schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
8
154
details
stringlengths
31
19.1k
severity
stringlengths
2
92
affected
stringlengths
75
28.5k
references
stringlengths
79
7.48k
database_specific
stringlengths
131
196
1.4.0
GHSA-56p3-rrp4-2j82
2023-08-16T09:33:05Z
2022-05-14T02:54:25Z
null
['CVE-2013-4200']
Plone Open Redirection vulnerability via next parameter
The isURLInPortal method in the URLTool class in in_portal.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 treats URLs starting with a space as a relative URL, which allows remote attackers to bypass the allow_external_login_sites filtering property, redirect users to arbitrary web sites, and...
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'E...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4200'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4200'}, {'type': 'PACKAGE', 'url': 'https://github.com/plone/Plone'}, {'type': 'WEB', 'url': 'http://plone.org/products/plone-hotfix/releases/20130618'}, {'type': ...
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T00:44:30Z', 'nvd_published_at': '2014-01-21T16:06:00Z'}
1.4.0
GHSA-85c5-ccm8-vr96
2023-08-25T21:43:47Z
2022-05-24T16:51:05Z
null
['CVE-2019-14243']
mastercactapus proxyprotocol vulnerable to denial of service
headerv2.go in mastercactapus proxyprotocol before 0.0.2, as used in the mastercactapus caddy-proxyprotocol plugin through 0.0.2 for Caddy, allows remote attackers to cause a denial of service (webserver panic and daemon crash) via a crafted HAProxy PROXY v2 request with truncated source/destination address data.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/mastercactapus/proxyprotocol'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14243'}, {'type': 'WEB', 'url': 'https://github.com/mastercactapus/caddy-proxyprotocol/issues/8'}, {'type': 'WEB', 'url': 'https://github.com/mastercactapus/proxyprotocol/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/mastercactapus/proxypr...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-14T20:53:45Z', 'nvd_published_at': '2019-07-23T22:15:00Z'}
1.4.0
GHSA-5rq3-9wc9-m9c3
2023-09-28T20:23:37Z
2022-05-13T01:21:37Z
null
['CVE-2019-0829']
ChakraCore Memory Corruption Vulnerability
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0806, CVE-2019-0810, CVE-2019-0812, CVE-2019-0860, CVE-2019-0861.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0829'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/6087'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/b03a96112fb05158a040caba88919cd70648f09f'}, {'type': 'PACKAGE', 'url': 'https://github.c...
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T19:01:43Z', 'nvd_published_at': '2019-04-09T21:29:00Z'}
1.4.0
GHSA-65p8-5423-fw3x
2023-09-26T16:57:23Z
2022-05-24T17:00:12Z
null
['CVE-2019-18656']
Pimcore XSS Vulnerability
Pimcore 6prior to 6.3.0 has XSS in the translations grid because `bundles/AdminBundle/Resources/public/js/pimcore/settings/translations.js` mishandles certain HTML elements.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-18656'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/ca036e9f86bb5cdb3dac0930ec131e5f35e26c5f'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T18:38:46Z', 'nvd_published_at': '2019-10-31T17:15:00Z'}
1.4.0
GHSA-6fh3-xhwg-7hfh
2023-01-06T16:56:35Z
2022-05-24T17:10:28Z
null
['CVE-2020-2150']
Jenkins Sonar Quality Gates Plugin transmits credentials in plain text during configuration
Sonar Quality Gates Plugin stores credentials in its global configuration file `org.quality.gates.jenkins.plugin.GlobalConfig.xml` on the Jenkins controller as part of its configuration. While the credentials are stored encrypted on disk, they are transmitted in plain text as part of the configuration form by Sonar Qua...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:sonar-quality-gates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2150'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/sonar-quality-gates-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-03-09/#SECURITY-1523'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secur...
{'cwe_ids': ['CWE-319'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-01-06T16:56:35Z', 'nvd_published_at': '2020-03-09T16:15:00Z'}
1.4.0
GHSA-p9hp-3gpv-52w3
2023-07-28T23:22:04Z
2022-05-14T02:19:45Z
null
['CVE-2016-6233']
Zend Framework Allows SQL Injection
The (1) order and (2) group methods in Zend_Db_Select in the Zend Framework before 1.12.19 might allow remote attackers to conduct SQL injection attacks via vectors related to use of the character pattern `[\w]*` in a regular expression.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'zendframework/zendframework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.19'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6233'}, {'type': 'WEB', 'url': 'https://framework.zend.com/security/advisory/ZF2016-02'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2JUKFTI6ABK7ZN7IEAGPCLAHCFANMID2/'}, {'...
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T23:22:04Z', 'nvd_published_at': '2017-02-17T02:59:00Z'}
1.4.0
GHSA-3c78-m682-8wp9
2023-07-26T23:34:18Z
2022-05-17T00:32:03Z
null
['CVE-2017-11796']
ChakraCore RCE Vulnerability
ChakraCore and Microsoft Edge in Windows 10 1703 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11792, CVE-2017-11793, CVE-2017-11797, ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-11796'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/3917'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/6eba63d1851b4ece1e334ea1e07b3af44ef1e480'}, {'type': 'WEB', 'url': 'https://portal.msrc...
{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T23:34:18Z', 'nvd_published_at': '2017-10-13T13:29:00Z'}
1.4.0
GHSA-h7mf-qrm9-2848
2023-09-11T20:52:36Z
2022-05-01T18:24:47Z
null
['CVE-2007-4556']
OpenSymphony XWork vulnerable to improper input validation
XWork is an command-pattern framework that is used to power WebWork as well as other applications. Struts support in OpenSymphony XWork before 1.2.3, and 2.x before 2.0.4, as used in WebWork and Apache Struts, recursively evaluates all input as an Object-Graph Navigation Language (OGNL) expression when altSyntax is ena...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'opensymphony:xwork'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'opensymphony:xwork'}, 'ecosystem_specific': {'affected_functions': [...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-4556'}, {'type': 'WEB', 'url': 'http://struts.apache.org/2.x/docs/s2-001.html'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-07T23:11:42Z', 'nvd_published_at': '2007-08-28T01:17:00Z'}
1.4.0
GHSA-4v67-wg88-37p9
2022-11-22T18:56:57Z
2022-05-17T02:28:11Z
null
['CVE-2017-7683']
Apache OpenMeetings displays Tomcat version and detailed error stack trace
Apache OpenMeetings 1.0.0 displays Tomcat version and detailed error stack trace, which is not secure. The issue is fixed in version 3.3.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.openmeetings:openmeetings-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '3.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7683'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/openmeetings'}, {'type': 'WEB', 'url': 'http://markmail.org/message/hint6fp66lijqdvu'}]
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T18:56:57Z', 'nvd_published_at': '2017-07-17T13:18:00Z'}
1.4.0
GHSA-92rv-mvmj-47qh
2022-12-12T16:47:40Z
2022-05-14T03:13:13Z
null
['CVE-2018-1000186']
Jenkins GitHub Pull Request Builder Plugin credential capture vulnerability
A exposure of sensitive information vulnerability exists in Jenkins GitHub Pull Request Builder Plugin 1.41.0 and older in GhprbGitHubAuth.java that allows attackers with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing crede...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugin:ghprb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.42.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.41.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000186'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ghprb-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-06-04/#SECURITY-805'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T16:47:40Z', 'nvd_published_at': '2018-06-05T20:29:00Z'}
1.4.0
GHSA-24g8-35x9-fv8r
2022-12-22T13:48:15Z
2022-05-24T17:33:09Z
null
['CVE-2020-2317']
Stored XSS vulnerability in Jenkins FindBugs Plugin
Jenkins FindBugs Plugin 5.0.0 and earlier does not escape the annotation message in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide report files to Jenkins FindBugs Plugin's post build step.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jvnet.hudson.plugins:findbugs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2317'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/findbugs-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-11-04/#SECURITY-1918'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T13:48:15Z', 'nvd_published_at': '2020-11-04T15:15:00Z'}
1.4.0
GHSA-wprr-mc54-c62q
2023-02-14T01:01:02Z
2022-05-17T04:30:15Z
null
['CVE-2012-5508']
Exposure of Sensitive Information in Plone
The error pages in Plone before 4.2.3 and 4.3 before beta 1 allow remote attackers to obtain random numbers and derive the PRNG state for password resets via unspecified vectors. NOTE: this identifier was SPLIT per ADT2 due to different vulnerability types. CVE-2012-6661 was assigned for the PRNG reseeding issue in Zo...
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-5508'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/zope2/+bug/1071067'}, {'type': 'PACKAGE', 'url': 'https://github.com/plone/Plone'}, {'type': 'WEB', 'url': 'https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt'}, {'type'...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T01:01:02Z', 'nvd_published_at': '2014-11-03T22:55:00Z'}
1.4.0
GHSA-mf6x-7766-5cg8
2023-09-25T19:13:33Z
2022-05-24T16:52:28Z
null
['CVE-2019-7936']
Magento 2 Community Edition XSS Vulnerability
A stored cross-site scripting vulnerability exists in the admin panel of Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This could be exploited by an authenticated user with privileges to modify content block titles to inject malicious javascript.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7936'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20211206084839/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-13'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-14T23:06:10Z', 'nvd_published_at': '2019-08-02T22:15:00Z'}
1.4.0
GHSA-2rvf-329f-p99g
2022-06-02T21:05:25Z
2022-05-13T01:02:16Z
null
['CVE-2016-6794']
System Property Disclosure in Apache Tomcat
When a SecurityManager is configured, a web application's ability to read system properties should be controlled by the SecurityManager. In Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70, 6.0.0 to 6.0.45 the system property replacement feature for configuration files could be u...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.47'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6794'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:0455'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:0456'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2247'}, {'type': 'PACKA...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-02T21:05:25Z', 'nvd_published_at': '2017-08-10T16:29:00Z'}
1.4.0
GHSA-ch5v-fhg8-7gv9
2023-09-05T19:14:19Z
2022-05-13T01:49:35Z
null
['CVE-2018-12423']
Matrix Synapse Authorization Error
In Synapse before 0.31.2, unauthorised users can hijack rooms when there is no `m.room.power_levels` event in force.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'matrix-synapse'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.31.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-12423'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-doc/issues/1304'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/901549'}, {'type': 'WEB', 'url': 'https://matrix.org/blog/2018/06/14/security-update-synapse-0-31-2/'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-22T00:05:35Z', 'nvd_published_at': '2018-06-14T21:29:00Z'}
1.4.0
GHSA-f478-xwv9-p93q
2023-08-21T19:55:15Z
2022-05-24T17:18:00Z
2023-08-21T19:55:15Z
[]
Duplicate Advisory: Kerberos for NodeJS allows DLL Injection
## Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-m2mx-rfpw-jghv. This link is maintained to preserve external references. ## Original Description The kerberos package before 1.0.0 for Node.js allows arbitrary code execution and privilege escalation via injection of malicious DLL...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'kerberos'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13110'}, {'type': 'WEB', 'url': 'https://medium.com/@kiddo_Ha3ker/dll-injection-attack-in-kerberos-npm-package-cb4b32031cd'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1514'}]
{'cwe_ids': ['CWE-427'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T00:12:02Z', 'nvd_published_at': '2020-05-16T12:15:00Z'}
1.4.0
GHSA-gg96-8w9x-7rx9
2023-08-01T23:01:21Z
2022-05-24T16:52:27Z
null
['CVE-2019-7921']
Magento 2 Community Edition Cross-site Scripting Vulnerability
A stored cross-site scripting vulnerability exists in the product catalog form of Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This could be exploited by an authenticated user with privileges to the product catalog to inject malicious javascript.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7921'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051916/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-23'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T23:01:21Z', 'nvd_published_at': '2019-08-02T22:15:00Z'}
1.4.0
GHSA-v4w5-p2hg-8fh6
2023-07-31T20:59:18Z
2022-05-17T03:05:04Z
null
['CVE-2016-9015']
Urllib3 Incorrect Certificate Validation
Versions 1.17 and 1.18 of the Python urllib3 library suffer from a vulnerability that can cause them, in certain configurations, to not correctly validate TLS certificates. This places users of the library with those configurations at risk of man-in-the-middle and information leakage attacks. This vulnerability affects...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'urllib3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.17'}, {'last_affected': '1.18'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-9015'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210123184150/http://www.securityfocus.com/bid/93941'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/10/27/6'}]
{'cwe_ids': ['CWE-295'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T20:59:18Z', 'nvd_published_at': '2017-01-11T16:59:00Z'}
1.4.0
GHSA-9pf7-f47q-mwpq
2022-07-05T21:19:07Z
2022-05-24T17:01:50Z
null
['CVE-2019-11291']
Cross-site Scripting in RabbitMQ
Pivotal RabbitMQ, 3.7 versions prior to v3.7.20 and 3.8 version prior to v3.8.1, and RabbitMQ for PCF, 1.16.x versions prior to 1.16.7 and 1.17.x versions prior to 1.17.4, contain two endpoints, federation and shovel, which do not properly sanitize user input. A remote authenticated malicious user with administrative a...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Hex', 'name': 'rabbit_common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.7.0'}, {'fixed': '3.7.20'}]}]}, {'package': {'ecosystem': 'Hex', 'name': 'rabbit_common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.8.0'}, {'fixed': '3.8.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11291'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0553'}, {'type': 'PACKAGE', 'url': 'https://github.com/rabbitmq/rabbitmq-server'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2019-11291'}]
{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T21:19:07Z', 'nvd_published_at': '2019-11-22T23:15:00Z'}
1.4.0
GHSA-vwxv-frj6-fhc9
2023-07-13T19:44:40Z
2022-05-24T17:20:49Z
null
['CVE-2020-7932']
OMERO-web Sensitive Data Exposure
OMERO.web before 5.6.3 optionally allows sensitive data elements (e.g., a session key) to be passed as URL query parameters. If an attacker tricks a user into clicking a malicious link in OMERO.web, the information in the query parameters may be exposed in the Referer header seen by the target. Information in the URL p...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'omero-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7932'}, {'type': 'WEB', 'url': 'https://www.openmicroscopy.org/security/advisories/2019-SV4/'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T19:44:40Z', 'nvd_published_at': '2020-06-17T17:15:00Z'}
1.4.0
GHSA-gp39-h9c2-qw79
2023-09-25T14:47:31Z
2022-05-14T00:56:24Z
null
['CVE-2014-2682']
Several Zend Products Vulnerable to XXE and XEE attacks
Zend Framework 1 (ZF1) before 1.12.4, Zend Framework 2 before 2.1.6 and 2.2.x before 2.2.6, ZendOpenId, ZendRest, ZendService_AudioScrobbler, ZendService_Nirvanix, ZendService_SlideShare, ZendService_Technorati, and ZendService_WindowsAzure before 2.0.2, ZendService_Amazon before 2.0.3, and ZendService_Api before 1.0.0...
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'zendframework/zendframework1'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'zendframework/zendopenid'}, 'ecosystem_specific':...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-2682'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20140419041226/http://www.securityfocus.com/bid/66358'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20150523055201/http://www.mandriva.com/en/support/security/advisories/advisory/...
{'cwe_ids': ['CWE-611', 'CWE-776'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-25T14:47:31Z', 'nvd_published_at': '2014-11-16T00:59:00Z'}
1.4.0
GHSA-xp4g-5xj6-6vpr
2022-11-08T12:41:04Z
2022-05-14T03:53:41Z
null
['CVE-2017-12630']
Apache Drill vulnerable to Cross-site Scripting
In Apache Drill 1.11.0 and earlier, when submitting form from Query page, users are able to pass arbitrary script or HTML which will take effect on Profile page afterwards. Example: after submitting special script that returns cookie information from Query page, malicious user may obtain this information from Profile p...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.drill:drill-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12630'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/drill'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/608658a55d09e16542db41121a0a972c97448214cdc04071fd4db923@%3Cdev.drill.apache.org%3E'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-08T12:41:04Z', 'nvd_published_at': '2017-12-18T14:29:00Z'}
1.4.0
GHSA-78q9-24gv-g288
2023-07-25T18:44:14Z
2022-05-14T01:53:42Z
null
['CVE-2018-18529']
ThinkPHP SQLi Vulnerability
ThinkPHP 3.2.4 has SQL Injection via the count parameter because the `Library/Think/Db/Driver/Mysql.class.php` `parseKey` function mishandles the key variable. NOTE: a backquote character is not required in the attack URI.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'topthink/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-18529'}, {'type': 'WEB', 'url': 'https://www.kingkk.com/2018/10/Thinkphp-%E8%81%9A%E5%90%88%E6%9F%A5%E8%AF%A2%E6%BC%8F%E6%B4%9E/#ThinkPHP3-lt-3-2-4'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T18:44:14Z', 'nvd_published_at': '2018-10-19T20:29:00Z'}
1.4.0
GHSA-h27g-72mh-9m33
2023-02-23T20:32:21Z
2022-05-24T16:56:46Z
null
['CVE-2019-10414']
Jenkins Git Changelog Plugin has Insufficiently Protected Credentials
Git Changelog Plugin stored MediaWiki and Jira passwords unencrypted in job `config.xml` files on the Jenkins controller. These passwords could be viewed by users with Extended Read permission, or access to the Jenkins controller file system. Git Changelog Plugin now stores these passwords encrypted. Existing jobs nee...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'de.wellnerbou.jenkins:git-changelog'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.18'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10414'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/git-changelog-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-09-25/#SECURITY-1574'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2...
{'cwe_ids': ['CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-23T20:32:21Z', 'nvd_published_at': '2019-09-25T16:15:00Z'}
1.4.0
GHSA-8xmx-h8rq-h94j
2023-06-09T23:23:51Z
2022-05-24T17:48:04Z
null
['CVE-2020-25864']
HashiCorp Consul Cross-site Scripting vulnerability
HashiCorp Consul and Consul Enterprise up to version 1.9.4 key-value (KV) raw mode was vulnerable to cross-site scripting. Fixed in 1.9.5, 1.8.10 and 1.7.14.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.9.0'}, {'fixed': '1.9.5'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.0'}, {'fixed': '1....
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25864'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2021-07-consul-api-kv-endpoint-vulnerable-to-cross-site-scripting/23368'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/consul'}, {'type': 'WEB', 'url': 'https://sec...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T23:23:51Z', 'nvd_published_at': '2021-04-20T16:15:00Z'}
1.4.0
GHSA-x72m-p4qc-p7rv
2023-09-26T18:03:09Z
2022-05-24T17:00:24Z
null
['CVE-2019-8109']
Magento 2 Community Edition RCE Vulnerability via CSRF
A remote code execution vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated user can craft a malicious CSRF payload that can result in arbitrary command execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8109'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051105/https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T20:10:43Z', 'nvd_published_at': '2019-11-05T23:15:00Z'}
1.4.0
GHSA-5f6p-4hxq-rjxm
2023-08-03T22:11:00Z
2022-05-17T02:56:23Z
null
['CVE-2015-8814']
Umbraco CMS vulnerable to CSRF
Umbraco before 7.4.0 allows remote attackers to bypass anti-forgery security measures and conduct cross-site request forgery (CSRF) attacks as demonstrated by editing user account information in the `templates.asmx.cs` file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Umbraco.CMS'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8814'}, {'type': 'WEB', 'url': 'https://github.com/umbraco/Umbraco-CMS/commit/18c3345e47663a358a042652e697b988d6a380eb'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20230608152113/https://issues.umbraco.org/issue/U4-7459'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T22:11:00Z', 'nvd_published_at': '2017-03-03T16:59:00Z'}
1.4.0
GHSA-c8qc-cp8v-prpx
2023-07-25T00:06:18Z
2022-05-14T03:02:59Z
null
['CVE-2018-11587']
Centreon RCE Vulnerability
There is Remote Code Execution in Centreon 3.4.6 including Centreon Web 2.8.23 via the RPN value in the Virtual Metric form in centreonGraph.class.php.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['3.4.6']}, {'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introdu...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11587'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon-archived/pull/6263'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon-archived/pull/6263/commits/fb438e6aaf133cc5f9d25130653ba8fdc6ecf51f'}, {'type': 'WEB', 'url': '...
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T00:06:18Z', 'nvd_published_at': '2018-06-25T18:29:00Z'}
1.4.0
GHSA-mj7q-cmf3-mg7h
2022-12-13T14:58:30Z
2022-05-24T17:39:13Z
null
['CVE-2021-21611']
Stored XSS vulnerability in Jenkins on new item page
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not escape display names and IDs of item types shown on the New Item page. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to specify display names or IDs of item types. As of the publication of this advisory, the ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.263.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.263.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21611'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-01-13/#SECURITY-2171'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T06:50:48Z', 'nvd_published_at': '2021-01-13T16:15:00Z'}
1.4.0
GHSA-79r5-rhrw-7pvh
2022-12-15T17:08:05Z
2022-05-24T17:45:47Z
null
['CVE-2021-21634']
Passwords stored in plain text by Jenkins Jabber (XMPP) notifier and control Plugin
Jabber (XMPP) notifier and control Plugin 1.41 and earlier stores passwords unencrypted in its global configuration file `hudson.plugins.jabber.im.transport.JabberPublisher.xml` on the Jenkins controller as part of its configuration. These passwords can be viewed by users with access to the Jenkins controller file sys...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jvnet.hudson.plugins:jabber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.42'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.41'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21634'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jabber-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2162'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021...
{'cwe_ids': ['CWE-522'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T17:08:05Z', 'nvd_published_at': '2021-03-30T12:16:00Z'}
1.4.0
GHSA-8578-mmf4-f327
2023-08-01T22:55:54Z
2022-05-24T16:52:24Z
null
['CVE-2019-7873']
Magento 2 Community Edition Cross-site Scripting Vulnerability
A cross-site request forgery vulnerability exists in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This can result in unintended deletion of the store design schedule.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7873'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121011306/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-33'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T22:55:54Z', 'nvd_published_at': '2019-08-02T22:15:00Z'}
1.4.0
GHSA-r57f-7xw3-q2r9
2022-07-01T22:12:30Z
2022-05-14T03:44:30Z
null
['CVE-2017-1000354']
Improper Authentication in Jenkins
Jenkins versions 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to a login command which allowed impersonating any Jenkins user. The `login` command available in the remoting-based CLI stored the encrypted user name of the successfully authenticated user in a cache file used to authenticate further c...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.50'}, {'fixed': '2.57'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.56'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000354'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenkins/commit/02d24053bdfeb219d2387a19885a60bdab510479'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advis...
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T22:12:30Z', 'nvd_published_at': '2018-01-29T17:29:00Z'}
1.4.0
GHSA-hg6g-jj7g-x6v2
2022-06-28T22:27:27Z
2022-05-24T22:00:43Z
null
['CVE-2019-10401']
Improper Neutralization of Input During Web Page Generation in Jenkins
In Jenkins 2.196 and earlier, LTS 2.176.3 and earlier, the f:expandableTextBox form control interpreted its content as HTML when expanded, resulting in a stored XSS vulnerability exploitable by users with permission to define its contents (typically Job/Configure).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.176.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.176.3'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10401'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-09-25/#SECURITY-1498'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/09/25/3'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T22:27:27Z', 'nvd_published_at': '2019-09-25T16:15:00Z'}
1.4.0
GHSA-4g62-mfwx-4q48
2023-09-28T20:52:15Z
2022-05-13T01:21:42Z
null
['CVE-2019-1000021']
slixmpp Incorrect Access Control
slixmpp version before commit 7cd73b594e8122dddf847953fcfc85ab4d316416 contains an incorrect Access Control vulnerability in XEP-0223 plugin (Persistent Storage of Private Data via PubSub) options profile, used for the configuration of default access model that can result in all of the contacts of the victim can see pr...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'slixmpp'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1000021'}, {'type': 'WEB', 'url': 'https://github.com/poezio/slixmpp/commit/7cd73b594e8122dddf847953fcfc85ab4d316416'}, {'type': 'PACKAGE', 'url': 'https://github.com/poezio/slixmpp'}, {'type': 'WEB', 'url': 'https://lab.louiz.org/poezio/slixmpp/co...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T18:13:30Z', 'nvd_published_at': '2019-02-04T21:29:00Z'}
1.4.0
GHSA-jqx5-h2hw-5q4f
2022-07-13T18:56:25Z
2022-05-04T00:28:50Z
null
['CVE-2012-0213']
Denial of Service in Apache POI
The UnhandledDataStructure function in hwpf/model/UnhandledDataStructure.java in Apache POI 3.8 and earlier allows remote attackers to cause a denial of service (OutOfMemoryError exception and possibly JVM destabilization) via a crafted length value in a Channel Definition Format (CDF) or Compound File Binary Format (C...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.poi:poi'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.10-beta1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.poi:poi-scratchpad'}, 'ecosystem_specific': {'affect...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-0213'}, {'type': 'WEB', 'url': 'https://github.com/apache/poi/commit/25bc679244188d63de690354db0e3f301291e252'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=799078'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/poi...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T18:56:25Z', 'nvd_published_at': '2012-08-07T21:55:00Z'}
1.4.0
GHSA-qv6q-4jwx-7j5c
2022-12-28T22:50:36Z
2022-05-24T17:28:27Z
null
['CVE-2020-2278']
Arbitrary file write vulnerability in Storable Configs Plugin
Jenkins Storable Configs Plugin 1.0 and earlier does not restrict the user-specified file name, allowing attackers with Job/Configure permission to replace any other '.xml' file on the Jenkins controller with a job config.xml file's content.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jvnet.hudson.plugins:storable-configs-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2278'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/storable-configs-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1968%20(2)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/os...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-28T22:50:36Z', 'nvd_published_at': '2020-09-16T14:15:00Z'}
1.4.0
GHSA-237q-6hjp-pchq
2022-11-22T19:04:21Z
2022-05-17T19:57:03Z
null
['CVE-2014-3655']
JBoss KeyCloak is vulnerable to soft token deletion via CSRF
JBoss KeyCloak is vulnerable to soft token deletion via CSRF. This issue is fixed in Keycloak 1.0.2.Final.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-services'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2.Final'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3655'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/pull/703'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/commit/0b8b31a3ea7d8d7ac8b14a020613fc32aa5e9d9d'}, {'type': 'WEB', 'url': 'https://access.redhat.com/secur...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T19:04:21Z', 'nvd_published_at': '2019-11-13T16:15:00Z'}
1.4.0
GHSA-xvv8-8wh9-9fh2
2023-07-21T21:34:55Z
2022-05-13T01:34:55Z
null
['CVE-2018-10894']
Keycloak Authentication Error
It was found that SAML authentication in Keycloak 3.4.3.Final incorrectly authenticated expired certificates. A malicious user could use this to access unauthorized data or possibly conduct further attacks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 3.4.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-10894'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:3592'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:3593'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:3595'}, {'type': 'WEB'...
{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T21:34:55Z', 'nvd_published_at': '2018-08-01T17:29:00Z'}
1.4.0
GHSA-7wwr-p84q-qr3q
2023-08-29T23:29:32Z
2022-05-17T05:23:54Z
null
['CVE-2012-1606']
Typo3 Backend XSS Vulnerabilities
Multiple cross-site scripting (XSS) vulnerabilities in the Backend component in TYPO3 4.4.0 through 4.4.13, 4.5.0 through 4.5.13, 4.6.0 through 4.6.6, 4.7, and 6.0 allow remote authenticated backend users to inject arbitrary web script or HTML via unspecified vectors.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed': '4.4.14'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.4.13'}}, {'package': {'ecosystem': 'Packagist', ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-1606'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20120527123559/http://www.securityfocus.com/bid/52771'}, {'type': 'WEB', 'url': 'http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2012-001/'}, {'type': 'WEB', 'u...
{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T23:29:32Z', 'nvd_published_at': '2012-09-04T20:55:00Z'}
1.4.0
GHSA-8696-836p-c8qp
2022-12-21T16:46:24Z
2022-05-24T17:06:23Z
null
['CVE-2020-2096']
Reflected XSS vulnerability in Jenkins gitlab-hook Plugin
Jenkins Gitlab Hook Plugin 1.4.2 and earlier does not escape project names in the `build_now` endpoint, resulting in a reflected XSS vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.ruby-plugins:gitlab-hook'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2096'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/gitlab-hook-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-01-15/#SECURITY-1683'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/155967/Jen...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T16:46:24Z', 'nvd_published_at': '2020-01-15T16:15:00Z'}
1.4.0
GHSA-jxg5-35fj-ccwf
2023-07-31T21:01:24Z
2022-05-17T03:02:43Z
null
['CVE-2016-5091']
Extbase for TYPO3 allows RCE
Extbase in TYPO3 4.3.0 before 6.2.24, 7.x before 7.6.8, and 8.1.1 allows remote attackers to obtain sensitive information or possibly execute arbitrary code via a crafted Extbase action.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-extbase'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.2.24'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-extbase'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0'}, {'fixed': '7.6.8'}]}]}, ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-5091'}, {'type': 'WEB', 'url': 'https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2016-013/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/05/25/4'}, {'type': 'WEB', 'url': 'http://www.openwall...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T21:01:24Z', 'nvd_published_at': '2017-01-23T21:59:00Z'}
1.4.0
GHSA-9cwg-mhxf-hh59
2023-08-17T23:09:26Z
2022-05-17T00:23:23Z
null
['CVE-2013-6044']
Django Cross-site scripting (XSS) vulnerability via is_safe_url function
The is_safe_url function in utils/http.py in Django 1.4.x before 1.4.6, 1.5.x before 1.5.2, and 1.6 before beta 2 treats a URL's scheme as safe even if it is not HTTP or HTTPS, which might introduce cross-site scripting (XSS) or other vulnerabilities into Django applications that use this function, as demonstrated by "...
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.6'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-6044'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/1a274ccd6bc1afbdac80344c9b6e5810c1162b5f'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/ae3535169af804352517b7fea94a42a1c9c4b762'}, {'type': 'WEB', 'url': '...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-17T23:09:26Z', 'nvd_published_at': '2013-10-04T17:55:00Z'}
1.4.0
GHSA-j24g-gm76-j829
2023-08-04T21:55:01Z
2022-05-17T02:54:32Z
null
['CVE-2017-5537']
Weblate user account enumeration via reset password form
The password reset form in Weblate before 2.10.1 provides different error messages depending on whether the email address is associated with an account, which allows remote attackers to enumerate user accounts via a series of requests.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'weblate'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-5537'}, {'type': 'WEB', 'url': 'https://github.com/WeblateOrg/weblate/issues/1317'}, {'type': 'WEB', 'url': 'https://github.com/WeblateOrg/weblate/commit/abe0d2a29a1d8e896bfe829c8461bf8b391f1079'}, {'type': 'PACKAGE', 'url': 'https://github.com/Web...
{'cwe_ids': ['CWE-200', 'CWE-209'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-04T21:55:01Z', 'nvd_published_at': '2017-03-15T15:59:00Z'}
1.4.0
GHSA-rf92-3vjr-w628
2023-05-23T21:27:26Z
2022-05-24T17:33:07Z
null
['CVE-2020-2299']
Improper Authentication in Jenkins Active Directory Plugin
Jenkins Active Directory Plugin implements two separate modes: Integration with ADSI on Windows, and an OS agnostic LDAP-based mode. The LDAP-based mode in Active Directory Plugin starting in version 1.44 and prior to versions 2.16.1 and 2.20 shares code between user lookup and user authentication and distinguishes th...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:active-directory'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.17'}, {'fixed': '2.20'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:active-directory'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduc...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2299'}, {'type': 'WEB', 'url': 'https://github.com/CVEProject/cvelist/blob/16860a328d970faa6e4350b0fa446f64a52e52ca/2020/2xxx/CVE-2020-2299.json'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/active-directory-plugin'}, {'type': 'WEB', ...
{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-07T23:54:16Z', 'nvd_published_at': '2020-11-04T15:15:00Z'}
1.4.0
GHSA-84h6-jf8x-ff2j
2022-12-06T21:38:55Z
2022-05-24T16:59:37Z
null
['CVE-2019-10460']
Jenkins Bitbucket OAuth Plugin contains Insufficiently Protected Credentials
Jenkins Bitbucket OAuth Plugin prior to 0.10 stores credentials unencrypted in the global config.xml configuration file on the Jenkins master where they could be viewed by users with access to the master file system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:bitbucket-oauth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10460'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/bitbucket-oauth-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1546'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security...
{'cwe_ids': ['CWE-522'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T21:38:55Z', 'nvd_published_at': '2019-10-23T13:15:00Z'}
1.4.0
GHSA-m9j2-grqf-fg26
2022-12-12T21:26:03Z
2022-05-14T03:23:45Z
null
['CVE-2018-1000150']
Jenkins Reverse Proxy Auth Plugin allows attackers with local file system access to obtain a list of authorities for logged in users
An exposure of sensitive information vulnerability exists in Jenkins Reverse Proxy Auth Plugin 1.5 and older in ReverseProxySecurityRealm#authContext that allows attackers with local file system access to obtain a list of authorities for logged in users. Reverse Proxy Auth Plugin 1.6.0 and newer no longer store the cac...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:reverse-proxy-auth-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.5'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000150'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/reverse-proxy-auth-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-03-26/#SECURITY-736'}]
{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T21:26:03Z', 'nvd_published_at': '2018-04-05T13:29:00Z'}
1.4.0
GHSA-33fq-qm4m-cjw3
2023-07-06T22:02:52Z
2022-05-13T01:48:18Z
null
['CVE-2018-0573']
baserCMS Access Control Bypass
baserCMS (baserCMS 4.1.0.1 and earlier versions, baserCMS 3.0.15 and earlier versions) allows remote attackers to bypass access restriction for a content to view a file which is uploaded by a site user via unspecified vectors.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'baserproject/basercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.16'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.15'}}, {'package': {'ecosystem': 'Packagist', 'name': 'baserproject/basercms'}, 'ranges': ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-0573'}, {'type': 'WEB', 'url': 'https://basercms.net/security/JVN67881316'}, {'type': 'WEB', 'url': 'http://jvn.jp/en/jp/JVN67881316/index.html'}]
{'cwe_ids': ['CWE-269'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T22:02:52Z', 'nvd_published_at': '2018-06-26T14:29:00Z'}
1.4.0
GHSA-4c72-mrhf-23cg
2023-08-15T22:11:49Z
2022-05-14T02:52:41Z
null
['CVE-2014-3503']
Apache Syncope uses a weak PNRG
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.syncope:syncope'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3503'}, {'type': 'WEB', 'url': 'https://github.com/apache/syncope/commit/8e0045925a387ee211832c7e0709dd418cda1ad3'}, {'type': 'WEB', 'url': 'https://syncope.apache.org/security.html#cve-2014-3503-insecure-random-implementations-used-to-generate-p'}...
{'cwe_ids': ['CWE-338'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-15T22:11:49Z', 'nvd_published_at': '2014-07-11T14:55:00Z'}
1.4.0
GHSA-h48f-q7rw-hvr7
2022-05-24T22:07:24Z
2022-05-24T22:07:24Z
null
['CVE-2022-29195']
Missing validation causes denial of service via `StagePeek`
### Impact The implementation of [`tf.raw_ops.StagePeek`](https://github.com/tensorflow/tensorflow/blob/f3b9bf4c3c0597563b289c0512e98d4ce81f886e/tensorflow/core/kernels/stage_op.cc#L261) does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attac...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h48f-q7rw-hvr7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29195'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/cebe3c45d76357d201c65bdbbf0dbe6e8a63bbdb'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:07:24Z', 'nvd_published_at': '2022-05-20T22:16:00Z'}
1.4.0
GHSA-3jrj-x6cj-97cp
2023-07-11T18:35:18Z
2022-05-24T19:21:11Z
null
['CVE-2021-43559']
Moodle contains CSRF vulnerability
A flaw was found in Moodle in versions 3.11 to 3.11.3, 3.10 to 3.10.7, 3.9 to 3.9.10 and earlier unsupported versions. The "delete related badge" functionality did not include the necessary token check to prevent a CSRF risk.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11'}, {'fixed': '3.11.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.11.3'}}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'EC...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43559'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/20d41ebae4eb28269298504c68db511a05ec4969'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2021517'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum...
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-11T18:35:18Z', 'nvd_published_at': '2021-11-22T16:15:00Z'}
1.4.0
GHSA-7j66-wvhr-m83x
2022-12-02T20:14:17Z
2022-05-18T00:00:41Z
null
['CVE-2022-30965']
Stored Cross-site Scripting vulnerabilities in Jenkins promoted Builds (Simple) plugin providing additional parameter types
Jenkins Promoted Builds (Simple) Plugin 1.9 and earlier does not escape the name and description of Promotion Level parameters on views displaying parameters. This results in stored cross-site scripting (XSS) vulnerabilities exploitable by attackers with Item/Configure permission. Exploitation of this vulnerability re...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:promoted-builds-simple'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30965'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2717'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T20:14:17Z', 'nvd_published_at': '2022-05-17T15:15:00Z'}
1.4.0
GHSA-5h5m-fj48-qpjw
2023-07-26T20:03:27Z
2022-05-14T01:19:05Z
null
['CVE-2017-1000013']
phpMyAdmin Open Redirect
phpMyAdmin 4.0, 4.4, and 4.6 are vulnerable to an open redirect weakness
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.6'}, {'fixed': '4.6.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ecosystem_specific': {'affect...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000013'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210123220100/http://www.securityfocus.com/bid/95720'}, {'type': 'WEB', 'url': 'https://www.phpmyadmin.net/security/PMASA-2017-1'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T20:03:27Z', 'nvd_published_at': '2017-07-17T13:18:00Z'}
1.4.0
GHSA-jxp3-mmw7-8285
2023-09-25T18:54:43Z
2022-05-24T16:52:26Z
null
['CVE-2019-7897']
Magento 2 Community Edition XSS Vulnerability
A stored cross-site scripting vulnerability exists in the admin panel of Magento Open Source prior to 1.9.4.2, and Magento Commerce prior to 1.14.4.2, Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This could be exploited by an authenticated user with privileges to customer configu...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7897'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20211206084839/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-13'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T20:32:55Z', 'nvd_published_at': '2019-08-02T22:15:00Z'}
1.4.0
GHSA-vjxc-frw4-jmh5
2022-11-07T22:04:19Z
2022-05-24T17:07:10Z
null
['CVE-2019-14888']
Undertow vulnerable to Uncontrolled Resource Consumption
A vulnerability was found in the Undertow HTTP server in versions before 2.0.29 when listening on HTTPS. An attacker can target the HTTPS port to carry out a Denial Of Service (DOS) to make the service unavailable on SSL.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.29.Final'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14888'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0729'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14888'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220211-000...
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-07T22:04:19Z', 'nvd_published_at': '2020-01-23T17:15:00Z'}
1.4.0
GHSA-42gv-77f4-r3j9
2023-07-25T18:22:03Z
2022-05-14T01:39:47Z
null
['CVE-2018-20713']
Shopware SQL Injection
Shopware before 5.4.3 allows SQL Injection by remote authenticated users, aka SW-21404.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/shopware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.4.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20713'}, {'type': 'WEB', 'url': 'https://github.com/shopware5/shopware/commit/73cb46727050e28a0d7c2cf8471baaa3eaf2e5e8'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-05-2018'}]
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T18:22:03Z', 'nvd_published_at': '2019-01-15T16:29:00Z'}
1.4.0
GHSA-wr69-g62g-2r9h
2022-07-06T20:23:16Z
2022-05-13T01:14:26Z
null
['CVE-2015-1832']
Improper Restriction of XML External Entity Reference in Apace Derby
XML external entity (XXE) vulnerability in the SqlXmlUtil code in Apache Derby before 10.12.1.1, when a Java Security Manager is not in place, allows context-dependent attackers to read arbitrary files or cause a denial of service (resource consumption) via vectors involving XmlVTI and the XML datatype.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.derby:derby'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.12.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.11.1.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-1832'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/DERBY-6807'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', ...
{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:23:16Z', 'nvd_published_at': '2016-10-03T21:59:00Z'}
1.4.0
GHSA-hfhr-xxxq-vg7g
2023-07-21T19:15:30Z
2022-05-13T01:20:58Z
null
['CVE-2018-8542']
ChakraCore RCE Vulnerability
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8541, CVE-2018-8543, CVE-2018-8551, CVE-2018-8...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8542'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/5827'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/334471b7254c1c093deb413bac0472974e6f9181'}, {'type': 'WEB', 'url': 'https://portal.msrc....
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T19:15:30Z', 'nvd_published_at': '2018-11-14T01:29:00Z'}
1.4.0
GHSA-wjwr-3jch-479j
2023-09-22T21:05:26Z
2022-05-01T18:13:14Z
null
['CVE-2007-3383']
Apache Tomcat SendMailServlet XSS
Cross-site scripting (XSS) vulnerability in SendMailServlet in the examples web application (`examples/jsp/mail/sendmail.jsp`) in Apache Tomcat 4.0.0 through 4.0.6 and 4.1.0 through 4.1.36 allows remote attackers to inject arbitrary web script or HTML via the From field and possibly other fields, related to generation ...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'last_affected': '4.0.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-3383'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/35536'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@%3Cdev.tomcat.apache.org%3E'}, {'typ...
{'cwe_ids': ['CWE-80'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-22T21:05:26Z', 'nvd_published_at': '2007-07-25T17:30:00Z'}
1.4.0
GHSA-v8q2-94f6-6xq2
2022-07-08T18:53:08Z
2022-05-13T01:09:23Z
null
['CVE-2010-2076']
Improper Input Validation in Apache CXF
Apache CXF 2.0.x before 2.0.13, 2.1.x before 2.1.10, and 2.2.x before 2.2.9, as used in Apache ServiceMix, Apache Camel, Apache Chemistry, Apache jUDDI, Apache Geronimo, and other products, does not properly reject DTDs in SOAP messages, which allows remote attackers to read arbitrary files, send HTTP requests to intra...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf-rt-frontend-jaxrs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.13'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf-rt-frontend-jaxrs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-2076'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/GERONIMO-5383'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E'}, {'type':...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T18:53:08Z', 'nvd_published_at': '2010-08-19T18:00:00Z'}
1.4.0
GHSA-jgrp-6qqq-3284
2022-08-30T20:17:18Z
2022-05-24T19:20:22Z
null
['CVE-2021-42279']
Chakra Scripting Engine and ChakraCore Vulnerable to Memory Corruption
Chakra Scripting Engine and ChakraCore are vulnerable to memory corruption due to an out-of-bounds write. The Microsoft advisory for CVE-2021-42279 was modified in August 2022 to include Microsoft.ChakraCore as an affected product.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.11.24'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42279'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-42279'}]
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:17:18Z', 'nvd_published_at': '2021-11-10T01:19:00Z'}
1.4.0
GHSA-xhfx-rm8q-c3xv
2023-09-12T13:17:21Z
2022-05-24T17:40:31Z
null
['CVE-2021-20183']
Moodle Vulnerable to Reflected Cross-site Scripting
It was found in Moodle before version 4.0.0-beta that some search inputs were vulnerable to reflected Cross-site Scripting (XSS) due to insufficient escaping of search queries.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10'}, {'fixed': '4.0.0-beta'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20183'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/dc9de7b0d487b73c23c221dc0b8b6e01654921f3'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=417166'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-10T22:23:56Z', 'nvd_published_at': '2021-01-28T19:15:00Z'}
1.4.0
GHSA-rf8f-hqjv-986p
2023-07-31T20:21:38Z
2022-05-24T16:48:00Z
null
['CVE-2019-12799']
Shopware Insecure Deserialization Vulnerability
In createInstanceFromNamedArguments in Shopware through 5.6.x, a crafted web request can trigger a PHP object instantiation vulnerability, which can result in an arbitrary deserialization if the right class is instantiated. An attacker can leverage this deserialization to achieve remote code execution. NOTE: this issue...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/shopware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.3.0'}, {'last_affected': '5.6.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12799'}, {'type': 'WEB', 'url': 'https://github.com/rapid7/metasploit-framework/pull/11828'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6m27-7cqj-2mxw'}, {'type': 'PACKAGE', 'url': 'https://github.com/shopware5/shopware'}, {'t...
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T20:21:38Z', 'nvd_published_at': '2019-06-13T20:29:00Z'}
1.4.0
GHSA-998m-f2x3-jjq4
2022-12-13T19:26:33Z
2022-05-24T17:48:05Z
null
['CVE-2021-21644']
CSRF vulnerability in Jenkins Config File Provider Plugin allows deleting configuration files
Config File Provider Plugin 3.7.0 and earlier does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability. This vulnerability allows attackers to delete configuration files corresponding to an attacker-specified ID. This is due to an incomplete fix of [SECURITY-...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:config-file-provider'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.7.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.7.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21644'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/config-file-provider-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-04-21/#SECURITY-2202'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T19:26:33Z', 'nvd_published_at': '2021-04-21T15:15:00Z'}
1.4.0
GHSA-x3rc-cxv7-6xp6
2022-11-02T00:40:42Z
2022-05-14T04:04:08Z
null
['CVE-2017-17383']
Cross-site Scripting in Jenkins Core
Jenkins through 2.93 allows remote authenticated administrators to conduct XSS attacks via a crafted tool name in a job configuration form, as demonstrated by the JDK tool in Jenkins core and the Ant tool in the Ant plugin, aka SECURITY-624.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.94'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-17383'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2017-12-05/'}, {'type': 'WEB', 'url': 'http://vsintelli.com/portal/blog/23-security-advisory-2017-12-04'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/102130'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-02T00:40:42Z', 'nvd_published_at': '2017-12-06T05:29:00Z'}
1.4.0
GHSA-9wm7-rc47-g56m
2023-07-12T20:41:56Z
2022-05-24T17:37:26Z
null
['CVE-2020-29243']
dhowden tag panic due to out-of-bounds read
Due to improper bounds checking, a number of methods in dhowden tag before 0.0.0-20201120070457-d52dcb253c63 can trigger a panic via `readAPICFrame` due to attempted out-of-bounds reads. If the package is used to parse user supplied input, this may be used as a vector for a denial of service attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/dhowden/tag'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20201120070457-d52dcb253c63'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-29243'}, {'type': 'WEB', 'url': 'https://github.com/dhowden/tag/issues/80'}, {'type': 'WEB', 'url': 'https://github.com/dhowden/tag/commit/4b595ed4fac79f467594aa92f8953f90f817116e'}, {'type': 'WEB', 'url': 'https://github.com/dhowden/tag/commit/6b1...
{'cwe_ids': ['CWE-129'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-07T22:41:02Z', 'nvd_published_at': '2020-12-28T08:15:00Z'}
1.4.0
GHSA-cf9m-q836-vf26
2023-08-16T23:22:49Z
2022-05-17T04:50:15Z
null
['CVE-2014-0006']
OpenStack Swift Discloses Secret URLs to Timing Attack
The TempURL middleware in OpenStack Object Storage (Swift) 1.4.6 through 1.8.0, 1.9.0 through 1.10.0, and 1.11.0 allows remote attackers to obtain secret URLs by leveraging an object name and a timing side-channel attack.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'swift'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.6'}, {'last_affected': '1.8.0'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'swift'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0006'}, {'type': 'WEB', 'url': 'https://github.com/openstack/swift/commit/754633988931e4095530f6b13389c254096eb485'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/swift/+bug/1265665'}, {'type': 'PACKAGE', 'url': 'https://github.com/openstack/...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T23:22:49Z', 'nvd_published_at': '2014-01-23T01:55:00Z'}
1.4.0
GHSA-79m3-q3wh-c3qm
2023-08-25T21:40:46Z
2022-05-17T00:01:25Z
null
['CVE-2022-0574']
Publify Incorrect Authorization
Improper Access Control in GitHub repository publify/publify prior to 9.2.8. Anonymous users can't view but can leave comments on an article in draft mode.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'publify_core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.2.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0574'}, {'type': 'WEB', 'url': 'https://github.com/publify/publify/commit/0e6c66ac2002136517662399bca9d838c80d9739'}, {'type': 'PACKAGE', 'url': 'https://github.com/publify/publify'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory...
{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T15:46:47Z', 'nvd_published_at': '2022-05-16T15:15:00Z'}
1.4.0
GHSA-fx98-8w93-4mxr
2023-09-28T20:32:46Z
2022-05-14T01:14:56Z
null
['CVE-2019-10118']
Snipe-IT XSS Vulnerability
Snipe-IT before 4.6.14 has XSS, as demonstrated by log_meta values and the user's last name in the API.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.14'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10118'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/pull/6831'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T21:11:35Z', 'nvd_published_at': '2019-03-27T04:29:00Z'}
1.4.0
GHSA-j2w4-45qm-r674
2023-09-26T16:40:49Z
2022-05-24T16:58:55Z
null
['CVE-2019-16698']
direct_mail for Typo3 sensitive data exposure
The direct_mail (aka Direct Mail) extension through 5.2.2 for TYPO3 has a missing access check in the backend module, allowing a user (with restricted permissions to the fe_users table) to view and export data of frontend users who are subscribed to a newsletter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'directmailteam/direct-mail'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16698'}, {'type': 'WEB', 'url': 'https://github.com/kartolo/direct_mail/commit/3a70924777294c7fb40e9f6eb3f7627bac58dfd1'}, {'type': 'WEB', 'url': 'https://extensions.typo3.org/extension/direct_mail'}, {'type': 'PACKAGE', 'url': 'https://github.com/...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T18:52:44Z', 'nvd_published_at': '2019-10-16T19:15:00Z'}
1.4.0
GHSA-qc9p-mjxm-j2wj
2023-01-24T18:32:26Z
2022-05-13T01:50:40Z
null
['CVE-2018-18385']
Asciidoctor Infinite Loop vulnerability
Asciidoctor in versions < 1.5.8 allows remote attackers to cause a denial of service (infinite loop). The loop was caused by the fact that `Parser.next_block` was not exhausting all the lines in the reader as the while loop expected it would. This was happening because the regular expression that detects any list was n...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'asciidoctor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-18385'}, {'type': 'WEB', 'url': 'https://github.com/asciidoctor/asciidoctor/issues/2888'}, {'type': 'PACKAGE', 'url': 'https://github.com/asciidoctor/asciidoctor'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gem...
{'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-24T18:32:26Z', 'nvd_published_at': '2018-10-16T16:50:00Z'}
1.4.0
GHSA-3832-9276-x7gf
2022-07-13T13:58:59Z
2022-05-13T01:10:34Z
null
['CVE-2012-5783']
Improper Certificate Validation in apache HttpClient
Apache Commons HttpClient 3.x, as used in Amazon Flexible Payments Service (FPS) merchant Java SDK and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL ...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.httpcomponents:httpclient'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0'}, {'fixed': '4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-5783'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:0868'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/79984'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/httpcomponents-client'}, ...
{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T13:58:59Z', 'nvd_published_at': '2012-11-04T22:55:00Z'}
1.4.0
GHSA-xjrg-6fv9-6rjg
2022-12-15T17:30:58Z
2022-05-24T17:45:44Z
null
['CVE-2021-21628']
Stored XSS vulnerability in Jenkins Build With Parameters Plugin
Build With Parameters Plugin 1.5 and earlier does not escape parameter names and descriptions. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission. Build With Parameters Plugin 1.5.1 escapes parameter names and descriptions.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:build-with-parameters'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.5'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21628'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/build-with-parameters-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2231'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/os...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T17:30:58Z', 'nvd_published_at': '2021-03-30T12:16:00Z'}
1.4.0
GHSA-vx9j-rvmj-jc32
2023-07-25T23:01:36Z
2022-05-13T01:28:41Z
null
['CVE-2017-3200']
GraniteDS Insecure Deserialization
The Java implementation of AMF3 deserializers used in GraniteDS, version 3.1.1.G, may allow instantiation of arbitrary classes via their public parameter-less constructor and subsequently call arbitrary Java Beans setter methods. The ability to exploit this vulnerability depends on the availability of classes in the cl...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.graniteds:granite-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.1.G'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-3200'}, {'type': 'WEB', 'url': 'https://codewhitesec.blogspot.com/2017/04/amf.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/graniteds/graniteds'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210124021547/http://www.securityfocus....
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T23:01:36Z', 'nvd_published_at': '2018-06-11T17:29:00Z'}
1.4.0
GHSA-f799-hfg3-48jp
2022-12-28T23:50:36Z
2022-05-24T17:22:18Z
null
['CVE-2020-2201']
Stored XSS vulnerability in Jenkins Sonargraph Integration Plugin
Sonargraph Integration Plugin 3.0.0 and earlier does not escape the file path for the Log file field form validation. This results in a stored cross-site scripting (XSS) vulnerability that can be exploited by users with Job/Configure permission. Sonargraph Integration Plugin 3.0.1 escapes the affected part of the err...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:sonargraph-integration'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2201'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/sonargraph-integration-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-07-02/#SECURITY-1775'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-se...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-28T23:50:36Z', 'nvd_published_at': '2020-07-02T15:15:00Z'}
1.4.0
GHSA-p3xv-97g8-4wmj
2023-08-29T18:56:11Z
2022-05-17T04:52:37Z
null
['CVE-2013-6396']
Python Swift client is vulnerable to Missing SSL Certificate Check
The OpenStack Python client library for Swift (python-swiftclient) from 1.0 before 2.0.2 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'python-swiftclient'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0'}, {'fixed': '2.0.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.9.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-6396'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/python-swiftclient/+bug/1199783'}, {'type': 'WEB', 'url': 'https://review.opendev.org/c/openstack/python-swiftclient/+/69187'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-sec...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T18:56:11Z', 'nvd_published_at': '2014-02-18T19:55:00Z'}
1.4.0
GHSA-vx2g-f45p-j674
2023-09-25T19:06:45Z
2022-05-24T16:52:23Z
null
['CVE-2019-7867']
Magento 2 Community Edition XSS Vulnerability
A stored cross-site scripting vulnerability exists in the admin panel of Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This can be exploited by an authenticated user with access to manage orders and order status.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7867'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051916/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-23'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T20:52:53Z', 'nvd_published_at': '2019-08-02T22:15:00Z'}
1.4.0
GHSA-qfwq-chf4-jvwg
2023-03-29T20:26:16Z
2022-05-14T01:49:44Z
null
['CVE-2014-10075']
karo Metacharacter Handling Remote Command Execution
The karo gem through 2.5.2 for Ruby allows Remote command injection via the host field. A flaw in `db.rb` is triggered when handling metacharacters. This may allow a remote attacker to execute arbitrary commands. In particular lines 76 and 95 (as of `2014-06-01`) pass unsanitized user supplied input to the command li...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'karo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.5.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-10075'}, {'type': 'PACKAGE', 'url': 'https://github.com/rahult/karo'}, {'type': 'WEB', 'url': 'https://github.com/rahult/karo/blob/master/lib/karo/db.rb#L76'}, {'type': 'WEB', 'url': 'https://github.com/rahult/karo/blob/master/lib/karo/db.rb#L95'},...
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-29T20:26:16Z', 'nvd_published_at': '2018-10-05T06:29:00Z'}
1.4.0
GHSA-xx7g-f287-f9fq
2022-12-19T23:52:27Z
2022-05-24T17:29:16Z
null
['CVE-2020-2284']
XXE vulnerability in Jenkins Liquibase Runner Plugin
Liquibase Runner Plugin 1.4.5 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. This allows attackers able to provide Liquibase changesets evaluated by the plugin to have Jenkins parse a crafted XML file that uses external entities for extraction of secrets from the Jenkins co...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:liquibase-runner'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.5'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2284'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/liquibase-runner-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-09-23/#SECURITY-1887'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secu...
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-19T23:52:27Z', 'nvd_published_at': '2020-09-23T14:15:00Z'}
1.4.0
GHSA-4gv5-qhvr-36vv
2022-07-08T19:05:45Z
2022-05-13T01:11:25Z
null
['CVE-2013-1888']
Improper Link Resolution Before File Access in pip
pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'pip'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1888'}, {'type': 'WEB', 'url': 'https://github.com/pypa/pip/issues/725'}, {'type': 'WEB', 'url': 'https://github.com/pypa/pip/pull/734/files'}, {'type': 'WEB', 'url': 'https://github.com/pypa/pip/pull/780/files'}, {'type': 'ADVISORY', 'url': 'https...
{'cwe_ids': ['CWE-59'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T19:05:45Z', 'nvd_published_at': '2013-08-17T06:54:00Z'}
1.4.0
GHSA-q4v9-qjmw-j7vf
2022-06-30T21:13:17Z
2022-05-13T01:47:15Z
null
['CVE-2017-8039']
Insecure Default Initialization of Resource in Pivotal Spring Web Flow
An issue was discovered in Pivotal Spring Web Flow through 2.4.5. Applications that do not change the value of the MvcViewFactoryCreator useSpringBinding property which is disabled by default (i.e., set to 'false') can be vulnerable to malicious EL expressions in view states that process form submissions but do not hav...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.webflow:spring-webflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.4.5'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-8039'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2017-8039'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/100849'}]
{'cwe_ids': ['CWE-1188'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-30T21:13:17Z', 'nvd_published_at': '2017-11-27T10:29:00Z'}
1.4.0
GHSA-5r6p-p9r6-r326
2022-06-28T22:38:20Z
2022-05-24T16:51:51Z
null
['CVE-2019-10362']
Improper Encoding or Escaping of Output in Jenkins Configuration as Code Plugin
Jenkins Configuration as Code Plugin 1.24 and earlier did not escape values resulting in variable interpolation during configuration import when exporting, allowing attackers with permission to change Jenkins system configuration to obtain the values of environment variables.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins:configuration-as-code'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.25'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.24'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10362'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1446'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/07/31/1'}]
{'cwe_ids': ['CWE-116'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T22:38:20Z', 'nvd_published_at': '2019-07-31T13:15:00Z'}
1.4.0
GHSA-22cq-xxr9-jrrv
2023-07-07T00:25:21Z
2022-05-14T01:53:42Z
null
['CVE-2018-18420']
Zenario CMS vulnerable to CSRF
Cross-Site Request Forgery (CSRF) vulnerability was discovered in the 8.3 version of Zenario Content Management System via the `admin/organizer.ajax.php?path=zenario__content%2Fpanels%2Fcontent` URI.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'tribalsystems/zenario'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 8.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-18420'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/149851/Zenar-Content-Management-System-8.3-Cross-Site-Request-Forgery.html'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T00:25:21Z', 'nvd_published_at': '2018-10-19T22:29:00Z'}
1.4.0
GHSA-c9gm-7rfj-8w5h
2022-06-06T21:20:02Z
2022-05-25T00:00:38Z
null
['CVE-2021-42248']
ReDoS via crafted JSON input in GJSON
GJSON <= 1.9.2 allows attackers to cause a redos via crafted JSON input.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/tidwall/gjson'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42248'}, {'type': 'WEB', 'url': 'https://github.com/tidwall/gjson/issues/236'}, {'type': 'WEB', 'url': 'https://github.com/tidwall/gjson/issues/237'}, {'type': 'WEB', 'url': 'https://github.com/tidwall/gjson/commit/590010fdac311cc8990ef5c97448d4fec...
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-06T21:20:02Z', 'nvd_published_at': '2022-05-24T15:15:00Z'}
1.4.0
GHSA-8h77-9vh5-hw5g
2022-06-07T23:53:04Z
2022-05-01T18:35:00Z
null
['CVE-2007-5613']
Mortbay Jetty vulnerable to Cross-site scripting
Cross-site scripting (XSS) vulnerability in Dump Servlet in Mortbay Jetty before 6.1.6rc1 allows remote attackers to inject arbitrary web script or HTML via unspecified parameters and cookies.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.mortbay.jetty:jetty'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.1.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-5613'}, {'type': 'WEB', 'url': 'https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00227.html'}, {'type': 'WEB', 'url': 'https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00250.html'}, {'type': 'WEB', 'url': 'ht...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-07T23:53:04Z', 'nvd_published_at': '2007-12-05T11:46:00Z'}
1.4.0
GHSA-wrwf-pmmj-w989
2022-07-01T20:14:25Z
2022-05-13T01:14:24Z
null
['CVE-2017-13098']
Observable Discrepancy in BouncyCastle
BouncyCastle TLS prior to version 1.0.3, when configured to use the JCE (Java Cryptography Extension) for cryptographic functions, provides a weak Bleichenbacher oracle when any TLS cipher suite using RSA key exchange is negotiated. An attacker can recover the private key from a vulnerable application. This vulnerabili...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk15on'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-13098'}, {'type': 'WEB', 'url': 'https://github.com/bcgit/bc-java/commit/a00b684465b38d722ca9a3543b8af8568e6bad5c'}, {'type': 'PACKAGE', 'url': 'https://github.com/bcgit/bc-java'}, {'type': 'WEB', 'url': 'https://robotattack.org/'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-203'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T20:14:25Z', 'nvd_published_at': '2017-12-13T01:29:00Z'}
1.4.0
GHSA-7c2m-vwxw-5qww
2023-02-15T22:08:43Z
2022-05-24T22:28:22Z
null
['CVE-2019-17560']
Improper Certificate Validation in Apache Netbeans
The "Apache NetBeans" autoupdate system does not validate SSL certificates and hostnames for https based downloads. This allows an attacker to intercept downloads of autoupdates and modify the download, potentially injecting malicious code. "Apache NetBeans" versions up to and including 11.2 are affected by this vulner...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.codehaus.mevenide:netbeans'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17560'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r354d7654efa1050539fe56a3257696d1faeea4f3f9b633c29ec89609%40%3Cdev.netbeans.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}]
{'cwe_ids': ['CWE-295'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-14T22:26:00Z', 'nvd_published_at': '2020-03-30T19:15:00Z'}
1.4.0
GHSA-q9xg-h756-8689
2023-07-11T17:00:33Z
2022-05-24T17:48:43Z
null
['CVE-2021-20083']
jquery-plugin-query-object contains prototype pollution vulnerability
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in jquery-plugin-query-object 2.2.3 allows a malicious user to inject properties into Object.prototype.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'jquery-query-object'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20083'}, {'type': 'WEB', 'url': 'https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/jquery-query-object.md'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/mes...
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-11T17:00:33Z', 'nvd_published_at': '2021-04-23T19:15:00Z'}
1.4.0
GHSA-5875-m6jq-vf78
2022-05-25T20:12:44Z
2022-05-14T00:01:08Z
null
['CVE-2022-25865']
Command injection in workspace-tools
The package workspace-tools before 0.18.4 is vulnerable to Command Injection via git argument injection. When calling the fetchRemoteBranch(remote: string, remoteBranch: string, cwd: string) function, both the remote and remoteBranch parameters are passed to the git fetch subcommand in a way that additional flags can b...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'workspace-tools'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.18.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25865'}, {'type': 'WEB', 'url': 'https://github.com/microsoft/workspace-tools/pull/103'}, {'type': 'WEB', 'url': 'https://github.com/microsoft/workspace-tools/commit/9bc7e65ce497f87e1f363fd47b8f802f3d3cd978'}, {'type': 'PACKAGE', 'url': 'https://gi...
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T20:12:44Z', 'nvd_published_at': '2022-05-13T20:15:00Z'}
1.4.0
GHSA-85hw-w436-c725
2022-11-04T20:37:08Z
2022-05-14T02:02:28Z
null
['CVE-2018-11758']
XML External Entity Reference in Apache Cayenne
This affects Apache Cayenne 4.1.M1, 3.2.M1, 4.0.M2 to 4.0.M5, 4.0.B1, 4.0.B2, 4.0.RC1, 3.1, 3.1.1, 3.1.2. CayenneModeler is a desktop GUI tool shipped with Apache Cayenne and intended for editing Cayenne ORM models stored as XML files. If an attacker tricks a user of CayenneModeler into opening a malicious XML file, th...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cayenne:cayenne-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cayenne:cayenne-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0'}, {...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11758'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ed60a4d329be3c722f105317ca883986dfcd17615c70d1df87f4528c@%3Cuser.cayenne.apache.org%3E'}, {'type': 'PACKAGE', 'url': 'apache/cayenne'}]
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-04T20:37:08Z', 'nvd_published_at': '2018-08-22T20:29:00Z'}
1.4.0
GHSA-5f2p-6vjv-2q2m
2023-01-27T00:02:42Z
2022-05-17T04:56:46Z
null
['CVE-2013-4478']
Sup Code Injection vulnerability
Sup before 0.13.2.1 and 0.14.x before 0.14.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the filename of an email attachment.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'sup'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.2.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sup'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'ty...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4478'}, {'type': 'WEB', 'url': 'https://github.com/sup-heliotrope/sup/commit/8b46cdbfc14e07ca07d403aa28b0e7bc1c544785'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/sup/CVE-2013-4478.yml'}, {'type': 'PACKAGE...
{'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T00:02:42Z', 'nvd_published_at': '2013-12-07T20:55:00Z'}
1.4.0
GHSA-922h-x9qv-2274
2023-03-03T22:51:59Z
2022-05-24T16:52:45Z
null
['CVE-2019-10374']
Jenkins PegDown Formatter Plugin has Cross-site Scripting vulnerability
PegDown Formatter Plugin uses the PegDown library to implement support for rendering Markdown formatted descriptions in Jenkins. It advertises disabling of HTML to prevent cross-site scripting (XSS) as a feature. PegDown Formatter Plugin does not prevent the use of `javascript:` scheme in URLs for links. This results ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:pegdown-formatte'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10374'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-08-07/#SECURITY-142'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/08/07/1'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T22:51:59Z', 'nvd_published_at': '2019-08-07T15:15:00Z'}
1.4.0
GHSA-xqf6-5grh-6223
2022-12-22T13:56:42Z
2022-05-24T17:12:40Z
null
['CVE-2020-2165']
Passwords transmitted in plain text by Jenkins Artifactory Plugin
Jenkins Artifactory Plugin 3.6.0 and earlier stores Artifactory server passwords in its global configuration file `org.jfrog.hudson.ArtifactoryBuilder.xml` on the Jenkins controller as part of its configuration. While the password is stored encrypted on disk since Artifactory Plugin 3.6.0, it is transmitted in plain t...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:artifactory'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2165'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/artifactory-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1542%20(2)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-securit...
{'cwe_ids': ['CWE-319', 'CWE-522'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T13:56:42Z', 'nvd_published_at': '2020-03-25T17:15:00Z'}
1.4.0
GHSA-376m-3rm2-9jm6
2023-02-14T00:46:20Z
2022-05-14T03:55:23Z
null
['CVE-2016-8638']
Session Fixation in ipsilon
A vulnerability in ipsilon 2.0 before 2.0.2, 1.2 before 1.2.1, 1.1 before 1.1.2, and 1.0 before 1.0.3 was found that allows attacker to log out active sessions of other users. This issue is related to how it tracks sessions, and allows an unauthenticated attacker to view and terminate active sessions from other users....
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ipsilon'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ipsilon'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'t...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-8638'}, {'type': 'WEB', 'url': 'https://github.com/ipsilon-project/ipsilon/commit/1c48414877fc110652b6078a29529972c7ec9122'}, {'type': 'WEB', 'url': 'https://github.com/ipsilon-project/ipsilon/commit/64fc366c054fc6af1d9d2692902db169884b5f78'}, {'ty...
{'cwe_ids': ['CWE-384'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T00:46:20Z', 'nvd_published_at': '2017-07-12T13:29:00Z'}
1.4.0
GHSA-hrgc-54mv-58gv
2022-11-03T19:12:17Z
2022-05-17T01:42:17Z
null
['CVE-2012-4387']
Denial of service in Apache Struts
Apache Struts 2.0.0 through 2.3.4 allows remote attackers to cause a denial of service (CPU consumption) via a long parameter name, which is processed as an OGNL expression.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-4387'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/78183'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/WW-3860'}, {'type': 'WEB', 'url': 'http://struts.apache.org/2.x/docs/s2-011.html'}, {'type':...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T19:12:17Z', 'nvd_published_at': '2012-09-05T23:55:00Z'}
1.4.0
GHSA-v3xp-3wpq-rvhp
2023-07-20T18:11:25Z
2022-05-13T01:18:33Z
null
['CVE-2018-0860']
ChakraCore RCE Vulnerability
Microsoft Edge and ChakraCore in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0834, CVE-2018-0835, CVE-2018-0...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-0860'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/9dac38fa6a6273f4cd57234d3caf4c7033e527bc'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0860'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T18:11:25Z', 'nvd_published_at': '2018-02-15T02:29:00Z'}
1.4.0
GHSA-cqj8-47ch-rvvq
2022-06-23T18:04:48Z
2022-05-24T17:40:48Z
null
['CVE-2020-29582']
Incorrect Default Permissions in JetBrains Kotlin
In JetBrains Kotlin before 1.4.21, a vulnerable Java API was used for temporary file and folder creation. An attacker was able to read data from such files and list directories due to insecure permissions.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jetbrains.kotlin:kotlin-stdlib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.21'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.20'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-29582'}, {'type': 'WEB', 'url': 'https://blog.jetbrains.com'}, {'type': 'WEB', 'url': 'https://blog.jetbrains.com/blog/2021/02/03/jetbrains-security-bulletin-q4-2020/'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2721aba31a856263...
{'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T18:04:48Z', 'nvd_published_at': '2021-02-03T16:15:00Z'}
1.4.0
GHSA-mx3q-j2g2-5qxq
2022-06-30T19:51:21Z
2022-05-17T02:26:07Z
null
['CVE-2017-9785']
Deserialization of Untrusted Data in NancyFX Nancy
Csrf.cs in NancyFX Nancy before 1.4.4 and 2.x before 2.0-dangermouse has Remote Code Execution via Deserialization of JSON data in a CSRF Cookie.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Nancy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.3'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Nancy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introd...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-9785'}, {'type': 'WEB', 'url': 'https://github.com/NancyFx/Nancy/releases/tag/v1.4.4'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-30T19:51:21Z', 'nvd_published_at': '2017-07-20T12:29:00Z'}
1.4.0
GHSA-cx94-mrg9-rq4j
2023-08-29T23:31:24Z
2022-05-24T22:04:38Z
null
['CVE-2022-29189']
Pion/DTLS contains buffer for inbound DTLS fragments with no limit
### Impact A buffer that was used for inbound network traffic had no upper limit. Pion DTLS would buffer all network traffic from the remote user until the handshake completes or times out. An attacker could exploit this to cause excessive memory usage. ### Patches Upgrade to Pion DTLS v2.1.4 ### Workarounds No worka...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/pion/dtls'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/pion/dtls/v2'}, 'ecosystem_specific': {'affected_functions': ...
[{'type': 'WEB', 'url': 'https://github.com/pion/dtls/security/advisories/GHSA-cx94-mrg9-rq4j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29189'}, {'type': 'WEB', 'url': 'https://github.com/pion/dtls/commit/a6397ff7282bc56dc37a68ea9211702edb4de1de'}, {'type': 'WEB', 'url': 'https://github....
{'cwe_ids': ['CWE-120'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:04:38Z', 'nvd_published_at': '2022-05-21T00:15:00Z'}
1.4.0
GHSA-jwpw-q68h-r678
2023-03-22T21:26:32Z
2022-05-24T17:47:44Z
null
[]
Improper Neutralization of CRLF Sequences in dio
The dio package prior to 5.0.0 for Dart allows CRLF injection if the attacker controls the HTTP method string, a different vulnerability than CVE-2020-35669.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Pub', 'name': 'dio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31402'}, {'type': 'WEB', 'url': 'https://github.com/cfug/dio/issues/1130'}, {'type': 'WEB', 'url': 'https://github.com/cfug/dio/commit/927f79e93ba39f3c3a12c190624a55653d577984'}, {'type': 'PACKAGE', 'url': 'https://github.com/cfug/dio'}, {'type': '...
{'cwe_ids': ['CWE-74', 'CWE-88', 'CWE-93'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:27:03Z', 'nvd_published_at': '2021-04-15T19:15:00Z'}
1.4.0
GHSA-p94c-r74j-43qg
2023-07-31T19:09:33Z
2022-05-14T02:23:18Z
null
['CVE-2016-3350']
ChakraCore RCE Vulnerability
The Chakra JavaScript engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-3377.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3350'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/24c4d7df8199b27d360323ce3be1d7959fd918eb'}, {'type': 'WEB', 'url': 'https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-105'}, {'type': 'WEB'...
{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T19:09:33Z', 'nvd_published_at': '2016-09-14T10:59:00Z'}