schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
8
154
details
stringlengths
31
19.1k
severity
stringlengths
2
92
affected
stringlengths
75
28.5k
references
stringlengths
79
7.48k
database_specific
stringlengths
131
196
1.4.0
GHSA-q87g-7mp5-765q
2022-06-24T00:56:46Z
2022-05-24T17:19:04Z
null
['CVE-2020-2190']
Improper Neutralization of Input During Web Page Generation in Jenkins Script Security Plugin
Jenkins Script Security Plugin 1.72 and earlier does not correctly escape pending or approved classpath entries on the In-process Script Approval page, resulting in a stored cross-site scripting vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:script-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.73'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.72'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2190'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-06-03/#SECURITY-1866'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/06/03/3'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T00:56:46Z', 'nvd_published_at': '2020-06-03T13:15:00Z'}
1.4.0
GHSA-wjp3-4xcq-598p
2023-08-29T23:58:02Z
2022-05-14T03:46:15Z
null
['CVE-2012-3353']
Apache Sling JCR ContentLoader XmlReader Arbitrary File Load
The Apache Sling JCR ContentLoader 2.1.4 XmlReader used in the Sling JCR content loader module makes it possible to import arbitrary files in the content repository, including local files, causing potential information leaks. Users should upgrade to version 2.1.6 of the JCR ContentLoader
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.sling:org.apache.sling.jcr.contentloader'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-3353'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/SLING-2512'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/owd2xw86l19dh1f1zlhq41l7wlnd16sk'}]
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T23:58:02Z', 'nvd_published_at': '2018-01-09T02:29:00Z'}
1.4.0
GHSA-qvmf-36h5-3f5v
2022-06-24T00:59:37Z
2022-05-24T17:08:45Z
null
['CVE-2020-2110']
Improper Input Validation in Jenkins Script Security Plugin
Sandbox protection in Jenkins Script Security Plugin 1.69 and earlier could be circumvented during the script compilation phase by applying AST transforming annotations to imports or by using them inside of other annotations.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:script-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.70'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.69'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2110'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-02-12/#SECURITY-1713'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/02/12/3'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T00:59:37Z', 'nvd_published_at': '2020-02-12T15:15:00Z'}
1.4.0
GHSA-vcx4-fpmp-mvv6
2023-07-13T17:03:25Z
2022-05-24T19:02:06Z
null
['CVE-2021-32561']
OctoPrint API Error Messages vulnerable to XSS
OctoPrint before 1.6.0 allows XSS because API error messages include the values of input parameters.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'OctoPrint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32561'}, {'type': 'PACKAGE', 'url': 'https://github.com/OctoPrint/OctoPrint'}, {'type': 'WEB', 'url': 'https://github.com/OctoPrint/OctoPrint/releases/tag/1.6.0'}, {'type': 'WEB', 'url': 'https://octoprint.org/blog/2021/04/27/new-release-1.6.0/'}, ...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T17:03:25Z', 'nvd_published_at': '2021-05-11T14:15:00Z'}
1.4.0
GHSA-h5hw-qrrw-vfxg
2023-07-21T18:03:32Z
2022-05-13T01:18:39Z
null
['CVE-2018-0954']
ChakraCore RCE Vulnerability
A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka "Scripting Engine Memory Corruption Vulnerability." This affects Internet Explorer 9, ChakraCore, Internet Explorer 11, Microsoft Edge, Internet Explorer 10. This CVE ID is unique from CVE-2...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-0954'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/51c46371c917e87bbde77d66abba088309d96a3f'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0954'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T18:03:32Z', 'nvd_published_at': '2018-05-09T19:29:00Z'}
1.4.0
GHSA-j472-mcq2-95p6
2022-07-01T21:58:54Z
2022-05-14T01:04:30Z
null
['CVE-2017-1000393']
OS Command Injection in Jenkins
Jenkins 2.73.1 and earlier, 2.83 and earlier users with permission to create or configure agents in Jenkins could configure a launch method called 'Launch agent via execution of command on master'. This allowed them to run arbitrary shell commands on the master node whenever the agent was supposed to be launched. Confi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.73.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.73.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000393'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenkins/commit/67f68c181033cbabf2075769e0f846f58c226c08'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenkins/commit/d7ea3f40efedd50541a57b943d5f7bbed046d091'}, {'type': 'PAC...
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T21:58:54Z', 'nvd_published_at': '2018-01-26T02:29:00Z'}
1.4.0
GHSA-87w9-x2c3-hrjj
2022-07-07T23:28:09Z
2022-05-14T01:10:35Z
null
['CVE-2013-4590']
Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat
Apache Tomcat before 6.0.39, 7.x before 7.0.50, and 8.x before 8.0.0-RC10 allows attackers to obtain "Tomcat internals" information by leveraging the presence of an untrusted web application with a context.xml, web.xml, *.jspx, *.tagx, or *.tld XML document containing an external entity declaration in conjunction with ...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.39'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.5...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4590'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1069911'}, {'type': 'WEB', 'url': 'https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013'}, {'type': 'WEB', 'url': 'https://lists.apache....
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T23:28:09Z', 'nvd_published_at': '2014-02-26T14:55:00Z'}
1.4.0
GHSA-4fwh-r866-pvh9
2023-07-24T21:41:38Z
2022-05-14T01:14:50Z
null
['CVE-2018-20678']
LibreNMS SQL Injection
LibreNMS through 1.47 allows SQL injection via the html/ajax_table.php sort[hostname] parameter, exploitable by authenticated users during a search.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.65'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.47'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20678'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/pull/11920'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/32f72bc1ab7e980e4070e826a89d0d36a5ba62dd'}, {'type': 'WEB', 'url': 'https://cert.enea.pl/advisor...
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-24T21:41:38Z', 'nvd_published_at': '2019-03-28T16:29:00Z'}
1.4.0
GHSA-44p8-c3wv-f28r
2023-07-07T19:07:21Z
2022-05-13T01:06:17Z
null
['CVE-2018-9110']
Directory Traversal in Studio 42 elFinder
Studio 42 elFinder before 2.1.37 has a directory traversal vulnerability in `elFinder.class.php` with the `zipdl()` function that can allow a remote attacker to download files accessible by the web server process and delete files owned by the account running the web server process. NOTE: this issue exists because of an...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'studio-42/elfinder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.12'}, {'fixed': '2.1.37'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.1.36'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-9110'}, {'type': 'WEB', 'url': 'https://github.com/Studio-42/elFinder/commit/e6351557b86cc10a7651253d2d2aff7f6b918f8e'}, {'type': 'WEB', 'url': 'https://github.com/Studio-42/elFinder/releases/tag/2.1.37'}, {'type': 'WEB', 'url': 'https://github.com...
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T19:07:21Z', 'nvd_published_at': '2018-03-28T14:29:00Z'}
1.4.0
GHSA-87qx-g5wg-mwmj
2023-03-10T02:34:50Z
2022-05-14T01:01:09Z
null
['CVE-2018-1000078']
RubyGems Cross-site Scripting vulnerability
RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Cross Site Scripting (XSS) vulnerability in gem server display of homepage attribute that can result in XSS. This atta...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rubygems-update'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jruby:jruby-stdlib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.1.16.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000078'}, {'type': 'WEB', 'url': 'https://github.com/jruby/jruby/commit/0b06b48ab4432237ce5fc1bef47f2c6bcf7843f7'}, {'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems/commit/5971b486d4dbb2bad5d3445b3801c456eb0ce183'}, {'type': 'WEB', 'ur...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-10T02:34:50Z', 'nvd_published_at': '2018-03-13T15:29:00Z'}
1.4.0
GHSA-98wx-cw86-c97x
2023-01-27T00:00:17Z
2022-05-13T01:10:26Z
null
['CVE-2017-1000026']
mixlib-archive Path Traversal vulnerability
Chef Software's mixlib-archive versions 0.3.0 and older are vulnerable to a directory traversal attack allowing attackers to overwrite arbitrary files by using `..` in tar archive entries
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'mixlib-archive'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000026'}, {'type': 'WEB', 'url': 'https://github.com/chef/mixlib-archive/pull/6'}, {'type': 'PACKAGE', 'url': 'https://github.com/chef/mixlib-archive'}, {'type': 'WEB', 'url': 'https://github.com/chef/mixlib-archive/blob/master/CHANGELOG.md'}, {'t...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T00:00:17Z', 'nvd_published_at': '2017-07-17T13:18:00Z'}
1.4.0
GHSA-7wfq-wmx2-3wr4
2023-07-27T20:01:42Z
2022-05-17T00:20:01Z
null
['CVE-2017-16782']
Home Assistant Frontend XSS Vulnerability
In Home Assistant before 0.57, it is possible to inject JavaScript code into a persistent notification via crafted Markdown text, aka XSS.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'home-assistant-frontend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 0.57'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16782'}, {'type': 'WEB', 'url': 'https://github.com/home-assistant/home-assistant-polymer/pull/514'}, {'type': 'PACKAGE', 'url': 'https://github.com/home-assistant/frontend'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-27T20:01:42Z', 'nvd_published_at': '2017-11-10T23:29:00Z'}
1.4.0
GHSA-6w62-83g6-rfhj
2023-08-17T22:50:28Z
2022-05-05T00:29:11Z
null
['CVE-2013-7371']
Node Connect Reflected Cross-Site Scripting in Sencha Labs Connect middleware
node-connect before 2.8.2 has cross site scripting in Sencha Labs Connect middleware (vulnerability due to incomplete fix for CVE-2013-7370) ### Overview Connect is a stack of middleware that is executed in order in each request. The "methodOverride" middleware allows the http post to override the method of the reque...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'connect'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7371'}, {'type': 'WEB', 'url': 'https://github.com/senchalabs/connect/issues/831'}, {'type': 'WEB', 'url': 'https://github.com/senchalabs/connect/commit/126187c4e12162e231b87350740045e5bb06e93a'}, {'type': 'WEB', 'url': 'https://github.com/senchala...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-17T22:50:28Z', 'nvd_published_at': '2019-12-11T15:15:00Z'}
1.4.0
GHSA-5pq5-9phv-q5j3
2023-07-12T21:14:54Z
2022-05-24T17:09:38Z
null
['CVE-2020-8819']
CardGate Payments plugin for WooCommerce does not validate request origin
An issue was discovered in the CardGate Payments plugin through 3.1.15 for WooCommerce. Lack of origin authentication in the IPN callback processing function in cardgate/cardgate.php allows an attacker to remotely replace critical plugin settings (merchant ID, secret key, etc.) and therefore bypass the payment process ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'cardgate/woocommerce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.16'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.1.15'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8819'}, {'type': 'WEB', 'url': 'https://github.com/cardgate/woocommerce/issues/18'}, {'type': 'WEB', 'url': 'https://github.com/cardgate/woocommerce/pull/17/commits/0b83588d604c8c56c7fded43144fcced96b2ada9'}, {'type': 'PACKAGE', 'url': 'https://git...
{'cwe_ids': ['CWE-346'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T21:14:54Z', 'nvd_published_at': '2020-02-25T02:15:00Z'}
1.4.0
GHSA-vr22-43gj-rx3f
2023-01-27T00:19:36Z
2022-05-24T17:08:14Z
null
['CVE-2019-17268']
omniauth-weibo-oauth2 included a code-execution backdoor inserted by a third party
The omniauth-weibo-oauth2 gem 0.4.6 for Ruby, as distributed on RubyGems.org, included a code-execution backdoor inserted by a third party. Versions through 0.4.5, and 0.5.1 and later, are unaffected.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'omniauth-weibo-oauth2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.6'}, {'fixed': '0.5.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17268'}, {'type': 'WEB', 'url': 'https://github.com/beenhero/omniauth-weibo-oauth2/issues/36'}, {'type': 'WEB', 'url': 'https://diff.coditsu.io/diffs/09a05c37-1b34-49e1-ac94-d4dda40d1ad1#d2h-971595'}, {'type': 'PACKAGE', 'url': 'https://github.com/...
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T00:19:36Z', 'nvd_published_at': '2020-02-07T14:15:00Z'}
1.4.0
GHSA-cqp4-cv7h-7jp5
2022-12-12T16:31:10Z
2022-05-14T01:09:56Z
null
['CVE-2018-1999027']
Jenkins SaltStack Plugin allows attackers to capture credentials with a known credentials ID stored in Jenkins
An exposure of sensitive information vulnerability exists in Jenkins SaltStack Plugin 3.1.6 and earlier in SaltAPIBuilder.java, SaltAPIStep.java. SaltStack Plugin did not perform permission checks on methods implementing form validation. This allowed users with Overall/Read access to Jenkins to connect to an attacker-s...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:saltstack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.1.6'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1999027'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/saltstack-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-07-30/#SECURITY-1009'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T16:31:10Z', 'nvd_published_at': '2018-08-01T13:29:00Z'}
1.4.0
GHSA-xh22-fw58-56pp
2023-09-21T23:22:16Z
2022-05-01T18:42:25Z
null
['CVE-2007-6382']
Robocode Arbitrary Code Execution
The Event Dispatch Thread in Robocode before 1.5.1 allows remote attackers to execute arbitrary Java code by using a robot to invoke the `SwingUtilities.invokeLater` method.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'net.sf.robocode:robocode.core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-6382'}, {'type': 'WEB', 'url': 'https://github.com/robo-code/robocode/commit/2f2867d24fb28a2478983be57556f2355a774a81'}, {'type': 'WEB', 'url': 'https://github.com/robo-code/robocode/commit/8c6f5d77e7723583ba069ea611c33f22c1e9603a'}, {'type': 'WEB'...
{'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-21T23:22:16Z', 'nvd_published_at': '2007-12-15T02:46:00Z'}
1.4.0
GHSA-hc34-f55m-rh3m
2023-03-03T23:09:55Z
2022-05-24T16:52:45Z
null
['CVE-2019-10376']
Jenkins Wall Display Plugin Cross-site Scripting vulnerability
Wall Display Master Project Plugin does not properly escape the `customTheme` query parameter, resulting in a reflected cross-site scripting vulnerability. As of publication of this advisory, there is no fix.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:jenkinswalldisplay'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.6.34'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10376'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/walldisplay-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-08-07/#SECURITY-751'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T23:09:55Z', 'nvd_published_at': '2019-08-07T15:15:00Z'}
1.4.0
GHSA-7v5v-9v8r-w864
2022-07-13T15:29:33Z
2022-05-13T01:09:21Z
null
['CVE-2012-5575']
Inadequate Encryption Strength in Apache CXF
Apache CXF 2.5.x before 2.5.10, 2.6.x before CXF 2.6.7, and 2.7.x before CXF 2.7.4 does not verify that a specified cryptographic algorithm is allowed by the WS-SecurityPolicy AlgorithmSuite definition before decrypting, which allows remote attackers to force CXF to use weaker cryptographic algorithms than intended and...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf-rt-transports-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf-rt-transports-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduce...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-5575'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=880443'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E'}, {'type': ...
{'cwe_ids': ['CWE-326'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T15:29:33Z', 'nvd_published_at': '2013-08-19T23:55:00Z'}
1.4.0
GHSA-6jxp-7g74-2rc3
2022-06-10T22:42:57Z
2022-05-02T03:56:13Z
null
['CVE-2009-4611']
Improper input validation in Mort Bay Jetty
Mort Bay Jetty 6.x through 6.1.22 and 7.0.0 writes backtrace data without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator, related to (...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.mortbay.jetty:jetty'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.1.23'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.mortbay.jetty:jetty'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-4611'}, {'type': 'WEB', 'url': 'https://fossies.org/linux/jetty-distribution/VERSION.txt'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse/jetty.project'}, {'type': 'WEB', 'url': 'https://www.eclipse.org/jetty/about.php'}, {'type': 'WEB', '...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-10T22:42:57Z', 'nvd_published_at': '2010-01-13T20:30:00Z'}
1.4.0
GHSA-w3f7-2qfw-348x
2022-11-22T19:47:07Z
2022-05-13T01:18:46Z
null
['CVE-2018-1000418']
Jenkins HipChat Plugin allows credential capture due to incorrect authorization
An improper authorization vulnerability exists in Jenkins HipChat Plugin 2.2.0 and earlier in HipChatNotifier.java that allows attackers with Overall/Read access to send test notifications to an attacker-specified HipChat server with attacker-specified credentials IDs obtained through another method, capturing credenti...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jvnet.hudson.plugins:hipchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000418'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-09-25/#SECURITY-984%20(1)'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106532'}]
{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T19:47:07Z', 'nvd_published_at': '2019-01-09T23:29:00Z'}
1.4.0
GHSA-jf9j-hx2j-m9xh
2022-12-21T00:21:12Z
2022-05-24T17:27:06Z
null
['CVE-2020-2240']
CSRF vulnerability in Jenkins Database Plugin
Database Plugin 1.6 and earlier does not require POST requests for the database console, resulting in a cross-site request forgery (CSRF) vulnerability. This vulnerability allows attackers to execute arbitrary SQL scripts. Database Plugin 1.7 removes the database console.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:database'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.6'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2240'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/database-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-09-01/#SECURITY-1023'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/09...
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T00:21:12Z', 'nvd_published_at': '2020-09-01T14:15:00Z'}
1.4.0
GHSA-9j7m-rjqx-48vh
2023-03-08T19:16:03Z
2022-05-14T01:08:27Z
null
['CVE-2013-4287']
RubyGems Regular Expression Denial of Service vulnerability
Algorithmic complexity vulnerability in Gem::Version::VERSION_PATTERN in `lib/rubygems/version.rb` in RubyGems before 1.8.23.1, 1.8.24 through 1.8.25, 2.0.x before 2.0.8, and 2.1.x before 2.1.0, as used in Ruby 1.9.0 through 2.0.0p247, allows remote attackers to cause a denial of service (CPU consumption) via a crafted...
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rubygems-update'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.23.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'rubygems-update'}, 'ecosystem_specific': {'affected_functions'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4287'}, {'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems/commit/938a7e31ac73655845ab9045629ff3f580a125da'}, {'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems/commit/b697536f2455e8c8853cf5cf8a1017a36031ed67'}, {'type': 'WEB', ...
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-08T19:16:03Z', 'nvd_published_at': '2013-10-17T23:55:00Z'}
1.4.0
GHSA-wphq-j78p-fhgp
2022-12-21T00:21:31Z
2022-05-24T17:27:06Z
null
['CVE-2020-2239']
Secret stored in plain text by Jenkins Parameterized Remote Trigger Plugin
Parameterized Remote Trigger Plugin 3.1.3 and earlier stores a secret unencrypted in its global configuration file `org.jenkinsci.plugins.ParameterizedRemoteTrigger.RemoteBuildConfiguration.xml` on the Jenkins controller as part of its configuration. This secret can be viewed by attackers with access to the Jenkins con...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:Parameterized-Remote-Trigger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.1.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2239'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/parameterized-remote-trigger-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-09-01/#SECURITY-1625'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/...
{'cwe_ids': ['CWE-256'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T00:21:31Z', 'nvd_published_at': '2020-09-01T14:15:00Z'}
1.4.0
GHSA-j837-vm6w-6qcv
2023-09-25T18:59:36Z
2022-05-24T16:52:23Z
null
['CVE-2019-7861']
Magento 2 Community Edition Unsafe File Upload
Insufficient server-side validation of user input could allow an attacker to bypass file upload restrictions in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7861'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20211206084839/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-13'}]
{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T20:49:22Z', 'nvd_published_at': '2019-08-02T22:15:00Z'}
1.4.0
GHSA-23cv-jh4v-vffm
2022-07-07T23:10:46Z
2022-05-24T17:06:16Z
null
['CVE-2020-0602']
Denial of service in ASP.NET Core
A denial of service vulnerability exists when ASP.NET Core improperly handles web requests, aka 'ASP.NET Core Denial of Service Vulnerability'.
[]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.All'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.15'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-0602'}, {'type': 'WEB', 'url': 'https://github.com/aspnet/Announcements/issues/402'}, {'type': 'WEB', 'url': 'https://github.com/github/advisory-database/issues/302'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0130'}, {'typ...
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T23:10:46Z', 'nvd_published_at': '2020-01-14T23:15:00Z'}
1.4.0
GHSA-5824-6jfv-xr3r
2022-06-09T22:55:49Z
2022-05-26T00:01:22Z
null
['CVE-2022-30428']
Arbitrary file read in ginadmin
In ginadmin through 05-10-2022, the incoming path value is not filtered, resulting in arbitrary file reading. A [patch](https://github.com/gphper/ginadmin/commit/726109f01ad23523715f36f7d272958064666a30) is available on the `master` branch of the repository.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/gphper/ginadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30428'}, {'type': 'WEB', 'url': 'https://github.com/gphper/ginadmin/issues/9'}, {'type': 'WEB', 'url': 'https://github.com/gphper/ginadmin/commit/726109f01ad23523715f36f7d272958064666a30'}, {'type': 'PACKAGE', 'url': 'github.com/gphper/ginadmin'}]
{'cwe_ids': ['CWE-22', 'CWE-552'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-01T21:12:49Z', 'nvd_published_at': '2022-05-25T16:15:00Z'}
1.4.0
GHSA-9r3h-wm3x-v245
2022-12-29T00:34:12Z
2022-05-24T17:22:19Z
null
['CVE-2020-2211']
RCE vulnerability in ElasticBox Jenkins Kubernetes CI/CD Plugin
ElasticBox Jenkins Kubernetes CI/CD Plugin 1.3 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types. This results in a remote code execution (RCE) vulnerability exploitable by users able to provide YAML input files to ElasticBox Jenkins Kubernetes CI/CD Plugin’s build step.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.elasticbox.jenkins-ci.plugins:kubernetes-ci'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2211'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/kubernetes-ci-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-07-02/#SECURITY-1738'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/20...
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-29T00:34:12Z', 'nvd_published_at': '2020-07-02T15:15:00Z'}
1.4.0
GHSA-2959-fj73-hm8p
2022-12-13T19:26:47Z
2022-05-24T17:48:06Z
null
['CVE-2021-21645']
Missing permission checks in Jenkins Config File Provider Plugin allow enumerating configuration file IDs
Config File Provider Plugin 3.7.0 and earlier does not perform permission checks in several HTTP endpoints. This allows attackers with Overall/Read permission to enumerate configuration file IDs. An enumeration of configuration file IDs in Config File Provider Plugin 3.7.1 requires the appropriate permissions.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:config-file-provider'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.7.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.7.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21645'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/config-file-provider-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-04-21/#SECURITY-2203'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss...
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T19:26:47Z', 'nvd_published_at': '2021-04-21T15:15:00Z'}
1.4.0
GHSA-jhm9-h84h-rw83
2023-04-21T21:07:53Z
2022-05-24T17:26:05Z
null
['CVE-2020-8226']
phpBB Server-Side Request Forgery Vulnerability
A vulnerability exists in phpBB <v3.2.10 and <v3.3.1 which allowed remote image dimensions check to be used to SSRF.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpbb/phpbb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'phpbb/phpbb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.0'}, {'fixed': '3.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8226'}, {'type': 'WEB', 'url': 'https://github.com/phpbb/phpbb-app/commit/0cfaaafb386d58576d200d56f1acdbcc2f2376e8'}, {'type': 'WEB', 'url': 'https://github.com/phpbb/phpbb-app/commit/efc0a146bf12125eeb71d00470af774326a7bf0a'}, {'type': 'WEB', 'url...
{'cwe_ids': ['CWE-610', 'CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-04-21T21:07:53Z', 'nvd_published_at': '2020-08-17T16:15:00Z'}
1.4.0
GHSA-g4j6-m3m3-crw8
2022-12-27T22:50:38Z
2022-05-24T17:23:38Z
null
['CVE-2020-2221']
Stored XSS vulnerability in Jenkins upstream cause
Jenkins 2.244 and earlier, LTS 2.235.1 and earlier does not escape the upstream job's display name shown as part of a build cause, resulting in a stored cross-site scripting vulnerability. Jenkins 2.245, LTS 2.235.2 escapes the job display name.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.235.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.235.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2221'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-07-15/#SECURITY-1901'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/07/15/5'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T00:54:45Z', 'nvd_published_at': '2020-07-15T18:15:00Z'}
1.4.0
GHSA-cfvw-84vq-43mx
2022-12-28T23:43:56Z
2022-05-24T17:23:39Z
null
['CVE-2020-2227']
Stored XSS vulnerability in Jenkins Deployer Framework Plugin
Deployer Framework Plugin is a framework plugin allowing other plugins to provide a way to deploy artifacts. Deployer Framework Plugin 1.2 and earlier does not escape the URL displayed in the build home page. This results in a stored cross-site scripting (XSS) vulnerability exploitable by users able to provide the loca...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:deployer-framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2227'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/deployer-framework-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-07-15/#SECURITY-1915'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-securi...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-28T23:43:56Z', 'nvd_published_at': '2020-07-15T18:15:00Z'}
1.4.0
GHSA-m4j5-hgqq-5jf2
2022-11-04T20:36:38Z
2022-05-13T01:36:55Z
null
['CVE-2017-2589']
Insecure cookie sharing in Hawtio
It was discovered that the hawtio servlet 1.4 uses a single HttpClient instance to proxy requests with a persistent cookie store (cookies are stored locally and are not passed between the client and the end URL) which means all clients using that proxy are sharing the same cookies.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.hawt:project'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-2589'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1832'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2589'}, {'type': 'PACKAGE', 'url': 'https://github.com/hawtio/hawtio'}, {'type': 'WEB', ...
{'cwe_ids': ['CWE-200'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-04T20:36:38Z', 'nvd_published_at': '2018-07-26T15:29:00Z'}
1.4.0
GHSA-7qcx-4p32-qcmx
2022-06-08T18:04:47Z
2022-05-25T19:34:20Z
null
['CVE-2022-29229']
Missing Cryptographic Step in cassproject
### Impact CaSS Library, (npm:cassproject) has a missing cryptographic step when storing cryptographic keys that can allow a server administrator access to an account’s cryptographic keys. This affects CaSS servers using standalone username/password authentication, which uses a method that expects e2e cryptographic sec...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'cassproject'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.8'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/cassproject/CASS/security/advisories/GHSA-7qcx-4p32-qcmx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29229'}, {'type': 'PACKAGE', 'url': 'https://github.com/cassproject/CASS'}, {'type': 'WEB', 'url': 'https://github.com/cassproject/CASS/releases/...
{'cwe_ids': ['CWE-325'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T19:34:20Z', 'nvd_published_at': '2022-05-18T21:15:00Z'}
1.4.0
GHSA-v8wm-g9f2-xjv4
2023-07-21T22:50:51Z
2022-05-13T01:49:32Z
null
['CVE-2018-12291']
Matrix Synapse Security Filtering Flaw
The `on_get_missing_events` function in handlers/federation.py in Matrix Synapse before 0.31.1 has a security bug in the get_missing_events federation API where event visibility rules were not applied correctly.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'matrix-synapse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.31.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-12291'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/pull/3371'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/releases/tag/v0.31.1'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T22:50:51Z', 'nvd_published_at': '2018-06-13T14:29:00Z'}
1.4.0
GHSA-q5f8-fxrx-pw6f
2023-02-04T00:30:40Z
2022-05-05T02:48:48Z
null
['CVE-2013-0328']
Jenkins subject to Cross-site Scripting
Cross-site scripting (XSS) vulnerability in Jenkins before 1.502 and LTS before 1.480.3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.502'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0328'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2013-0328'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=914876'}, {'type': 'WEB', 'url': 'https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Secur...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-04T00:30:40Z', 'nvd_published_at': '2013-03-19T14:55:00Z'}
1.4.0
GHSA-f8wg-36r9-7f4q
2022-06-08T22:28:53Z
2022-05-01T18:45:57Z
null
['CVE-2007-6736']
Directory Traversal in pyftpdlib
Python FTP server library provides a high-level portable interface to easily write very efficient, scalable and asynchronous FTP servers with Python. Multiple directory traversal vulnerabilities in FTPServer.py in pyftpdlib before 0.2.0 allow remote authenticated users to access arbitrary files and directories via a .....
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pyftpdlib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-6736'}, {'type': 'WEB', 'url': 'https://github.com/giampaolo/pyftpdlib/issues/9'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-f8wg-36r9-7f4q'}, {'type': 'PACKAGE', 'url': 'https://github.com/giampaolo/pyftpdlib'}, {'type': 'WEB...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-08T22:28:53Z', 'nvd_published_at': '2010-10-19T20:00:00Z'}
1.4.0
GHSA-hrwc-pqfm-g6qf
2022-12-12T19:10:15Z
2022-05-17T00:29:00Z
null
['CVE-2017-1000085']
Jenkins Subversion Plugin Cross-Site Request Forgery vulnerability
Subversion Plugin connects to a user-specified Subversion repository as part of form validation (e.g. to retrieve a list of tags). This functionality improperly checked permissions, allowing any user with Item/Build permission (but not Item/Configure) to connect to any web server or Subversion server and send credentia...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:subversion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000085'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/subversion-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2017-07-10/'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20171119065136/http://www.secur...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T19:10:15Z', 'nvd_published_at': '2017-10-05T01:29:00Z'}
1.4.0
GHSA-6fw8-vf2x-4wpm
2023-08-03T21:41:23Z
2022-05-17T03:29:57Z
null
['CVE-2015-3935']
Dolibarr ERP and CRM contain Cross-site Scripting Vulnerability
Multiple cross-site scripting (XSS) vulnerabilities in Dolibarr ERP/CRM 3.5 and 3.6 allow remote attackers to inject arbitrary web script or HTML via the Business Search (`search_nom`) field to (1) `htdocs/societe/societe.php` or (2) `htdocs/societe/admin/societe.php`.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5.0'}, {'fixed': '3.5.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3935'}, {'type': 'WEB', 'url': 'https://github.com/Dolibarr/dolibarr/issues/2857'}, {'type': 'WEB', 'url': 'https://github.com/Dolibarr/dolibarr/issues/4291'}, {'type': 'WEB', 'url': 'https://github.com/Dolibarr/dolibarr/issues/4341'}, {'type': 'WE...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T21:41:23Z', 'nvd_published_at': '2015-06-10T14:59:00Z'}
1.4.0
GHSA-x37x-3fw2-5qw2
2022-12-21T16:48:53Z
2022-05-24T17:06:23Z
null
['CVE-2020-2098']
CSRF vulnerability in Jenkins Sounds Plugin allow OS command execution
A cross-site request forgery vulnerability in Jenkins Sounds Plugin 0.5 and earlier allows attacker to execute arbitrary OS commands as the OS user account running Jenkins.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:sounds'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2098'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/sounds-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-01-15/#SECURITY-814'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T16:48:53Z', 'nvd_published_at': '2020-01-15T16:15:00Z'}
1.4.0
GHSA-mpx3-mx2p-9gv3
2022-07-07T22:51:10Z
2022-05-17T04:46:05Z
null
['CVE-2014-1216']
Improper Neutralization of Special Elements used in a Command in FitNesse Wiki
FitNesse Wiki 20131110, 20140201, and earlier allows remote attackers to execute arbitrary commands by defining a COMMAND_PATTERN and TEST_RUNNER in the pageContent parameter when editing a page.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.fitnesse:fitnesse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '20131110'}, {'fixed': '20140418'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-1216'}, {'type': 'WEB', 'url': 'http://www.exploit-db.com/exploits/32568'}]
{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T22:51:10Z', 'nvd_published_at': '2014-04-22T13:06:00Z'}
1.4.0
GHSA-mf98-r2gf-2x3w
2023-02-08T18:06:46Z
2022-05-14T01:58:49Z
null
['CVE-2012-4456']
OpenStack Keystone Improper Authentication vulnerability
The (1) OS-KSADM/services and (2) tenant APIs in OpenStack Keystone Essex before 2012.1.2 and Folsom before folsom-2 do not properly validate X-Auth-Token, which allow remote attackers to read the roles for an arbitrary user or get, create, or delete arbitrary services.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'keystone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2012.1'}, {'fixed': '2012.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-4456'}, {'type': 'WEB', 'url': 'https://github.com/openstack/keystone/commit/14b136aed9d988f5a8f3e699bd4577c9b874d6c1'}, {'type': 'WEB', 'url': 'https://github.com/openstack/keystone/commit/1d146f5c32e58a73a677d308370f147a3271c2cb'}, {'type': 'WEB'...
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T18:06:46Z', 'nvd_published_at': '2012-10-09T15:55:00Z'}
1.4.0
GHSA-jrcc-7jf5-3pxg
2022-11-01T22:32:14Z
2022-05-17T00:26:04Z
null
['CVE-2017-5636']
Injection in Apache NiFi
In Apache NiFi before 0.7.2 and 1.x before 1.1.2 in a cluster environment, the proxy chain serialization/deserialization is vulnerable to an injection attack where a carefully crafted username could impersonate another user and gain their permissions on a replicated request to another node.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-5636'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security.html#CVE-2017-5636'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/96731'}]
{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T22:32:14Z', 'nvd_published_at': '2017-10-19T20:29:00Z'}
1.4.0
GHSA-7v9p-34r2-q668
2022-12-21T16:49:28Z
2022-05-24T17:30:18Z
null
['CVE-2020-2288']
Incorrect default pattern in Jenkins Audit Trail Plugin
Audit Trail Plugin uses regular expressions to match requested URLs whose dispatch should be logged. In Audit Trail Plugin 3.6 and earlier, the default regular expression pattern could be bypassed in many cases by adding a suffix to the URL that would be ignored during request handling. Audit Trail Plugin 3.7 changes...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:audit-trail'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2288'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/audit-trail-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-10-08/#SECURITY-1846'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/...
{'cwe_ids': ['CWE-185'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T16:49:28Z', 'nvd_published_at': '2020-10-08T13:15:00Z'}
1.4.0
GHSA-pgxv-h967-fw2q
2022-06-28T23:29:01Z
2022-05-13T01:01:01Z
null
['CVE-2018-1999005']
Improper Neutralization of Input During Web Page Generation in Jenkins
A cross-site scripting vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in BuildTimelineWidget.java, BuildTimelineWidget/control.jelly that allows attackers with Job/Configure permission to define JavaScript that would be executed in another user's browser when that other user performs some UI act...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.121.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.122'},...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1999005'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-07-18/#SECURITY-944'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T23:29:01Z', 'nvd_published_at': '2018-07-23T19:29:00Z'}
1.4.0
GHSA-h648-gj34-5x4r
2022-12-15T16:39:54Z
2022-05-24T19:20:32Z
null
['CVE-2021-43578']
Agent-to-controller security bypass in Jenkins Squash TM Publisher (Squash4Jenkins) Plugin allows writing arbitrary files
Jenkins Squash TM Publisher (Squash4Jenkins) Plugin 1.0.0 and earlier implements an agent-to-controller message that does not implement any validation of its input, allowing attackers able to control agent processes to replace arbitrary files on the Jenkins controller file system with an attacker-controlled JSON string...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:squashtm-publisher-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43578'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/squashtm-publisher-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-11-12/#SECURITY-2525'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-s...
{'cwe_ids': ['CWE-693'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T16:39:54Z', 'nvd_published_at': '2021-11-12T11:15:00Z'}
1.4.0
GHSA-4q47-ph87-fq4f
2022-12-22T13:54:52Z
2022-05-24T17:12:40Z
null
['CVE-2020-2164']
Passwords stored in plain text by Jenkins Artifactory Plugin
Artifactory Plugin 3.5.0 and earlier stores its Artifactory server password in plain text in the global configuration file `org.jfrog.hudson.ArtifactoryBuilder.xml`. This password can be viewed by users with access to the Jenkins controller file system. Artifactory Plugin 3.6.0 now stores the Artifactory server passwo...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:artifactory'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2164'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/artifactory-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1542%20(1)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-securit...
{'cwe_ids': ['CWE-312'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T13:54:52Z', 'nvd_published_at': '2020-03-25T17:15:00Z'}
1.4.0
GHSA-6pq6-crw9-522h
2023-09-26T16:56:00Z
2022-05-24T17:00:04Z
null
['CVE-2019-18608']
Cezerin Unauthorized Acces
Cezerin v0.33.0 allows unauthorized order-information modification because certain internal attributes can be overwritten via a conflicting name when processing order requests. Hence, a malicious customer can manipulate an order (e.g., its payment status or shipping fee) by adding additional attributes to user-input du...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'cezerin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.33.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-18608'}, {'type': 'PACKAGE', 'url': 'https://github.com/cezerin/cezerin'}, {'type': 'WEB', 'url': 'https://github.com/cl0udz/vulnerabilities/blob/master/cezerin-manipulate_order_information/README.md'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T20:46:17Z', 'nvd_published_at': '2019-10-29T19:15:00Z'}
1.4.0
GHSA-vr4j-gj8q-m89v
2023-07-28T20:38:01Z
2022-05-14T02:22:46Z
null
['CVE-2016-7189']
ChakraCore RCE Vulnerability
The Chakra JavaScript engine in Microsoft Edge allows remote attackers to execute arbitrary code via a crafted web site, aka "Scripting Engine Remote Code Execution Vulnerability."
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-7189'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/1737'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/f05c42e64c3b2d057ae1a52fe1917af26c9f2737'}, {'type': 'WEB', 'url': 'https://docs.microso...
{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T20:38:01Z', 'nvd_published_at': '2016-10-14T02:59:00Z'}
1.4.0
GHSA-286v-pcf5-25rc
2023-07-10T13:02:03Z
2022-05-24T19:02:26Z
null
['CVE-2021-3537']
Nokogiri Implements libxml2 version vulnerable to null pointer dereferencing
A vulnerability found in libxml2 in versions before 2.9.11 shows that it did not propagate errors while parsing XML mixed content, causing a NULL dereference. If an untrusted XML document was parsed in recovery mode and post-validated, the flaw could be used to crash the application. The highest threat from this vulner...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3537'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1956522'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2021-3537.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com...
{'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-05T21:11:25Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}
1.4.0
GHSA-4465-r2hg-v4rj
2023-08-29T18:45:53Z
2022-05-17T04:52:06Z
null
['CVE-2013-4662']
CiviCRM SQL injection vulnerability via Quick Search API
The Quick Search API in CiviCRM 4.2.0 through 4.2.9 and 4.3.0 through 4.3.3 allows remote authenticated users to bypass the validation layer and conduct SQL injection attacks via a direct request to the "second layer" of the API, related to contact.getquick.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'civicrm/civicrm-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.9'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'civicrm/civicrm-core'}, 'ecosystem_specific': {'affect...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4662'}, {'type': 'WEB', 'url': 'https://civicrm.org/advisory/civi-sa-2013-004-limited-sql-injection-quick-search-api'}, {'type': 'PACKAGE', 'url': 'https://github.com/civicrm/civicrm-core'}, {'type': 'WEB', 'url': 'https://issues.civicrm.org/jira/b...
{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T18:45:53Z', 'nvd_published_at': '2014-01-29T18:55:00Z'}
1.4.0
GHSA-xhj7-jr45-5w8r
2022-11-22T18:57:10Z
2022-05-13T01:47:05Z
null
['CVE-2017-7688']
Apache OpenMeetings updates user password in insecure manner
Apache OpenMeetings 1.0.0 updates user password in insecure manner. This issue is fixed in version 3.3.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.openmeetings:openmeetings-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '3.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7688'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/openmeetings'}, {'type': 'WEB', 'url': 'http://markmail.org/message/ctsiiqtekzsun6fi'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/99586'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T18:57:10Z', 'nvd_published_at': '2017-07-17T13:18:00Z'}
1.4.0
GHSA-wx66-pm7r-2q82
2022-12-15T17:27:58Z
2022-05-24T17:45:44Z
null
['CVE-2021-21630']
Stored XSS vulnerability in Jenkins Extra Columns Plugin
Extra Columns Plugin 1.22 and earlier does not escape parameter values in the build parameters column. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission. Additionally, a view containing such a job needs to be configured with the build parameters co...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:extra-columns'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.23'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.22'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21630'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/extra-columns-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2222'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-securi...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T17:27:58Z', 'nvd_published_at': '2021-03-30T12:16:00Z'}
1.4.0
GHSA-qjpq-5pq3-43rr
2022-07-07T22:43:07Z
2022-05-14T01:18:38Z
null
['CVE-2014-3490']
Incorrect Privilege Assignment in RESTEasy
RESTEasy 2.3.1 before 2.3.8.SP2 and 3.x before 3.0.9, as used in Red Hat JBoss Enterprise Application Platform (EAP) 6.3.0, does not disable external entities when the resteasy.document.expand.entity.references parameter is set to false, which allows remote attackers to read arbitrary files and have other unspecified i...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:resteasy-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.1'}, {'fixed': '2.3.8.SP2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.3.8.SP1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:r...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3490'}, {'type': 'WEB', 'url': 'https://github.com/resteasy/Resteasy/pull/521'}, {'type': 'WEB', 'url': 'https://github.com/resteasy/Resteasy/pull/533'}, {'type': 'WEB', 'url': 'https://github.com/ronsigal/Resteasy/commit/9b7d0f574cafdcf3bea5428f31...
{'cwe_ids': ['CWE-266'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T22:43:07Z', 'nvd_published_at': '2014-08-19T18:55:00Z'}
1.4.0
GHSA-jr84-p554-62pm
2023-08-22T14:23:11Z
2022-05-24T17:14:32Z
null
['CVE-2020-0969']
ChakraCore RCE Vulnerability
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge (HTML-based), aka 'Chakra Scripting Engine Memory Corruption Vulnerability'.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.18'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-0969'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/6420'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/cd58e8e6799ab11b02a1cfc30bac9a2171dabd4d'}, {'type': 'PACKAGE', 'url': 'https://github.c...
{'cwe_ids': ['CWE-119', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T18:10:46Z', 'nvd_published_at': '2020-04-15T15:15:00Z'}
1.4.0
GHSA-qmwh-rh2g-3682
2023-08-01T22:57:00Z
2022-05-24T16:52:24Z
null
['CVE-2019-7875']
Magento 2 Community Edition Cross-site Scripting Vulnerability
A stored cross-site scripting vulnerability exists in the admin panel of Magento Open Source prior to 1.9.4.2, and Magento Commerce prior to 1.14.4.2, Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This could be exploited by an authenticated user with privileges to newsletter templ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7875'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051916/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-23'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T22:57:00Z', 'nvd_published_at': '2019-08-02T22:15:00Z'}
1.4.0
GHSA-h8w6-c53g-53vv
2022-12-21T16:47:24Z
2022-05-24T17:06:23Z
null
['CVE-2020-2097']
Missing permission checks in Jenkins Sounds Plugin allow OS command execution
Jenkins Sounds Plugin 0.5 and earlier does not perform permission checks in URLs performing form validation, allowing attackers with Overall/Read access to execute arbitrary OS commands as the OS user account running Jenkins.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:sounds'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2097'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/sounds-plugin/commit/0c376d46fd91b12696e5f7389110ddece0724457'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-01-15/#SECURITY-814'}]
{'cwe_ids': ['CWE-285'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T16:47:24Z', 'nvd_published_at': '2020-01-15T16:15:00Z'}
1.4.0
GHSA-28x9-hc4p-9vh2
2022-12-29T01:43:13Z
2022-05-24T17:28:25Z
null
['CVE-2020-2262']
Stored XSS vulnerability in android-lint Plugin
Jenkins Android Lint Plugin 2.6 and earlier does not escape the annotation message in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide report files to the plugin's post-build step.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jvnet.hudson.plugins:android-lint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2262'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/android-lint-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1908'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-29T01:43:13Z', 'nvd_published_at': '2020-09-16T14:15:00Z'}
1.4.0
GHSA-c735-g9f2-2mvp
2022-12-22T05:23:28Z
2022-05-24T17:12:40Z
null
['CVE-2020-2160']
Cross-Site Request Forgery in Jenkins
An extension point in Jenkins allows selectively disabling cross-site request forgery (CSRF) protection for specific URLs.\n\nImplementations of that extension point received a different representation of the URL path than the Stapler web framework uses to dispatch requests in Jenkins 2.227 and earlier, LTS 2.204.5 and...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.228'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.204.5'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2160'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1774'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/03/25/2'}]
{'cwe_ids': ['CWE-352', 'CWE-435'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T00:58:56Z', 'nvd_published_at': '2020-03-25T17:15:00Z'}
1.4.0
GHSA-fv3c-6cw7-2qcq
2022-12-12T15:54:53Z
2022-05-17T00:33:25Z
null
['CVE-2017-1000093']
Jenkins Poll SCM Plugin vulnerable to Cross-Site Request Forgery
Jenkins Poll SCM Plugin was not requiring requests to its API be sent via POST, thereby opening itself to Cross-Site Request Forgery attacks. This allowed attackers to initiate polling of projects with a known name. While Jenkins in general does not consider polling to be a protection-worthy action as it's similar to c...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:pollscm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000093'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/pollscm-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2017-07-10/'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T15:54:53Z', 'nvd_published_at': '2017-10-05T01:29:00Z'}
1.4.0
GHSA-7rx6-4vwv-432g
2023-08-04T19:15:59Z
2022-05-24T17:48:06Z
null
['CVE-2021-21647']
Missing permission check in CloudBees CD Plugin allows scheduling builds
CloudBees CD Plugin does not perform a permission check in an HTTP endpoint. This allows attackers with Item/Read permission to schedule builds of projects without having Item/Build permission. CloudBees CD Plugin requires Item/Build permission to schedule builds via its HTTP endpoint.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:electricflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.18.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:electricflow'}, 'ecosyste...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21647'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/electricflow-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-04-21/#SECURITY-2309'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-securit...
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T19:28:45Z', 'nvd_published_at': '2021-04-21T15:15:00Z'}
1.4.0
GHSA-qm6v-cg9v-53j3
2022-05-25T20:16:36Z
2022-05-25T20:16:36Z
null
['CVE-2022-29237']
Limited Authentication Bypass for Media Files
Prior to Opencast 10.14 and 11.7, users could pass along URLs for files belonging to organizations other than the user's own, which Opencast would then import into the current organization, bypassing organizational barriers. ### Impact The vulnerability allows attackers to bypass organizational barriers. Attackers mu...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.opencastproject:opencast-ingest-service-impl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.14'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.opencastproject:opencast-ingest-service-impl'}, 'ranges': [{'type': 'ECOSYSTEM', 'even...
[{'type': 'WEB', 'url': 'https://github.com/opencast/opencast/security/advisories/GHSA-qm6v-cg9v-53j3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29237'}, {'type': 'WEB', 'url': 'https://github.com/opencast/opencast/commit/8d5ec1614eed109b812bc27b0c6d3214e456d4e7'}, {'type': 'PACKAGE', 'ur...
{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T20:16:36Z', 'nvd_published_at': '2022-05-24T15:15:00Z'}
1.4.0
GHSA-h7jc-pg2r-mqj4
2023-08-29T19:00:42Z
2022-05-17T04:58:31Z
null
['CVE-2013-4714']
Tiki Wiki CMS Groupware Cross-site scripting (XSS) vulnerability
Cross-site scripting (XSS) vulnerability in Tiki Wiki CMS Groupware 6 LTS before 6.13LTS, 9 LTS before 9.7LTS, 10.x before 10.4, and 11.x before 11.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'tikiwiki/tiki-manager'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0'}, {'fixed': '6.13'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'tikiwiki/tiki-manager'}, 'ecosystem_specific': {'affecte...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4714'}, {'type': 'PACKAGE', 'url': 'https://github.com/TikiWiki/tiki-manager'}, {'type': 'WEB', 'url': 'https://tiki.org/article401-New-Versions-of-all-supported-versions-of-Tiki-Wiki-CMS-Groupware'}, {'type': 'WEB', 'url': 'http://info.tiki.org/ar...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T19:00:42Z', 'nvd_published_at': '2013-11-06T15:55:00Z'}
1.4.0
GHSA-x895-2wrm-hvp7
2023-08-16T22:52:39Z
2022-05-17T02:39:13Z
null
['CVE-2014-1932']
PIL and Pillow Vulnerable to Symlink Attack on Tmpfiles
The (1) `load_djpeg` function in `JpegImagePlugin.py`, (2) `Ghostscript` function in `EpsImagePlugin.py`, (3) `load` function in `IptcImagePlugin.py`, and (4) `_copy` function in `Image.py` in Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 do not properly create temporary files, which allow local ...
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'pillow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-1932'}, {'type': 'WEB', 'url': 'https://github.com/python-imaging/Pillow/commit/4e9f367dfd3f04c8f5d23f7f759ec12782e10ee7'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737059'}, {'type': 'WEB', 'url': 'https://security...
{'cwe_ids': ['CWE-59'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T22:52:39Z', 'nvd_published_at': '2014-04-17T14:55:00Z'}
1.4.0
GHSA-h3ch-5pp2-vh6w
2022-05-25T22:52:21Z
2022-05-14T00:01:50Z
null
['CVE-2022-25762']
Improper socket reuse in Apache Tomcat
If a web application sends a WebSocket message concurrently with the WebSocket connection closing when running on Apache Tomcat 8.5.0 to 8.5.75 or Apache Tomcat 9.0.0.M1 to 9.0.20, it is possible that the application will continue to use the socket after it has been closed. The error handling triggered in this case cou...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.5.0'}, {'fixed': '8.5.75'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0M1'}, {'fixed': ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25762'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/6ckmjfb1k61dyzkto9vm2k5jvt4o7w7c'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220629-0003/'},...
{'cwe_ids': ['CWE-404'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T22:52:21Z', 'nvd_published_at': '2022-05-13T08:15:00Z'}
1.4.0
GHSA-qq38-mxpq-rrpj
2022-12-28T23:44:46Z
2022-05-24T17:23:39Z
null
['CVE-2020-2228']
Improper authorization of users and groups with the same base name in Jenkins GitLab Authentication Plugin
GitLab Authentication Plugin 1.5 and earlier does not differentiate between user names and hierarchical group names when performing authorization. This allows an attacker with permissions to create groups in GitLab to gain the privileges granted to another user or group. GitLab Authentication Plugin 1.6 performs user ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:gitlab-oauth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.5'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2228'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/gitlab-oauth-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-07-15/#SECURITY-1792'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/202...
{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-28T23:44:46Z', 'nvd_published_at': '2020-07-15T18:15:00Z'}
1.4.0
GHSA-9fq2-x9r6-wfmf
2023-09-26T16:36:14Z
2022-05-24T22:00:57Z
null
['CVE-2019-6446']
Numpy Deserialization of Untrusted Data
** DISPUTED ** An issue was discovered in NumPy 1.16.0 and earlier. It uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, as demonstrated by a numpy.load call. NOTE: third parties dispute this issue because it is a behavior that might have...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'numpy'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.16.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-6446'}, {'type': 'WEB', 'url': 'https://github.com/numpy/numpy/issues/12759'}, {'type': 'WEB', 'url': 'https://github.com/numpy/numpy/pull/12889'}, {'type': 'WEB', 'url': 'https://bugzilla.suse.com/show_bug.cgi?id=1122208'}, {'type': 'PACKAGE', 'ur...
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T20:19:35Z', 'nvd_published_at': None}
1.4.0
GHSA-pwg7-4hxv-v4cw
2022-11-01T22:59:13Z
2022-05-24T17:01:41Z
null
['CVE-2019-16543']
Plaintext Storage in Jenkins Spira Importer Plugin
Jenkins Spira Importer Plugin 3.2.2 and earlier stores credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'com.inflectra.spiratest.plugins:inflectra-spira-integration'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16543'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-11-21/#SECURITY-1554'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/11/21/1'}]
{'cwe_ids': ['CWE-256'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T22:59:13Z', 'nvd_published_at': '2019-11-21T15:15:00Z'}
1.4.0
GHSA-8787-63px-3m23
2023-02-08T18:08:11Z
2022-05-13T01:54:14Z
null
['CVE-2018-10931']
Cobbler has Exposed Dangerous Method or Function
It was found that cobbler 2.6.x exposed all functions from its CobblerXMLRPCInterface class over XMLRPC. A remote, unauthenticated attacker could use this flaw to gain high privileges within cobbler, upload files to arbitrary location in the context of the daemon.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'cobbler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '3.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-10931'}, {'type': 'WEB', 'url': 'https://github.com/cobbler/cobbler/issues/1916'}, {'type': 'WEB', 'url': 'https://github.com/cobbler/cobbler/pull/1921'}, {'type': 'WEB', 'url': 'https://github.com/cobbler/cobbler/commit/1b91a3d3ac87c31d9dac2307513...
{'cwe_ids': ['CWE-749'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T18:08:11Z', 'nvd_published_at': '2018-08-09T20:29:00Z'}
1.4.0
GHSA-2vv3-56qg-g2cf
2022-05-24T22:10:01Z
2022-05-24T22:10:01Z
null
['CVE-2022-29200']
Missing validation causes denial of service via `LSTMBlockCell`
### Impact The implementation of [`tf.raw_ops.LSTMBlockCell`](https://github.com/tensorflow/tensorflow/blob/f3b9bf4c3c0597563b289c0512e98d4ce81f886e/tensorflow/core/kernels/rnn/lstm_ops.cc) does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of service at...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2vv3-56qg-g2cf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29200'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/803404044ae7a1efac48ba82d74111fce1ddb09a'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-1284', 'CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:10:01Z', 'nvd_published_at': '2022-05-20T22:16:00Z'}
1.4.0
GHSA-gfhj-524q-gcrm
2022-12-27T22:58:48Z
2022-05-24T17:23:38Z
null
['CVE-2020-2223']
Stored XSS vulnerability in Jenkins console links
Jenkins 2.244 and earlier, LTS 2.235.1 and earlier does not escape the `href` attribute of links to downstream jobs displayed in the build console page. This results in a stored cross-site scripting (XSS) vulnerability exploitable by users with Job/Configure permission. Jenkins 2.245, LTS 2.235.2 escapes the `href` at...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.235.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.235.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2223'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-07-15/#SECURITY-1945'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/07/15/5'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T00:54:18Z', 'nvd_published_at': '2020-07-15T18:15:00Z'}
1.4.0
GHSA-9hg7-xmf8-jxf9
2022-12-19T23:52:11Z
2022-05-24T17:29:16Z
null
['CVE-2020-2283']
Stored XSS vulnerability in Jenkins Liquibase Runner Plugin
Liquibase Runner Plugin 1.4.5 and earlier does not escape changeset contents when showing them on the build page. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide Liquibase changesets evaluated by the plugin. Liquibase Runner Plugin 1.4.7 no longer supports ev...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:liquibase-runner'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.5'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2283'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/liquibase-runner-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-09-23/#SECURITY-1885'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secu...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-19T23:52:11Z', 'nvd_published_at': '2020-09-23T14:15:00Z'}
1.4.0
GHSA-hxcw-pqqc-rv85
2023-07-21T21:45:40Z
2022-05-13T01:39:42Z
null
['CVE-2018-7251']
Anchor CMS Logs Credentials
An issue was discovered in `config/error.php` in Anchor 0.12.3. The error log is exposed at an errors.log URI, and contains MySQL credentials if a MySQL error (such as "Too many connections") has occurred.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'anchorcms/anchor-cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.12.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-7251'}, {'type': 'WEB', 'url': 'https://github.com/anchorcms/anchor-cms/issues/1247'}, {'type': 'WEB', 'url': 'https://github.com/anchorcms/anchor-cms/releases/tag/0.12.7'}, {'type': 'WEB', 'url': 'https://twitter.com/finnwea/status/965279233030393...
{'cwe_ids': ['CWE-200'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T21:45:40Z', 'nvd_published_at': '2018-02-19T22:29:00Z'}
1.4.0
GHSA-pg59-2w33-8vmc
2023-03-03T22:49:24Z
2022-05-24T16:52:45Z
null
['CVE-2019-10372']
Jenkins Gitlab Authentication Plugin Open Redirect vulnerability
GitLab Authentication Plugin records the HTTP `Referer` header when the authentication process starts and redirects users to that URL when the user has finished logging in. This implements an open redirect, allowing malicious sites to implement a phishing attack, with users expecting they have just logged in to Jenkin...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:gitlab-oauth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10372'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-08-07/#SECURITY-796'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/08/07/1'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T22:49:24Z', 'nvd_published_at': '2019-08-07T15:15:00Z'}
1.4.0
GHSA-w7pm-cc4v-f3g8
2022-06-23T06:57:17Z
2022-05-24T17:12:05Z
null
['CVE-2020-7961']
Deserialization of Untrusted Data in Liferay Portal
Deserialization of Untrusted Data in Liferay Portal prior to 7.2.1 CE GA2 allows remote attackers to execute arbitrary code via JSON web services (JSONWS).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.liferay.portal:com.liferay.portal-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.2.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.2.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7961'}, {'type': 'PACKAGE', 'url': 'https://github.com/liferay/liferay-portal'}, {'type': 'WEB', 'url': 'https://portal.liferay.dev/learn/security/known-vulnerabilities'}, {'type': 'WEB', 'url': 'https://portal.liferay.dev/learn/security/known-vuln...
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T06:57:17Z', 'nvd_published_at': '2020-03-20T19:15:00Z'}
1.4.0
GHSA-9347-9w64-q5wp
2023-08-17T22:33:35Z
2022-05-14T02:05:10Z
null
['CVE-2013-2027']
Jython Improper Access Restrictions vulnerability
Jython before 2.7.2b3 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.python:jython-standalone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2b3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2027'}, {'type': 'WEB', 'url': 'https://github.com/jython/frozen-mirror/commit/053949e66d307168fd70b39725f4d3e6b642acc1'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=947949'}, {'type': 'WEB', 'url': 'https://github.com/jyth...
{'cwe_ids': ['CWE-281'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-17T22:33:35Z', 'nvd_published_at': '2015-02-13T15:59:00Z'}
1.4.0
GHSA-wvfw-w3x6-g526
2023-09-28T20:30:59Z
2022-05-14T01:10:43Z
null
['CVE-2019-5715']
Silverstripe Framework SQLi Vulnerability
All versions of SilverStripe 3 prior to 3.6.7 and 3.7.3, and all versions of SilverStripe 4 prior to 4.0.7, 4.1.5, 4.2.4, and 4.3.1 allows Reflected SQL Injection through Form and DataObject.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.6.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ecosystem_specific': {'af...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-5715'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-framework/issues/8814'}, {'type': 'PACKAGE', 'url': 'https://github.com/silverstripe/silverstripe-framework'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/downloa...
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T21:38:47Z', 'nvd_published_at': '2019-04-11T19:29:00Z'}
1.4.0
GHSA-x32v-7qw8-cpq8
2023-07-28T23:17:40Z
2022-05-13T01:12:40Z
null
['CVE-2016-8642']
Moodle Unauthenticated Access
In Moodle 2.x and 3.x, the question engine allows access to files that should not be available.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1'}, {'fixed': '3.1.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.1.2'}}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSY...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-8642'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/cf0b9432d81ba9d5763e4894f82c95ca9fbf548f'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=343275'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/202...
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T23:17:40Z', 'nvd_published_at': '2017-01-20T08:59:00Z'}
1.4.0
GHSA-w8r2-5j8x-x8j6
2022-06-29T23:30:02Z
2022-05-14T01:06:25Z
null
['CVE-2018-10862']
Improper Limitation of a Pathname to a Restricted Directory in WildFly
WildFly Core before version 6.0.0.Alpha3 does not properly validate file paths in .war archives, allowing for the extraction of crafted .war archives to overwrite arbitrary files. This is an instance of the 'Zip Slip' vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.wildfly.core:wildfly-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.0.Alpha3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.0.Alpha2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-10862'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2276'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2277'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:2279'}, {'type': 'WEB'...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T23:30:02Z', 'nvd_published_at': '2018-07-27T14:29:00Z'}
1.4.0
GHSA-9x97-x2p9-hvpf
2023-03-10T00:57:34Z
2022-05-14T01:33:32Z
null
['CVE-2013-2516']
Fileutils Command Injection vulnerability
Ruby Gem Fileutils prior to v0.7.1 contains a Command Injection vulnerability in user supplied url variable that is passed to the shell.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'fileutils'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2516'}, {'type': 'WEB', 'url': 'https://github.com/ruby/fileutils/commit/994c7aa1ba391689f844a069b9aee9e49813686c'}, {'type': 'WEB', 'url': 'https://bugs.ruby-lang.org/issues/7958'}, {'type': 'PACKAGE', 'url': 'https://github.com/ruby/fileutils'}, ...
{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-10T00:57:34Z', 'nvd_published_at': '2019-02-15T21:29:00Z'}
1.4.0
GHSA-pwvp-h579-hfxg
2023-07-17T23:19:49Z
2022-05-24T16:55:31Z
null
['CVE-2019-15952']
Total.js CMS Path Traversal
An issue was discovered in Total.js CMS 12.0.0. An authenticated user with the Pages privilege can conduct a path traversal attack (../) to include .html files that are outside the permitted directory. Also, if a page contains a template directive, then the directive will be server side processed. Thus, if a user can c...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'total4'}, 'versions': ['12.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15952'}, {'type': 'WEB', 'url': 'https://github.com/beerpwn/CVE/blob/master/Totaljs_disclosure_report/report_final.pdf'}, {'type': 'PACKAGE', 'url': 'https://github.com/totaljs/cms'}, {'type': 'WEB', 'url': 'https://seclists.org/fulldisclosure/2019...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T23:19:49Z', 'nvd_published_at': '2019-09-05T19:16:00Z'}
1.4.0
GHSA-5hfp-964w-5vgm
2022-06-30T15:33:55Z
2022-05-14T01:04:35Z
null
['CVE-2018-1000997']
Improper Limitation of a Pathname to a Restricted Directory in Jenkins
A path traversal vulnerability exists in the Stapler web framework used by Jenkins 2.145 and earlier, LTS 2.138.1 and earlier in core/src/main/java/org/kohsuke/stapler/Facet.java, groovy/src/main/java/org/kohsuke/stapler/jelly/groovy/GroovyFacet.java, jelly/src/main/java/org/kohsuke/stapler/jelly/JellyFacet.java, jruby...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.138.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.138.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000997'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-10-10/#SECURITY-867'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-30T15:33:55Z', 'nvd_published_at': '2019-01-23T22:29:00Z'}
1.4.0
GHSA-x24g-9w7v-vprh
2022-08-11T19:31:17Z
2022-05-26T00:01:27Z
null
['CVE-2022-26945']
HashiCorp go-getter command injection
HashiCorp go-getter before 2.0.2 allows Command Injection.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/go-getter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/go-getter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26945'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/go-getter/pull/359'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/go-getter/pull/361'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/go-getter/commit/38e97387488f5439616...
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-01T21:20:55Z', 'nvd_published_at': '2022-05-25T12:15:00Z'}
1.4.0
GHSA-34hf-g744-jw64
2023-07-03T21:49:57Z
2022-05-14T01:48:52Z
null
['CVE-2014-10077']
i18n Vulnerable to Denial of Service Attack
Hash#slice in lib/i18n/core_ext/hash.rb in the i18n gem before 0.8.0 for Ruby allows remote attackers to cause a denial of service (application crash) via a call in a situation where :some_key is present in keep_keys but not present in the hash.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'i18n'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-10077'}, {'type': 'WEB', 'url': 'https://github.com/ruby-i18n/i18n/pull/250/commits/08293a41b34e93824563ca0f5b9b97e7451b6387'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/pull/182/files'}, {'type': 'WEB', 'url': 'https://gi...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:39:16Z', 'nvd_published_at': '2018-11-06T15:29:00Z'}
1.4.0
GHSA-wcfx-3m6v-4frg
2023-01-23T14:45:13Z
2022-05-17T04:35:23Z
null
['CVE-2014-5441']
Fat Free CRM subject to Cross-site Scripting
Multiple cross-site scripting (XSS) vulnerabilities in `app/views/layouts/application.html.haml` in Fat Free CRM before 0.13.3 allow remote attackers to inject arbitrary web script or HTML via the (1) username, (2) first name, or (3) last name in a (a) create or (b) edit user action.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'fat_free_crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.11.1'}, {'fixed': '0.13.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-5441'}, {'type': 'WEB', 'url': 'https://github.com/fatfreecrm/fat_free_crm/commit/95464495f1e3e714d5c295fe621af5d2e0d4238d'}, {'type': 'PACKAGE', 'url': 'https://github.com/fatfreecrm/fat_free_crm'}, {'type': 'WEB', 'url': 'https://github.com/fatfr...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-23T14:45:13Z', 'nvd_published_at': '2014-09-12T14:55:00Z'}
1.4.0
GHSA-9g4m-ffx6-c29g
2022-12-20T18:52:43Z
2022-05-24T17:25:24Z
null
['CVE-2020-2230']
Jenkins Cross-site Scripting vulnerability in project naming strategy
Jenkins 2.251 and earlier, LTS 2.235.3 and earlier does not escape the project naming strategy description, that is displayed on item creation.\n\nThis results in a stored cross-site scripting (XSS) vulnerability exploitable by users with Overall/Manage permission.\n\nJenkins 2.252, LTS 2.235.4 escapes the project nami...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.235.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.235.3'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2230'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-08-12/#SECURITY-1957'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/160443/Jenkins-2.235....
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T23:19:13Z', 'nvd_published_at': '2020-08-12T14:15:00Z'}
1.4.0
GHSA-7ghm-fp7p-qvjq
2023-07-31T23:03:12Z
2022-05-17T03:38:33Z
null
['CVE-2016-9188']
Moodle XSS Vulnerability
Cross-site scripting (XSS) vulnerabilities in Moodle CMS on or before 3.1.2 allow remote attackers to inject arbitrary web script or HTML via the s_additionalhtmlhead, s_additionalhtmltopofbody, and s_additionalhtmlfooter parameters.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.1'}, {'last_affected': '3.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-9188'}, {'type': 'WEB', 'url': 'https://packetstormsecurity.com/files/139466/Moodle-CMS-3.1.2-Cross-Site-Scripting-File-Upload.html'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210123190812/http://www.securityfocus.com/bid/94189'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T23:03:12Z', 'nvd_published_at': '2016-11-04T10:59:00Z'}
1.4.0
GHSA-pjpc-87mp-4332
2022-05-25T22:36:33Z
2022-05-25T22:36:33Z
null
['CVE-2022-25772']
Cross-site Scripting vulnerability in Mautic's tracking pixel functionality
### Impact Mautic allows you to track open rates by using tracking pixels. The tracking information is stored together with extra metadata of the tracking request. The output isn't sufficiently filtered when showing the metadata of the tracking information, which may lead to a vulnerable situation. ### Patches Ple...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'mautic/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/mautic/mautic/security/advisories/GHSA-pjpc-87mp-4332'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25772'}, {'type': 'WEB', 'url': 'https://github.com/mautic/mautic/commit/462eb596027fd949efbf9ac5cb2b376805e9d246'}, {'type': 'PACKAGE', 'url': 'htt...
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T22:36:33Z', 'nvd_published_at': '2022-06-20T13:15:00Z'}
1.4.0
GHSA-whmq-v94q-34p9
2022-07-08T19:05:59Z
2022-05-14T00:54:15Z
null
['CVE-2013-1965']
Improper Control of Generation of Code in Apache Struts
Apache Struts Showcase App 2.0.0 through 2.3.13, as used in Struts 2 before 2.3.14.3, allows remote attackers to execute arbitrary OGNL code via a crafted parameter name that is not properly handled when invoking a redirect.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.14.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.3.14.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1965'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=967655'}, {'type': 'WEB', 'url': 'http://struts.apache.org/development/2.x/docs/s2-012.html'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/60082'}]
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T19:05:59Z', 'nvd_published_at': '2013-07-10T19:55:00Z'}
1.4.0
GHSA-h9cr-2hcf-cg8p
2023-07-21T19:18:07Z
2022-05-13T01:20:58Z
null
['CVE-2018-8543']
ChakraCore RCE Vulnerability
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8541, CVE-2018-8542, CVE-2018-8551, CVE-2018-8...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8543'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/5827'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/ef75eace57c0754428699485f10970ca0fb7a54d'}, {'type': 'WEB', 'url': 'https://portal.msrc....
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T19:18:07Z', 'nvd_published_at': '2018-11-14T01:29:00Z'}
1.4.0
GHSA-v7xh-h48c-xw5f
2022-12-15T17:25:07Z
2022-05-24T17:45:45Z
null
['CVE-2021-21633']
CSRF vulnerability and in Jenkins OWASP Dependency-Track Plugin allow capturing credentials
OWASP Dependency-Track Plugin 3.1.0 and earlier does not perform permission checks in several HTTP endpoints. This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing \"Secret text\" credentials stored...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:dependency-track'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.1.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21633'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/dependency-track-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2250'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-sec...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T17:25:07Z', 'nvd_published_at': '2021-03-30T12:16:00Z'}
1.4.0
GHSA-f4c9-cqv8-9v98
2022-06-22T18:50:49Z
2022-05-24T17:42:20Z
null
['CVE-2021-20066']
Insufficient Granularity of Access Control in JSDom
JSDom improperly allows the loading of local resources, which allows for local files to be manipulated by a malicious web page when script execution is enabled.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'jsdom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '16.5.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 16.4.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20066'}, {'type': 'WEB', 'url': 'https://github.com/jsdom/jsdom/issues/3124'}, {'type': 'WEB', 'url': 'https://github.com/jsdom/jsdom/issues/3124#issuecomment-783502951'}, {'type': 'PACKAGE', 'url': 'https://github.com/jsdom/jsdom'}, {'type': 'WEB'...
{'cwe_ids': ['CWE-1220'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-22T18:50:49Z', 'nvd_published_at': '2021-02-16T20:15:00Z'}
1.4.0
GHSA-j49x-jjmj-9fqj
2023-07-18T19:50:49Z
2022-05-24T17:00:29Z
null
['CVE-2019-8227']
Magento 2 Community Edition XSS Vulnerability
In Magento prior to 1.9.4.3 and Magento prior to 1.14.4.3, an authenticated user with limited administrative privileges can inject arbitrary JavaScript code via import / export functionality when creating profile action XML.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.4.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8227'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20211209030216/https://magento.com/security/patches/supee-11219'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T19:50:49Z', 'nvd_published_at': '2019-11-06T00:15:00Z'}
1.4.0
GHSA-qxp4-27vx-xmm3
2022-07-13T18:25:43Z
2022-05-14T01:27:35Z
null
['CVE-2011-4461']
Improper Input Validation in Jetty
Jetty 8.1.0.RC2 and earlier computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.1.0.RC4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.1.0.RC2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-4461'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/commit/085c79d7d6cfbccc02821ffdb64968593df3e0bf'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/72017'}, {'type': 'PACKAGE', 'url': 'https://gi...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T18:07:02Z', 'nvd_published_at': '2011-12-30T01:55:00Z'}
1.4.0
GHSA-2g99-c67p-56hm
2022-07-13T21:20:48Z
2022-05-13T01:09:22Z
null
['CVE-2012-2379']
XML Signature/Encryption Not Validated in Apache CXF
Apache CXF 2.4.x before 2.4.8, 2.5.x before 2.5.4, and 2.6.x before 2.6.1, when a Supporting Token specifies a child WS-SecurityPolicy 1.1 or 1.2 policy, does not properly ensure that an XML element is signed or encrypted, which has unspecified impact and attack vectors.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.4'}]}]}, {...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-2379'}, {'type': 'WEB', 'url': 'https://cxf.apache.org/cve-2012-2379.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/cxf'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T21:20:48Z', 'nvd_published_at': '2013-01-03T01:55:00Z'}
1.4.0
GHSA-wx7c-8j35-mpg8
2023-01-23T14:26:45Z
2022-05-14T02:49:30Z
null
['CVE-2015-1585']
Fat Free CRM Cross-Site Request Forgery vulnerability
Fat Free CRM before 0.13.6 allows remote attackers to conduct cross-site request forgery (CSRF) attacks via a request without the authenticity_token, as demonstrated by a crafted HTML page that creates a new administrator account.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'fat_free_crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-1585'}, {'type': 'WEB', 'url': 'https://github.com/fatfreecrm/fat_free_crm/commit/86fd7f98c9583fd36384987282d1c086fdcecd7c'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/100925'}, {'type': 'PACKAGE', 'url': 'https:/...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-23T14:26:45Z', 'nvd_published_at': '2015-02-19T15:59:00Z'}
1.4.0
GHSA-74gc-hf33-5353
2023-07-17T19:37:48Z
2022-05-24T17:18:45Z
null
['CVE-2020-13633']
Fork CMS Cross-site Scripting Vulnerability
Fork before 5.8.3 allows XSS via navigation_title or title.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'forkcms/forkcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.8.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13633'}, {'type': 'WEB', 'url': 'https://github.com/forkcms/forkcms/pull/3093'}, {'type': 'WEB', 'url': 'https://github.com/forkcms/forkcms/commit/b88f8a2033a4b9b4cbfce96c85691aafb021819d'}, {'type': 'PACKAGE', 'url': 'https://github.com/forkcms/fo...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T19:37:48Z', 'nvd_published_at': '2020-05-27T16:15:00Z'}
1.4.0
GHSA-x3m6-vcp7-98mr
2022-12-15T17:00:11Z
2022-05-24T17:45:45Z
null
['CVE-2021-21635']
Stored XSS vulnerability in Jenkins REST List Parameter Plugin
REST List Parameter Plugin 1.3.0 and earlier does not escape a parameter name reference in embedded JavaScript. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission. REST List Parameter Plugin 1.3.1 no longer identifies a parameter using user-specifi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:rest-list-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21635'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/rest-list-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2261'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T17:00:11Z', 'nvd_published_at': '2021-03-30T12:16:00Z'}
1.4.0
GHSA-hrg3-4q56-p2q5
2023-09-25T18:51:12Z
2022-05-24T16:52:27Z
null
['CVE-2019-7928']
Magento 2 Community Edition DoS vulnerability
A denial-of-service (DoS) vulnerability exists in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. By abusing insufficient brute-forcing defenses in the token exchange protocol, an unauthenticated attacker could disrupt transactions between the Magento merchant and PayPal.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7928'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20211206084839/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-13'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T18:56:02Z', 'nvd_published_at': '2019-08-02T22:15:00Z'}
1.4.0
GHSA-2m74-x26c-g7xc
2023-01-14T05:24:51Z
2022-05-24T17:10:29Z
null
['CVE-2020-2148']
Missing permission checks in Mac Plugin
A missing permission check in Jenkins Mac Plugin 1.1.0 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified SSH server using attacker-specified credentials.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'fr.edf.jenkins.plugins:mac'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2148'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/mac-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-03-09/#SECURITY-1761'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/03/09/1...
{'cwe_ids': ['CWE-285'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-14T05:24:51Z', 'nvd_published_at': '2020-03-09T16:15:00Z'}