schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
8
154
details
stringlengths
31
19.1k
severity
stringlengths
2
92
affected
stringlengths
75
28.5k
references
stringlengths
79
7.48k
database_specific
stringlengths
131
196
1.4.0
GHSA-cpqj-r29q-chrh
2022-06-16T23:23:31Z
2022-05-24T17:43:47Z
null
['CVE-2021-28027']
Loading a bgzip block can write out of bounds if size overflows.
An issue was discovered in the bam crate before 0.1.3 for Rust. There is an integer underflow and out-of-bounds write during the loading of a bgzip block.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'bam'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28027'}, {'type': 'PACKAGE', 'url': 'https://gitlab.com/tprodanov/bam'}, {'type': 'WEB', 'url': 'https://gitlab.com/tprodanov/bam/-/issues/4'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0027.html'}]
{'cwe_ids': ['CWE-191'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:23:31Z', 'nvd_published_at': '2021-03-05T09:15:00Z'}
1.4.0
GHSA-2rr8-9c6g-8j5c
2022-06-03T15:51:33Z
2022-05-24T17:34:59Z
null
['CVE-2017-15680']
Missing Authorization in Crafter CMS
In Crafter CMS Crafter Studio 3.0 prior to 3.0.1 an IDOR vulnerability exists which allows unauthenticated attackers to view and modify administrative data.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.craftercms:crafter-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15680'}, {'type': 'WEB', 'url': 'https://docs.craftercms.org/en/3.0/security/advisory.html'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T15:51:33Z', 'nvd_published_at': '2020-11-27T18:15:00Z'}
1.4.0
GHSA-5cg5-7vw6-jw4r
2022-11-22T19:20:24Z
2022-05-24T17:11:57Z
null
['CVE-2019-20526']
Ignite Realtime Openfire allows Cross-site Scripting
Ignite Realtime Openfire 4.4.1 allows XSS via the setup/setup-datasource-standard.jsp password parameter. This issue was fixed in version 4.4.2.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.igniterealtime.openfire:parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-20526'}, {'type': 'WEB', 'url': 'https://www.netsparker.com/web-applications-advisories/ns-19-015-reflected-cross-site-scripting-in-openfire/'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T19:20:24Z', 'nvd_published_at': '2020-03-19T18:15:00Z'}
1.4.0
GHSA-cxw7-85xm-3xrc
2023-02-08T17:56:42Z
2022-05-17T04:31:32Z
null
['CVE-2012-5488']
Plone Code Injection vulnerability
python_scripts.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via a crafted URL, related to createObject.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3a1'}, {'fixed': '4.3b1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-5488'}, {'type': 'WEB', 'url': 'https://github.com/plone/Products.CMFPlone/commit/a9479a5b38646fe0b0a9066ee46de9c18de32bfa'}, {'type': 'WEB', 'url': 'https://github.com/plone/Products.CMFPlone/commit/c3a98f4e6cf26501485de9c8354c49afdea21df8'}, {'ty...
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T17:56:42Z', 'nvd_published_at': '2014-09-30T14:55:00Z'}
1.4.0
GHSA-xm78-4m3g-7wm7
2022-07-01T21:23:20Z
2022-05-13T01:25:19Z
null
['CVE-2017-12610']
Improper Authentication in Apache Kafka
In Apache Kafka 0.10.0.0 to 0.10.2.1 and 0.11.0.0 to 0.11.0.1, authenticated Kafka clients may use impersonation via a manually crafted protocol message with SASL/PLAIN or SASL/SCRAM authentication when using the built-in PLAIN or SCRAM server implementations in Apache Kafka.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.kafka:kafka-clients'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.10.0.0'}, {'fixed': '0.10.2.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.10.2.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.kafka:kafka-...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12610'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca6...
{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T21:23:20Z', 'nvd_published_at': '2018-07-26T14:29:00Z'}
1.4.0
GHSA-c264-8834-ppj2
2022-12-20T22:15:47Z
2022-05-24T17:19:05Z
null
['CVE-2020-2192']
CSRF vulnerability in Jenkins Swarm Plugin
Swarm Plugin adds API endpoints to add or remove agent labels. In Swarm Plugin 3.20 and earlier these only require a global Swarm secret to use, and no regular permission check is performed. This allows users with Agent/Create permission to add or remove labels of any agent. Additionally, these API endpoints do not re...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:swarm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.21'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2192'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/swarm-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-06-03/#SECURITY-1200'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/06/03...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T22:15:47Z', 'nvd_published_at': '2020-06-03T13:15:00Z'}
1.4.0
GHSA-p632-5w74-x8xx
2023-08-29T18:15:52Z
2022-05-17T03:12:55Z
null
['CVE-2013-5002']
phpMyAdmin Cross-site scripting (XSS) vulnerability via pageNumber value
Cross-site scripting (XSS) vulnerability in `libraries/schema/Export_Relation_Schema.class.php` in phpMyAdmin 3.5.x before 3.5.8.2 and 4.0.x before 4.0.4.2 allows remote authenticated users to inject arbitrary web script or HTML via a crafted pageNumber value to schema_export.php.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5'}, {'fixed': '3.5.8.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ecosystem_specific': {'affe...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-5002'}, {'type': 'WEB', 'url': 'http://www.phpmyadmin.net/home_page/security/PMASA-2013-14.php'}]
{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T18:15:52Z', 'nvd_published_at': '2013-07-31T13:20:00Z'}
1.4.0
GHSA-p9m5-3hj7-cp5r
2023-06-13T17:24:56Z
2022-05-24T17:37:49Z
null
['CVE-2020-35907']
futures_task::noop_waker_ref can segfault due to dereferencing a NULL pointer
Affected versions of the crate used a UnsafeCell in thread-local storage to return a noop waker reference, assuming that the reference would never be returned from another thread. This resulted in a segmentation fault crash if Waker::wake_by_ref() was called on a waker returned from another thread due to it attempting...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'futures-task'}, 'ecosystem_specific': {'affected_functions': ['futures_task::noop_waker_ref']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35907'}, {'type': 'WEB', 'url': 'https://github.com/rust-lang/futures-rs/issues/2091'}, {'type': 'PACKAGE', 'url': 'https://github.com/rust-lang/futures-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0061.html'}]
{'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:58:57Z', 'nvd_published_at': '2020-12-31T09:15:00Z'}
1.4.0
GHSA-w4x6-j349-9r57
2022-11-01T21:58:49Z
2022-05-14T03:45:20Z
null
['CVE-2017-12632']
Apache NiFi host header poisoning issue
A malicious host header in an incoming HTTP request could cause NiFi to load resources from an external server. The fix to sanitize host headers and compare to a controlled whitelist was applied on the Apache NiFi 1.5.0 release. Users running a prior 1.x release should upgrade to the appropriate release.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12632'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security.html#CVE-2017-12632'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T21:58:49Z', 'nvd_published_at': '2018-01-23T22:29:00Z'}
1.4.0
GHSA-5r7w-pjx8-99qg
2023-08-07T20:32:25Z
2022-05-17T19:57:08Z
null
['CVE-2014-3652']
JBoss KeyCloak Open Redirect
JBoss KeyCloak: Open redirect vulnerability via failure to validate the redirect URL.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-services'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0.Beta1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3652'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/commit/6b2a4229e3b869eec9d4adc30c1afdf71e78cbdf'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/cve-2014-3652'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat....
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-07T20:32:25Z', 'nvd_published_at': '2019-12-15T22:15:00Z'}
1.4.0
GHSA-wm27-49x2-mg9q
2023-07-31T20:26:29Z
2022-05-14T02:24:15Z
null
['CVE-2016-3259']
ChakraCore RCE Vulnerability
The Microsoft (1) JScript 9, (2) VBScript, and (3) Chakra JavaScript engines, as used in Microsoft Internet Explorer 9 through 11, Microsoft Edge, and other products, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Co...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3259'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/1291'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/17f3d4a4852dcc9e48de7091685b1862afb9f307'}, {'type': 'WEB', 'url': 'https://docs.microso...
{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T20:26:29Z', 'nvd_published_at': '2016-07-13T01:59:00Z'}
1.4.0
GHSA-5gg7-5wv8-4gcj
2022-11-08T12:39:25Z
2022-05-13T01:38:14Z
null
['CVE-2017-12165']
Undertow Request Smuggling vulnerability
It was discovered that Undertow before 1.4.17, 1.3.31 and 2.0.0 processes http request headers with unusual whitespaces which can cause possible http request smuggling.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.31'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12165'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-12165'}, {'type': 'WEB', 'url': 'https://issues.redhat.com/browse/UNDERTOW-1251'}]
{'cwe_ids': ['CWE-444'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-08T12:39:25Z', 'nvd_published_at': '2018-07-27T15:29:00Z'}
1.4.0
GHSA-hppc-rpfp-r8qw
2023-08-01T23:00:35Z
2022-05-24T16:52:27Z
null
['CVE-2019-7913']
Magento 2 Community Edition SSRF vulnerability
A server-side request forgery (SSRF) vulnerability exists in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This can be exploited by an authenticated user with admin privileges to manipulate shipment methods to execute arbitrary code.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7913'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20211206084839/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-13'}]
{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T23:00:35Z', 'nvd_published_at': '2019-08-02T22:15:00Z'}
1.4.0
GHSA-6346-5r4h-ff5x
2022-05-26T19:47:21Z
2022-05-05T00:00:26Z
null
['CVE-2022-1555']
Microweber vulnerable to cross-site scripting (XSS)
Microweber is a drag and drop website builder and a powerful next generation CMS. Microweber versions 1.2.15 and prior are vulnerable to cross-site scripting. This could lead to injection of arbitrary JaveScript code, defacement of a page, or stealing cookies. A patch is available on the `master` branch of Microweber's...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.15'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1555'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/724e2d186a33c0c27273107dc4f160a09384877f'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-05T21:08:06Z', 'nvd_published_at': '2022-05-04T09:15:00Z'}
1.4.0
GHSA-7v44-75jf-22gj
2023-09-20T19:05:21Z
2022-05-24T16:54:38Z
null
['CVE-2019-15481']
Kimai v2 is vulnerable to Cross-Site Scripting (XSS)
Kimai v2 before 1.1 has XSS via a timesheet description.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'kevinpapst/kimai2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15481'}, {'type': 'WEB', 'url': 'https://github.com/kevinpapst/kimai2/pull/962'}, {'type': 'PACKAGE', 'url': 'https://github.com/kevinpapst/kimai2'}, {'type': 'WEB', 'url': 'https://github.com/kevinpapst/kimai2/releases/tag/1.1'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-12T16:37:16Z', 'nvd_published_at': '2019-08-23T13:15:00Z'}
1.4.0
GHSA-p26v-97vp-jcx6
2023-02-14T00:43:50Z
2022-05-14T02:56:10Z
null
['CVE-2011-1183']
Access controll bypass in Apache Tomcat
Apache Tomcat 7.0.11, when web.xml has no login configuration, does not follow security constraints, which allows remote attackers to bypass intended access restrictions via HTTP requests to a meta-data complete web application. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-1088 and CVE-2011...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.11'}, {'fixed': '7.0.12'}]}], 'versions': ['7.0.11']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-1183'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/66675'}, {'type': 'WEB', 'url': 'https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12701'}, {'type': 'WEB', 'url': 'http://sec...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T00:43:50Z', 'nvd_published_at': '2011-04-08T15:17:00Z'}
1.4.0
GHSA-5hcx-vg88-hgpm
2023-08-01T22:58:28Z
2022-05-24T16:52:26Z
null
['CVE-2019-7904']
Magento 2 Community Edition Insufficient Access Controls
Insufficient enforcement of user access controls in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2 could enable a low-privileged user to make unauthorized environment configuration changes.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7904'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20211206084839/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-13'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T22:58:28Z', 'nvd_published_at': '2019-08-02T22:15:00Z'}
1.4.0
GHSA-5whj-523x-6j68
2022-11-22T19:38:38Z
2022-05-14T01:00:38Z
null
['CVE-2017-12633']
Apache Camel camel-hessian component vulnerable to Java object deserialization
The camel-hessian component in Apache Camel 2.x before 2.19.4 and 2.20.x before 2.20.1 is vulnerable to Java object de-serialisation vulnerability. De-serializing untrusted data can lead to security flaws.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-hessian'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0'}, {'fixed': '2.19.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-hessian'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.20.0'}, {...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12633'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0319'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/CAMEL-11923'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c2...
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T19:38:38Z', 'nvd_published_at': '2017-11-15T15:29:00Z'}
1.4.0
GHSA-p4p5-3v2j-w5rv
2022-06-30T15:36:38Z
2022-05-13T01:48:40Z
null
['CVE-2018-1000865']
Improper Privilege Management in Jenkins
A sandbox bypass vulnerability exists in Script Security Plugin 1.47 and earlier in groovy-sandbox/src/main/java/org/kohsuke/groovy/sandbox/SandboxTransformer.java that allows attackers with Job/Configure permission to execute arbitrary code on the Jenkins master JVM, if plugins using the Groovy sandbox are installed.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:script-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.48'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.47'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000865'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:0326'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:0327'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-10-29/#SECURITY-1186'...
{'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-30T15:36:38Z', 'nvd_published_at': '2018-12-10T14:29:00Z'}
1.4.0
GHSA-q5q8-jghf-3pm3
2023-08-15T19:02:21Z
2022-05-17T04:44:52Z
null
['CVE-2013-4310']
Apache Struts2 Broken Access Control Vulnerability
The Struts 2 action mapping mechanism supports the special parameter prefix action: which is intended to help with attaching navigational information to buttons within forms, under certain conditions this can be used to bypass security constraints. In Struts 2.3.15.3 the action mapping mechanism was changed to avoid ...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.15.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4310'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/struts'}, {'type': 'WEB', 'url': 'http://struts.apache.org/release/2.3.x/docs/s2-018.html'}]
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T23:00:35Z', 'nvd_published_at': '2013-09-30T21:55:00Z'}
1.4.0
GHSA-vrrc-3wwh-frgx
2023-05-24T13:43:05Z
2022-05-24T17:33:07Z
null
['CVE-2020-2306']
Missing Authorization in Jenkins Mercurial Plugin
Mercurial Plugin prior to 2.12, 2.10.1, 2.9.1, and 2.8.1 does not perform a permission check in an HTTP endpoint. This allows attackers with Overall/Read permission to obtain a list of names of configured Mercurial installations. Mercurial Plugin 2.12, 2.10.1, 2.9.1, and 2.8.1 performs permission checks when listing ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:mercurial'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.11'}, {'fixed': '2.12'}]}], 'versions': ['2.11']}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:mercurial'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2306'}, {'type': 'WEB', 'url': 'https://github.com/CVEProject/cvelist/blob/381fe967666a5ce01625a7a050427aa4757e3ca6/2020/2xxx/CVE-2020-2306.json'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-11-04/#SECURITY-2104'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T23:20:17Z', 'nvd_published_at': '2020-11-04T15:15:00Z'}
1.4.0
GHSA-jfxm-w8g2-4rcv
2023-07-20T18:45:54Z
2022-05-13T01:17:32Z
null
['CVE-2018-0114']
Cisco node-jose improper validation of JWT signature
A vulnerability in the Cisco node-jose open source library before 0.11.0 could allow an unauthenticated, remote attacker to re-sign tokens using a key that is embedded within the token. The vulnerability is due to node-jose following the JSON Web Signature (JWS) standard for JSON Web Tokens (JWTs). This standard specif...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'node-jose'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-0114'}, {'type': 'WEB', 'url': 'https://github.com/cisco/node-jose/blob/master/CHANGELOG.md'}, {'type': 'WEB', 'url': 'https://github.com/zi0Black/POC-CVE-2018-0114'}, {'type': 'WEB', 'url': 'https://tools.cisco.com/security/center/viewAlert.x?aler...
{'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T18:45:54Z', 'nvd_published_at': '2018-01-04T06:29:00Z'}
1.4.0
GHSA-5gmf-8gh2-hhfp
2022-11-22T19:47:38Z
2022-05-13T01:41:00Z
null
['CVE-2017-1000245']
Jenkins SSH Plugin user passwords for encrypted SSH keys stored in plaintext
The SSH Plugin stores credentials which allow jobs to access remote servers via the SSH protocol. User passwords and passphrases for encrypted SSH keys are stored in plaintext in a configuration file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jvnet.hudson.plugins:ssh'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ssh'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed':...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000245'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2017-07-10/'}]
{'cwe_ids': ['CWE-522'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T19:47:38Z', 'nvd_published_at': '2017-11-01T13:29:00Z'}
1.4.0
GHSA-8vhq-qq4p-grq3
2022-07-01T21:47:32Z
2022-05-13T01:11:53Z
null
['CVE-2017-1000487']
OS Command Injection in Plexus-utils
Plexus-utils before 3.0.16 is vulnerable to command injection because it does not correctly process the contents of double quoted strings.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.codehaus.plexus:plexus-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.16'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000487'}, {'type': 'WEB', 'url': 'https://github.com/codehaus-plexus/plexus-utils/commit/b38a1b3a4352303e4312b2bb601a0d7ec6e28f41'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1322'}, {'type': 'PACKAGE', 'url': 'https://git...
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T21:47:32Z', 'nvd_published_at': '2018-01-03T20:29:00Z'}
1.4.0
GHSA-vr6v-g96p-cjc3
2023-08-21T18:35:49Z
2022-05-24T17:18:14Z
null
['CVE-2020-10738']
Moodle vulnerable to RCE
A flaw was found in Moodle versions 3.8 before 3.8.3, 3.7 before 3.7.6, 3.6 before 3.6.10, 3.5 before 3.5.12 and earlier unsupported versions. It was possible to create a SCORM package in such a way that when added to a course, it could be interacted with via web services in order to achieve remote code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.8'}, {'fixed': '3.8.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.8.2'}}, {'package': {'ecosystem': 'Packagist', ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10738'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/2cd534a7df3867813e3aad42db615865149a58c6'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10738'}, {'type': 'PACKAGE', 'url': 'https://github.co...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T01:18:01Z', 'nvd_published_at': '2020-05-21T16:15:00Z'}
1.4.0
GHSA-q564-vvx8-9388
2022-12-19T23:50:41Z
2022-05-24T17:29:16Z
null
['CVE-2020-2280']
CSRF vulnerability in Jenkins warnings Plugin allows remote code execution
warnings Plugin 5.0.1 and earlier does not require POST requests for a form validation method intended for testing custom warnings parsers, resulting in a cross-site request forgery (CSRF) vulnerability. This vulnerability allows attackers to execute arbitrary code. warnings Plugin 5.0.2 requires POST requests for th...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jvnet.hudson.plugins:warnings'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.0.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2280'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/warnings-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-09-23/#SECURITY-2042'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/202...
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-19T23:50:41Z', 'nvd_published_at': '2020-09-23T14:15:00Z'}
1.4.0
GHSA-fv4q-4h24-23qr
2023-03-02T16:40:43Z
2022-05-24T16:55:59Z
null
['CVE-2019-10396']
Jenkins Dashboard View Plugin vulnerable to Cross-site Scripting
Dashboard View Plugin did not escape the build description on the Latest Builds View. This resulted in a cross-site scripting vulnerability exploitable by attackers able to control the description of builds shown on that view. Dashboard View Plugin now applies the configured markup formatter to the build description, ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:dashboard-view'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10396'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1489'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/09/12/2'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-02T16:40:43Z', 'nvd_published_at': '2019-09-12T14:15:00Z'}
1.4.0
GHSA-44cm-p9q7-rr3p
2022-12-19T23:52:41Z
2022-05-24T17:29:16Z
null
['CVE-2020-2285']
Missing permission check in Jenkins Liquibase Runner Plugin allows enumerating credentials IDs
Liquibase Runner Plugin 1.4.7 and earlier does not perform a permission check in an HTTP endpoint. This allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. Those can be used as part of an attack to capture the credentials using another vulnerability. An enumera...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:liquibase-runner'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.7'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2285'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/liquibase-runner-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-09-23/#SECURITY-2030'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secu...
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-19T23:52:41Z', 'nvd_published_at': '2020-09-23T14:15:00Z'}
1.4.0
GHSA-9cvr-8xq4-2m73
2022-07-06T21:04:31Z
2022-05-14T01:14:52Z
null
['CVE-2014-8110']
Improper Neutralization of Input During Web Page Generation in Apache ActiveMQ
Multiple cross-site scripting (XSS) vulnerabilities in the web based administration console in Apache ActiveMQ 5.x before 5.10.1 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.activemq:activemq-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.10.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-8110'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/100724'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2%40%3Ccommits.activemq.apache.org%3E...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T21:04:31Z', 'nvd_published_at': '2015-02-12T16:59:00Z'}
1.4.0
GHSA-r9q2-3r6x-qmgp
2022-07-01T18:29:06Z
2022-05-13T01:36:56Z
null
['CVE-2017-2598']
Inadequate Encryption Strength in Jenkins
Jenkins before versions 2.44 and 2.32.2 uses AES ECB block cipher mode without IV for encrypting secrets which makes Jenkins and the stored secrets vulnerable to unnecessary risks (SECURITY-304).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.32.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.32.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-2598'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenkins/commit/e6aa166246d1734f4798a9e31f78842f4c85c28b'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2598'}, {'type': 'PACKAGE', 'url': 'https://github....
{'cwe_ids': ['CWE-326'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T18:29:06Z', 'nvd_published_at': '2018-05-23T13:29:00Z'}
1.4.0
GHSA-m8x8-5ch7-c5w9
2023-07-20T18:23:25Z
2022-05-13T01:18:32Z
null
['CVE-2018-0836']
ChakraCore RCE Vulnerability
Microsoft Edge and ChakraCore in Microsoft Windows 10 1703 and 1709 allows remote code execution, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0834, CVE-2018-0835, CVE-2018-0837, CVE-2018-0838, CVE-2018-0840, CVE-2...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-0836'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/b99d0dcbf5a890e3f5dcdbfcec033f5c92b2bd6d'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0836'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T18:23:25Z', 'nvd_published_at': '2018-02-15T02:29:00Z'}
1.4.0
GHSA-6hvf-xvwm-vrw4
2023-08-01T18:26:15Z
2022-05-13T01:02:16Z
2023-08-01T18:26:15Z
['CVE-2019-9628']
XMLTooling Library Incorrectly Handles Some Exceptions
The XMLTooling library all versions prior to V3.0.4, provided with the OpenSAML and Shibboleth Service Provider software, contains an XML parsing class. Invalid data in the XML declaration causes an exception of a type that was not handled properly in the parser class and propagates an unexpected exception type.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.opensaml:xmltooling'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-9628'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/ubuntu/+source/xmltooling/+bug/1819912'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190611-0003/'}, {'type': 'WEB', 'url': 'https://shibboleth.net/community/adviso...
{'cwe_ids': ['CWE-755'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T23:18:21Z', 'nvd_published_at': '2019-04-11T20:29:00Z'}
1.4.0
GHSA-2chv-87wj-pjv2
2022-11-22T18:45:23Z
2022-05-24T16:54:46Z
null
['CVE-2019-15563']
OHDSI WebAPI vulnerable to SQL Injection
Observational Health Data Sciences and Informatics (OHDSI) WebAPI before 2.7.2 allows SQL injection in `FeatureExtractionService.java`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.ohdsi:WebAPI'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15563'}, {'type': 'WEB', 'url': 'https://github.com/OHDSI/WebAPI/pull/1101'}, {'type': 'WEB', 'url': 'https://github.com/OHDSI/WebAPI/commit/d7b12b2f5234e425e5bc76545e75de0d6eb3f8fd'}, {'type': 'PACKAGE', 'url': 'https://github.com/OHDSI/WebAPI'}, ...
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T18:45:23Z', 'nvd_published_at': '2019-08-26T15:15:00Z'}
1.4.0
GHSA-v6fh-vg22-r6cm
2023-08-03T21:42:49Z
2022-05-17T03:18:28Z
null
['CVE-2015-6830']
phpMyAdmin ReCaptcha bypass
libraries/plugins/auth/AuthenticationCookie.class.php in phpMyAdmin 4.3.x before 4.3.13.2 and 4.4.x before 4.4.14.1 allows remote attackers to bypass a multiple-reCaptcha protection mechanism against brute-force credential guessing by providing a correct response to a single reCaptcha.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.13.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-6830'}, {'type': 'WEB', 'url': 'https://github.com/phpmyadmin/phpmyadmin/commit/0314e67900f01410bc8c81c58a40dc0515e3c91d'}, {'type': 'WEB', 'url': 'https://github.com/phpmyadmin/phpmyadmin/commit/785f4e2711848eb8945894199d5870253a88584e'}, {'type':...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T21:42:49Z', 'nvd_published_at': '2015-09-14T01:59:00Z'}
1.4.0
GHSA-3xpj-jgv5-q4vv
2023-02-14T01:01:49Z
2022-05-14T02:55:47Z
null
['CVE-2011-1582']
Access restriction bypass in Apache Tomcat
Apache Tomcat 7.0.12 and 7.0.13 processes the first request to a servlet without following security constraints that have been configured through annotations, which allows remote attackers to bypass intended access restrictions via HTTP requests. NOTE: this vulnerability exists because of an incomplete fix for CVE-201...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.12'}, {'fixed': '7.0.14'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-1582'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/67515'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'http://mail-archives.apache.org/mod_mbox/www-announce/201105.mbox/...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T01:01:49Z', 'nvd_published_at': '2011-05-20T22:55:00Z'}
1.4.0
GHSA-cgvf-22vv-83h5
2023-08-02T21:03:00Z
2022-05-14T02:47:30Z
null
['CVE-2015-7611']
Apache James Server OS Command Injection
Apache James Server 2.3.2, when configured with file-based user repositories, allows attackers to execute arbitrary system commands via unspecified vectors.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.james:james-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7611'}, {'type': 'WEB', 'url': 'https://blogs.apache.org/james/entry/apache_james_server_2_3'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201207092339/http://www.securityfocus.com/archive/1/536575/100/0/threaded'}, {'type': 'WEB', 'url'...
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-02T21:03:00Z', 'nvd_published_at': '2016-06-07T14:06:00Z'}
1.4.0
GHSA-w7f2-gjxf-2gm9
2022-07-06T20:40:57Z
2022-05-14T02:49:56Z
null
['CVE-2015-0225']
Improper Neutralization of Special Elements used in a Command in Apache Cassandra
The default configuration in Apache Cassandra 1.2.0 through 1.2.19, 2.0.0 through 2.0.13, and 2.1.0 through 2.1.3 binds an unauthenticated JMX/RMI interface to all network interfaces, which allows remote attackers to execute arbitrary Java code via an RMI request.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cassandra:apache-cassandra'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '2.0.14'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cassandra:apache-cassandra'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduce...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-0225'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/131249/Apache-Cassandra-Remote-Code-Execution.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-1947.html'}, {'type': 'WEB', 'url': 'http://www.mail-archive.c...
{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:40:57Z', 'nvd_published_at': '2015-04-03T14:59:00Z'}
1.4.0
GHSA-pjv3-rh6v-2pj8
2022-11-03T19:08:21Z
2022-05-14T00:58:29Z
null
['CVE-2018-1325']
Cross-site Scripting in wicket-jquery-ui
In wicket-jquery-ui <= 6.29.0, <= 7.10.1, <= 8.0.0-M9.1, JS code created in WYSIWYG editor will be executed on display.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.googlecode.wicket-jquery-ui:wicket-jquery-ui-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.29.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.googlecode.wicket-jquery-ui:wicket-jquery-ui-parent'}, 'ranges': [{'type': 'EC...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1325'}, {'type': 'WEB', 'url': 'https://markmail.org/message/6bxjyaolehhq7jrl'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T19:08:21Z', 'nvd_published_at': '2018-04-18T19:29:00Z'}
1.4.0
GHSA-wgw2-gw4v-9w4j
2022-07-07T22:32:22Z
2022-05-17T04:17:55Z
null
['CVE-2014-3628']
Improper Neutralization of Input During Web Page Generation in Apache Solr
Cross-site scripting (XSS) vulnerability in the Admin UI Plugin / Stats page in Apache Solr 4.x before 4.10.3 allows remote attackers to inject arbitrary web script or HTML via the fieldvaluecache object.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.10.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3628'}, {'type': 'WEB', 'url': 'http://mail-archives.us.apache.org/mod_mbox/www-announce/201412.mbox/%3C54A1A7C7.2070804@apache.org%3E'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T22:32:22Z', 'nvd_published_at': '2015-01-06T15:59:00Z'}
1.4.0
GHSA-jjf5-wx3j-3fv7
2022-05-25T22:54:49Z
2022-05-14T00:01:09Z
null
['CVE-2022-21190']
Prototype Pollution in convict
This affects the package convict before 6.2.3. This is a bypass of [CVE-2022-22143](https://security.snyk.io/vuln/SNYK-JS-CONVICT-2340604). The [fix](https://github.com/mozilla/node-convict/commit/3b86be087d8f14681a9c889d45da7fe3ad9cd880) introduced, relies on the startsWith method and does not prevent the vulnerabilit...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'convict'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.2.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21190'}, {'type': 'WEB', 'url': 'https://github.com/mozilla/node-convict/commit/1ea0ab19c5208f66509e1c43b0d0f21c1fd29b75'}, {'type': 'WEB', 'url': 'https://gist.github.com/dellalibera/cebce20e51410acebff1f46afdc89808'}, {'type': 'PACKAGE', 'url': '...
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T22:54:49Z', 'nvd_published_at': '2022-05-13T20:15:00Z'}
1.4.0
GHSA-3g6w-4m7x-97v6
2023-08-29T21:36:44Z
2022-05-17T04:32:23Z
null
['CVE-2012-5494']
Plone Cross-site scripting Vulnerability
Cross-site scripting (XSS) vulnerability in python_scripts.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, related to "{u,}translate."
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3a1'}, {'fixed': '4.3b1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-5494'}, {'type': 'WEB', 'url': 'https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt'}, {'type': 'WEB', 'url': 'https://plone.org/products/plone-hotfix/releases/20121106'}, {'type': 'WEB', 'url': 'https://plone.org/products/plone/...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T21:36:44Z', 'nvd_published_at': '2014-09-30T14:55:00Z'}
1.4.0
GHSA-w39x-chvm-pj3c
2022-05-19T22:21:59Z
2022-05-03T00:00:44Z
null
['CVE-2022-25767']
Deserialization of Untrusted Data in com.bstek.ureport:ureport2-console
All versions of package com.bstek.ureport:ureport2-console are vulnerable to Remote Code Execution by connecting to a malicious database server, causing arbitrary file read and deserialization of local gadgets.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.bstek.ureport:ureport2-console'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25767'}, {'type': 'WEB', 'url': 'https://github.com/JinYiTong/CVE-Req/blob/main/ureport2/ureport2-console.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/youseries/ureport'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-COMBSTEKUREPO...
{'cwe_ids': ['CWE-502', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-05-19T22:21:59Z', 'nvd_published_at': '2022-05-01T16:15:00Z'}
1.4.0
GHSA-cm8f-h6j3-p25c
2023-08-29T23:32:40Z
2022-05-24T22:05:00Z
null
['CVE-2022-29190']
Pion DTLS Header reconstruction method can be thrown into an infinite loop
### Impact An attacker can send packets that will send Pion DTLS into an infinite loop when processing. ### Patches Upgrade to Pion DTLS v2.1.4 ### Workarounds No workarounds available, upgrade to Pion DTLS v2.1.4 ### References Thank you to [Juho Nurminen](https://github.com/jupenur) and the Mattermost team for dis...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/pion/dtls'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/pion/dtls/v2'}, 'ecosystem_specific': {'affected_functions': ...
[{'type': 'WEB', 'url': 'https://github.com/pion/dtls/security/advisories/GHSA-cm8f-h6j3-p25c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29190'}, {'type': 'WEB', 'url': 'https://github.com/pion/dtls/commit/e0b2ce3592e8e7d73713ac67b363a2e192a4cecf'}, {'type': 'WEB', 'url': 'https://github....
{'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:05:00Z', 'nvd_published_at': '2022-05-21T00:15:00Z'}
1.4.0
GHSA-h8jq-5737-hpcf
2023-07-21T22:05:16Z
2022-05-13T01:20:48Z
null
['CVE-2018-8355']
ChakraCore RCE Vulnerability
A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka "Scripting Engine Memory Corruption Vulnerability." This affects ChakraCore, Internet Explorer 11, Microsoft Edge. This CVE ID is unique from CVE-2018-8353, CVE-2018-8359, CVE-2018-8371, CVE...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8355'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/5596'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/cf3ef506236da5b7651f4785966ab3131a4aa083'}, {'type': 'WEB', 'url': 'https://portal.msrc....
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T22:05:16Z', 'nvd_published_at': '2018-08-15T17:29:00Z'}
1.4.0
GHSA-9hcr-66cj-r9hp
2022-12-20T22:38:49Z
2022-05-24T17:27:06Z
null
['CVE-2020-2246']
Stored XSS vulnerability in Jenkins Valgrind Plugin
Jenkins Valgrind Plugin 0.28 and earlier does not escape content in Valgrind XML reports, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control Valgrind XML report contents.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:valgrind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.28'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2246'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/valgrind-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-09-01/#SECURITY-1830'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/09...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T22:38:49Z', 'nvd_published_at': '2020-09-01T14:15:00Z'}
1.4.0
GHSA-g549-jfg6-98ch
2023-07-21T18:40:06Z
2022-05-13T01:18:42Z
null
['CVE-2018-0994']
ChakraCore RCE Vulnerability
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-0979, CVE-2018-0980, CVE-2018-0990, CVE-2018-0...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-0994'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/0578ca55215d2eda74280e17c4b9bcc3c38dfd6a'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0994'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T18:40:06Z', 'nvd_published_at': '2018-04-12T01:29:00Z'}
1.4.0
GHSA-pc54-pchm-xcw6
2022-06-17T01:12:47Z
2022-05-17T04:13:50Z
null
['CVE-2014-7839']
XML External Entity Reference in RESTEasy
DocumentProvider in RESTEasy 2.3.7 and 3.0.9 does not configure the (1) external-general-entities or (2) external-parameter-entities features, which allows remote attackers to conduct XML external entity (XXE) attacks via unspecified vectors.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:resteasy-jaxrs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.11.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.10.Final'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-7839'}, {'type': 'WEB', 'url': 'https://github.com/resteasy/resteasy/pull/611/commits/3ab999c899c455a0b0a00bf5e455ed3e8d9ae347'}, {'type': 'WEB', 'url': 'https://github.com/resteasy/resteasy/pull/611/commits/8b5d8cfc963794a74636d9a840e899408ec8fdc6...
{'cwe_ids': ['CWE-20', 'CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T01:12:47Z', 'nvd_published_at': '2014-11-25T15:59:00Z'}
1.4.0
GHSA-rc7h-x6cq-988q
2023-06-01T19:57:55Z
2022-05-13T01:03:31Z
null
['CVE-2016-2141']
Improper Input Validation in JGroups
JGroups before 4.0 does not require the proper headers for the ENCRYPT and AUTH protocols from nodes joining the cluster, which allows remote attackers to bypass security restrictions and send and receive messages within the cluster via unspecified vectors. Fixes for this issue have been backported to versions 3.6.10.F...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jgroups:jgroups'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.0.Alpha1'}, {'fixed': '3.6.10.Final'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jgroups:jgroups'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3....
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-2141'}, {'type': 'WEB', 'url': 'https://github.com/belaban/JGroups/commit/eeaf5241cce464ef21a2dfc4938729ade9ebef36'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:1345'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errat...
{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:02:18Z', 'nvd_published_at': '2016-06-30T16:59:00Z'}
1.4.0
GHSA-5c2c-cvg6-ghjm
2022-12-16T15:47:12Z
2022-05-24T19:12:36Z
null
['CVE-2021-21681']
Password stored in plain text by Jenkins Nomad Plugin
Nomad Plugin 0.7.4 and earlier stores the passwords to authenticate against the Docker registry unencrypted in the global `config.xml` file on the Jenkins controller as part of its worker templates configuration. These passwords can be viewed by users with access to the Jenkins controller file system. Nomad Plugin 0....
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.7.4'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21681'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/nomad-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-08-31/#SECURITY-2396'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/...
{'cwe_ids': ['CWE-256', 'CWE-522'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-16T15:47:12Z', 'nvd_published_at': '2021-08-31T14:15:00Z'}
1.4.0
GHSA-v222-w2mw-xjc6
2022-07-01T17:41:02Z
2022-05-13T01:36:54Z
null
['CVE-2017-2609']
Exposure of Sensitive Information to an Unauthorized Actor in Jenkins
jenkins before versions 2.44, 2.32.2 is vulnerable to an information disclosure vulnerability in search suggestions (SECURITY-385). The autocomplete feature on the search box discloses the names of the views in its suggestions, including the ones for which the current user does not have access to.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.32.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.34'}, {...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-2609'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenkins/commit/13905d8224899ba7332fe9af4e330ea96a2ae319'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2609'}, {'type': 'PACKAGE', 'url': 'https://github....
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T17:41:02Z', 'nvd_published_at': '2018-05-22T17:29:00Z'}
1.4.0
GHSA-52gq-7j6c-xw6x
2022-06-29T18:54:45Z
2022-05-13T01:53:28Z
null
['CVE-2018-8016']
Missing Authentication for Critical Function in Apache Cassandra
The default configuration in Apache Cassandra 3.8 through 3.11.1 binds an unauthenticated JMX/RMI interface to all network interfaces, which allows remote attackers to execute arbitrary Java code via an RMI request. This issue is a regression of CVE-2015-0225. The regression was introduced in https://issues.apache.org/...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cassandra:cassandra-all'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.8'}, {'fixed': '3.11.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.11.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8016'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/bafb9060bbdf958a1c15ba66c68531116fba4a83858a2796254da066@%3Cuser.cassandra.apache.org%3E'}]
{'cwe_ids': ['CWE-306'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T18:54:45Z', 'nvd_published_at': '2018-06-28T16:29:00Z'}
1.4.0
GHSA-q2rq-qgcf-m22w
2023-08-03T22:44:35Z
2022-05-14T00:57:47Z
null
['CVE-2016-3953']
web2py remote code execution via hardcoded encryption key in session.connect function
The sample web application in web2py before 2.14.2 might allow remote attackers to execute arbitrary code via vectors involving use of a hardcoded encryption key when calling the `session.connect` function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'web2py'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.14.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3953'}, {'type': 'WEB', 'url': 'https://github.com/web2py/web2py/issues/1205'}, {'type': 'WEB', 'url': 'https://github.com/web2py/web2py/commit/9706d125b42481178d2b423de245f5d2faadbf40'}, {'type': 'WEB', 'url': 'https://devco.re/blog/2017/01/03/web...
{'cwe_ids': ['CWE-798'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T22:44:35Z', 'nvd_published_at': '2018-02-06T18:29:00Z'}
1.4.0
GHSA-59fm-6x3q-q3q5
2022-11-02T00:40:54Z
2022-05-14T03:57:44Z
null
['CVE-2016-3725']
Missing permissions check in Jenkins Core
Jenkins before 2.3 and LTS before 1.651.2 allows remote authenticated users to trigger updating of update site metadata by leveraging a missing permissions check. NOTE: this issue can be combined with DNS cache poisoning to cause a denial of service (service disruption).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3725'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:1206'}, {'type': 'WEB', 'url': 'https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-05-11'}, {'type': 'WEB', 'url': 'https://www.cloudbees.com/jenkin...
{'cwe_ids': ['CWE-280'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-02T00:40:54Z', 'nvd_published_at': '2016-05-17T14:08:00Z'}
1.4.0
GHSA-92pw-mff9-jqgm
2023-08-03T22:16:50Z
2022-05-17T02:49:26Z
null
['CVE-2015-1838']
Salt improper handling of tmp files
`modules/serverdensity_device.py` in SaltStack before 2014.7.4 does not properly handle files in `/tmp`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'salt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2014.7.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-1838'}, {'type': 'WEB', 'url': 'https://github.com/saltstack/salt/commit/e11298d7155e9982749483ca5538e46090caef9c'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1212784'}, {'type': 'WEB', 'url': 'https://docs.saltstack.com/e...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T22:16:50Z', 'nvd_published_at': '2017-04-13T14:59:00Z'}
1.4.0
GHSA-q6x7-f33r-3wxx
2022-07-06T19:45:35Z
2022-05-13T01:02:15Z
null
['CVE-2016-6797']
Incorrect Authorization in Apache Tomcat
The ResourceLinkFactory implementation in Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 did not limit web application access to global JNDI resources to those resources explicitly linked to the web application. Therefore, it was possible for a web applicati...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat-catalina'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0.M1'}, {'fixed': '9.0.0.M10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.0.0.M9'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:t...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6797'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:0455'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:0456'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2247'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:45:35Z', 'nvd_published_at': '2017-08-10T22:29:00Z'}
1.4.0
GHSA-56f9-5563-m2h7
2023-08-04T23:08:49Z
2022-05-17T03:59:51Z
null
['CVE-2015-8755']
Typo3 XSS Vulnerability
Multiple cross-site scripting (XSS) vulnerabilities in unspecified backend components in TYPO3 6.2.x before 6.2.16 and 7.x before 7.6.1 allow remote authenticated editors to inject arbitrary web script or HTML via unknown vectors.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.2'}, {'fixed': '6.2.16'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0'}, {'fixed': '7.6.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8755'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160621193435/http://www.securityfocus.com/bid/79236'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20161012163838/http://www.securitytracker.com/id/1034483'}, {'type': 'WEB', 'ur...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-04T23:08:49Z', 'nvd_published_at': '2016-01-08T19:59:00Z'}
1.4.0
GHSA-g74w-93cp-5p3p
2022-12-02T20:50:47Z
2022-05-18T00:00:40Z
null
['CVE-2022-30952']
Insufficiently Protected Credentials in Jenkins Pipeline SCM API for Blue Ocean Plugin
When pipelines are created using the pipeline creation wizard in Blue Ocean, the credentials used are stored in the per-user credentials store of the user creating the pipeline. To allow pipelines to use this credential to scan repositories and checkout from SCM, the Blue Ocean Credentials Provider allows pipelines to ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.blueocean:blueocean-pipeline-scm-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.25.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30952'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/blueocean-plugin/tree/master/blueocean-pipeline-scm-api'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-714'}, {'type': 'WEB', 'url': 'http:/...
{'cwe_ids': ['CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-02T14:57:49Z', 'nvd_published_at': '2022-05-17T15:15:00Z'}
1.4.0
GHSA-gmpm-xp43-f7g6
2022-06-24T01:23:39Z
2022-05-24T17:27:39Z
null
['CVE-2020-1913']
Signed to Unsigned Conversion Error in Facebook Hermes
An Integer signedness error in the JavaScript Interpreter in Facebook Hermes prior to commit 2c7af7ec481ceffd0d14ce2d7c045e475fd71dc6 allows attackers to cause a denial of service attack or a potential RCE via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of u...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'hermes-engine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.4.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1913'}, {'type': 'WEB', 'url': 'https://github.com/facebook/hermes/commit/2c7af7ec481ceffd0d14ce2d7c045e475fd71dc6'}, {'type': 'WEB', 'url': 'https://www.facebook.com/security/advisories/cve-2020-1913'}]
{'cwe_ids': ['CWE-195', 'CWE-681'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T01:23:39Z', 'nvd_published_at': '2020-09-09T19:15:00Z'}
1.4.0
GHSA-p83v-8vmr-qfv9
2023-07-25T00:30:32Z
2022-05-14T01:39:14Z
null
['CVE-2018-19295']
Sylabs Singularity Improper Input Validation
Sylabs Singularity 2.4 to 2.6 allows local users to conduct Improper Input Validation attacks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/sylabs/singularity'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4'}, {'last_affected': '2.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19295'}, {'type': 'WEB', 'url': 'https://github.com/sylabs/singularity/releases/tag/2.6.1'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T00:30:32Z', 'nvd_published_at': '2018-12-17T15:29:00Z'}
1.4.0
GHSA-c79v-2rjq-965m
2023-07-26T19:37:50Z
2022-05-13T01:42:32Z
null
['CVE-2017-11767']
ChakraCore Privilege Escalation
ChakraCore allows an attacker to gain the same user rights as the current user, due to the way that the ChakraCore scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability".
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-11767'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/3727'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/3727/commits/b3e3959d14814f42ee2197c504c322bcbe12347d'}, {'type': 'WEB', 'url': 'https://...
{'cwe_ids': ['CWE-119'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T19:37:50Z', 'nvd_published_at': '2017-11-02T19:29:00Z'}
1.4.0
GHSA-7hxc-mwx7-5hmc
2023-08-15T22:21:45Z
2022-05-17T04:31:32Z
null
['CVE-2012-5485']
Plone Code Injection vulnerability
`registerConfiglet.py` in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via unspecified vectors, related to the admin interface.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'E...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-5485'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2014:1194'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2012-5485'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=878934'}, {'type'...
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T17:57:05Z', 'nvd_published_at': '2014-09-30T14:55:00Z'}
1.4.0
GHSA-vm69-474v-7q2w
2022-07-08T18:59:32Z
2022-05-05T02:48:41Z
null
['CVE-2013-0248']
Incorrect Default Permissions in Apache Commons FileUpload
The default configuration of javax.servlet.context.tempdir in Apache Commons FileUpload 1.0 through 1.2.2 uses the /tmp directory for uploaded files, which allows local users to overwrite arbitrary files via an unspecified symlink attack.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'commons-fileupload:commons-fileupload'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0'}, {'fixed': '1.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0248'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-39'}, {'type': 'WEB', 'url': 'http://archives.neohapsis.com/archives/bugtraq/2013-03/0035.html'}, {'type': 'WEB', 'url': 'http://marc.info/?l=bugtraq&m=144050155601375&w=2'}, {...
{'cwe_ids': ['CWE-276'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T18:59:32Z', 'nvd_published_at': '2013-03-15T20:55:00Z'}
1.4.0
GHSA-rvx4-gg8w-qw24
2022-12-07T18:18:52Z
2022-05-13T01:48:31Z
null
['CVE-2018-1000109']
Jenkins Google Play Android Publisher Plugin allows attacker to obtain credential IDs
An improper authorization vulnerability exists in Jenkins Google Play Android Publisher Plugin version 1.6 and earlier in `GooglePlayBuildStepDescriptor.java` that allow an attacker to obtain credential IDs. As of version 1.7, enumeration of credentials IDs and validation of specified credentials in this plugin require...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:google-play-android-publisher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.6'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000109'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/google-play-android-publisher-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-02-26/#SECURITY-715'}]
{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-07T18:18:52Z', 'nvd_published_at': '2018-03-13T13:29:00Z'}
1.4.0
GHSA-5m64-9hq5-5pf2
2023-07-25T23:22:35Z
2022-05-13T01:12:20Z
null
['CVE-2017-11422']
Statamic framework Incorrect Permission Assignment
Statamic framework before 2.6.0 does not correctly check a session's permissions when the methods from a user's class are called. Problematic methods include reset password, create new account, create new role, etc.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'statamic/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-11422'}]
{'cwe_ids': ['CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T23:22:35Z', 'nvd_published_at': '2017-07-24T12:29:00Z'}
1.4.0
GHSA-v6c7-8qx5-8gmp
2022-11-03T21:09:17Z
2022-05-17T03:47:51Z
null
['CVE-2013-2185']
Deserialization of Untrusted Data in Apache Tomcat
The readObject method in the DiskFileItem class in Apache Tomcat and JBoss Web, as used in Red Hat JBoss Enterprise Application Platform 6.1.0 and Red Hat JBoss Portal 6.0.0, allows remote attackers to write to arbitrary files via a NULL byte in a file name in a serialized instance, a similar issue to CVE-2013-2186. ...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.39'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2185'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2014/10/24/12'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-1193.html'}, {'type': 'WEB', 'url...
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T21:09:17Z', 'nvd_published_at': '2014-01-19T18:02:00Z'}
1.4.0
GHSA-5gq7-826w-8282
2023-07-06T23:51:23Z
2022-05-24T19:18:01Z
null
['CVE-2021-3846']
Unrestricted File Upload vulnerability in Firefly III
firefly-iii is vulnerable to Unrestricted Upload of File with Dangerous Type
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'grumpydictator/firefly-iii'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3846'}, {'type': 'WEB', 'url': 'https://github.com/firefly-iii/firefly-iii/commit/a85b6420c19ace35134f896e094e1971d8c7954b'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/5267ec1c-d204-40d2-bd4f-6c2dd495ee18'}]
{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T23:51:23Z', 'nvd_published_at': '2021-10-19T13:15:00Z'}
1.4.0
GHSA-77m7-9wvw-87fx
2022-05-23T20:10:38Z
2022-05-03T00:00:46Z
null
['CVE-2022-23923']
Privilege Issues in jailed
All versions of package jailed are vulnerable to Sandbox Bypass via an exported alert() method which can access the main application. Exported methods are stored in the application.remote object.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'jailed'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23923'}, {'type': 'PACKAGE', 'url': 'https://github.com/asvd/jailed'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2441254'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-JAILED-2391490'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-23T20:10:38Z', 'nvd_published_at': '2022-05-01T16:15:00Z'}
1.4.0
GHSA-93c7-2942-3h47
2023-07-25T19:29:48Z
2022-05-14T02:03:04Z
null
['CVE-2018-8315']
ChakraCore information disclosure vulnerability
An information disclosure vulnerability exists when the browser scripting engine improperly handle object types, aka "Microsoft Scripting Engine Information Disclosure Vulnerability." This affects ChakraCore, Internet Explorer 11, Microsoft Edge, Internet Explorer 10.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8315'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/5688'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/e03b3e30160ac5846b246931634962ce6bd1db83'}, {'type': 'WEB', 'url': 'https://portal.msrc....
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T19:29:48Z', 'nvd_published_at': '2018-09-13T00:29:00Z'}
1.4.0
GHSA-hw26-fw67-qxm9
2023-01-06T17:05:22Z
2022-05-24T17:08:46Z
null
['CVE-2020-2112']
Jenkins Git Parameter Plugin vulnerable to Stored cross-site scripting (XSS)
Jenkins Git Parameter Plugin 0.9.11 and earlier does not escape the parameter name shown on the UI, resulting in a stored cross-site scripting vulnerability exploitable by users with Job/Configure permission.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.tools:git-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.12'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.11'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2112'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/git-parameter-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-02-12/#SECURITY-1709'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/20...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-06T17:05:22Z', 'nvd_published_at': '2020-02-12T15:15:00Z'}
1.4.0
GHSA-8h2q-qm9x-55jc
2022-07-13T18:43:06Z
2022-05-04T00:27:43Z
null
['CVE-2012-0022']
Denial of Service in Apache Tomcat
Apache Tomcat 5.5.x before 5.5.35, 6.x before 6.0.34, and 7.x before 7.0.23 uses an inefficient approach for handling parameters, which allows remote attackers to cause a denial of service (CPU consumption) via a request that contains many parameters and parameter values, a different vulnerability than CVE-2011-4858.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.5.0'}, {'fixed': '5.5.35'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-0022'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/72425'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f1180...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T18:43:06Z', 'nvd_published_at': '2012-01-19T04:01:00Z'}
1.4.0
GHSA-qvhv-pwww-53jj
2023-09-21T09:46:22Z
2022-05-24T17:07:30Z
null
['CVE-2020-8091']
Typo3 Cross-Site Scripting in Flash component (ELTS)
TYPO3 6.2.0 to 6.2.38 ELTS and 7.0.0 to 7.1.0 included a vulnerable external component, which could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack on a targeted system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.2.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.1.0'}}, {'package': {'ecosystem': 'Packagist', 'n...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8091'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/commit/482e2e992f80f5e38cb48fcaea40fd9812a5252c'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3/typo3'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/blob/4cb53e828bd5...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T23:19:58Z', 'nvd_published_at': '2020-01-27T22:15:00Z'}
1.4.0
GHSA-qrhq-x7xh-2784
2023-08-23T18:01:01Z
2022-05-24T17:30:01Z
null
['CVE-2020-26523']
Froala WYSIWYG Editor XSS Vulnerability
Froala Editor before 3.2.2 allows XSS via pasted content.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'froala/wysiwyg-editor'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26523'}, {'type': 'WEB', 'url': 'https://froala.com/wysiwyg-editor/changelog/'}, {'type': 'PACKAGE', 'url': 'https://github.com/froala/wysiwyg-editor'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T23:09:43Z', 'nvd_published_at': '2020-10-02T07:15:00Z'}
1.4.0
GHSA-x5fc-pgpx-59j5
2023-08-17T16:14:30Z
2022-05-13T01:14:26Z
null
['CVE-2010-1870']
Server side object manipulation in Apache Struts
OGNL provides, among other features, extensive expression evaluation capabilities. This vulnerability allows a malicious user to bypass the '#'-usage protection built into the ParametersInterceptor, thus being able to manipulate server side context objects. This behavior was already addressed in [S2-003](https://cwiki....
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-1870'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/WW/S2-003'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/struts'}, {'type': 'WEB', 'url': 'http://blog.o0o.nu/2010/07/cve-2010-1870-struts2xwork-remote.html'}, {'...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T19:11:38Z', 'nvd_published_at': '2010-08-17T20:00:00Z'}
1.4.0
GHSA-h3j8-fr5q-8rfr
2023-07-11T16:45:32Z
2022-05-24T19:06:05Z
null
['CVE-2021-31649']
JFinal Java Deserialization Vulnerability
In applications using jfinal 4.9.08 and below, there is a deserialization vulnerability when using redis which can lead to remote code execution
[]
[{'package': {'ecosystem': 'Maven', 'name': 'com.jfinal:jfinal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.9.08'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31649'}, {'type': 'WEB', 'url': 'https://github.com/jfinal/jfinal/issues/184'}, {'type': 'WEB', 'url': 'http://note.youdao.com/noteshare?id=787ccbb8345dbd4a905aebe35f1d8aa8&sub=6C5C072C901949429EFD978405212FA4'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-11T16:45:32Z', 'nvd_published_at': '2021-06-24T16:15:00Z'}
1.4.0
GHSA-v8jw-x9wq-hw4v
2023-08-01T23:30:45Z
2022-05-24T22:00:06Z
null
['CVE-2019-1052']
ChakraCore RCE via Out-of-bounds write
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0989, CVE-2019-0991, CVE-2019-0992, CVE-2019-0993, CVE-2019-1002, CVE-2019-1003, CVE-20...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1052'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/66ab97c09c49c631234c0ec202b0822d0c2833cc'}, {'type...
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T23:30:45Z', 'nvd_published_at': '2019-06-12T14:29:00Z'}
1.4.0
GHSA-3f2c-jm6v-cr35
2023-09-05T14:09:01Z
2022-05-17T00:27:18Z
null
['CVE-2016-9014']
Django DNS Rebinding Vulnerability
Django before 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3, when settings.DEBUG is True, allow remote attackers to conduct DNS rebinding attacks by leveraging failure to validate the HTTP Host header against settings.ALLOWED_HOSTS.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8'}, {'fixed': '1.8.16'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-9014'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OG5ROMUPS6C7BXELD3TAUUH7OBYV56WQ/'}, {'type': 'WEB', 'url...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T22:41:12Z', 'nvd_published_at': '2016-12-09T20:59:00Z'}
1.4.0
GHSA-hqhf-8jgc-h5hx
2023-09-25T19:02:03Z
2022-05-24T16:52:23Z
null
['CVE-2019-7859']
Magento 2 Community Edition Path Traversal Vulnerability
A path traversal vulnerability in the WYSIWYG editor for Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2 could result in unauthorized access to uploaded images due to insufficient access control.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7859'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220127030535/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-24'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T21:54:11Z', 'nvd_published_at': '2019-08-02T22:15:00Z'}
1.4.0
GHSA-87r3-4gc8-f897
2023-09-26T20:40:35Z
2022-05-24T17:11:33Z
null
['CVE-2019-19210']
Dolibarr ERP and CRM contain XSS Vulnerability
Dolibarr ERP/CRM before 10.0.3 allows XSS because uploaded HTML documents are served as text/html despite being renamed to .noexe files.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19210'}, {'type': 'PACKAGE', 'url': 'https://github.com/Dolibarr/dolibarr'}, {'type': 'WEB', 'url': 'https://herolab.usd.de/security-advisories/usd-2019-0052/'}, {'type': 'WEB', 'url': 'https://www.dolibarr.org/forum/dolibarr-changelogs'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T23:43:43Z', 'nvd_published_at': '2020-03-16T15:15:00Z'}
1.4.0
GHSA-w45j-f832-hxvh
2023-08-29T23:28:42Z
2022-05-25T19:26:09Z
null
['CVE-2022-29222']
Pion/DLTS Accepts Client Certificates Without CertificateVerify
### Impact A DTLS Client could provide a Certificate that it doesn't posses the private key for and Pion DTLS wouldn't reject it. This issue affects users that are using Client certificates only. The connection itself is still secure. The Certificate provided by clients can't be trusted when using a Pion DTLS server ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/pion/dtls'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.5'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/pion/dtls/v2'}, 'ecosystem_specific': {'affected_functions': ...
[{'type': 'WEB', 'url': 'https://github.com/pion/dtls/security/advisories/GHSA-w45j-f832-hxvh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29222'}, {'type': 'WEB', 'url': 'https://github.com/pion/dtls/commit/d2f797183a9f044ce976e6df6f362662ca722412'}, {'type': 'WEB', 'url': 'https://github....
{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T19:26:09Z', 'nvd_published_at': '2022-05-21T00:15:00Z'}
1.4.0
GHSA-65x8-9vgm-5fg5
2023-07-07T13:48:29Z
2022-05-24T17:40:04Z
null
['CVE-2020-22643']
Feehi CMS arbitrary file upload vulnerability
Feehi CMS 2.1.0-beta is affected by an arbitrary file upload vulnerability, potentially resulting in remote code execution. After an administrator logs in, open the administrator image upload page to potentially upload malicious files.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'feehi/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.0-beta'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-22643'}, {'type': 'WEB', 'url': 'https://github.com/liufee/cms/issues/51'}, {'type': 'PACKAGE', 'url': 'https://github.com/liufee/cms'}]
{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T13:48:29Z', 'nvd_published_at': '2021-01-26T18:15:00Z'}
1.4.0
GHSA-r83x-wj75-v89r
2023-07-21T23:24:45Z
2022-05-13T01:32:03Z
null
['CVE-2018-6333']
Nuclide Improper Input Validation
The hhvm-attach deep link handler in Nuclide did not properly sanitize the provided hostname parameter when rendering. As a result, a malicious URL could be used to render HTML and other content inside of the editor's context, which could potentially be chained to lead to code execution. This issue affected Nuclide pri...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'nuclide'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.290.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-6333'}, {'type': 'WEB', 'url': 'https://github.com/facebook/nuclide/commit/65f6bbd683404be1bb569b8d1be84b5d4c74a324'}]
{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T23:24:45Z', 'nvd_published_at': '2018-12-31T23:29:00Z'}
1.4.0
GHSA-527r-mfmj-prqf
2023-02-08T18:11:20Z
2022-05-14T01:09:00Z
null
['CVE-2016-3072']
Katello SQL Injection vulnerabilities
Multiple SQL injection vulnerabilities in the scoped_search function in app/controllers/katello/api/v2/api_controller.rb in Katello allow remote authenticated users to execute arbitrary SQL commands via the (1) sort_by or (2) sort_order parameter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'katello'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3072'}, {'type': 'WEB', 'url': 'https://github.com/Katello/katello/pull/6051'}, {'type': 'WEB', 'url': 'https://github.com/Katello/katello/commit/5645ed4365980a34e30a9c57fe0793dff729e8e4'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/R...
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T18:11:20Z', 'nvd_published_at': '2016-06-07T18:59:00Z'}
1.4.0
GHSA-v6gf-x8fp-532v
2022-07-06T20:08:26Z
2022-05-17T03:58:49Z
null
['CVE-2015-8797']
Improper Neutralization of Input During Web Page Generation in Apache Solr
Cross-site scripting (XSS) vulnerability in webapp/web/js/scripts/plugins.js in the stats page in the Admin UI in Apache Solr before 5.3.1 allows remote attackers to inject arbitrary web script or HTML via the entry parameter to a plugins/cache URI.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.3.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8797'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/SOLR-7949'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21975544'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:08:26Z', 'nvd_published_at': '2016-02-15T02:59:00Z'}
1.4.0
GHSA-73rp-q4rx-5grc
2022-05-24T22:00:35Z
2022-05-10T00:00:21Z
null
['CVE-2022-1631']
Incorrect Authorization in microweber
Users Account Pre-Takeover or Users Account Takeover. in GitHub repository microweber/microweber prior to 1.2.15. Victim Account Take Over. Since, there is no email confirmation, an attacker can easily create an account in the application using the Victim’s Email. This allows an attacker to gain pre-authentication to t...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.15'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1631'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/c162dfffb9bfd264d232aaaf5bb3daee16a3cb38'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/5...
{'cwe_ids': ['CWE-284', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:00:35Z', 'nvd_published_at': '2022-05-09T14:15:00Z'}
1.4.0
GHSA-xprw-xvvm-vqmv
2022-07-08T18:49:01Z
2022-05-17T00:29:52Z
null
['CVE-2010-2232']
Improper Access Control in Apache Derby
In Apache Derby 10.1.2.1, 10.2.2.0, 10.3.1.4, and 10.4.1.3, Export processing may allow an attacker to overwrite an existing file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.derby:derby'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.1.2.1'}, {'fixed': '10.4.2.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.4.1.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-2232'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/DERBY-2925'}, {'type': 'WEB', 'url': 'http://db.apache.org/derby/releases/release-10.6.2.1.html#Note+for+DERBY-2925'}]
{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T18:49:01Z', 'nvd_published_at': '2017-10-23T13:29:00Z'}
1.4.0
GHSA-frqh-x6r7-h6mq
2022-11-04T18:45:07Z
2022-05-17T01:17:22Z
null
['CVE-2017-3153']
Cross-site Scripting in Apache Atlas
Apache Atlas versions 0.6.0-incubating and 0.7.0-incubating were found vulnerable to Reflected XSS in the search functionality.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.atlas:atlas-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.1-incubating'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-3153'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/atlas'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/4a4fef91e067fd0d9da569e30867c1fa65e2a0520acde71ddefee0ea@%3Cdev.atlas.apache.org%3E'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-04T18:45:07Z', 'nvd_published_at': '2017-08-29T20:29:00Z'}
1.4.0
GHSA-h4v9-jf2r-9h6m
2022-11-03T20:34:17Z
2022-05-14T02:50:59Z
null
['CVE-2014-7809']
Cross-Site Request Forgery in Apache Struts
Apache Struts 2.0.0 through 2.3.x before 2.3.20 uses predictable <s:token/> values, which allows remote attackers to bypass the CSRF protection mechanism.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.20'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-7809'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20150201180327/http://www.securitytracker.com/id/1031309'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20150820131625/http://www.securityfocus.com/bid/71548'}, {'type': 'WEB', 'ur...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T20:34:17Z', 'nvd_published_at': '2014-12-10T15:59:00Z'}
1.4.0
GHSA-pr9h-g7p7-rrqh
2022-11-03T19:13:08Z
2022-05-14T03:46:08Z
null
['CVE-2018-1000011']
XML External Entity Reference in Jenkins FindBugs Plugin
Jenkins FindBugs Plugin 4.71 and earlier processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forgery, or denial-of-service attacks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jvnet.hudson.plugins.findbugs:library'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.7.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000011'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-01-22/'}]
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T19:13:08Z', 'nvd_published_at': '2018-01-23T14:29:00Z'}
1.4.0
GHSA-jm4g-8rvq-v87j
2022-12-14T16:18:06Z
2022-05-24T19:04:53Z
null
['CVE-2021-21664']
Missing permission check in XebiaLabs XL Deploy Plugin allows capturing credentials
An incorrect permission check in Jenkins XebiaLabs XL Deploy Plugin 10.0.1 and earlier allows attackers with Generic Create permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing Username/password credentials stored in Jenkins.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.xebialabs.deployit.ci:deployit-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.0.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.0.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21664'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/xldeploy-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-06-10/#SECURITY-1982'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/20...
{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-14T16:18:06Z', 'nvd_published_at': '2021-06-10T15:15:00Z'}
1.4.0
GHSA-2cjc-rgmp-x649
2023-07-19T23:20:05Z
2022-05-13T01:07:40Z
null
['CVE-2018-15598']
Traefik Missing Authentication
Containous Traefik 1.6.x before 1.6.6, when `--api` is used, exposes the configuration and secret if authentication is missing and the API's port is publicly reachable.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/traefik/traefik/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6'}, {'fixed': '1.6.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-15598'}, {'type': 'WEB', 'url': 'https://github.com/containous/traefik/pull/3790'}, {'type': 'WEB', 'url': 'https://github.com/containous/traefik/pull/3790/commits/113250ce5735d554c502ca16fb03bb9119ca79f1'}, {'type': 'WEB', 'url': 'https://github.c...
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T23:20:05Z', 'nvd_published_at': '2018-08-21T01:29:00Z'}
1.4.0
GHSA-vx6p-q4gj-x6xx
2023-01-26T23:52:12Z
2022-05-24T19:18:04Z
null
['CVE-2021-25972']
Camaleon CMS vulnerable to Server-Side Request Forgery
In Camaleon CMS, versions 2.1.2.0 through 2.6.0, are vulnerable to Server-Side Request Forgery (SSRF) in the media upload feature, which allows admin users to fetch media files from external URLs but fails to validate URLs referencing to localhost or other internal servers. This allows attackers to read files stored in...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'camaleon_cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.2.0'}, {'fixed': '2.6.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25972'}, {'type': 'WEB', 'url': 'https://github.com/owen2345/camaleon-cms/commit/5a252d537411fdd0127714d66c1d76069dc7e190'}, {'type': 'PACKAGE', 'url': 'https://github.com/owen2345/camaleon-cms'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/...
{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-26T23:52:12Z', 'nvd_published_at': '2021-10-20T12:15:00Z'}
1.4.0
GHSA-7mfw-g8x4-rq2w
2023-07-27T00:29:53Z
2022-05-17T00:51:04Z
null
['CVE-2017-12156']
Moodle XSS Vulnerability
Moodle 3.x has XSS in the contact form on the "non-respondents" page in non-anonymous feedback.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3'}, {'fixed': '3.3.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.1'}}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSY...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12156'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/a39d2976fe5e91da7a28a8512d5b94d4a27067b8'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=358585'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-27T00:29:53Z', 'nvd_published_at': '2017-09-18T04:29:00Z'}
1.4.0
GHSA-g8xg-jgj6-49r3
2023-08-17T23:06:01Z
2022-05-05T02:48:45Z
null
['CVE-2013-0306']
Django is vulnerable to Denial of Service attack in formset
The form library in Django 1.3.x before 1.3.6, 1.4.x before 1.4.4, and 1.5 before release candidate 2 allows remote attackers to bypass intended resource limits for formsets and cause a denial of service (memory consumption) or trigger server errors via a modified max_num parameter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.6'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0306'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/0cc350a896f70ace18280410eb616a9197d862b0'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/d7094bbce8cb838f3b40f504f198c098ff1cf727'}, {'type': 'PACKAGE', 'url...
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-17T23:06:01Z', 'nvd_published_at': '2013-05-02T14:55:00Z'}
1.4.0
GHSA-cmv8-6362-r5w9
2022-05-23T20:16:05Z
2022-05-23T20:16:05Z
null
['CVE-2022-29164']
Malicious HTML+XHR Artifact Privilege Escalation in Argo Workflows
Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. * The attacker creates a workflow that produces a HTML artifact that contains a HTML file that contains a script which uses XHR calls to interact with the Argo Server API. * The attacker emails the deep-lin...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-workflows/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '3.2.11'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-workflows/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3...
[{'type': 'WEB', 'url': 'https://github.com/argoproj/argo-workflows/security/advisories/GHSA-cmv8-6362-r5w9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29164'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-workflows/pull/8585'}, {'type': 'WEB', 'url': 'https://github.com/argopr...
{'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-23T20:16:05Z', 'nvd_published_at': '2022-05-06T00:15:00Z'}
1.4.0
GHSA-674j-7m97-j2p9
2023-03-01T22:23:11Z
2022-05-14T00:58:02Z
null
['CVE-2018-1000120']
curl FTP path confusion leads to NIL byte out of bounds write
curl can be coerced into writing a zero byte out of bounds. This bug can trigger when curl is told to work on an FTP URL, with the setting to only issue a single CWD command (--ftp-method singlecwd or the libcurl alternative [CURLOPT_FTP_FILEMETHOD](https://curl.se/libcurl/c/CURLOPT_FTP_FILEMETHOD.html)). curl then U...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'curl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.12.3'}]}], 'database_specific': {'last_known_affected_version_range': '< 7.59.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000120'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:0327'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:3157'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:3558'}, {'type': 'WE...
{'cwe_ids': ['CWE-787'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-01T22:23:11Z', 'nvd_published_at': '2018-03-14T18:29:00Z'}
1.4.0
GHSA-h4g7-8m7r-87r9
2022-06-17T22:29:32Z
2022-05-02T04:00:26Z
null
['CVE-2009-5012']
Improper Access Control in pyftpdlib
ftpserver.py in pyftpdlib before 0.5.2 does not require the l permission for the MLST command, which allows remote authenticated users to bypass intended access restrictions and list the root directory via an FTP session.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'pyftpdlib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.5.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-5012'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h4g7-8m7r-87r9'}, {'type': 'PACKAGE', 'url': 'https://github.com/giampaolo/pyftpdlib'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/pyftpd...
{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T22:29:32Z', 'nvd_published_at': '2010-10-19T20:00:00Z'}
1.4.0
GHSA-grw3-hjjm-5cjm
2023-09-22T22:27:09Z
2022-05-14T02:38:47Z
null
['CVE-2008-6540']
DotNetNuke Default Machine Key Exposure
DotNetNuke before 4.8.2, during installation or upgrade, does not warn the administrator when the default (1) ValidationKey and (2) DecryptionKey values cannot be modified in the web.config file, which allows remote attackers to bypass intended access restrictions by using the default keys.
[]
[{'package': {'ecosystem': 'NuGet', 'name': 'DotNetNuke.Core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.8.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2008-6540'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/41399'}, {'type': 'PACKAGE', 'url': 'https://github.com/dnnsoftware/Dnn.Platform'}, {'type': 'WEB', 'url': 'http://osvdb.org/43720'}, {'type': 'WEB', 'url': 'http:...
{'cwe_ids': ['CWE-453'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-22T22:27:09Z', 'nvd_published_at': '2009-03-30T01:30:00Z'}
1.4.0
GHSA-47wc-p5cp-w7pw
2022-06-28T16:17:01Z
2022-05-24T22:00:43Z
null
['CVE-2019-10405']
Exposure of Sensitive Information to an Unauthorized Actor in Jenkins
Jenkins 2.196 and earlier, LTS 2.176.3 and earlier printed the value of the "Cookie" HTTP request header on the /whoAmI/ URL, allowing attackers exploiting another XSS vulnerability to obtain the HTTP session cookie despite it being marked HttpOnly.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.176.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.176.3'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10405'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-09-25/#SECURITY-1505'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/09/25/3'}]
{'cwe_ids': ['CWE-200', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T16:17:01Z', 'nvd_published_at': '2019-09-25T16:15:00Z'}
1.4.0
GHSA-4vhf-2hv7-8mrx
2022-07-07T22:38:48Z
2022-05-14T01:14:52Z
null
['CVE-2014-3600']
Improper Restriction of XML External Entity Reference in Apache ActiveMQ
XML external entity (XXE) vulnerability in Apache ActiveMQ 5.x before 5.10.1 allows remote consumers to have unspecified impact via vectors involving an XPath based selector when dequeuing XML messages.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.activemq:activemq-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.10.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3600'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/100722'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/AMQ-5333'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a859563f05fbe7c319...
{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T22:38:48Z', 'nvd_published_at': '2017-10-27T19:29:00Z'}
1.4.0
GHSA-q9xf-jwr4-v445
2022-07-13T17:16:01Z
2022-05-14T01:17:02Z
null
['CVE-2011-1184']
Authentication Bypass in Apache Tomcat
The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 does not have the expected countermeasures against replay attacks, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid reque...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.5.0'}, {'fixed': '5.5.34'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-1184'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T17:16:01Z', 'nvd_published_at': '2012-01-14T21:55:00Z'}