schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 8 154 | details stringlengths 31 19.1k | severity stringlengths 2 92 | affected stringlengths 75 28.5k | references stringlengths 79 7.48k | database_specific stringlengths 131 196 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-56p3-rrp4-2j82 | 2023-08-16T09:33:05Z | 2022-05-14T02:54:25Z | null | ['CVE-2013-4200'] | Plone Open Redirection vulnerability via next parameter | The isURLInPortal method in the URLTool class in in_portal.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 treats URLs starting with a space as a relative URL, which allows remote attackers to bypass the allow_external_login_sites filtering property, redirect users to arbitrary web sites, and... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'E... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4200'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-4200'}, {'type': 'PACKAGE', 'url': 'https://github.com/plone/Plone'}, {'type': 'WEB', 'url': 'http://plone.org/products/plone-hotfix/releases/20130618'}, {'type': ... | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T00:44:30Z', 'nvd_published_at': '2014-01-21T16:06:00Z'} |
1.4.0 | GHSA-85c5-ccm8-vr96 | 2023-08-25T21:43:47Z | 2022-05-24T16:51:05Z | null | ['CVE-2019-14243'] | mastercactapus proxyprotocol vulnerable to denial of service | headerv2.go in mastercactapus proxyprotocol before 0.0.2, as used in the mastercactapus caddy-proxyprotocol plugin through 0.0.2 for Caddy, allows remote attackers to cause a denial of service (webserver panic and daemon crash) via a crafted HAProxy PROXY v2 request with truncated source/destination address data. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/mastercactapus/proxyprotocol'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14243'}, {'type': 'WEB', 'url': 'https://github.com/mastercactapus/caddy-proxyprotocol/issues/8'}, {'type': 'WEB', 'url': 'https://github.com/mastercactapus/proxyprotocol/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/mastercactapus/proxypr... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-14T20:53:45Z', 'nvd_published_at': '2019-07-23T22:15:00Z'} |
1.4.0 | GHSA-5rq3-9wc9-m9c3 | 2023-09-28T20:23:37Z | 2022-05-13T01:21:37Z | null | ['CVE-2019-0829'] | ChakraCore Memory Corruption Vulnerability | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0806, CVE-2019-0810, CVE-2019-0812, CVE-2019-0860, CVE-2019-0861. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0829'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/6087'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/b03a96112fb05158a040caba88919cd70648f09f'}, {'type': 'PACKAGE', 'url': 'https://github.c... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T19:01:43Z', 'nvd_published_at': '2019-04-09T21:29:00Z'} |
1.4.0 | GHSA-65p8-5423-fw3x | 2023-09-26T16:57:23Z | 2022-05-24T17:00:12Z | null | ['CVE-2019-18656'] | Pimcore XSS Vulnerability | Pimcore 6prior to 6.3.0 has XSS in the translations grid because `bundles/AdminBundle/Resources/public/js/pimcore/settings/translations.js` mishandles certain HTML elements. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-18656'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/ca036e9f86bb5cdb3dac0930ec131e5f35e26c5f'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T18:38:46Z', 'nvd_published_at': '2019-10-31T17:15:00Z'} |
1.4.0 | GHSA-6fh3-xhwg-7hfh | 2023-01-06T16:56:35Z | 2022-05-24T17:10:28Z | null | ['CVE-2020-2150'] | Jenkins Sonar Quality Gates Plugin transmits credentials in plain text during configuration | Sonar Quality Gates Plugin stores credentials in its global configuration file `org.quality.gates.jenkins.plugin.GlobalConfig.xml` on the Jenkins controller as part of its configuration. While the credentials are stored encrypted on disk, they are transmitted in plain text as part of the configuration form by Sonar Qua... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:sonar-quality-gates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2150'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/sonar-quality-gates-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-03-09/#SECURITY-1523'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secur... | {'cwe_ids': ['CWE-319'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-01-06T16:56:35Z', 'nvd_published_at': '2020-03-09T16:15:00Z'} |
1.4.0 | GHSA-p9hp-3gpv-52w3 | 2023-07-28T23:22:04Z | 2022-05-14T02:19:45Z | null | ['CVE-2016-6233'] | Zend Framework Allows SQL Injection | The (1) order and (2) group methods in Zend_Db_Select in the Zend Framework before 1.12.19 might allow remote attackers to conduct SQL injection attacks via vectors related to use of the character pattern `[\w]*` in a regular expression. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'zendframework/zendframework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.19'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6233'}, {'type': 'WEB', 'url': 'https://framework.zend.com/security/advisory/ZF2016-02'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2JUKFTI6ABK7ZN7IEAGPCLAHCFANMID2/'}, {'... | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T23:22:04Z', 'nvd_published_at': '2017-02-17T02:59:00Z'} |
1.4.0 | GHSA-3c78-m682-8wp9 | 2023-07-26T23:34:18Z | 2022-05-17T00:32:03Z | null | ['CVE-2017-11796'] | ChakraCore RCE Vulnerability | ChakraCore and Microsoft Edge in Windows 10 1703 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11792, CVE-2017-11793, CVE-2017-11797, ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-11796'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/3917'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/6eba63d1851b4ece1e334ea1e07b3af44ef1e480'}, {'type': 'WEB', 'url': 'https://portal.msrc... | {'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T23:34:18Z', 'nvd_published_at': '2017-10-13T13:29:00Z'} |
1.4.0 | GHSA-h7mf-qrm9-2848 | 2023-09-11T20:52:36Z | 2022-05-01T18:24:47Z | null | ['CVE-2007-4556'] | OpenSymphony XWork vulnerable to improper input validation | XWork is an command-pattern framework that is used to power WebWork as well as other applications. Struts support in OpenSymphony XWork before 1.2.3, and 2.x before 2.0.4, as used in WebWork and Apache Struts, recursively evaluates all input as an Object-Graph Navigation Language (OGNL) expression when altSyntax is ena... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'opensymphony:xwork'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'opensymphony:xwork'}, 'ecosystem_specific': {'affected_functions': [... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-4556'}, {'type': 'WEB', 'url': 'http://struts.apache.org/2.x/docs/s2-001.html'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-07T23:11:42Z', 'nvd_published_at': '2007-08-28T01:17:00Z'} |
1.4.0 | GHSA-4v67-wg88-37p9 | 2022-11-22T18:56:57Z | 2022-05-17T02:28:11Z | null | ['CVE-2017-7683'] | Apache OpenMeetings displays Tomcat version and detailed error stack trace | Apache OpenMeetings 1.0.0 displays Tomcat version and detailed error stack trace, which is not secure. The issue is fixed in version 3.3.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.openmeetings:openmeetings-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '3.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7683'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/openmeetings'}, {'type': 'WEB', 'url': 'http://markmail.org/message/hint6fp66lijqdvu'}] | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T18:56:57Z', 'nvd_published_at': '2017-07-17T13:18:00Z'} |
1.4.0 | GHSA-92rv-mvmj-47qh | 2022-12-12T16:47:40Z | 2022-05-14T03:13:13Z | null | ['CVE-2018-1000186'] | Jenkins GitHub Pull Request Builder Plugin credential capture vulnerability | A exposure of sensitive information vulnerability exists in Jenkins GitHub Pull Request Builder Plugin 1.41.0 and older in GhprbGitHubAuth.java that allows attackers with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing crede... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugin:ghprb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.42.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.41.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000186'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ghprb-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-06-04/#SECURITY-805'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T16:47:40Z', 'nvd_published_at': '2018-06-05T20:29:00Z'} |
1.4.0 | GHSA-24g8-35x9-fv8r | 2022-12-22T13:48:15Z | 2022-05-24T17:33:09Z | null | ['CVE-2020-2317'] | Stored XSS vulnerability in Jenkins FindBugs Plugin | Jenkins FindBugs Plugin 5.0.0 and earlier does not escape the annotation message in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide report files to Jenkins FindBugs Plugin's post build step. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jvnet.hudson.plugins:findbugs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2317'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/findbugs-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-11-04/#SECURITY-1918'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T13:48:15Z', 'nvd_published_at': '2020-11-04T15:15:00Z'} |
1.4.0 | GHSA-wprr-mc54-c62q | 2023-02-14T01:01:02Z | 2022-05-17T04:30:15Z | null | ['CVE-2012-5508'] | Exposure of Sensitive Information in Plone | The error pages in Plone before 4.2.3 and 4.3 before beta 1 allow remote attackers to obtain random numbers and derive the PRNG state for password resets via unspecified vectors. NOTE: this identifier was SPLIT per ADT2 due to different vulnerability types. CVE-2012-6661 was assigned for the PRNG reseeding issue in Zo... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-5508'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/zope2/+bug/1071067'}, {'type': 'PACKAGE', 'url': 'https://github.com/plone/Plone'}, {'type': 'WEB', 'url': 'https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt'}, {'type'... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T01:01:02Z', 'nvd_published_at': '2014-11-03T22:55:00Z'} |
1.4.0 | GHSA-mf6x-7766-5cg8 | 2023-09-25T19:13:33Z | 2022-05-24T16:52:28Z | null | ['CVE-2019-7936'] | Magento 2 Community Edition XSS Vulnerability | A stored cross-site scripting vulnerability exists in the admin panel of Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This could be exploited by an authenticated user with privileges to modify content block titles to inject malicious javascript. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7936'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20211206084839/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-13'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-14T23:06:10Z', 'nvd_published_at': '2019-08-02T22:15:00Z'} |
1.4.0 | GHSA-2rvf-329f-p99g | 2022-06-02T21:05:25Z | 2022-05-13T01:02:16Z | null | ['CVE-2016-6794'] | System Property Disclosure in Apache Tomcat | When a SecurityManager is configured, a web application's ability to read system properties should be controlled by the SecurityManager. In Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70, 6.0.0 to 6.0.45 the system property replacement feature for configuration files could be u... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.47'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6794'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:0455'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:0456'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2247'}, {'type': 'PACKA... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-02T21:05:25Z', 'nvd_published_at': '2017-08-10T16:29:00Z'} |
1.4.0 | GHSA-ch5v-fhg8-7gv9 | 2023-09-05T19:14:19Z | 2022-05-13T01:49:35Z | null | ['CVE-2018-12423'] | Matrix Synapse Authorization Error | In Synapse before 0.31.2, unauthorised users can hijack rooms when there is no `m.room.power_levels` event in force. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'matrix-synapse'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.31.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-12423'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-doc/issues/1304'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/901549'}, {'type': 'WEB', 'url': 'https://matrix.org/blog/2018/06/14/security-update-synapse-0-31-2/'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-22T00:05:35Z', 'nvd_published_at': '2018-06-14T21:29:00Z'} |
1.4.0 | GHSA-f478-xwv9-p93q | 2023-08-21T19:55:15Z | 2022-05-24T17:18:00Z | 2023-08-21T19:55:15Z | [] | Duplicate Advisory: Kerberos for NodeJS allows DLL Injection | ## Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-m2mx-rfpw-jghv. This link is maintained to preserve external references.
## Original Description
The kerberos package before 1.0.0 for Node.js allows arbitrary code execution and privilege escalation via injection of malicious DLL... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'kerberos'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13110'}, {'type': 'WEB', 'url': 'https://medium.com/@kiddo_Ha3ker/dll-injection-attack-in-kerberos-npm-package-cb4b32031cd'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/advisories/1514'}] | {'cwe_ids': ['CWE-427'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T00:12:02Z', 'nvd_published_at': '2020-05-16T12:15:00Z'} |
1.4.0 | GHSA-gg96-8w9x-7rx9 | 2023-08-01T23:01:21Z | 2022-05-24T16:52:27Z | null | ['CVE-2019-7921'] | Magento 2 Community Edition Cross-site Scripting Vulnerability | A stored cross-site scripting vulnerability exists in the product catalog form of Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This could be exploited by an authenticated user with privileges to the product catalog to inject malicious javascript. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7921'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051916/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-23'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T23:01:21Z', 'nvd_published_at': '2019-08-02T22:15:00Z'} |
1.4.0 | GHSA-v4w5-p2hg-8fh6 | 2023-07-31T20:59:18Z | 2022-05-17T03:05:04Z | null | ['CVE-2016-9015'] | Urllib3 Incorrect Certificate Validation | Versions 1.17 and 1.18 of the Python urllib3 library suffer from a vulnerability that can cause them, in certain configurations, to not correctly validate TLS certificates. This places users of the library with those configurations at risk of man-in-the-middle and information leakage attacks. This vulnerability affects... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'urllib3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.17'}, {'last_affected': '1.18'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-9015'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210123184150/http://www.securityfocus.com/bid/93941'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/10/27/6'}] | {'cwe_ids': ['CWE-295'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T20:59:18Z', 'nvd_published_at': '2017-01-11T16:59:00Z'} |
1.4.0 | GHSA-9pf7-f47q-mwpq | 2022-07-05T21:19:07Z | 2022-05-24T17:01:50Z | null | ['CVE-2019-11291'] | Cross-site Scripting in RabbitMQ | Pivotal RabbitMQ, 3.7 versions prior to v3.7.20 and 3.8 version prior to v3.8.1, and RabbitMQ for PCF, 1.16.x versions prior to 1.16.7 and 1.17.x versions prior to 1.17.4, contain two endpoints, federation and shovel, which do not properly sanitize user input. A remote authenticated malicious user with administrative a... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Hex', 'name': 'rabbit_common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.7.0'}, {'fixed': '3.7.20'}]}]}, {'package': {'ecosystem': 'Hex', 'name': 'rabbit_common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.8.0'}, {'fixed': '3.8.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11291'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0553'}, {'type': 'PACKAGE', 'url': 'https://github.com/rabbitmq/rabbitmq-server'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2019-11291'}] | {'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T21:19:07Z', 'nvd_published_at': '2019-11-22T23:15:00Z'} |
1.4.0 | GHSA-vwxv-frj6-fhc9 | 2023-07-13T19:44:40Z | 2022-05-24T17:20:49Z | null | ['CVE-2020-7932'] | OMERO-web Sensitive Data Exposure | OMERO.web before 5.6.3 optionally allows sensitive data elements (e.g., a session key) to be passed as URL query parameters. If an attacker tricks a user into clicking a malicious link in OMERO.web, the information in the query parameters may be exposed in the Referer header seen by the target. Information in the URL p... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'omero-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7932'}, {'type': 'WEB', 'url': 'https://www.openmicroscopy.org/security/advisories/2019-SV4/'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T19:44:40Z', 'nvd_published_at': '2020-06-17T17:15:00Z'} |
1.4.0 | GHSA-gp39-h9c2-qw79 | 2023-09-25T14:47:31Z | 2022-05-14T00:56:24Z | null | ['CVE-2014-2682'] | Several Zend Products Vulnerable to XXE and XEE attacks | Zend Framework 1 (ZF1) before 1.12.4, Zend Framework 2 before 2.1.6 and 2.2.x before 2.2.6, ZendOpenId, ZendRest, ZendService_AudioScrobbler, ZendService_Nirvanix, ZendService_SlideShare, ZendService_Technorati, and ZendService_WindowsAzure before 2.0.2, ZendService_Amazon before 2.0.3, and ZendService_Api before 1.0.0... | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'zendframework/zendframework1'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'zendframework/zendopenid'}, 'ecosystem_specific':... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-2682'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20140419041226/http://www.securityfocus.com/bid/66358'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20150523055201/http://www.mandriva.com/en/support/security/advisories/advisory/... | {'cwe_ids': ['CWE-611', 'CWE-776'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-25T14:47:31Z', 'nvd_published_at': '2014-11-16T00:59:00Z'} |
1.4.0 | GHSA-xp4g-5xj6-6vpr | 2022-11-08T12:41:04Z | 2022-05-14T03:53:41Z | null | ['CVE-2017-12630'] | Apache Drill vulnerable to Cross-site Scripting | In Apache Drill 1.11.0 and earlier, when submitting form from Query page, users are able to pass arbitrary script or HTML which will take effect on Profile page afterwards. Example: after submitting special script that returns cookie information from Query page, malicious user may obtain this information from Profile p... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.drill:drill-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12630'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/drill'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/608658a55d09e16542db41121a0a972c97448214cdc04071fd4db923@%3Cdev.drill.apache.org%3E'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-08T12:41:04Z', 'nvd_published_at': '2017-12-18T14:29:00Z'} |
1.4.0 | GHSA-78q9-24gv-g288 | 2023-07-25T18:44:14Z | 2022-05-14T01:53:42Z | null | ['CVE-2018-18529'] | ThinkPHP SQLi Vulnerability | ThinkPHP 3.2.4 has SQL Injection via the count parameter because the `Library/Think/Db/Driver/Mysql.class.php` `parseKey` function mishandles the key variable. NOTE: a backquote character is not required in the attack URI. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'topthink/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-18529'}, {'type': 'WEB', 'url': 'https://www.kingkk.com/2018/10/Thinkphp-%E8%81%9A%E5%90%88%E6%9F%A5%E8%AF%A2%E6%BC%8F%E6%B4%9E/#ThinkPHP3-lt-3-2-4'}] | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T18:44:14Z', 'nvd_published_at': '2018-10-19T20:29:00Z'} |
1.4.0 | GHSA-h27g-72mh-9m33 | 2023-02-23T20:32:21Z | 2022-05-24T16:56:46Z | null | ['CVE-2019-10414'] | Jenkins Git Changelog Plugin has Insufficiently Protected Credentials | Git Changelog Plugin stored MediaWiki and Jira passwords unencrypted in job `config.xml` files on the Jenkins controller. These passwords could be viewed by users with Extended Read permission, or access to the Jenkins controller file system.
Git Changelog Plugin now stores these passwords encrypted. Existing jobs nee... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'de.wellnerbou.jenkins:git-changelog'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.18'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10414'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/git-changelog-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-09-25/#SECURITY-1574'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2... | {'cwe_ids': ['CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-23T20:32:21Z', 'nvd_published_at': '2019-09-25T16:15:00Z'} |
1.4.0 | GHSA-8xmx-h8rq-h94j | 2023-06-09T23:23:51Z | 2022-05-24T17:48:04Z | null | ['CVE-2020-25864'] | HashiCorp Consul Cross-site Scripting vulnerability | HashiCorp Consul and Consul Enterprise up to version 1.9.4 key-value (KV) raw mode was vulnerable to cross-site scripting. Fixed in 1.9.5, 1.8.10 and 1.7.14. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.9.0'}, {'fixed': '1.9.5'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.0'}, {'fixed': '1.... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25864'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2021-07-consul-api-kv-endpoint-vulnerable-to-cross-site-scripting/23368'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/consul'}, {'type': 'WEB', 'url': 'https://sec... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T23:23:51Z', 'nvd_published_at': '2021-04-20T16:15:00Z'} |
1.4.0 | GHSA-x72m-p4qc-p7rv | 2023-09-26T18:03:09Z | 2022-05-24T17:00:24Z | null | ['CVE-2019-8109'] | Magento 2 Community Edition RCE Vulnerability via CSRF | A remote code execution vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated user can craft a malicious CSRF payload that can result in arbitrary command execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8109'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051105/https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T20:10:43Z', 'nvd_published_at': '2019-11-05T23:15:00Z'} |
1.4.0 | GHSA-5f6p-4hxq-rjxm | 2023-08-03T22:11:00Z | 2022-05-17T02:56:23Z | null | ['CVE-2015-8814'] | Umbraco CMS vulnerable to CSRF | Umbraco before 7.4.0 allows remote attackers to bypass anti-forgery security measures and conduct cross-site request forgery (CSRF) attacks as demonstrated by editing user account information in the `templates.asmx.cs` file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Umbraco.CMS'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8814'}, {'type': 'WEB', 'url': 'https://github.com/umbraco/Umbraco-CMS/commit/18c3345e47663a358a042652e697b988d6a380eb'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20230608152113/https://issues.umbraco.org/issue/U4-7459'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T22:11:00Z', 'nvd_published_at': '2017-03-03T16:59:00Z'} |
1.4.0 | GHSA-c8qc-cp8v-prpx | 2023-07-25T00:06:18Z | 2022-05-14T03:02:59Z | null | ['CVE-2018-11587'] | Centreon RCE Vulnerability | There is Remote Code Execution in Centreon 3.4.6 including Centreon Web 2.8.23 via the RPN value in the Virtual Metric form in centreonGraph.class.php. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['3.4.6']}, {'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introdu... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11587'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon-archived/pull/6263'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon-archived/pull/6263/commits/fb438e6aaf133cc5f9d25130653ba8fdc6ecf51f'}, {'type': 'WEB', 'url': '... | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T00:06:18Z', 'nvd_published_at': '2018-06-25T18:29:00Z'} |
1.4.0 | GHSA-mj7q-cmf3-mg7h | 2022-12-13T14:58:30Z | 2022-05-24T17:39:13Z | null | ['CVE-2021-21611'] | Stored XSS vulnerability in Jenkins on new item page | Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not escape display names and IDs of item types shown on the New Item page.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to specify display names or IDs of item types.
As of the publication of this advisory, the ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.263.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.263.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21611'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-01-13/#SECURITY-2171'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T06:50:48Z', 'nvd_published_at': '2021-01-13T16:15:00Z'} |
1.4.0 | GHSA-79r5-rhrw-7pvh | 2022-12-15T17:08:05Z | 2022-05-24T17:45:47Z | null | ['CVE-2021-21634'] | Passwords stored in plain text by Jenkins Jabber (XMPP) notifier and control Plugin | Jabber (XMPP) notifier and control Plugin 1.41 and earlier stores passwords unencrypted in its global configuration file `hudson.plugins.jabber.im.transport.JabberPublisher.xml` on the Jenkins controller as part of its configuration.
These passwords can be viewed by users with access to the Jenkins controller file sys... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jvnet.hudson.plugins:jabber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.42'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.41'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21634'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jabber-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2162'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021... | {'cwe_ids': ['CWE-522'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T17:08:05Z', 'nvd_published_at': '2021-03-30T12:16:00Z'} |
1.4.0 | GHSA-8578-mmf4-f327 | 2023-08-01T22:55:54Z | 2022-05-24T16:52:24Z | null | ['CVE-2019-7873'] | Magento 2 Community Edition Cross-site Scripting Vulnerability | A cross-site request forgery vulnerability exists in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This can result in unintended deletion of the store design schedule. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7873'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121011306/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-33'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T22:55:54Z', 'nvd_published_at': '2019-08-02T22:15:00Z'} |
1.4.0 | GHSA-r57f-7xw3-q2r9 | 2022-07-01T22:12:30Z | 2022-05-14T03:44:30Z | null | ['CVE-2017-1000354'] | Improper Authentication in Jenkins | Jenkins versions 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to a login command which allowed impersonating any Jenkins user. The `login` command available in the remoting-based CLI stored the encrypted user name of the successfully authenticated user in a cache file used to authenticate further c... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.50'}, {'fixed': '2.57'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.56'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000354'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenkins/commit/02d24053bdfeb219d2387a19885a60bdab510479'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advis... | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T22:12:30Z', 'nvd_published_at': '2018-01-29T17:29:00Z'} |
1.4.0 | GHSA-hg6g-jj7g-x6v2 | 2022-06-28T22:27:27Z | 2022-05-24T22:00:43Z | null | ['CVE-2019-10401'] | Improper Neutralization of Input During Web Page Generation in Jenkins | In Jenkins 2.196 and earlier, LTS 2.176.3 and earlier, the f:expandableTextBox form control interpreted its content as HTML when expanded, resulting in a stored XSS vulnerability exploitable by users with permission to define its contents (typically Job/Configure). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.176.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.176.3'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10401'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-09-25/#SECURITY-1498'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/09/25/3'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T22:27:27Z', 'nvd_published_at': '2019-09-25T16:15:00Z'} |
1.4.0 | GHSA-4g62-mfwx-4q48 | 2023-09-28T20:52:15Z | 2022-05-13T01:21:42Z | null | ['CVE-2019-1000021'] | slixmpp Incorrect Access Control | slixmpp version before commit 7cd73b594e8122dddf847953fcfc85ab4d316416 contains an incorrect Access Control vulnerability in XEP-0223 plugin (Persistent Storage of Private Data via PubSub) options profile, used for the configuration of default access model that can result in all of the contacts of the victim can see pr... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'slixmpp'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1000021'}, {'type': 'WEB', 'url': 'https://github.com/poezio/slixmpp/commit/7cd73b594e8122dddf847953fcfc85ab4d316416'}, {'type': 'PACKAGE', 'url': 'https://github.com/poezio/slixmpp'}, {'type': 'WEB', 'url': 'https://lab.louiz.org/poezio/slixmpp/co... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T18:13:30Z', 'nvd_published_at': '2019-02-04T21:29:00Z'} |
1.4.0 | GHSA-jqx5-h2hw-5q4f | 2022-07-13T18:56:25Z | 2022-05-04T00:28:50Z | null | ['CVE-2012-0213'] | Denial of Service in Apache POI | The UnhandledDataStructure function in hwpf/model/UnhandledDataStructure.java in Apache POI 3.8 and earlier allows remote attackers to cause a denial of service (OutOfMemoryError exception and possibly JVM destabilization) via a crafted length value in a Channel Definition Format (CDF) or Compound File Binary Format (C... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.poi:poi'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.10-beta1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.poi:poi-scratchpad'}, 'ecosystem_specific': {'affect... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-0213'}, {'type': 'WEB', 'url': 'https://github.com/apache/poi/commit/25bc679244188d63de690354db0e3f301291e252'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=799078'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/poi... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T18:56:25Z', 'nvd_published_at': '2012-08-07T21:55:00Z'} |
1.4.0 | GHSA-qv6q-4jwx-7j5c | 2022-12-28T22:50:36Z | 2022-05-24T17:28:27Z | null | ['CVE-2020-2278'] | Arbitrary file write vulnerability in Storable Configs Plugin | Jenkins Storable Configs Plugin 1.0 and earlier does not restrict the user-specified file name, allowing attackers with Job/Configure permission to replace any other '.xml' file on the Jenkins controller with a job config.xml file's content. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jvnet.hudson.plugins:storable-configs-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2278'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/storable-configs-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1968%20(2)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/os... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-28T22:50:36Z', 'nvd_published_at': '2020-09-16T14:15:00Z'} |
1.4.0 | GHSA-237q-6hjp-pchq | 2022-11-22T19:04:21Z | 2022-05-17T19:57:03Z | null | ['CVE-2014-3655'] | JBoss KeyCloak is vulnerable to soft token deletion via CSRF | JBoss KeyCloak is vulnerable to soft token deletion via CSRF. This issue is fixed in Keycloak 1.0.2.Final. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-services'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2.Final'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3655'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/pull/703'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/commit/0b8b31a3ea7d8d7ac8b14a020613fc32aa5e9d9d'}, {'type': 'WEB', 'url': 'https://access.redhat.com/secur... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T19:04:21Z', 'nvd_published_at': '2019-11-13T16:15:00Z'} |
1.4.0 | GHSA-xvv8-8wh9-9fh2 | 2023-07-21T21:34:55Z | 2022-05-13T01:34:55Z | null | ['CVE-2018-10894'] | Keycloak Authentication Error | It was found that SAML authentication in Keycloak 3.4.3.Final incorrectly authenticated expired certificates. A malicious user could use this to access unauthorized data or possibly conduct further attacks. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 3.4.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-10894'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:3592'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:3593'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:3595'}, {'type': 'WEB'... | {'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T21:34:55Z', 'nvd_published_at': '2018-08-01T17:29:00Z'} |
1.4.0 | GHSA-7wwr-p84q-qr3q | 2023-08-29T23:29:32Z | 2022-05-17T05:23:54Z | null | ['CVE-2012-1606'] | Typo3 Backend XSS Vulnerabilities | Multiple cross-site scripting (XSS) vulnerabilities in the Backend component in TYPO3 4.4.0 through 4.4.13, 4.5.0 through 4.5.13, 4.6.0 through 4.6.6, 4.7, and 6.0 allow remote authenticated backend users to inject arbitrary web script or HTML via unspecified vectors. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed': '4.4.14'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.4.13'}}, {'package': {'ecosystem': 'Packagist', ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-1606'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20120527123559/http://www.securityfocus.com/bid/52771'}, {'type': 'WEB', 'url': 'http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2012-001/'}, {'type': 'WEB', 'u... | {'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T23:29:32Z', 'nvd_published_at': '2012-09-04T20:55:00Z'} |
1.4.0 | GHSA-8696-836p-c8qp | 2022-12-21T16:46:24Z | 2022-05-24T17:06:23Z | null | ['CVE-2020-2096'] | Reflected XSS vulnerability in Jenkins gitlab-hook Plugin | Jenkins Gitlab Hook Plugin 1.4.2 and earlier does not escape project names in the `build_now` endpoint, resulting in a reflected XSS vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.ruby-plugins:gitlab-hook'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2096'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/gitlab-hook-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-01-15/#SECURITY-1683'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/155967/Jen... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T16:46:24Z', 'nvd_published_at': '2020-01-15T16:15:00Z'} |
1.4.0 | GHSA-jxg5-35fj-ccwf | 2023-07-31T21:01:24Z | 2022-05-17T03:02:43Z | null | ['CVE-2016-5091'] | Extbase for TYPO3 allows RCE | Extbase in TYPO3 4.3.0 before 6.2.24, 7.x before 7.6.8, and 8.1.1 allows remote attackers to obtain sensitive information or possibly execute arbitrary code via a crafted Extbase action. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-extbase'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.2.24'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-extbase'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0'}, {'fixed': '7.6.8'}]}]}, ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-5091'}, {'type': 'WEB', 'url': 'https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2016-013/'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2016/05/25/4'}, {'type': 'WEB', 'url': 'http://www.openwall... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T21:01:24Z', 'nvd_published_at': '2017-01-23T21:59:00Z'} |
1.4.0 | GHSA-9cwg-mhxf-hh59 | 2023-08-17T23:09:26Z | 2022-05-17T00:23:23Z | null | ['CVE-2013-6044'] | Django Cross-site scripting (XSS) vulnerability via is_safe_url function | The is_safe_url function in utils/http.py in Django 1.4.x before 1.4.6, 1.5.x before 1.5.2, and 1.6 before beta 2 treats a URL's scheme as safe even if it is not HTTP or HTTPS, which might introduce cross-site scripting (XSS) or other vulnerabilities into Django applications that use this function, as demonstrated by "... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.6'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-6044'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/1a274ccd6bc1afbdac80344c9b6e5810c1162b5f'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/ae3535169af804352517b7fea94a42a1c9c4b762'}, {'type': 'WEB', 'url': '... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-17T23:09:26Z', 'nvd_published_at': '2013-10-04T17:55:00Z'} |
1.4.0 | GHSA-j24g-gm76-j829 | 2023-08-04T21:55:01Z | 2022-05-17T02:54:32Z | null | ['CVE-2017-5537'] | Weblate user account enumeration via reset password form | The password reset form in Weblate before 2.10.1 provides different error messages depending on whether the email address is associated with an account, which allows remote attackers to enumerate user accounts via a series of requests. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'weblate'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-5537'}, {'type': 'WEB', 'url': 'https://github.com/WeblateOrg/weblate/issues/1317'}, {'type': 'WEB', 'url': 'https://github.com/WeblateOrg/weblate/commit/abe0d2a29a1d8e896bfe829c8461bf8b391f1079'}, {'type': 'PACKAGE', 'url': 'https://github.com/Web... | {'cwe_ids': ['CWE-200', 'CWE-209'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-04T21:55:01Z', 'nvd_published_at': '2017-03-15T15:59:00Z'} |
1.4.0 | GHSA-rf92-3vjr-w628 | 2023-05-23T21:27:26Z | 2022-05-24T17:33:07Z | null | ['CVE-2020-2299'] | Improper Authentication in Jenkins Active Directory Plugin | Jenkins Active Directory Plugin implements two separate modes: Integration with ADSI on Windows, and an OS agnostic LDAP-based mode.
The LDAP-based mode in Active Directory Plugin starting in version 1.44 and prior to versions 2.16.1 and 2.20 shares code between user lookup and user authentication and distinguishes th... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:active-directory'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.17'}, {'fixed': '2.20'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:active-directory'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduc... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2299'}, {'type': 'WEB', 'url': 'https://github.com/CVEProject/cvelist/blob/16860a328d970faa6e4350b0fa446f64a52e52ca/2020/2xxx/CVE-2020-2299.json'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/active-directory-plugin'}, {'type': 'WEB', ... | {'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-07T23:54:16Z', 'nvd_published_at': '2020-11-04T15:15:00Z'} |
1.4.0 | GHSA-84h6-jf8x-ff2j | 2022-12-06T21:38:55Z | 2022-05-24T16:59:37Z | null | ['CVE-2019-10460'] | Jenkins Bitbucket OAuth Plugin contains Insufficiently Protected Credentials | Jenkins Bitbucket OAuth Plugin prior to 0.10 stores credentials unencrypted in the global config.xml configuration file on the Jenkins master where they could be viewed by users with access to the master file system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:bitbucket-oauth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10460'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/bitbucket-oauth-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1546'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security... | {'cwe_ids': ['CWE-522'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T21:38:55Z', 'nvd_published_at': '2019-10-23T13:15:00Z'} |
1.4.0 | GHSA-m9j2-grqf-fg26 | 2022-12-12T21:26:03Z | 2022-05-14T03:23:45Z | null | ['CVE-2018-1000150'] | Jenkins Reverse Proxy Auth Plugin allows attackers with local file system access to obtain a list of authorities for logged in users | An exposure of sensitive information vulnerability exists in Jenkins Reverse Proxy Auth Plugin 1.5 and older in ReverseProxySecurityRealm#authContext that allows attackers with local file system access to obtain a list of authorities for logged in users. Reverse Proxy Auth Plugin 1.6.0 and newer no longer store the cac... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:reverse-proxy-auth-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.5'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000150'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/reverse-proxy-auth-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-03-26/#SECURITY-736'}] | {'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T21:26:03Z', 'nvd_published_at': '2018-04-05T13:29:00Z'} |
1.4.0 | GHSA-33fq-qm4m-cjw3 | 2023-07-06T22:02:52Z | 2022-05-13T01:48:18Z | null | ['CVE-2018-0573'] | baserCMS Access Control Bypass | baserCMS (baserCMS 4.1.0.1 and earlier versions, baserCMS 3.0.15 and earlier versions) allows remote attackers to bypass access restriction for a content to view a file which is uploaded by a site user via unspecified vectors. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'baserproject/basercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.16'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.15'}}, {'package': {'ecosystem': 'Packagist', 'name': 'baserproject/basercms'}, 'ranges': ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-0573'}, {'type': 'WEB', 'url': 'https://basercms.net/security/JVN67881316'}, {'type': 'WEB', 'url': 'http://jvn.jp/en/jp/JVN67881316/index.html'}] | {'cwe_ids': ['CWE-269'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T22:02:52Z', 'nvd_published_at': '2018-06-26T14:29:00Z'} |
1.4.0 | GHSA-4c72-mrhf-23cg | 2023-08-15T22:11:49Z | 2022-05-14T02:52:41Z | null | ['CVE-2014-3503'] | Apache Syncope uses a weak PNRG | Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.syncope:syncope'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3503'}, {'type': 'WEB', 'url': 'https://github.com/apache/syncope/commit/8e0045925a387ee211832c7e0709dd418cda1ad3'}, {'type': 'WEB', 'url': 'https://syncope.apache.org/security.html#cve-2014-3503-insecure-random-implementations-used-to-generate-p'}... | {'cwe_ids': ['CWE-338'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-15T22:11:49Z', 'nvd_published_at': '2014-07-11T14:55:00Z'} |
1.4.0 | GHSA-h48f-q7rw-hvr7 | 2022-05-24T22:07:24Z | 2022-05-24T22:07:24Z | null | ['CVE-2022-29195'] | Missing validation causes denial of service via `StagePeek` | ### Impact
The implementation of [`tf.raw_ops.StagePeek`](https://github.com/tensorflow/tensorflow/blob/f3b9bf4c3c0597563b289c0512e98d4ce81f886e/tensorflow/core/kernels/stage_op.cc#L261) does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service attac... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h48f-q7rw-hvr7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29195'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/cebe3c45d76357d201c65bdbbf0dbe6e8a63bbdb'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:07:24Z', 'nvd_published_at': '2022-05-20T22:16:00Z'} |
1.4.0 | GHSA-3jrj-x6cj-97cp | 2023-07-11T18:35:18Z | 2022-05-24T19:21:11Z | null | ['CVE-2021-43559'] | Moodle contains CSRF vulnerability | A flaw was found in Moodle in versions 3.11 to 3.11.3, 3.10 to 3.10.7, 3.9 to 3.9.10 and earlier unsupported versions. The "delete related badge" functionality did not include the necessary token check to prevent a CSRF risk. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11'}, {'fixed': '3.11.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.11.3'}}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'EC... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43559'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/20d41ebae4eb28269298504c68db511a05ec4969'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2021517'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-11T18:35:18Z', 'nvd_published_at': '2021-11-22T16:15:00Z'} |
1.4.0 | GHSA-7j66-wvhr-m83x | 2022-12-02T20:14:17Z | 2022-05-18T00:00:41Z | null | ['CVE-2022-30965'] | Stored Cross-site Scripting vulnerabilities in Jenkins promoted Builds (Simple) plugin providing additional parameter types | Jenkins Promoted Builds (Simple) Plugin 1.9 and earlier does not escape the name and description of Promotion Level parameters on views displaying parameters. This results in stored cross-site scripting (XSS) vulnerabilities exploitable by attackers with Item/Configure permission.
Exploitation of this vulnerability re... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:promoted-builds-simple'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30965'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2717'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T20:14:17Z', 'nvd_published_at': '2022-05-17T15:15:00Z'} |
1.4.0 | GHSA-5h5m-fj48-qpjw | 2023-07-26T20:03:27Z | 2022-05-14T01:19:05Z | null | ['CVE-2017-1000013'] | phpMyAdmin Open Redirect | phpMyAdmin 4.0, 4.4, and 4.6 are vulnerable to an open redirect weakness | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.6'}, {'fixed': '4.6.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ecosystem_specific': {'affect... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000013'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210123220100/http://www.securityfocus.com/bid/95720'}, {'type': 'WEB', 'url': 'https://www.phpmyadmin.net/security/PMASA-2017-1'}] | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T20:03:27Z', 'nvd_published_at': '2017-07-17T13:18:00Z'} |
1.4.0 | GHSA-jxp3-mmw7-8285 | 2023-09-25T18:54:43Z | 2022-05-24T16:52:26Z | null | ['CVE-2019-7897'] | Magento 2 Community Edition XSS Vulnerability | A stored cross-site scripting vulnerability exists in the admin panel of Magento Open Source prior to 1.9.4.2, and Magento Commerce prior to 1.14.4.2, Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This could be exploited by an authenticated user with privileges to customer configu... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7897'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20211206084839/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-13'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T20:32:55Z', 'nvd_published_at': '2019-08-02T22:15:00Z'} |
1.4.0 | GHSA-vjxc-frw4-jmh5 | 2022-11-07T22:04:19Z | 2022-05-24T17:07:10Z | null | ['CVE-2019-14888'] | Undertow vulnerable to Uncontrolled Resource Consumption | A vulnerability was found in the Undertow HTTP server in versions before 2.0.29 when listening on HTTPS. An attacker can target the HTTPS port to carry out a Denial Of Service (DOS) to make the service unavailable on SSL. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.29.Final'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14888'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0729'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14888'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220211-000... | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-07T22:04:19Z', 'nvd_published_at': '2020-01-23T17:15:00Z'} |
1.4.0 | GHSA-42gv-77f4-r3j9 | 2023-07-25T18:22:03Z | 2022-05-14T01:39:47Z | null | ['CVE-2018-20713'] | Shopware SQL Injection | Shopware before 5.4.3 allows SQL Injection by remote authenticated users, aka SW-21404. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'shopware/shopware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.4.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20713'}, {'type': 'WEB', 'url': 'https://github.com/shopware5/shopware/commit/73cb46727050e28a0d7c2cf8471baaa3eaf2e5e8'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-05-2018'}] | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T18:22:03Z', 'nvd_published_at': '2019-01-15T16:29:00Z'} |
1.4.0 | GHSA-wr69-g62g-2r9h | 2022-07-06T20:23:16Z | 2022-05-13T01:14:26Z | null | ['CVE-2015-1832'] | Improper Restriction of XML External Entity Reference in Apace Derby | XML external entity (XXE) vulnerability in the SqlXmlUtil code in Apache Derby before 10.12.1.1, when a Java Security Manager is not in place, allows context-dependent attackers to read arbitrary files or cause a denial of service (resource consumption) via vectors involving XmlVTI and the XML datatype. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.derby:derby'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.12.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.11.1.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-1832'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/DERBY-6807'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', ... | {'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:23:16Z', 'nvd_published_at': '2016-10-03T21:59:00Z'} |
1.4.0 | GHSA-hfhr-xxxq-vg7g | 2023-07-21T19:15:30Z | 2022-05-13T01:20:58Z | null | ['CVE-2018-8542'] | ChakraCore RCE Vulnerability | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8541, CVE-2018-8543, CVE-2018-8551, CVE-2018-8... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8542'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/5827'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/334471b7254c1c093deb413bac0472974e6f9181'}, {'type': 'WEB', 'url': 'https://portal.msrc.... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T19:15:30Z', 'nvd_published_at': '2018-11-14T01:29:00Z'} |
1.4.0 | GHSA-wjwr-3jch-479j | 2023-09-22T21:05:26Z | 2022-05-01T18:13:14Z | null | ['CVE-2007-3383'] | Apache Tomcat SendMailServlet XSS | Cross-site scripting (XSS) vulnerability in SendMailServlet in the examples web application (`examples/jsp/mail/sendmail.jsp`) in Apache Tomcat 4.0.0 through 4.0.6 and 4.1.0 through 4.1.36 allows remote attackers to inject arbitrary web script or HTML via the From field and possibly other fields, related to generation ... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'last_affected': '4.0.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-3383'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/35536'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@%3Cdev.tomcat.apache.org%3E'}, {'typ... | {'cwe_ids': ['CWE-80'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-22T21:05:26Z', 'nvd_published_at': '2007-07-25T17:30:00Z'} |
1.4.0 | GHSA-v8q2-94f6-6xq2 | 2022-07-08T18:53:08Z | 2022-05-13T01:09:23Z | null | ['CVE-2010-2076'] | Improper Input Validation in Apache CXF | Apache CXF 2.0.x before 2.0.13, 2.1.x before 2.1.10, and 2.2.x before 2.2.9, as used in Apache ServiceMix, Apache Camel, Apache Chemistry, Apache jUDDI, Apache Geronimo, and other products, does not properly reject DTDs in SOAP messages, which allows remote attackers to read arbitrary files, send HTTP requests to intra... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf-rt-frontend-jaxrs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.13'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf-rt-frontend-jaxrs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-2076'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/GERONIMO-5383'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E'}, {'type':... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T18:53:08Z', 'nvd_published_at': '2010-08-19T18:00:00Z'} |
1.4.0 | GHSA-jgrp-6qqq-3284 | 2022-08-30T20:17:18Z | 2022-05-24T19:20:22Z | null | ['CVE-2021-42279'] | Chakra Scripting Engine and ChakraCore Vulnerable to Memory Corruption | Chakra Scripting Engine and ChakraCore are vulnerable to memory corruption due to an out-of-bounds write. The Microsoft advisory for CVE-2021-42279 was modified in August 2022 to include Microsoft.ChakraCore as an affected product. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.11.24'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42279'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-42279'}] | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:17:18Z', 'nvd_published_at': '2021-11-10T01:19:00Z'} |
1.4.0 | GHSA-xhfx-rm8q-c3xv | 2023-09-12T13:17:21Z | 2022-05-24T17:40:31Z | null | ['CVE-2021-20183'] | Moodle Vulnerable to Reflected Cross-site Scripting | It was found in Moodle before version 4.0.0-beta that some search inputs were vulnerable to reflected Cross-site Scripting (XSS) due to insufficient escaping of search queries. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10'}, {'fixed': '4.0.0-beta'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20183'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/dc9de7b0d487b73c23c221dc0b8b6e01654921f3'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=417166'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-10T22:23:56Z', 'nvd_published_at': '2021-01-28T19:15:00Z'} |
1.4.0 | GHSA-rf8f-hqjv-986p | 2023-07-31T20:21:38Z | 2022-05-24T16:48:00Z | null | ['CVE-2019-12799'] | Shopware Insecure Deserialization Vulnerability | In createInstanceFromNamedArguments in Shopware through 5.6.x, a crafted web request can trigger a PHP object instantiation vulnerability, which can result in an arbitrary deserialization if the right class is instantiated. An attacker can leverage this deserialization to achieve remote code execution. NOTE: this issue... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'shopware/shopware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.3.0'}, {'last_affected': '5.6.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12799'}, {'type': 'WEB', 'url': 'https://github.com/rapid7/metasploit-framework/pull/11828'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6m27-7cqj-2mxw'}, {'type': 'PACKAGE', 'url': 'https://github.com/shopware5/shopware'}, {'t... | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T20:21:38Z', 'nvd_published_at': '2019-06-13T20:29:00Z'} |
1.4.0 | GHSA-998m-f2x3-jjq4 | 2022-12-13T19:26:33Z | 2022-05-24T17:48:05Z | null | ['CVE-2021-21644'] | CSRF vulnerability in Jenkins Config File Provider Plugin allows deleting configuration files | Config File Provider Plugin 3.7.0 and earlier does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability.
This vulnerability allows attackers to delete configuration files corresponding to an attacker-specified ID.
This is due to an incomplete fix of [SECURITY-... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:config-file-provider'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.7.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.7.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21644'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/config-file-provider-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-04-21/#SECURITY-2202'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T19:26:33Z', 'nvd_published_at': '2021-04-21T15:15:00Z'} |
1.4.0 | GHSA-x3rc-cxv7-6xp6 | 2022-11-02T00:40:42Z | 2022-05-14T04:04:08Z | null | ['CVE-2017-17383'] | Cross-site Scripting in Jenkins Core | Jenkins through 2.93 allows remote authenticated administrators to conduct XSS attacks via a crafted tool name in a job configuration form, as demonstrated by the JDK tool in Jenkins core and the Ant tool in the Ant plugin, aka SECURITY-624. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.94'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-17383'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2017-12-05/'}, {'type': 'WEB', 'url': 'http://vsintelli.com/portal/blog/23-security-advisory-2017-12-04'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/102130'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-02T00:40:42Z', 'nvd_published_at': '2017-12-06T05:29:00Z'} |
1.4.0 | GHSA-9wm7-rc47-g56m | 2023-07-12T20:41:56Z | 2022-05-24T17:37:26Z | null | ['CVE-2020-29243'] | dhowden tag panic due to out-of-bounds read | Due to improper bounds checking, a number of methods in dhowden tag before 0.0.0-20201120070457-d52dcb253c63 can trigger a panic via `readAPICFrame` due to attempted out-of-bounds reads. If the package is used to parse user supplied input, this may be used as a vector for a denial of service attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/dhowden/tag'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20201120070457-d52dcb253c63'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-29243'}, {'type': 'WEB', 'url': 'https://github.com/dhowden/tag/issues/80'}, {'type': 'WEB', 'url': 'https://github.com/dhowden/tag/commit/4b595ed4fac79f467594aa92f8953f90f817116e'}, {'type': 'WEB', 'url': 'https://github.com/dhowden/tag/commit/6b1... | {'cwe_ids': ['CWE-129'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-07T22:41:02Z', 'nvd_published_at': '2020-12-28T08:15:00Z'} |
1.4.0 | GHSA-cf9m-q836-vf26 | 2023-08-16T23:22:49Z | 2022-05-17T04:50:15Z | null | ['CVE-2014-0006'] | OpenStack Swift Discloses Secret URLs to Timing Attack | The TempURL middleware in OpenStack Object Storage (Swift) 1.4.6 through 1.8.0, 1.9.0 through 1.10.0, and 1.11.0 allows remote attackers to obtain secret URLs by leveraging an object name and a timing side-channel attack. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'swift'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.6'}, {'last_affected': '1.8.0'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'swift'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0006'}, {'type': 'WEB', 'url': 'https://github.com/openstack/swift/commit/754633988931e4095530f6b13389c254096eb485'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/swift/+bug/1265665'}, {'type': 'PACKAGE', 'url': 'https://github.com/openstack/... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T23:22:49Z', 'nvd_published_at': '2014-01-23T01:55:00Z'} |
1.4.0 | GHSA-79m3-q3wh-c3qm | 2023-08-25T21:40:46Z | 2022-05-17T00:01:25Z | null | ['CVE-2022-0574'] | Publify Incorrect Authorization | Improper Access Control in GitHub repository publify/publify prior to 9.2.8. Anonymous users can't view but can leave comments on an article in draft mode. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'publify_core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.2.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0574'}, {'type': 'WEB', 'url': 'https://github.com/publify/publify/commit/0e6c66ac2002136517662399bca9d838c80d9739'}, {'type': 'PACKAGE', 'url': 'https://github.com/publify/publify'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory... | {'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T15:46:47Z', 'nvd_published_at': '2022-05-16T15:15:00Z'} |
1.4.0 | GHSA-fx98-8w93-4mxr | 2023-09-28T20:32:46Z | 2022-05-14T01:14:56Z | null | ['CVE-2019-10118'] | Snipe-IT XSS Vulnerability | Snipe-IT before 4.6.14 has XSS, as demonstrated by log_meta values and the user's last name in the API. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.14'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10118'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/pull/6831'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T21:11:35Z', 'nvd_published_at': '2019-03-27T04:29:00Z'} |
1.4.0 | GHSA-j2w4-45qm-r674 | 2023-09-26T16:40:49Z | 2022-05-24T16:58:55Z | null | ['CVE-2019-16698'] | direct_mail for Typo3 sensitive data exposure | The direct_mail (aka Direct Mail) extension through 5.2.2 for TYPO3 has a missing access check in the backend module, allowing a user (with restricted permissions to the fe_users table) to view and export data of frontend users who are subscribed to a newsletter. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'directmailteam/direct-mail'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16698'}, {'type': 'WEB', 'url': 'https://github.com/kartolo/direct_mail/commit/3a70924777294c7fb40e9f6eb3f7627bac58dfd1'}, {'type': 'WEB', 'url': 'https://extensions.typo3.org/extension/direct_mail'}, {'type': 'PACKAGE', 'url': 'https://github.com/... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T18:52:44Z', 'nvd_published_at': '2019-10-16T19:15:00Z'} |
1.4.0 | GHSA-qc9p-mjxm-j2wj | 2023-01-24T18:32:26Z | 2022-05-13T01:50:40Z | null | ['CVE-2018-18385'] | Asciidoctor Infinite Loop vulnerability | Asciidoctor in versions < 1.5.8 allows remote attackers to cause a denial of service (infinite loop). The loop was caused by the fact that `Parser.next_block` was not exhausting all the lines in the reader as the while loop expected it would. This was happening because the regular expression that detects any list was n... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'asciidoctor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-18385'}, {'type': 'WEB', 'url': 'https://github.com/asciidoctor/asciidoctor/issues/2888'}, {'type': 'PACKAGE', 'url': 'https://github.com/asciidoctor/asciidoctor'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gem... | {'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-24T18:32:26Z', 'nvd_published_at': '2018-10-16T16:50:00Z'} |
1.4.0 | GHSA-3832-9276-x7gf | 2022-07-13T13:58:59Z | 2022-05-13T01:10:34Z | null | ['CVE-2012-5783'] | Improper Certificate Validation in apache HttpClient | Apache Commons HttpClient 3.x, as used in Amazon Flexible Payments Service (FPS) merchant Java SDK and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL ... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.httpcomponents:httpclient'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0'}, {'fixed': '4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-5783'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:0868'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/79984'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/httpcomponents-client'}, ... | {'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T13:58:59Z', 'nvd_published_at': '2012-11-04T22:55:00Z'} |
1.4.0 | GHSA-xjrg-6fv9-6rjg | 2022-12-15T17:30:58Z | 2022-05-24T17:45:44Z | null | ['CVE-2021-21628'] | Stored XSS vulnerability in Jenkins Build With Parameters Plugin | Build With Parameters Plugin 1.5 and earlier does not escape parameter names and descriptions.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
Build With Parameters Plugin 1.5.1 escapes parameter names and descriptions. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:build-with-parameters'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.5'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21628'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/build-with-parameters-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2231'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/os... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T17:30:58Z', 'nvd_published_at': '2021-03-30T12:16:00Z'} |
1.4.0 | GHSA-vx9j-rvmj-jc32 | 2023-07-25T23:01:36Z | 2022-05-13T01:28:41Z | null | ['CVE-2017-3200'] | GraniteDS Insecure Deserialization | The Java implementation of AMF3 deserializers used in GraniteDS, version 3.1.1.G, may allow instantiation of arbitrary classes via their public parameter-less constructor and subsequently call arbitrary Java Beans setter methods. The ability to exploit this vulnerability depends on the availability of classes in the cl... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.graniteds:granite-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.1.G'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-3200'}, {'type': 'WEB', 'url': 'https://codewhitesec.blogspot.com/2017/04/amf.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/graniteds/graniteds'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210124021547/http://www.securityfocus.... | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T23:01:36Z', 'nvd_published_at': '2018-06-11T17:29:00Z'} |
1.4.0 | GHSA-f799-hfg3-48jp | 2022-12-28T23:50:36Z | 2022-05-24T17:22:18Z | null | ['CVE-2020-2201'] | Stored XSS vulnerability in Jenkins Sonargraph Integration Plugin | Sonargraph Integration Plugin 3.0.0 and earlier does not escape the file path for the Log file field form validation.
This results in a stored cross-site scripting (XSS) vulnerability that can be exploited by users with Job/Configure permission.
Sonargraph Integration Plugin 3.0.1 escapes the affected part of the err... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:sonargraph-integration'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2201'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/sonargraph-integration-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-07-02/#SECURITY-1775'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-se... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-28T23:50:36Z', 'nvd_published_at': '2020-07-02T15:15:00Z'} |
1.4.0 | GHSA-p3xv-97g8-4wmj | 2023-08-29T18:56:11Z | 2022-05-17T04:52:37Z | null | ['CVE-2013-6396'] | Python Swift client is vulnerable to Missing SSL Certificate Check | The OpenStack Python client library for Swift (python-swiftclient) from 1.0 before 2.0.2 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'python-swiftclient'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0'}, {'fixed': '2.0.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.9.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-6396'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/python-swiftclient/+bug/1199783'}, {'type': 'WEB', 'url': 'https://review.opendev.org/c/openstack/python-swiftclient/+/69187'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-sec... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T18:56:11Z', 'nvd_published_at': '2014-02-18T19:55:00Z'} |
1.4.0 | GHSA-vx2g-f45p-j674 | 2023-09-25T19:06:45Z | 2022-05-24T16:52:23Z | null | ['CVE-2019-7867'] | Magento 2 Community Edition XSS Vulnerability | A stored cross-site scripting vulnerability exists in the admin panel of Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This can be exploited by an authenticated user with access to manage orders and order status. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7867'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051916/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-23'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T20:52:53Z', 'nvd_published_at': '2019-08-02T22:15:00Z'} |
1.4.0 | GHSA-qfwq-chf4-jvwg | 2023-03-29T20:26:16Z | 2022-05-14T01:49:44Z | null | ['CVE-2014-10075'] | karo Metacharacter Handling Remote Command Execution | The karo gem through 2.5.2 for Ruby allows Remote command injection via the host field.
A flaw in `db.rb` is triggered when handling metacharacters. This may allow a remote attacker to execute arbitrary commands.
In particular lines 76 and 95 (as of `2014-06-01`) pass unsanitized user supplied input to the command li... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'karo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.5.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-10075'}, {'type': 'PACKAGE', 'url': 'https://github.com/rahult/karo'}, {'type': 'WEB', 'url': 'https://github.com/rahult/karo/blob/master/lib/karo/db.rb#L76'}, {'type': 'WEB', 'url': 'https://github.com/rahult/karo/blob/master/lib/karo/db.rb#L95'},... | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-29T20:26:16Z', 'nvd_published_at': '2018-10-05T06:29:00Z'} |
1.4.0 | GHSA-xx7g-f287-f9fq | 2022-12-19T23:52:27Z | 2022-05-24T17:29:16Z | null | ['CVE-2020-2284'] | XXE vulnerability in Jenkins Liquibase Runner Plugin | Liquibase Runner Plugin 1.4.5 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
This allows attackers able to provide Liquibase changesets evaluated by the plugin to have Jenkins parse a crafted XML file that uses external entities for extraction of secrets from the Jenkins co... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:liquibase-runner'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.5'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2284'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/liquibase-runner-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-09-23/#SECURITY-1887'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secu... | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-19T23:52:27Z', 'nvd_published_at': '2020-09-23T14:15:00Z'} |
1.4.0 | GHSA-4gv5-qhvr-36vv | 2022-07-08T19:05:45Z | 2022-05-13T01:11:25Z | null | ['CVE-2013-1888'] | Improper Link Resolution Before File Access in pip | pip before 1.3 allows local users to overwrite arbitrary files via a symlink attack on a file in the /tmp/pip-build temporary directory. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'pip'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1888'}, {'type': 'WEB', 'url': 'https://github.com/pypa/pip/issues/725'}, {'type': 'WEB', 'url': 'https://github.com/pypa/pip/pull/734/files'}, {'type': 'WEB', 'url': 'https://github.com/pypa/pip/pull/780/files'}, {'type': 'ADVISORY', 'url': 'https... | {'cwe_ids': ['CWE-59'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T19:05:45Z', 'nvd_published_at': '2013-08-17T06:54:00Z'} |
1.4.0 | GHSA-q4v9-qjmw-j7vf | 2022-06-30T21:13:17Z | 2022-05-13T01:47:15Z | null | ['CVE-2017-8039'] | Insecure Default Initialization of Resource in Pivotal Spring Web Flow | An issue was discovered in Pivotal Spring Web Flow through 2.4.5. Applications that do not change the value of the MvcViewFactoryCreator useSpringBinding property which is disabled by default (i.e., set to 'false') can be vulnerable to malicious EL expressions in view states that process form submissions but do not hav... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.webflow:spring-webflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.4.5'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-8039'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2017-8039'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/100849'}] | {'cwe_ids': ['CWE-1188'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-30T21:13:17Z', 'nvd_published_at': '2017-11-27T10:29:00Z'} |
1.4.0 | GHSA-5r6p-p9r6-r326 | 2022-06-28T22:38:20Z | 2022-05-24T16:51:51Z | null | ['CVE-2019-10362'] | Improper Encoding or Escaping of Output in Jenkins Configuration as Code Plugin | Jenkins Configuration as Code Plugin 1.24 and earlier did not escape values resulting in variable interpolation during configuration import when exporting, allowing attackers with permission to change Jenkins system configuration to obtain the values of environment variables. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins:configuration-as-code'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.25'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.24'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10362'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1446'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/07/31/1'}] | {'cwe_ids': ['CWE-116'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T22:38:20Z', 'nvd_published_at': '2019-07-31T13:15:00Z'} |
1.4.0 | GHSA-22cq-xxr9-jrrv | 2023-07-07T00:25:21Z | 2022-05-14T01:53:42Z | null | ['CVE-2018-18420'] | Zenario CMS vulnerable to CSRF | Cross-Site Request Forgery (CSRF) vulnerability was discovered in the 8.3 version of Zenario Content Management System via the `admin/organizer.ajax.php?path=zenario__content%2Fpanels%2Fcontent` URI. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'tribalsystems/zenario'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 8.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-18420'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/149851/Zenar-Content-Management-System-8.3-Cross-Site-Request-Forgery.html'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T00:25:21Z', 'nvd_published_at': '2018-10-19T22:29:00Z'} |
1.4.0 | GHSA-c9gm-7rfj-8w5h | 2022-06-06T21:20:02Z | 2022-05-25T00:00:38Z | null | ['CVE-2021-42248'] | ReDoS via crafted JSON input in GJSON | GJSON <= 1.9.2 allows attackers to cause a redos via crafted JSON input. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/tidwall/gjson'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42248'}, {'type': 'WEB', 'url': 'https://github.com/tidwall/gjson/issues/236'}, {'type': 'WEB', 'url': 'https://github.com/tidwall/gjson/issues/237'}, {'type': 'WEB', 'url': 'https://github.com/tidwall/gjson/commit/590010fdac311cc8990ef5c97448d4fec... | {'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-06T21:20:02Z', 'nvd_published_at': '2022-05-24T15:15:00Z'} |
1.4.0 | GHSA-8h77-9vh5-hw5g | 2022-06-07T23:53:04Z | 2022-05-01T18:35:00Z | null | ['CVE-2007-5613'] | Mortbay Jetty vulnerable to Cross-site scripting | Cross-site scripting (XSS) vulnerability in Dump Servlet in Mortbay Jetty before 6.1.6rc1 allows remote attackers to inject arbitrary web script or HTML via unspecified parameters and cookies. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.mortbay.jetty:jetty'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.1.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-5613'}, {'type': 'WEB', 'url': 'https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00227.html'}, {'type': 'WEB', 'url': 'https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00250.html'}, {'type': 'WEB', 'url': 'ht... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-07T23:53:04Z', 'nvd_published_at': '2007-12-05T11:46:00Z'} |
1.4.0 | GHSA-wrwf-pmmj-w989 | 2022-07-01T20:14:25Z | 2022-05-13T01:14:24Z | null | ['CVE-2017-13098'] | Observable Discrepancy in BouncyCastle | BouncyCastle TLS prior to version 1.0.3, when configured to use the JCE (Java Cryptography Extension) for cryptographic functions, provides a weak Bleichenbacher oracle when any TLS cipher suite using RSA key exchange is negotiated. An attacker can recover the private key from a vulnerable application. This vulnerabili... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bcprov-jdk15on'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-13098'}, {'type': 'WEB', 'url': 'https://github.com/bcgit/bc-java/commit/a00b684465b38d722ca9a3543b8af8568e6bad5c'}, {'type': 'PACKAGE', 'url': 'https://github.com/bcgit/bc-java'}, {'type': 'WEB', 'url': 'https://robotattack.org/'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-203'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T20:14:25Z', 'nvd_published_at': '2017-12-13T01:29:00Z'} |
1.4.0 | GHSA-7c2m-vwxw-5qww | 2023-02-15T22:08:43Z | 2022-05-24T22:28:22Z | null | ['CVE-2019-17560'] | Improper Certificate Validation in Apache Netbeans | The "Apache NetBeans" autoupdate system does not validate SSL certificates and hostnames for https based downloads. This allows an attacker to intercept downloads of autoupdates and modify the download, potentially injecting malicious code. "Apache NetBeans" versions up to and including 11.2 are affected by this vulner... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.codehaus.mevenide:netbeans'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17560'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r354d7654efa1050539fe56a3257696d1faeea4f3f9b633c29ec89609%40%3Cdev.netbeans.apache.org%3E'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2020.html'}] | {'cwe_ids': ['CWE-295'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-14T22:26:00Z', 'nvd_published_at': '2020-03-30T19:15:00Z'} |
1.4.0 | GHSA-q9xg-h756-8689 | 2023-07-11T17:00:33Z | 2022-05-24T17:48:43Z | null | ['CVE-2021-20083'] | jquery-plugin-query-object contains prototype pollution vulnerability | Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in jquery-plugin-query-object 2.2.3 allows a malicious user to inject properties into Object.prototype. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'jquery-query-object'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20083'}, {'type': 'WEB', 'url': 'https://github.com/BlackFan/client-side-prototype-pollution/blob/master/pp/jquery-query-object.md'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/mes... | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-11T17:00:33Z', 'nvd_published_at': '2021-04-23T19:15:00Z'} |
1.4.0 | GHSA-5875-m6jq-vf78 | 2022-05-25T20:12:44Z | 2022-05-14T00:01:08Z | null | ['CVE-2022-25865'] | Command injection in workspace-tools | The package workspace-tools before 0.18.4 is vulnerable to Command Injection via git argument injection. When calling the fetchRemoteBranch(remote: string, remoteBranch: string, cwd: string) function, both the remote and remoteBranch parameters are passed to the git fetch subcommand in a way that additional flags can b... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'workspace-tools'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.18.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25865'}, {'type': 'WEB', 'url': 'https://github.com/microsoft/workspace-tools/pull/103'}, {'type': 'WEB', 'url': 'https://github.com/microsoft/workspace-tools/commit/9bc7e65ce497f87e1f363fd47b8f802f3d3cd978'}, {'type': 'PACKAGE', 'url': 'https://gi... | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T20:12:44Z', 'nvd_published_at': '2022-05-13T20:15:00Z'} |
1.4.0 | GHSA-85hw-w436-c725 | 2022-11-04T20:37:08Z | 2022-05-14T02:02:28Z | null | ['CVE-2018-11758'] | XML External Entity Reference in Apache Cayenne | This affects Apache Cayenne 4.1.M1, 3.2.M1, 4.0.M2 to 4.0.M5, 4.0.B1, 4.0.B2, 4.0.RC1, 3.1, 3.1.1, 3.1.2. CayenneModeler is a desktop GUI tool shipped with Apache Cayenne and intended for editing Cayenne ORM models stored as XML files. If an attacker tricks a user of CayenneModeler into opening a malicious XML file, th... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cayenne:cayenne-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cayenne:cayenne-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0'}, {... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11758'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ed60a4d329be3c722f105317ca883986dfcd17615c70d1df87f4528c@%3Cuser.cayenne.apache.org%3E'}, {'type': 'PACKAGE', 'url': 'apache/cayenne'}] | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-04T20:37:08Z', 'nvd_published_at': '2018-08-22T20:29:00Z'} |
1.4.0 | GHSA-5f2p-6vjv-2q2m | 2023-01-27T00:02:42Z | 2022-05-17T04:56:46Z | null | ['CVE-2013-4478'] | Sup Code Injection vulnerability | Sup before 0.13.2.1 and 0.14.x before 0.14.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the filename of an email attachment. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'sup'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.2.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sup'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'ty... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4478'}, {'type': 'WEB', 'url': 'https://github.com/sup-heliotrope/sup/commit/8b46cdbfc14e07ca07d403aa28b0e7bc1c544785'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/sup/CVE-2013-4478.yml'}, {'type': 'PACKAGE... | {'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T00:02:42Z', 'nvd_published_at': '2013-12-07T20:55:00Z'} |
1.4.0 | GHSA-922h-x9qv-2274 | 2023-03-03T22:51:59Z | 2022-05-24T16:52:45Z | null | ['CVE-2019-10374'] | Jenkins PegDown Formatter Plugin has Cross-site Scripting vulnerability | PegDown Formatter Plugin uses the PegDown library to implement support for rendering Markdown formatted descriptions in Jenkins. It advertises disabling of HTML to prevent cross-site scripting (XSS) as a feature.
PegDown Formatter Plugin does not prevent the use of `javascript:` scheme in URLs for links. This results ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:pegdown-formatte'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10374'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-08-07/#SECURITY-142'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/08/07/1'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T22:51:59Z', 'nvd_published_at': '2019-08-07T15:15:00Z'} |
1.4.0 | GHSA-xqf6-5grh-6223 | 2022-12-22T13:56:42Z | 2022-05-24T17:12:40Z | null | ['CVE-2020-2165'] | Passwords transmitted in plain text by Jenkins Artifactory Plugin | Jenkins Artifactory Plugin 3.6.0 and earlier stores Artifactory server passwords in its global configuration file `org.jfrog.hudson.ArtifactoryBuilder.xml` on the Jenkins controller as part of its configuration.
While the password is stored encrypted on disk since Artifactory Plugin 3.6.0, it is transmitted in plain t... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:artifactory'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2165'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/artifactory-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1542%20(2)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-securit... | {'cwe_ids': ['CWE-319', 'CWE-522'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T13:56:42Z', 'nvd_published_at': '2020-03-25T17:15:00Z'} |
1.4.0 | GHSA-376m-3rm2-9jm6 | 2023-02-14T00:46:20Z | 2022-05-14T03:55:23Z | null | ['CVE-2016-8638'] | Session Fixation in ipsilon | A vulnerability in ipsilon 2.0 before 2.0.2, 1.2 before 1.2.1, 1.1 before 1.1.2, and 1.0 before 1.0.3 was found that allows attacker to log out active sessions of other users. This issue is related to how it tracks sessions, and allows an unauthenticated attacker to view and terminate active sessions from other users.... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ipsilon'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ipsilon'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'t... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-8638'}, {'type': 'WEB', 'url': 'https://github.com/ipsilon-project/ipsilon/commit/1c48414877fc110652b6078a29529972c7ec9122'}, {'type': 'WEB', 'url': 'https://github.com/ipsilon-project/ipsilon/commit/64fc366c054fc6af1d9d2692902db169884b5f78'}, {'ty... | {'cwe_ids': ['CWE-384'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T00:46:20Z', 'nvd_published_at': '2017-07-12T13:29:00Z'} |
1.4.0 | GHSA-hrgc-54mv-58gv | 2022-11-03T19:12:17Z | 2022-05-17T01:42:17Z | null | ['CVE-2012-4387'] | Denial of service in Apache Struts | Apache Struts 2.0.0 through 2.3.4 allows remote attackers to cause a denial of service (CPU consumption) via a long parameter name, which is processed as an OGNL expression. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-4387'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/78183'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/WW-3860'}, {'type': 'WEB', 'url': 'http://struts.apache.org/2.x/docs/s2-011.html'}, {'type':... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T19:12:17Z', 'nvd_published_at': '2012-09-05T23:55:00Z'} |
1.4.0 | GHSA-v3xp-3wpq-rvhp | 2023-07-20T18:11:25Z | 2022-05-13T01:18:33Z | null | ['CVE-2018-0860'] | ChakraCore RCE Vulnerability | Microsoft Edge and ChakraCore in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0834, CVE-2018-0835, CVE-2018-0... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-0860'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/9dac38fa6a6273f4cd57234d3caf4c7033e527bc'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0860'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T18:11:25Z', 'nvd_published_at': '2018-02-15T02:29:00Z'} |
1.4.0 | GHSA-cqj8-47ch-rvvq | 2022-06-23T18:04:48Z | 2022-05-24T17:40:48Z | null | ['CVE-2020-29582'] | Incorrect Default Permissions in JetBrains Kotlin | In JetBrains Kotlin before 1.4.21, a vulnerable Java API was used for temporary file and folder creation. An attacker was able to read data from such files and list directories due to insecure permissions. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jetbrains.kotlin:kotlin-stdlib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.21'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.20'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-29582'}, {'type': 'WEB', 'url': 'https://blog.jetbrains.com'}, {'type': 'WEB', 'url': 'https://blog.jetbrains.com/blog/2021/02/03/jetbrains-security-bulletin-q4-2020/'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2721aba31a856263... | {'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T18:04:48Z', 'nvd_published_at': '2021-02-03T16:15:00Z'} |
1.4.0 | GHSA-mx3q-j2g2-5qxq | 2022-06-30T19:51:21Z | 2022-05-17T02:26:07Z | null | ['CVE-2017-9785'] | Deserialization of Untrusted Data in NancyFX Nancy | Csrf.cs in NancyFX Nancy before 1.4.4 and 2.x before 2.0-dangermouse has Remote Code Execution via Deserialization of JSON data in a CSRF Cookie. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Nancy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.3'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Nancy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introd... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-9785'}, {'type': 'WEB', 'url': 'https://github.com/NancyFx/Nancy/releases/tag/v1.4.4'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-30T19:51:21Z', 'nvd_published_at': '2017-07-20T12:29:00Z'} |
1.4.0 | GHSA-cx94-mrg9-rq4j | 2023-08-29T23:31:24Z | 2022-05-24T22:04:38Z | null | ['CVE-2022-29189'] | Pion/DTLS contains buffer for inbound DTLS fragments with no limit | ### Impact
A buffer that was used for inbound network traffic had no upper limit. Pion DTLS would buffer all network traffic from the remote user until the handshake completes or times out. An attacker could exploit this to cause excessive memory usage.
### Patches
Upgrade to Pion DTLS v2.1.4
### Workarounds
No worka... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/pion/dtls'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/pion/dtls/v2'}, 'ecosystem_specific': {'affected_functions': ... | [{'type': 'WEB', 'url': 'https://github.com/pion/dtls/security/advisories/GHSA-cx94-mrg9-rq4j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29189'}, {'type': 'WEB', 'url': 'https://github.com/pion/dtls/commit/a6397ff7282bc56dc37a68ea9211702edb4de1de'}, {'type': 'WEB', 'url': 'https://github.... | {'cwe_ids': ['CWE-120'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:04:38Z', 'nvd_published_at': '2022-05-21T00:15:00Z'} |
1.4.0 | GHSA-jwpw-q68h-r678 | 2023-03-22T21:26:32Z | 2022-05-24T17:47:44Z | null | [] | Improper Neutralization of CRLF Sequences in dio | The dio package prior to 5.0.0 for Dart allows CRLF injection if the attacker controls the HTTP method string, a different vulnerability than CVE-2020-35669. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Pub', 'name': 'dio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31402'}, {'type': 'WEB', 'url': 'https://github.com/cfug/dio/issues/1130'}, {'type': 'WEB', 'url': 'https://github.com/cfug/dio/commit/927f79e93ba39f3c3a12c190624a55653d577984'}, {'type': 'PACKAGE', 'url': 'https://github.com/cfug/dio'}, {'type': '... | {'cwe_ids': ['CWE-74', 'CWE-88', 'CWE-93'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:27:03Z', 'nvd_published_at': '2021-04-15T19:15:00Z'} |
1.4.0 | GHSA-p94c-r74j-43qg | 2023-07-31T19:09:33Z | 2022-05-14T02:23:18Z | null | ['CVE-2016-3350'] | ChakraCore RCE Vulnerability | The Chakra JavaScript engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-3377. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3350'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/24c4d7df8199b27d360323ce3be1d7959fd918eb'}, {'type': 'WEB', 'url': 'https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-105'}, {'type': 'WEB'... | {'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T19:09:33Z', 'nvd_published_at': '2016-09-14T10:59:00Z'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.