Fixed in | +|-------------------------|-------------------| +| 6.1 | 6.1.5 | +| 6.2 | 6.2.2 | + +## Advisory FAQ + +### How do I know if I am affected? + +If all of the following are true: + +1. Run `pwsh -v`, then, check the version in the table in [Affected Software](#user-content-affected-software) to see if your version of PowerShell Core is affected. +1. If you are running a version of PowerShell Core where the executable is not `pwsh` or `pwsh.exe`, then you are affected. This only existed for preview version of `6.0`. + +### How do I update to an unaffected version? + +Follow the instructions at [Installing PowerShell Core](https://docs.microsoft.com/en-us/powershell/scripting/setup/installing-powershell?view=powershell-6) to install the latest version of PowerShell Core. + +## Other Information + +### Reporting Security Issues + +If you have found a potential security issue in PowerShell Core, +please email details to secure@microsoft.com. + +### Support + +You can ask questions about this issue on GitHub in the PowerShell organization. +This is located at https://github.com/PowerShell/. +The Announcements repo (https://github.com/PowerShell/Announcements) +will contain this bulletin as an issue and will include a link to a discussion issue where you can ask questions. + +### What if the update breaks my script or module? + +You can uninstall the newer version of PowerShell Core and install the previous version of PowerShell Core. +This should be treated as a temporary measure. +Therefore, the script or module should be updated to work with the patched version of PowerShell Core. + +### Acknowledgments + +Microsoft recognizes the efforts of those in the security community who help us protect customers through coordinated vulnerability disclosure. + +See [acknowledgments](https://portal.msrc.microsoft.com/en-us/security-guidance/acknowledgments) for more information. + +### External Links + +[CVE-2019-1167](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1167) + +### Revisions + +V1.0 (July 16, 2019): Advisory published. + +*Version 1.0* +*Last Updated 2019-07-16*","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'System.Management.Automation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.2.0'}, {'fixed': '6.2.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Management.Automation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.0'}, {'fixed': '6.1.5'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/PowerShell/PowerShell/security/advisories/GHSA-5frh-8cmj-gc59'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1167'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5frh-8cmj-gc59'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1167'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:09:07Z', 'nvd_published_at': None}" +1.4.0,GHSA-94mf-xfg5-r247,2021-09-07T20:41:26Z,2019-07-16T00:52:10Z,,['CVE-2019-1020006'],Moderate severity vulnerability that affects invenio-app,"## APP_ALLOWED_HOSTS not always preventing host header injection + +### Impact +A possible host header injection attack have been identified in Invenio-App. For an attack to be possible, all conditions below must be met: + +1. Your webserver must have been configured to route all requests to your application. +2. You must have relied on ``APP_ALLOWED_HOSTS`` configuration variable to whitelist allowed host headers. +3. Flask's ``request.host`` must not have been evaluated during request handling. + +An example of a view which does not evalute ``request.host`` is a simple view using just ``url_for`` to generate an external URL (similar is possible when rendering just a Jinja template): + +```python +@app.route('/') +def index(): + return url_for('index_url', _external=True) +``` + +This happens, because Werkzeug's trusted host feature, which ``APP_ALLOWED_HOSTS`` rely on, does not check the the list of trusted hosts in it's routing system that ``url_for`` is relying on. + +### Patches +Invenio-App v1.0.6 and v1.1.1 fully fix the issue. + +Note, we strongly recommend (see [Securing your instance](https://invenio.readthedocs.io/en/latest/deployment/securing-your-instance.html#allowed-hosts)) that you never route requests to your application with a wrong host header. The ``APP_ALLOWED_HOSTS`` configuration variable exists as an extra protective measure because it is easy to misconfigure your web server to allow requests with any host header. + +### Workaround 1 - Configure your webserver + +You should ensure that you never route requests with a wrong host header to your application. The workaround depends on which web server you are using to proxy requests to your application. In general it involves ensuring that the web server has two virtual hosts defined: + +1. **Default virtual host**: a dummy default virtual host that by default is used unless the webserver can match the host header to another virtual host (i.e. a catch-all). +2. **Application virtual host**: the application virtual host responsible for proxing requests to the application, and configured to only reply to a whitelist of host headers. + +Note, for instance in Nginx if you only configure the application virtual host, by default, it will also act as the default virtual host despite you having configured a whitelist of host headers. + +Below is an example for Nginx. Note for clarity we have only included the virtual host for port 443, but this also extends to virtual hosts running on any other port. +``` +# etc/nginx/nginx.conf +http { + # ... + include /etc/nginx/conf.d/*.conf; +} +``` + +**Default virtual host** + +Notice, the ``server_name`` is ``_`` and the ``listen`` directive has it marked as ``default_server``. + +``` +# etc/nginx/conf.d/default.conf +server { + listen 443 default_server; + listen [::]:443 default_server; + server_name _; + + # ... + + return 301 https://www.example.com; +} +``` + +**Application virtual host** + +Notice, the ``server_name`` is set to the host header whitelist. + +``` +# etc/nginx/conf.d/app.conf +server { + listen 443; + listen [::]:443; + server_name www.example.com; + + # ... +} +``` + +### Workaround 2 - Include application snippet + +We strongly recommend that you use the method described in Workaround 1. + +If you are not able to upgrade to the patched versions of Invenio-App, you can include the following code snippet in your application to force evaluation of ``request.hosts``. + +```python +@app.before_request +def before_request(): + request.host +``` + +### For more information +If you have any questions or comments about this advisory: +* Email us at [info@inveniosoftware.org](mailto:info@inveniosoftware.org)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'invenio-app'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.6'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'invenio-app'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.1'}]}], 'versions': ['1.1.0']}]","[{'type': 'WEB', 'url': 'https://github.com/inveniosoftware/invenio-app/security/advisories/GHSA-94mf-xfg5-r247'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1020006'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-94mf-xfg5-r247'}, {'type': 'PACKAGE', 'url': 'https://github.com/inveniosoftware/invenio-app'}]","{'cwe_ids': ['CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:30Z', 'nvd_published_at': None}" +1.4.0,GHSA-7v35-qwwj-p98g,2022-11-17T18:10:27Z,2019-07-05T21:07:40Z,,['CVE-2019-9843'],Improper Restriction of XML External Entity Reference in DiffPlug Spotless,"In DiffPlug Spotless before 1.20.0 (library and Maven plugin) and before 3.20.0 (Gradle plugin), the XML parser would resolve external entities over both HTTP and HTTPS and didn't respect the resolveExternalEntities setting. For example, this allows disclosure of file contents to a MITM attacker if a victim performs a spotlessApply operation on an untrusted XML file.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.diffplug.spotless:spotless-plugin-gradle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.20.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.diffplug.spotless:spotless-maven-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.20.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-9843'}, {'type': 'WEB', 'url': 'https://github.com/diffplug/spotless/issues/358'}, {'type': 'WEB', 'url': 'https://github.com/diffplug/spotless/pull/369'}, {'type': 'PACKAGE', 'url': 'https://github.com/diffplug/spotless'}, {'type': 'WEB', 'url': 'https://github.com/diffplug/spotless/blob/master/plugin-gradle/CHANGES.md#version-3200---march-11th-2018-javadoc-jcenter'}, {'type': 'WEB', 'url': 'https://github.com/diffplug/spotless/blob/master/plugin-maven/CHANGES.md#version-1200---march-14th-2018-javadoc-jcenter'}]","{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-07-01T16:09:01Z', 'nvd_published_at': '2019-06-28T18:15:00Z'}" +1.4.0,GHSA-6r5x-hmgg-7h53,2019-12-20T02:08:50Z,2019-07-15T19:46:01Z,2019-07-15T19:46:01Z,[],Remote code execution in Handlebars.js,Handlebars.js before 4.1.0 has Remote Code Execution (RCE),[],"[{'package': {'ecosystem': 'npm', 'name': 'handlebars'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/wycats/handlebars.js/issues/1267#issue-187151586'}, {'type': 'WEB', 'url': 'https://github.com/wycats/handlebars.js/commit/edc6220d51139b32c28e51641fadad59a543ae57'}]","{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-07-03T20:19:30Z', 'nvd_published_at': None}" +1.4.0,GHSA-vg35-vc9f-q7x2,2022-03-22T18:19:03Z,2019-07-26T16:09:54Z,,['CVE-2019-1010268'],Improper Restriction of XML External Entity Reference in ladon,"Ladon since 0.6.1 (since ebef0aae48af78c159b6fce81bc6f5e7e0ddb059) is affected by: XML External Entity (XXE). The impact is: Information Disclosure, reading files and reaching internal network endpoints. The component is: SOAP request handlers. For instance: https://bitbucket.org/jakobsg/ladon/src/42944fc012a3a48214791c120ee5619434505067/src/ladon/interfaces/soap.py#lines-688. The attack vector is: Send a specially crafted SOAP call.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'ladon'}, 'ecosystem_specific': {'affected_functions': ['ladon.interfaces.soap.SOAPRequestHandler.parse_request']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.6.1'}, {'last_affected': '1.0.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010268'}, {'type': 'PACKAGE', 'url': 'https://bitbucket.org/jakobsg/ladon'}, {'type': 'WEB', 'url': 'https://bitbucket.org/jakobsg/ladon/pull-requests/9'}, {'type': 'WEB', 'url': 'https://bitbucket.org/jakobsg/ladon/src/42944fc012a3a48214791c120ee5619434505067/src/ladon/interfaces/soap.py#lines-688'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/43113'}]","{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-07-25T15:54:06Z', 'nvd_published_at': '2019-07-18T17:15:00Z'}" +1.4.0,GHSA-h582-2pch-3xv3,2023-09-05T12:46:17Z,2019-07-05T21:10:39Z,,['CVE-2015-5143'],Django Denial-of-service by filling session store,"The session backends in Django before 1.4.21, 1.5.x through 1.6.x, 1.7.x before 1.7.9, and 1.8.x before 1.8.3 allows remote attackers to cause a denial of service (session store consumption) via multiple requests with unique session keys.",[],"[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.21'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.7.9'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.0'}, {'fixed': '1.8.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5143'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h582-2pch-3xv3'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201510-06'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2015/jul/08/security-releases/'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172084.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2015-10/msg00043.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2015-10/msg00046.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-1678.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-1686.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2015/dsa-3305'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/75666'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1032820'}, {'type': 'WEB', 'url': 'http://www.ubuntu.com/usn/USN-2671-1'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:38:54Z', 'nvd_published_at': None}" +1.4.0,GHSA-4xcv-9jjx-gfj3,2021-08-17T15:44:45Z,2019-07-05T21:07:58Z,,[],Denial of Service in mem,"Versions of `mem` prior to 4.0.0 are vulnerable to Denial of Service (DoS). The package fails to remove old values from the cache even after a value passes its `maxAge` property. This may allow attackers to exhaust the system's memory if they are able to abuse the application logging. + + +## Recommendation + +Upgrade to version 4.0.0 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'mem'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/sindresorhus/mem/commit/da4e4398cb27b602de3bd55f746efa9b4a31702b'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1623744'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:mem:20180117'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1084'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-07-03T20:52:42Z', 'nvd_published_at': None}" +1.4.0,GHSA-hh56-x62g-gvhc,2021-08-17T19:04:59Z,2019-07-26T16:10:06Z,,['CVE-2019-1010113'],Cross-site scripting in CLEditor,Premium Software CLEditor 1.4.5 and earlier is affected by: Cross Site Scripting (XSS). The impact is: An attacker might be able to inject arbitrary html and script code into the web site. The component is: jQuery plug-in. The attack vector is: the victim must open a crafted href attribute of a link (A) element.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'CLEditor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010113'}, {'type': 'WEB', 'url': 'https://drive.google.com/drive/folders/1UxgdL8SJO6KKnG3bh0-LTl7C6i41VwoW?usp=sharing'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-07-25T15:56:08Z', 'nvd_published_at': '2019-07-19T16:15:00Z'}" +1.4.0,GHSA-r7j3-vvh2-xrpj,2023-01-25T20:10:32Z,2019-07-18T13:19:22Z,,['CVE-2019-13574'],OS Command Injection in MiniMagick,"In `lib/mini_magick/image.rb` in MiniMagick before 4.9.4, a fetched remote image filename could cause remote command execution because `Image.open` input is directly passed to `Kernel#open`, which accepts a `|` character followed by a command.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'mini_magick'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.9.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-13574'}, {'type': 'WEB', 'url': 'https://github.com/minimagick/minimagick/commit/4cd5081e58810d3394d27a67219e8e4e0445d851'}, {'type': 'WEB', 'url': 'https://benjamin-bouchet.com/blog/vulnerabilite-dans-la-gem-mini_magick-version-4-9-4/'}, {'type': 'PACKAGE', 'url': 'https://github.com/minimagick/minimagick'}, {'type': 'WEB', 'url': 'https://github.com/minimagick/minimagick/compare/d484786...293f9bb'}, {'type': 'WEB', 'url': 'https://github.com/minimagick/minimagick/releases/tag/v4.9.4'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/mini_magick/CVE-2019-13574.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/10/msg00007.html'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Jul/20'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4481'}]","{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-07-18T13:18:58Z', 'nvd_published_at': '2019-07-12T03:15:00Z'}" +1.4.0,GHSA-qpxp-5j56-gg3x,2023-08-08T16:12:35Z,2019-07-31T04:22:03Z,,['CVE-2018-20857'],samlr XML nodes comment attack,Zendesk Samlr before 2.6.2 allows an XML nodes comment attack such as a name_id node with user@example.com followed by ``. and then the attacker's domain name.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'samlr'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20857'}, {'type': 'WEB', 'url': 'https://github.com/zendesk/samlr/pull/29'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/samlr/CVE-2018-20857.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/zendesk/samlr'}, {'type': 'WEB', 'url': 'https://github.com/zendesk/samlr/compare/v2.6.1...v2.6.2'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-07-31T03:49:20Z', 'nvd_published_at': '2019-07-26T12:15:00Z'}" +1.4.0,GHSA-j9m2-6hq2-4r3c,2021-04-12T21:57:28Z,2019-07-16T00:52:22Z,,['CVE-2019-1020019'],Cross-site Scripting in invenio-previewer,"## Cross-Site Scripting (XSS) vulnerability in JSON, Markdown and iPython Notebook previewers + +### Impact +Several Cross-Site Scripting (XSS) vulnerabilities have been found in the JSON, Markdown and iPython Notebook previewers. The vulnerabilities would allow a malicous user to upload a JSON, Markdown or Notebook file with embedded scripts that would be executed by a victims browser. + +### Patches +Invenio-Previewer v1.0.0a12 fixes the issue. + +### Workarounds +You can remediate the vulnerability without upgrading by disabling the affected previewers. You do this by adding the following to your configuration: + +```python +PREVIEWER_PREFERENCE = [ + 'csv_dthreejs', + 'simple_image', + # 'json_prismjs', + 'xml_prismjs', + # 'mistune', + 'pdfjs', + # 'ipynb', + 'zip', +] +``` + +Afterwards, you should not be able to preview JSON, Markdown or iPython Notebook files. + +### For more information +If you have any questions or comments about this advisory: +* Email us at [info@inveniosoftware.org](mailto:info@inveniosoftware.org)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'invenio-previewer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0a12'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.0a11'}}]","[{'type': 'WEB', 'url': 'https://github.com/inveniosoftware/invenio-previewer/security/advisories/GHSA-j9m2-6hq2-4r3c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1020019'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j9m2-6hq2-4r3c'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:56Z', 'nvd_published_at': None}" +1.4.0,GHSA-x2fr-v8wf-8wwv,2023-01-24T14:59:07Z,2019-07-05T21:11:35Z,,['CVE-2017-11428'],Ruby-SAML Improper Authentication vulnerability,"OneLogin Ruby-SAML 1.6.0 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'ruby-saml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-11428'}, {'type': 'WEB', 'url': 'https://duo.com/blog/duo-finds-saml-vulnerabilities-affecting-multiple-implementations'}, {'type': 'WEB', 'url': 'https://www.kb.cert.org/vuls/id/475445'}]","{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:01:42Z', 'nvd_published_at': None}" +1.4.0,GHSA-mpf2-q34c-fc6j,2023-08-31T09:27:12Z,2019-07-22T14:53:58Z,,['CVE-2019-1010142'],Infinite Loop in scapy,scapy is affected by a Denial of Service vulnerability resulting in an infinite loop and resource consumption rendering the program unresponsive. The component is: `_RADIUSAttrPacketListField.getfield(self..)`. The attack vector is over the network or in a pcap. both work.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'scapy'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4-rc1'}, {'fixed': '2.4.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010142'}, {'type': 'WEB', 'url': 'https://github.com/secdev/scapy/pull/1409'}, {'type': 'WEB', 'url': 'https://github.com/secdev/scapy/pull/1409/files#diff-441eff981e466959968111fc6314fe93L1058'}, {'type': 'PACKAGE', 'url': 'https://github.com/secdev/scapy'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42NRPMC3NS2QVFNIXYP6WV2T3LMLLY7E/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T46XW4S5BCA3VV3JT3C5Q6LBEXSIACLN/'}, {'type': 'WEB', 'url': 'https://www.imperva.com/blog/scapy-sploit-python-network-tool-is-vulnerable-to-denial-of-service-dos-attack-cve-pending/'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106674'}]","{'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-07-22T14:21:26Z', 'nvd_published_at': '2019-07-19T16:15:00Z'}" +1.4.0,GHSA-mph4-vhrx-mv67,2023-09-13T17:12:59Z,2019-07-05T21:07:27Z,,['CVE-2019-12384'],Deserialization of Untrusted Data in FasterXML jackson-databind,"FasterXML jackson-databind 2.x before 2.9.9.1 might allow attackers to have a variety of impacts by leveraging failure to block the logback-core class from polymorphic deserialization. Depending on the classpath content, remote code execution may be possible.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.9'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12384'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1820'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2720'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2858'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2935'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2936'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2937'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2938'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2998'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3149'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3200'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3292'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3297'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3901'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:4352'}, {'type': 'WEB', 'url': 'https://blog.doyensec.com/2019/07/22/jackson-gadgets.html'}, {'type': 'WEB', 'url': 'https://doyensec.com/research.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/compare/74b90a4...a977aad'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/0d4b630d9ee724aee50703397d9d1afa2b2befc9395ba7797d0ccea9@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2d2a76440becb610b9a9cb49b15eac3934b02c2dbcaacde1000353e4@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/34717424b4d08b74f65c09a083d6dd1cb0763f37a15d6de135998c1d@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/3f99ae8dcdbd69438cb733d745ee3ad5e852068490719a66509b4592@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/56c8042873595b8c863054c7bfccab4bf2c01c6f5abedae249d914b9@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5ecc333113b139429f4f05000d4aa2886974d4df3269c1dd990bb319@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5fc0e16b7af2590bf1e97c76c136291c4fdb244ee63c65c485c9a7a1@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/87e46591de8925f719664a845572d184027258c5a7af0a471b53c77b@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/940b4c3fef002461b89a050935337056d4a036a65ef68e0bbd4621ef@%3Cdev.struts.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/e0733058c0366b703e6757d8d2a7a04b943581f659e9c271f0841dfe@%3Cnotifications.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ee0a051428d2c719acfa297d0854a189ea5e284ef3ed491fa672f4be@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/06/msg00019.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OVRZDN2T6AZ6DJCZJ3VSIQIVHBVMVWBL/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TXRVXNRFHJSQWFHPRJQRI5UPMZ63B544/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKUALE2TUCKEKOHE2D342PQXN4MWCSLC/'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Oct/6'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190703-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4542'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}]","{'cwe_ids': ['CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-06-27T11:07:42Z', 'nvd_published_at': None}" +1.4.0,GHSA-qr7j-h6gg-jmgc,2023-08-28T11:17:26Z,2019-07-16T17:42:21Z,,['CVE-2018-11307'],Deserialization of Untrusted Data in jackson-databind,"An issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.5. Use of Jackson default typing along with a gadget class from iBatis allows exfiltration of content. Fixed in 2.7.9.4, 2.8.11.2, and 2.9.6.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.7.9.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.9.3'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.11.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.8.11.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7525'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11307'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2032'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0782'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1822'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1823'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2804'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2858'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3002'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3140'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3149'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3892'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:4037'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/7fcf88aff0d1deaa5c3c7be8d58c05ad7ad5da94b59065d8e7c50c5d@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-07-16T00:41:07Z', 'nvd_published_at': '2019-07-09T16:15:00Z'}" +1.4.0,GHSA-c9jj-3wvg-q65h,2021-06-15T17:00:24Z,2019-07-05T21:12:54Z,,['CVE-2019-0228'],Vulnerability that affects org.apache.pdfbox:pdfbox,"Apache PDFBox 2.0.14 does not properly initialize the XML parser, which allows context-dependent attackers to conduct XML External Entity (XXE) attacks via a crafted XFDF.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.pdfbox:pdfbox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.14'}, {'fixed': '2.0.15'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0228'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c9jj-3wvg-q65h'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/1a3756557f8cb02790b7183ccf7665ae23f608a421c4f723113bca79@%3Cusers.pdfbox.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/8a19bd6d43e359913341043c2a114f91f9e4ae170059539ad1f5673c@%3Ccommits.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/bc8db1bf459f1ad909da47350ed554ee745abe9f25f2b50cad4e06dd@%3Cserver-dev.james.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/be86fcd7cd423a3fe6b73a3cb9d7cac0b619d0deb99e6b5d172c98f4@%3Ccommits.tika.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0a2141abeddae66dd57025f1681c8425834062b7c0c7e0b1d830a95d@%3Cusers.pdfbox.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r32b8102392a174b17fd19509a9e76047f74852b77b7bf46af95e45a2@%3Cserver-dev.james.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6HKVPTJWZGUB4MH4AAOWMRJHRDBYFHGJ/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/POPOGHJ5CVMUVCRQU7APBAN5IVZGZFDX/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2021.html'}]","{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:58Z', 'nvd_published_at': '2019-04-17T15:29:00Z'}" +1.4.0,GHSA-wg6j-r28m-7293,2023-08-28T13:34:04Z,2019-07-31T04:21:19Z,,['CVE-2019-14282'],Code backdoor in simple_captcha2,"The simple_captcha2 gem 0.2.3 for Ruby, as distributed on RubyGems.org, included a code-execution backdoor inserted by a third party.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'simple_captcha2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['0.2.3']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14282'}, {'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems.org/issues/2073'}, {'type': 'PACKAGE', 'url': 'https://github.com/pludoni/simple-captcha'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/simple_captcha2/CVE-2019-14282.yml'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/simple_captcha2/versions/'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-RUBY-SIMPLECAPTCHA2-455501'}]","{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-07-31T04:00:04Z', 'nvd_published_at': '2019-07-26T05:15:00Z'}" +1.4.0,GHSA-5wv5-4vpf-pj6m,2023-08-07T15:15:22Z,2019-07-19T16:12:46Z,,['CVE-2019-1010083'],Pallets Project Flask is vulnerable to Denial of Service via Unexpected memory usage,The Pallets Project Flask before 1.0 is affected by unexpected memory usage. The impact is denial of service. The attack vector is crafted encoded JSON data. The fixed version is 1. NOTE this may overlap CVE-2018-1000656.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'flask'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010083'}, {'type': 'PACKAGE', 'url': 'https://github.com/pallets/flask'}, {'type': 'WEB', 'url': 'https://www.palletsprojects.com/blog/flask-1-0-released/'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-07-19T04:59:45Z', 'nvd_published_at': '2019-07-17T14:15:00Z'}" +1.4.0,GHSA-hf23-9pf7-388p,2022-10-06T18:15:30Z,2019-07-26T16:09:47Z,,['CVE-2019-10173'],Deserialization of Untrusted Data and Code Injection in xstream,"It was found that xstream API version 1.4.10 before 1.4.11 introduced a regression for a previous deserialization flaw. If the security framework has not been initialized, it may allow a remote attacker to run arbitrary shell commands when unmarshalling XML or any supported format. e.g. JSON. (regression of CVE-2013-7285) ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.10'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10173'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3892'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:4352'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0445'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0727'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10173'}, {'type': 'PACKAGE', 'url': 'https://github.com/x-stream/xstream'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'http://x-stream.github.io/changes.html#1.4.11'}]","{'cwe_ids': ['CWE-502', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-07-25T10:11:50Z', 'nvd_published_at': '2019-07-23T13:15:00Z'}" +1.4.0,GHSA-cmfg-87vq-g5g4,2023-09-13T16:22:03Z,2019-07-17T15:26:12Z,,['CVE-2019-12814'],Deserialization of untrusted data in FasterXML jackson-databind,"A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x through 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has JDOM 1.x or 2.x jar in the classpath, an attacker can send a specifically crafted JSON message that allows them to read arbitrary local files on the server.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.9.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.9'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12814'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2341'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2858'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2935'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2936'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2937'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2938'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3044'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3045'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3046'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3050'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3149'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3200'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3292'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3297'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/0d4b630d9ee724aee50703397d9d1afa2b2befc9395ba7797d0ccea9@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/129da0204c876f746636018751a086cc581e0e07bcdeb3ee22ff5731@%3Cdev.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/15a55e1d837fa686db493137cc0330c7ee1089ed9a9eea7ae7151ef1@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/1e04d9381c801b31ab28dec813c31c304b2a596b2a3707fa5462c5c0@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/28be28ffd6471d230943a255c36fe196a54ef5afc494a4781d16e37c@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2d2a76440becb610b9a9cb49b15eac3934b02c2dbcaacde1000353e4@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2ff264b6a94c5363a35c4c88fa93216f60ec54d1d973ed6b76a9f560@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/34717424b4d08b74f65c09a083d6dd1cb0763f37a15d6de135998c1d@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/3f99ae8dcdbd69438cb733d745ee3ad5e852068490719a66509b4592@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/4b832d1327703d6b287a6d223307f8f884d798821209a10647e93324@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/56c8042873595b8c863054c7bfccab4bf2c01c6f5abedae249d914b9@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5ecc333113b139429f4f05000d4aa2886974d4df3269c1dd990bb319@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5fc0e16b7af2590bf1e97c76c136291c4fdb244ee63c65c485c9a7a1@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/71f9ffd92410a889e27b95a219eaa843fd820f8550898633d85d4ea3@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/87e46591de8925f719664a845572d184027258c5a7af0a471b53c77b@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/8fe2983f6d9fee0aa737e4bd24483f8f5cf9b938b9adad0c4e79b2a4@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/940b4c3fef002461b89a050935337056d4a036a65ef68e0bbd4621ef@%3Cdev.struts.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a3ae8a8c5e32c413cd27071d3a204166050bf79ce7f1299f6866338f@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a62aa2706105d68f1c02023fe24aaa3c13b4d8a1826181fed07d9682@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a78239b1f11cddfa86e4edee19064c40b6272214630bfef070c37957@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0a2b2cca072650dbd5882719976c3d353972c44f6736ddf0ba95209@%3Cissues.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b148fa2e9ef468c4de00de255dd728b74e2a97d935f8ced31eb41ba2@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/bf20574dbc2db255f1fd489942b5720f675e32a2c4f44eb6a36060cd@%3Ccommits.accumulo.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/e0733058c0366b703e6757d8d2a7a04b943581f659e9c271f0841dfe@%3Cnotifications.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ee0a051428d2c719acfa297d0854a189ea5e284ef3ed491fa672f4be@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/eff7280055fc717ea8129cd28a9dd57b8446d00b36260c1caee10b87@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/06/msg00019.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OVRZDN2T6AZ6DJCZJ3VSIQIVHBVMVWBL/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TXRVXNRFHJSQWFHPRJQRI5UPMZ63B544/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UKUALE2TUCKEKOHE2D342PQXN4MWCSLC/'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190625-0006/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}]","{'cwe_ids': ['CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-07-17T14:51:50Z', 'nvd_published_at': None}" +1.4.0,GHSA-h595-8pw6-5q6v,2021-08-17T17:50:14Z,2019-07-05T21:08:36Z,,['CVE-2018-15811'],Inadequate Encryption Strength in DotNetNuke,DNN (aka DotNetNuke) 9.2 through 9.2.1 uses a weak encryption algorithm to protect input parameters.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'DotNetNuke.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.2.0'}, {'fixed': '9.2.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-15811'}, {'type': 'WEB', 'url': 'https://github.com/dnnsoftware/Dnn.Platform/releases'}, {'type': 'WEB', 'url': 'https://www.dnnsoftware.com/community/security/security-center'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/157080/DotNetNuke-Cookie-Deserialization-Remote-Code-Execution.html'}]","{'cwe_ids': ['CWE-326'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-07-05T21:01:31Z', 'nvd_published_at': '2019-07-03T17:15:00Z'}" +1.4.0,GHSA-6c7v-2f49-8h26,2023-09-05T13:06:43Z,2019-07-03T20:37:25Z,,['CVE-2019-12781'],Django Incorrect HTTP detection with reverse-proxy connecting via HTTPS,"An issue was discovered in Django 1.11 before 1.11.22, 2.1 before 2.1.10, and 2.2 before 2.2.3. An HTTP request is not redirected to HTTPS when the SECURE_PROXY_SSL_HEADER and SECURE_SSL_REDIRECT settings are used, and the proxy connects to Django via HTTPS. In other words, django.http.HttpRequest.scheme has incorrect behavior when a client uses HTTP.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.22'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.10'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12781'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/dev/releases/security/'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/django-announce/Is4kLY9ZcZQ'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5VXXWIOQGXOB7JCGJ3CVUW673LDHKEYL/'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Jul/10'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190705-0002/'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/4043-1/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4476'}, {'type': 'WEB', 'url': 'https://www.djangoproject.com/weblog/2019/jul/01/security-releases/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00006.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00025.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/07/01/3'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/109018'}]","{'cwe_ids': ['CWE-319'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-07-03T20:26:13Z', 'nvd_published_at': '2019-07-01T14:15:00Z'}" +1.4.0,GHSA-g8m7-qhv7-9h5x,2021-09-22T18:35:22Z,2019-07-05T21:07:14Z,,[],Path Traversal in serve-here.js,"Versions of `serve-here.js` prior to 1.2.0 are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the served folder using relative paths. + + +## Recommendation + +Upgrade to version 1.2.0 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'serve-here'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.2.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/vivaxy/here/pull/17'}, {'type': 'WEB', 'url': 'https://github.com/vivaxy/here/commit/298dbab41344dfb7f95f66b1fa7b5cfb436bd4a2'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/296254'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/569966'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/554'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-06-14T16:17:51Z', 'nvd_published_at': None}" +1.4.0,GHSA-wqfc-cr59-h64p,2021-08-17T19:40:44Z,2019-07-31T04:22:15Z,,['CVE-2019-5448'],Missing Encryption of Sensitive Data in yarn,Yarn before 1.17.3 is vulnerable to Missing Encryption of Sensitive Data due to HTTP URLs in lockfile causing unencrypted authentication data to be sent over the network.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'yarn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.17.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5448'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/640904'}, {'type': 'WEB', 'url': 'https://github.com/ChALkeR/notes/blob/master/Yarn-vuln.md'}, {'type': 'WEB', 'url': 'https://yarnpkg.com/blog/2019/07/12/recommended-security-update/'}]","{'cwe_ids': ['CWE-311', 'CWE-319'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-07-31T03:41:57Z', 'nvd_published_at': '2019-07-30T21:15:00Z'}" +1.4.0,GHSA-rg32-m3hf-772v,2023-08-29T15:29:43Z,2019-07-16T00:41:40Z,,['CVE-2019-1010306'],Slanger Arbitrary command execution,Slanger 0.6.0 is affected by Remote Code Execution (RCE). The impact is A remote attacker can execute arbitrary commands by sending a crafted request to the server. The component is Message handler & request validator. The attack vector is Remote unauthenticated. The fixed version is after commit 5267b455caeb2e055cccf0d2b6a22727c111f5c3.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'slanger'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010306'}, {'type': 'WEB', 'url': 'https://github.com/stevegraham/slanger/pull/238'}, {'type': 'WEB', 'url': 'https://github.com/stevegraham/slanger/pull/238/commits/5267b455caeb2e055cccf0d2b6a22727c111f5c3'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/slanger/CVE-2019-1010306.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/stevegraham/slanger'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-07-15T21:51:37Z', 'nvd_published_at': '2019-07-15T15:15:00Z'}" +1.4.0,GHSA-p3w6-jcg4-52xh,2022-09-17T00:26:01Z,2019-07-02T15:43:41Z,,['CVE-2019-13177'],Improper Verification of Cryptographic Signature in django-rest-registration,"## Misusing the Django Signer API leads to predictable signatures used in verification emails + +### Impact +The vulnerability is a high severity one. Anyone using Django REST Registration library versions `0.2.*` - `0.4.*` with e-mail verification option (which is recommended, but needs [additional configuration](https://django-rest-registration.readthedocs.io/en/latest/quickstart.html#preferred-configuration)) is affected. +In the worst case, the attacker can take over any Django user by resetting his/her password without even receiving the reset password verification link, just by guessing the signature from publicly available data (more detailed description below). + +### Patches +The problem has been patched in version `0.5.0`. All library users should upgrade to version `0.5.0` or higher. +The fix will invalidate all previously generated signatures , and in consequence, all verification links in previously sent verification e-mails. Therefore semi-major version `0.5.0` was released instead of version `0.4.6` to mark that incompatibility. + +### Workarounds +The easiest way way is to disable the verification options by using something like the minimal configuration described [here](https://django-rest-registration.readthedocs.io/en/latest/quickstart.html#minimal-configuration). This will unfortunately disable checking whether the given e-mail is valid and make unable to users who registered an account but didn't verify it before config change. + +Less harsh way is to temporarily disable just the the reset password functionality: + +```python +REST_REGISTRATION = { + # ... + 'RESET_PASSWORD_VERIFICATION_ENABLED': False, + # ... +} +``` +Which should disallow the worst case, which is account takeover by an attacker. The attacker can still use the register-email endpoint to change the email to its own (but it is less critical than resetting the password in this case). + +If one already set `'RESET_PASSWORD_VERIFICATION_ONE_TIME_USE'` setting key to `True` in `REST_REGISTRATION` Django setting (which is not the default setting) then it should mitigate the security issue in case of password reset (in this case, the signature is much harder to guess by the attacker). But even in this case upgrade to newest version is highly recommended. + +### Technical description +After the code [was refactored](https://github.com/apragacz/django-rest-registration/commit/b6d921e9decc9bb36a4c6d58bc607471aa824a2e) to use the [official Signer class](https://docs.djangoproject.com/en/dev/topics/signing/) the salt +was passed wrongly as secret key, replacing the `SECRET_KEY` set in +Django settings file. This leads to the Django `SECRET_KEY` not being used by the signer object. The secret key of the signer ends to be the salt which in most cases is a static string which is publicly available. + +In consequence this allows, with verification enabled, to guess +the signature contained in the verification link (which is sent in a verification e-mail) by a potential attacker very easily. + +The bug went unnoticed for very long time so multiple versions are affected: +this bug affects versions `0.2.*`, `0.3.*`, `0.4.*`; version `0.1.*` is not affected. + +Recently released version `0.5.0` contains the [fix](https://github.com/apragacz/django-rest-registration/commit/26d094fab65ea8c2694fdfb6a3ab95a7808b62d5) which correctly passes the salt to the Signer constructor as keyword argument instead as a positonal argument. It also contains additonal test so this problem should not reappear in the future. + +### Thanks +I'd like to thank @peterthomassen from https://desec.io DNS security project for finding the bug. I'd like also to thank his employer, SSE (https://www.securesystems.de) for funding his work. + + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [GitHub issues project page](https://github.com/apragacz/django-rest-registration/issues) +* Email @apragacz, author of the library ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'django-rest-registration'}, 'ecosystem_specific': {'affected_functions': ['rest_registration.verification.DataSigner.__init__']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.0'}, {'fixed': '0.5.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/apragacz/django-rest-registration/security/advisories/GHSA-p3w6-jcg4-52xh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-13177'}, {'type': 'WEB', 'url': 'https://github.com/apragacz/django-rest-registration/commit/26d094fab65ea8c2694fdfb6a3ab95a7808b62d5'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-p3w6-jcg4-52xh'}, {'type': 'PACKAGE', 'url': 'https://github.com/apragacz/django-rest-registration'}, {'type': 'WEB', 'url': 'https://github.com/apragacz/django-rest-registration/releases/tag/0.5.0'}]","{'cwe_ids': ['CWE-347'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:52Z', 'nvd_published_at': None}" +1.4.0,GHSA-grgm-pph5-j5h7,2021-08-31T21:17:26Z,2019-07-31T04:22:49Z,,['CVE-2019-10156'],Exposure of Sensitive Information to an Unauthorized Actor in ansible,"A flaw was discovered in the way Ansible templating was implemented in versions before 2.6.18, 2.7.12 and 2.8.2, causing the possibility of information disclosure through unexpected variable substitution. By taking advantage of unintended variable substitution the content of any variable may be disclosed.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.18'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.12'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10156'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/57188'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/commit/04e94274fb92e116e9082cc9b86b1fd05c836922'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/commit/3ff6505e8ff0e4655bab008886983476ef903375'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/commit/a11c3edfa41e7e4a4db323cdabfc2eae1b61da2a'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3744'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3789'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10156'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/09/msg00016.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/01/msg00023.html'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2021/dsa-4950'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-07-31T03:40:27Z', 'nvd_published_at': '2019-07-30T23:15:00Z'}" +1.4.0,GHSA-x5rq-j2xg-h7qm,2022-03-09T22:54:28Z,2019-07-19T16:13:07Z,,['CVE-2019-1010266'],Regular Expression Denial of Service (ReDoS) in lodash,"lodash prior to 4.7.11 is affected by: CWE-400: Uncontrolled Resource Consumption. The impact is: Denial of service. The component is: Date handler. The attack vector is: Attacker provides very long strings, which the library attempts to match using a regular expression. The fixed version is: 4.7.11.",[],"[{'package': {'ecosystem': 'npm', 'name': 'lodash'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.17.11'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'lodash-es'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.17.11'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'lodash-amd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.17.11'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010266'}, {'type': 'WEB', 'url': 'https://github.com/lodash/lodash/issues/3359'}, {'type': 'WEB', 'url': 'https://github.com/lodash/lodash/commit/5c08f18d365b64063bfbfa686cbb97cdd6267347'}, {'type': 'WEB', 'url': 'https://github.com/lodash/lodash/wiki/Changelog'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190919-0004/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-LODASH-73639'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-07-19T16:11:26Z', 'nvd_published_at': None}" +1.4.0,GHSA-958r-g534-ccmr,2022-09-17T00:54:46Z,2019-07-05T21:11:13Z,,['CVE-2019-9845'],MadsKristensen.AspNetCore.Miniblog subject to Improper Input Validation,"madskristensen Miniblog.Core through 2019-01-16 allows remote attackers to execute arbitrary ASPX code via an IMG element with a data: URL, because SaveFilesToDisk in Controllers/BlogController.cs writes a decoded base64 string to a file without validating the extension.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'MadsKristensen.AspNetCore.Miniblog'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-9845'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-958r-g534-ccmr'}, {'type': 'PACKAGE', 'url': 'https://github.com/madskristensen/Miniblog.Core'}, {'type': 'WEB', 'url': 'https://github.com/madskristensen/Miniblog.Core/blob/master/src/Controllers/BlogController.cs#L142'}, {'type': 'WEB', 'url': 'https://rastating.github.io/miniblog-remote-code-execution/'}]","{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:27:35Z', 'nvd_published_at': None}" +1.4.0,GHSA-pf46-gqg9-j3v3,2021-08-17T16:06:33Z,2019-07-05T21:08:24Z,,['CVE-2018-15812'],Insufficient Entropy in DotNetNuke,"DNN (aka DotNetNuke) 9.2 through 9.2.1 incorrectly converts encryption key source values, resulting in lower than expected entropy.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'DotNetNuke.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.2.0'}, {'fixed': '9.2.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-15812'}, {'type': 'WEB', 'url': 'https://github.com/dnnsoftware/Dnn.Platform/releases'}, {'type': 'WEB', 'url': 'https://www.dnnsoftware.com/community/security/security-center'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/157080/DotNetNuke-Cookie-Deserialization-Remote-Code-Execution.html'}]","{'cwe_ids': ['CWE-331'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-07-05T21:01:22Z', 'nvd_published_at': '2019-07-03T17:15:00Z'}" +1.4.0,GHSA-j8j8-348v-wfm3,2023-09-01T20:33:47Z,2019-07-05T21:11:26Z,,['CVE-2017-11427'],Python-saml allows manipulation of SAML data without invalidation of cryptographic signature,"OneLogin PythonSAML 2.3.0 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'python-saml'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-11427'}, {'type': 'WEB', 'url': 'https://github.com/SAML-Toolkits/python-saml/commit/fad881b4432febea69d70691dfed51c93f0de10f'}, {'type': 'WEB', 'url': 'https://duo.com/blog/duo-finds-saml-vulnerabilities-affecting-multiple-implementations'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j8j8-348v-wfm3'}, {'type': 'WEB', 'url': 'https://www.kb.cert.org/vuls/id/475445'}]","{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:42:49Z', 'nvd_published_at': None}" +1.4.0,GHSA-xfhh-rx56-rxcr,2021-07-27T20:57:14Z,2019-07-02T15:28:38Z,,['CVE-2019-1020001'],Path Traversal vulnerability that affects yard,"## Possible arbitrary path traversal and file access via `yard server` + +### Impact + +A path traversal vulnerability was discovered in YARD <= 0.9.19 when using `yard server` to serve documentation. This bug would allow unsanitized HTTP requests to access arbitrary files on the machine of a yard server host under certain conditions. + +Thanks to CuongMX from Viettel Cyber Security for discovering this vulnerability. + +### Patches + +Please upgrade to YARD v0.9.20 immediately if you are relying on yard server to host documentation in any untrusted environments. + +### Workarounds + +For users who cannot upgrade, it is possible to perform path sanitization of HTTP requests at your webserver level. WEBrick, for example, can perform such sanitization by default (which you can use via `yard server -s webrick`), as can certain rules in your webserver configuration.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'yard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.20'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/lsegal/yard/security/advisories/GHSA-xfhh-rx56-rxcr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1020001'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xfhh-rx56-rxcr'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:03:08Z', 'nvd_published_at': '2019-07-29T13:15:00Z'}" +1.4.0,GHSA-2mp5-m968-gwr2,2023-02-03T20:45:52Z,2019-07-16T00:41:34Z,,['CVE-2019-5447'],Path Traversal in http-file-server,"All versions of `http-file-server` are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the served folder using relative paths. + + +## Recommendation + +No fix is currently available. Consider using an alternative package until a fix is made available.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'http-file-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 0.2.6'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5447'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/570133'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1077'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-07-15T21:41:32Z', 'nvd_published_at': '2019-07-15T18:15:00Z'}" +1.4.0,GHSA-p5xp-6vpf-jwvh,2021-10-29T22:01:59Z,2019-09-23T18:32:27Z,,['CVE-2019-10199'],Improper Input Validation and Cross-Site Request Forgery in Keycloak,"It was found that Keycloak's account console, up to 6.0.1, did not perform adequate header checks in some requests. An attacker could use this flaw to trick an authenticated user into performing operations via request from an untrusted domain.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.1'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10199'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10199'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}]","{'cwe_ids': ['CWE-20', 'CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-09-19T15:25:55Z', 'nvd_published_at': '2019-08-14T17:15:00Z'}" +1.4.0,GHSA-rwpr-83g3-96g7,2023-01-25T22:46:45Z,2019-09-23T18:33:07Z,,['CVE-2019-16145'],Cross-site scripting in padrino-contrib,The breadcrumbs contributed module through 0.2.0 for Padrino Framework allows XSS via a caption.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'padrino-contrib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16145'}, {'type': 'WEB', 'url': 'https://github.com/padrino/padrino-contrib/pull/35'}, {'type': 'PACKAGE', 'url': 'https://github.com/padrino/padrino-contrib'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-09-19T14:58:55Z', 'nvd_published_at': '2019-09-09T21:15:00Z'}" +1.4.0,GHSA-g5m7-57ph-j6p8,2021-08-17T22:25:20Z,2019-09-11T23:04:57Z,,['CVE-2019-5475'],OS Command Injection in Nexus Yum Repository Plugin,"The Nexus Yum Repository Plugin in v2 is vulnerable to Remote Code Execution when instances using CommandLineExecutor.java are supplied vulnerable data, such as the Yum Configuration Capability.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.sonatype.nexus.plugins:nexus-yum-repository-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.14.14'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5475'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/654888'}]","{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-09-04T14:40:16Z', 'nvd_published_at': '2019-09-03T20:15:00Z'}" +1.4.0,GHSA-cgjv-rghq-qhgp,2021-08-17T22:22:48Z,2019-09-11T23:00:57Z,,[],Path Traversal in algo-httpserv,"Versions of `algo-httpserv` prior to 1.1.2 are vulnerable to Path Traversal. Due to insufficient input sanitization, attackers can access server files by using relative paths. + + +## Recommendation + +Upgrade to version 1.1.2 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'algo-httpserv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.2'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/AlgoRythm-Dylan/httpserv/commit/bcfe9d4316c2b59aab3a64a38905376026888735'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ALGOHTTPSERV-174741'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/889'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-09-03T23:12:19Z', 'nvd_published_at': None}" +1.4.0,GHSA-h822-r4r5-v8jg,2023-09-13T18:20:57Z,2019-09-23T18:33:25Z,,['CVE-2019-14540'],Polymorphic Typing issue in FasterXML jackson-databind,"A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10, 2.8.11.5, and 2.6.7.3. It is related to `com.zaxxer.hikari.HikariConfig`.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.8.11.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.7.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14540'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2410'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2449'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/d4983c740fec7d5576b207a8c30a63d3ea7443de'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3200'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0159'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0160'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0161'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0164'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0445'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/blob/master/release-notes/VERSION-2.x'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/0fcef7321095ce0bc597d468d150cff3d647f4cb3aef3bd4d20e1c69@%3Ccommits.tinkerpop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/40c00861b53bb611dee7d6f35f864aa7d1c1bd77df28db597cbf27e1@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a360b46061c91c5cad789b6c3190aef9b9f223a2b75c9c9f046fe016@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a4f2c9fb36642a48912cdec6836ec00e497427717c5d377f8d7ccce6@%3Cnotifications.zookeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ad0d238e97a7da5eca47a014f0f7e81f440ed6bf74a93183825e18b9@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/dc6b5cad721a4f6b3b62ed1163894941140d9d5656140fb757505ca0@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/e90c3feb21702e68a8c08afce37045adb3870f2bf8223fa403fb93fb@%3Ccommits.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8aaf4ee16bbaf6204731d4770d96ebb34b258cd79b491f9cdd7f2540@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/10/msg00001.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q7CANA7KV53JROZDX5Z5P26UG5VN2K43/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TH5VFUN4P7CCIP7KSEXYA5MUTFCUDUJT/'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Oct/6'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20191004-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4542'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-09-19T09:23:48Z', 'nvd_published_at': '2019-09-15T22:15:00Z'}" +1.4.0,GHSA-gvxv-5fp2-358q,2022-11-17T18:24:26Z,2019-09-11T23:08:57Z,,['CVE-2019-10753'],Incorrect Resource Transfer Between Spheres in eclipse-wtp,"In all versions prior to version 3.9.6 for eclipse-wtp, all versions prior to version 9.4.4 for eclipse-cdt, and all versions prior to version 3.0.1 for eclipse-groovy, Spotless was resolving dependencies over an insecure channel (http). If the build occurred over an insecure connection, a malicious user could have perform a Man-in-the-Middle attack during the build and alter the build artifacts that were produced. In case that any of these artifacts were compromised, any developers using these could be altered. **Note:** In order to validate that this artifact was not compromised, the maintainer would need to confirm that none of the artifacts published to the registry were not altered with. Until this happens, we can not guarantee that this artifact was not compromised even though the probability that this happened is low.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.diffplug.spotless:spotless-eclipse-wtp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.diffplug.spotless:spotless-eclipse-cdt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.4.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.diffplug.spotless:spotless-eclipse-groovy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10753'}, {'type': 'WEB', 'url': 'https://github.com/diffplug/spotless/issues/360'}, {'type': 'PACKAGE', 'url': 'https://github.com/diffplug/spotless'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-COMDIFFPLUGSPOTLESS-460377'}]","{'cwe_ids': ['CWE-669'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-09-11T22:56:33Z', 'nvd_published_at': '2019-09-05T20:15:00Z'}" +1.4.0,GHSA-q8wc-9xvp-g3c3,2021-08-17T22:29:12Z,2019-09-23T18:33:18Z,,['CVE-2019-16148'],Cross-site scripting in Sakai,Sakai through 12.6 allows XSS via a chat user name.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.sakaiproject:chat-base'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '12.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16148'}, {'type': 'WEB', 'url': 'https://github.com/sakaiproject/sakai/pull/6971'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-09-19T14:57:19Z', 'nvd_published_at': '2019-09-09T13:15:00Z'}" +1.4.0,GHSA-fcjw-8rhj-gwwc,2023-01-23T20:12:32Z,2019-09-11T23:06:57Z,,['CVE-2019-16109'],Authentication Bypass in Devise,"An issue was discovered in Plataformatec Devise before 4.7.1. It confirms accounts upon receiving a request with a blank confirmation_token, if a database record has a blank value in the confirmation_token column. (However, there is no scenario within Devise itself in which such database records would exist.)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'devise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.7.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16109'}, {'type': 'WEB', 'url': 'https://github.com/plataformatec/devise/issues/5071'}, {'type': 'WEB', 'url': 'https://github.com/plataformatec/devise/pull/5132'}, {'type': 'PACKAGE', 'url': 'https://github.com/plataformatec/devise'}, {'type': 'WEB', 'url': 'https://github.com/plataformatec/devise/compare/v4.7.0...v4.7.1'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/devise/CVE-2019-16109.yml'}]","{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-09-11T22:42:42Z', 'nvd_published_at': None}" +1.4.0,GHSA-pg2f-r7pc-6fxx,2021-08-17T22:19:46Z,2019-09-11T22:57:57Z,,['CVE-2019-11457'],Cross-Site Request Forgery in MicroPyramid Django CRM,"Multiple CSRF issues exist in MicroPyramid Django CRM 0.2.1 via /change-password-by-admin/, /api/settings/add/, /cases/create/, /change-password-by-admin/, /comment/add/, /documents/1/view/, /documents/create/, /opportunities/create/, and /login/.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'django-crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11457'}, {'type': 'WEB', 'url': 'https://www.netsparker.com/blog/web-security/'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/154219/Django-CRM-0.2.1-Cross-Site-Request-Forgery.html'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2019/Aug/30'}]","{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-08-28T15:35:37Z', 'nvd_published_at': '2019-08-27T15:15:00Z'}" +1.4.0,GHSA-62gw-3rmj-wmp2,2021-09-01T22:36:39Z,2019-09-13T13:25:47Z,,['CVE-2019-1301'],High severity vulnerability that affects System.Management.Automation,"## Microsoft Security Advisory CVE-2019-1301: Denial of Service Vulnerability in .NET Core + +# Microsoft Security Advisory CVE-2019-1301: Denial of Service Vulnerability in PowerShell Core +## Executive Summary + +A denial of service vulnerability exists when PowerShell Core or .NET Core improperly handles web requests. An attacker who successfully exploited this vulnerability could cause a denial of service against a PowerShell Core scripts. + +The update addresses the vulnerability by correcting how the .NET Core handles web requests. + +System administrators are advised to update PowerShell Core to an unaffected version (see [affected software](#user-content-affected-software).) + + +## Discussion + +Please [open a support question](https://github.com/PowerShell/PowerShell/issues/new?assignees=&labels=Issue-Question&template=Support_Question.md&title=Support+Question) to discussion the PowerShell aspects of this advisory. +Please use dotnet/announcements#121 for discussion of the .NET aspects this advisory. + +## Affected Software + +The vulnerability affects PowerShell Core prior to the following versions: + +| PowerShell Core Version | Fixed in | +|-------------------------|-------------------| +| 6.1 | 6.1.6 | +| 6.2 | 6.2.3 | +| 7.0 | unaffected | + +## Advisory FAQ + +### How do I know if I am affected? + +If all of the following are true: + +1. Run `pwsh -v`, then, check the version in the table in [Affected Software](#user-content-affected-software) to see if your version of PowerShell Core is affected. +1. If you are running a version of PowerShell Core where the executable is not `pwsh` or `pwsh.exe`, then you are affected. This only existed for preview version of `6.0`. + +### How do I update to an unaffected version? + +Follow the instructions at [Installing PowerShell Core](https://docs.microsoft.com/en-us/powershell/scripting/setup/installing-powershell?view=powershell-6) to install the latest version of PowerShell Core. + +## Other Information + +### Reporting Security Issues + +If you have found a potential security issue in PowerShell Core, +please email details to secure@microsoft.com. + +### Support + +You can ask questions about this issue on GitHub in the PowerShell organization. +This is located at https://github.com/PowerShell/. +The Announcements repo (https://github.com/PowerShell/Announcements) +will contain this bulletin as an issue and will include a link to a discussion issue where you can ask questions. + +### What if the update breaks my script or module? + +You can uninstall the newer version of PowerShell Core and install the previous version of PowerShell Core. +This should be treated as a temporary measure. +Therefore, the script or module should be updated to work with the patched version of PowerShell Core. + +### Acknowledgments + +Paul Ryman of VMware Sydney Engineering Team + +Microsoft recognizes the efforts of those in the security community who help us protect customers through coordinated vulnerability disclosure. + +See [acknowledgments](https://portal.msrc.microsoft.com/en-us/security-guidance/acknowledgments) for more information. + +### External Links + +[CVE-2019-1301](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1301) + +### Revisions + +V1.0 (September 12, 2019): Advisory published. + +*Version 1.0* +*Last Updated 2019-09-12*","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'System.Management.Automation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.2.0'}, {'fixed': '6.2.3'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Management.Automation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.1.6'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/PowerShell/PowerShell/security/advisories/GHSA-62gw-3rmj-wmp2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1301'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-62gw-3rmj-wmp2'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1301'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:17:47Z', 'nvd_published_at': None}" +1.4.0,GHSA-5w65-6875-rhq8,2020-08-31T18:34:32Z,2019-09-11T23:01:57Z,,[],Undefined Behavior in sailsjs-cacheman,"All versions of `sailsjs-cacheman` have a vulnerability that may lead to Undefined Behavior. The config variable is exposing to the global scope which may overwrite other variables and cause the application to misbehave. + + +## Recommendation + +No fix is currently available. Consider using an alternative module until a fix is made available.",[],"[{'package': {'ecosystem': 'npm', 'name': 'sailsjs-cacheman'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/gayanhewa/sailsjs-cacheman/pull/10'}, {'type': 'WEB', 'url': 'https://github.com/gayanhewa/sailsjs-cacheman/commit/4a456f44141ae2d5aed8cb32a82063356dcc318f'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/752'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2019-09-03T23:31:41Z', 'nvd_published_at': None}" +1.4.0,GHSA-r74q-gxcg-73hx,2023-08-28T10:44:04Z,2019-09-30T19:41:15Z,,['CVE-2019-16676'],Improper Input Validation in simple_form,"## Incorrect Access Control in `file_method?` in `lib/simple_form/form_builder.rb`; a user-supplied string is invoked as a method call + +### Impact +For pages that build a form using user input, it is possible for an attacker to manipulate the input and send any method present in the form object. For example: + +```erb +<%= simple_form_for @user do |f| %> + <%= f.label @user_supplied_string %> + ... +<% end %> +``` + +The string provided in the variable `@user_supplied_string` would be invoked as a method call inside the `@user` object (unless the string contains any of the following: `password`, `time_zone`, `country`, `email`, `phone` and `url`). + +By manipulation that input, an attacker could do any of the following: + +- Code execution (call actions like `#destroy`) +- Denial of Service (by executing a computation intensive method) +- Information Disclosure (check the presence of methods, leak user information) + +### Patches +The problem was fixed in version `5.0`. Although it's a major version, there should be no issues with upgrading for `4.x`. The reason it was released in a major version is that the configuration `SimpleForm.file_methods` was deprecated in order to fix the problem. + +### Workarounds +The issue only happens with pages that build forms based on user-provided input. If your application doesn't do that, you're not affected. +A workaround is to explicitly pass which type you want for an input since the issue lies on Simple Form's automatically discovery of input types. This can be done using the `as` option, like the following: +```erb +<%= form.input :avatar, as: :file %> +``` + +### References +[TDB] + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [https://github.com/plataformatec/simple_form](https://github.com/plataformatec/simple_form) +* Email us at [opensource@plataformatec.com.br](mailto:opensource@plataformatec.com.br)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'simple_form'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/plataformatec/simple_form/security/advisories/GHSA-r74q-gxcg-73hx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16676'}, {'type': 'WEB', 'url': 'https://github.com/heartcombo/simple_form/commit/8c91bd76a5052ddf3e3ab9fd8333f9aa7b2e2dd6'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-r74q-gxcg-73hx'}, {'type': 'PACKAGE', 'url': 'https://github.com/heartcombo/simple_form'}, {'type': 'WEB', 'url': 'https://github.com/plataformatec/simple_form/commits/master'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/simple_form/CVE-2019-16676.yml'}, {'type': 'WEB', 'url': 'http://blog.plataformatec.com.br/2019/09/incorrect-access-control-in-simple-form-cve-2019-16676/'}]","{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:53:49Z', 'nvd_published_at': None}" +1.4.0,GHSA-2j5x-56p6-hj6x,2023-09-12T19:30:43Z,2019-09-04T10:02:14Z,,['CVE-2019-5480'],Path Traversal in statichttpserver,"All versions of `statichttpserver` are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the served folder using relative paths. + + +## Recommendation + +No fix is currently available. Consider using an alternative package until a fix is made available.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'statichttpserver'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.9.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5480'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/570035'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1143'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-09-04T09:51:22Z', 'nvd_published_at': None}" +1.4.0,GHSA-2xwv-3cc9-fp7c,2020-08-31T18:49:15Z,2019-09-11T23:07:57Z,,['CVE-2019-5483'],Sensitive Data Exposure in seneca,"Versions of `seneca` prior to 3.9.0 are vulnerable to Sensitive Data Exposure. When a process using the package crashes all environment variables are printed. This may leak sensitive data such as access keys, especially given scenarios when log-monitoring systems store the error output. + + +## Recommendation + +Upgrade to version 3.9.0 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'seneca'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5483'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/526258'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/501.json'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1155'}]","{'cwe_ids': ['CWE-209'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2019-09-11T22:45:13Z', 'nvd_published_at': None}" +1.4.0,GHSA-cxw4-9qv9-vx5h,2022-01-18T23:06:09Z,2019-09-30T19:42:28Z,,[],High severity vulnerability that affects PeterO.Cbor,"### Impact +The CBOR library supports optional tags that enable CBOR objects to contain references to objects within them. Versions earlier than 4.0 resolved those references automatically. While this by itself doesn't cause much of a security problem, a denial of service can happen if those references are deeply nested and used multiple times (so that the same reference to the same object occurs multiple times), and if the decoded CBOR object is sent to a serialization method such as `EncodeToBytes`, `ToString`, or `ToJSONString`, since the objects referred to are expanded in the process and take up orders of magnitude more memory than if the references weren't resolved. + +The impact of this problem on any particular system varies. In general, the risk is higher if the system allows users to send arbitrary CBOR objects without authentication, or exposes a remote endpoint in which arbitrary CBOR objects can be sent without authentication. + +### Patches +This problem is addressed in version 4.0 by disabling reference resolution by default. Users should use the latest version of this library. + +### Workarounds +Since version 3.6, an encoding option (`resolvereferences=true` or `resolvereferences=false`) in CBOREncodeOptions sets whether the CBOR processor will resolve these kinds of references when decoding a CBOR object. Set `resolvereferences=false` to disable reference resolution. + +In version 3.6, if the method used `CBORObject.Read()` or `CBORObject.DecodeFromBytes()` to decode a serialized CBOR object, call the overload that takes `CBOREncodeOptions` as follows: + + CBORObject.DecodeFromBytes(bytes, new CBOREncodeOptions(""resolvereferences=false"")); + +In versions 3.5 and earlier, this issue is present only if the CBOR object is an array or a map. If the application does not expect a decoded CBOR object to be an array or a map, it should check the CBOR object's type before encoding that object, as follows: + + if (cbor.Type != CBORType.Array && cbor.Type != CBORType.Map) { + cbor.EncodeToBytes(); + } + +Alternatively, for such versions, the application can use `WriteTo` to decode the CBOR object to a so-called ""limited memory stream"", that is, a `Stream` that throws an exception if too many bytes would be written. How to write such a limited-memory stream is nontrivial and beyond the scope of this advisory. + + using(var stream = new LimitedMemoryStream(100000)) { // Limit to 100000 bytes + cbor.WriteTo(stream); + return stream.ToBytes(); + } + +To check whether a byte array representing a CBOR object might exhibit this problem, check whether the array contains the byte 0xd8 followed immediately by either 0x19 or 0x1d. This check catches all affected CBOR objects but may catch some non-affected CBOR objects (notably integers and byte strings). + +### References + +See the Wikipedia article [Billion laughs attack](https://en.wikipedia.org/wiki/Billion_laughs_attack) and the related issue in [Kubernetes](https://github.com/kubernetes/kubernetes/issues/83253). + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [the CBOR repository](https://github.com/peteroupc/CBOR). +",[],"[{'package': {'ecosystem': 'NuGet', 'name': 'PeterO.Cbor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/peteroupc/CBOR/security/advisories/GHSA-cxw4-9qv9-vx5h'}, {'type': 'PACKAGE', 'url': 'https://github.com/peteroupc/CBOR'}]","{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:33:21Z', 'nvd_published_at': None}" +1.4.0,GHSA-549f-73hh-mj38,2023-06-01T19:46:39Z,2019-09-16T22:24:02Z,,['CVE-2019-5485'],Command Injection in gitlabhook,"All versions of `gitlabhook` are vulnerable to Command Injection. The package does not validate input the body of POST request and concatenates it to an exec call, allowing attackers to run arbitrary commands in the system. + + +## Recommendation + +No fix is currently available. Consider using an alternative package until a fix is made available.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'gitlabhook'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.17'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5485'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/685447'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/154598/NPMJS-gitlabhook-0.0.17-Remote-Command-Execution.html'}]","{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-09-16T22:23:36Z', 'nvd_published_at': '2019-09-13T18:15:00Z'}" +1.4.0,GHSA-fgmr-vx7c-5wj6,2021-07-27T21:51:14Z,2019-09-26T21:30:34Z,,['CVE-2019-10071'],Timing attack on HMAC signature comparison in Apache Tapestry,"The code which checks HMAC in form submissions used String.equals() for comparisons, which results in a timing side channel for the comparison of the HMAC signatures. This could lead to remote code execution if an attacker is able to determine the correct signature for their payload. The comparison should be done with a constant time algorithm instead.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tapestry:tapestry-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.4'}, {'fixed': '5.4.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10071'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6e8f42c88da7be3c60aafe3f6a85eb00b4f8b444de26b38d36233a43@%3Cusers.tapestry.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/7a437dad5af7309aba4d01bfc2463b3ac34e6aafaa565381d3a36460@%3Cusers.tapestry.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/bac8d6f9e1b4059b319d9cba6f33219a99b81623476ec896138f851c@%3Cusers.tapestry.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7d9c54beb1dc97dcccc58d9b5d31f0f7166f9a25ad1beba5f8091e0c@%3Ccommits.tapestry.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r87523dd07886223aa086edc25fe9b8ddb9c1090f7db25b068dc30843@%3Ccommits.tapestry.apache.org%3E'}]","{'cwe_ids': ['CWE-203', 'CWE-697'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-09-23T22:30:40Z', 'nvd_published_at': '2019-09-16T18:15:00Z'}" +1.4.0,GHSA-5m2v-hc64-56h6,2023-08-29T15:33:31Z,2019-09-30T16:05:32Z,,['CVE-2019-16892'],Rubyzip denial of service ,"In Rubyzip before 1.3.0, a crafted ZIP file can bypass application checks on ZIP entry sizes because data about the uncompressed size can be spoofed. This allows attackers to cause a denial of service (disk consumption).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'rubyzip'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16892'}, {'type': 'WEB', 'url': 'https://github.com/rubyzip/rubyzip/pull/403'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:4047'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:4201'}, {'type': 'WEB', 'url': 'https://github.com/jdleesmiller/ruby-advisory-db/blob/master/gems/rubyzip/CVE-2019-16892.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rubyzip/CVE-2019-16892.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/rubyzip/rubyzip'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J45KSFPP6DFVWLC7Z73L7SX735CKZYO6/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWWPORMSBHZTMP4PGF4DQD22TTKBQMMC/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X255K6ZBAQC462PQN2ND5HOTTQEJ2G2X/'}]","{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-09-30T16:04:36Z', 'nvd_published_at': None}" +1.4.0,GHSA-xf27-jqwv-gf3r,2023-09-11T18:33:46Z,2019-09-11T23:03:57Z,,['CVE-2019-5479'],Unintended Require in larvitbase-api,"Versions of `larvitbase-api` prior to 0.5.4 are vulnerable to an Unintended Require. The package exposes an API endpoint and passes a GET parameter unsanitized to an `require()` call. This allows attackers to execute any `.js` file in the same folder as the server is running. + + +## Recommendation + +Upgrade to version 0.5.4 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'larvitbase-api'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.5'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5479'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/566056'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1120'}]","{'cwe_ids': ['CWE-829'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-09-04T14:29:28Z', 'nvd_published_at': None}" +1.4.0,GHSA-mwp6-j9wf-968c,2021-10-11T21:10:33Z,2019-09-13T21:33:25Z,2020-06-26T16:40:47Z,[],Critical severity vulnerability that affects generator-jhipster,"Account takeover and privilege escalation is possible in applications generated by generator-jhipster before 6.3.0. This is due to a vulnerability in the generated java classes: CWE-338: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) + +Generated applications must be manually patched, following instructions in the release notes: https://www.jhipster.tech/2019/09/13/jhipster-release-6.3.0.html +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'generator-jhipster'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/jhipster/generator-jhipster/security/advisories/GHSA-mwp6-j9wf-968c'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j3rh-8vwq-wh84'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mwp6-j9wf-968c'}, {'type': 'PACKAGE', 'url': 'https://github.com/jhipster/generator-jhipster'}]","{'cwe_ids': ['CWE-338'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:33Z', 'nvd_published_at': None}" +1.4.0,GHSA-v6cj-r88p-92rm,2021-09-20T15:40:54Z,2019-09-30T19:31:59Z,,[],Buffer Overflow in centra,"## Denial of Service + +### Impact + +Affected Centra versions will, when not in stream mode, buffer responses to requests into memory with no size limit. This issue affects anyone requesting content from untrusted sources. + +### Patches + +Version 2.4.0 resolves the issue by limiting the size of buffered response body. + +### Workarounds + +Attempting workarounds isn't recommended. Updating is preferred. + +### For more information + +If you have any questions or comments about this advisory, open an issue in [ethanent/centra](https://github.com/ethanent/centra). + +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'centra'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ethanent/centra/security/advisories/GHSA-v6cj-r88p-92rm'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-v6cj-r88p-92rm'}, {'type': 'PACKAGE', 'url': 'https://github.com/ethanent/centra'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CENTRA-536073'}]","{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:57:00Z', 'nvd_published_at': None}" +1.4.0,GHSA-2p82-v77v-mppr,2023-06-09T20:03:44Z,2019-09-11T23:05:57Z,,['CVE-2019-16060'],Airbrake keys not being filtered,"The Airbrake Ruby notifier 4.2.3 for Airbrake mishandles the blacklist_keys configuration option and consequently may disclose passwords to unauthorized actors. This is fixed in 4.2.4 (also, 4.2.2 and earlier are unaffected).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'airbrake-ruby'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.3'}, {'fixed': '4.2.4'}]}], 'versions': ['4.2.3']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16060'}, {'type': 'WEB', 'url': 'https://github.com/airbrake/airbrake-ruby/issues/468'}, {'type': 'WEB', 'url': 'https://github.com/airbrake/airbrake-ruby/pull/469/commits/d29925e7838031bf7dea7016b22de52532503796'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/airbrake-ruby/CVE-2019-16060.yml'}]","{'cwe_ids': ['CWE-200'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-09-11T22:39:04Z', 'nvd_published_at': '2019-09-06T19:15:00Z'}" +1.4.0,GHSA-63qc-p2x4-9fgf,2021-04-27T19:46:40Z,2019-09-17T22:47:11Z,,['CVE-2019-11777'],Improper Handling of Exceptional Conditions and Origin Validation Error in Eclipse Paho Java client library,"In the Eclipse Paho Java client library version 1.2.0, when connecting to an MQTT server using TLS and setting a host name verifier, the result of that verification is not checked. This could allow one MQTT server to impersonate another and provide the client library with incorrect information.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.paho:org.eclipse.paho.client.mqttv3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11777'}, {'type': 'WEB', 'url': 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=549934'}]","{'cwe_ids': ['CWE-346', 'CWE-755'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-09-13T21:47:04Z', 'nvd_published_at': '2019-09-11T18:15:00Z'}" +1.4.0,GHSA-536q-8gxx-m782,2020-08-31T18:42:32Z,2019-09-11T23:02:57Z,,['CVE-2010-2273'],Cross-Site Scripting in dojo,"Versions of `dojo` prior to 1.4.2 are vulnerable to DOM-based Cross-Site Scripting (XSS). The package does not sanitize URL parameters in the `_testCommon.js` and `runner.html` test files, allowing attackers to execute arbitrary JavaScript in the victim's browser. + + +## Recommendation + +Upgrade to version 1.4.2 or later.",[],"[{'package': {'ecosystem': 'npm', 'name': 'dojo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.0'}, {'fixed': '1.13.1'}]}], 'versions': ['1.13.0']}, {'package': {'ecosystem': 'npm', 'name': 'dojo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.0'}, {'fixed': '1.12.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'dojo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.6'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'dojo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed': '1.10.10'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-2273'}, {'type': 'WEB', 'url': 'https://github.com/dojo/dojo/pull/307'}, {'type': 'WEB', 'url': 'https://github.com/dojo/dojo/commit/9117ffd5a3863e44c92fcd58564c0da22be858f4'}, {'type': 'WEB', 'url': 'https://bugs.dojotoolkit.org/ticket/10773'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/972'}, {'type': 'WEB', 'url': 'http://bugs.dojotoolkit.org/ticket/10773'}, {'type': 'WEB', 'url': 'http://dojotoolkit.org/blog/post/dylan/2010/03/dojo-security-advisory/'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/38964'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/40007'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21431472'}, {'type': 'WEB', 'url': 'http://www-1.ibm.com/support/docview.wss?uid=swg1LO50833'}, {'type': 'WEB', 'url': 'http://www-1.ibm.com/support/docview.wss?uid=swg1LO50849'}, {'type': 'WEB', 'url': 'http://www-1.ibm.com/support/docview.wss?uid=swg1LO50856'}, {'type': 'WEB', 'url': 'http://www-1.ibm.com/support/docview.wss?uid=swg1LO50896'}, {'type': 'WEB', 'url': 'http://www-1.ibm.com/support/docview.wss?uid=swg1LO50932'}, {'type': 'WEB', 'url': 'http://www-1.ibm.com/support/docview.wss?uid=swg1LO50958'}, {'type': 'WEB', 'url': 'http://www-1.ibm.com/support/docview.wss?uid=swg1LO50994'}, {'type': 'WEB', 'url': 'http://www.gdssecurity.com/l/b/2010/03/12/multiple-dom-based-xss-in-dojo-toolkit-sdk/'}, {'type': 'WEB', 'url': 'http://www.vupen.com/english/advisories/2010/1281'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-09-04T04:12:06Z', 'nvd_published_at': None}" +1.4.0,GHSA-3v43-877x-qgmq,2021-08-31T21:29:59Z,2019-09-17T22:47:47Z,,['CVE-2019-10010'],Moderate severity vulnerability that affects league/commonmark,"## CVE-2019-10010 + +### Impact + +In `league/commonmark` 0.18.2 and below, malicious users can insert double-encoded HTML entities into their Markdown like this: + +```md +[XSS](javascript&colon;alert%28'XSS'%29) +``` + +This library would (correctly) unescape the `&` entity to `&` during the parsing step. However, **the renderer step would fail to properly re-escape the resulting `:` string**, thus producing the following malicious HTML output: + +```html +

XSS

+``` + +Browsers would interpret `:` as a `:` character and allow the JS to be executed when the link is clicked. + +This vulnerability was present in the upstream library this project was forked from and therefore exists in all prior versions of `league/commonmark`. + +### Solution + +The new [0.18.3](https://github.com/thephpleague/commonmark/releases/tag/0.18.3) release mirrors [the fix made upstream](https://github.com/commonmark/commonmark.js/commit/c89b35c5fc99bdf1d2181f7f0c9fcb8a1abc27c8) - we no longer attempt to preserve entities when rendering HTML attributes like `href`, `src`, `title`, etc. + +The `$preserveEntities` parameter of `Xml::escape()` is therefore no longer used internally, so it has been deprecated and marked for removal in the next major release (0.19.0). + +### Credits + + - Mohit Fawaz for identifying the issue + - Sebastiaan Knijnenburg and Ross Tuck for responsibly disclosing/relaying the issue + - John MacFarlane for investigating it and implementing the upstream fix we mirrored here + +### References + + - https://nvd.nist.gov/vuln/detail/CVE-2019-10010 + - https://github.com/thephpleague/commonmark/releases/tag/0.18.3 + - https://github.com/thephpleague/commonmark/issues/353 +- https://github.com/FriendsOfPHP/security-advisories/blob/master/league/commonmark/CVE-2019-10010.yaml","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'league/commonmark'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.18.3'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/thephpleague/commonmark/security/advisories/GHSA-3v43-877x-qgmq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10010'}, {'type': 'WEB', 'url': 'https://github.com/thephpleague/commonmark/issues/353'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3v43-877x-qgmq'}, {'type': 'PACKAGE', 'url': 'https://github.com/thephpleague/commonmark/'}, {'type': 'WEB', 'url': 'https://github.com/thephpleague/commonmark/releases/tag/0.18.3'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:56:22Z', 'nvd_published_at': None}" +1.4.0,GHSA-9mrq-cjgh-32g2,2021-12-03T14:38:19Z,2019-09-13T13:22:33Z,,[],Low severity vulnerability that affects smartbanner.js,"## rel noopener vulnerability + +### Impact +Clicking on smartbanner _View_ link and navigating to 3rd party page leaves `window.opener` exposed. It may allow hostile 3rd parties to abuse `window.opener`, e.g. by redirection or injection on the original page with smartbanner. + +### Patches +`rel=""noopener""` is automatically populated to links as of `v1.14.1` which is a recommended upgrade to resolve the vulnerability. + +### Workarounds +If you can not upgrade to `v1.14.1`: +1. Ensure _View_ link is only taking users to App Store or Google Play Store where security is guarded by respective app store security teams +2. If _View_ link is going to a 3rd party page, limit smartbanner.js to be used on iOS that decreases the scope of the vulnerability since as of Safari 12.1, `rel=""noopener""` is imposed on all `target=""_blank""` links. + + Following combination of smartbanner meta tags can be used to achieve the above: + + ```html + + + ``` + +### References +* [About rel=noopener](https://mathiasbynens.github.io/rel-noopener/) +* [Safari 12.1 Release Notes](https://developer.apple.com/documentation/safari_release_notes/safari_12_1_release_notes#3130296) + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [smartbanner.js](https://github.com/ain/smartbanner.js/issues/new) +",[],"[{'package': {'ecosystem': 'npm', 'name': 'smartbanner.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.14.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/ain/smartbanner.js/security/advisories/GHSA-9mrq-cjgh-32g2'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-9mrq-cjgh-32g2'}, {'type': 'PACKAGE', 'url': 'https://github.com/ain/smartbanner.js/'}]","{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:29:02Z', 'nvd_published_at': None}" +1.4.0,GHSA-p6mr-pxg4-68hx,2023-03-01T01:53:44Z,2019-09-17T23:21:34Z,,['CVE-2019-5484'],Symlink Arbitrary File Overwrite in bower,"Versions of `bower` prior to 1.8.8 are affected by an arbitrary file write vulnerability. The vulnerability occurs because `bower` does not verify that extracted symbolic links do not resolve to targets outside of the extraction root directory. + + + +## Recommendation + +Update to version 1.8.8 or later","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'bower'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.8'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5484'}, {'type': 'WEB', 'url': 'https://github.com/bower/bower/commit/45c6bfa86f6e57731b153baca9e0b41a1cc699e3'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/473811'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/487.json'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8ba4c628fba7181af58817d452119481adce4ba92e889c643e4c7dd3@%3Ccommits.netbeans.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb5ac16fad337d1f3bb7079549f97d8166d0ef3082629417c39f12d63@%3Cnotifications.netbeans.apache.org%3E'}, {'type': 'WEB', 'url': 'https://snyk.io/blog/severe-security-vulnerability-in-bowers-zip-archive-extraction'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/776'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-09-17T23:21:00Z', 'nvd_published_at': '2019-09-13T18:15:00Z'}" +1.4.0,GHSA-6m4r-cgm3-6q7q,2021-08-17T22:30:43Z,2019-09-23T18:32:54Z,,['CVE-2019-15478'],Cross-Site Scripting in status-board,"All versions of `status-board` are vulnerable to Cross-Site Scripting. The `renderJsDashboard()` function concatenates the `safeDashboard` variable to the HTTP response message with insufficient sanitization. If this variable is controlled by user input it may allow attackers to execute arbitrary JavaScript in a victim's browser. + + +## Recommendation + +No fix is currently available. Consider using an alternative package until a fix is made available.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'status-board'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.82'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15478'}, {'type': 'WEB', 'url': 'https://github.com/jameswlane/status-board/pull/949'}, {'type': 'WEB', 'url': 'https://github.com/jameswlane/status-board/pull/949/files'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-STATUSBOARD-460293'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1151'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-09-19T15:15:56Z', 'nvd_published_at': None}" +1.4.0,GHSA-mc84-xr9p-938r,2021-09-15T18:50:22Z,2019-09-23T18:31:05Z,,[],High severity vulnerability that affects generator-jhipster,"## Generated code uses repository configuration that downloads over HTTP instead of HTTPS + +### Impact +Gradle users were using the http://repo.spring.io/plugins-release repositories in plain HTTP, and not HTTPS, so a man-in-the-middle attack was possible at build time. + +### Patches + +Maven users should at least upgrade to 6.3.0 while Gradle users should update to 6.3.1. +If you are not able to upgrade make sure not to use a Maven repository via `http` in your build file. + +### Workarounds + +Replace all custom repository definitions in `build.gradle` or `pom.xml` with their `https` version. + +e.g. + +```xml + + oss.sonatype.org-snapshot + https://oss.sonatype.org/content/repositories/snapshots // <-- must be httpS + + false + + + true + + +``` + +```gradle +maven { url ""https://repo.spring.io/plugins-release"" } // <-- must be httpS +``` + +### References +* https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H +* https://max.computer/blog/how-to-take-over-the-computer-of-any-java-or-clojure-or-scala-developer/ + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [https://github.com/jhipster/generator-jhipster/issues](https://github.com/jhipster/generator-jhipster/issues) + +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'generator-jhipster'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.1'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/jhipster/generator-jhipster/security/advisories/GHSA-mc84-xr9p-938r'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mc84-xr9p-938r'}, {'type': 'PACKAGE', 'url': 'https://github.com/jhipster/generator-jhipster/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-GENERATORJHIPSTER-536074'}]","{'cwe_ids': ['CWE-494', 'CWE-829'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:45:50Z', 'nvd_published_at': None}" +1.4.0,GHSA-8864-rhmw-5m6f,2022-08-03T15:33:55Z,2019-09-23T18:32:42Z,,['CVE-2019-15479'],Status Board vulnerable to Cross-Site Scripting before v1.1.82,"Versions of `status-board` prior to 1.1.82 are vulnerable to Cross-Site Scripting. The `renderDashboard()` function concatenates the `safeDashboard` variable to the printed error message with insufficient sanitization. If this variable is controlled by user input it allows attackers to execute arbitrary JavaScript in a victim's browser. + + +## Recommendation + +Upgrade to version 1.1.82 to receive a patch.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'status-board'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.82'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15479'}, {'type': 'WEB', 'url': 'https://github.com/jameswlane/status-board/pull/948'}, {'type': 'WEB', 'url': 'https://github.com/status-board/status-board/commit/19106617865406aa6f8edec036dcb1db427d5f71'}, {'type': 'PACKAGE', 'url': 'https://github.com/jameswlane/status-board'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-STATUSBOARD-460295'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-09-19T15:16:08Z', 'nvd_published_at': None}" +1.4.0,GHSA-4fgq-gq9g-3rw7,2021-04-01T20:57:58Z,2019-09-23T18:32:16Z,,['CVE-2019-10201'],Improper Verification of Cryptographic Signature in keycloak,"It was found that Keycloak's SAML broker, versions up to 6.0.1, did not verify missing message signatures. If an attacker modifies the SAML Response and removes the sections, the message is still accepted, and the message can be modified. An attacker could use this flaw to impersonate other users and gain access to sensitive information.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.1'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10201'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10201'}]","{'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-09-19T15:26:01Z', 'nvd_published_at': '2019-08-14T17:15:00Z'}" +1.4.0,GHSA-vf23-f26f-mjj9,2022-09-17T00:16:53Z,2019-09-23T18:32:02Z,,['CVE-2019-14537'],Access of Resource Using Incompatible Type ('Type Confusion') in yourls/yourls,"## Type juggling vulnerability in the API + +### Impact +YOURLS through 1.7.3 is affected by a type juggling vulnerability in the API component that can result in login bypass. + +### Patches +https://github.com/YOURLS/YOURLS/releases/tag/1.7.4 +https://github.com/YOURLS/YOURLS/pull/2542 + +### References +* https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14537 +* https://github.com/Wocanilo/CVE-2019-14537 + +### For more information +If you have any questions or comments about this advisory: +* Open an issue in [YOURLS repository](https://github.com/YOURLS/YOURLS)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'yourls/yourls'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.4'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/YOURLS/YOURLS/security/advisories/GHSA-vf23-f26f-mjj9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14537'}, {'type': 'WEB', 'url': 'https://github.com/YOURLS/YOURLS/pull/2542'}, {'type': 'WEB', 'url': 'https://github.com/Wocanilo/CVE-2019-14537'}, {'type': 'PACKAGE', 'url': 'https://github.com/YOURLS/YOURLS'}, {'type': 'WEB', 'url': 'https://github.com/YOURLS/YOURLS/commits/master'}, {'type': 'WEB', 'url': 'https://github.com/YOURLS/YOURLS/releases'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vf23-f26f-mjj9'}, {'type': 'WEB', 'url': 'https://security-garage.com/index.php/cves/cve-2019-14537-api-authentication-bypass-via-type-juggling'}]","{'cwe_ids': ['CWE-843'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:57:30Z', 'nvd_published_at': None}" +1.4.0,GHSA-gjh4-fcv3-whpq,2021-08-17T22:20:20Z,2019-09-04T10:02:50Z,,['CVE-2019-15782'],Cross-Site Scripting in webtorrent,"Versions of `webtorrent` prior to 0.107.6 are vulnerable to Cross-Site Scripting. `webtorrent` servers started with `torrent.createServer()` lists a torrent's title and files in the index page without sanitization. This allows attackers to execute arbitrary JavaScript in the victim's browser through files with names containing the malicious payload. The issue is mitigated due to the fact that the server only allows fetching data pieces from the torrent. + + +## Recommendation + +Upgrade to version 0.107.6 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'webtorrent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.107.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15782'}, {'type': 'WEB', 'url': 'https://github.com/webtorrent/webtorrent/pull/1714'}, {'type': 'WEB', 'url': 'https://github.com/webtorrent/webtorrent/commit/7e829b5d52c32d2e6d8f5fbcf0f8f418fffde083'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/681617'}, {'type': 'WEB', 'url': 'https://github.com/webtorrent/webtorrent/compare/v0.107.5...v0.107.6'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-WEBTORRENT-460351'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1158'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-09-03T09:58:03Z', 'nvd_published_at': None}" +1.4.0,GHSA-fxh6-w476-hgr4,2021-08-17T22:21:47Z,2019-09-11T22:59:57Z,,['CVE-2018-1002206'],Directory Traversal in SharpCompress,SharpCompress prior to version 0.21 is vulnerable to path traversal issue in archive extraction.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'NuGet', 'name': 'SharpCompress'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.21.0'}]}]}]","[{'type': 'WEB', 'url': 'https://github.com/adamhathcock/sharpcompress/commit/80ceb1c375fdb1b4ffba16528c99089e804ce61f'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-09-03T22:22:18Z', 'nvd_published_at': None}" +1.4.0,GHSA-8jhx-9gf4-hhf5,2023-08-29T11:51:45Z,2019-09-27T20:01:00Z,,['CVE-2019-16377'],Consul gem insufficient authentication check - Multiple powers in one controller are not always checked correctly,"With the consul ruby gem before 1.0.3, if a controller checks multiple powers using `:if` or `:except` conditions, these conditions are erroneously applied to all power checks in that controller. This can lead to skipped power checks and hence unauthenticated access to certain controller actions.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'consul'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16377'}, {'type': 'WEB', 'url': 'https://github.com/makandra/consul/issues/49'}, {'type': 'PACKAGE', 'url': 'https://github.com/makandra/consul'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/c26fbc13435b8be448ad59131428538049d165e4/gems/consul/CVE-2019-16377.yml'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/consul/CVE-2019-16377.yml'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/consul'}]","{'cwe_ids': ['CWE-284'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-09-25T01:09:01Z', 'nvd_published_at': '2019-09-23T16:15:00Z'}" +1.4.0,GHSA-85cw-hj65-qqv9,2023-09-13T18:22:46Z,2019-09-23T18:33:45Z,,['CVE-2019-16335'],Polymorphic Typing issue in FasterXML jackson-databind,"A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10, 2.8.11.5, and 2.6.7.3. It is related to com.zaxxer.hikari.HikariDataSource. This is a different vulnerability than CVE-2019-14540.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.8.11.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.7.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16335'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2449'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/73c1c2cc76e6cdd7f3a5615cbe3207fe96e4d3db'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3200'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0159'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0160'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0161'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0164'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0445'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0729'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/0fcef7321095ce0bc597d468d150cff3d647f4cb3aef3bd4d20e1c69@%3Ccommits.tinkerpop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/40c00861b53bb611dee7d6f35f864aa7d1c1bd77df28db597cbf27e1@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a360b46061c91c5cad789b6c3190aef9b9f223a2b75c9c9f046fe016@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ad0d238e97a7da5eca47a014f0f7e81f440ed6bf74a93183825e18b9@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/dc6b5cad721a4f6b3b62ed1163894941140d9d5656140fb757505ca0@%3Cissues.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/e90c3feb21702e68a8c08afce37045adb3870f2bf8223fa403fb93fb@%3Ccommits.hbase.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/10/msg00001.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q7CANA7KV53JROZDX5Z5P26UG5VN2K43/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TH5VFUN4P7CCIP7KSEXYA5MUTFCUDUJT/'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Oct/6'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20191004-0002/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4542'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-09-19T09:22:56Z', 'nvd_published_at': '2019-09-15T22:15:00Z'}" +1.4.0,GHSA-869j-5855-hjpm,2021-09-03T22:59:29Z,2019-03-25T16:16:44Z,,['CVE-2019-0191'],Moderate severity vulnerability that affects org.apache.karaf:apache-karaf and org.apache.karaf:karaf,"Apache Karaf kar deployer reads .kar archives and extracts the paths from the ""repository/"" and ""resources/"" entries in the zip file. It then writes out the content of these paths to the Karaf repo and resources directories. However, it doesn't do any validation on the paths in the zip file. This means that a malicious user could craft a .kar file with "".."" directory names and break out of the directories to write arbitrary content to the filesystem. This is the ""Zip-slip"" vulnerability - https://snyk.io/research/zip-slip-vulnerability. This vulnerability is low if the Karaf process user has limited permission on the filesystem. Any Apache Karaf releases prior 4.2.3 is impacted.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.karaf:karaf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.karaf:apache-karaf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0191'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-869j-5855-hjpm'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6856aa7ed7dd805eaf65d0e5e95027dda3b2307aacd1ab4a838c5cd1@%3Cuser.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/cef9a2d4b547625e5214684283ac5c59c9d9740e092e777dc3f85070@%3Ccommits.karaf.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/107462'}]","{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:24:31Z', 'nvd_published_at': None}" +1.4.0,GHSA-xg75-3277-gvvj,2021-09-21T22:30:46Z,2019-03-25T18:04:01Z,,['CVE-2019-5417'],Directory Traversal in serve,"Versions of `serve` before 7.1.3 are vulnerable to Directory Traversal. File paths are not sanitized leading to unauthorized access of system files. + + +## Recommendation + +Upgrade to version 7.1.3 or later","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'serve'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.1.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5417'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/358645'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xg75-3277-gvvj'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/795'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:03:13Z', 'nvd_published_at': None}" +1.4.0,GHSA-pmv6-gf98-p3r5,2023-09-08T19:57:04Z,2019-03-25T16:17:18Z,,['CVE-2019-5414'],Command Injection in kill-port,"Versions of `kill-port` prior to 1.3.2 are vulnerable to Command Injection. The package does not validate user input on the `kill` function. This may allow attackers to run arbitrary commands in the system if user input (such as the port number) is passed directly to the function. + + +## Recommendation + +Upgrade to version 1.3.2 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'kill-port'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5414'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/389561'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pmv6-gf98-p3r5'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/966'}]","{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:39Z', 'nvd_published_at': None}" +1.4.0,GHSA-pfwp-8pq4-g7pv,2022-09-14T22:44:35Z,2019-03-06T17:36:08Z,,['CVE-2019-9212'],Incomplete List of Disallowed Inputs in SOFA-Hessian,"SOFA-Hessian through 4.0.2 allows remote attackers to execute arbitrary commands via a crafted serialized Hessian object because blacklisting of com.caucho.naming.QName and com.sun.org.apache.xpath.internal.objects.XString is mishandled, related to Resin Gadget.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.alipay.sofa:hessian'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.alipay.sofa:hessian'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-9212'}, {'type': 'WEB', 'url': 'https://github.com/alipay/sofa-hessian/issues/34'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-pfwp-8pq4-g7pv'}, {'type': 'PACKAGE', 'url': 'https://github.com/alipay/sofa-hessian'}]","{'cwe_ids': ['CWE-184', 'CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:49:03Z', 'nvd_published_at': None}" +1.4.0,GHSA-573x-jhqh-jg36,2022-09-17T00:57:41Z,2019-03-25T16:16:27Z,,['CVE-2018-6517'],Improper Certificate Validation in chloride,"Prior to version 0.3.0, chloride's use of net-ssh resulted in host fingerprints for previously unknown hosts getting added to the user's known_hosts file without confirmation. In version 0.3.0 this is updated so that the user's known_hosts file is not updated by chloride.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'chloride'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-6517'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/chloride/CVE-2018-6517.yml'}, {'type': 'WEB', 'url': 'https://puppet.com/security/cve/CVE-2018-6517'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201001014342/https://puppet.com/security/cve/CVE-2018-6517'}]","{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:00:14Z', 'nvd_published_at': None}" +1.4.0,GHSA-fx7m-j728-mjw3,2023-01-23T17:07:55Z,2019-03-06T17:35:47Z,,['CVE-2018-20164'],uap-core Regular Expression Denial of Service issue,"An issue was discovered in regex.yaml (aka regexes.yaml) in UA-Parser UAP-Core before 0.6.0. A Regular Expression Denial of Service (ReDoS) issue allows remote attackers to overload a server by setting the User-Agent header in an HTTP(S) request to a value containing a long digit string. (The UAP-Core project contains the vulnerability, propagating to all implementations.)","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]","[{'package': {'ecosystem': 'npm', 'name': 'uap-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20164'}, {'type': 'WEB', 'url': 'https://github.com/ua-parser/uap-core/issues/332'}, {'type': 'WEB', 'url': 'https://github.com/ua-parser/uap-core/commit/010ccdc7303546cd22b9da687c29f4a996990014'}, {'type': 'WEB', 'url': 'https://github.com/ua-parser/uap-core/commit/156f7e12b215bddbaf3df4514c399d683e6cdadc'}, {'type': 'PACKAGE', 'url': 'https://github.com/ua-parser/uap-core'}, {'type': 'WEB', 'url': 'https://www.x41-dsec.de/lab/advisories/x41-2018-009-uaparser/'}]","{'cwe_ids': ['CWE-185'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:35:45Z', 'nvd_published_at': None}" +1.4.0,GHSA-86g5-2wh3-gc9j,2023-08-08T16:43:56Z,2019-03-13T17:26:59Z,,['CVE-2019-5418'],Path Traversal in Action View,"# File Content Disclosure in Action View + +Impact +------ +There is a possible file content disclosure vulnerability in Action View. Specially crafted accept headers in combination with calls to `render file:` can cause arbitrary files on the target server to be rendered, disclosing the file contents. + +The impact is limited to calls to `render` which render file contents without a specified accept format. Impacted code in a controller looks something like this: + +``` ruby +class UserController < ApplicationController + def index + render file: ""#{Rails.root}/some/file"" + end +end +``` + +Rendering templates as opposed to files is not impacted by this vulnerability. + +All users running an affected release should either upgrade or use one of the workarounds immediately. + +Releases +-------- +The 6.0.0.beta3, 5.2.2.1, 5.1.6.2, 5.0.7.2, and 4.2.11.1 releases are available at the normal locations. + +Workarounds +----------- +This vulnerability can be mitigated by specifying a format for file rendering, like this: + +``` ruby +class UserController < ApplicationController + def index + render file: ""#{Rails.root}/some/file"", formats: [:html] + end +end +``` + +In summary, impacted calls to `render` look like this: + +``` +render file: ""#{Rails.root}/some/file"" +``` + +The vulnerability can be mitigated by changing to this: + +``` +render file: ""#{Rails.root}/some/file"", formats: [:html] +``` + +Other calls to `render` are not impacted. + +Alternatively, the following monkey patch can be applied in an initializer: + +``` ruby +$ cat config/initializers/formats_filter.rb +# frozen_string_literal: true + +ActionDispatch::Request.prepend(Module.new do + def formats + super().select do |format| + format.symbol || format.ref == ""*/*"" + end + end +end) +``` + +Credits +------- +Thanks to John Hawthorn of GitHub ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.0'}, {'fixed': '5.2.2.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.2.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.2.11.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.11.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}, {'fixed': '5.1.6.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.1.6.1'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.7.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.0.7.1'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5418'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0796'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1147'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1149'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1289'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-86g5-2wh3-gc9j'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/pFRKI96Sm8Q'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/zRNVOUhKHrg'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/03/msg00042.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y43636TH4D6T46IC6N2RQVJTRFJAAYGA/'}, {'type': 'WEB', 'url': 'https://weblog.rubyonrails.org/2019/3/13/Rails-4-2-5-1-5-1-6-2-have-been-released/'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/46585/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00011.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/152178/Rails-5.2.1-Arbitrary-File-Content-Disclosure.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/03/22/1'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:24:34Z', 'nvd_published_at': None}" +1.4.0,GHSA-c9h6-xhg9-xxrv,2022-09-14T22:45:43Z,2019-03-07T18:48:08Z,,['CVE-2019-0200'],Improper Input Validation in Apache Qpid Broker-J,"A Denial of Service vulnerability was found in Apache Qpid Broker-J versions 6.0.0-7.0.6 (inclusive) and 7.1.0 which allows an unauthenticated attacker to crash the broker instance by sending specially crafted commands using AMQP protocol versions below 1.0 (AMQP 0-8, 0-9, 0-91 and 0-10). Users of Apache Qpid Broker-J versions 6.0.0-7.0.6 (inclusive) and 7.1.0 utilizing AMQP protocols 0-8, 0-9, 0-91, 0-10 must upgrade to Qpid Broker-J versions 7.0.7 or 7.1.1 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.qpid:apache-qpid-broker-j'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.qpid:apache-qpid-broker-j'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.1.0'}, {'fixed': '7.1.1'}]}], 'versions': ['7.1.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0200'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c9h6-xhg9-xxrv'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ac79d48de37d42b64da50384dbe9c8a329c5f553dd12ef7c28a832de@%3Cusers.qpid.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/107215'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:30:53Z', 'nvd_published_at': '2019-03-06T18:29:00Z'}" +1.4.0,GHSA-f58w-649r-qjr9,2021-09-09T21:39:31Z,2019-03-25T16:18:04Z,,['CVE-2019-5729'],Moderate severity vulnerability that affects splunk-sdk,"Splunk-SDK-Python before 1.6.6 does not properly verify untrusted TLS server certificates, which could result in man-in-the-middle attacks.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'splunk-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5729'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-f58w-649r-qjr9'}, {'type': 'WEB', 'url': 'https://www.splunk.com/view/SP-CAAAQAD'}]","{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:33:41Z', 'nvd_published_at': None}" +1.4.0,GHSA-vv4c-g6q7-p3q7,2023-03-13T23:56:32Z,2019-03-25T16:15:54Z,,['CVE-2019-9837'],Doorkeeper-openid_connect contains Open Redirect,Doorkeeper::OpenidConnect (aka the OpenID Connect extension for Doorkeeper) 1.4.x and 1.5.x before 1.5.4 has an open redirect via the redirect_uri field in an OAuth authorization request (that results in an error response) with the 'openid' scope and a prompt=none value. This allows phishing attacks against the authorization flow.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'doorkeeper-openid_connect'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.5.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-9837'}, {'type': 'WEB', 'url': 'https://github.com/doorkeeper-gem/doorkeeper-openid_connect/issues/61'}, {'type': 'WEB', 'url': 'https://github.com/doorkeeper-gem/doorkeeper-openid_connect/pull/66'}, {'type': 'PACKAGE', 'url': 'https://github.com/doorkeeper-gem/doorkeeper-openid_connect'}, {'type': 'WEB', 'url': 'https://github.com/doorkeeper-gem/doorkeeper-openid_connect/blob/master/CHANGELOG.md'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:19Z', 'nvd_published_at': None}" +1.4.0,GHSA-wg37-7mrv-cfwm,2022-09-14T22:45:15Z,2019-03-07T18:47:57Z,,['CVE-2019-0187'],Unauthenticated Remote Code Execution in Apache JMeter,"Unauthenticated RCE is possible when JMeter is used in distributed mode (-r or -R command line options). Attacker can establish a RMI connection to a jmeter-server using RemoteJMeterEngine and proceed with an attack using untrusted data deserialization. This only affect tests running in Distributed mode. Note that versions before 4.0 are not able to encrypt traffic between the nodes, nor authenticate the participating nodes so upgrade to JMeter 5.1 is also advised.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.jmeter:ApacheJMeter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0187'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wg37-7mrv-cfwm'}, {'type': 'WEB', 'url': 'http://mail-archives.apache.org/mod_mbox/jmeter-user/201903.mbox/%3CCAH9fUpaUQaFbgY1Zh4OvKSL4wdvGAmVt%2Bn4fegibDoAxK5XARw%40mail.gmail.com%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/107219'}]","{'cwe_ids': ['CWE-327', 'CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:00:15Z', 'nvd_published_at': None}" +1.4.0,GHSA-gcm4-q2pg-xw89,2023-08-07T13:54:54Z,2019-03-25T16:16:55Z,,['CVE-2019-7539'],ipycache is vulnerable to Code Injection,A code injection issue was discovered in ipycache versions up to 0.1.4.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'ipycache'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7539'}, {'type': 'WEB', 'url': 'https://github.com/rossant/ipycache/issues/47'}, {'type': 'WEB', 'url': 'https://github.com/adi928/ipycache/commit/9cc7cb891ff169b3e8a6f5e84afd8238f566ad8e'}, {'type': 'WEB', 'url': 'https://github.com/adi928/ipycache/commit/c73a726744c90cc2cb200b159edbaf5deddcb753'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gcm4-q2pg-xw89'}, {'type': 'PACKAGE', 'url': 'https://github.com/rossant/ipycache'}]","{'cwe_ids': ['CWE-502', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:36:49Z', 'nvd_published_at': '2019-03-21T21:29:00Z'}" +1.4.0,GHSA-vrh8-27q8-fr8f,2022-09-17T00:09:39Z,2019-03-14T15:39:56Z,,['CVE-2017-3164'],Server-Side Request Forgery (SSRF) in org.apache.solr:solr-core,"Server Side Request Forgery in Apache Solr, versions 1.3 until 7.6 (inclusive). Since the ""shards"" parameter does not have a corresponding whitelist mechanism, a remote attacker with access to the server could make Solr perform an HTTP GET request to any reachable URL.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.30'}, {'fixed': '7.7.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.6.0'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-3164'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-vrh8-27q8-fr8f'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/43026507844ada1ac658ccf7bc939378c13e492fd6538416ce65df39@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/75dc651478f9d04505b46d44fe3ac739e7aaf3d7bf1257973685f8f7@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ca3105b6934ccd28e843dffe39724f6963ff49825e9b709837203649@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/e0f9c652b57a91fdcc287efcead620af9f4d8e46b88f0b761aa265de@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc400db37710ee79378b6c52de3640493ff538c2beb41cefdbbdf2ab8@%3Ccommits.submarine.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190327-0003/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'http://mail-archives.apache.org/mod_mbox/www-announce/201902.mbox/%3CCAECwjAVjBN%3DwO5rYs6ktAX-5%3D-f5JDFwbbTSM2TTjEbGO5jKKA%40mail.gmail.com%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/107026'}]","{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:58:17Z', 'nvd_published_at': None}" +1.4.0,GHSA-8554-jxcw-454q,2023-08-30T22:48:37Z,2019-03-12T15:16:12Z,,['CVE-2019-9710'],Webargs mishandles concurrent JSON parsing,"An issue was discovered in webargs before 5.1.3, as used with marshmallow and other products. JSON parsing uses a short-lived cache to store the parsed JSON body. This cache is not thread-safe, meaning that incorrect JSON payloads could have been parsed for concurrent requests.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'webargs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-9710'}, {'type': 'WEB', 'url': 'https://github.com/marshmallow-code/webargs/issues/371'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8554-jxcw-454q'}, {'type': 'PACKAGE', 'url': 'https://github.com/marshmallow-code/webargs'}, {'type': 'WEB', 'url': 'https://webargs.readthedocs.io/en/latest/changelog.html#id20'}]","{'cwe_ids': ['CWE-362'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:24:21Z', 'nvd_published_at': None}" +1.4.0,GHSA-2g9q-chq2-w8qw,2021-08-30T21:36:58Z,2019-03-14T15:40:16Z,,['CVE-2017-12625'],"Moderate severity vulnerability that affects org.apache.hive:hive, org.apache.hive:hive-exec, and org.apache.hive:hive-service","Apache Hive 2.1.x before 2.1.2, 2.2.x before 2.2.1, and 2.3.x before 2.3.1 expose an interface through which masking policies can be defined on tables or views, e.g., using Apache Ranger. When a view is created over a given table, the policy enforcement does not happen correctly on the table for masked columns.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-exec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-exec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-exec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-service'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-service'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-service'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12625'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2g9q-chq2-w8qw'}, {'type': 'WEB', 'url': 'http://mail-archives.apache.org/mod_mbox/hive-user/201710.mbox/%3C3791103E-80D5-4E75-AF23-6F8ED54DDEBE%40apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/101686'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:51:58Z', 'nvd_published_at': None}" +1.4.0,GHSA-6mqq-8r44-vmjc,2022-09-17T01:04:07Z,2019-03-14T15:41:04Z,,['CVE-2018-1334'],Exposure of Sensitive Information to an Unauthorized Actor in Apache Spark,"In Apache Spark 1.0.0 to 2.1.2, 2.2.0 to 2.2.1, and 2.3.0, when using PySpark or SparkR, it's possible for a different local user to connect to the Spark application and impersonate the user running the Spark application.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-core_2.10'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '2.1.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-core_2.10'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-core_2.11'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '2.1.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-core_2.11'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-core_2.11'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1334'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6mqq-8r44-vmjc'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/4d6d210e319a501b740293daaeeeadb51927111fb8261a3e4cd60060@%3Cdev.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://spark.apache.org/security.html#CVE-2018-1334'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:19:47Z', 'nvd_published_at': None}" +1.4.0,GHSA-cjjf-94ff-43w7,2023-09-13T18:29:43Z,2019-03-25T18:03:09Z,,['CVE-2018-12022'],jackson-databind Deserialization of Untrusted Data vulnerability,"An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a specific property), the service has the Jodd-db jar (for database access for the Jodd framework) in the classpath, and an attacker can provide an LDAP service to access, it is possible to make the service execute a malicious payload.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.9.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.9.3'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.11.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.8.11.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-12022'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2052'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/28badf7ef60ac3e7ef151cd8e8ec010b8479226a'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:0959'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0782'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0877'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1106'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1107'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1108'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1140'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1782'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1797'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1822'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1823'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2804'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2858'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3002'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3140'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3149'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3892'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:4037'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1671098'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-cjjf-94ff-43w7'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/7fcf88aff0d1deaa5c3c7be8d58c05ad7ad5da94b59065d8e7c50c5d@%3Cissues.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZEDLDUYBSTDY4GWDBUXGJNS2RFYTFVRC/'}, {'type': 'WEB', 'url': 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/May/68'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190530-0003/'}, {'type': 'WEB', 'url': 'https://www.blackhat.com/docs/us-16/materials/us-16-Munoz-A-Journey-From-JNDI-LDAP-Manipulation-To-RCE.pdf'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4452'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/107585'}]","{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:42:00Z', 'nvd_published_at': None}" +1.4.0,GHSA-73rf-6mrf-759q,2023-01-23T20:46:50Z,2019-03-19T18:03:25Z,,['CVE-2019-5421'],devise Time-of-check Time-of-use Race Condition vulnerability,Devise ruby gem before 4.6.0 when the `lockable` module is used is vulnerable to a time-of-check time-of-use (TOCTOU) race condition due to `increment_failed_attempts` within the `Devise::Models::Lockable` class not being concurrency safe.,[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'devise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5421'}, {'type': 'WEB', 'url': 'https://github.com/plataformatec/devise/issues/4981'}, {'type': 'WEB', 'url': 'https://github.com/plataformatec/devise/pull/4996'}, {'type': 'PACKAGE', 'url': 'https://github.com/plataformatec/devise'}]","{'cwe_ids': ['CWE-367'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:21:17Z', 'nvd_published_at': None}" +1.4.0,GHSA-v588-qcp3-jv46,2023-09-12T21:06:44Z,2019-03-25T18:03:58Z,,['CVE-2019-5415'],Path Traversal in serve,"Versions of `serve` prior to 7.0.1 are vulnerable to Path Traversal. Explicitly ignored folders can be accessed through if the path contains a `/./`, which allows attackers to access hidden folders and files. + + +## Recommendation + +Upgrade to version 7.0.1 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'serve'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.1.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5415'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/330724'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-v588-qcp3-jv46'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1010'}]","{'cwe_ids': ['CWE-548'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:56:44Z', 'nvd_published_at': None}" +1.4.0,GHSA-gwg9-rgvj-4h5j,2023-09-12T20:50:05Z,2019-03-25T18:03:23Z,,['CVE-2019-5413'],Code Injection in morgan,"Verisons of `morgan` before 1.9.1 are vulnerable to code injection when user input is allowed into the filter or combined with a prototype pollution attack. + + +## Recommendation + +Update to version 1.9.1 or later.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'morgan'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.1'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5413'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/390881'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gwg9-rgvj-4h5j'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/security-wg/blob/master/vuln/npm/473.json'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8ba4c628fba7181af58817d452119481adce4ba92e889c643e4c7dd3@%3Ccommits.netbeans.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb5ac16fad337d1f3bb7079549f97d8166d0ef3082629417c39f12d63@%3Cnotifications.netbeans.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/736'}]","{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:38:10Z', 'nvd_published_at': None}" +1.4.0,GHSA-xhcq-fv7x-grr2,2021-09-21T22:33:16Z,2019-03-14T15:39:45Z,,['CVE-2019-0192'],Critical severity vulnerability that affects org.apache.solr:solr-core,"In Apache Solr versions 5.0.0 to 5.5.5 and 6.0.0 to 6.6.5, the Config API allows to configure the JMX server via an HTTP POST request. By pointing it to a malicious RMI server, an attacker could take advantage of Solr's unsafe deserialization to trigger remote code execution on the Solr side.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '7.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.5.5'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '7.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.6.5'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0192'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2413'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xhcq-fv7x-grr2'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/42c5682f4acd1d03bd963e4f47ae448d7cff66c16b19142773818892@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/53e4744b14fb7f1810405f8ff5531ab0953a23dd09ce8071ce87e00d@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0ace855f569c6b7a0b03ba68566e53b1a1a519abd536bf38978ce4a@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/d0e608c681dfbb16b4da68d99d43fa0ddbd366bb3bcf5bc0d43c56d7@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ec9c572fb803b26ba0318777977ee6d6a2fb3a2c50d9b4224e541d5d@%3Cdev.lucene.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc400db37710ee79378b6c52de3640493ff538c2beb41cefdbbdf2ab8@%3Ccommits.submarine.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190327-0003/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html'}, {'type': 'WEB', 'url': 'http://mail-archives.us.apache.org/mod_mbox/www-announce/201903.mbox/%3CCAECwjAV1buZwg%2BMcV9EAQ19MeAWztPVJYD4zGK8kQdADFYij1w%40mail.gmail.com%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/107318'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:03:29Z', 'nvd_published_at': None}" +1.4.0,GHSA-2fch-jvg5-crf6,2022-09-17T00:03:45Z,2019-03-25T16:17:53Z,,['CVE-2019-6690'],Improper Input Validation python-gnupg,"python-gnupg 0.4.3 allows context-dependent attackers to trick gnupg to decrypt other ciphertext than intended. To perform the attack, the passphrase to gnupg must be controlled by the adversary and the ciphertext should be trusted. Related to a ""CWE-20: Improper Input Validation"" issue affecting the affect functionality component.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'python-gnupg'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.4'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-6690'}, {'type': 'WEB', 'url': 'https://blog.hackeriet.no/cve-2019-6690-python-gnupg-vulnerability/'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2fch-jvg5-crf6'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/02/msg00021.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/12/msg00027.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3WMV6XNPPL3VB3RQRFFOBCJ3AGWC4K47/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6KYZMN2PWXY4ENZVJUVTGFBVYEVY7II/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4VFRUG56542LTYK4444TPJBGR57MT25/'}, {'type': 'WEB', 'url': 'https://pypi.org/project/python-gnupg/#history'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Jan/41'}, {'type': 'WEB', 'url': 'https://usn.ubuntu.com/3964-1/'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227091727/http://www.securityfocus.com/bid/106756'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00008.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00058.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/151341/Python-GnuPG-0.4.3-Improper-Input-Validation.html'}]","{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:41:57Z', 'nvd_published_at': '2019-03-21T16:01:00Z'}" +1.4.0,GHSA-5cf4-jqwp-584g,2022-09-17T00:58:23Z,2019-03-25T16:17:32Z,,['CVE-2018-11767'],Improper Privilege Management in org.apache.hadoop:hadoop-main,"In Apache Hadoop 2.9.0 to 2.9.1, 2.8.3 to 2.8.4, 2.7.5 to 2.7.6, KMS blocking users or granting access to users incorrectly, if the system uses non-default groups mapping mechanisms.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.5'}, {'fixed': '2.7.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.3'}, {'fixed': '2.8.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11767'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5cf4-jqwp-584g'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/246cf223e7dc0c1dff90b78dccb6c3fe94e1a044dbf98e2333393302@%3Ccommon-issues.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5a44590b4eedc5e25f5bd3081d1631b52c174b5b99157f7950ddc270@%3Ccommon-dev.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5fb771f66946dd5c99a8a5713347c24873846f555d716f9ac17bccca@%3Cgeneral.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190416-0009/'}]","{'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:00:30Z', 'nvd_published_at': None}" +1.4.0,GHSA-h436-432x-8fvx,2022-05-26T19:37:39Z,2019-03-14T15:41:12Z,,['CVE-2018-1324'],Infinite loop in org.apache.commons:commons-compress,A specially crafted ZIP archive can be used to cause an infinite loop inside of Apache Commons Compress' extra field parser used by the ZipFile and ZipArchiveInputStream classes in versions 1.11 to 1.15. This can be used to mount a denial of service attack against services that use Compress' zip package.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.commons:commons-compress'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11'}, {'fixed': '1.16'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.15'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1324'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h436-432x-8fvx'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/1c7b6df6d1c5c8583518a0afa017782924918e4d6acfaf23ed5b2089@%3Cdev.commons.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b8ef29df0f1d55aa741170748352ae8e425c7b1d286b2f257711a2dd@%3Cdev.creadur.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5532dc8d5456b5151e8c286801e2e5769f5c04118b29c3b5d13ea387@%3Cissues.beam.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/103490'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1040549'}]","{'cwe_ids': ['CWE-835'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:38:39Z', 'nvd_published_at': '2018-03-16T13:29:00Z'}" +1.4.0,GHSA-gf2v-9hp6-44qg,2022-09-17T00:32:32Z,2019-03-14T15:40:32Z,,['CVE-2016-3083'],"org.apache.hive:hive, org.apache.hive:hive-exec, and org.apache.hive:hive-service vulnerable to Improper Certificate Validation ","Apache Hive (JDBC + HiveServer2) implements SSL for plain TCP and HTTP connections (it supports both transport modes). While validating the server's certificate during the connection setup, the client in Apache Hive before 1.2.2 and 2.0.x before 2.0.1 doesn't seem to be verifying the common name attribute of the certificate. In this way, if a JDBC client sends an SSL request to server abc.com, and the server responds with a valid certificate (certified by CA) but issued to xyz.com, the client will accept that as a valid certificate and the SSL handshake will go through.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.1'}]}], 'versions': ['2.0.0']}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-service'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-service'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.1'}]}], 'versions': ['2.0.0']}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-exec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-exec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.1'}]}], 'versions': ['2.0.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3083'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gf2v-9hp6-44qg'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/0851bcf85635385f94cdaa008053802d92b4aab0a3075e30ed171192@%3Cdev.hive.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/98669'}]","{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:36:59Z', 'nvd_published_at': None}" +1.4.0,GHSA-m63j-wh5w-c252,2023-08-08T16:46:59Z,2019-03-13T17:25:55Z,,['CVE-2019-5419'],Denial of Service Vulnerability in Action View,"# Denial of Service Vulnerability in Action View + +Impact +------ +Specially crafted accept headers can cause the Action View template location code to consume 100% CPU, causing the server unable to process requests. This impacts all Rails applications that render views. + +All users running an affected release should either upgrade or use one of the workarounds immediately. + +Releases +-------- +The 6.0.0.beta3, 5.2.2.1, 5.1.6.2, 5.0.7.2, and 4.2.11.1 releases are available at the normal locations. + +Workarounds +----------- +This vulnerability can be mitigated by wrapping `render` calls with `respond_to` blocks. For example, the following example is vulnerable: + +``` ruby +class UserController < ApplicationController + def index + render ""index"" + end +end +``` + +But the following code is not vulnerable: + +```ruby +class UserController < ApplicationController + def index + respond_to |format| + format.html { render ""index"" } + end + end +end +``` + +Implicit rendering is impacted, so this code is vulnerable: + +```ruby +class UserController < ApplicationController + def index + end +end +``` + +But can be changed this this: + +```ruby +class UserController < ApplicationController + def index + respond_to |format| + format.html { render ""index"" } + end + end +end +``` + +Alternatively to specifying the format, the following monkey patch can be applied in an initializer: + +``` +$ cat config/initializers/formats_filter.rb +# frozen_string_literal: true + +ActionDispatch::Request.prepend(Module.new do + def formats + super().select do |format| + format.symbol || format.ref == ""*/*"" + end + end +end) +``` + +Please note that only the 5.2.x, 5.1.x, 5.0.x, and 4.2.x series are supported at present. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases. + +Also note that the patches for this vulnerability are the same as CVE-2019-5418. + +Credits +------- +Thanks to John Hawthorn of GitHub ","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.2.11.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.2.11.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.0'}, {'fixed': '5.2.2.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.2.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}, {'fixed': '5.1.6.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.1.6.1'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.7.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.0.7.1'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionview'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0.beta1'}, {'fixed': '6.0.0.beta3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5419'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/pull/35708'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/f4c70c2222180b8d9d924f00af0c7fd632e26715'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0796'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1147'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1149'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1289'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/rails'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionview/CVE-2019-5419.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/GN7w9fFAQeI'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/03/msg00042.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y43636TH4D6T46IC6N2RQVJTRFJAAYGA/'}, {'type': 'WEB', 'url': 'https://weblog.rubyonrails.org/2019/3/13/Rails-4-2-5-1-5-1-6-2-have-been-released/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00011.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00025.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00001.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/03/22/1'}]","{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:45:03Z', 'nvd_published_at': None}" +1.4.0,GHSA-99cv-8cvv-666c,2023-08-30T23:03:48Z,2019-03-06T17:35:58Z,,['CVE-2018-20244'],Apache Airflow vulnerable to Stored XSS,"In Apache Airflow before 1.10.2, a malicious admin user could edit the state of objects in the Airflow metadata database to execute arbitrary javascript on certain page views.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20244'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-99cv-8cvv-666c'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2de387213d45bc626d27554a1bde7b8c67d08720901f82a50b6f4231@%3Cdev.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f656fddf9c49293b3ec450437c46709eb01a12d1645136b2f1b8573b@%3Cdev.airflow.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/04/10/6'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:28:04Z', 'nvd_published_at': None}" +1.4.0,GHSA-m42h-mh85-4qgc,2023-07-05T20:28:26Z,2019-03-13T17:28:35Z,,['CVE-2019-5420'],Use of Insufficiently Random Values in Railties Allows Remote Code Execution,"# Possible Remote Code Execution Exploit in Rails Development Mode + +Impact +------ +With some knowledge of a target application it is possible for an attacker to guess the automatically generated development mode secret token. This secret token can be used in combination with other Rails internals to escalate to a remote code execution exploit. + +All users running an affected release should either upgrade or use one of the workarounds immediately. + +Releases +-------- +The 6.0.0.beta3 and 5.2.2.1 releases are available at the normal locations. + +Workarounds +----------- +This issue can be mitigated by specifying a secret key in development mode. +In ""config/environments/development.rb"" add this: + +``` + config.secret_key_base = SecureRandom.hex(64) +``` + +Please note that only the 5.2.x, 5.1.x, 5.0.x, and 4.2.x series are supported at present. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases. + +Credits +------- +Thanks to ooooooo_q +","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'railties'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.0'}, {'fixed': '5.2.2.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.2.0'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5420'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/railties/CVE-2019-5420.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/IsQKvDqZdKw'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y43636TH4D6T46IC6N2RQVJTRFJAAYGA/'}, {'type': 'WEB', 'url': 'https://weblog.rubyonrails.org/2019/3/13/Rails-4-2-5-1-5-1-6-2-have-been-released/'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/46785/'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/152704/Ruby-On-Rails-DoubleTap-Development-Mode-secret_key_base-Remote-Code-Execution.html'}]","{'cwe_ids': ['CWE-330', 'CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:44:46Z', 'nvd_published_at': '2019-03-27T14:29:00Z'}" +1.4.0,GHSA-p2xq-vcm7-xjj6,2022-09-14T22:44:16Z,2019-03-06T17:36:22Z,,['CVE-2018-11793'],Stack Overflow in Apache Mesos,"When parsing a JSON payload with deeply nested JSON structures, the parser in Apache Mesos versions pre-1.4.x, 1.4.0 to 1.4.2, 1.5.0 to 1.5.1, 1.6.0 to 1.6.1, and 1.7.0 might overflow the stack due to unbounded recursion. A malicious actor can therefore cause a denial of service of Mesos masters rendering the Mesos-controlled cluster inoperable.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.mesos:mesos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.mesos:mesos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.mesos:mesos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '1.6.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.mesos:mesos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.7.1'}]}], 'versions': ['1.7.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11793'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-p2xq-vcm7-xjj6'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/9be975c53e5ad612c7e0af39f5b88837fbfbc32108e587d3d8499844@%3Cdev.mesos.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/107281'}]","{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:47:49Z', 'nvd_published_at': None}" +1.4.0,GHSA-77rv-6vfw-x4gc,2023-06-20T18:31:23Z,2019-03-14T15:39:30Z,,['CVE-2019-3778'],spring-security-oauth and spring-security-oauth2 Open Redirect vulnerability,"Spring Security OAuth, versions 2.3 prior to 2.3.5, and 2.2 prior to 2.2.4, and 2.1 prior to 2.1.4, and 2.0 prior to 2.0.17, and older unsupported versions could be susceptible to an open redirector attack that can leak an authorization code. + +A malicious user or attacker can craft a request to the authorization endpoint using the authorization code grant type, and specify a manipulated redirection URI via the ""redirect_uri"" parameter. This can cause the authorization server to redirect the resource owner user-agent to a URI under the control of the attacker with the leaked authorization code. + +This vulnerability exposes applications that meet all of the following requirements: Act in the role of an Authorization Server (e.g. @EnableAuthorizationServer) and uses the DefaultRedirectResolver in the AuthorizationEndpoint. + +This vulnerability does not expose applications that: Act in the role of an Authorization Server and uses a different RedirectResolver implementation other than DefaultRedirectResolver, act in the role of a Resource Server only (e.g. @EnableResourceServer), act in the role of a Client only (e.g. @EnableOAuthClient).","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security.oauth:spring-security-oauth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.17.RELEASE'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security.oauth:spring-security-oauth2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.17.RELEASE'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security.oauth:spring-security-oauth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0.RELEASE'}, {'fixed': '2.1.4.RELEASE'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security.oauth:spring-security-oauth2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0.RELEASE'}, {'fixed': '2.1.4.RELEASE'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security.oauth:spring-security-oauth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0.RELEASE'}, {'fixed': '2.2.4.RELEASE'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security.oauth:spring-security-oauth2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0.RELEASE'}, {'fixed': '2.2.4.RELEASE'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security.oauth:spring-security-oauth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0.RELEASE'}, {'fixed': '2.3.5.RELEASE'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security.oauth:spring-security-oauth2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0.RELEASE'}, {'fixed': '2.3.5.RELEASE'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3778'}, {'type': 'PACKAGE', 'url': 'https://github.com/spring-attic/spring-security-oauth'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2019-3778'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200227084837/http://www.securityfocus.com/bid/107153'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/153299/Spring-Security-OAuth-2.3-Open-Redirection.html'}]","{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:22:03Z', 'nvd_published_at': '2019-03-07T18:29:00Z'}" +1.4.0,GHSA-xgjc-49cw-529m,2021-09-21T22:32:33Z,2019-03-06T17:35:49Z,,['CVE-2019-9142'],Moderate severity vulnerability that affects org.b3log:symphony,An issue was discovered in b3log Symphony (aka Sym) before v3.4.7. XSS exists via the userIntro and userNickname fields to processor/SettingsProcessor.java.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.b3log:symphony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-9142'}, {'type': 'WEB', 'url': 'https://github.com/b3log/symphony/issues/860'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xgjc-49cw-529m'}, {'type': 'PACKAGE', 'url': 'https://github.com/b3log/symphony'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:03:21Z', 'nvd_published_at': None}" +1.4.0,GHSA-qwj8-p662-3m7x,2023-09-11T18:38:48Z,2019-03-25T16:17:05Z,,['CVE-2019-5416'],Path Traversal in localhost-now,"All versions of `localhost-now` are vulnerable to Path Traversal. The package fails to sanitize URLs, allowing attackers to access server files outside of the served folder using relative paths. + + +## Recommendation + +No fix is currently available. Consider using an alternative package until a fix is made available.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'localhost-now'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5416'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/334837'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-qwj8-p662-3m7x'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1005'}]","{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:49:29Z', 'nvd_published_at': None}" +1.4.0,GHSA-gp32-7h29-rpxm,2021-09-13T12:37:35Z,2019-03-14T15:39:14Z,,['CVE-2019-9658'],Moderate severity vulnerability that affects com.puppycrawl.tools:checkstyle,"Checkstyle prior to 8.18 loads external DTDs by default, which can potentially lead to denial of service attacks or the leaking of confidential information.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.puppycrawl.tools:checkstyle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.18'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-9658'}, {'type': 'WEB', 'url': 'https://github.com/checkstyle/checkstyle/issues/6474'}, {'type': 'WEB', 'url': 'https://github.com/checkstyle/checkstyle/issues/6478'}, {'type': 'WEB', 'url': 'https://github.com/checkstyle/checkstyle/pull/6476'}, {'type': 'WEB', 'url': 'https://checkstyle.org/releasenotes.html#Release_8.18'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gp32-7h29-rpxm'}, {'type': 'PACKAGE', 'url': 'https://github.com/checkstyle/checkstyle'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6bf8bbbca826e883f09ba40bc0d319350e1d6d4cf4df7c9e399b2699@%3Ccommits.fluo.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/7eea10e7be4c21060cb1e79f6524c6e6559ba833b1465cd2870a56b9@%3Cserver-dev.james.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/994221405e940e148adcfd9cb24ffc6700bed70c7820c55a22559d26@%3Cnotifications.fluo.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a35a8ccb316d4c2340710f610cba8058e87d5376259b35ef3ed2bf89@%3Cnotifications.accumulo.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/fff26ee7b59360a0264fef4e8ed9454ef652db2c39f2892a9ea1c9cb@%3Cnotifications.fluo.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rda99599896c3667f2cc9e9d34c7b6ef5d2bbed1f4801e1d75a2b0679@%3Ccommits.nifi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/04/msg00029.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2BMOPJ2XYE4LB2HM7OMSUBBIYEDUTLWE/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AEYBAHYAV37WHMOXZYM2ZWF46FHON6YC/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VJPT54USMGWT3Y6XVXLDEHKRUY2EI4OE/'}]","{'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:37:44Z', 'nvd_published_at': None}" +1.4.0,GHSA-xmc8-cjfr-phx3,2021-09-21T22:36:57Z,2019-03-18T15:59:32Z,,['CVE-2018-20801'],Regular Expression Denial of Service in highcharts,"Versions of `highcharts` prior to 6.1.0 are vulnerable to Regular Expression Denial of Service (ReDoS). Untrusted input may cause catastrophic backtracking while matching regular expressions. This can cause the application to be unresponsive leading to Denial of Service. + + +## Recommendation + +Upgrade to version 6.1.0 or higher.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'highcharts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.1.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20801'}, {'type': 'WEB', 'url': 'https://github.com/highcharts/highcharts/commit/7c547e1e0f5e4379f94396efd559a566668c0dfa'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xmc8-cjfr-phx3'}, {'type': 'PACKAGE', 'url': 'https://github.com/highcharts/highcharts'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190715-0001/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/npm:highcharts:20180225'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/793'}]","{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T22:03:47Z', 'nvd_published_at': None}" +1.4.0,GHSA-2j5v-fc74-j9q2,2021-08-30T21:58:23Z,2019-03-14T15:38:56Z,,['CVE-2019-9737'],Cross-Site Scripting in editor.md,"All versions of `editor.md` are vulnerable to Cross-Site Scripting. User input is insufficiently sanitized, allowing attackers to inject malicious code in payloads containing base64-encoded content. + + +## Recommendation + +No fix is currently available. Consider using an alternative module until a fix is made available.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'editor.md'}, 'versions': ['1.5.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-9737'}, {'type': 'WEB', 'url': 'https://github.com/pandao/editor.md/issues/662'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-2j5v-fc74-j9q2'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/794'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T20:52:22Z', 'nvd_published_at': None}" +1.4.0,GHSA-8cw6-5qvp-q3wj,2022-09-14T22:49:01Z,2019-03-14T15:40:57Z,,['CVE-2018-8024'],Exposure of Sensitive Information to an Unauthorized Actor in Apache Spark via crafted URL,"In Apache Spark 2.1.0 to 2.1.2, 2.2.0 to 2.2.1, and 2.3.0, it's possible for a malicious user to construct a URL pointing to a Spark cluster's UI's job and stage info pages, and if a user can be tricked into accessing the URL, can be used to cause script to execute and expose information from the user's view of the Spark UI. While some browsers like recent versions of Chrome and Safari are able to block this type of attack, current versions of Firefox (and possibly others) do not.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-core_2.10'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-core_2.10'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-core_2.11'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-core_2.11'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-core_2.11'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.1'}]}], 'versions': ['2.3.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8024'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8cw6-5qvp-q3wj'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/5f241d2cda21cbcb3b63e46e474cf5f50cce66927f08399f4fab0aba@%3Cdev.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://spark.apache.org/security.html#CVE-2018-8024'}]","{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:25:20Z', 'nvd_published_at': None}" +1.4.0,GHSA-h2f4-v4c4-6wx4,2022-09-17T00:33:03Z,2019-03-28T18:33:38Z,,['CVE-2018-12545'],Uncontrolled Resource Consumption in org.eclipse.jetty:jetty-server,"In Eclipse Jetty version 9.3.x and 9.4.x, the server is vulnerable to Denial of Service conditions if a remote client sends either large SETTINGs frames container containing many settings, or many small SETTINGs frames. The vulnerability is due to the additional CPU and memory allocations required to handle changed settings.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.4.0'}, {'fixed': '9.4.12.v20180830'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.4.12.RC2'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.3.0'}, {'fixed': '9.3.25.v20180904'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.3.24.v20180605'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-12545'}, {'type': 'WEB', 'url': 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=538096'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h2f4-v4c4-6wx4'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/13f5241048ec0bf966a6ddd306feaf40de5b20e1f09096b9cddeddf2@%3Ccommits.accumulo.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/70744fe4faba8e2fa7e50a7fc794dd03cb28dad8b21e08ee59bb1606@%3Cdevnull.infra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/9317fd092b257a0815434b116a8af8daea6e920b6673f4fd5583d5fe@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/febc94ffec9275dcda64633e0276a1400cd318e571009e4cda9b7a79@%3Cnotifications.accumulo.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CIS4LALKZNLF5X5IGNGRSKERG7FY4QG6/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}]","{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:38:26Z', 'nvd_published_at': None}" +1.4.0,GHSA-5gvm-hrw5-h6xf,2022-09-17T01:07:49Z,2019-03-14T15:40:44Z,,['CVE-2015-1772'],"Improper Authentication in org.apache.hive:hive, org.apache.hive:hive-exec, and org.apache.hive:hive-service","The LDAP implementation in HiveServer2 in Apache Hive before 1.0.1 and 1.1.x before 1.1.1, as used in IBM InfoSphere BigInsights 3.0, 3.0.0.1, and 3.0.0.2 and other products, mishandles simple unauthenticated and anonymous bind configurations, which allows remote attackers to bypass authentication via a crafted LDAP request.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.1'}]}], 'versions': ['1.0.0']}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.1'}]}], 'versions': ['1.1.0']}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-exec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.1'}]}], 'versions': ['1.0.0']}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-exec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.1'}]}], 'versions': ['1.1.0']}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-service'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.1'}]}], 'versions': ['1.0.0']}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive-service'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.1'}]}], 'versions': ['1.1.0']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-1772'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5gvm-hrw5-h6xf'}, {'type': 'WEB', 'url': 'https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html'}, {'type': 'WEB', 'url': 'http://mail-archives.apache.org/mod_mbox/www-announce/201505.mbox/%3CCAOpgucy52yzNN1FaRcxwhZmx8ZtNRjmK6V0Bxk4svAD-R1q70Q@mail.gmail.com%3E'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21969546'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1034365'}]","{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2020-06-16T21:16:15Z', 'nvd_published_at': None}" +1.4.0,GHSA-r53w-g4xm-3gc6,2023-08-25T21:32:06Z,2019-10-21T21:59:13Z,,['CVE-2017-1002201'],Haml vulnerable to cross-site scripting,"In haml versions prior to version 5.0.0.beta.2, when using user input to perform tasks on the server, characters like `< > "" '` must be escaped properly. In this case, the `'` character was missed. An attacker can manipulate the input to introduce additional attributes, potentially executing code.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'haml'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1002201'}, {'type': 'WEB', 'url': 'https://github.com/haml/haml/commit/18576ae6e9bdcb4303fdbe6b3199869d289d67c2'}, {'type': 'PACKAGE', 'url': 'https://github.com/haml/haml/'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/haml/CVE-2017-1002201.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/11/msg00007.html'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2021/12/msg00028.html'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202007-27'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-RUBY-HAML-20362'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-10-16T15:18:02Z', 'nvd_published_at': '2019-10-15T18:15:00Z'}" +1.4.0,GHSA-85rf-xh54-whp3,2021-08-25T21:02:38Z,2019-10-07T16:52:13Z,,[],Malicious URL drafting attack against iodines static file server may allow path traversal,"### Impact + +A path traversal vulnerability was detected in iodine's static file service. This vulnerability effects any application running iodine's static file server on an effected iodine version. + +Malicious URL drafting may cause the static file server to attempt a response containing data from files that shouldn't be normally accessible from the public folder. + +### Patches + +The vulnerability was patched in version 0.7.34. Please upgrade to the latest version. + +### Workarounds + +A possible workaround would be to disable the static file service and it's `X-Sendfile` support, sending static files using nginx or a source code solution (sending the data dynamically). + +However, it would be better to upgrade iodine to the latest version, as it also contains non-security related fixes. + +### For more information +If you have any questions or comments about this advisory: +* Email [Boaz Segev](https://github.com/boazsegev)",[],"[{'package': {'ecosystem': 'RubyGems', 'name': 'iodine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.34'}]}], 'database_specific': {'last_known_affected_version_range': '< 0.7.33'}}]","[{'type': 'WEB', 'url': 'https://github.com/boazsegev/iodine/security/advisories/GHSA-85rf-xh54-whp3'}, {'type': 'WEB', 'url': 'https://github.com/boazsegev/iodine/commit/5558233fb7defda706b4f9c87c17759705949889'}, {'type': 'PACKAGE', 'url': 'https://github.com/boazsegev/iodine'}]","{'cwe_ids': ['CWE-22'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2020-04-24T20:13:10Z', 'nvd_published_at': None}" +1.4.0,GHSA-878x-85hc-gc4g,2021-08-18T18:58:35Z,2019-10-11T18:43:29Z,,['CVE-2019-12465'],SQL Injection in LibreNMS,"An issue was discovered in LibreNMS 1.50.1. A SQL injection flaw was identified in the ajax_rulesuggest.php file where the term parameter is used insecurely in a database query for showing columns of a table, as demonstrated by an ajax_rulesuggest.php?debug=1&term= request.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.53'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12465'}, {'type': 'WEB', 'url': 'https://www.darkmatter.ae/xen1thlabs/librenms-sql-injection-vulnerability-xl-19-024/'}]","{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-09-25T12:54:40Z', 'nvd_published_at': '2019-09-09T14:15:00Z'}" +1.4.0,GHSA-49pj-69vf-c689,2023-01-23T20:12:47Z,2019-10-14T21:43:19Z,,['CVE-2019-17383'],netaddr before 1.5.3 and 2.0.4 has Incorrect Default Permissions,"The netaddr gem before 1.5.3 and 2.0.4 for Ruby has misconfigured file permissions, such that a gem install may result in 0777 permissions in the target filesystem.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'netaddr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'netaddr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.3'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17383'}, {'type': 'WEB', 'url': 'https://github.com/dspinhirne/netaddr-rb/issues/29'}, {'type': 'WEB', 'url': 'https://github.com/dspinhirne/netaddr-rb/commit/3aac46c00a36e71905eaa619cb94d45bff6e3b51'}, {'type': 'WEB', 'url': 'https://github.com/dspinhirne/netaddr-rb/commit/c7a7de39b7e1126aef11821f98970db18582948b'}, {'type': 'PACKAGE', 'url': 'https://github.com/dspinhirne/netaddr-rb'}, {'type': 'WEB', 'url': 'https://rubygems.org/gems/netaddr/versions'}]","{'cwe_ids': ['CWE-276'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-10-14T21:39:19Z', 'nvd_published_at': '2019-10-09T16:15:00Z'}" +1.4.0,GHSA-mx7p-6679-8g3q,2022-10-31T16:04:03Z,2019-10-28T20:51:15Z,,['CVE-2019-16942'],Polymorphic Typing in FasterXML jackson-databind,"A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the commons-dbcp (1.4) jar in the classpath, and an attacker can find an RMI service endpoint to access, it is possible to make the service execute a malicious payload. This issue exists because of org.apache.commons.dbcp.datasources.SharedPoolDataSource and org.apache.commons.dbcp.datasources.PerUserPoolDataSource mishandling.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.9.10.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.10'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16942'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2478'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3901'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0159'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0160'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0161'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0164'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0445'}, {'type': 'PACKAGE', 'url': 'https://github.com/FasterXML/jackson-databind'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/GEODE-7255'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/7782a937c9259a58337ee36b2961f00e2d744feafc13084e176d0df5@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a430dbc9be874c41314cc69e697384567a9a24025e819d9485547954@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b2e23c94f9dfef53e04c492e5d02e5c75201734be7adc73a49ef2370@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0@%3Cissues.bookkeeper.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf1bbc0ea4a9f014cf94df9a12a6477d24a27f52741dbc87f2fd52ff2@%3Cissues.geode.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/10/msg00001.html'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q7CANA7KV53JROZDX5Z5P26UG5VN2K43/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TH5VFUN4P7CCIP7KSEXYA5MUTFCUDUJT/'}, {'type': 'WEB', 'url': 'https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Oct/6'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20191017-0006/'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2019/dsa-4542'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuApr2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}]","{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-10-28T19:19:01Z', 'nvd_published_at': '2019-10-01T17:15:00Z'}" +1.4.0,GHSA-j52r-xc68-q8f4,2021-08-18T21:52:58Z,2019-10-23T14:14:32Z,,['CVE-2019-11284'],Insufficiently Protected Credentials in Pivotal Reactor Netty,"Pivotal Reactor Netty, versions prior to 0.8.11, passes headers through redirects, including authorization ones. A remote unauthenticated malicious user may gain access to credentials for a different server than they have access to.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'io.projectreactor.netty:reactor-netty'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.11'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11284'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2019-11284'}]","{'cwe_ids': ['CWE-522'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-10-22T15:49:44Z', 'nvd_published_at': '2019-10-17T18:15:00Z'}" +1.4.0,GHSA-hgch-jjmr-gp7w,2021-07-27T22:20:29Z,2019-10-17T18:27:30Z,,['CVE-2019-10760'],Sandbox Breakout / Arbitrary Code Execution in safer-eval,"Versions of `safer-eval` before 1.3.2 are vulnerable to Sandbox Escape leading to Remote Code Execution. A payload using constructor properties can escape the sandbox and execute arbitrary code. + + +## Recommendation + +Upgrade to version 1.3.2.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'npm', 'name': 'safer-eval'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10760'}, {'type': 'WEB', 'url': 'https://github.com/commenthol/safer-eval/commit/1c29f6a6e304fb650c05056e217e457a0d2cc3c5'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SAFEREVAL-473029'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/787'}]","{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2019-10-16T15:10:50Z', 'nvd_published_at': '2019-10-15T15:15:00Z'}" +1.4.0,GHSA-xg59-m7wx-853q,2021-08-18T22:03:52Z,2019-10-25T19:41:24Z,,['CVE-2019-10756'],Cross-site Scripting in node-red-dashboard,It is possible to inject JavaScript within node-red-dashboard versions prior to version 2.17.0 due to the ui_notification node accepting raw HTML by default.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'npm', 'name': 'node-red-dashboard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.17.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10756'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NODEREDDASHBOARD-471939'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-10-25T16:28:11Z', 'nvd_published_at': '2019-10-08T19:15:00Z'}" +1.4.0,GHSA-974j-wjxx-wggj,2021-06-11T15:59:46Z,2019-10-14T21:23:26Z,,['CVE-2019-1000011'],Incorrect Access Control vulnerability in api-platform/core,API Platform version from 2.2.0 to 2.3.5 contains an Incorrect Access Control vulnerability in GraphQL delete mutations that can result in a user authorized to delete a resource can delete any resource. This attack appears to be exploitable via the user must be authorized. This vulnerability appears to have been fixed in 2.3.6.,"[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'api-platform/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'api-platform/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.6'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1000011'}, {'type': 'WEB', 'url': 'https://github.com/api-platform/core/issues/2364'}, {'type': 'WEB', 'url': 'https://github.com/api-platform/core/pull/2441'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/api-platform/core/CVE-2019-1000011.yaml'}]","{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-09-25T12:48:16Z', 'nvd_published_at': '2019-02-04T21:29:00Z'}" +1.4.0,GHSA-v3f6-f29f-rgvp,2021-08-18T21:44:06Z,2019-10-10T19:31:31Z,,['CVE-2017-6923'],Missing Authorization in Drupal,"In Drupal 8.x prior to 8.3.7 When creating a view, you can optionally use Ajax to update the displayed data via filter parameters. The views subsystem/module did not restrict access to the Ajax endpoint to only views configured to use Ajax. This is mitigated if you have access restrictions on the view. It is best practice to always include some form of access restrictions on all views, even if you are using another module to display them.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]","[{'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0'}, {'fixed': '8.3.7'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-6923'}, {'type': 'WEB', 'url': 'https://www.drupal.org/forum/newsletters/security-advisories-for-drupal-core/2017-08-16/drupal-core-multiple'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/100368'}, {'type': 'WEB', 'url': 'http://www.securitytracker.com/id/1039200'}]","{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-10-10T19:30:05Z', 'nvd_published_at': '2019-01-22T15:29:00Z'}" +1.4.0,GHSA-7qmg-qg53-mrp8,2021-08-17T22:37:41Z,2019-10-11T18:41:59Z,,['CVE-2019-12404'],Cross-site scripting in Apache JSPWiki,"On Apache JSPWiki, up to version 2.11.0.M4, a carefully crafted plugin link invocation could trigger an XSS vulnerability on Apache JSPWiki, related to InfoContent.jsp, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.jspwiki:jspwiki-war'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.11.0.M5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.11.0.M4'}}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12404'}, {'type': 'WEB', 'url': 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-12404'}]","{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2019-09-25T12:33:41Z', 'nvd_published_at': '2019-09-23T15:15:00Z'}" +1.4.0,GHSA-hhwc-8g49-j8jx,2023-08-25T23:43:43Z,2019-10-25T19:41:34Z,,['CVE-2019-18409'],Ruby_parser-legacy Incorrect Permission Assignment for Critical Resource,"The ruby_parser-legacy (aka legacy) gem 1.0.0 for Ruby allows local privilege escalation because of world-writable files. For example, if the brakeman gem (which has a legacy dependency) 4.5.0 through 4.7.0 is used, a local user can insert malicious code into the `ruby_parser-legacy-1.0.0/lib/ruby_parser/legacy/ruby_parser.rb` file.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]","[{'package': {'ecosystem': 'RubyGems', 'name': 'ruby_parser-legacy'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-18409'}, {'type': 'WEB', 'url': 'https://github.com/zenspider/ruby_parser-legacy/issues/1'}, {'type': 'WEB', 'url': 'https://brakemanscanner.org/blog/2019/10/14/brakeman-4-dot-7-dot-1-released'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/brakeman/CVE-2019-18409.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/zenspider/ruby_parser-legacy'}]","{'cwe_ids': ['CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-10-25T16:26:28Z', 'nvd_published_at': '2019-10-24T14:15:00Z'}" +1.4.0,GHSA-2mh8-gx2m-mr75,2022-10-07T20:33:24Z,2019-10-17T18:15:16Z,,['CVE-2019-17359'],Out-of-Memory Error in Bouncy Castle Crypto,"The ASN.1 parser in Bouncy Castle Crypto (aka BC Java) 1.63 can trigger a large attempted memory allocation, and resultant OutOfMemoryError error, via crafted ASN.1 data. This is fixed in 1.64.","[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]","[{'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk14'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.63'}, {'fixed': '1.64'}]}], 'versions': ['1.63']}]","[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17359'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r02f887807a49cfd1f1ad53f7a61f3f8e12f60ba2c930bec163031209@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r16c3a90cb35ae8a9c74fd5c813c16d6ac255709c9f9d71cd409e007d@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r467ade3fef3493f1fff1a68a256d087874e1f858ad1de7a49fe05d27@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4d475dcaf4f57115fa57d8e06c3823ca398b35468429e7946ebaefdc@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r79b6a6aa0dd1aeb57bd253d94794bc96f1ec005953c4bd5414cc0db0@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8ecb5b76347f84b6e3c693f980dbbead88c25f77b815053c4e6f2c30@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r91b07985b1307390a58c5b9707f0b28ef8e9c9e1c86670459f20d601@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re60f980c092ada4bfe236dcfef8b6ca3e8f3b150fc0f51b8cc13d59d@%3Ccommits.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20191024-0006/'}, {'type': 'WEB', 'url': 'https://www.bouncycastle.org/latest_releases.html'}, {'type': 'WEB', 'url': 'https://www.bouncycastle.org/releasenotes.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2021.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}]","{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2019-10-17T17:34:50Z', 'nvd_published_at': '2019-10-08T14:15:00Z'}" +1.4.0,GHSA-c427-hjc3-wrfw,2022-07-29T17:54:58Z,2019-10-15T19:27:05Z,,['CVE-2019-17495'],Cross-site scripting in Swagger-UI,"A Cascading Style Sheets (CSS) injection vulnerability in Swagger UI before 3.23.11 allows attackers to use the Relative Path Overwrite (RPO) technique to perform CSS-based input field value exfiltration, such as exfiltration of a CSRF token value. In other words, this product intentionally allows the embedding of untrusted JSON data from remote servers, but it was not previously known that