schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
8
154
details
stringlengths
31
19.1k
severity
stringlengths
2
92
affected
stringlengths
75
28.5k
references
stringlengths
79
7.48k
database_specific
stringlengths
131
196
1.4.0
GHSA-hx77-5p88-f92r
2022-01-04T20:21:47Z
2022-01-05T20:33:55Z
null
['CVE-2021-4131']
livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF)
livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.91'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4131'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/3b5d0a8a43595a7f05f2a81b76623a8d7e5ad19f'}, {'type': 'PACKAGE', 'url': 'https://github.com/livehelperchat/livehelperchat'}, {'type': 'WEB', 'url': 'https://hunt...
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-04T20:21:47Z', 'nvd_published_at': '2021-12-18T07:15:00Z'}
1.4.0
GHSA-77hh-p7r6-66pv
2023-07-08T00:05:45Z
2022-01-22T00:00:50Z
null
['CVE-2022-22929']
Arbitrary File Upload in Mingsoft MCMS
MCMS v5.2.4 was discovered to have an arbitrary file upload vulnerability in the New Template module, which allows attackers to execute arbitrary code via a crafted ZIP file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22929'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20230521040336/https://gitee.com/mingSoft/MCMS/issues/I4Q4NV'}]
{'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-08T00:05:45Z', 'nvd_published_at': '2022-01-21T00:15:00Z'}
1.4.0
GHSA-65mj-7c86-79jf
2022-02-07T22:34:28Z
2022-01-27T15:23:19Z
null
['CVE-2021-3850']
Authentication Bypass in ADOdb/ADOdb
### Impact An attacker can inject values into a PostgreSQL connection string by providing a parameter surrounded by single quotes. Depending on how the library is used in the client software, this may allow an attacker to bypass the login process, gain access to the server's IP address, etc. ### Patches The vulnera...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'adodb/adodb-php'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.20.21'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.20.20'}}, {'package': {'ecosystem': 'Packagist', 'name': 'adodb/adodb-php'}, 'ranges': [{'type': ...
[{'type': 'WEB', 'url': 'https://github.com/ADOdb/ADOdb/security/advisories/GHSA-65mj-7c86-79jf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3850'}, {'type': 'WEB', 'url': 'https://github.com/ADOdb/ADOdb/issues/793'}, {'type': 'WEB', 'url': 'https://github.com/ADOdb/ADOdb/commit/952de6c4273...
{'cwe_ids': ['CWE-287', 'CWE-305'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-24T22:39:29Z', 'nvd_published_at': '2022-01-25T15:15:00Z'}
1.4.0
GHSA-54hw-mhgh-x4vc
2022-01-26T22:09:18Z
2022-01-26T22:09:49Z
null
['CVE-2021-4146']
Business Logic Errors in pimcore
In pimcore versions prior to 10.2.9 discounts could be negative resulting in unintended behavior.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.2.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4146'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/issues/11024'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/11206'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/7011922f7f0f97a82d8c378559...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-25T19:35:04Z', 'nvd_published_at': '2022-01-18T16:15:00Z'}
1.4.0
GHSA-5qx5-vg5w-5mx3
2022-04-29T04:37:47Z
2022-01-13T00:00:54Z
null
['CVE-2022-23108']
Stored XSS vulnerability in Jenkins Badge Plugin
Jenkins Badge Plugin 1.9 and earlier does not escape the description and does not check for allowed protocols when creating a badge, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:badge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23108'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/badge-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2547'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-29T04:37:47Z', 'nvd_published_at': '2022-01-12T20:15:00Z'}
1.4.0
GHSA-3pp3-77j6-8ph6
2021-03-29T16:45:40Z
2022-01-06T20:41:04Z
null
['CVE-2020-9487']
Missing Authentication for Critical Function in Apache NiFi
In Apache NiFi 1.0.0 to 1.11.4, the NiFi download token (one-time password) mechanism used a fixed cache size and did not authenticate a request to create a download token, only when attempting to use the token to access the content. An unauthenticated user could repeatedly request download tokens, preventing legitimat...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.12.0-RC1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.11.4'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-9487'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi/commit/01e42dfb3291c3a3549023edadafd2d8023f3042'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security#CVE-2020-9487'}]
{'cwe_ids': ['CWE-306'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T16:45:40Z', 'nvd_published_at': '2020-10-01T20:15:00Z'}
1.4.0
GHSA-9x9j-836w-8f55
2021-10-20T22:19:13Z
2022-01-06T19:44:01Z
null
['CVE-2020-1026']
Incorrect Calculation in the MSR JavaScript Cryptography Library
A Security Feature Bypass vulnerability exists in the MSR JavaScript Cryptography Library that is caused by multiple bugs in the library's Elliptic Curve Cryptography (ECC) implementation.An attacker could potentially abuse these bugs to learn information about a server's private ECC key (a key leakage attack) or craft...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'msrcrypto'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1026'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1026'}]
{'cwe_ids': ['CWE-682'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-25T19:19:10Z', 'nvd_published_at': '2020-04-15T15:15:00Z'}
1.4.0
GHSA-ch22-x2v3-v6vq
2022-01-19T18:50:06Z
2022-01-21T23:20:25Z
null
['CVE-2022-21690']
OTF-001: Improper Input Sanitation: The path parameter of the requested URL is not sanitized before being passed to the QT frontend
Between September 26, 2021 and October 8, 2021, [Radically Open Security](https://www.radicallyopensecurity.com/) conducted a penetration test of OnionShare 2.4, funded by the Open Technology Fund's [Red Team lab](https://www.opentech.fund/labs/red-team-lab/). This is an issue from that penetration test. - Vulnerabili...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'onionshare-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/onionshare/onionshare/security/advisories/GHSA-ch22-x2v3-v6vq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21690'}, {'type': 'PACKAGE', 'url': 'https://github.com/onionshare/onionshare'}, {'type': 'WEB', 'url': 'https://github.com/onionshare/onion...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T18:50:06Z', 'nvd_published_at': '2022-01-18T23:15:00Z'}
1.4.0
GHSA-prff-6j8q-vrv7
2022-02-03T21:01:48Z
2022-01-28T22:15:33Z
null
['CVE-2022-0379']
Cross-site Scripting in microweber
There is a persistent XSS Vulnerability exsists in the checkout page where we can able to execute any javascription in the last name field
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0379'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/f017cbfbd5c4f097d2c78c5e15b6c8a9da479d7b'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/9...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-27T18:41:26Z', 'nvd_published_at': '2022-01-26T16:15:00Z'}
1.4.0
GHSA-6vfc-qv3f-vr6c
2022-01-19T18:25:52Z
2022-01-12T22:20:22Z
null
['CVE-2022-21670']
Uncontrolled Resource Consumption in markdown-it
### Impact Special patterns with length > 50K chars can slow down parser significantly. ```js const md = require('markdown-it')(); md.render(`x ${' '.repeat(150000)} x \nx`); ``` ### Patches Upgrade to v12.3.2+ ### Workarounds No. ### References Fix + test sample: https://github.com/markdown-it/markdown-it/c...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'markdown-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.3.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/markdown-it/markdown-it/security/advisories/GHSA-6vfc-qv3f-vr6c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21670'}, {'type': 'WEB', 'url': 'https://github.com/markdown-it/markdown-it/commit/ffc49ab46b5b751cd2be0aabb146f2ef84986101'}, {'type': 'P...
{'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-10T21:50:05Z', 'nvd_published_at': '2022-01-10T21:15:00Z'}
1.4.0
GHSA-9783-42pm-x5jq
2023-06-13T17:22:23Z
2022-01-06T22:13:58Z
null
['CVE-2021-45686']
Use of Uninitialized Resource in csv-sniffer.
Affected versions of this crate passes an uninitialized buffer to a user-provided Read implementation (within fn preamble_skipcount()). Arbitrary Read implementations can read from the uninitialized buffer (memory exposure) and also can return incorrect number of bytes written to the buffer. Reading from uninitialized...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'csv-sniffer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45686'}, {'type': 'WEB', 'url': 'https://github.com/jblondin/csv-sniffer/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/jblondin/csv-sniffer/pull/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/jblondin/csv-sniffer'}, {'type': 'WEB', 'u...
{'cwe_ids': ['CWE-908'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T17:04:29Z', 'nvd_published_at': '2021-12-27T00:15:00Z'}
1.4.0
GHSA-jqjj-r4qp-x2gh
2022-01-07T16:25:54Z
2022-01-06T22:12:42Z
null
['CVE-2021-45693']
Use of Uninitialized Resource in messagepack-rs.
An issue was discovered in the messagepack-rs crate through 2021-01-26 for Rust. deserialize_string_primitive may read from uninitialized memory locations.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'messagepack-rs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.8.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45693'}, {'type': 'WEB', 'url': 'https://github.com/otake84/messagepack-rs/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/otake84/messagepack-rs'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crate...
{'cwe_ids': ['CWE-908'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T14:38:22Z', 'nvd_published_at': '2021-12-27T00:15:00Z'}
1.4.0
GHSA-pq7m-3gw7-gq5x
2022-03-29T22:14:36Z
2022-01-21T18:55:30Z
null
['CVE-2022-21699']
Execution with Unnecessary Privileges in ipython
We’d like to disclose an arbitrary code execution vulnerability in IPython that stems from IPython executing untrusted files in CWD. This vulnerability allows one user to run code as another. Proof of concept User1: ``` mkdir -m 777 /tmp/profile_default mkdir -m 777 /tmp/profile_default/startup echo 'print("stealing...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ipython'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.11'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ipython'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '7.16.3'}]}]}, {'package': {'ecosystem': 'Py...
[{'type': 'WEB', 'url': 'https://github.com/ipython/ipython/security/advisories/GHSA-pq7m-3gw7-gq5x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21699'}, {'type': 'WEB', 'url': 'https://github.com/ipython/ipython/commit/46a51ed69cdf41b4333943d9ceeb945c4ede5668'}, {'type': 'PACKAGE', 'url': ...
{'cwe_ids': ['CWE-250', 'CWE-269', 'CWE-279'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T21:26:17Z', 'nvd_published_at': '2022-01-19T22:15:00Z'}
1.4.0
GHSA-57hg-26h7-9qgv
2022-01-25T20:49:09Z
2022-01-21T23:48:07Z
null
['CVE-2022-0256']
pimcore is vulnerable to Cross-site Scripting
pimcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.2.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0256'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/dff1cb0c466abcd55f1268934de3ed937b7436a7'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8d88e48a-7124...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T14:22:36Z', 'nvd_published_at': '2022-01-17T16:15:00Z'}
1.4.0
GHSA-xvcg-2q82-r87j
2022-01-07T16:25:11Z
2022-01-06T22:18:19Z
null
['CVE-2019-25055']
Panic mishandled in libpulse-binding
An issue was discovered in the libpulse-binding crate before 2.6.0 for Rust. It mishandles a panic that crosses a Foreign Function Interface (FFI) boundary.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'libpulse-binding'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-25055'}, {'type': 'WEB', 'url': 'https://github.com/jnqnfe/pulse-binding-rust/commit/7fd282aef7787577c385aed88cb25d004b85f494'}, {'type': 'PACKAGE', 'url': 'https://github.com/jnqnfe/pulse-binding-rust'}, {'type': 'WEB', 'url': 'https://raw.githubu...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T18:18:40Z', 'nvd_published_at': '2021-12-27T00:15:00Z'}
1.4.0
GHSA-7528-7jg5-6g62
2022-01-31T21:46:37Z
2022-01-27T15:09:00Z
null
['CVE-2022-21715']
Cross-site Scripting Vulnerability in CodeIgniter4
### Impact Cross-Site Scripting (XSS) vulnerability was found in `API\ResponseTrait` in Codeigniter4. Attackers can do XSS attacks if you are using `API\ResponseTrait`. ### Patches Upgrade to v4.1.8 or later. ### Workarounds Do one of the following: 1. Do not use `API\ResponseTrait` nor `ResourceController` 2. Disabl...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'codeigniter4/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.8'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/codeigniter4/CodeIgniter4/security/advisories/GHSA-7528-7jg5-6g62'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21715'}, {'type': 'WEB', 'url': 'https://github.com/codeigniter4/CodeIgniter4/commit/70d881cf5322b7c32e69516aebd2273ac6a1e8dd'}, {'type'...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-24T22:20:42Z', 'nvd_published_at': '2022-01-24T20:15:00Z'}
1.4.0
GHSA-fj2w-wfgv-mwq6
2022-01-24T22:05:38Z
2022-01-21T23:21:48Z
null
[]
Denial of service in CBOR library
### Impact Due to this library's use of an inefficient algorithm, it is vulnerable to a denial of service attack when a maliciously crafted input is passed to `DecodeFromBytes` or other CBOR decoding mechanisms in this library. Affected versions _include_ versions 4.0.0 through 4.5.0. This vulnerability was private...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'com.upokecenter:cbor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.5.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/peteroupc/CBOR-Java/security/advisories/GHSA-fj2w-wfgv-mwq6'}, {'type': 'PACKAGE', 'url': 'https://github.com/peteroupc/CBOR-Java'}]
{'cwe_ids': ['CWE-407'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T16:15:17Z', 'nvd_published_at': None}
1.4.0
GHSA-vc3p-29h2-gpcp
2023-02-08T00:37:41Z
2022-01-02T00:00:48Z
null
['CVE-2021-44716']
golang.org/x/net/http2 allows uncontrolled memory consumption
net/http in Go before 1.16.12 and 1.17.x before 1.17.5 allows uncontrolled memory consumption in the header canonicalization cache via HTTP/2 requests.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'golang.org/x/net/http2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20211209124913-491a49abca63'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44716'}, {'type': 'WEB', 'url': 'https://go.dev/cl/369794'}, {'type': 'WEB', 'url': 'https://go.dev/issue/50058'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/golang-announce/c/hcmEScgc00k'}, {'type': 'WEB', 'url': 'https://lists.debian.org...
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T00:37:41Z', 'nvd_published_at': '2022-01-01T05:15:00Z'}
1.4.0
GHSA-wrxc-mr2w-cjpv
2023-03-08T21:32:06Z
2022-01-07T00:20:50Z
null
['CVE-2020-11529']
Open Redirect in Grav
Common/Grav.php in Grav before 1.6.23 has an Open Redirect.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'getgrav/grav'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.23'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11529'}, {'type': 'WEB', 'url': 'https://github.com/getgrav/grav/issues/3134'}, {'type': 'WEB', 'url': 'https://github.com/getgrav/grav/commit/2eae104c7a4bf32bc26cb8073d5c40464bfda3f7'}, {'type': 'WEB', 'url': 'https://getgrav.org/#changelog'}, {'t...
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T22:30:40Z', 'nvd_published_at': '2020-04-04T19:15:00Z'}
1.4.0
GHSA-hp68-xhvj-x6j6
2022-08-11T18:43:28Z
2022-01-06T18:34:18Z
null
['CVE-2021-43843']
jsx-slack insufficient patch for CVE-2021-43838 ReDoS
We found the patch for CVE-2021-43838 in jsx-slack v4.5.1 is insufficient to save from Regular Expression Denial of Service (ReDoS) attack. This vulnerability affects to jsx-slack v4.5.1 and earlier versions. ### Impact If attacker can put a lot of JSX elements into `<blockquote>` tag _with including multibyte chara...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'jsx-slack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/yhatt/jsx-slack/security/advisories/GHSA-55xv-f85c-248q'}, {'type': 'WEB', 'url': 'https://github.com/yhatt/jsx-slack/security/advisories/GHSA-hp68-xhvj-x6j6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43843'}, {'type': 'WEB', 'url': 'https://git...
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-04T20:19:23Z', 'nvd_published_at': '2021-12-20T22:15:00Z'}
1.4.0
GHSA-4vf4-qmvg-mh7h
2023-08-29T16:46:42Z
2022-01-21T23:22:17Z
null
['CVE-2021-41819']
Cookie Prefix Spoofing in CGI::Cookie.parse
CGI::Cookie.parse in Ruby through 2.6.8 mishandles security prefixes in cookie names. This also affects the CGI gem prior to versions 0.3.1, 0.2.1, 0.1.1, and 0.1.0.1 for Ruby.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'cgi'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.0'}, {'fixed': '0.3.1'}]}], 'versions': ['0.3.0']}, {'package': {'ecosystem': 'RubyGems', 'name': 'cgi'}, 'ecosystem_specific': {'affected_functions'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41819'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/910552'}, {'type': 'PACKAGE', 'url': 'https://github.com/ruby/cgi'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/cgi/CVE-2021-41819.yml'}, {'typ...
{'cwe_ids': ['CWE-565'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-13T18:53:26Z', 'nvd_published_at': '2022-01-01T06:15:00Z'}
1.4.0
GHSA-8gjm-h3xj-mp6w
2022-01-07T17:55:53Z
2022-01-06T22:10:43Z
null
['CVE-2021-45698']
RPC call failure in ckb
An issue was discovered in the ckb crate before 0.40.0 for Rust. A get_block_template RPC call may fail in situations where it is supposed to select a Nervos CKB blockchain transaction with a higher fee rate than another transaction.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'ckb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.40.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/nervosnetwork/ckb/security/advisories/GHSA-v666-6w97-pcwm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45698'}, {'type': 'PACKAGE', 'url': 'https://github.com/nervosnetwork/ckb'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/a...
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T23:45:58Z', 'nvd_published_at': '2021-12-27T00:15:00Z'}
1.4.0
GHSA-9hg3-hmmf-c3gr
2022-09-08T00:00:03Z
2022-01-11T00:00:48Z
null
['CVE-2022-22821']
Path Traversal in nemo-toolkit
NVIDIA NeMo before 1.6.0 contains a vulnerability in ASR WebApp, in which ../ Path Traversal may lead to deletion of any directory when admin privileges are available.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'nemo-toolkit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/NVIDIA/NeMo/security/advisories/GHSA-rpx7-33j2-xx9x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22821'}, {'type': 'PACKAGE', 'url': 'https://github.com/NVIDIA/NeMo'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-08T00:00:03Z', 'nvd_published_at': '2022-01-10T14:12:00Z'}
1.4.0
GHSA-c7fh-chf7-jr5x
2022-01-06T18:36:46Z
2022-01-06T18:44:27Z
null
['CVE-2021-29061']
ReDOS in Vfsjfilechooser2
A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in Vfsjfilechooser2 which occurs when the application attempts to validate crafted URIs.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.github.fracpete:vfsjfilechooser2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29061'}, {'type': 'WEB', 'url': 'https://github.com/fracpete/vfsjfilechooser2/issues/7'}, {'type': 'WEB', 'url': 'https://github.com/fracpete/vfsjfilechooser2/commit/9c9f2c317f3de5ece60a3ae28c371e9796e3909b'}, {'type': 'WEB', 'url': 'https://github...
{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-22T16:02:32Z', 'nvd_published_at': '2021-06-21T20:15:00Z'}
1.4.0
GHSA-86ch-6w7v-v6xf
2022-01-18T22:37:17Z
2022-01-08T00:24:44Z
null
['CVE-2022-21667']
Denial of Service in soketi
### Impact _What kind of vulnerability is it? Who is impacted?_ There was a wrong behavior when reading POST requests, making the server crash if it couldn't read the body. In case a POST request was sent to any endpoint of the server with an empty body, **even unauthenticated with the Pusher Protocol**, it would simp...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': '@soketi/soketi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.24.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/soketi/soketi/security/advisories/GHSA-86ch-6w7v-v6xf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21667'}, {'type': 'WEB', 'url': 'https://github.com/soketi/soketi/commit/4b12efef9c31117c36a0a0f1c3aa32114e86364b'}, {'type': 'PACKAGE', 'url': 'htt...
{'cwe_ids': ['CWE-755'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T23:46:31Z', 'nvd_published_at': '2022-01-10T14:12:00Z'}
1.4.0
GHSA-cvp7-c586-cmf4
2022-02-01T15:17:33Z
2022-01-28T22:01:45Z
2022-02-01T15:17:33Z
['CVE-2022-0329']
Withdrawn: Code Injection in loguru
# Withdrawn This advisory has been withdrawn after the maintainers of loguru noted this issue is not a security vulnerability and the CVE has been revoked. We have [stopped](https://github.com/Delgan/loguru/issues/563#issuecomment-1025223732) Dependabot alerts regarding this issue. ## Original Description In version...
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'loguru'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.5.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0329'}, {'type': 'WEB', 'url': 'https://github.com/Delgan/loguru/issues/563'}, {'type': 'WEB', 'url': 'https://github.com/delgan/loguru/commit/4b0070a4f30cbf6d5e12e6274b242b62ea11c81b'}, {'type': 'PACKAGE', 'url': 'https://github.com/delgan/loguru'...
{'cwe_ids': ['CWE-94'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-01-25T23:33:20Z', 'nvd_published_at': '2022-01-21T11:15:00Z'}
1.4.0
GHSA-83x4-9cwr-5487
2022-02-02T16:07:18Z
2022-01-06T18:32:58Z
null
['CVE-2021-4133']
Improper Authorization in Keycloak
A incorrect authorization flaw was found in Keycloak 12.0.0, the flaw allows an attacker with any existing user account to create new default user accounts via the administrative REST API even where new user registration is disabled.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-services'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '15.1.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/security/advisories/GHSA-83x4-9cwr-5487'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4133'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/issues/9247'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug...
{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-04T20:27:06Z', 'nvd_published_at': '2022-01-25T20:15:00Z'}
1.4.0
GHSA-g7fx-mmjc-r7gv
2022-11-29T21:30:23Z
2022-01-13T00:00:52Z
null
['CVE-2022-23116']
Agent-to-controller security bypass in Jenkins Conjur Secrets Plugin allows decrypting secrets
Jenkins Conjur Secrets Plugin 1.0.9 and earlier implements functionality that allows attackers able to control agent processes to decrypt secrets stored in Jenkins obtained through another method.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.conjur.jenkins:conjur-credentials'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23116'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/conjur-credentials-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2522%20(1)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists...
{'cwe_ids': ['CWE-311'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T21:30:23Z', 'nvd_published_at': '2022-01-12T20:15:00Z'}
1.4.0
GHSA-h56g-v4vp-q9q6
2022-02-04T16:38:23Z
2022-01-29T00:00:41Z
null
['CVE-2022-0352']
Cross-site Scripting in calibreweb
calibreweb prior to version 0.6.16 contains a cross-site scripting vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'calibreweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.16'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0352'}, {'type': 'WEB', 'url': 'https://github.com/janeczku/calibre-web/commit/6bf07539788004513c3692c074ebc7ba4ce005e1'}, {'type': 'PACKAGE', 'url': 'https://github.com/janeczku/calibre-web'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a57...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T16:38:23Z', 'nvd_published_at': '2022-01-28T22:15:00Z'}
1.4.0
GHSA-4w23-c97g-fq5v
2022-01-04T20:20:07Z
2022-01-05T20:33:16Z
null
['CVE-2021-4130']
snipe-it is vulnerable to Cross-Site Request Forgery (CSRF)
snipe-it is vulnerable to Cross-Site Request Forgery (CSRF)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4130'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/9b2dd6522f214a3fbee6a4e32699104d0ea2b6ae'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ccf073cd-7f54-4...
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-04T20:20:07Z', 'nvd_published_at': '2021-12-18T05:15:00Z'}
1.4.0
GHSA-mh3m-8c74-74xh
2022-01-31T21:59:33Z
2022-01-27T15:28:06Z
null
['CVE-2022-21708']
Denial of Service in graphql-go
### Impact This is a DoS vulnerability that is possible due to a bug in the library that would allow an attacker with specifically designed queries to cause stack overflow panics. Any user with access to the GraphQL handler can send these queries and cause stack overflows. This in turn could potentially compromise the ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/graph-gophers/graphql-go'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/graph-gophers/graphql-go/security/advisories/GHSA-mh3m-8c74-74xh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21708'}, {'type': 'WEB', 'url': 'https://github.com/graph-gophers/graphql-go/commit/eae31ca73eb3473c544710955d1dbebc22605bfe'}, {'type': ...
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-24T22:42:15Z', 'nvd_published_at': '2022-01-21T23:15:00Z'}
1.4.0
GHSA-c7fm-jx59-wjf6
2022-01-20T16:14:41Z
2022-01-21T18:50:58Z
null
['CVE-2022-0266']
Authorization Bypass Through User-Controlled Key in LiveHelperChat
Authorization Bypass Through User-Controlled Key in Packagist remdex/livehelperchat prior to 3.92v.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.92'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0266'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/cc1122aed0d1ad9f05757eaea2ab9e6a924776bd'}, {'type': 'PACKAGE', 'url': 'https://github.com/livehelperchat/livehelperchat'}, {'type': 'WEB', 'url': 'https://hunt...
{'cwe_ids': ['CWE-639'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-20T16:14:41Z', 'nvd_published_at': '2022-01-19T06:15:00Z'}
1.4.0
GHSA-24g6-5rx7-58wj
2022-01-07T16:13:36Z
2022-01-06T22:18:07Z
null
['CVE-2019-25054']
Missing Initialization of Resource in pnet
An issue was discovered in the pnet crate before 0.27.2 for Rust. There is a segmentation fault (upon attempted dereference of an uninitialized descriptor) because of an erroneous IcmpTransportChannelIterator compiler optimization.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'pnet'}, 'ecosystem_specific': {'affected_functions': ['pnet::transport::IcmpTransportChannelIterator']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.27.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-25054'}, {'type': 'WEB', 'url': 'https://github.com/libpnet/libpnet/issues/449'}, {'type': 'PACKAGE', 'url': 'https://github.com/libpnet/libpnet/'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/pnet/RUST...
{'cwe_ids': ['CWE-909'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T18:31:07Z', 'nvd_published_at': '2021-12-27T00:15:00Z'}
1.4.0
GHSA-jwfh-j623-m97h
2022-01-07T17:12:54Z
2022-01-06T22:12:35Z
null
['CVE-2021-45691']
Use of Uninitialized Resource in messagepack-rs
An issue was discovered in the messagepack-rs crate through 2021-01-26 for Rust. deserialize_string may read from uninitialized memory locations.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'messagepack-rs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.8.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45691'}, {'type': 'WEB', 'url': 'https://github.com/otake84/messagepack-rs/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/otake84/messagepack-rs'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crate...
{'cwe_ids': ['CWE-908'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T14:33:33Z', 'nvd_published_at': '2021-12-27T00:15:00Z'}
1.4.0
GHSA-hj3m-v758-jwx5
2023-09-11T22:36:13Z
2022-01-05T15:02:43Z
null
['CVE-2021-23797']
Path Traversal in http-server-node
All versions of package http-server-node are vulnerable to Directory Traversal via use of `--path-as-is`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'http-server-node'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23797'}, {'type': 'PACKAGE', 'url': 'https://github.com/yan-loong/http-server'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-HTTPSERVERNODE-1727656'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-04T18:43:28Z', 'nvd_published_at': '2021-12-17T20:15:00Z'}
1.4.0
GHSA-jqpv-jm4m-86j9
2023-06-13T17:45:06Z
2022-01-06T22:17:50Z
null
['CVE-2018-25028']
Use After Free in libpulse-binding
Affected versions contained a pair of use-after-free issues with the objects returned by the get_format_info and get_context methods of Stream objects. These objects were mistakenly being constructed without setting an important flag to prevent destruction of the underlying C objects they reference upon their own destr...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'libpulse-binding'}, 'ecosystem_specific': {'affected_functions': ['libpulse_binding::stream::Stream::get_context', 'libpulse_binding::stream::Stream::get_format_info']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/jnqnfe/pulse-binding-rust/security/advisories/GHSA-ghpq-vjxw-ch5w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25028'}, {'type': 'PACKAGE', 'url': 'https://github.com/jnqnfe/pulse-binding-rust'}, {'type': 'WEB', 'url': 'https://raw.githubuserconte...
{'cwe_ids': ['CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T18:29:31Z', 'nvd_published_at': '2021-12-27T00:15:00Z'}
1.4.0
GHSA-x8rq-rc7x-5fg5
2022-02-24T18:44:54Z
2022-01-06T22:24:35Z
null
['CVE-2022-0086']
uppy's companion module is vulnerable to Server-Side Request Forgery (SSRF)
uppy's companion module is vulnerable to Server-Side Request Forgery (SSRF) via IPv4-mapped IPv6 addresses.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'uppy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0086'}, {'type': 'WEB', 'url': 'https://github.com/transloadit/uppy/pull/3403'}, {'type': 'WEB', 'url': 'https://github.com/transloadit/uppy/commit/fc137e30a2a3102eb191141f280d5de20dacdf8f'}, {'type': 'PACKAGE', 'url': 'https://github.com/transload...
{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T19:48:36Z', 'nvd_published_at': '2022-01-04T18:15:00Z'}
1.4.0
GHSA-x7xf-253v-x3w8
2022-07-06T19:47:38Z
2022-05-13T01:09:20Z
null
['CVE-2016-8739']
Improper Restriction of XML External Entity Reference in Apache CXF JAX-RS
The JAX-RS module in Apache CXF prior to 3.0.12 and 3.1.x prior to 3.1.9 provides a number of Atom JAX-RS MessageBodyReaders. These readers use Apache Abdera Parser which expands XML entities by default which represents a major XXE risk.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.12'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.11'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf-core'}, 'ranges': [{'t...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-8739'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:0868'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB'...
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:47:38Z', 'nvd_published_at': '2017-08-10T18:29:00Z'}
1.4.0
GHSA-67x3-36j7-pj4g
2023-07-21T22:12:36Z
2022-05-13T01:20:51Z
null
['CVE-2018-8385']
ChakraCore RCE Vulnerability
A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka "Scripting Engine Memory Corruption Vulnerability." This affects Internet Explorer 9, ChakraCore, Internet Explorer 11, Microsoft Edge, Internet Explorer 10. This CVE ID is unique from CVE-2...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8385'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/5596'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/f00612bbc3657f1ec33a9e7d575c16a5489d06aa'}, {'type': 'WEB', 'url': 'https://portal.msrc....
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T22:12:36Z', 'nvd_published_at': '2018-08-15T17:29:00Z'}
1.4.0
GHSA-p9qj-4rjp-j3w9
2023-08-01T00:05:06Z
2022-05-13T01:07:08Z
null
['CVE-2015-5349']
Apache Directory Studio Command Injection
The CSV export in Apache LDAP Studio and Apache Directory Studio before 2.0.0-M10 does not properly escape field values, which might allow attackers to execute arbitrary commands by leveraging a crafted LDAP entry that is interpreted as a formula when imported into a spreadsheet.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.directory.studio:org.apache.directory.studio.parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0-M10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5349'}, {'type': 'WEB', 'url': 'https://directory.apache.org/studio/news.html'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/reb5443aaf781b364896ee9d7cf6e97fdc4f5a5174132c319252963b6@%3Ccommits.directory.apache.org%3E'}, {'type': '...
{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T00:05:06Z', 'nvd_published_at': '2016-04-11T21:59:00Z'}
1.4.0
GHSA-4793-w44w-m7xm
2023-08-28T23:20:22Z
2022-05-05T00:29:17Z
null
['CVE-2013-7062']
Plone Zope cross-site scripting (XSS) vulnerability
Multiple cross-site scripting (XSS) vulnerabilities in Zope, as used in Plone 3.3.x through 3.3.6, 4.0.x through 4.0.9, 4.1.x through 4.1.6, 4.2.x through 4.2.7, and 4.3 through 4.3.2, allow remote attackers to inject arbitrary web script or HTML via unspecified input in the (1) browser_id_manager or (2) OFS.Image meth...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3'}, {'fixed': '3.3.6'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7062'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/89623'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/89627'}, {'type': 'PACKAGE', 'url': 'https://github.com/plone/Plone'}, {'type...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-28T23:20:22Z', 'nvd_published_at': '2020-01-02T19:15:00Z'}
1.4.0
GHSA-5hg8-r9vq-gjqp
2022-07-01T11:57:29Z
2022-05-13T01:07:54Z
null
['CVE-2017-5661']
Improper Restriction of XML External Entity Reference in Apache FOP
In Apache FOP before 2.2, files lying on the filesystem of the server which uses FOP can be revealed to arbitrary users who send maliciously formed SVG files. The file types that can be shown depend on the user context in which the exploitable application is running. If the user is root a full compromise of the server ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.xmlgraphics:fop'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-5661'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/tns-2021-14'}, {'type': 'WEB', 'url': 'https://xmlgraphics.apache.org/security.html'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2017/dsa-3864'}, {'type': 'WEB', 'url': '...
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T11:57:29Z', 'nvd_published_at': '2017-04-18T14:59:00Z'}
1.4.0
GHSA-4f6x-g5vh-8jm5
2022-12-13T18:54:35Z
2022-05-24T17:43:01Z
null
['CVE-2021-21616']
Stored XSS vulnerability in Jenkins Active Choices Plugin
Active Choices Plugin 2.5.2 and earlier does not escape reference parameter values. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission. Active Choices Plugin 2.5.3 escapes reference parameter values.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.biouno:uno-choice'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.5.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21616'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/active-choices-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-02-24/#SECURITY-2192'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secur...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T18:54:35Z', 'nvd_published_at': '2021-02-24T16:15:00Z'}
1.4.0
GHSA-jjcj-fgfm-9g9r
2023-07-03T21:46:30Z
2022-05-14T01:27:14Z
null
['CVE-2018-12029']
Phusion Passenger Race Condition Allows Privilege Escalation
A race condition in the nginx module in Phusion Passenger 3.x through 5.x before 5.3.2 allows local escalation of privileges when a non-standard passenger_instance_registry_dir with insufficiently strict permissions is configured. Replacing a file with a symlink after the file was created, but before it was chowned, le...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'passenger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '5.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-12029'}, {'type': 'WEB', 'url': 'https://blog.phusion.nl/2018/06/12/passenger-5-3-2-various-security-fixes/'}, {'type': 'WEB', 'url': 'https://blog.phusion.nl/passenger-5-3-2'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/bl...
{'cwe_ids': ['CWE-362'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T23:01:12Z', 'nvd_published_at': '2018-06-17T20:29:00Z'}
1.4.0
GHSA-rhgr-952r-6p8q
2022-09-08T14:20:02Z
2022-05-24T00:01:49Z
null
['CVE-2022-29599']
Command injection in Apache Maven maven-shared-utils
In Apache Maven maven-shared-utils prior to version 3.3.3, the Commandline class can emit double-quoted strings without proper escaping, allowing shell injection attacks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.maven.shared:maven-shared-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29599'}, {'type': 'WEB', 'url': 'https://github.com/apache/maven-shared-utils/pull/40'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/maven-shared-utils'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/MSHARED-297'}, {'type...
{'cwe_ids': ['CWE-116', 'CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T22:39:47Z', 'nvd_published_at': '2022-05-23T11:16:00Z'}
1.4.0
GHSA-hrfh-7j5f-8ccr
2022-07-01T11:48:49Z
2022-05-24T17:01:50Z
null
['CVE-2019-11287']
Pivotal RabbitMQ is vulnerable to a denial of service attack
Pivotal RabbitMQ, versions 3.7.x prior to 3.7.21 and 3.8.x prior to 3.8.1, and RabbitMQ for Pivotal Platform, 1.16.x versions prior to 1.16.7 and 1.17.x versions prior to 1.17.4, contain a web management plugin that is vulnerable to a denial of service attack. The "X-Reason" HTTP Header can be leveraged to insert a mal...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Hex', 'name': 'RabbitMQ'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.7.0'}, {'fixed': '3.7.21'}]}]}, {'package': {'ecosystem': 'Hex', 'name': 'RabbitMQ'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.8.0'}, {'fixed': '3.8.1'}]}]}, {'package': {'ecosystem'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11287'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0078'}, {'type': 'WEB', 'url': 'https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-11287-DoS%20via%20Heap%20Overflow-RabbitMQ%20Web%20Management%20Plugin'}, ...
{'cwe_ids': ['CWE-134'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T11:48:49Z', 'nvd_published_at': '2019-11-23T00:15:00Z'}
1.4.0
GHSA-5hpw-vcj2-prwg
2023-07-07T20:44:07Z
2022-05-24T16:50:37Z
null
['CVE-2019-13645']
Firefly III vulnerable to stored XSS
Firefly III before 4.7.17.3 is vulnerable to stored XSS due to lack of filtration of user-supplied data in image file names. The JavaScript code is executed during attachments/edit/$file_id$ attachment editing.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'grumpydictator/firefly-iii'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.7.17.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-13645'}, {'type': 'WEB', 'url': 'https://github.com/firefly-iii/firefly-iii/issues/2337'}, {'type': 'WEB', 'url': 'https://github.com/firefly-iii/firefly-iii/commit/17a66b3056096244a2198a7351847d26cb7b37c5'}, {'type': 'PACKAGE', 'url': 'https://git...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T20:44:07Z', 'nvd_published_at': '2019-07-18T03:15:00Z'}
1.4.0
GHSA-73w7-6w9g-gc8w
2023-03-09T00:36:26Z
2022-05-13T01:38:25Z
null
['CVE-2017-0902']
RubyGems has Origin Validation Error vulnerability
RubyGems version 2.6.12 and earlier is vulnerable to a DNS hijacking vulnerability that allows a MITM attacker to force the RubyGems client to download and install gems from a server that the attacker controls.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rubygems-update'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0902'}, {'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems/commit/8d91516fb7037ecfb27622f605dc40245e0f8d32'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/218088'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-20...
{'cwe_ids': ['CWE-346', 'CWE-350'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-09T00:36:26Z', 'nvd_published_at': '2017-08-31T20:29:00Z'}
1.4.0
GHSA-qj7f-j6h9-g5rq
2022-11-01T22:33:57Z
2022-05-17T00:26:27Z
null
['CVE-2017-12623']
XML External Entity Reference in Apache NiFi
An authorized user could upload a template which contained malicious code and accessed sensitive files via an XML External Entity (XXE) attack. The fix to properly handle XML External Entities was applied on the Apache NiFi 1.4.0 release. Users running a prior 1.x release should upgrade to the appropriate release.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12623'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security.html#CVE-2017-12623'}]
{'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T22:33:57Z', 'nvd_published_at': '2017-10-10T18:29:00Z'}
1.4.0
GHSA-95qr-67rx-9pgh
2023-08-23T13:41:55Z
2022-05-24T17:37:51Z
null
['CVE-2020-5809']
Umbraco CMS vulnerable to stored XSS
A stored XSS vulnerability exists in Umbraco CMS <= 8.9.1 or current. An authenticated user can inject arbitrary JavaScript code into iframes when editing content using the TinyMCE rich-text editor, as TinyMCE is configured to allow iframes by default in Umbraco CMS.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'UmbracoCms.Core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '8.9.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5809'}, {'type': 'PACKAGE', 'url': 'https://github.com/umbraco/Umbraco-CMS'}, {'type': 'WEB', 'url': 'https://www.tenable.com/security/research/tra-2020-59'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T22:32:02Z', 'nvd_published_at': '2020-12-30T16:15:00Z'}
1.4.0
GHSA-6755-jgp4-8q7h
2022-09-09T00:45:35Z
2022-05-24T22:00:03Z
null
['CVE-2019-10327']
XML External Entity processing vulnerability in Pipeline Maven Integration Jenkins Plugin
An XML external entities (XXE) vulnerability in Jenkins Pipeline Maven Integration Plugin 1.7.0 and earlier allowed attackers able to control a temporary directory's content on the agent running the Maven build to have Jenkins parse a maliciously crafted XML file that uses external entities for extraction of secrets fr...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:pipeline-maven'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.7.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10327'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/pipeline-maven-plugin/tree/master/pipeline-maven'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1409'}, {'type': 'WEB', 'url': 'http://www.openw...
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-09T00:45:35Z', 'nvd_published_at': '2019-05-31T15:29:00Z'}
1.4.0
GHSA-72gm-pp6q-gpx5
2023-07-27T19:40:48Z
2022-05-14T04:04:14Z
null
['CVE-2017-11905']
ChakraCore RCE Vulnerability
ChakraCore and Microsoft Edge in Windows 10 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-11905'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/4411'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/d97375c40cfd2b2376a5c4b6cd34098e1e99e1f1'}, {'type': 'WEB', 'url': 'https://portal.msrc...
{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-27T19:40:48Z', 'nvd_published_at': '2017-12-12T21:29:00Z'}
1.4.0
GHSA-8r28-r8cp-g6cp
2022-07-06T19:43:24Z
2022-05-13T01:08:56Z
null
['CVE-2016-5001']
Exposure of Sensitive Information to an Unauthorized Actor in Apache Hadoop
This is an information disclosure vulnerability in Apache Hadoop before 2.6.4 and 2.7.x before 2.7.2 in the short-circuit reads feature of HDFS. A local user on an HDFS DataNode may be able to craft a block token that grants unauthorized read access to random files by guessing certain fields in the token.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.6.3'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-common'}, ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-5001'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r66de86b9a608c1da70b2d27d765c11ec88edf6e5dd6f379ab33e072a@%3Cuser.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2016/q4/698'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:43:24Z', 'nvd_published_at': '2017-08-30T19:29:00Z'}
1.4.0
GHSA-pqwh-44jj-p5rm
2022-06-09T22:47:59Z
2022-05-13T01:25:03Z
null
['CVE-2013-4366']
Hostname verification in Apache HttpClient 4.3 was disabled by default
http/impl/client/HttpClientBuilder.java in Apache HttpClient 4.3.x before 4.3.1 does not ensure that X509HostnameVerifier is not null, which allows attackers to have unspecified impact via vectors involving hostname verification.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.httpcomponents:httpclient'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3'}, {'fixed': '4.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4366'}, {'type': 'WEB', 'url': 'http://svn.apache.org/r1528614'}, {'type': 'WEB', 'url': 'http://www.apache.org/dist/httpcomponents/httpclient/RELEASE_NOTES-4.3.x.txt'}]
{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-09T22:47:59Z', 'nvd_published_at': '2017-10-30T19:29:00Z'}
1.4.0
GHSA-67xp-4726-4978
2023-07-13T17:10:40Z
2022-05-24T17:08:29Z
null
['CVE-2020-0710']
ChakraCore RCE Vulnerability
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0673, CVE-2020-0674, CVE-2020-0711, CVE-2020-0712, CVE-2020-0713, CVE-2020-0767.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.16'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-0710'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/6375'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/6375/commits/d89802674a591904c971f2d92b96b8f40839e7c7'}, {'type': 'PACKAGE', 'url': 'https...
{'cwe_ids': ['CWE-119', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T17:10:40Z', 'nvd_published_at': '2020-02-11T22:15:00Z'}
1.4.0
GHSA-f6fv-fjg8-4m6w
2023-07-25T00:16:49Z
2022-05-14T01:14:50Z
null
['CVE-2018-19859']
OpenRefine Directory Traversal
OpenRefine before 3.2 beta allows directory traversal via a relative pathname in a ZIP archive.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.openrefine:openrefine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19859'}, {'type': 'WEB', 'url': 'https://github.com/OpenRefine/OpenRefine/issues/1840'}, {'type': 'WEB', 'url': 'https://github.com/OpenRefine/OpenRefine/pull/1901'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T00:16:49Z', 'nvd_published_at': '2018-12-05T11:29:00Z'}
1.4.0
GHSA-p5f9-c9j9-g8qx
2022-05-25T20:14:36Z
2022-05-17T00:01:46Z
null
['CVE-2022-30781']
Shell command injection in gitea
Gitea before 1.16.7 does not escape the shell out for `git fetch remote` allowing for shell command injection
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'code.gitea.io/gitea'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30781'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/19487'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/19490'}, {'type': 'WEB', 'url': 'https://blog.gitea.io/2022/05/gitea-1.16.7-is-released/'}, {'type': 'PA...
{'cwe_ids': ['CWE-116'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T20:14:36Z', 'nvd_published_at': '2022-05-16T04:15:00Z'}
1.4.0
GHSA-5phj-qv74-pv4w
2022-12-02T20:48:12Z
2022-05-18T00:00:40Z
null
['CVE-2022-30955']
Missing permission check in Jenkins GitLab Plugin
Jenkins GitLab Plugin 1.5.31 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. An enumeration of credentials IDs in GitLab Plugin 1.5.32 requires the appropriate permissions.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:gitlab-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.32'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30955'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/gitlab-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2753'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-02T14:54:48Z', 'nvd_published_at': '2022-05-17T15:15:00Z'}
1.4.0
GHSA-ch3j-w953-hfcm
2023-08-29T19:01:27Z
2022-05-17T05:03:05Z
null
['CVE-2013-5942']
graphite-web is vulnerable to Remote Code Execution
Graphite 0.9.5 through 0.9.10 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, related to (1) remote_storage.py, (2) storage.py, (3) render/datalib.py, and (4) whitelist/views.py, a different vulnerability than CVE-2013-5093.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'graphite-web'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.5'}, {'fixed': '0.9.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.10'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-5942'}, {'type': 'PACKAGE', 'url': 'https://github.com/graphite-project/graphite-web'}, {'type': 'WEB', 'url': 'https://github.com/graphite-project/graphite-web/blob/master/docs/releases/0_9_11.rst'}, {'type': 'WEB', 'url': 'http://secunia.com/advi...
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T19:01:27Z', 'nvd_published_at': '2013-09-27T10:08:00Z'}
1.4.0
GHSA-xgcc-r2f3-rq6p
2023-07-20T22:19:42Z
2022-05-13T01:18:38Z
null
['CVE-2018-0939']
ChakraCore information disclosure vulnerability
ChakraCore and Microsoft Edge in Windows 10 1703 and 1709 allow information disclosure, due to how the scripting engine handles objects in memory, aka "Scripting Engine Information Disclosure Vulnerability". This CVE ID is unique from CVE-2018-0891.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-0939'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/090277e7a5ea1d938777acb92e7b6759936ea974'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0939'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T22:19:42Z', 'nvd_published_at': '2018-03-14T17:29:00Z'}
1.4.0
GHSA-fjw4-39pg-vf4f
2022-11-07T20:28:42Z
2022-05-24T16:45:24Z
null
['CVE-2019-0226']
Apache Karaf vulnerable to relative path traversal
Apache Karaf Config service provides a install method (via service or MBean) that could be used to travel in any directory and overwrite existing file. The vulnerability is low if the Karaf process user has limited permission on the filesystem. Any Apache Karaf version before 4.2.5 is impacted. User should upgrade to A...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.karaf.config:org.apache.karaf.config.core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0226'}, {'type': 'WEB', 'url': 'https://github.com/apache/karaf/pull/805'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/karaf'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/KARAF-6230'}, {'type': 'WEB', 'url': 'https://l...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-07T20:28:42Z', 'nvd_published_at': '2019-05-09T14:29:00Z'}
1.4.0
GHSA-f7ff-xf87-f22q
2022-06-09T22:54:48Z
2022-05-27T00:00:29Z
null
['CVE-2022-29637']
Arbitrary command execution in Minidoc
An arbitrary file upload vulnerability in Mindoc v2.1-beta.5 allows attackers to execute arbitrary commands via a crafted Zip file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/mindoc-org/mindoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1-beta.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29637'}, {'type': 'WEB', 'url': 'https://github.com/mindoc-org/mindoc/issues/788'}, {'type': 'PACKAGE', 'url': 'github.com/mindoc-org/mindoc'}]
{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T18:39:00Z', 'nvd_published_at': '2022-05-26T20:15:00Z'}
1.4.0
GHSA-7phr-6cc9-4m5q
2023-03-27T22:13:46Z
2022-05-24T16:49:05Z
null
['CVE-2019-13068']
Grafana Cross-site Scripting vulnerability
`public/app/features/panel/panel_ctrl.ts` in Grafana before 6.2.5 allows HTML Injection in panel drilldown links (via the Title or url field).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.2.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-13068'}, {'type': 'WEB', 'url': 'https://github.com/grafana/grafana/issues/17718'}, {'type': 'PACKAGE', 'url': 'https://github.com/grafana/grafana'}, {'type': 'WEB', 'url': 'https://github.com/grafana/grafana/releases/tag/v6.2.5'}, {'type': 'WEB', ...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-27T22:13:46Z', 'nvd_published_at': '2019-06-30T00:15:00Z'}
1.4.0
GHSA-j76q-99x2-v7vq
2023-07-31T19:33:06Z
2022-05-17T02:51:56Z
null
['CVE-2016-6807']
Apache Ambari Improper Access Control
Custom commands may be executed on Ambari Agent (2.4.x, before 2.4.2) hosts without authorization, leading to unauthorized access to operations that may affect the underlying system. Such operations are invoked by the Ambari Agent process on Ambari Agent hosts, as the user executing the Ambari Agent process.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ambari:ambari'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.4.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6807'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/AMBARI/Ambari+Vulnerabilities#AmbariVulnerabilities-FixedinAmbari2.4.2'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/97184'}]
{'cwe_ids': ['CWE-284'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T19:33:06Z', 'nvd_published_at': '2017-03-28T20:59:00Z'}
1.4.0
GHSA-jwpw-ppj5-7h4w
2023-08-01T00:13:51Z
2022-05-13T01:26:10Z
null
['CVE-2015-3646']
OpenStack Keystone Logs Passwords
OpenStack Identity (Keystone) before 2014.1.5 and 2014.2.x before 2014.2.4 logs the backend_argument configuration option content, which allows remote authenticated users to obtain passwords and other sensitive backend information by reading the Keystone logs.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'keystone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2014.1.5'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'keystone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2014.2'}, {'fixed': '2014.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3646'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/keystone/+bug/1443598'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210122154200/http://www.securityfocus.com/bid/74456'}, {'type': 'WEB', 'url': 'http://lists.openstack.org/pipe...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T00:13:51Z', 'nvd_published_at': '2015-05-12T19:59:00Z'}
1.4.0
GHSA-w4xh-w33p-4v29
2023-02-08T00:28:40Z
2022-05-14T00:55:16Z
null
['CVE-2017-17831']
GitHub Git LFS Improper Input Validation vulnerability
GitHub Git LFS before 2.1.1 allows remote attackers to execute arbitrary commands via an ssh URL with an initial dash character in the hostname, located on a `url =` line in a `.lfsconfig` file within a repository.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/git-lfs/git-lfs/lfsapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1-0.20170519163204-f913f5f9c7c6'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/git-lfs/git-lfs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'intro...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-17831'}, {'type': 'WEB', 'url': 'https://github.com/git-lfs/git-lfs/pull/2241'}, {'type': 'WEB', 'url': 'https://github.com/git-lfs/git-lfs/pull/2242'}, {'type': 'WEB', 'url': 'https://github.com/git-lfs/git-lfs/commit/f913f5f9c7c6d1301785fdf9884a2...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T00:28:40Z', 'nvd_published_at': '2017-12-21T06:29:00Z'}
1.4.0
GHSA-9fc7-rhq3-wm7x
2023-07-31T22:54:02Z
2022-05-17T03:48:02Z
null
['CVE-2016-6801']
Apache Jackrabbit Authentication Hijacking Vulnerability
Cross-site request forgery (CSRF) vulnerability in the CSRF content-type check in Jackrabbit-Webdav in Apache Jackrabbit 2.4.x before 2.4.6, 2.6.x before 2.6.6, 2.8.x before 2.8.3, 2.10.x before 2.10.4, 2.12.x before 2.12.4, and 2.13.x before 2.13.3 allows remote attackers to hijack the authentication of unspecified vi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.jackrabbit:jackrabbit-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4'}, {'fixed': '2.4.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.jackrabbit:jackrabbit-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduc...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6801'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/JCR-4009'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210123170657/http://www.securityfocus.com/bid/92966'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/20...
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T22:54:02Z', 'nvd_published_at': '2016-09-21T14:25:00Z'}
1.4.0
GHSA-wv9c-pfpm-4wc5
2023-08-25T21:36:48Z
2022-05-24T16:52:01Z
null
['CVE-2019-10186']
Moodle CSRF Vulnerability
A flaw was found in moodle before versions 3.7.1, 3.6.5, 3.5.7. A sesskey (CSRF) token was not being utilised by the XML loading/unloading admin tool.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.7.0'}, {'fixed': '3.7.1'}]}], 'versions': ['3.7.0']}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific':...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10186'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/ea1ac3c7efbddbdb210ea4c75e7156c7d7ee914b'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10186'}, {'type': 'PACKAGE', 'url': 'https://github.co...
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-14T21:31:48Z', 'nvd_published_at': '2019-07-31T22:15:00Z'}
1.4.0
GHSA-jmw7-ph6p-33cc
2022-11-02T00:40:17Z
2022-05-14T03:58:15Z
null
['CVE-2016-0791']
Exposure of Sensitive Information in Jenkins Core
Jenkins before 1.650 and LTS before 1.642.2 do not use a constant-time algorithm to verify CSRF tokens, which makes it easier for remote attackers to bypass a CSRF protection mechanism via a brute-force approach.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.650'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-0791'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:0711'}, {'type': 'WEB', 'url': 'https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-02-24'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHS...
{'cwe_ids': ['CWE-200'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-02T00:40:17Z', 'nvd_published_at': '2016-04-07T23:59:00Z'}
1.4.0
GHSA-298q-wv2h-v5vw
2023-09-26T19:16:37Z
2022-05-24T17:00:27Z
null
['CVE-2019-8142']
Magento 2 Community Edition XSS Vulnerability
A stored cross-site scripting (XSS) vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated user can inject arbitrary JavaScript code via title of an order when configuring sales payment methods for a store.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8142'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051105/https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T23:41:51Z', 'nvd_published_at': '2019-11-06T00:15:00Z'}
1.4.0
GHSA-j8qv-mj4r-6fw4
2022-06-28T23:27:28Z
2022-05-13T01:01:00Z
null
['CVE-2018-1999001']
Improper Input Validation in Jenkins
A unauthorized modification of configuration vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in User.java that allows attackers to provide crafted login credentials that cause Jenkins to move the config.xml file from the Jenkins home directory. If Jenkins is started without this file present, it ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.121.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.122'},...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1999001'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-07-18/#SECURITY-897'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T23:27:28Z', 'nvd_published_at': '2018-07-23T19:29:00Z'}
1.4.0
GHSA-wmvq-q9h8-7j4g
2023-07-21T21:38:41Z
2022-05-13T01:34:55Z
null
['CVE-2018-10889']
Moodle sensitive information disclosure
A flaw was found in moodle before versions 3.5.1, 3.4.4, 3.3.7. No option existed to omit logs from data privacy exports, which may contain details of other users who interacted with the requester.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5'}, {'fixed': '3.5.1'}]}], 'versions': ['3.5']}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.4.3'}, {'fixed'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-10889'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/720d5b3b8559a97b7d6dd77351fb8d1cd8890f14'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10889'}, {'type': 'WEB', 'url': 'https://moodle.org/mo...
{'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T21:38:41Z', 'nvd_published_at': '2018-07-10T18:29:00Z'}
1.4.0
GHSA-g8q3-rcf9-qx4q
2023-08-01T23:31:06Z
2022-05-24T22:00:06Z
null
['CVE-2019-1024']
ChakraCore RCE Vulnerability
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0989, CVE-2019-0991, CVE-2019-0992, CVE-2019-0993, CVE-2019-1002, CVE-2019-1003, CVE-20...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1024'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/06a1438bd30957b3e0d8f19c7f65b1aadc5f5ef2'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee'}, {'type...
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T23:31:06Z', 'nvd_published_at': '2019-06-12T14:29:00Z'}
1.4.0
GHSA-wp35-6jqv-r33m
2023-07-28T18:41:18Z
2022-05-14T01:53:10Z
null
['CVE-2016-5002']
Apache XML-RPC XXE Vulnerability
XML external entity (XXE) vulnerability in the Apache XML-RPC (aka ws-xmlrpc) library 3.1.3, as used in Apache Archiva, allows remote attackers to conduct server-side request forgery (SSRF) attacks via a crafted DTD.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.xmlrpc:xmlrpc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-5002'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:3768'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/115042'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210123151805/http://www....
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T18:41:18Z', 'nvd_published_at': '2017-10-27T18:29:00Z'}
1.4.0
GHSA-mfr9-pcm3-6mwc
2023-08-01T23:31:56Z
2022-05-24T16:47:19Z
null
['CVE-2019-12616']
phpMyAdmin CSRF Vulnerability
An issue was discovered in phpMyAdmin before 4.9.0. A vulnerability was found that allows an attacker to trigger a CSRF attack against a phpMyAdmin user. The attacker can trick the user, for instance through a broken `<img>` tag pointing at the victim's phpMyAdmin database, and the attacker can potentially deliver a pa...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.9.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12616'}, {'type': 'WEB', 'url': 'https://github.com/phpmyadmin/phpmyadmin/commit/015c404038c44279d95b6430ee5a0dddc97691ec'}, {'type': 'WEB', 'url': 'https://packetstormsecurity.com/files/153251/phpMyAdmin-4.8-Cross-Site-Request-Forgery.html'}, {'ty...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T23:31:56Z', 'nvd_published_at': '2019-06-05T05:29:00Z'}
1.4.0
GHSA-x9gc-p2qp-4p7v
2022-11-01T22:48:53Z
2022-05-24T17:03:47Z
null
['CVE-2019-16554']
Missing permission check in Jenkins Build Failure Analyzer Plugin
A missing permission check in Jenkins Build Failure Analyzer Plugin 1.24.1 and earlier allows attackers with Overall/Read permission to have Jenkins evaluate a computationally expensive regular expression.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'com.sonyericsson.jenkins.plugins.bfa:build-failure-analyzer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.24.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16554'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1651'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/12/17/1'}]
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T22:48:53Z', 'nvd_published_at': '2019-12-17T15:15:00Z'}
1.4.0
GHSA-j2xf-p274-g8cc
2022-06-02T15:52:33Z
2022-05-18T00:00:45Z
null
['CVE-2022-30110']
Cross-site Scripting in Jirafeau
The file preview functionality in Jirafeau < 4.4.0, which is enabled by default, could be exploited for cross site scripting. An attacker could upload image/svg+xml files containing JavaScript. When someone visits the File Preview URL for this file, the JavaScript inside of this image/svg+xml file will be executed in t...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'mojo42/jirafeau'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30110'}, {'type': 'PACKAGE', 'url': 'https://gitlab.com/mojo42/Jirafeau'}, {'type': 'WEB', 'url': 'https://gitlab.com/mojo42/Jirafeau/-/merge_requests/103'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-02T15:52:33Z', 'nvd_published_at': '2022-05-17T14:15:00Z'}
1.4.0
GHSA-x8xr-rm9r-7mvf
2023-02-08T18:13:27Z
2022-05-14T01:58:45Z
null
['CVE-2015-0259']
OpenStack Compute (Nova) has Insufficient Verification of Data Authenticity
OpenStack Compute (Nova) before 2014.1.4, 2014.2.x before 2014.2.3, and kilo before kilo-3 does not validate the origin of websocket requests, which allows remote attackers to hijack the authentication of users for access to consoles via a crafted webpage.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'nova'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2014.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'nova'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2014.2.0'}, {'fixed': '2014.2.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-0259'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2015:0790'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2015:0843'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2015:0844'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-345'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T18:13:27Z', 'nvd_published_at': '2015-04-01T14:59:00Z'}
1.4.0
GHSA-xj7q-q94c-6wr3
2023-07-27T00:18:01Z
2022-05-17T00:25:34Z
null
['CVE-2017-12628']
Apache James Privilege Escalation
The JMX server embedded in Apache James, also used by the command line client is exposed to a java de-serialization issue, and thus can be used to execute arbitrary commands. As James exposes JMX socket by default only on local-host, this vulnerability can only be used for privilege escalation. Release 3.0.1 upgrades t...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.james:james-project'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12628'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210124113233/http://www.securityfocus.com/bid/101532'}, {'type': 'WEB', 'url': 'https://www.mail-archive.com/server-user@james.apache.org/msg15633.html'}]
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-27T00:18:01Z', 'nvd_published_at': '2017-10-20T15:29:00Z'}
1.4.0
GHSA-w66r-f5gg-gqwm
2022-12-12T21:31:46Z
2022-05-17T00:33:21Z
null
['CVE-2017-1000091']
Jenkins GitHub Branch Source Plugin vulnerable to Cross-Site Request Forgery
GitHub Branch Source Plugin connects to a user-specified GitHub API URL (e.g. GitHub Enterprise) as part of form validation and completion (e.g. to verify Scan Credentials are correct). This functionality improperly checked permissions, allowing any user with Overall/Read access to Jenkins to connect to any web server ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:github-branch-source'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0-alpha-1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000091'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/github-branch-source-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2017-07-10/'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T21:31:46Z', 'nvd_published_at': '2017-10-05T01:29:00Z'}
1.4.0
GHSA-wfw6-mmmp-87xm
2022-07-06T20:29:14Z
2022-05-17T00:28:34Z
null
['CVE-2015-0250']
Improper Input Validation in Apache Batik
XML external entity (XXE) vulnerability in the SVG to (1) PNG and (2) JPG conversion classes in Apache Batik 1.x before 1.8 allows remote attackers to read arbitrary files or cause a denial of service via a crafted SVG file.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.xmlgraphics:batik'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0'}, {'fixed': '1.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-0250'}, {'type': 'WEB', 'url': 'http://advisories.mageia.org/MGASA-2015-0138.html'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/130964/Apache-Batik-XXE-Injection.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-20...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:29:14Z', 'nvd_published_at': '2015-03-24T17:59:00Z'}
1.4.0
GHSA-4fjc-fwj2-7xfg
2023-01-14T05:25:05Z
2022-05-24T17:10:28Z
null
['CVE-2020-2149']
Credentials transmitted in plain text by Repository Connector Plugin
Repository Connector Plugin stores credentials in its global configuration file `org.jvnet.hudson.plugins.repositoryconnector.RepositoryConfiguration.xml` on the Jenkins controller as part of its configuration. While the credentials are stored encrypted on disk, they are transmitted in plain text as part of the config...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:repository-connector'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.2.6'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2149'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/repository-connector-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-03-09/#SECURITY-1520'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secu...
{'cwe_ids': ['CWE-319'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-01-14T05:25:05Z', 'nvd_published_at': '2020-03-09T16:15:00Z'}
1.4.0
GHSA-3cwc-m7c2-qr86
2023-09-28T20:39:16Z
2022-05-14T01:33:54Z
null
['CVE-2019-1000005']
mPDF Unsafe Deserialization
mPDF version 7.1.7 and earlier contains a CWE-502: Deserialization of Untrusted Data vulnerability in getImage() method of Image/ImageProcessor class that can result in Arbitry code execution, file write, etc.. This attack appears to be exploitable via attacker must host crafted image on victim server and trigger gener...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'mpdf/mpdf'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.1.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.1.7'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1000005'}, {'type': 'WEB', 'url': 'https://github.com/mpdf/mpdf/issues/949'}, {'type': 'PACKAGE', 'url': 'https://github.com/mpdf/mpdf'}]
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T21:15:29Z', 'nvd_published_at': '2019-02-04T21:29:00Z'}
1.4.0
GHSA-wmq2-jc9m-xp4m
2022-11-17T20:58:58Z
2022-05-02T06:21:36Z
null
['CVE-2010-1330']
Cross-site Scripting in in JRuby
The regular expression engine in JRuby before 1.4.1, when $KCODE is set to 'u', does not properly handle characters immediately after a UTF-8 character, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted string.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jruby:jruby-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-1330'}, {'type': 'WEB', 'url': 'https://bugs.gentoo.org/show_bug.cgi?id=317435'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=750306'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/80277'}, {'...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T22:47:20Z', 'nvd_published_at': '2012-11-23T19:55:00Z'}
1.4.0
GHSA-3fvw-g6mr-w247
2023-07-20T23:15:29Z
2022-05-13T01:20:39Z
null
['CVE-2018-8130']
ChakraCore RCE Vulnerability
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-0943, CVE-2018-8133, CVE-2018-8145, CVE-2018-8...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8130'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/bee1e247bf6acbc8c862c7fc1d597ce9cab7446e'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8130'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T23:15:29Z', 'nvd_published_at': '2018-05-09T19:29:00Z'}
1.4.0
GHSA-fg2q-v428-2gph
2022-11-22T19:37:26Z
2022-05-24T16:44:08Z
null
['CVE-2019-10248']
Eclipse Vorto resolved Maven build artifacts for the Xtext project over HTTP instead of HTTPS
Eclipse Vorto versions prior to 0.11 resolved Maven build artifacts for the Xtext project over HTTP instead of HTTPS. Any of these dependent artifacts could have been maliciously compromised by a MITM attack. Hence produced build artifacts of Vorto might be infected.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.vorto:org.eclipse.vorto.core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10248'}, {'type': 'WEB', 'url': 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=546622'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse/vorto'}]
{'cwe_ids': ['CWE-494', 'CWE-669', 'CWE-829'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T19:37:26Z', 'nvd_published_at': '2019-04-22T21:29:00Z'}
1.4.0
GHSA-qc2p-q7x9-v64p
2022-07-01T17:33:35Z
2022-05-13T01:09:21Z
null
['CVE-2017-3156']
Covert Timing Channel in Apache CXF
The OAuth2 Hawk and JOSE MAC Validation code in Apache CXF prior to 3.0.13 and 3.1.x prior to 3.1.10 is not using a constant time MAC signature comparison algorithm which may be exploited by sophisticated timing attacks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf.karaf:apache-cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.13'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.12'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf.karaf:apache-cxf'}...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-3156'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1832'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB'...
{'cwe_ids': ['CWE-385'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T17:33:35Z', 'nvd_published_at': '2017-08-10T18:29:00Z'}
1.4.0
GHSA-7c3v-vc3x-x789
2023-03-06T20:53:23Z
2022-05-24T16:52:44Z
null
['CVE-2019-10367']
Insertion of Sensitive Information into Log File in Jenkins Configuration as Code Plugin
Configuration as Code Plugin logs the changes it applies to the Jenkins system log. Secrets such as passwords should be masked (i.e. replaced with asterisks) in that log to prevent accidental disclosure. Configuration as Code Plugin inspects the type and looks for a field, getter, or constructor argument corresponding ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins:configuration-as-code'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.27'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.26'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10367'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-08-07/#SECURITY-1497'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2019-07-31/#SECURITY-1279'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/o...
{'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T22:36:48Z', 'nvd_published_at': '2019-08-07T15:15:00Z'}
1.4.0
GHSA-hwq7-cvp8-6hm3
2023-08-03T21:30:11Z
2022-05-17T00:47:44Z
null
['CVE-2015-3880']
phpBB Open Redirect
Open redirect vulnerability in phpBB before 3.0.14 and 3.1.x before 3.1.4 allows remote attackers to redirect users of Google Chrome to arbitrary web sites and conduct phishing attacks via unspecified vectors.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpbb/phpbb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.14'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'phpbb/phpbb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3880'}, {'type': 'WEB', 'url': 'https://github.com/phpbb/phpbb/commit/1a3350619f428d9d69d196c52128727e27ef2f04'}, {'type': 'WEB', 'url': 'https://github.com/phpbb/phpbb/commit/c1702b8e19a69c98ef049abb4e14157e3e208ed4'}, {'type': 'PACKAGE', 'url': '...
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T21:30:11Z', 'nvd_published_at': '2017-09-19T15:29:00Z'}
1.4.0
GHSA-64jr-ggw8-h9jc
2023-01-14T05:28:50Z
2022-05-24T17:08:47Z
null
['CVE-2020-2125']
Credentials stored in plain text by debian-package-builder Plugin
debian-package-builder Plugin 1.6.11 and earlier stores a GPG passphrase unencrypted in its global configuration file `ru.yandex.jenkins.plugins.debuilder.DebianPackageBuilder.xml` on the Jenkins controller. This credential can be viewed by users with access to the Jenkins controller file system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'ru.yandex.jenkins.plugins.debuilder:debian-package-builder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.6.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2125'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/debian-package-builder-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-02-12/#SECURITY-1558'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-se...
{'cwe_ids': ['CWE-256'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-01-14T05:28:50Z', 'nvd_published_at': '2020-02-12T15:15:00Z'}
1.4.0
GHSA-hfjr-m75m-wmh7
2022-12-06T21:43:39Z
2022-05-24T16:59:38Z
null
['CVE-2019-10476']
Jenkins Zulip Plugin vulnerable to Insufficiently Protected Credentials
Jenkins Zulip Plugin prior to 1.1.1 stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:zulip'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10476'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/zulip-plugin/commit/2a9dd6c41c2d913b0414d015b3118e3ddb60bd90'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/zulip-plugin'}, {'type': 'WEB', 'url': 'https://github.com/jenkin...
{'cwe_ids': ['CWE-522'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T21:43:39Z', 'nvd_published_at': '2019-10-23T13:15:00Z'}
1.4.0
GHSA-3mcp-6rv6-c69g
2023-07-07T15:46:56Z
2022-05-14T03:06:07Z
null
['CVE-2018-0571']
baserCMS arbitrary file upload vulnerability
baserCMS (baserCMS 4.1.0.1 and earlier versions, baserCMS 3.0.15 and earlier versions) allows remote attackers with a site operator privilege to upload arbitrary files.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'baserproject/basercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0.1'}}, {'package': {'ecosystem': 'Packagist', 'name': 'baserproject/basercms'}, 'range...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-0571'}, {'type': 'WEB', 'url': 'https://basercms.net/security/JVN67881316'}, {'type': 'PACKAGE', 'url': 'https://github.com/baserproject/basercms'}, {'type': 'WEB', 'url': 'http://jvn.jp/en/jp/JVN67881316/index.html'}]
{'cwe_ids': ['CWE-434'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T15:46:56Z', 'nvd_published_at': '2018-06-26T14:29:00Z'}
1.4.0
GHSA-cwmx-hcrq-mhc3
2022-06-20T22:02:17Z
2022-05-25T18:09:55Z
null
['CVE-2022-29248']
Cross-domain cookie leakage in Guzzle
### Impact Previous version of Guzzle contain a vulnerability with the cookie middleware. The vulnerability is that it is not checked if the cookie domain equals the domain of the server which sets the cookie via the `Set-Cookie` header, allowing a malicious server to set cookies for unrelated domains. For example an ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'guzzlehttp/guzzle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.5.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'guzzlehttp/guzzle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.4.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/guzzle/guzzle/security/advisories/GHSA-cwmx-hcrq-mhc3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29248'}, {'type': 'WEB', 'url': 'https://github.com/guzzle/guzzle/pull/3018'}, {'type': 'WEB', 'url': 'https://github.com/guzzle/guzzle/commit/74a86...
{'cwe_ids': ['CWE-200', 'CWE-565'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T18:09:55Z', 'nvd_published_at': '2022-05-25T18:15:00Z'}
1.4.0
GHSA-9ggm-7897-x4mg
2022-07-13T17:31:39Z
2022-05-14T01:17:03Z
null
['CVE-2011-2526']
Improper Input Validation in Apache Tomcat
Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.19, when sendfile is enabled for the HTTP APR or HTTP NIO connector, does not validate certain request attributes, which allows local users to bypass intended file access restrictions or cause a denial of service (infinite loop or JVM crash) by le...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.5.34'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.3...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-2526'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=720948'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/68541'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/06cfb634bc7bf37...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T17:31:39Z', 'nvd_published_at': '2011-07-14T23:55:00Z'}
1.4.0
GHSA-q7hx-mrv5-6mrp
2023-07-13T17:08:04Z
2022-05-24T17:05:42Z
null
['CVE-2020-5840']
HashBrown CMS Directory Traversal
An issue was discovered in HashBrown CMS before 1.3.2. `Server/Entity/Resource/Connection.js` allows an attacker to reach a parent directory via a crafted name or ID field.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'hashbrown-cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5840'}, {'type': 'WEB', 'url': 'https://github.com/HashBrownCMS/hashbrown-cms/commit/6b37b73944447bb29c6aaeb086b04196d80c692a'}, {'type': 'PACKAGE', 'url': 'https://github.com/HashBrownCMS/hashbrown-cms'}, {'type': 'WEB', 'url': 'https://github.com...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T17:08:04Z', 'nvd_published_at': '2020-01-06T18:15:00Z'}
1.4.0
GHSA-w227-xcfx-3pj8
2022-06-17T00:37:06Z
2022-05-02T03:16:43Z
null
['CVE-2009-0580']
Exposure of Sensitive Information in Apache Tomcat
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSource...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.1.40'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-0580'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/50930'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f1180...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:37:06Z', 'nvd_published_at': '2009-06-05T16:00:00Z'}
1.4.0
GHSA-hx9q-2mx4-m4pg
2022-05-24T22:12:26Z
2022-05-24T22:12:26Z
null
['CVE-2022-29204']
Missing validation causes denial of service via `Conv3DBackpropFilterV2`
### Impact The implementation of [`tf.raw_ops.UnsortedSegmentJoin`](https://github.com/tensorflow/tensorflow/blob/f3b9bf4c3c0597563b289c0512e98d4ce81f886e/tensorflow/core/kernels/unsorted_segment_join_op.cc#L83-L148) does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to tri...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hx9q-2mx4-m4pg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29204'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/20cb18724b0bf6c09071a3f53434c4eec53cc147'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-191', 'CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:12:26Z', 'nvd_published_at': '2022-05-20T23:15:00Z'}
1.4.0
GHSA-9h9f-9q8g-6764
2023-07-17T23:01:54Z
2022-05-24T16:55:43Z
null
['CVE-2019-16146']
Gophish XSS Vulnerability
Gophish through 0.8.0 allows XSS via a username.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/gophish/gophish'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.0'}]}], 'database_specific': {'last_known_affected_version_range': '< 0.8.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16146'}, {'type': 'WEB', 'url': 'https://github.com/gophish/gophish/pull/1547'}, {'type': 'WEB', 'url': 'https://github.com/gophish/gophish/commit/24fe998a3aa04e205900476a9601d481e94d8eea'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T23:01:54Z', 'nvd_published_at': '2019-09-09T13:15:00Z'}
1.4.0
GHSA-j2h2-cvwh-cr64
2023-07-18T13:40:24Z
2022-05-24T17:21:17Z
null
['CVE-2020-14457']
Mattermost Server Sensitive Data Exposure
An issue was discovered in Mattermost Server before 5.20.0. Non-members can receive broadcasted team details via the `update_team` WebSocket event, aka MMSA-2020-0012.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.20.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14457'}, {'type': 'WEB', 'url': 'https://github.com/mattermost/mattermost/pull/13848'}, {'type': 'PACKAGE', 'url': 'https://github.com/mattermost/mattermost'}, {'type': 'WEB', 'url': 'https://mattermost.com/security-updates/'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T13:40:24Z', 'nvd_published_at': '2020-06-19T14:15:00Z'}
1.4.0
GHSA-98p6-6428-77v7
2023-02-15T22:21:01Z
2022-05-24T16:58:49Z
null
['CVE-2019-10440']
Jenkins NeoLoad Plugin stores credentials in cleartext
Jenkins NeoLoad Plugin prior to version 2.2.6 stores credentials unencrypted in its global configuration file and in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:neoload-jenkins-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10440'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/neoload-plugin/commit/83c8300c8318502b4f4d4c802dd2a10cadfee4c9'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/neoload-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/se...
{'cwe_ids': ['CWE-312'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T21:47:27Z', 'nvd_published_at': '2019-10-16T14:15:00Z'}