schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 8 154 | details stringlengths 31 19.1k | severity stringlengths 2 92 | affected stringlengths 75 28.5k | references stringlengths 79 7.48k | database_specific stringlengths 131 196 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-hx77-5p88-f92r | 2022-01-04T20:21:47Z | 2022-01-05T20:33:55Z | null | ['CVE-2021-4131'] | livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF) | livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.91'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4131'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/3b5d0a8a43595a7f05f2a81b76623a8d7e5ad19f'}, {'type': 'PACKAGE', 'url': 'https://github.com/livehelperchat/livehelperchat'}, {'type': 'WEB', 'url': 'https://hunt... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-04T20:21:47Z', 'nvd_published_at': '2021-12-18T07:15:00Z'} |
1.4.0 | GHSA-77hh-p7r6-66pv | 2023-07-08T00:05:45Z | 2022-01-22T00:00:50Z | null | ['CVE-2022-22929'] | Arbitrary File Upload in Mingsoft MCMS | MCMS v5.2.4 was discovered to have an arbitrary file upload vulnerability in the New Template module, which allows attackers to execute arbitrary code via a crafted ZIP file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22929'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20230521040336/https://gitee.com/mingSoft/MCMS/issues/I4Q4NV'}] | {'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-08T00:05:45Z', 'nvd_published_at': '2022-01-21T00:15:00Z'} |
1.4.0 | GHSA-65mj-7c86-79jf | 2022-02-07T22:34:28Z | 2022-01-27T15:23:19Z | null | ['CVE-2021-3850'] | Authentication Bypass in ADOdb/ADOdb | ### Impact
An attacker can inject values into a PostgreSQL connection string by providing a parameter surrounded by single quotes.
Depending on how the library is used in the client software, this may allow an attacker to bypass the login process, gain access to the server's IP address, etc.
### Patches
The vulnera... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'adodb/adodb-php'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.20.21'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.20.20'}}, {'package': {'ecosystem': 'Packagist', 'name': 'adodb/adodb-php'}, 'ranges': [{'type': ... | [{'type': 'WEB', 'url': 'https://github.com/ADOdb/ADOdb/security/advisories/GHSA-65mj-7c86-79jf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3850'}, {'type': 'WEB', 'url': 'https://github.com/ADOdb/ADOdb/issues/793'}, {'type': 'WEB', 'url': 'https://github.com/ADOdb/ADOdb/commit/952de6c4273... | {'cwe_ids': ['CWE-287', 'CWE-305'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-24T22:39:29Z', 'nvd_published_at': '2022-01-25T15:15:00Z'} |
1.4.0 | GHSA-54hw-mhgh-x4vc | 2022-01-26T22:09:18Z | 2022-01-26T22:09:49Z | null | ['CVE-2021-4146'] | Business Logic Errors in pimcore | In pimcore versions prior to 10.2.9 discounts could be negative resulting in unintended behavior. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.2.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4146'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/issues/11024'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/11206'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/7011922f7f0f97a82d8c378559... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-25T19:35:04Z', 'nvd_published_at': '2022-01-18T16:15:00Z'} |
1.4.0 | GHSA-5qx5-vg5w-5mx3 | 2022-04-29T04:37:47Z | 2022-01-13T00:00:54Z | null | ['CVE-2022-23108'] | Stored XSS vulnerability in Jenkins Badge Plugin | Jenkins Badge Plugin 1.9 and earlier does not escape the description and does not check for allowed protocols when creating a badge, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:badge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23108'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/badge-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2547'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-29T04:37:47Z', 'nvd_published_at': '2022-01-12T20:15:00Z'} |
1.4.0 | GHSA-3pp3-77j6-8ph6 | 2021-03-29T16:45:40Z | 2022-01-06T20:41:04Z | null | ['CVE-2020-9487'] | Missing Authentication for Critical Function in Apache NiFi | In Apache NiFi 1.0.0 to 1.11.4, the NiFi download token (one-time password) mechanism used a fixed cache size and did not authenticate a request to create a download token, only when attempting to use the token to access the content. An unauthenticated user could repeatedly request download tokens, preventing legitimat... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.12.0-RC1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.11.4'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-9487'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi/commit/01e42dfb3291c3a3549023edadafd2d8023f3042'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security#CVE-2020-9487'}] | {'cwe_ids': ['CWE-306'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T16:45:40Z', 'nvd_published_at': '2020-10-01T20:15:00Z'} |
1.4.0 | GHSA-9x9j-836w-8f55 | 2021-10-20T22:19:13Z | 2022-01-06T19:44:01Z | null | ['CVE-2020-1026'] | Incorrect Calculation in the MSR JavaScript Cryptography Library | A Security Feature Bypass vulnerability exists in the MSR JavaScript Cryptography Library that is caused by multiple bugs in the library's Elliptic Curve Cryptography (ECC) implementation.An attacker could potentially abuse these bugs to learn information about a server's private ECC key (a key leakage attack) or craft... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'msrcrypto'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1026'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1026'}] | {'cwe_ids': ['CWE-682'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T19:19:10Z', 'nvd_published_at': '2020-04-15T15:15:00Z'} |
1.4.0 | GHSA-ch22-x2v3-v6vq | 2022-01-19T18:50:06Z | 2022-01-21T23:20:25Z | null | ['CVE-2022-21690'] | OTF-001: Improper Input Sanitation: The path parameter of the requested URL is not sanitized before being passed to the QT frontend | Between September 26, 2021 and October 8, 2021, [Radically Open Security](https://www.radicallyopensecurity.com/) conducted a penetration test of OnionShare 2.4, funded by the Open Technology Fund's [Red Team lab](https://www.opentech.fund/labs/red-team-lab/). This is an issue from that penetration test.
- Vulnerabili... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'onionshare-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/onionshare/onionshare/security/advisories/GHSA-ch22-x2v3-v6vq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21690'}, {'type': 'PACKAGE', 'url': 'https://github.com/onionshare/onionshare'}, {'type': 'WEB', 'url': 'https://github.com/onionshare/onion... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T18:50:06Z', 'nvd_published_at': '2022-01-18T23:15:00Z'} |
1.4.0 | GHSA-prff-6j8q-vrv7 | 2022-02-03T21:01:48Z | 2022-01-28T22:15:33Z | null | ['CVE-2022-0379'] | Cross-site Scripting in microweber | There is a persistent XSS Vulnerability exsists in the checkout page where we can able to execute any javascription in the last name field | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0379'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/f017cbfbd5c4f097d2c78c5e15b6c8a9da479d7b'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/9... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-27T18:41:26Z', 'nvd_published_at': '2022-01-26T16:15:00Z'} |
1.4.0 | GHSA-6vfc-qv3f-vr6c | 2022-01-19T18:25:52Z | 2022-01-12T22:20:22Z | null | ['CVE-2022-21670'] | Uncontrolled Resource Consumption in markdown-it | ### Impact
Special patterns with length > 50K chars can slow down parser significantly.
```js
const md = require('markdown-it')();
md.render(`x ${' '.repeat(150000)} x \nx`);
```
### Patches
Upgrade to v12.3.2+
### Workarounds
No.
### References
Fix + test sample: https://github.com/markdown-it/markdown-it/c... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'markdown-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.3.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/markdown-it/markdown-it/security/advisories/GHSA-6vfc-qv3f-vr6c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21670'}, {'type': 'WEB', 'url': 'https://github.com/markdown-it/markdown-it/commit/ffc49ab46b5b751cd2be0aabb146f2ef84986101'}, {'type': 'P... | {'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-10T21:50:05Z', 'nvd_published_at': '2022-01-10T21:15:00Z'} |
1.4.0 | GHSA-9783-42pm-x5jq | 2023-06-13T17:22:23Z | 2022-01-06T22:13:58Z | null | ['CVE-2021-45686'] | Use of Uninitialized Resource in csv-sniffer. | Affected versions of this crate passes an uninitialized buffer to a user-provided Read implementation (within fn preamble_skipcount()).
Arbitrary Read implementations can read from the uninitialized buffer (memory exposure) and also can return incorrect number of bytes written to the buffer. Reading from uninitialized... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'csv-sniffer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45686'}, {'type': 'WEB', 'url': 'https://github.com/jblondin/csv-sniffer/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/jblondin/csv-sniffer/pull/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/jblondin/csv-sniffer'}, {'type': 'WEB', 'u... | {'cwe_ids': ['CWE-908'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T17:04:29Z', 'nvd_published_at': '2021-12-27T00:15:00Z'} |
1.4.0 | GHSA-jqjj-r4qp-x2gh | 2022-01-07T16:25:54Z | 2022-01-06T22:12:42Z | null | ['CVE-2021-45693'] | Use of Uninitialized Resource in messagepack-rs. | An issue was discovered in the messagepack-rs crate through 2021-01-26 for Rust. deserialize_string_primitive may read from uninitialized memory locations. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'messagepack-rs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.8.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45693'}, {'type': 'WEB', 'url': 'https://github.com/otake84/messagepack-rs/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/otake84/messagepack-rs'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crate... | {'cwe_ids': ['CWE-908'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T14:38:22Z', 'nvd_published_at': '2021-12-27T00:15:00Z'} |
1.4.0 | GHSA-pq7m-3gw7-gq5x | 2022-03-29T22:14:36Z | 2022-01-21T18:55:30Z | null | ['CVE-2022-21699'] | Execution with Unnecessary Privileges in ipython | We’d like to disclose an arbitrary code execution vulnerability in IPython that stems from IPython executing untrusted files in CWD. This vulnerability allows one user to run code as another.
Proof of concept
User1:
```
mkdir -m 777 /tmp/profile_default
mkdir -m 777 /tmp/profile_default/startup
echo 'print("stealing... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ipython'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.11'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ipython'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '7.16.3'}]}]}, {'package': {'ecosystem': 'Py... | [{'type': 'WEB', 'url': 'https://github.com/ipython/ipython/security/advisories/GHSA-pq7m-3gw7-gq5x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21699'}, {'type': 'WEB', 'url': 'https://github.com/ipython/ipython/commit/46a51ed69cdf41b4333943d9ceeb945c4ede5668'}, {'type': 'PACKAGE', 'url': ... | {'cwe_ids': ['CWE-250', 'CWE-269', 'CWE-279'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T21:26:17Z', 'nvd_published_at': '2022-01-19T22:15:00Z'} |
1.4.0 | GHSA-57hg-26h7-9qgv | 2022-01-25T20:49:09Z | 2022-01-21T23:48:07Z | null | ['CVE-2022-0256'] | pimcore is vulnerable to Cross-site Scripting | pimcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.2.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0256'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/dff1cb0c466abcd55f1268934de3ed937b7436a7'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8d88e48a-7124... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T14:22:36Z', 'nvd_published_at': '2022-01-17T16:15:00Z'} |
1.4.0 | GHSA-xvcg-2q82-r87j | 2022-01-07T16:25:11Z | 2022-01-06T22:18:19Z | null | ['CVE-2019-25055'] | Panic mishandled in libpulse-binding | An issue was discovered in the libpulse-binding crate before 2.6.0 for Rust. It mishandles a panic that crosses a Foreign Function Interface (FFI) boundary. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'libpulse-binding'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-25055'}, {'type': 'WEB', 'url': 'https://github.com/jnqnfe/pulse-binding-rust/commit/7fd282aef7787577c385aed88cb25d004b85f494'}, {'type': 'PACKAGE', 'url': 'https://github.com/jnqnfe/pulse-binding-rust'}, {'type': 'WEB', 'url': 'https://raw.githubu... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T18:18:40Z', 'nvd_published_at': '2021-12-27T00:15:00Z'} |
1.4.0 | GHSA-7528-7jg5-6g62 | 2022-01-31T21:46:37Z | 2022-01-27T15:09:00Z | null | ['CVE-2022-21715'] | Cross-site Scripting Vulnerability in CodeIgniter4 | ### Impact
Cross-Site Scripting (XSS) vulnerability was found in `API\ResponseTrait` in Codeigniter4.
Attackers can do XSS attacks if you are using `API\ResponseTrait`.
### Patches
Upgrade to v4.1.8 or later.
### Workarounds
Do one of the following:
1. Do not use `API\ResponseTrait` nor `ResourceController`
2. Disabl... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'codeigniter4/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.8'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/codeigniter4/CodeIgniter4/security/advisories/GHSA-7528-7jg5-6g62'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21715'}, {'type': 'WEB', 'url': 'https://github.com/codeigniter4/CodeIgniter4/commit/70d881cf5322b7c32e69516aebd2273ac6a1e8dd'}, {'type'... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-24T22:20:42Z', 'nvd_published_at': '2022-01-24T20:15:00Z'} |
1.4.0 | GHSA-fj2w-wfgv-mwq6 | 2022-01-24T22:05:38Z | 2022-01-21T23:21:48Z | null | [] | Denial of service in CBOR library | ### Impact
Due to this library's use of an inefficient algorithm, it is vulnerable to a denial of service attack when a maliciously crafted input is passed to `DecodeFromBytes` or other CBOR decoding mechanisms in this library.
Affected versions _include_ versions 4.0.0 through 4.5.0.
This vulnerability was private... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'com.upokecenter:cbor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.5.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/peteroupc/CBOR-Java/security/advisories/GHSA-fj2w-wfgv-mwq6'}, {'type': 'PACKAGE', 'url': 'https://github.com/peteroupc/CBOR-Java'}] | {'cwe_ids': ['CWE-407'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T16:15:17Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vc3p-29h2-gpcp | 2023-02-08T00:37:41Z | 2022-01-02T00:00:48Z | null | ['CVE-2021-44716'] | golang.org/x/net/http2 allows uncontrolled memory consumption | net/http in Go before 1.16.12 and 1.17.x before 1.17.5 allows uncontrolled memory consumption in the header canonicalization cache via HTTP/2 requests. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'golang.org/x/net/http2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20211209124913-491a49abca63'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44716'}, {'type': 'WEB', 'url': 'https://go.dev/cl/369794'}, {'type': 'WEB', 'url': 'https://go.dev/issue/50058'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/golang-announce/c/hcmEScgc00k'}, {'type': 'WEB', 'url': 'https://lists.debian.org... | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T00:37:41Z', 'nvd_published_at': '2022-01-01T05:15:00Z'} |
1.4.0 | GHSA-wrxc-mr2w-cjpv | 2023-03-08T21:32:06Z | 2022-01-07T00:20:50Z | null | ['CVE-2020-11529'] | Open Redirect in Grav | Common/Grav.php in Grav before 1.6.23 has an Open Redirect. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'getgrav/grav'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.23'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11529'}, {'type': 'WEB', 'url': 'https://github.com/getgrav/grav/issues/3134'}, {'type': 'WEB', 'url': 'https://github.com/getgrav/grav/commit/2eae104c7a4bf32bc26cb8073d5c40464bfda3f7'}, {'type': 'WEB', 'url': 'https://getgrav.org/#changelog'}, {'t... | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T22:30:40Z', 'nvd_published_at': '2020-04-04T19:15:00Z'} |
1.4.0 | GHSA-hp68-xhvj-x6j6 | 2022-08-11T18:43:28Z | 2022-01-06T18:34:18Z | null | ['CVE-2021-43843'] | jsx-slack insufficient patch for CVE-2021-43838 ReDoS | We found the patch for CVE-2021-43838 in jsx-slack v4.5.1 is insufficient to save from Regular Expression Denial of Service (ReDoS) attack.
This vulnerability affects to jsx-slack v4.5.1 and earlier versions.
### Impact
If attacker can put a lot of JSX elements into `<blockquote>` tag _with including multibyte chara... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'jsx-slack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/yhatt/jsx-slack/security/advisories/GHSA-55xv-f85c-248q'}, {'type': 'WEB', 'url': 'https://github.com/yhatt/jsx-slack/security/advisories/GHSA-hp68-xhvj-x6j6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43843'}, {'type': 'WEB', 'url': 'https://git... | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-04T20:19:23Z', 'nvd_published_at': '2021-12-20T22:15:00Z'} |
1.4.0 | GHSA-4vf4-qmvg-mh7h | 2023-08-29T16:46:42Z | 2022-01-21T23:22:17Z | null | ['CVE-2021-41819'] | Cookie Prefix Spoofing in CGI::Cookie.parse | CGI::Cookie.parse in Ruby through 2.6.8 mishandles security prefixes in cookie names. This also affects the CGI gem prior to versions 0.3.1, 0.2.1, 0.1.1, and 0.1.0.1 for Ruby. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'cgi'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.0'}, {'fixed': '0.3.1'}]}], 'versions': ['0.3.0']}, {'package': {'ecosystem': 'RubyGems', 'name': 'cgi'}, 'ecosystem_specific': {'affected_functions'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41819'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/910552'}, {'type': 'PACKAGE', 'url': 'https://github.com/ruby/cgi'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/cgi/CVE-2021-41819.yml'}, {'typ... | {'cwe_ids': ['CWE-565'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-13T18:53:26Z', 'nvd_published_at': '2022-01-01T06:15:00Z'} |
1.4.0 | GHSA-8gjm-h3xj-mp6w | 2022-01-07T17:55:53Z | 2022-01-06T22:10:43Z | null | ['CVE-2021-45698'] | RPC call failure in ckb | An issue was discovered in the ckb crate before 0.40.0 for Rust. A get_block_template RPC call may fail in situations where it is supposed to select a Nervos CKB blockchain transaction with a higher fee rate than another transaction. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'ckb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.40.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/nervosnetwork/ckb/security/advisories/GHSA-v666-6w97-pcwm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45698'}, {'type': 'PACKAGE', 'url': 'https://github.com/nervosnetwork/ckb'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/a... | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T23:45:58Z', 'nvd_published_at': '2021-12-27T00:15:00Z'} |
1.4.0 | GHSA-9hg3-hmmf-c3gr | 2022-09-08T00:00:03Z | 2022-01-11T00:00:48Z | null | ['CVE-2022-22821'] | Path Traversal in nemo-toolkit | NVIDIA NeMo before 1.6.0 contains a vulnerability in ASR WebApp, in which ../ Path Traversal may lead to deletion of any directory when admin privileges are available. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'nemo-toolkit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/NVIDIA/NeMo/security/advisories/GHSA-rpx7-33j2-xx9x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22821'}, {'type': 'PACKAGE', 'url': 'https://github.com/NVIDIA/NeMo'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-08T00:00:03Z', 'nvd_published_at': '2022-01-10T14:12:00Z'} |
1.4.0 | GHSA-c7fh-chf7-jr5x | 2022-01-06T18:36:46Z | 2022-01-06T18:44:27Z | null | ['CVE-2021-29061'] | ReDOS in Vfsjfilechooser2 | A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in Vfsjfilechooser2 which occurs when the application attempts to validate crafted URIs. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.github.fracpete:vfsjfilechooser2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29061'}, {'type': 'WEB', 'url': 'https://github.com/fracpete/vfsjfilechooser2/issues/7'}, {'type': 'WEB', 'url': 'https://github.com/fracpete/vfsjfilechooser2/commit/9c9f2c317f3de5ece60a3ae28c371e9796e3909b'}, {'type': 'WEB', 'url': 'https://github... | {'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-22T16:02:32Z', 'nvd_published_at': '2021-06-21T20:15:00Z'} |
1.4.0 | GHSA-86ch-6w7v-v6xf | 2022-01-18T22:37:17Z | 2022-01-08T00:24:44Z | null | ['CVE-2022-21667'] | Denial of Service in soketi | ### Impact
_What kind of vulnerability is it? Who is impacted?_
There was a wrong behavior when reading POST requests, making the server crash if it couldn't read the body. In case a POST request was sent to any endpoint of the server with an empty body, **even unauthenticated with the Pusher Protocol**, it would simp... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': '@soketi/soketi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.24.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/soketi/soketi/security/advisories/GHSA-86ch-6w7v-v6xf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21667'}, {'type': 'WEB', 'url': 'https://github.com/soketi/soketi/commit/4b12efef9c31117c36a0a0f1c3aa32114e86364b'}, {'type': 'PACKAGE', 'url': 'htt... | {'cwe_ids': ['CWE-755'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T23:46:31Z', 'nvd_published_at': '2022-01-10T14:12:00Z'} |
1.4.0 | GHSA-cvp7-c586-cmf4 | 2022-02-01T15:17:33Z | 2022-01-28T22:01:45Z | 2022-02-01T15:17:33Z | ['CVE-2022-0329'] | Withdrawn: Code Injection in loguru | # Withdrawn
This advisory has been withdrawn after the maintainers of loguru noted this issue is not a security vulnerability and the CVE has been revoked. We have [stopped](https://github.com/Delgan/loguru/issues/563#issuecomment-1025223732) Dependabot alerts regarding this issue.
## Original Description
In version... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'loguru'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.5.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0329'}, {'type': 'WEB', 'url': 'https://github.com/Delgan/loguru/issues/563'}, {'type': 'WEB', 'url': 'https://github.com/delgan/loguru/commit/4b0070a4f30cbf6d5e12e6274b242b62ea11c81b'}, {'type': 'PACKAGE', 'url': 'https://github.com/delgan/loguru'... | {'cwe_ids': ['CWE-94'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-01-25T23:33:20Z', 'nvd_published_at': '2022-01-21T11:15:00Z'} |
1.4.0 | GHSA-83x4-9cwr-5487 | 2022-02-02T16:07:18Z | 2022-01-06T18:32:58Z | null | ['CVE-2021-4133'] | Improper Authorization in Keycloak | A incorrect authorization flaw was found in Keycloak 12.0.0, the flaw allows an attacker with any existing user account to create new default user accounts via the administrative REST API even where new user registration is disabled. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-services'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '15.1.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/security/advisories/GHSA-83x4-9cwr-5487'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4133'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/issues/9247'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug... | {'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-04T20:27:06Z', 'nvd_published_at': '2022-01-25T20:15:00Z'} |
1.4.0 | GHSA-g7fx-mmjc-r7gv | 2022-11-29T21:30:23Z | 2022-01-13T00:00:52Z | null | ['CVE-2022-23116'] | Agent-to-controller security bypass in Jenkins Conjur Secrets Plugin allows decrypting secrets | Jenkins Conjur Secrets Plugin 1.0.9 and earlier implements functionality that allows attackers able to control agent processes to decrypt secrets stored in Jenkins obtained through another method. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.conjur.jenkins:conjur-credentials'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23116'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/conjur-credentials-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2522%20(1)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists... | {'cwe_ids': ['CWE-311'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T21:30:23Z', 'nvd_published_at': '2022-01-12T20:15:00Z'} |
1.4.0 | GHSA-h56g-v4vp-q9q6 | 2022-02-04T16:38:23Z | 2022-01-29T00:00:41Z | null | ['CVE-2022-0352'] | Cross-site Scripting in calibreweb | calibreweb prior to version 0.6.16 contains a cross-site scripting vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'calibreweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.16'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0352'}, {'type': 'WEB', 'url': 'https://github.com/janeczku/calibre-web/commit/6bf07539788004513c3692c074ebc7ba4ce005e1'}, {'type': 'PACKAGE', 'url': 'https://github.com/janeczku/calibre-web'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a57... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T16:38:23Z', 'nvd_published_at': '2022-01-28T22:15:00Z'} |
1.4.0 | GHSA-4w23-c97g-fq5v | 2022-01-04T20:20:07Z | 2022-01-05T20:33:16Z | null | ['CVE-2021-4130'] | snipe-it is vulnerable to Cross-Site Request Forgery (CSRF) | snipe-it is vulnerable to Cross-Site Request Forgery (CSRF) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4130'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/9b2dd6522f214a3fbee6a4e32699104d0ea2b6ae'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ccf073cd-7f54-4... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-04T20:20:07Z', 'nvd_published_at': '2021-12-18T05:15:00Z'} |
1.4.0 | GHSA-mh3m-8c74-74xh | 2022-01-31T21:59:33Z | 2022-01-27T15:28:06Z | null | ['CVE-2022-21708'] | Denial of Service in graphql-go | ### Impact
This is a DoS vulnerability that is possible due to a bug in the library that would allow an attacker with specifically designed queries to cause stack overflow panics. Any user with access to the GraphQL handler can send these queries and cause stack overflows. This in turn could potentially compromise the ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/graph-gophers/graphql-go'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/graph-gophers/graphql-go/security/advisories/GHSA-mh3m-8c74-74xh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21708'}, {'type': 'WEB', 'url': 'https://github.com/graph-gophers/graphql-go/commit/eae31ca73eb3473c544710955d1dbebc22605bfe'}, {'type': ... | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-24T22:42:15Z', 'nvd_published_at': '2022-01-21T23:15:00Z'} |
1.4.0 | GHSA-c7fm-jx59-wjf6 | 2022-01-20T16:14:41Z | 2022-01-21T18:50:58Z | null | ['CVE-2022-0266'] | Authorization Bypass Through User-Controlled Key in LiveHelperChat | Authorization Bypass Through User-Controlled Key in Packagist remdex/livehelperchat prior to 3.92v. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.92'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0266'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/cc1122aed0d1ad9f05757eaea2ab9e6a924776bd'}, {'type': 'PACKAGE', 'url': 'https://github.com/livehelperchat/livehelperchat'}, {'type': 'WEB', 'url': 'https://hunt... | {'cwe_ids': ['CWE-639'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-20T16:14:41Z', 'nvd_published_at': '2022-01-19T06:15:00Z'} |
1.4.0 | GHSA-24g6-5rx7-58wj | 2022-01-07T16:13:36Z | 2022-01-06T22:18:07Z | null | ['CVE-2019-25054'] | Missing Initialization of Resource in pnet | An issue was discovered in the pnet crate before 0.27.2 for Rust. There is a segmentation fault (upon attempted dereference of an uninitialized descriptor) because of an erroneous IcmpTransportChannelIterator compiler optimization. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'pnet'}, 'ecosystem_specific': {'affected_functions': ['pnet::transport::IcmpTransportChannelIterator']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.27.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-25054'}, {'type': 'WEB', 'url': 'https://github.com/libpnet/libpnet/issues/449'}, {'type': 'PACKAGE', 'url': 'https://github.com/libpnet/libpnet/'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/pnet/RUST... | {'cwe_ids': ['CWE-909'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T18:31:07Z', 'nvd_published_at': '2021-12-27T00:15:00Z'} |
1.4.0 | GHSA-jwfh-j623-m97h | 2022-01-07T17:12:54Z | 2022-01-06T22:12:35Z | null | ['CVE-2021-45691'] | Use of Uninitialized Resource in messagepack-rs | An issue was discovered in the messagepack-rs crate through 2021-01-26 for Rust. deserialize_string may read from uninitialized memory locations. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'messagepack-rs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.8.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45691'}, {'type': 'WEB', 'url': 'https://github.com/otake84/messagepack-rs/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/otake84/messagepack-rs'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crate... | {'cwe_ids': ['CWE-908'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T14:33:33Z', 'nvd_published_at': '2021-12-27T00:15:00Z'} |
1.4.0 | GHSA-hj3m-v758-jwx5 | 2023-09-11T22:36:13Z | 2022-01-05T15:02:43Z | null | ['CVE-2021-23797'] | Path Traversal in http-server-node | All versions of package http-server-node are vulnerable to Directory Traversal via use of `--path-as-is`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'http-server-node'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23797'}, {'type': 'PACKAGE', 'url': 'https://github.com/yan-loong/http-server'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-HTTPSERVERNODE-1727656'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-04T18:43:28Z', 'nvd_published_at': '2021-12-17T20:15:00Z'} |
1.4.0 | GHSA-jqpv-jm4m-86j9 | 2023-06-13T17:45:06Z | 2022-01-06T22:17:50Z | null | ['CVE-2018-25028'] | Use After Free in libpulse-binding | Affected versions contained a pair of use-after-free issues with the objects returned by the get_format_info and get_context methods of Stream objects. These objects were mistakenly being constructed without setting an important flag to prevent destruction of the underlying C objects they reference upon their own destr... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'libpulse-binding'}, 'ecosystem_specific': {'affected_functions': ['libpulse_binding::stream::Stream::get_context', 'libpulse_binding::stream::Stream::get_format_info']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/jnqnfe/pulse-binding-rust/security/advisories/GHSA-ghpq-vjxw-ch5w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25028'}, {'type': 'PACKAGE', 'url': 'https://github.com/jnqnfe/pulse-binding-rust'}, {'type': 'WEB', 'url': 'https://raw.githubuserconte... | {'cwe_ids': ['CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T18:29:31Z', 'nvd_published_at': '2021-12-27T00:15:00Z'} |
1.4.0 | GHSA-x8rq-rc7x-5fg5 | 2022-02-24T18:44:54Z | 2022-01-06T22:24:35Z | null | ['CVE-2022-0086'] | uppy's companion module is vulnerable to Server-Side Request Forgery (SSRF) | uppy's companion module is vulnerable to Server-Side Request Forgery (SSRF) via IPv4-mapped IPv6 addresses. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'uppy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0086'}, {'type': 'WEB', 'url': 'https://github.com/transloadit/uppy/pull/3403'}, {'type': 'WEB', 'url': 'https://github.com/transloadit/uppy/commit/fc137e30a2a3102eb191141f280d5de20dacdf8f'}, {'type': 'PACKAGE', 'url': 'https://github.com/transload... | {'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T19:48:36Z', 'nvd_published_at': '2022-01-04T18:15:00Z'} |
1.4.0 | GHSA-x7xf-253v-x3w8 | 2022-07-06T19:47:38Z | 2022-05-13T01:09:20Z | null | ['CVE-2016-8739'] | Improper Restriction of XML External Entity Reference in Apache CXF JAX-RS | The JAX-RS module in Apache CXF prior to 3.0.12 and 3.1.x prior to 3.1.9 provides a number of Atom JAX-RS MessageBodyReaders. These readers use Apache Abdera Parser which expands XML entities by default which represents a major XXE risk. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.12'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.11'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf-core'}, 'ranges': [{'t... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-8739'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:0868'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB'... | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:47:38Z', 'nvd_published_at': '2017-08-10T18:29:00Z'} |
1.4.0 | GHSA-67x3-36j7-pj4g | 2023-07-21T22:12:36Z | 2022-05-13T01:20:51Z | null | ['CVE-2018-8385'] | ChakraCore RCE Vulnerability | A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka "Scripting Engine Memory Corruption Vulnerability." This affects Internet Explorer 9, ChakraCore, Internet Explorer 11, Microsoft Edge, Internet Explorer 10. This CVE ID is unique from CVE-2... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8385'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/5596'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/f00612bbc3657f1ec33a9e7d575c16a5489d06aa'}, {'type': 'WEB', 'url': 'https://portal.msrc.... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T22:12:36Z', 'nvd_published_at': '2018-08-15T17:29:00Z'} |
1.4.0 | GHSA-p9qj-4rjp-j3w9 | 2023-08-01T00:05:06Z | 2022-05-13T01:07:08Z | null | ['CVE-2015-5349'] | Apache Directory Studio Command Injection | The CSV export in Apache LDAP Studio and Apache Directory Studio before 2.0.0-M10 does not properly escape field values, which might allow attackers to execute arbitrary commands by leveraging a crafted LDAP entry that is interpreted as a formula when imported into a spreadsheet. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.directory.studio:org.apache.directory.studio.parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0-M10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5349'}, {'type': 'WEB', 'url': 'https://directory.apache.org/studio/news.html'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/reb5443aaf781b364896ee9d7cf6e97fdc4f5a5174132c319252963b6@%3Ccommits.directory.apache.org%3E'}, {'type': '... | {'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T00:05:06Z', 'nvd_published_at': '2016-04-11T21:59:00Z'} |
1.4.0 | GHSA-4793-w44w-m7xm | 2023-08-28T23:20:22Z | 2022-05-05T00:29:17Z | null | ['CVE-2013-7062'] | Plone Zope cross-site scripting (XSS) vulnerability | Multiple cross-site scripting (XSS) vulnerabilities in Zope, as used in Plone 3.3.x through 3.3.6, 4.0.x through 4.0.9, 4.1.x through 4.1.6, 4.2.x through 4.2.7, and 4.3 through 4.3.2, allow remote attackers to inject arbitrary web script or HTML via unspecified input in the (1) browser_id_manager or (2) OFS.Image meth... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3'}, {'fixed': '3.3.6'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7062'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/89623'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/89627'}, {'type': 'PACKAGE', 'url': 'https://github.com/plone/Plone'}, {'type... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-28T23:20:22Z', 'nvd_published_at': '2020-01-02T19:15:00Z'} |
1.4.0 | GHSA-5hg8-r9vq-gjqp | 2022-07-01T11:57:29Z | 2022-05-13T01:07:54Z | null | ['CVE-2017-5661'] | Improper Restriction of XML External Entity Reference in Apache FOP | In Apache FOP before 2.2, files lying on the filesystem of the server which uses FOP can be revealed to arbitrary users who send maliciously formed SVG files. The file types that can be shown depend on the user context in which the exploitable application is running. If the user is root a full compromise of the server ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.xmlgraphics:fop'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-5661'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2021-14'}, {'type': 'WEB', 'url': 'https://xmlgraphics.apache.org/security.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2017/dsa-3864'}, {'type': 'WEB', 'url': '... | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T11:57:29Z', 'nvd_published_at': '2017-04-18T14:59:00Z'} |
1.4.0 | GHSA-4f6x-g5vh-8jm5 | 2022-12-13T18:54:35Z | 2022-05-24T17:43:01Z | null | ['CVE-2021-21616'] | Stored XSS vulnerability in Jenkins Active Choices Plugin | Active Choices Plugin 2.5.2 and earlier does not escape reference parameter values.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
Active Choices Plugin 2.5.3 escapes reference parameter values. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.biouno:uno-choice'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.5.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21616'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/active-choices-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-02-24/#SECURITY-2192'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secur... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T18:54:35Z', 'nvd_published_at': '2021-02-24T16:15:00Z'} |
1.4.0 | GHSA-jjcj-fgfm-9g9r | 2023-07-03T21:46:30Z | 2022-05-14T01:27:14Z | null | ['CVE-2018-12029'] | Phusion Passenger Race Condition Allows Privilege Escalation | A race condition in the nginx module in Phusion Passenger 3.x through 5.x before 5.3.2 allows local escalation of privileges when a non-standard passenger_instance_registry_dir with insufficiently strict permissions is configured. Replacing a file with a symlink after the file was created, but before it was chowned, le... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'passenger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '5.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-12029'}, {'type': 'WEB', 'url': 'https://blog.phusion.nl/2018/06/12/passenger-5-3-2-various-security-fixes/'}, {'type': 'WEB', 'url': 'https://blog.phusion.nl/passenger-5-3-2'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/bl... | {'cwe_ids': ['CWE-362'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T23:01:12Z', 'nvd_published_at': '2018-06-17T20:29:00Z'} |
1.4.0 | GHSA-rhgr-952r-6p8q | 2022-09-08T14:20:02Z | 2022-05-24T00:01:49Z | null | ['CVE-2022-29599'] | Command injection in Apache Maven maven-shared-utils | In Apache Maven maven-shared-utils prior to version 3.3.3, the Commandline class can emit double-quoted strings without proper escaping, allowing shell injection attacks. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.maven.shared:maven-shared-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29599'}, {'type': 'WEB', 'url': 'https://github.com/apache/maven-shared-utils/pull/40'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/maven-shared-utils'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/MSHARED-297'}, {'type... | {'cwe_ids': ['CWE-116', 'CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T22:39:47Z', 'nvd_published_at': '2022-05-23T11:16:00Z'} |
1.4.0 | GHSA-hrfh-7j5f-8ccr | 2022-07-01T11:48:49Z | 2022-05-24T17:01:50Z | null | ['CVE-2019-11287'] | Pivotal RabbitMQ is vulnerable to a denial of service attack | Pivotal RabbitMQ, versions 3.7.x prior to 3.7.21 and 3.8.x prior to 3.8.1, and RabbitMQ for Pivotal Platform, 1.16.x versions prior to 1.16.7 and 1.17.x versions prior to 1.17.4, contain a web management plugin that is vulnerable to a denial of service attack. The "X-Reason" HTTP Header can be leveraged to insert a mal... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Hex', 'name': 'RabbitMQ'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.7.0'}, {'fixed': '3.7.21'}]}]}, {'package': {'ecosystem': 'Hex', 'name': 'RabbitMQ'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.8.0'}, {'fixed': '3.8.1'}]}]}, {'package': {'ecosystem'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11287'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0078'}, {'type': 'WEB', 'url': 'https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-11287-DoS%20via%20Heap%20Overflow-RabbitMQ%20Web%20Management%20Plugin'}, ... | {'cwe_ids': ['CWE-134'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T11:48:49Z', 'nvd_published_at': '2019-11-23T00:15:00Z'} |
1.4.0 | GHSA-5hpw-vcj2-prwg | 2023-07-07T20:44:07Z | 2022-05-24T16:50:37Z | null | ['CVE-2019-13645'] | Firefly III vulnerable to stored XSS | Firefly III before 4.7.17.3 is vulnerable to stored XSS due to lack of filtration of user-supplied data in image file names. The JavaScript code is executed during attachments/edit/$file_id$ attachment editing. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'grumpydictator/firefly-iii'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.7.17.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-13645'}, {'type': 'WEB', 'url': 'https://github.com/firefly-iii/firefly-iii/issues/2337'}, {'type': 'WEB', 'url': 'https://github.com/firefly-iii/firefly-iii/commit/17a66b3056096244a2198a7351847d26cb7b37c5'}, {'type': 'PACKAGE', 'url': 'https://git... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T20:44:07Z', 'nvd_published_at': '2019-07-18T03:15:00Z'} |
1.4.0 | GHSA-73w7-6w9g-gc8w | 2023-03-09T00:36:26Z | 2022-05-13T01:38:25Z | null | ['CVE-2017-0902'] | RubyGems has Origin Validation Error vulnerability | RubyGems version 2.6.12 and earlier is vulnerable to a DNS hijacking vulnerability that allows a MITM attacker to force the RubyGems client to download and install gems from a server that the attacker controls. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rubygems-update'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0902'}, {'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems/commit/8d91516fb7037ecfb27622f605dc40245e0f8d32'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/218088'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-20... | {'cwe_ids': ['CWE-346', 'CWE-350'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-09T00:36:26Z', 'nvd_published_at': '2017-08-31T20:29:00Z'} |
1.4.0 | GHSA-qj7f-j6h9-g5rq | 2022-11-01T22:33:57Z | 2022-05-17T00:26:27Z | null | ['CVE-2017-12623'] | XML External Entity Reference in Apache NiFi | An authorized user could upload a template which contained malicious code and accessed sensitive files via an XML External Entity (XXE) attack. The fix to properly handle XML External Entities was applied on the Apache NiFi 1.4.0 release. Users running a prior 1.x release should upgrade to the appropriate release. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12623'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security.html#CVE-2017-12623'}] | {'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T22:33:57Z', 'nvd_published_at': '2017-10-10T18:29:00Z'} |
1.4.0 | GHSA-95qr-67rx-9pgh | 2023-08-23T13:41:55Z | 2022-05-24T17:37:51Z | null | ['CVE-2020-5809'] | Umbraco CMS vulnerable to stored XSS | A stored XSS vulnerability exists in Umbraco CMS <= 8.9.1 or current. An authenticated user can inject arbitrary JavaScript code into iframes when editing content using the TinyMCE rich-text editor, as TinyMCE is configured to allow iframes by default in Umbraco CMS. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'UmbracoCms.Core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '8.9.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5809'}, {'type': 'PACKAGE', 'url': 'https://github.com/umbraco/Umbraco-CMS'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/research/tra-2020-59'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T22:32:02Z', 'nvd_published_at': '2020-12-30T16:15:00Z'} |
1.4.0 | GHSA-6755-jgp4-8q7h | 2022-09-09T00:45:35Z | 2022-05-24T22:00:03Z | null | ['CVE-2019-10327'] | XML External Entity processing vulnerability in Pipeline Maven Integration Jenkins Plugin | An XML external entities (XXE) vulnerability in Jenkins Pipeline Maven Integration Plugin 1.7.0 and earlier allowed attackers able to control a temporary directory's content on the agent running the Maven build to have Jenkins parse a maliciously crafted XML file that uses external entities for extraction of secrets fr... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:pipeline-maven'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.7.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10327'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/pipeline-maven-plugin/tree/master/pipeline-maven'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1409'}, {'type': 'WEB', 'url': 'http://www.openw... | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-09T00:45:35Z', 'nvd_published_at': '2019-05-31T15:29:00Z'} |
1.4.0 | GHSA-72gm-pp6q-gpx5 | 2023-07-27T19:40:48Z | 2022-05-14T04:04:14Z | null | ['CVE-2017-11905'] | ChakraCore RCE Vulnerability | ChakraCore and Microsoft Edge in Windows 10 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-11905'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/4411'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/d97375c40cfd2b2376a5c4b6cd34098e1e99e1f1'}, {'type': 'WEB', 'url': 'https://portal.msrc... | {'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-27T19:40:48Z', 'nvd_published_at': '2017-12-12T21:29:00Z'} |
1.4.0 | GHSA-8r28-r8cp-g6cp | 2022-07-06T19:43:24Z | 2022-05-13T01:08:56Z | null | ['CVE-2016-5001'] | Exposure of Sensitive Information to an Unauthorized Actor in Apache Hadoop | This is an information disclosure vulnerability in Apache Hadoop before 2.6.4 and 2.7.x before 2.7.2 in the short-circuit reads feature of HDFS. A local user on an HDFS DataNode may be able to craft a block token that grants unauthorized read access to random files by guessing certain fields in the token. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.6.3'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-common'}, ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-5001'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r66de86b9a608c1da70b2d27d765c11ec88edf6e5dd6f379ab33e072a@%3Cuser.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2016/q4/698'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:43:24Z', 'nvd_published_at': '2017-08-30T19:29:00Z'} |
1.4.0 | GHSA-pqwh-44jj-p5rm | 2022-06-09T22:47:59Z | 2022-05-13T01:25:03Z | null | ['CVE-2013-4366'] | Hostname verification in Apache HttpClient 4.3 was disabled by default | http/impl/client/HttpClientBuilder.java in Apache HttpClient 4.3.x before 4.3.1 does not ensure that X509HostnameVerifier is not null, which allows attackers to have unspecified impact via vectors involving hostname verification. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.httpcomponents:httpclient'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3'}, {'fixed': '4.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4366'}, {'type': 'WEB', 'url': 'http://svn.apache.org/r1528614'}, {'type': 'WEB', 'url': 'http://www.apache.org/dist/httpcomponents/httpclient/RELEASE_NOTES-4.3.x.txt'}] | {'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-09T22:47:59Z', 'nvd_published_at': '2017-10-30T19:29:00Z'} |
1.4.0 | GHSA-67xp-4726-4978 | 2023-07-13T17:10:40Z | 2022-05-24T17:08:29Z | null | ['CVE-2020-0710'] | ChakraCore RCE Vulnerability | A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0673, CVE-2020-0674, CVE-2020-0711, CVE-2020-0712, CVE-2020-0713, CVE-2020-0767. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.16'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-0710'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/6375'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/6375/commits/d89802674a591904c971f2d92b96b8f40839e7c7'}, {'type': 'PACKAGE', 'url': 'https... | {'cwe_ids': ['CWE-119', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T17:10:40Z', 'nvd_published_at': '2020-02-11T22:15:00Z'} |
1.4.0 | GHSA-f6fv-fjg8-4m6w | 2023-07-25T00:16:49Z | 2022-05-14T01:14:50Z | null | ['CVE-2018-19859'] | OpenRefine Directory Traversal | OpenRefine before 3.2 beta allows directory traversal via a relative pathname in a ZIP archive. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.openrefine:openrefine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19859'}, {'type': 'WEB', 'url': 'https://github.com/OpenRefine/OpenRefine/issues/1840'}, {'type': 'WEB', 'url': 'https://github.com/OpenRefine/OpenRefine/pull/1901'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T00:16:49Z', 'nvd_published_at': '2018-12-05T11:29:00Z'} |
1.4.0 | GHSA-p5f9-c9j9-g8qx | 2022-05-25T20:14:36Z | 2022-05-17T00:01:46Z | null | ['CVE-2022-30781'] | Shell command injection in gitea | Gitea before 1.16.7 does not escape the shell out for `git fetch remote` allowing for shell command injection | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'code.gitea.io/gitea'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30781'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/19487'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/19490'}, {'type': 'WEB', 'url': 'https://blog.gitea.io/2022/05/gitea-1.16.7-is-released/'}, {'type': 'PA... | {'cwe_ids': ['CWE-116'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T20:14:36Z', 'nvd_published_at': '2022-05-16T04:15:00Z'} |
1.4.0 | GHSA-5phj-qv74-pv4w | 2022-12-02T20:48:12Z | 2022-05-18T00:00:40Z | null | ['CVE-2022-30955'] | Missing permission check in Jenkins GitLab Plugin | Jenkins GitLab Plugin 1.5.31 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. An enumeration of credentials IDs in GitLab Plugin 1.5.32 requires the appropriate permissions. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:gitlab-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.32'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30955'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/gitlab-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2753'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-02T14:54:48Z', 'nvd_published_at': '2022-05-17T15:15:00Z'} |
1.4.0 | GHSA-ch3j-w953-hfcm | 2023-08-29T19:01:27Z | 2022-05-17T05:03:05Z | null | ['CVE-2013-5942'] | graphite-web is vulnerable to Remote Code Execution | Graphite 0.9.5 through 0.9.10 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, related to (1) remote_storage.py, (2) storage.py, (3) render/datalib.py, and (4) whitelist/views.py, a different vulnerability than CVE-2013-5093. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'graphite-web'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.5'}, {'fixed': '0.9.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.10'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-5942'}, {'type': 'PACKAGE', 'url': 'https://github.com/graphite-project/graphite-web'}, {'type': 'WEB', 'url': 'https://github.com/graphite-project/graphite-web/blob/master/docs/releases/0_9_11.rst'}, {'type': 'WEB', 'url': 'http://secunia.com/advi... | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T19:01:27Z', 'nvd_published_at': '2013-09-27T10:08:00Z'} |
1.4.0 | GHSA-xgcc-r2f3-rq6p | 2023-07-20T22:19:42Z | 2022-05-13T01:18:38Z | null | ['CVE-2018-0939'] | ChakraCore information disclosure vulnerability | ChakraCore and Microsoft Edge in Windows 10 1703 and 1709 allow information disclosure, due to how the scripting engine handles objects in memory, aka "Scripting Engine Information Disclosure Vulnerability". This CVE ID is unique from CVE-2018-0891. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-0939'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/090277e7a5ea1d938777acb92e7b6759936ea974'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0939'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T22:19:42Z', 'nvd_published_at': '2018-03-14T17:29:00Z'} |
1.4.0 | GHSA-fjw4-39pg-vf4f | 2022-11-07T20:28:42Z | 2022-05-24T16:45:24Z | null | ['CVE-2019-0226'] | Apache Karaf vulnerable to relative path traversal | Apache Karaf Config service provides a install method (via service or MBean) that could be used to travel in any directory and overwrite existing file. The vulnerability is low if the Karaf process user has limited permission on the filesystem. Any Apache Karaf version before 4.2.5 is impacted. User should upgrade to A... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.karaf.config:org.apache.karaf.config.core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0226'}, {'type': 'WEB', 'url': 'https://github.com/apache/karaf/pull/805'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/karaf'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/KARAF-6230'}, {'type': 'WEB', 'url': 'https://l... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-07T20:28:42Z', 'nvd_published_at': '2019-05-09T14:29:00Z'} |
1.4.0 | GHSA-f7ff-xf87-f22q | 2022-06-09T22:54:48Z | 2022-05-27T00:00:29Z | null | ['CVE-2022-29637'] | Arbitrary command execution in Minidoc | An arbitrary file upload vulnerability in Mindoc v2.1-beta.5 allows attackers to execute arbitrary commands via a crafted Zip file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/mindoc-org/mindoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1-beta.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29637'}, {'type': 'WEB', 'url': 'https://github.com/mindoc-org/mindoc/issues/788'}, {'type': 'PACKAGE', 'url': 'github.com/mindoc-org/mindoc'}] | {'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T18:39:00Z', 'nvd_published_at': '2022-05-26T20:15:00Z'} |
1.4.0 | GHSA-7phr-6cc9-4m5q | 2023-03-27T22:13:46Z | 2022-05-24T16:49:05Z | null | ['CVE-2019-13068'] | Grafana Cross-site Scripting vulnerability | `public/app/features/panel/panel_ctrl.ts` in Grafana before 6.2.5 allows HTML Injection in panel drilldown links (via the Title or url field). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.2.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-13068'}, {'type': 'WEB', 'url': 'https://github.com/grafana/grafana/issues/17718'}, {'type': 'PACKAGE', 'url': 'https://github.com/grafana/grafana'}, {'type': 'WEB', 'url': 'https://github.com/grafana/grafana/releases/tag/v6.2.5'}, {'type': 'WEB', ... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-27T22:13:46Z', 'nvd_published_at': '2019-06-30T00:15:00Z'} |
1.4.0 | GHSA-j76q-99x2-v7vq | 2023-07-31T19:33:06Z | 2022-05-17T02:51:56Z | null | ['CVE-2016-6807'] | Apache Ambari Improper Access Control | Custom commands may be executed on Ambari Agent (2.4.x, before 2.4.2) hosts without authorization, leading to unauthorized access to operations that may affect the underlying system. Such operations are invoked by the Ambari Agent process on Ambari Agent hosts, as the user executing the Ambari Agent process. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ambari:ambari'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.4.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6807'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/AMBARI/Ambari+Vulnerabilities#AmbariVulnerabilities-FixedinAmbari2.4.2'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/97184'}] | {'cwe_ids': ['CWE-284'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T19:33:06Z', 'nvd_published_at': '2017-03-28T20:59:00Z'} |
1.4.0 | GHSA-jwpw-ppj5-7h4w | 2023-08-01T00:13:51Z | 2022-05-13T01:26:10Z | null | ['CVE-2015-3646'] | OpenStack Keystone Logs Passwords | OpenStack Identity (Keystone) before 2014.1.5 and 2014.2.x before 2014.2.4 logs the backend_argument configuration option content, which allows remote authenticated users to obtain passwords and other sensitive backend information by reading the Keystone logs. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'keystone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2014.1.5'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'keystone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2014.2'}, {'fixed': '2014.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3646'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/keystone/+bug/1443598'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210122154200/http://www.securityfocus.com/bid/74456'}, {'type': 'WEB', 'url': 'http://lists.openstack.org/pipe... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T00:13:51Z', 'nvd_published_at': '2015-05-12T19:59:00Z'} |
1.4.0 | GHSA-w4xh-w33p-4v29 | 2023-02-08T00:28:40Z | 2022-05-14T00:55:16Z | null | ['CVE-2017-17831'] | GitHub Git LFS Improper Input Validation vulnerability | GitHub Git LFS before 2.1.1 allows remote attackers to execute arbitrary commands via an ssh URL with an initial dash character in the hostname, located on a `url =` line in a `.lfsconfig` file within a repository. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/git-lfs/git-lfs/lfsapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1-0.20170519163204-f913f5f9c7c6'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/git-lfs/git-lfs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'intro... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-17831'}, {'type': 'WEB', 'url': 'https://github.com/git-lfs/git-lfs/pull/2241'}, {'type': 'WEB', 'url': 'https://github.com/git-lfs/git-lfs/pull/2242'}, {'type': 'WEB', 'url': 'https://github.com/git-lfs/git-lfs/commit/f913f5f9c7c6d1301785fdf9884a2... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T00:28:40Z', 'nvd_published_at': '2017-12-21T06:29:00Z'} |
1.4.0 | GHSA-9fc7-rhq3-wm7x | 2023-07-31T22:54:02Z | 2022-05-17T03:48:02Z | null | ['CVE-2016-6801'] | Apache Jackrabbit Authentication Hijacking Vulnerability | Cross-site request forgery (CSRF) vulnerability in the CSRF content-type check in Jackrabbit-Webdav in Apache Jackrabbit 2.4.x before 2.4.6, 2.6.x before 2.6.6, 2.8.x before 2.8.3, 2.10.x before 2.10.4, 2.12.x before 2.12.4, and 2.13.x before 2.13.3 allows remote attackers to hijack the authentication of unspecified vi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.jackrabbit:jackrabbit-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4'}, {'fixed': '2.4.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.jackrabbit:jackrabbit-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduc... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6801'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/JCR-4009'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210123170657/http://www.securityfocus.com/bid/92966'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/20... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T22:54:02Z', 'nvd_published_at': '2016-09-21T14:25:00Z'} |
1.4.0 | GHSA-wv9c-pfpm-4wc5 | 2023-08-25T21:36:48Z | 2022-05-24T16:52:01Z | null | ['CVE-2019-10186'] | Moodle CSRF Vulnerability | A flaw was found in moodle before versions 3.7.1, 3.6.5, 3.5.7. A sesskey (CSRF) token was not being utilised by the XML loading/unloading admin tool. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.7.0'}, {'fixed': '3.7.1'}]}], 'versions': ['3.7.0']}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific':... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10186'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/ea1ac3c7efbddbdb210ea4c75e7156c7d7ee914b'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10186'}, {'type': 'PACKAGE', 'url': 'https://github.co... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-14T21:31:48Z', 'nvd_published_at': '2019-07-31T22:15:00Z'} |
1.4.0 | GHSA-jmw7-ph6p-33cc | 2022-11-02T00:40:17Z | 2022-05-14T03:58:15Z | null | ['CVE-2016-0791'] | Exposure of Sensitive Information in Jenkins Core | Jenkins before 1.650 and LTS before 1.642.2 do not use a constant-time algorithm to verify CSRF tokens, which makes it easier for remote attackers to bypass a CSRF protection mechanism via a brute-force approach. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.650'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-0791'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:0711'}, {'type': 'WEB', 'url': 'https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-02-24'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHS... | {'cwe_ids': ['CWE-200'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-02T00:40:17Z', 'nvd_published_at': '2016-04-07T23:59:00Z'} |
1.4.0 | GHSA-298q-wv2h-v5vw | 2023-09-26T19:16:37Z | 2022-05-24T17:00:27Z | null | ['CVE-2019-8142'] | Magento 2 Community Edition XSS Vulnerability | A stored cross-site scripting (XSS) vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated user can inject arbitrary JavaScript code via title of an order when configuring sales payment methods for a store. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8142'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051105/https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T23:41:51Z', 'nvd_published_at': '2019-11-06T00:15:00Z'} |
1.4.0 | GHSA-j8qv-mj4r-6fw4 | 2022-06-28T23:27:28Z | 2022-05-13T01:01:00Z | null | ['CVE-2018-1999001'] | Improper Input Validation in Jenkins | A unauthorized modification of configuration vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in User.java that allows attackers to provide crafted login credentials that cause Jenkins to move the config.xml file from the Jenkins home directory. If Jenkins is started without this file present, it ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.121.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.122'},... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1999001'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-07-18/#SECURITY-897'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T23:27:28Z', 'nvd_published_at': '2018-07-23T19:29:00Z'} |
1.4.0 | GHSA-wmvq-q9h8-7j4g | 2023-07-21T21:38:41Z | 2022-05-13T01:34:55Z | null | ['CVE-2018-10889'] | Moodle sensitive information disclosure | A flaw was found in moodle before versions 3.5.1, 3.4.4, 3.3.7. No option existed to omit logs from data privacy exports, which may contain details of other users who interacted with the requester. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5'}, {'fixed': '3.5.1'}]}], 'versions': ['3.5']}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.4.3'}, {'fixed'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-10889'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/720d5b3b8559a97b7d6dd77351fb8d1cd8890f14'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10889'}, {'type': 'WEB', 'url': 'https://moodle.org/mo... | {'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T21:38:41Z', 'nvd_published_at': '2018-07-10T18:29:00Z'} |
1.4.0 | GHSA-g8q3-rcf9-qx4q | 2023-08-01T23:31:06Z | 2022-05-24T22:00:06Z | null | ['CVE-2019-1024'] | ChakraCore RCE Vulnerability | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0989, CVE-2019-0991, CVE-2019-0992, CVE-2019-0993, CVE-2019-1002, CVE-2019-1003, CVE-20... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1024'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/06a1438bd30957b3e0d8f19c7f65b1aadc5f5ef2'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee'}, {'type... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T23:31:06Z', 'nvd_published_at': '2019-06-12T14:29:00Z'} |
1.4.0 | GHSA-wp35-6jqv-r33m | 2023-07-28T18:41:18Z | 2022-05-14T01:53:10Z | null | ['CVE-2016-5002'] | Apache XML-RPC XXE Vulnerability | XML external entity (XXE) vulnerability in the Apache XML-RPC (aka ws-xmlrpc) library 3.1.3, as used in Apache Archiva, allows remote attackers to conduct server-side request forgery (SSRF) attacks via a crafted DTD. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.xmlrpc:xmlrpc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-5002'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:3768'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/115042'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210123151805/http://www.... | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T18:41:18Z', 'nvd_published_at': '2017-10-27T18:29:00Z'} |
1.4.0 | GHSA-mfr9-pcm3-6mwc | 2023-08-01T23:31:56Z | 2022-05-24T16:47:19Z | null | ['CVE-2019-12616'] | phpMyAdmin CSRF Vulnerability | An issue was discovered in phpMyAdmin before 4.9.0. A vulnerability was found that allows an attacker to trigger a CSRF attack against a phpMyAdmin user. The attacker can trick the user, for instance through a broken `<img>` tag pointing at the victim's phpMyAdmin database, and the attacker can potentially deliver a pa... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.9.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12616'}, {'type': 'WEB', 'url': 'https://github.com/phpmyadmin/phpmyadmin/commit/015c404038c44279d95b6430ee5a0dddc97691ec'}, {'type': 'WEB', 'url': 'https://packetstormsecurity.com/files/153251/phpMyAdmin-4.8-Cross-Site-Request-Forgery.html'}, {'ty... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T23:31:56Z', 'nvd_published_at': '2019-06-05T05:29:00Z'} |
1.4.0 | GHSA-x9gc-p2qp-4p7v | 2022-11-01T22:48:53Z | 2022-05-24T17:03:47Z | null | ['CVE-2019-16554'] | Missing permission check in Jenkins Build Failure Analyzer Plugin | A missing permission check in Jenkins Build Failure Analyzer Plugin 1.24.1 and earlier allows attackers with Overall/Read permission to have Jenkins evaluate a computationally expensive regular expression. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'com.sonyericsson.jenkins.plugins.bfa:build-failure-analyzer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.24.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16554'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1651'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/12/17/1'}] | {'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T22:48:53Z', 'nvd_published_at': '2019-12-17T15:15:00Z'} |
1.4.0 | GHSA-j2xf-p274-g8cc | 2022-06-02T15:52:33Z | 2022-05-18T00:00:45Z | null | ['CVE-2022-30110'] | Cross-site Scripting in Jirafeau | The file preview functionality in Jirafeau < 4.4.0, which is enabled by default, could be exploited for cross site scripting. An attacker could upload image/svg+xml files containing JavaScript. When someone visits the File Preview URL for this file, the JavaScript inside of this image/svg+xml file will be executed in t... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'mojo42/jirafeau'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30110'}, {'type': 'PACKAGE', 'url': 'https://gitlab.com/mojo42/Jirafeau'}, {'type': 'WEB', 'url': 'https://gitlab.com/mojo42/Jirafeau/-/merge_requests/103'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-02T15:52:33Z', 'nvd_published_at': '2022-05-17T14:15:00Z'} |
1.4.0 | GHSA-x8xr-rm9r-7mvf | 2023-02-08T18:13:27Z | 2022-05-14T01:58:45Z | null | ['CVE-2015-0259'] | OpenStack Compute (Nova) has Insufficient Verification of Data Authenticity | OpenStack Compute (Nova) before 2014.1.4, 2014.2.x before 2014.2.3, and kilo before kilo-3 does not validate the origin of websocket requests, which allows remote attackers to hijack the authentication of users for access to consoles via a crafted webpage. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'nova'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2014.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'nova'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2014.2.0'}, {'fixed': '2014.2.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-0259'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2015:0790'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2015:0843'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2015:0844'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-345'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T18:13:27Z', 'nvd_published_at': '2015-04-01T14:59:00Z'} |
1.4.0 | GHSA-xj7q-q94c-6wr3 | 2023-07-27T00:18:01Z | 2022-05-17T00:25:34Z | null | ['CVE-2017-12628'] | Apache James Privilege Escalation | The JMX server embedded in Apache James, also used by the command line client is exposed to a java de-serialization issue, and thus can be used to execute arbitrary commands. As James exposes JMX socket by default only on local-host, this vulnerability can only be used for privilege escalation. Release 3.0.1 upgrades t... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.james:james-project'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12628'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210124113233/http://www.securityfocus.com/bid/101532'}, {'type': 'WEB', 'url': 'https://www.mail-archive.com/server-user@james.apache.org/msg15633.html'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-27T00:18:01Z', 'nvd_published_at': '2017-10-20T15:29:00Z'} |
1.4.0 | GHSA-w66r-f5gg-gqwm | 2022-12-12T21:31:46Z | 2022-05-17T00:33:21Z | null | ['CVE-2017-1000091'] | Jenkins GitHub Branch Source Plugin vulnerable to Cross-Site Request Forgery | GitHub Branch Source Plugin connects to a user-specified GitHub API URL (e.g. GitHub Enterprise) as part of form validation and completion (e.g. to verify Scan Credentials are correct). This functionality improperly checked permissions, allowing any user with Overall/Read access to Jenkins to connect to any web server ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:github-branch-source'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0-alpha-1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000091'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/github-branch-source-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2017-07-10/'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T21:31:46Z', 'nvd_published_at': '2017-10-05T01:29:00Z'} |
1.4.0 | GHSA-wfw6-mmmp-87xm | 2022-07-06T20:29:14Z | 2022-05-17T00:28:34Z | null | ['CVE-2015-0250'] | Improper Input Validation in Apache Batik | XML external entity (XXE) vulnerability in the SVG to (1) PNG and (2) JPG conversion classes in Apache Batik 1.x before 1.8 allows remote attackers to read arbitrary files or cause a denial of service via a crafted SVG file. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.xmlgraphics:batik'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0'}, {'fixed': '1.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-0250'}, {'type': 'WEB', 'url': 'http://advisories.mageia.org/MGASA-2015-0138.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/130964/Apache-Batik-XXE-Injection.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-20... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:29:14Z', 'nvd_published_at': '2015-03-24T17:59:00Z'} |
1.4.0 | GHSA-4fjc-fwj2-7xfg | 2023-01-14T05:25:05Z | 2022-05-24T17:10:28Z | null | ['CVE-2020-2149'] | Credentials transmitted in plain text by Repository Connector Plugin | Repository Connector Plugin stores credentials in its global configuration file `org.jvnet.hudson.plugins.repositoryconnector.RepositoryConfiguration.xml` on the Jenkins controller as part of its configuration.
While the credentials are stored encrypted on disk, they are transmitted in plain text as part of the config... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:repository-connector'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.2.6'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2149'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/repository-connector-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-03-09/#SECURITY-1520'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secu... | {'cwe_ids': ['CWE-319'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-01-14T05:25:05Z', 'nvd_published_at': '2020-03-09T16:15:00Z'} |
1.4.0 | GHSA-3cwc-m7c2-qr86 | 2023-09-28T20:39:16Z | 2022-05-14T01:33:54Z | null | ['CVE-2019-1000005'] | mPDF Unsafe Deserialization | mPDF version 7.1.7 and earlier contains a CWE-502: Deserialization of Untrusted Data vulnerability in getImage() method of Image/ImageProcessor class that can result in Arbitry code execution, file write, etc.. This attack appears to be exploitable via attacker must host crafted image on victim server and trigger gener... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'mpdf/mpdf'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.1.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.1.7'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1000005'}, {'type': 'WEB', 'url': 'https://github.com/mpdf/mpdf/issues/949'}, {'type': 'PACKAGE', 'url': 'https://github.com/mpdf/mpdf'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T21:15:29Z', 'nvd_published_at': '2019-02-04T21:29:00Z'} |
1.4.0 | GHSA-wmq2-jc9m-xp4m | 2022-11-17T20:58:58Z | 2022-05-02T06:21:36Z | null | ['CVE-2010-1330'] | Cross-site Scripting in in JRuby | The regular expression engine in JRuby before 1.4.1, when $KCODE is set to 'u', does not properly handle characters immediately after a UTF-8 character, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted string. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jruby:jruby-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-1330'}, {'type': 'WEB', 'url': 'https://bugs.gentoo.org/show_bug.cgi?id=317435'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=750306'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/80277'}, {'... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T22:47:20Z', 'nvd_published_at': '2012-11-23T19:55:00Z'} |
1.4.0 | GHSA-3fvw-g6mr-w247 | 2023-07-20T23:15:29Z | 2022-05-13T01:20:39Z | null | ['CVE-2018-8130'] | ChakraCore RCE Vulnerability | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-0943, CVE-2018-8133, CVE-2018-8145, CVE-2018-8... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8130'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/bee1e247bf6acbc8c862c7fc1d597ce9cab7446e'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8130'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T23:15:29Z', 'nvd_published_at': '2018-05-09T19:29:00Z'} |
1.4.0 | GHSA-fg2q-v428-2gph | 2022-11-22T19:37:26Z | 2022-05-24T16:44:08Z | null | ['CVE-2019-10248'] | Eclipse Vorto resolved Maven build artifacts for the Xtext project over HTTP instead of HTTPS | Eclipse Vorto versions prior to 0.11 resolved Maven build artifacts for the Xtext project over HTTP instead of HTTPS. Any of these dependent artifacts could have been maliciously compromised by a MITM attack. Hence produced build artifacts of Vorto might be infected. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.vorto:org.eclipse.vorto.core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10248'}, {'type': 'WEB', 'url': 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=546622'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse/vorto'}] | {'cwe_ids': ['CWE-494', 'CWE-669', 'CWE-829'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T19:37:26Z', 'nvd_published_at': '2019-04-22T21:29:00Z'} |
1.4.0 | GHSA-qc2p-q7x9-v64p | 2022-07-01T17:33:35Z | 2022-05-13T01:09:21Z | null | ['CVE-2017-3156'] | Covert Timing Channel in Apache CXF | The OAuth2 Hawk and JOSE MAC Validation code in Apache CXF prior to 3.0.13 and 3.1.x prior to 3.1.10 is not using a constant time MAC signature comparison algorithm which may be exploited by sophisticated timing attacks. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf.karaf:apache-cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.13'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.12'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf.karaf:apache-cxf'}... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-3156'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1832'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB'... | {'cwe_ids': ['CWE-385'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T17:33:35Z', 'nvd_published_at': '2017-08-10T18:29:00Z'} |
1.4.0 | GHSA-7c3v-vc3x-x789 | 2023-03-06T20:53:23Z | 2022-05-24T16:52:44Z | null | ['CVE-2019-10367'] | Insertion of Sensitive Information into Log File in Jenkins Configuration as Code Plugin | Configuration as Code Plugin logs the changes it applies to the Jenkins system log. Secrets such as passwords should be masked (i.e. replaced with asterisks) in that log to prevent accidental disclosure. Configuration as Code Plugin inspects the type and looks for a field, getter, or constructor argument corresponding ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins:configuration-as-code'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.27'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.26'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10367'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1497'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2019-07-31/#SECURITY-1279'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/o... | {'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T22:36:48Z', 'nvd_published_at': '2019-08-07T15:15:00Z'} |
1.4.0 | GHSA-hwq7-cvp8-6hm3 | 2023-08-03T21:30:11Z | 2022-05-17T00:47:44Z | null | ['CVE-2015-3880'] | phpBB Open Redirect | Open redirect vulnerability in phpBB before 3.0.14 and 3.1.x before 3.1.4 allows remote attackers to redirect users of Google Chrome to arbitrary web sites and conduct phishing attacks via unspecified vectors. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpbb/phpbb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.14'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'phpbb/phpbb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3880'}, {'type': 'WEB', 'url': 'https://github.com/phpbb/phpbb/commit/1a3350619f428d9d69d196c52128727e27ef2f04'}, {'type': 'WEB', 'url': 'https://github.com/phpbb/phpbb/commit/c1702b8e19a69c98ef049abb4e14157e3e208ed4'}, {'type': 'PACKAGE', 'url': '... | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T21:30:11Z', 'nvd_published_at': '2017-09-19T15:29:00Z'} |
1.4.0 | GHSA-64jr-ggw8-h9jc | 2023-01-14T05:28:50Z | 2022-05-24T17:08:47Z | null | ['CVE-2020-2125'] | Credentials stored in plain text by debian-package-builder Plugin | debian-package-builder Plugin 1.6.11 and earlier stores a GPG passphrase unencrypted in its global configuration file `ru.yandex.jenkins.plugins.debuilder.DebianPackageBuilder.xml` on the Jenkins controller. This credential can be viewed by users with access to the Jenkins controller file system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'ru.yandex.jenkins.plugins.debuilder:debian-package-builder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.6.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2125'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/debian-package-builder-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-02-12/#SECURITY-1558'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-se... | {'cwe_ids': ['CWE-256'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-01-14T05:28:50Z', 'nvd_published_at': '2020-02-12T15:15:00Z'} |
1.4.0 | GHSA-hfjr-m75m-wmh7 | 2022-12-06T21:43:39Z | 2022-05-24T16:59:38Z | null | ['CVE-2019-10476'] | Jenkins Zulip Plugin vulnerable to Insufficiently Protected Credentials | Jenkins Zulip Plugin prior to 1.1.1 stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:zulip'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10476'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/zulip-plugin/commit/2a9dd6c41c2d913b0414d015b3118e3ddb60bd90'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/zulip-plugin'}, {'type': 'WEB', 'url': 'https://github.com/jenkin... | {'cwe_ids': ['CWE-522'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T21:43:39Z', 'nvd_published_at': '2019-10-23T13:15:00Z'} |
1.4.0 | GHSA-3mcp-6rv6-c69g | 2023-07-07T15:46:56Z | 2022-05-14T03:06:07Z | null | ['CVE-2018-0571'] | baserCMS arbitrary file upload vulnerability | baserCMS (baserCMS 4.1.0.1 and earlier versions, baserCMS 3.0.15 and earlier versions) allows remote attackers with a site operator privilege to upload arbitrary files. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'baserproject/basercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.1'}}, {'package': {'ecosystem': 'Packagist', 'name': 'baserproject/basercms'}, 'range... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-0571'}, {'type': 'WEB', 'url': 'https://basercms.net/security/JVN67881316'}, {'type': 'PACKAGE', 'url': 'https://github.com/baserproject/basercms'}, {'type': 'WEB', 'url': 'http://jvn.jp/en/jp/JVN67881316/index.html'}] | {'cwe_ids': ['CWE-434'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T15:46:56Z', 'nvd_published_at': '2018-06-26T14:29:00Z'} |
1.4.0 | GHSA-cwmx-hcrq-mhc3 | 2022-06-20T22:02:17Z | 2022-05-25T18:09:55Z | null | ['CVE-2022-29248'] | Cross-domain cookie leakage in Guzzle | ### Impact
Previous version of Guzzle contain a vulnerability with the cookie middleware. The vulnerability is that it is not checked if the cookie domain equals the domain of the server which sets the cookie via the `Set-Cookie` header, allowing a malicious server to set cookies for unrelated domains. For example an ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'guzzlehttp/guzzle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.5.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'guzzlehttp/guzzle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.4.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/guzzle/guzzle/security/advisories/GHSA-cwmx-hcrq-mhc3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29248'}, {'type': 'WEB', 'url': 'https://github.com/guzzle/guzzle/pull/3018'}, {'type': 'WEB', 'url': 'https://github.com/guzzle/guzzle/commit/74a86... | {'cwe_ids': ['CWE-200', 'CWE-565'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T18:09:55Z', 'nvd_published_at': '2022-05-25T18:15:00Z'} |
1.4.0 | GHSA-9ggm-7897-x4mg | 2022-07-13T17:31:39Z | 2022-05-14T01:17:03Z | null | ['CVE-2011-2526'] | Improper Input Validation in Apache Tomcat | Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.19, when sendfile is enabled for the HTTP APR or HTTP NIO connector, does not validate certain request attributes, which allows local users to bypass intended file access restrictions or cause a denial of service (infinite loop or JVM crash) by le... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.5.34'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-2526'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=720948'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/68541'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/06cfb634bc7bf37... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T17:31:39Z', 'nvd_published_at': '2011-07-14T23:55:00Z'} |
1.4.0 | GHSA-q7hx-mrv5-6mrp | 2023-07-13T17:08:04Z | 2022-05-24T17:05:42Z | null | ['CVE-2020-5840'] | HashBrown CMS Directory Traversal | An issue was discovered in HashBrown CMS before 1.3.2. `Server/Entity/Resource/Connection.js` allows an attacker to reach a parent directory via a crafted name or ID field. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'hashbrown-cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5840'}, {'type': 'WEB', 'url': 'https://github.com/HashBrownCMS/hashbrown-cms/commit/6b37b73944447bb29c6aaeb086b04196d80c692a'}, {'type': 'PACKAGE', 'url': 'https://github.com/HashBrownCMS/hashbrown-cms'}, {'type': 'WEB', 'url': 'https://github.com... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T17:08:04Z', 'nvd_published_at': '2020-01-06T18:15:00Z'} |
1.4.0 | GHSA-w227-xcfx-3pj8 | 2022-06-17T00:37:06Z | 2022-05-02T03:16:43Z | null | ['CVE-2009-0580'] | Exposure of Sensitive Information in Apache Tomcat | Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSource... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.40'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-0580'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/50930'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f1180... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:37:06Z', 'nvd_published_at': '2009-06-05T16:00:00Z'} |
1.4.0 | GHSA-hx9q-2mx4-m4pg | 2022-05-24T22:12:26Z | 2022-05-24T22:12:26Z | null | ['CVE-2022-29204'] | Missing validation causes denial of service via `Conv3DBackpropFilterV2` | ### Impact
The implementation of [`tf.raw_ops.UnsortedSegmentJoin`](https://github.com/tensorflow/tensorflow/blob/f3b9bf4c3c0597563b289c0512e98d4ce81f886e/tensorflow/core/kernels/unsorted_segment_join_op.cc#L83-L148) does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to tri... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hx9q-2mx4-m4pg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29204'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/20cb18724b0bf6c09071a3f53434c4eec53cc147'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-191', 'CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:12:26Z', 'nvd_published_at': '2022-05-20T23:15:00Z'} |
1.4.0 | GHSA-9h9f-9q8g-6764 | 2023-07-17T23:01:54Z | 2022-05-24T16:55:43Z | null | ['CVE-2019-16146'] | Gophish XSS Vulnerability | Gophish through 0.8.0 allows XSS via a username. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/gophish/gophish'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.0'}]}], 'database_specific': {'last_known_affected_version_range': '< 0.8.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16146'}, {'type': 'WEB', 'url': 'https://github.com/gophish/gophish/pull/1547'}, {'type': 'WEB', 'url': 'https://github.com/gophish/gophish/commit/24fe998a3aa04e205900476a9601d481e94d8eea'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T23:01:54Z', 'nvd_published_at': '2019-09-09T13:15:00Z'} |
1.4.0 | GHSA-j2h2-cvwh-cr64 | 2023-07-18T13:40:24Z | 2022-05-24T17:21:17Z | null | ['CVE-2020-14457'] | Mattermost Server Sensitive Data Exposure | An issue was discovered in Mattermost Server before 5.20.0. Non-members can receive broadcasted team details via the `update_team` WebSocket event, aka MMSA-2020-0012. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.20.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14457'}, {'type': 'WEB', 'url': 'https://github.com/mattermost/mattermost/pull/13848'}, {'type': 'PACKAGE', 'url': 'https://github.com/mattermost/mattermost'}, {'type': 'WEB', 'url': 'https://mattermost.com/security-updates/'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T13:40:24Z', 'nvd_published_at': '2020-06-19T14:15:00Z'} |
1.4.0 | GHSA-98p6-6428-77v7 | 2023-02-15T22:21:01Z | 2022-05-24T16:58:49Z | null | ['CVE-2019-10440'] | Jenkins NeoLoad Plugin stores credentials in cleartext | Jenkins NeoLoad Plugin prior to version 2.2.6 stores credentials unencrypted in its global configuration file and in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:neoload-jenkins-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10440'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/neoload-plugin/commit/83c8300c8318502b4f4d4c802dd2a10cadfee4c9'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/neoload-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/se... | {'cwe_ids': ['CWE-312'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T21:47:27Z', 'nvd_published_at': '2019-10-16T14:15:00Z'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.