schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 8 154 | details stringlengths 31 19.1k | severity stringlengths 2 92 | affected stringlengths 75 28.5k | references stringlengths 79 7.48k | database_specific stringlengths 131 196 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-q87g-7mp5-765q | 2022-06-24T00:56:46Z | 2022-05-24T17:19:04Z | null | ['CVE-2020-2190'] | Improper Neutralization of Input During Web Page Generation in Jenkins Script Security Plugin | Jenkins Script Security Plugin 1.72 and earlier does not correctly escape pending or approved classpath entries on the In-process Script Approval page, resulting in a stored cross-site scripting vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:script-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.73'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.72'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2190'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-06-03/#SECURITY-1866'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/06/03/3'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T00:56:46Z', 'nvd_published_at': '2020-06-03T13:15:00Z'} |
1.4.0 | GHSA-wjp3-4xcq-598p | 2023-08-29T23:58:02Z | 2022-05-14T03:46:15Z | null | ['CVE-2012-3353'] | Apache Sling JCR ContentLoader XmlReader Arbitrary File Load | The Apache Sling JCR ContentLoader 2.1.4 XmlReader used in the Sling JCR content loader module makes it possible to import arbitrary files in the content repository, including local files, causing potential information leaks. Users should upgrade to version 2.1.6 of the JCR ContentLoader | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.sling:org.apache.sling.jcr.contentloader'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-3353'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/SLING-2512'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/owd2xw86l19dh1f1zlhq41l7wlnd16sk'}] | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T23:58:02Z', 'nvd_published_at': '2018-01-09T02:29:00Z'} |
1.4.0 | GHSA-qvmf-36h5-3f5v | 2022-06-24T00:59:37Z | 2022-05-24T17:08:45Z | null | ['CVE-2020-2110'] | Improper Input Validation in Jenkins Script Security Plugin | Sandbox protection in Jenkins Script Security Plugin 1.69 and earlier could be circumvented during the script compilation phase by applying AST transforming annotations to imports or by using them inside of other annotations. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:script-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.70'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.69'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2110'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-02-12/#SECURITY-1713'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/02/12/3'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T00:59:37Z', 'nvd_published_at': '2020-02-12T15:15:00Z'} |
1.4.0 | GHSA-vcx4-fpmp-mvv6 | 2023-07-13T17:03:25Z | 2022-05-24T19:02:06Z | null | ['CVE-2021-32561'] | OctoPrint API Error Messages vulnerable to XSS | OctoPrint before 1.6.0 allows XSS because API error messages include the values of input parameters. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'OctoPrint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32561'}, {'type': 'PACKAGE', 'url': 'https://github.com/OctoPrint/OctoPrint'}, {'type': 'WEB', 'url': 'https://github.com/OctoPrint/OctoPrint/releases/tag/1.6.0'}, {'type': 'WEB', 'url': 'https://octoprint.org/blog/2021/04/27/new-release-1.6.0/'}, ... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T17:03:25Z', 'nvd_published_at': '2021-05-11T14:15:00Z'} |
1.4.0 | GHSA-h5hw-qrrw-vfxg | 2023-07-21T18:03:32Z | 2022-05-13T01:18:39Z | null | ['CVE-2018-0954'] | ChakraCore RCE Vulnerability | A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka "Scripting Engine Memory Corruption Vulnerability." This affects Internet Explorer 9, ChakraCore, Internet Explorer 11, Microsoft Edge, Internet Explorer 10. This CVE ID is unique from CVE-2... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-0954'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/51c46371c917e87bbde77d66abba088309d96a3f'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0954'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T18:03:32Z', 'nvd_published_at': '2018-05-09T19:29:00Z'} |
1.4.0 | GHSA-j472-mcq2-95p6 | 2022-07-01T21:58:54Z | 2022-05-14T01:04:30Z | null | ['CVE-2017-1000393'] | OS Command Injection in Jenkins | Jenkins 2.73.1 and earlier, 2.83 and earlier users with permission to create or configure agents in Jenkins could configure a launch method called 'Launch agent via execution of command on master'. This allowed them to run arbitrary shell commands on the master node whenever the agent was supposed to be launched. Confi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.73.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.73.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000393'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenkins/commit/67f68c181033cbabf2075769e0f846f58c226c08'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenkins/commit/d7ea3f40efedd50541a57b943d5f7bbed046d091'}, {'type': 'PAC... | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T21:58:54Z', 'nvd_published_at': '2018-01-26T02:29:00Z'} |
1.4.0 | GHSA-87w9-x2c3-hrjj | 2022-07-07T23:28:09Z | 2022-05-14T01:10:35Z | null | ['CVE-2013-4590'] | Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat | Apache Tomcat before 6.0.39, 7.x before 7.0.50, and 8.x before 8.0.0-RC10 allows attackers to obtain "Tomcat internals" information by leveraging the presence of an untrusted web application with a context.xml, web.xml, *.jspx, *.tagx, or *.tld XML document containing an external entity declaration in conjunction with ... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.39'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.5... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4590'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1069911'}, {'type': 'WEB', 'url': 'https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013'}, {'type': 'WEB', 'url': 'https://lists.apache.... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T23:28:09Z', 'nvd_published_at': '2014-02-26T14:55:00Z'} |
1.4.0 | GHSA-4fwh-r866-pvh9 | 2023-07-24T21:41:38Z | 2022-05-14T01:14:50Z | null | ['CVE-2018-20678'] | LibreNMS SQL Injection | LibreNMS through 1.47 allows SQL injection via the html/ajax_table.php sort[hostname] parameter, exploitable by authenticated users during a search. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.65'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.47'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20678'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/pull/11920'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/32f72bc1ab7e980e4070e826a89d0d36a5ba62dd'}, {'type': 'WEB', 'url': 'https://cert.enea.pl/advisor... | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-24T21:41:38Z', 'nvd_published_at': '2019-03-28T16:29:00Z'} |
1.4.0 | GHSA-44p8-c3wv-f28r | 2023-07-07T19:07:21Z | 2022-05-13T01:06:17Z | null | ['CVE-2018-9110'] | Directory Traversal in Studio 42 elFinder | Studio 42 elFinder before 2.1.37 has a directory traversal vulnerability in `elFinder.class.php` with the `zipdl()` function that can allow a remote attacker to download files accessible by the web server process and delete files owned by the account running the web server process. NOTE: this issue exists because of an... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'studio-42/elfinder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.12'}, {'fixed': '2.1.37'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.1.36'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-9110'}, {'type': 'WEB', 'url': 'https://github.com/Studio-42/elFinder/commit/e6351557b86cc10a7651253d2d2aff7f6b918f8e'}, {'type': 'WEB', 'url': 'https://github.com/Studio-42/elFinder/releases/tag/2.1.37'}, {'type': 'WEB', 'url': 'https://github.com... | {'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T19:07:21Z', 'nvd_published_at': '2018-03-28T14:29:00Z'} |
1.4.0 | GHSA-87qx-g5wg-mwmj | 2023-03-10T02:34:50Z | 2022-05-14T01:01:09Z | null | ['CVE-2018-1000078'] | RubyGems Cross-site Scripting vulnerability | RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Cross Site Scripting (XSS) vulnerability in gem server display of homepage attribute that can result in XSS. This atta... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rubygems-update'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jruby:jruby-stdlib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.1.16.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000078'}, {'type': 'WEB', 'url': 'https://github.com/jruby/jruby/commit/0b06b48ab4432237ce5fc1bef47f2c6bcf7843f7'}, {'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems/commit/5971b486d4dbb2bad5d3445b3801c456eb0ce183'}, {'type': 'WEB', 'ur... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-10T02:34:50Z', 'nvd_published_at': '2018-03-13T15:29:00Z'} |
1.4.0 | GHSA-98wx-cw86-c97x | 2023-01-27T00:00:17Z | 2022-05-13T01:10:26Z | null | ['CVE-2017-1000026'] | mixlib-archive Path Traversal vulnerability | Chef Software's mixlib-archive versions 0.3.0 and older are vulnerable to a directory traversal attack allowing attackers to overwrite arbitrary files by using `..` in tar archive entries | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'mixlib-archive'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000026'}, {'type': 'WEB', 'url': 'https://github.com/chef/mixlib-archive/pull/6'}, {'type': 'PACKAGE', 'url': 'https://github.com/chef/mixlib-archive'}, {'type': 'WEB', 'url': 'https://github.com/chef/mixlib-archive/blob/master/CHANGELOG.md'}, {'t... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T00:00:17Z', 'nvd_published_at': '2017-07-17T13:18:00Z'} |
1.4.0 | GHSA-7wfq-wmx2-3wr4 | 2023-07-27T20:01:42Z | 2022-05-17T00:20:01Z | null | ['CVE-2017-16782'] | Home Assistant Frontend XSS Vulnerability | In Home Assistant before 0.57, it is possible to inject JavaScript code into a persistent notification via crafted Markdown text, aka XSS. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'home-assistant-frontend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 0.57'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16782'}, {'type': 'WEB', 'url': 'https://github.com/home-assistant/home-assistant-polymer/pull/514'}, {'type': 'PACKAGE', 'url': 'https://github.com/home-assistant/frontend'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-27T20:01:42Z', 'nvd_published_at': '2017-11-10T23:29:00Z'} |
1.4.0 | GHSA-6w62-83g6-rfhj | 2023-08-17T22:50:28Z | 2022-05-05T00:29:11Z | null | ['CVE-2013-7371'] | Node Connect Reflected Cross-Site Scripting in Sencha Labs Connect middleware | node-connect before 2.8.2 has cross site scripting in Sencha Labs Connect middleware (vulnerability due to incomplete fix for CVE-2013-7370)
### Overview
Connect is a stack of middleware that is executed in order in each request.
The "methodOverride" middleware allows the http post to override the method of the reque... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'connect'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7371'}, {'type': 'WEB', 'url': 'https://github.com/senchalabs/connect/issues/831'}, {'type': 'WEB', 'url': 'https://github.com/senchalabs/connect/commit/126187c4e12162e231b87350740045e5bb06e93a'}, {'type': 'WEB', 'url': 'https://github.com/senchala... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-17T22:50:28Z', 'nvd_published_at': '2019-12-11T15:15:00Z'} |
1.4.0 | GHSA-5pq5-9phv-q5j3 | 2023-07-12T21:14:54Z | 2022-05-24T17:09:38Z | null | ['CVE-2020-8819'] | CardGate Payments plugin for WooCommerce does not validate request origin | An issue was discovered in the CardGate Payments plugin through 3.1.15 for WooCommerce. Lack of origin authentication in the IPN callback processing function in cardgate/cardgate.php allows an attacker to remotely replace critical plugin settings (merchant ID, secret key, etc.) and therefore bypass the payment process ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'cardgate/woocommerce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.16'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.1.15'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8819'}, {'type': 'WEB', 'url': 'https://github.com/cardgate/woocommerce/issues/18'}, {'type': 'WEB', 'url': 'https://github.com/cardgate/woocommerce/pull/17/commits/0b83588d604c8c56c7fded43144fcced96b2ada9'}, {'type': 'PACKAGE', 'url': 'https://git... | {'cwe_ids': ['CWE-346'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T21:14:54Z', 'nvd_published_at': '2020-02-25T02:15:00Z'} |
1.4.0 | GHSA-vr22-43gj-rx3f | 2023-01-27T00:19:36Z | 2022-05-24T17:08:14Z | null | ['CVE-2019-17268'] | omniauth-weibo-oauth2 included a code-execution backdoor inserted by a third party | The omniauth-weibo-oauth2 gem 0.4.6 for Ruby, as distributed on RubyGems.org, included a code-execution backdoor inserted by a third party. Versions through 0.4.5, and 0.5.1 and later, are unaffected. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'omniauth-weibo-oauth2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.6'}, {'fixed': '0.5.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17268'}, {'type': 'WEB', 'url': 'https://github.com/beenhero/omniauth-weibo-oauth2/issues/36'}, {'type': 'WEB', 'url': 'https://diff.coditsu.io/diffs/09a05c37-1b34-49e1-ac94-d4dda40d1ad1#d2h-971595'}, {'type': 'PACKAGE', 'url': 'https://github.com/... | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T00:19:36Z', 'nvd_published_at': '2020-02-07T14:15:00Z'} |
1.4.0 | GHSA-cqp4-cv7h-7jp5 | 2022-12-12T16:31:10Z | 2022-05-14T01:09:56Z | null | ['CVE-2018-1999027'] | Jenkins SaltStack Plugin allows attackers to capture credentials with a known credentials ID stored in Jenkins | An exposure of sensitive information vulnerability exists in Jenkins SaltStack Plugin 3.1.6 and earlier in SaltAPIBuilder.java, SaltAPIStep.java. SaltStack Plugin did not perform permission checks on methods implementing form validation. This allowed users with Overall/Read access to Jenkins to connect to an attacker-s... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:saltstack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.1.6'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1999027'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/saltstack-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-07-30/#SECURITY-1009'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T16:31:10Z', 'nvd_published_at': '2018-08-01T13:29:00Z'} |
1.4.0 | GHSA-xh22-fw58-56pp | 2023-09-21T23:22:16Z | 2022-05-01T18:42:25Z | null | ['CVE-2007-6382'] | Robocode Arbitrary Code Execution | The Event Dispatch Thread in Robocode before 1.5.1 allows remote attackers to execute arbitrary Java code by using a robot to invoke the `SwingUtilities.invokeLater` method. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'net.sf.robocode:robocode.core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-6382'}, {'type': 'WEB', 'url': 'https://github.com/robo-code/robocode/commit/2f2867d24fb28a2478983be57556f2355a774a81'}, {'type': 'WEB', 'url': 'https://github.com/robo-code/robocode/commit/8c6f5d77e7723583ba069ea611c33f22c1e9603a'}, {'type': 'WEB'... | {'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-21T23:22:16Z', 'nvd_published_at': '2007-12-15T02:46:00Z'} |
1.4.0 | GHSA-hc34-f55m-rh3m | 2023-03-03T23:09:55Z | 2022-05-24T16:52:45Z | null | ['CVE-2019-10376'] | Jenkins Wall Display Plugin Cross-site Scripting vulnerability | Wall Display Master Project Plugin does not properly escape the `customTheme` query parameter, resulting in a reflected cross-site scripting vulnerability.
As of publication of this advisory, there is no fix. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:jenkinswalldisplay'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.6.34'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10376'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/walldisplay-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-08-07/#SECURITY-751'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T23:09:55Z', 'nvd_published_at': '2019-08-07T15:15:00Z'} |
1.4.0 | GHSA-7v5v-9v8r-w864 | 2022-07-13T15:29:33Z | 2022-05-13T01:09:21Z | null | ['CVE-2012-5575'] | Inadequate Encryption Strength in Apache CXF | Apache CXF 2.5.x before 2.5.10, 2.6.x before CXF 2.6.7, and 2.7.x before CXF 2.7.4 does not verify that a specified cryptographic algorithm is allowed by the WS-SecurityPolicy AlgorithmSuite definition before decrypting, which allows remote attackers to force CXF to use weaker cryptographic algorithms than intended and... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf-rt-transports-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf-rt-transports-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduce... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-5575'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=880443'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E'}, {'type': ... | {'cwe_ids': ['CWE-326'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T15:29:33Z', 'nvd_published_at': '2013-08-19T23:55:00Z'} |
1.4.0 | GHSA-6jxp-7g74-2rc3 | 2022-06-10T22:42:57Z | 2022-05-02T03:56:13Z | null | ['CVE-2009-4611'] | Improper input validation in Mort Bay Jetty | Mort Bay Jetty 6.x through 6.1.22 and 7.0.0 writes backtrace data without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator, related to (... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.mortbay.jetty:jetty'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.1.23'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.mortbay.jetty:jetty'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-4611'}, {'type': 'WEB', 'url': 'https://fossies.org/linux/jetty-distribution/VERSION.txt'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse/jetty.project'}, {'type': 'WEB', 'url': 'https://www.eclipse.org/jetty/about.php'}, {'type': 'WEB', '... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-10T22:42:57Z', 'nvd_published_at': '2010-01-13T20:30:00Z'} |
1.4.0 | GHSA-w3f7-2qfw-348x | 2022-11-22T19:47:07Z | 2022-05-13T01:18:46Z | null | ['CVE-2018-1000418'] | Jenkins HipChat Plugin allows credential capture due to incorrect authorization | An improper authorization vulnerability exists in Jenkins HipChat Plugin 2.2.0 and earlier in HipChatNotifier.java that allows attackers with Overall/Read access to send test notifications to an attacker-specified HipChat server with attacker-specified credentials IDs obtained through another method, capturing credenti... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jvnet.hudson.plugins:hipchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000418'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-09-25/#SECURITY-984%20(1)'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106532'}] | {'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T19:47:07Z', 'nvd_published_at': '2019-01-09T23:29:00Z'} |
1.4.0 | GHSA-jf9j-hx2j-m9xh | 2022-12-21T00:21:12Z | 2022-05-24T17:27:06Z | null | ['CVE-2020-2240'] | CSRF vulnerability in Jenkins Database Plugin | Database Plugin 1.6 and earlier does not require POST requests for the database console, resulting in a cross-site request forgery (CSRF) vulnerability.
This vulnerability allows attackers to execute arbitrary SQL scripts.
Database Plugin 1.7 removes the database console. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:database'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.6'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2240'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/database-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-09-01/#SECURITY-1023'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/09... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T00:21:12Z', 'nvd_published_at': '2020-09-01T14:15:00Z'} |
1.4.0 | GHSA-9j7m-rjqx-48vh | 2023-03-08T19:16:03Z | 2022-05-14T01:08:27Z | null | ['CVE-2013-4287'] | RubyGems Regular Expression Denial of Service vulnerability | Algorithmic complexity vulnerability in Gem::Version::VERSION_PATTERN in `lib/rubygems/version.rb` in RubyGems before 1.8.23.1, 1.8.24 through 1.8.25, 2.0.x before 2.0.8, and 2.1.x before 2.1.0, as used in Ruby 1.9.0 through 2.0.0p247, allows remote attackers to cause a denial of service (CPU consumption) via a crafted... | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rubygems-update'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.23.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rubygems-update'}, 'ecosystem_specific': {'affected_functions'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4287'}, {'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems/commit/938a7e31ac73655845ab9045629ff3f580a125da'}, {'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems/commit/b697536f2455e8c8853cf5cf8a1017a36031ed67'}, {'type': 'WEB', ... | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-08T19:16:03Z', 'nvd_published_at': '2013-10-17T23:55:00Z'} |
1.4.0 | GHSA-wphq-j78p-fhgp | 2022-12-21T00:21:31Z | 2022-05-24T17:27:06Z | null | ['CVE-2020-2239'] | Secret stored in plain text by Jenkins Parameterized Remote Trigger Plugin | Parameterized Remote Trigger Plugin 3.1.3 and earlier stores a secret unencrypted in its global configuration file `org.jenkinsci.plugins.ParameterizedRemoteTrigger.RemoteBuildConfiguration.xml` on the Jenkins controller as part of its configuration. This secret can be viewed by attackers with access to the Jenkins con... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:Parameterized-Remote-Trigger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.1.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2239'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/parameterized-remote-trigger-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-09-01/#SECURITY-1625'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/... | {'cwe_ids': ['CWE-256'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T00:21:31Z', 'nvd_published_at': '2020-09-01T14:15:00Z'} |
1.4.0 | GHSA-j837-vm6w-6qcv | 2023-09-25T18:59:36Z | 2022-05-24T16:52:23Z | null | ['CVE-2019-7861'] | Magento 2 Community Edition Unsafe File Upload | Insufficient server-side validation of user input could allow an attacker to bypass file upload restrictions in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7861'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20211206084839/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-13'}] | {'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T20:49:22Z', 'nvd_published_at': '2019-08-02T22:15:00Z'} |
1.4.0 | GHSA-23cv-jh4v-vffm | 2022-07-07T23:10:46Z | 2022-05-24T17:06:16Z | null | ['CVE-2020-0602'] | Denial of service in ASP.NET Core | A denial of service vulnerability exists when ASP.NET Core improperly handles web requests, aka 'ASP.NET Core Denial of Service Vulnerability'. | [] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.All'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.15'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-0602'}, {'type': 'WEB', 'url': 'https://github.com/aspnet/Announcements/issues/402'}, {'type': 'WEB', 'url': 'https://github.com/github/advisory-database/issues/302'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0130'}, {'typ... | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T23:10:46Z', 'nvd_published_at': '2020-01-14T23:15:00Z'} |
1.4.0 | GHSA-5824-6jfv-xr3r | 2022-06-09T22:55:49Z | 2022-05-26T00:01:22Z | null | ['CVE-2022-30428'] | Arbitrary file read in ginadmin | In ginadmin through 05-10-2022, the incoming path value is not filtered, resulting in arbitrary file reading. A [patch](https://github.com/gphper/ginadmin/commit/726109f01ad23523715f36f7d272958064666a30) is available on the `master` branch of the repository. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/gphper/ginadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30428'}, {'type': 'WEB', 'url': 'https://github.com/gphper/ginadmin/issues/9'}, {'type': 'WEB', 'url': 'https://github.com/gphper/ginadmin/commit/726109f01ad23523715f36f7d272958064666a30'}, {'type': 'PACKAGE', 'url': 'github.com/gphper/ginadmin'}] | {'cwe_ids': ['CWE-22', 'CWE-552'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-01T21:12:49Z', 'nvd_published_at': '2022-05-25T16:15:00Z'} |
1.4.0 | GHSA-9r3h-wm3x-v245 | 2022-12-29T00:34:12Z | 2022-05-24T17:22:19Z | null | ['CVE-2020-2211'] | RCE vulnerability in ElasticBox Jenkins Kubernetes CI/CD Plugin | ElasticBox Jenkins Kubernetes CI/CD Plugin 1.3 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types. This results in a remote code execution (RCE) vulnerability exploitable by users able to provide YAML input files to ElasticBox Jenkins Kubernetes CI/CD Plugin’s build step. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.elasticbox.jenkins-ci.plugins:kubernetes-ci'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2211'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/kubernetes-ci-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-07-02/#SECURITY-1738'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/20... | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-29T00:34:12Z', 'nvd_published_at': '2020-07-02T15:15:00Z'} |
1.4.0 | GHSA-2959-fj73-hm8p | 2022-12-13T19:26:47Z | 2022-05-24T17:48:06Z | null | ['CVE-2021-21645'] | Missing permission checks in Jenkins Config File Provider Plugin allow enumerating configuration file IDs | Config File Provider Plugin 3.7.0 and earlier does not perform permission checks in several HTTP endpoints.
This allows attackers with Overall/Read permission to enumerate configuration file IDs.
An enumeration of configuration file IDs in Config File Provider Plugin 3.7.1 requires the appropriate permissions. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:config-file-provider'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.7.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.7.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21645'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/config-file-provider-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-04-21/#SECURITY-2203'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss... | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T19:26:47Z', 'nvd_published_at': '2021-04-21T15:15:00Z'} |
1.4.0 | GHSA-jhm9-h84h-rw83 | 2023-04-21T21:07:53Z | 2022-05-24T17:26:05Z | null | ['CVE-2020-8226'] | phpBB Server-Side Request Forgery Vulnerability | A vulnerability exists in phpBB <v3.2.10 and <v3.3.1 which allowed remote image dimensions check to be used to SSRF. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpbb/phpbb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'phpbb/phpbb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.0'}, {'fixed': '3.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8226'}, {'type': 'WEB', 'url': 'https://github.com/phpbb/phpbb-app/commit/0cfaaafb386d58576d200d56f1acdbcc2f2376e8'}, {'type': 'WEB', 'url': 'https://github.com/phpbb/phpbb-app/commit/efc0a146bf12125eeb71d00470af774326a7bf0a'}, {'type': 'WEB', 'url... | {'cwe_ids': ['CWE-610', 'CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-21T21:07:53Z', 'nvd_published_at': '2020-08-17T16:15:00Z'} |
1.4.0 | GHSA-g4j6-m3m3-crw8 | 2022-12-27T22:50:38Z | 2022-05-24T17:23:38Z | null | ['CVE-2020-2221'] | Stored XSS vulnerability in Jenkins upstream cause | Jenkins 2.244 and earlier, LTS 2.235.1 and earlier does not escape the upstream job's display name shown as part of a build cause, resulting in a stored cross-site scripting vulnerability.
Jenkins 2.245, LTS 2.235.2 escapes the job display name. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.235.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.235.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2221'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-07-15/#SECURITY-1901'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/07/15/5'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T00:54:45Z', 'nvd_published_at': '2020-07-15T18:15:00Z'} |
1.4.0 | GHSA-cfvw-84vq-43mx | 2022-12-28T23:43:56Z | 2022-05-24T17:23:39Z | null | ['CVE-2020-2227'] | Stored XSS vulnerability in Jenkins Deployer Framework Plugin | Deployer Framework Plugin is a framework plugin allowing other plugins to provide a way to deploy artifacts. Deployer Framework Plugin 1.2 and earlier does not escape the URL displayed in the build home page. This results in a stored cross-site scripting (XSS) vulnerability exploitable by users able to provide the loca... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:deployer-framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2227'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/deployer-framework-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-07-15/#SECURITY-1915'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-securi... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-28T23:43:56Z', 'nvd_published_at': '2020-07-15T18:15:00Z'} |
1.4.0 | GHSA-m4j5-hgqq-5jf2 | 2022-11-04T20:36:38Z | 2022-05-13T01:36:55Z | null | ['CVE-2017-2589'] | Insecure cookie sharing in Hawtio | It was discovered that the hawtio servlet 1.4 uses a single HttpClient instance to proxy requests with a persistent cookie store (cookies are stored locally and are not passed between the client and the end URL) which means all clients using that proxy are sharing the same cookies. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.hawt:project'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-2589'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1832'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2589'}, {'type': 'PACKAGE', 'url': 'https://github.com/hawtio/hawtio'}, {'type': 'WEB', ... | {'cwe_ids': ['CWE-200'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-04T20:36:38Z', 'nvd_published_at': '2018-07-26T15:29:00Z'} |
1.4.0 | GHSA-7qcx-4p32-qcmx | 2022-06-08T18:04:47Z | 2022-05-25T19:34:20Z | null | ['CVE-2022-29229'] | Missing Cryptographic Step in cassproject | ### Impact
CaSS Library, (npm:cassproject) has a missing cryptographic step when storing cryptographic keys that can allow a server administrator access to an account’s cryptographic keys. This affects CaSS servers using standalone username/password authentication, which uses a method that expects e2e cryptographic sec... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'cassproject'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.8'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/cassproject/CASS/security/advisories/GHSA-7qcx-4p32-qcmx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29229'}, {'type': 'PACKAGE', 'url': 'https://github.com/cassproject/CASS'}, {'type': 'WEB', 'url': 'https://github.com/cassproject/CASS/releases/... | {'cwe_ids': ['CWE-325'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T19:34:20Z', 'nvd_published_at': '2022-05-18T21:15:00Z'} |
1.4.0 | GHSA-v8wm-g9f2-xjv4 | 2023-07-21T22:50:51Z | 2022-05-13T01:49:32Z | null | ['CVE-2018-12291'] | Matrix Synapse Security Filtering Flaw | The `on_get_missing_events` function in handlers/federation.py in Matrix Synapse before 0.31.1 has a security bug in the get_missing_events federation API where event visibility rules were not applied correctly. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'matrix-synapse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.31.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-12291'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/pull/3371'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/releases/tag/v0.31.1'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T22:50:51Z', 'nvd_published_at': '2018-06-13T14:29:00Z'} |
1.4.0 | GHSA-q5f8-fxrx-pw6f | 2023-02-04T00:30:40Z | 2022-05-05T02:48:48Z | null | ['CVE-2013-0328'] | Jenkins subject to Cross-site Scripting | Cross-site scripting (XSS) vulnerability in Jenkins before 1.502 and LTS before 1.480.3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.502'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0328'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2013-0328'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=914876'}, {'type': 'WEB', 'url': 'https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Secur... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-04T00:30:40Z', 'nvd_published_at': '2013-03-19T14:55:00Z'} |
1.4.0 | GHSA-f8wg-36r9-7f4q | 2022-06-08T22:28:53Z | 2022-05-01T18:45:57Z | null | ['CVE-2007-6736'] | Directory Traversal in pyftpdlib | Python FTP server library provides a high-level portable interface to easily write very efficient, scalable and asynchronous FTP servers with Python. Multiple directory traversal vulnerabilities in FTPServer.py in pyftpdlib before 0.2.0 allow remote authenticated users to access arbitrary files and directories via a ..... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pyftpdlib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-6736'}, {'type': 'WEB', 'url': 'https://github.com/giampaolo/pyftpdlib/issues/9'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-f8wg-36r9-7f4q'}, {'type': 'PACKAGE', 'url': 'https://github.com/giampaolo/pyftpdlib'}, {'type': 'WEB... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-08T22:28:53Z', 'nvd_published_at': '2010-10-19T20:00:00Z'} |
1.4.0 | GHSA-hrwc-pqfm-g6qf | 2022-12-12T19:10:15Z | 2022-05-17T00:29:00Z | null | ['CVE-2017-1000085'] | Jenkins Subversion Plugin Cross-Site Request Forgery vulnerability | Subversion Plugin connects to a user-specified Subversion repository as part of form validation (e.g. to retrieve a list of tags). This functionality improperly checked permissions, allowing any user with Item/Build permission (but not Item/Configure) to connect to any web server or Subversion server and send credentia... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:subversion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000085'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/subversion-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2017-07-10/'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20171119065136/http://www.secur... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T19:10:15Z', 'nvd_published_at': '2017-10-05T01:29:00Z'} |
1.4.0 | GHSA-6fw8-vf2x-4wpm | 2023-08-03T21:41:23Z | 2022-05-17T03:29:57Z | null | ['CVE-2015-3935'] | Dolibarr ERP and CRM contain Cross-site Scripting Vulnerability | Multiple cross-site scripting (XSS) vulnerabilities in Dolibarr ERP/CRM 3.5 and 3.6 allow remote attackers to inject arbitrary web script or HTML via the Business Search (`search_nom`) field to (1) `htdocs/societe/societe.php` or (2) `htdocs/societe/admin/societe.php`. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5.0'}, {'fixed': '3.5.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3935'}, {'type': 'WEB', 'url': 'https://github.com/Dolibarr/dolibarr/issues/2857'}, {'type': 'WEB', 'url': 'https://github.com/Dolibarr/dolibarr/issues/4291'}, {'type': 'WEB', 'url': 'https://github.com/Dolibarr/dolibarr/issues/4341'}, {'type': 'WE... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T21:41:23Z', 'nvd_published_at': '2015-06-10T14:59:00Z'} |
1.4.0 | GHSA-x37x-3fw2-5qw2 | 2022-12-21T16:48:53Z | 2022-05-24T17:06:23Z | null | ['CVE-2020-2098'] | CSRF vulnerability in Jenkins Sounds Plugin allow OS command execution | A cross-site request forgery vulnerability in Jenkins Sounds Plugin 0.5 and earlier allows attacker to execute arbitrary OS commands as the OS user account running Jenkins. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:sounds'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2098'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/sounds-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-01-15/#SECURITY-814'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T16:48:53Z', 'nvd_published_at': '2020-01-15T16:15:00Z'} |
1.4.0 | GHSA-mpx3-mx2p-9gv3 | 2022-07-07T22:51:10Z | 2022-05-17T04:46:05Z | null | ['CVE-2014-1216'] | Improper Neutralization of Special Elements used in a Command in FitNesse Wiki | FitNesse Wiki 20131110, 20140201, and earlier allows remote attackers to execute arbitrary commands by defining a COMMAND_PATTERN and TEST_RUNNER in the pageContent parameter when editing a page. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.fitnesse:fitnesse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '20131110'}, {'fixed': '20140418'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-1216'}, {'type': 'WEB', 'url': 'http://www.exploit-db.com/exploits/32568'}] | {'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T22:51:10Z', 'nvd_published_at': '2014-04-22T13:06:00Z'} |
1.4.0 | GHSA-mf98-r2gf-2x3w | 2023-02-08T18:06:46Z | 2022-05-14T01:58:49Z | null | ['CVE-2012-4456'] | OpenStack Keystone Improper Authentication vulnerability | The (1) OS-KSADM/services and (2) tenant APIs in OpenStack Keystone Essex before 2012.1.2 and Folsom before folsom-2 do not properly validate X-Auth-Token, which allow remote attackers to read the roles for an arbitrary user or get, create, or delete arbitrary services. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'keystone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2012.1'}, {'fixed': '2012.1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-4456'}, {'type': 'WEB', 'url': 'https://github.com/openstack/keystone/commit/14b136aed9d988f5a8f3e699bd4577c9b874d6c1'}, {'type': 'WEB', 'url': 'https://github.com/openstack/keystone/commit/1d146f5c32e58a73a677d308370f147a3271c2cb'}, {'type': 'WEB'... | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T18:06:46Z', 'nvd_published_at': '2012-10-09T15:55:00Z'} |
1.4.0 | GHSA-jrcc-7jf5-3pxg | 2022-11-01T22:32:14Z | 2022-05-17T00:26:04Z | null | ['CVE-2017-5636'] | Injection in Apache NiFi | In Apache NiFi before 0.7.2 and 1.x before 1.1.2 in a cluster environment, the proxy chain serialization/deserialization is vulnerable to an injection attack where a carefully crafted username could impersonate another user and gain their permissions on a replicated request to another node. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-5636'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security.html#CVE-2017-5636'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/96731'}] | {'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T22:32:14Z', 'nvd_published_at': '2017-10-19T20:29:00Z'} |
1.4.0 | GHSA-7v9p-34r2-q668 | 2022-12-21T16:49:28Z | 2022-05-24T17:30:18Z | null | ['CVE-2020-2288'] | Incorrect default pattern in Jenkins Audit Trail Plugin | Audit Trail Plugin uses regular expressions to match requested URLs whose dispatch should be logged.
In Audit Trail Plugin 3.6 and earlier, the default regular expression pattern could be bypassed in many cases by adding a suffix to the URL that would be ignored during request handling.
Audit Trail Plugin 3.7 changes... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:audit-trail'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2288'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/audit-trail-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-10-08/#SECURITY-1846'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/... | {'cwe_ids': ['CWE-185'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T16:49:28Z', 'nvd_published_at': '2020-10-08T13:15:00Z'} |
1.4.0 | GHSA-pgxv-h967-fw2q | 2022-06-28T23:29:01Z | 2022-05-13T01:01:01Z | null | ['CVE-2018-1999005'] | Improper Neutralization of Input During Web Page Generation in Jenkins | A cross-site scripting vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in BuildTimelineWidget.java, BuildTimelineWidget/control.jelly that allows attackers with Job/Configure permission to define JavaScript that would be executed in another user's browser when that other user performs some UI act... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.121.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.122'},... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1999005'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-07-18/#SECURITY-944'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T23:29:01Z', 'nvd_published_at': '2018-07-23T19:29:00Z'} |
1.4.0 | GHSA-h648-gj34-5x4r | 2022-12-15T16:39:54Z | 2022-05-24T19:20:32Z | null | ['CVE-2021-43578'] | Agent-to-controller security bypass in Jenkins Squash TM Publisher (Squash4Jenkins) Plugin allows writing arbitrary files | Jenkins Squash TM Publisher (Squash4Jenkins) Plugin 1.0.0 and earlier implements an agent-to-controller message that does not implement any validation of its input, allowing attackers able to control agent processes to replace arbitrary files on the Jenkins controller file system with an attacker-controlled JSON string... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:squashtm-publisher-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43578'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/squashtm-publisher-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-11-12/#SECURITY-2525'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-s... | {'cwe_ids': ['CWE-693'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T16:39:54Z', 'nvd_published_at': '2021-11-12T11:15:00Z'} |
1.4.0 | GHSA-4q47-ph87-fq4f | 2022-12-22T13:54:52Z | 2022-05-24T17:12:40Z | null | ['CVE-2020-2164'] | Passwords stored in plain text by Jenkins Artifactory Plugin | Artifactory Plugin 3.5.0 and earlier stores its Artifactory server password in plain text in the global configuration file `org.jfrog.hudson.ArtifactoryBuilder.xml`. This password can be viewed by users with access to the Jenkins controller file system.
Artifactory Plugin 3.6.0 now stores the Artifactory server passwo... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:artifactory'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2164'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/artifactory-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1542%20(1)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-securit... | {'cwe_ids': ['CWE-312'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T13:54:52Z', 'nvd_published_at': '2020-03-25T17:15:00Z'} |
1.4.0 | GHSA-6pq6-crw9-522h | 2023-09-26T16:56:00Z | 2022-05-24T17:00:04Z | null | ['CVE-2019-18608'] | Cezerin Unauthorized Acces | Cezerin v0.33.0 allows unauthorized order-information modification because certain internal attributes can be overwritten via a conflicting name when processing order requests. Hence, a malicious customer can manipulate an order (e.g., its payment status or shipping fee) by adding additional attributes to user-input du... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'cezerin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.33.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-18608'}, {'type': 'PACKAGE', 'url': 'https://github.com/cezerin/cezerin'}, {'type': 'WEB', 'url': 'https://github.com/cl0udz/vulnerabilities/blob/master/cezerin-manipulate_order_information/README.md'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T20:46:17Z', 'nvd_published_at': '2019-10-29T19:15:00Z'} |
1.4.0 | GHSA-vr4j-gj8q-m89v | 2023-07-28T20:38:01Z | 2022-05-14T02:22:46Z | null | ['CVE-2016-7189'] | ChakraCore RCE Vulnerability | The Chakra JavaScript engine in Microsoft Edge allows remote attackers to execute arbitrary code via a crafted web site, aka "Scripting Engine Remote Code Execution Vulnerability." | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-7189'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/1737'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/f05c42e64c3b2d057ae1a52fe1917af26c9f2737'}, {'type': 'WEB', 'url': 'https://docs.microso... | {'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T20:38:01Z', 'nvd_published_at': '2016-10-14T02:59:00Z'} |
1.4.0 | GHSA-286v-pcf5-25rc | 2023-07-10T13:02:03Z | 2022-05-24T19:02:26Z | null | ['CVE-2021-3537'] | Nokogiri Implements libxml2 version vulnerable to null pointer dereferencing | A vulnerability found in libxml2 in versions before 2.9.11 shows that it did not propagate errors while parsing XML mixed content, causing a NULL dereference. If an untrusted XML document was parsed in recovery mode and post-validated, the flaw could be used to crash the application. The highest threat from this vulner... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3537'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1956522'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2021-3537.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com... | {'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-05T21:11:25Z', 'nvd_published_at': '2021-05-14T20:15:00Z'} |
1.4.0 | GHSA-4465-r2hg-v4rj | 2023-08-29T18:45:53Z | 2022-05-17T04:52:06Z | null | ['CVE-2013-4662'] | CiviCRM SQL injection vulnerability via Quick Search API | The Quick Search API in CiviCRM 4.2.0 through 4.2.9 and 4.3.0 through 4.3.3 allows remote authenticated users to bypass the validation layer and conduct SQL injection attacks via a direct request to the "second layer" of the API, related to contact.getquick. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'civicrm/civicrm-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.9'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'civicrm/civicrm-core'}, 'ecosystem_specific': {'affect... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4662'}, {'type': 'WEB', 'url': 'https://civicrm.org/advisory/civi-sa-2013-004-limited-sql-injection-quick-search-api'}, {'type': 'PACKAGE', 'url': 'https://github.com/civicrm/civicrm-core'}, {'type': 'WEB', 'url': 'https://issues.civicrm.org/jira/b... | {'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T18:45:53Z', 'nvd_published_at': '2014-01-29T18:55:00Z'} |
1.4.0 | GHSA-xhj7-jr45-5w8r | 2022-11-22T18:57:10Z | 2022-05-13T01:47:05Z | null | ['CVE-2017-7688'] | Apache OpenMeetings updates user password in insecure manner | Apache OpenMeetings 1.0.0 updates user password in insecure manner. This issue is fixed in version 3.3.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.openmeetings:openmeetings-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '3.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7688'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/openmeetings'}, {'type': 'WEB', 'url': 'http://markmail.org/message/ctsiiqtekzsun6fi'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/99586'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T18:57:10Z', 'nvd_published_at': '2017-07-17T13:18:00Z'} |
1.4.0 | GHSA-wx66-pm7r-2q82 | 2022-12-15T17:27:58Z | 2022-05-24T17:45:44Z | null | ['CVE-2021-21630'] | Stored XSS vulnerability in Jenkins Extra Columns Plugin | Extra Columns Plugin 1.22 and earlier does not escape parameter values in the build parameters column.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission. Additionally, a view containing such a job needs to be configured with the build parameters co... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:extra-columns'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.23'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.22'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21630'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/extra-columns-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2222'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-securi... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T17:27:58Z', 'nvd_published_at': '2021-03-30T12:16:00Z'} |
1.4.0 | GHSA-qjpq-5pq3-43rr | 2022-07-07T22:43:07Z | 2022-05-14T01:18:38Z | null | ['CVE-2014-3490'] | Incorrect Privilege Assignment in RESTEasy | RESTEasy 2.3.1 before 2.3.8.SP2 and 3.x before 3.0.9, as used in Red Hat JBoss Enterprise Application Platform (EAP) 6.3.0, does not disable external entities when the resteasy.document.expand.entity.references parameter is set to false, which allows remote attackers to read arbitrary files and have other unspecified i... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:resteasy-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.1'}, {'fixed': '2.3.8.SP2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.3.8.SP1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:r... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3490'}, {'type': 'WEB', 'url': 'https://github.com/resteasy/Resteasy/pull/521'}, {'type': 'WEB', 'url': 'https://github.com/resteasy/Resteasy/pull/533'}, {'type': 'WEB', 'url': 'https://github.com/ronsigal/Resteasy/commit/9b7d0f574cafdcf3bea5428f31... | {'cwe_ids': ['CWE-266'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T22:43:07Z', 'nvd_published_at': '2014-08-19T18:55:00Z'} |
1.4.0 | GHSA-jr84-p554-62pm | 2023-08-22T14:23:11Z | 2022-05-24T17:14:32Z | null | ['CVE-2020-0969'] | ChakraCore RCE Vulnerability | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge (HTML-based), aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.18'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-0969'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/6420'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/cd58e8e6799ab11b02a1cfc30bac9a2171dabd4d'}, {'type': 'PACKAGE', 'url': 'https://github.c... | {'cwe_ids': ['CWE-119', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T18:10:46Z', 'nvd_published_at': '2020-04-15T15:15:00Z'} |
1.4.0 | GHSA-qmwh-rh2g-3682 | 2023-08-01T22:57:00Z | 2022-05-24T16:52:24Z | null | ['CVE-2019-7875'] | Magento 2 Community Edition Cross-site Scripting Vulnerability | A stored cross-site scripting vulnerability exists in the admin panel of Magento Open Source prior to 1.9.4.2, and Magento Commerce prior to 1.14.4.2, Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This could be exploited by an authenticated user with privileges to newsletter templ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7875'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051916/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-23'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T22:57:00Z', 'nvd_published_at': '2019-08-02T22:15:00Z'} |
1.4.0 | GHSA-h8w6-c53g-53vv | 2022-12-21T16:47:24Z | 2022-05-24T17:06:23Z | null | ['CVE-2020-2097'] | Missing permission checks in Jenkins Sounds Plugin allow OS command execution | Jenkins Sounds Plugin 0.5 and earlier does not perform permission checks in URLs performing form validation, allowing attackers with Overall/Read access to execute arbitrary OS commands as the OS user account running Jenkins. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:sounds'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2097'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/sounds-plugin/commit/0c376d46fd91b12696e5f7389110ddece0724457'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-01-15/#SECURITY-814'}] | {'cwe_ids': ['CWE-285'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T16:47:24Z', 'nvd_published_at': '2020-01-15T16:15:00Z'} |
1.4.0 | GHSA-28x9-hc4p-9vh2 | 2022-12-29T01:43:13Z | 2022-05-24T17:28:25Z | null | ['CVE-2020-2262'] | Stored XSS vulnerability in android-lint Plugin | Jenkins Android Lint Plugin 2.6 and earlier does not escape the annotation message in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide report files to the plugin's post-build step. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jvnet.hudson.plugins:android-lint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2262'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/android-lint-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1908'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-29T01:43:13Z', 'nvd_published_at': '2020-09-16T14:15:00Z'} |
1.4.0 | GHSA-c735-g9f2-2mvp | 2022-12-22T05:23:28Z | 2022-05-24T17:12:40Z | null | ['CVE-2020-2160'] | Cross-Site Request Forgery in Jenkins | An extension point in Jenkins allows selectively disabling cross-site request forgery (CSRF) protection for specific URLs.\n\nImplementations of that extension point received a different representation of the URL path than the Stapler web framework uses to dispatch requests in Jenkins 2.227 and earlier, LTS 2.204.5 and... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.228'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.204.5'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2160'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1774'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/03/25/2'}] | {'cwe_ids': ['CWE-352', 'CWE-435'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T00:58:56Z', 'nvd_published_at': '2020-03-25T17:15:00Z'} |
1.4.0 | GHSA-fv3c-6cw7-2qcq | 2022-12-12T15:54:53Z | 2022-05-17T00:33:25Z | null | ['CVE-2017-1000093'] | Jenkins Poll SCM Plugin vulnerable to Cross-Site Request Forgery | Jenkins Poll SCM Plugin was not requiring requests to its API be sent via POST, thereby opening itself to Cross-Site Request Forgery attacks. This allowed attackers to initiate polling of projects with a known name. While Jenkins in general does not consider polling to be a protection-worthy action as it's similar to c... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:pollscm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000093'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/pollscm-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2017-07-10/'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T15:54:53Z', 'nvd_published_at': '2017-10-05T01:29:00Z'} |
1.4.0 | GHSA-7rx6-4vwv-432g | 2023-08-04T19:15:59Z | 2022-05-24T17:48:06Z | null | ['CVE-2021-21647'] | Missing permission check in CloudBees CD Plugin allows scheduling builds | CloudBees CD Plugin does not perform a permission check in an HTTP endpoint.
This allows attackers with Item/Read permission to schedule builds of projects without having Item/Build permission.
CloudBees CD Plugin requires Item/Build permission to schedule builds via its HTTP endpoint. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:electricflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.18.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:electricflow'}, 'ecosyste... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21647'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/electricflow-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-04-21/#SECURITY-2309'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-securit... | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T19:28:45Z', 'nvd_published_at': '2021-04-21T15:15:00Z'} |
1.4.0 | GHSA-qm6v-cg9v-53j3 | 2022-05-25T20:16:36Z | 2022-05-25T20:16:36Z | null | ['CVE-2022-29237'] | Limited Authentication Bypass for Media Files | Prior to Opencast 10.14 and 11.7, users could pass along URLs for files belonging to organizations other than the user's own, which Opencast would then import into the current organization, bypassing organizational barriers.
### Impact
The vulnerability allows attackers to bypass organizational barriers. Attackers mu... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.opencastproject:opencast-ingest-service-impl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.14'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.opencastproject:opencast-ingest-service-impl'}, 'ranges': [{'type': 'ECOSYSTEM', 'even... | [{'type': 'WEB', 'url': 'https://github.com/opencast/opencast/security/advisories/GHSA-qm6v-cg9v-53j3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29237'}, {'type': 'WEB', 'url': 'https://github.com/opencast/opencast/commit/8d5ec1614eed109b812bc27b0c6d3214e456d4e7'}, {'type': 'PACKAGE', 'ur... | {'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T20:16:36Z', 'nvd_published_at': '2022-05-24T15:15:00Z'} |
1.4.0 | GHSA-h7jc-pg2r-mqj4 | 2023-08-29T19:00:42Z | 2022-05-17T04:58:31Z | null | ['CVE-2013-4714'] | Tiki Wiki CMS Groupware Cross-site scripting (XSS) vulnerability | Cross-site scripting (XSS) vulnerability in Tiki Wiki CMS Groupware 6 LTS before 6.13LTS, 9 LTS before 9.7LTS, 10.x before 10.4, and 11.x before 11.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'tikiwiki/tiki-manager'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0'}, {'fixed': '6.13'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'tikiwiki/tiki-manager'}, 'ecosystem_specific': {'affecte... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4714'}, {'type': 'PACKAGE', 'url': 'https://github.com/TikiWiki/tiki-manager'}, {'type': 'WEB', 'url': 'https://tiki.org/article401-New-Versions-of-all-supported-versions-of-Tiki-Wiki-CMS-Groupware'}, {'type': 'WEB', 'url': 'http://info.tiki.org/ar... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T19:00:42Z', 'nvd_published_at': '2013-11-06T15:55:00Z'} |
1.4.0 | GHSA-x895-2wrm-hvp7 | 2023-08-16T22:52:39Z | 2022-05-17T02:39:13Z | null | ['CVE-2014-1932'] | PIL and Pillow Vulnerable to Symlink Attack on Tmpfiles | The (1) `load_djpeg` function in `JpegImagePlugin.py`, (2) `Ghostscript` function in `EpsImagePlugin.py`, (3) `load` function in `IptcImagePlugin.py`, and (4) `_copy` function in `Image.py` in Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 do not properly create temporary files, which allow local ... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'pillow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-1932'}, {'type': 'WEB', 'url': 'https://github.com/python-imaging/Pillow/commit/4e9f367dfd3f04c8f5d23f7f759ec12782e10ee7'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737059'}, {'type': 'WEB', 'url': 'https://security... | {'cwe_ids': ['CWE-59'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T22:52:39Z', 'nvd_published_at': '2014-04-17T14:55:00Z'} |
1.4.0 | GHSA-h3ch-5pp2-vh6w | 2022-05-25T22:52:21Z | 2022-05-14T00:01:50Z | null | ['CVE-2022-25762'] | Improper socket reuse in Apache Tomcat | If a web application sends a WebSocket message concurrently with the WebSocket connection closing when running on Apache Tomcat 8.5.0 to 8.5.75 or Apache Tomcat 9.0.0.M1 to 9.0.20, it is possible that the application will continue to use the socket after it has been closed. The error handling triggered in this case cou... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.5.0'}, {'fixed': '8.5.75'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0M1'}, {'fixed': ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25762'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/6ckmjfb1k61dyzkto9vm2k5jvt4o7w7c'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220629-0003/'},... | {'cwe_ids': ['CWE-404'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T22:52:21Z', 'nvd_published_at': '2022-05-13T08:15:00Z'} |
1.4.0 | GHSA-qq38-mxpq-rrpj | 2022-12-28T23:44:46Z | 2022-05-24T17:23:39Z | null | ['CVE-2020-2228'] | Improper authorization of users and groups with the same base name in Jenkins GitLab Authentication Plugin | GitLab Authentication Plugin 1.5 and earlier does not differentiate between user names and hierarchical group names when performing authorization. This allows an attacker with permissions to create groups in GitLab to gain the privileges granted to another user or group.
GitLab Authentication Plugin 1.6 performs user ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:gitlab-oauth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.5'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2228'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/gitlab-oauth-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-07-15/#SECURITY-1792'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/202... | {'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-28T23:44:46Z', 'nvd_published_at': '2020-07-15T18:15:00Z'} |
1.4.0 | GHSA-9fq2-x9r6-wfmf | 2023-09-26T16:36:14Z | 2022-05-24T22:00:57Z | null | ['CVE-2019-6446'] | Numpy Deserialization of Untrusted Data | ** DISPUTED ** An issue was discovered in NumPy 1.16.0 and earlier. It uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, as demonstrated by a numpy.load call. NOTE: third parties dispute this issue because it is a behavior that might have... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'numpy'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.16.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-6446'}, {'type': 'WEB', 'url': 'https://github.com/numpy/numpy/issues/12759'}, {'type': 'WEB', 'url': 'https://github.com/numpy/numpy/pull/12889'}, {'type': 'WEB', 'url': 'https://bugzilla.suse.com/show_bug.cgi?id=1122208'}, {'type': 'PACKAGE', 'ur... | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T20:19:35Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pwg7-4hxv-v4cw | 2022-11-01T22:59:13Z | 2022-05-24T17:01:41Z | null | ['CVE-2019-16543'] | Plaintext Storage in Jenkins Spira Importer Plugin | Jenkins Spira Importer Plugin 3.2.2 and earlier stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'com.inflectra.spiratest.plugins:inflectra-spira-integration'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16543'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-11-21/#SECURITY-1554'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/11/21/1'}] | {'cwe_ids': ['CWE-256'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T22:59:13Z', 'nvd_published_at': '2019-11-21T15:15:00Z'} |
1.4.0 | GHSA-8787-63px-3m23 | 2023-02-08T18:08:11Z | 2022-05-13T01:54:14Z | null | ['CVE-2018-10931'] | Cobbler has Exposed Dangerous Method or Function | It was found that cobbler 2.6.x exposed all functions from its CobblerXMLRPCInterface class over XMLRPC. A remote, unauthenticated attacker could use this flaw to gain high privileges within cobbler, upload files to arbitrary location in the context of the daemon. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'cobbler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '3.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-10931'}, {'type': 'WEB', 'url': 'https://github.com/cobbler/cobbler/issues/1916'}, {'type': 'WEB', 'url': 'https://github.com/cobbler/cobbler/pull/1921'}, {'type': 'WEB', 'url': 'https://github.com/cobbler/cobbler/commit/1b91a3d3ac87c31d9dac2307513... | {'cwe_ids': ['CWE-749'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T18:08:11Z', 'nvd_published_at': '2018-08-09T20:29:00Z'} |
1.4.0 | GHSA-2vv3-56qg-g2cf | 2022-05-24T22:10:01Z | 2022-05-24T22:10:01Z | null | ['CVE-2022-29200'] | Missing validation causes denial of service via `LSTMBlockCell` | ### Impact
The implementation of [`tf.raw_ops.LSTMBlockCell`](https://github.com/tensorflow/tensorflow/blob/f3b9bf4c3c0597563b289c0512e98d4ce81f886e/tensorflow/core/kernels/rnn/lstm_ops.cc) does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service at... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2vv3-56qg-g2cf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29200'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/803404044ae7a1efac48ba82d74111fce1ddb09a'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-1284', 'CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:10:01Z', 'nvd_published_at': '2022-05-20T22:16:00Z'} |
1.4.0 | GHSA-gfhj-524q-gcrm | 2022-12-27T22:58:48Z | 2022-05-24T17:23:38Z | null | ['CVE-2020-2223'] | Stored XSS vulnerability in Jenkins console links | Jenkins 2.244 and earlier, LTS 2.235.1 and earlier does not escape the `href` attribute of links to downstream jobs displayed in the build console page. This results in a stored cross-site scripting (XSS) vulnerability exploitable by users with Job/Configure permission.
Jenkins 2.245, LTS 2.235.2 escapes the `href` at... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.235.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.235.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2223'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-07-15/#SECURITY-1945'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/07/15/5'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T00:54:18Z', 'nvd_published_at': '2020-07-15T18:15:00Z'} |
1.4.0 | GHSA-9hg7-xmf8-jxf9 | 2022-12-19T23:52:11Z | 2022-05-24T17:29:16Z | null | ['CVE-2020-2283'] | Stored XSS vulnerability in Jenkins Liquibase Runner Plugin | Liquibase Runner Plugin 1.4.5 and earlier does not escape changeset contents when showing them on the build page.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide Liquibase changesets evaluated by the plugin.
Liquibase Runner Plugin 1.4.7 no longer supports ev... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:liquibase-runner'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.5'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2283'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/liquibase-runner-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-09-23/#SECURITY-1885'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secu... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-19T23:52:11Z', 'nvd_published_at': '2020-09-23T14:15:00Z'} |
1.4.0 | GHSA-hxcw-pqqc-rv85 | 2023-07-21T21:45:40Z | 2022-05-13T01:39:42Z | null | ['CVE-2018-7251'] | Anchor CMS Logs Credentials | An issue was discovered in `config/error.php` in Anchor 0.12.3. The error log is exposed at an errors.log URI, and contains MySQL credentials if a MySQL error (such as "Too many connections") has occurred. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'anchorcms/anchor-cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.12.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-7251'}, {'type': 'WEB', 'url': 'https://github.com/anchorcms/anchor-cms/issues/1247'}, {'type': 'WEB', 'url': 'https://github.com/anchorcms/anchor-cms/releases/tag/0.12.7'}, {'type': 'WEB', 'url': 'https://twitter.com/finnwea/status/965279233030393... | {'cwe_ids': ['CWE-200'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T21:45:40Z', 'nvd_published_at': '2018-02-19T22:29:00Z'} |
1.4.0 | GHSA-pg59-2w33-8vmc | 2023-03-03T22:49:24Z | 2022-05-24T16:52:45Z | null | ['CVE-2019-10372'] | Jenkins Gitlab Authentication Plugin Open Redirect vulnerability | GitLab Authentication Plugin records the HTTP `Referer` header when the authentication process starts and redirects users to that URL when the user has finished logging in.
This implements an open redirect, allowing malicious sites to implement a phishing attack, with users expecting they have just logged in to Jenkin... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:gitlab-oauth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10372'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-08-07/#SECURITY-796'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/08/07/1'}] | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T22:49:24Z', 'nvd_published_at': '2019-08-07T15:15:00Z'} |
1.4.0 | GHSA-w7pm-cc4v-f3g8 | 2022-06-23T06:57:17Z | 2022-05-24T17:12:05Z | null | ['CVE-2020-7961'] | Deserialization of Untrusted Data in Liferay Portal | Deserialization of Untrusted Data in Liferay Portal prior to 7.2.1 CE GA2 allows remote attackers to execute arbitrary code via JSON web services (JSONWS). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.liferay.portal:com.liferay.portal-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.2.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.2.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7961'}, {'type': 'PACKAGE', 'url': 'https://github.com/liferay/liferay-portal'}, {'type': 'WEB', 'url': 'https://portal.liferay.dev/learn/security/known-vulnerabilities'}, {'type': 'WEB', 'url': 'https://portal.liferay.dev/learn/security/known-vuln... | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T06:57:17Z', 'nvd_published_at': '2020-03-20T19:15:00Z'} |
1.4.0 | GHSA-9347-9w64-q5wp | 2023-08-17T22:33:35Z | 2022-05-14T02:05:10Z | null | ['CVE-2013-2027'] | Jython Improper Access Restrictions vulnerability | Jython before 2.7.2b3 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.python:jython-standalone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2b3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2027'}, {'type': 'WEB', 'url': 'https://github.com/jython/frozen-mirror/commit/053949e66d307168fd70b39725f4d3e6b642acc1'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=947949'}, {'type': 'WEB', 'url': 'https://github.com/jyth... | {'cwe_ids': ['CWE-281'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-17T22:33:35Z', 'nvd_published_at': '2015-02-13T15:59:00Z'} |
1.4.0 | GHSA-wvfw-w3x6-g526 | 2023-09-28T20:30:59Z | 2022-05-14T01:10:43Z | null | ['CVE-2019-5715'] | Silverstripe Framework SQLi Vulnerability | All versions of SilverStripe 3 prior to 3.6.7 and 3.7.3, and all versions of SilverStripe 4 prior to 4.0.7, 4.1.5, 4.2.4, and 4.3.1 allows Reflected SQL Injection through Form and DataObject. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.6.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ecosystem_specific': {'af... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5715'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-framework/issues/8814'}, {'type': 'PACKAGE', 'url': 'https://github.com/silverstripe/silverstripe-framework'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/downloa... | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T21:38:47Z', 'nvd_published_at': '2019-04-11T19:29:00Z'} |
1.4.0 | GHSA-x32v-7qw8-cpq8 | 2023-07-28T23:17:40Z | 2022-05-13T01:12:40Z | null | ['CVE-2016-8642'] | Moodle Unauthenticated Access | In Moodle 2.x and 3.x, the question engine allows access to files that should not be available. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1'}, {'fixed': '3.1.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.1.2'}}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSY... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-8642'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/cf0b9432d81ba9d5763e4894f82c95ca9fbf548f'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=343275'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/202... | {'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T23:17:40Z', 'nvd_published_at': '2017-01-20T08:59:00Z'} |
1.4.0 | GHSA-w8r2-5j8x-x8j6 | 2022-06-29T23:30:02Z | 2022-05-14T01:06:25Z | null | ['CVE-2018-10862'] | Improper Limitation of a Pathname to a Restricted Directory in WildFly | WildFly Core before version 6.0.0.Alpha3 does not properly validate file paths in .war archives, allowing for the extraction of crafted .war archives to overwrite arbitrary files. This is an instance of the 'Zip Slip' vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.wildfly.core:wildfly-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.0.Alpha3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.0.Alpha2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-10862'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2276'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2277'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2279'}, {'type': 'WEB'... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T23:30:02Z', 'nvd_published_at': '2018-07-27T14:29:00Z'} |
1.4.0 | GHSA-9x97-x2p9-hvpf | 2023-03-10T00:57:34Z | 2022-05-14T01:33:32Z | null | ['CVE-2013-2516'] | Fileutils Command Injection vulnerability | Ruby Gem Fileutils prior to v0.7.1 contains a Command Injection vulnerability in user supplied url variable that is passed to the shell. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'fileutils'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2516'}, {'type': 'WEB', 'url': 'https://github.com/ruby/fileutils/commit/994c7aa1ba391689f844a069b9aee9e49813686c'}, {'type': 'WEB', 'url': 'https://bugs.ruby-lang.org/issues/7958'}, {'type': 'PACKAGE', 'url': 'https://github.com/ruby/fileutils'}, ... | {'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-10T00:57:34Z', 'nvd_published_at': '2019-02-15T21:29:00Z'} |
1.4.0 | GHSA-pwvp-h579-hfxg | 2023-07-17T23:19:49Z | 2022-05-24T16:55:31Z | null | ['CVE-2019-15952'] | Total.js CMS Path Traversal | An issue was discovered in Total.js CMS 12.0.0. An authenticated user with the Pages privilege can conduct a path traversal attack (../) to include .html files that are outside the permitted directory. Also, if a page contains a template directive, then the directive will be server side processed. Thus, if a user can c... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'total4'}, 'versions': ['12.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15952'}, {'type': 'WEB', 'url': 'https://github.com/beerpwn/CVE/blob/master/Totaljs_disclosure_report/report_final.pdf'}, {'type': 'PACKAGE', 'url': 'https://github.com/totaljs/cms'}, {'type': 'WEB', 'url': 'https://seclists.org/fulldisclosure/2019... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T23:19:49Z', 'nvd_published_at': '2019-09-05T19:16:00Z'} |
1.4.0 | GHSA-5hfp-964w-5vgm | 2022-06-30T15:33:55Z | 2022-05-14T01:04:35Z | null | ['CVE-2018-1000997'] | Improper Limitation of a Pathname to a Restricted Directory in Jenkins | A path traversal vulnerability exists in the Stapler web framework used by Jenkins 2.145 and earlier, LTS 2.138.1 and earlier in core/src/main/java/org/kohsuke/stapler/Facet.java, groovy/src/main/java/org/kohsuke/stapler/jelly/groovy/GroovyFacet.java, jelly/src/main/java/org/kohsuke/stapler/jelly/JellyFacet.java, jruby... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.138.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.138.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000997'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-10-10/#SECURITY-867'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-30T15:33:55Z', 'nvd_published_at': '2019-01-23T22:29:00Z'} |
1.4.0 | GHSA-x24g-9w7v-vprh | 2022-08-11T19:31:17Z | 2022-05-26T00:01:27Z | null | ['CVE-2022-26945'] | HashiCorp go-getter command injection | HashiCorp go-getter before 2.0.2 allows Command Injection. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/go-getter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/go-getter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26945'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/go-getter/pull/359'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/go-getter/pull/361'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/go-getter/commit/38e97387488f5439616... | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-01T21:20:55Z', 'nvd_published_at': '2022-05-25T12:15:00Z'} |
1.4.0 | GHSA-34hf-g744-jw64 | 2023-07-03T21:49:57Z | 2022-05-14T01:48:52Z | null | ['CVE-2014-10077'] | i18n Vulnerable to Denial of Service Attack | Hash#slice in lib/i18n/core_ext/hash.rb in the i18n gem before 0.8.0 for Ruby allows remote attackers to cause a denial of service (application crash) via a call in a situation where :some_key is present in keep_keys but not present in the hash. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'i18n'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-10077'}, {'type': 'WEB', 'url': 'https://github.com/ruby-i18n/i18n/pull/250/commits/08293a41b34e93824563ca0f5b9b97e7451b6387'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/pull/182/files'}, {'type': 'WEB', 'url': 'https://gi... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:39:16Z', 'nvd_published_at': '2018-11-06T15:29:00Z'} |
1.4.0 | GHSA-wcfx-3m6v-4frg | 2023-01-23T14:45:13Z | 2022-05-17T04:35:23Z | null | ['CVE-2014-5441'] | Fat Free CRM subject to Cross-site Scripting | Multiple cross-site scripting (XSS) vulnerabilities in `app/views/layouts/application.html.haml` in Fat Free CRM before 0.13.3 allow remote attackers to inject arbitrary web script or HTML via the (1) username, (2) first name, or (3) last name in a (a) create or (b) edit user action. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'fat_free_crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.11.1'}, {'fixed': '0.13.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-5441'}, {'type': 'WEB', 'url': 'https://github.com/fatfreecrm/fat_free_crm/commit/95464495f1e3e714d5c295fe621af5d2e0d4238d'}, {'type': 'PACKAGE', 'url': 'https://github.com/fatfreecrm/fat_free_crm'}, {'type': 'WEB', 'url': 'https://github.com/fatfr... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-23T14:45:13Z', 'nvd_published_at': '2014-09-12T14:55:00Z'} |
1.4.0 | GHSA-9g4m-ffx6-c29g | 2022-12-20T18:52:43Z | 2022-05-24T17:25:24Z | null | ['CVE-2020-2230'] | Jenkins Cross-site Scripting vulnerability in project naming strategy | Jenkins 2.251 and earlier, LTS 2.235.3 and earlier does not escape the project naming strategy description, that is displayed on item creation.\n\nThis results in a stored cross-site scripting (XSS) vulnerability exploitable by users with Overall/Manage permission.\n\nJenkins 2.252, LTS 2.235.4 escapes the project nami... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.235.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.235.3'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2230'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-08-12/#SECURITY-1957'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/160443/Jenkins-2.235.... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T23:19:13Z', 'nvd_published_at': '2020-08-12T14:15:00Z'} |
1.4.0 | GHSA-7ghm-fp7p-qvjq | 2023-07-31T23:03:12Z | 2022-05-17T03:38:33Z | null | ['CVE-2016-9188'] | Moodle XSS Vulnerability | Cross-site scripting (XSS) vulnerabilities in Moodle CMS on or before 3.1.2 allow remote attackers to inject arbitrary web script or HTML via the s_additionalhtmlhead, s_additionalhtmltopofbody, and s_additionalhtmlfooter parameters. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.1'}, {'last_affected': '3.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-9188'}, {'type': 'WEB', 'url': 'https://packetstormsecurity.com/files/139466/Moodle-CMS-3.1.2-Cross-Site-Scripting-File-Upload.html'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210123190812/http://www.securityfocus.com/bid/94189'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T23:03:12Z', 'nvd_published_at': '2016-11-04T10:59:00Z'} |
1.4.0 | GHSA-pjpc-87mp-4332 | 2022-05-25T22:36:33Z | 2022-05-25T22:36:33Z | null | ['CVE-2022-25772'] | Cross-site Scripting vulnerability in Mautic's tracking pixel functionality | ### Impact
Mautic allows you to track open rates by using tracking pixels.
The tracking information is stored together with extra metadata of the tracking request.
The output isn't sufficiently filtered when showing the metadata of the tracking information, which may lead to a vulnerable situation.
### Patches
Ple... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'mautic/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/mautic/mautic/security/advisories/GHSA-pjpc-87mp-4332'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25772'}, {'type': 'WEB', 'url': 'https://github.com/mautic/mautic/commit/462eb596027fd949efbf9ac5cb2b376805e9d246'}, {'type': 'PACKAGE', 'url': 'htt... | {'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T22:36:33Z', 'nvd_published_at': '2022-06-20T13:15:00Z'} |
1.4.0 | GHSA-whmq-v94q-34p9 | 2022-07-08T19:05:59Z | 2022-05-14T00:54:15Z | null | ['CVE-2013-1965'] | Improper Control of Generation of Code in Apache Struts | Apache Struts Showcase App 2.0.0 through 2.3.13, as used in Struts 2 before 2.3.14.3, allows remote attackers to execute arbitrary OGNL code via a crafted parameter name that is not properly handled when invoking a redirect. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.14.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.3.14.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1965'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=967655'}, {'type': 'WEB', 'url': 'http://struts.apache.org/development/2.x/docs/s2-012.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/60082'}] | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T19:05:59Z', 'nvd_published_at': '2013-07-10T19:55:00Z'} |
1.4.0 | GHSA-h9cr-2hcf-cg8p | 2023-07-21T19:18:07Z | 2022-05-13T01:20:58Z | null | ['CVE-2018-8543'] | ChakraCore RCE Vulnerability | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8541, CVE-2018-8542, CVE-2018-8551, CVE-2018-8... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8543'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/5827'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/ef75eace57c0754428699485f10970ca0fb7a54d'}, {'type': 'WEB', 'url': 'https://portal.msrc.... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T19:18:07Z', 'nvd_published_at': '2018-11-14T01:29:00Z'} |
1.4.0 | GHSA-v7xh-h48c-xw5f | 2022-12-15T17:25:07Z | 2022-05-24T17:45:45Z | null | ['CVE-2021-21633'] | CSRF vulnerability and in Jenkins OWASP Dependency-Track Plugin allow capturing credentials | OWASP Dependency-Track Plugin 3.1.0 and earlier does not perform permission checks in several HTTP endpoints.
This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing \"Secret text\" credentials stored... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:dependency-track'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.1.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21633'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/dependency-track-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2250'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-sec... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T17:25:07Z', 'nvd_published_at': '2021-03-30T12:16:00Z'} |
1.4.0 | GHSA-f4c9-cqv8-9v98 | 2022-06-22T18:50:49Z | 2022-05-24T17:42:20Z | null | ['CVE-2021-20066'] | Insufficient Granularity of Access Control in JSDom | JSDom improperly allows the loading of local resources, which allows for local files to be manipulated by a malicious web page when script execution is enabled. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'jsdom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '16.5.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 16.4.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20066'}, {'type': 'WEB', 'url': 'https://github.com/jsdom/jsdom/issues/3124'}, {'type': 'WEB', 'url': 'https://github.com/jsdom/jsdom/issues/3124#issuecomment-783502951'}, {'type': 'PACKAGE', 'url': 'https://github.com/jsdom/jsdom'}, {'type': 'WEB'... | {'cwe_ids': ['CWE-1220'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-22T18:50:49Z', 'nvd_published_at': '2021-02-16T20:15:00Z'} |
1.4.0 | GHSA-j49x-jjmj-9fqj | 2023-07-18T19:50:49Z | 2022-05-24T17:00:29Z | null | ['CVE-2019-8227'] | Magento 2 Community Edition XSS Vulnerability | In Magento prior to 1.9.4.3 and Magento prior to 1.14.4.3, an authenticated user with limited administrative privileges can inject arbitrary JavaScript code via import / export functionality when creating profile action XML. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.4.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8227'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20211209030216/https://magento.com/security/patches/supee-11219'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T19:50:49Z', 'nvd_published_at': '2019-11-06T00:15:00Z'} |
1.4.0 | GHSA-qxp4-27vx-xmm3 | 2022-07-13T18:25:43Z | 2022-05-14T01:27:35Z | null | ['CVE-2011-4461'] | Improper Input Validation in Jetty | Jetty 8.1.0.RC2 and earlier computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.1.0.RC4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.1.0.RC2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-4461'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/commit/085c79d7d6cfbccc02821ffdb64968593df3e0bf'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/72017'}, {'type': 'PACKAGE', 'url': 'https://gi... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T18:07:02Z', 'nvd_published_at': '2011-12-30T01:55:00Z'} |
1.4.0 | GHSA-2g99-c67p-56hm | 2022-07-13T21:20:48Z | 2022-05-13T01:09:22Z | null | ['CVE-2012-2379'] | XML Signature/Encryption Not Validated in Apache CXF | Apache CXF 2.4.x before 2.4.8, 2.5.x before 2.5.4, and 2.6.x before 2.6.1, when a Supporting Token specifies a child WS-SecurityPolicy 1.1 or 1.2 policy, does not properly ensure that an XML element is signed or encrypted, which has unspecified impact and attack vectors. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.4'}]}]}, {... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-2379'}, {'type': 'WEB', 'url': 'https://cxf.apache.org/cve-2012-2379.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/cxf'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T21:20:48Z', 'nvd_published_at': '2013-01-03T01:55:00Z'} |
1.4.0 | GHSA-wx7c-8j35-mpg8 | 2023-01-23T14:26:45Z | 2022-05-14T02:49:30Z | null | ['CVE-2015-1585'] | Fat Free CRM Cross-Site Request Forgery vulnerability | Fat Free CRM before 0.13.6 allows remote attackers to conduct cross-site request forgery (CSRF) attacks via a request without the authenticity_token, as demonstrated by a crafted HTML page that creates a new administrator account. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'fat_free_crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-1585'}, {'type': 'WEB', 'url': 'https://github.com/fatfreecrm/fat_free_crm/commit/86fd7f98c9583fd36384987282d1c086fdcecd7c'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/100925'}, {'type': 'PACKAGE', 'url': 'https:/... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-23T14:26:45Z', 'nvd_published_at': '2015-02-19T15:59:00Z'} |
1.4.0 | GHSA-74gc-hf33-5353 | 2023-07-17T19:37:48Z | 2022-05-24T17:18:45Z | null | ['CVE-2020-13633'] | Fork CMS Cross-site Scripting Vulnerability | Fork before 5.8.3 allows XSS via navigation_title or title. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'forkcms/forkcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.8.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13633'}, {'type': 'WEB', 'url': 'https://github.com/forkcms/forkcms/pull/3093'}, {'type': 'WEB', 'url': 'https://github.com/forkcms/forkcms/commit/b88f8a2033a4b9b4cbfce96c85691aafb021819d'}, {'type': 'PACKAGE', 'url': 'https://github.com/forkcms/fo... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T19:37:48Z', 'nvd_published_at': '2020-05-27T16:15:00Z'} |
1.4.0 | GHSA-x3m6-vcp7-98mr | 2022-12-15T17:00:11Z | 2022-05-24T17:45:45Z | null | ['CVE-2021-21635'] | Stored XSS vulnerability in Jenkins REST List Parameter Plugin | REST List Parameter Plugin 1.3.0 and earlier does not escape a parameter name reference in embedded JavaScript.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
REST List Parameter Plugin 1.3.1 no longer identifies a parameter using user-specifi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:rest-list-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21635'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/rest-list-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2261'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T17:00:11Z', 'nvd_published_at': '2021-03-30T12:16:00Z'} |
1.4.0 | GHSA-hrg3-4q56-p2q5 | 2023-09-25T18:51:12Z | 2022-05-24T16:52:27Z | null | ['CVE-2019-7928'] | Magento 2 Community Edition DoS vulnerability | A denial-of-service (DoS) vulnerability exists in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. By abusing insufficient brute-forcing defenses in the token exchange protocol, an unauthenticated attacker could disrupt transactions between the Magento merchant and PayPal. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7928'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20211206084839/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-13'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T18:56:02Z', 'nvd_published_at': '2019-08-02T22:15:00Z'} |
1.4.0 | GHSA-2m74-x26c-g7xc | 2023-01-14T05:24:51Z | 2022-05-24T17:10:29Z | null | ['CVE-2020-2148'] | Missing permission checks in Mac Plugin | A missing permission check in Jenkins Mac Plugin 1.1.0 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified SSH server using attacker-specified credentials. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'fr.edf.jenkins.plugins:mac'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2148'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/mac-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-03-09/#SECURITY-1761'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/03/09/1... | {'cwe_ids': ['CWE-285'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-14T05:24:51Z', 'nvd_published_at': '2020-03-09T16:15:00Z'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.