schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 8 154 | details stringlengths 31 19.1k | severity stringlengths 2 92 | affected stringlengths 75 28.5k | references stringlengths 79 7.48k | database_specific stringlengths 131 196 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-cpqj-r29q-chrh | 2022-06-16T23:23:31Z | 2022-05-24T17:43:47Z | null | ['CVE-2021-28027'] | Loading a bgzip block can write out of bounds if size overflows. | An issue was discovered in the bam crate before 0.1.3 for Rust. There is an integer underflow and out-of-bounds write during the loading of a bgzip block. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'bam'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28027'}, {'type': 'PACKAGE', 'url': 'https://gitlab.com/tprodanov/bam'}, {'type': 'WEB', 'url': 'https://gitlab.com/tprodanov/bam/-/issues/4'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0027.html'}] | {'cwe_ids': ['CWE-191'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:23:31Z', 'nvd_published_at': '2021-03-05T09:15:00Z'} |
1.4.0 | GHSA-2rr8-9c6g-8j5c | 2022-06-03T15:51:33Z | 2022-05-24T17:34:59Z | null | ['CVE-2017-15680'] | Missing Authorization in Crafter CMS | In Crafter CMS Crafter Studio 3.0 prior to 3.0.1 an IDOR vulnerability exists which allows unauthenticated attackers to view and modify administrative data. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.craftercms:crafter-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15680'}, {'type': 'WEB', 'url': 'https://docs.craftercms.org/en/3.0/security/advisory.html'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T15:51:33Z', 'nvd_published_at': '2020-11-27T18:15:00Z'} |
1.4.0 | GHSA-5cg5-7vw6-jw4r | 2022-11-22T19:20:24Z | 2022-05-24T17:11:57Z | null | ['CVE-2019-20526'] | Ignite Realtime Openfire allows Cross-site Scripting | Ignite Realtime Openfire 4.4.1 allows XSS via the setup/setup-datasource-standard.jsp password parameter. This issue was fixed in version 4.4.2. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.igniterealtime.openfire:parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-20526'}, {'type': 'WEB', 'url': 'https://www.netsparker.com/web-applications-advisories/ns-19-015-reflected-cross-site-scripting-in-openfire/'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T19:20:24Z', 'nvd_published_at': '2020-03-19T18:15:00Z'} |
1.4.0 | GHSA-cxw7-85xm-3xrc | 2023-02-08T17:56:42Z | 2022-05-17T04:31:32Z | null | ['CVE-2012-5488'] | Plone Code Injection vulnerability | python_scripts.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via a crafted URL, related to createObject. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3a1'}, {'fixed': '4.3b1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-5488'}, {'type': 'WEB', 'url': 'https://github.com/plone/Products.CMFPlone/commit/a9479a5b38646fe0b0a9066ee46de9c18de32bfa'}, {'type': 'WEB', 'url': 'https://github.com/plone/Products.CMFPlone/commit/c3a98f4e6cf26501485de9c8354c49afdea21df8'}, {'ty... | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T17:56:42Z', 'nvd_published_at': '2014-09-30T14:55:00Z'} |
1.4.0 | GHSA-xm78-4m3g-7wm7 | 2022-07-01T21:23:20Z | 2022-05-13T01:25:19Z | null | ['CVE-2017-12610'] | Improper Authentication in Apache Kafka | In Apache Kafka 0.10.0.0 to 0.10.2.1 and 0.11.0.0 to 0.11.0.1, authenticated Kafka clients may use impersonation via a manually crafted protocol message with SASL/PLAIN or SASL/SCRAM authentication when using the built-in PLAIN or SCRAM server implementations in Apache Kafka. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.kafka:kafka-clients'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.10.0.0'}, {'fixed': '0.10.2.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.10.2.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.kafka:kafka-... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12610'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca6... | {'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T21:23:20Z', 'nvd_published_at': '2018-07-26T14:29:00Z'} |
1.4.0 | GHSA-c264-8834-ppj2 | 2022-12-20T22:15:47Z | 2022-05-24T17:19:05Z | null | ['CVE-2020-2192'] | CSRF vulnerability in Jenkins Swarm Plugin | Swarm Plugin adds API endpoints to add or remove agent labels. In Swarm Plugin 3.20 and earlier these only require a global Swarm secret to use, and no regular permission check is performed. This allows users with Agent/Create permission to add or remove labels of any agent.
Additionally, these API endpoints do not re... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:swarm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.21'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2192'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/swarm-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-06-03/#SECURITY-1200'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/06/03... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T22:15:47Z', 'nvd_published_at': '2020-06-03T13:15:00Z'} |
1.4.0 | GHSA-p632-5w74-x8xx | 2023-08-29T18:15:52Z | 2022-05-17T03:12:55Z | null | ['CVE-2013-5002'] | phpMyAdmin Cross-site scripting (XSS) vulnerability via pageNumber value | Cross-site scripting (XSS) vulnerability in `libraries/schema/Export_Relation_Schema.class.php` in phpMyAdmin 3.5.x before 3.5.8.2 and 4.0.x before 4.0.4.2 allows remote authenticated users to inject arbitrary web script or HTML via a crafted pageNumber value to schema_export.php. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5'}, {'fixed': '3.5.8.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ecosystem_specific': {'affe... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-5002'}, {'type': 'WEB', 'url': 'http://www.phpmyadmin.net/home_page/security/PMASA-2013-14.php'}] | {'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T18:15:52Z', 'nvd_published_at': '2013-07-31T13:20:00Z'} |
1.4.0 | GHSA-p9m5-3hj7-cp5r | 2023-06-13T17:24:56Z | 2022-05-24T17:37:49Z | null | ['CVE-2020-35907'] | futures_task::noop_waker_ref can segfault due to dereferencing a NULL pointer | Affected versions of the crate used a UnsafeCell in thread-local storage to return a noop waker reference, assuming that the reference would never be returned from another thread.
This resulted in a segmentation fault crash if Waker::wake_by_ref() was called on a waker returned from another thread due to it attempting... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'futures-task'}, 'ecosystem_specific': {'affected_functions': ['futures_task::noop_waker_ref']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35907'}, {'type': 'WEB', 'url': 'https://github.com/rust-lang/futures-rs/issues/2091'}, {'type': 'PACKAGE', 'url': 'https://github.com/rust-lang/futures-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0061.html'}] | {'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:58:57Z', 'nvd_published_at': '2020-12-31T09:15:00Z'} |
1.4.0 | GHSA-w4x6-j349-9r57 | 2022-11-01T21:58:49Z | 2022-05-14T03:45:20Z | null | ['CVE-2017-12632'] | Apache NiFi host header poisoning issue | A malicious host header in an incoming HTTP request could cause NiFi to load resources from an external server. The fix to sanitize host headers and compare to a controlled whitelist was applied on the Apache NiFi 1.5.0 release. Users running a prior 1.x release should upgrade to the appropriate release. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12632'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security.html#CVE-2017-12632'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T21:58:49Z', 'nvd_published_at': '2018-01-23T22:29:00Z'} |
1.4.0 | GHSA-5r7w-pjx8-99qg | 2023-08-07T20:32:25Z | 2022-05-17T19:57:08Z | null | ['CVE-2014-3652'] | JBoss KeyCloak Open Redirect | JBoss KeyCloak: Open redirect vulnerability via failure to validate the redirect URL. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-services'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0.Beta1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3652'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/commit/6b2a4229e3b869eec9d4adc30c1afdf71e78cbdf'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/cve-2014-3652'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.... | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-07T20:32:25Z', 'nvd_published_at': '2019-12-15T22:15:00Z'} |
1.4.0 | GHSA-wm27-49x2-mg9q | 2023-07-31T20:26:29Z | 2022-05-14T02:24:15Z | null | ['CVE-2016-3259'] | ChakraCore RCE Vulnerability | The Microsoft (1) JScript 9, (2) VBScript, and (3) Chakra JavaScript engines, as used in Microsoft Internet Explorer 9 through 11, Microsoft Edge, and other products, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Co... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3259'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/1291'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/17f3d4a4852dcc9e48de7091685b1862afb9f307'}, {'type': 'WEB', 'url': 'https://docs.microso... | {'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T20:26:29Z', 'nvd_published_at': '2016-07-13T01:59:00Z'} |
1.4.0 | GHSA-5gg7-5wv8-4gcj | 2022-11-08T12:39:25Z | 2022-05-13T01:38:14Z | null | ['CVE-2017-12165'] | Undertow Request Smuggling vulnerability | It was discovered that Undertow before 1.4.17, 1.3.31 and 2.0.0 processes http request headers with unusual whitespaces which can cause possible http request smuggling. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.31'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12165'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-12165'}, {'type': 'WEB', 'url': 'https://issues.redhat.com/browse/UNDERTOW-1251'}] | {'cwe_ids': ['CWE-444'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-08T12:39:25Z', 'nvd_published_at': '2018-07-27T15:29:00Z'} |
1.4.0 | GHSA-hppc-rpfp-r8qw | 2023-08-01T23:00:35Z | 2022-05-24T16:52:27Z | null | ['CVE-2019-7913'] | Magento 2 Community Edition SSRF vulnerability | A server-side request forgery (SSRF) vulnerability exists in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This can be exploited by an authenticated user with admin privileges to manipulate shipment methods to execute arbitrary code. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7913'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20211206084839/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-13'}] | {'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T23:00:35Z', 'nvd_published_at': '2019-08-02T22:15:00Z'} |
1.4.0 | GHSA-6346-5r4h-ff5x | 2022-05-26T19:47:21Z | 2022-05-05T00:00:26Z | null | ['CVE-2022-1555'] | Microweber vulnerable to cross-site scripting (XSS) | Microweber is a drag and drop website builder and a powerful next generation CMS. Microweber versions 1.2.15 and prior are vulnerable to cross-site scripting. This could lead to injection of arbitrary JaveScript code, defacement of a page, or stealing cookies. A patch is available on the `master` branch of Microweber's... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.15'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1555'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/724e2d186a33c0c27273107dc4f160a09384877f'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-05T21:08:06Z', 'nvd_published_at': '2022-05-04T09:15:00Z'} |
1.4.0 | GHSA-7v44-75jf-22gj | 2023-09-20T19:05:21Z | 2022-05-24T16:54:38Z | null | ['CVE-2019-15481'] | Kimai v2 is vulnerable to Cross-Site Scripting (XSS) | Kimai v2 before 1.1 has XSS via a timesheet description. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'kevinpapst/kimai2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15481'}, {'type': 'WEB', 'url': 'https://github.com/kevinpapst/kimai2/pull/962'}, {'type': 'PACKAGE', 'url': 'https://github.com/kevinpapst/kimai2'}, {'type': 'WEB', 'url': 'https://github.com/kevinpapst/kimai2/releases/tag/1.1'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-12T16:37:16Z', 'nvd_published_at': '2019-08-23T13:15:00Z'} |
1.4.0 | GHSA-p26v-97vp-jcx6 | 2023-02-14T00:43:50Z | 2022-05-14T02:56:10Z | null | ['CVE-2011-1183'] | Access controll bypass in Apache Tomcat | Apache Tomcat 7.0.11, when web.xml has no login configuration, does not follow security constraints, which allows remote attackers to bypass intended access restrictions via HTTP requests to a meta-data complete web application. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-1088 and CVE-2011... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.11'}, {'fixed': '7.0.12'}]}], 'versions': ['7.0.11']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-1183'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/66675'}, {'type': 'WEB', 'url': 'https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12701'}, {'type': 'WEB', 'url': 'http://sec... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T00:43:50Z', 'nvd_published_at': '2011-04-08T15:17:00Z'} |
1.4.0 | GHSA-5hcx-vg88-hgpm | 2023-08-01T22:58:28Z | 2022-05-24T16:52:26Z | null | ['CVE-2019-7904'] | Magento 2 Community Edition Insufficient Access Controls | Insufficient enforcement of user access controls in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2 could enable a low-privileged user to make unauthorized environment configuration changes. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7904'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20211206084839/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-13'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T22:58:28Z', 'nvd_published_at': '2019-08-02T22:15:00Z'} |
1.4.0 | GHSA-5whj-523x-6j68 | 2022-11-22T19:38:38Z | 2022-05-14T01:00:38Z | null | ['CVE-2017-12633'] | Apache Camel camel-hessian component vulnerable to Java object deserialization | The camel-hessian component in Apache Camel 2.x before 2.19.4 and 2.20.x before 2.20.1 is vulnerable to Java object de-serialisation vulnerability. De-serializing untrusted data can lead to security flaws. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-hessian'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0'}, {'fixed': '2.19.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.camel:camel-hessian'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.20.0'}, {... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12633'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0319'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/CAMEL-11923'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c2... | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T19:38:38Z', 'nvd_published_at': '2017-11-15T15:29:00Z'} |
1.4.0 | GHSA-p4p5-3v2j-w5rv | 2022-06-30T15:36:38Z | 2022-05-13T01:48:40Z | null | ['CVE-2018-1000865'] | Improper Privilege Management in Jenkins | A sandbox bypass vulnerability exists in Script Security Plugin 1.47 and earlier in groovy-sandbox/src/main/java/org/kohsuke/groovy/sandbox/SandboxTransformer.java that allows attackers with Job/Configure permission to execute arbitrary code on the Jenkins master JVM, if plugins using the Groovy sandbox are installed. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:script-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.48'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.47'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000865'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:0326'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:0327'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-10-29/#SECURITY-1186'... | {'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-30T15:36:38Z', 'nvd_published_at': '2018-12-10T14:29:00Z'} |
1.4.0 | GHSA-q5q8-jghf-3pm3 | 2023-08-15T19:02:21Z | 2022-05-17T04:44:52Z | null | ['CVE-2013-4310'] | Apache Struts2 Broken Access Control Vulnerability | The Struts 2 action mapping mechanism supports the special parameter prefix action: which is intended to help with attaching navigational information to buttons within forms, under certain conditions this can be used to bypass security constraints.
In Struts 2.3.15.3 the action mapping mechanism was changed to avoid ... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.15.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4310'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/struts'}, {'type': 'WEB', 'url': 'http://struts.apache.org/release/2.3.x/docs/s2-018.html'}] | {'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T23:00:35Z', 'nvd_published_at': '2013-09-30T21:55:00Z'} |
1.4.0 | GHSA-vrrc-3wwh-frgx | 2023-05-24T13:43:05Z | 2022-05-24T17:33:07Z | null | ['CVE-2020-2306'] | Missing Authorization in Jenkins Mercurial Plugin | Mercurial Plugin prior to 2.12, 2.10.1, 2.9.1, and 2.8.1 does not perform a permission check in an HTTP endpoint.
This allows attackers with Overall/Read permission to obtain a list of names of configured Mercurial installations.
Mercurial Plugin 2.12, 2.10.1, 2.9.1, and 2.8.1 performs permission checks when listing ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:mercurial'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.11'}, {'fixed': '2.12'}]}], 'versions': ['2.11']}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:mercurial'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2306'}, {'type': 'WEB', 'url': 'https://github.com/CVEProject/cvelist/blob/381fe967666a5ce01625a7a050427aa4757e3ca6/2020/2xxx/CVE-2020-2306.json'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-11-04/#SECURITY-2104'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T23:20:17Z', 'nvd_published_at': '2020-11-04T15:15:00Z'} |
1.4.0 | GHSA-jfxm-w8g2-4rcv | 2023-07-20T18:45:54Z | 2022-05-13T01:17:32Z | null | ['CVE-2018-0114'] | Cisco node-jose improper validation of JWT signature | A vulnerability in the Cisco node-jose open source library before 0.11.0 could allow an unauthenticated, remote attacker to re-sign tokens using a key that is embedded within the token. The vulnerability is due to node-jose following the JSON Web Signature (JWS) standard for JSON Web Tokens (JWTs). This standard specif... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'node-jose'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-0114'}, {'type': 'WEB', 'url': 'https://github.com/cisco/node-jose/blob/master/CHANGELOG.md'}, {'type': 'WEB', 'url': 'https://github.com/zi0Black/POC-CVE-2018-0114'}, {'type': 'WEB', 'url': 'https://tools.cisco.com/security/center/viewAlert.x?aler... | {'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T18:45:54Z', 'nvd_published_at': '2018-01-04T06:29:00Z'} |
1.4.0 | GHSA-5gmf-8gh2-hhfp | 2022-11-22T19:47:38Z | 2022-05-13T01:41:00Z | null | ['CVE-2017-1000245'] | Jenkins SSH Plugin user passwords for encrypted SSH keys stored in plaintext | The SSH Plugin stores credentials which allow jobs to access remote servers via the SSH protocol. User passwords and passphrases for encrypted SSH keys are stored in plaintext in a configuration file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jvnet.hudson.plugins:ssh'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ssh'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed':... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000245'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2017-07-10/'}] | {'cwe_ids': ['CWE-522'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T19:47:38Z', 'nvd_published_at': '2017-11-01T13:29:00Z'} |
1.4.0 | GHSA-8vhq-qq4p-grq3 | 2022-07-01T21:47:32Z | 2022-05-13T01:11:53Z | null | ['CVE-2017-1000487'] | OS Command Injection in Plexus-utils | Plexus-utils before 3.0.16 is vulnerable to command injection because it does not correctly process the contents of double quoted strings. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.codehaus.plexus:plexus-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.16'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000487'}, {'type': 'WEB', 'url': 'https://github.com/codehaus-plexus/plexus-utils/commit/b38a1b3a4352303e4312b2bb601a0d7ec6e28f41'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1322'}, {'type': 'PACKAGE', 'url': 'https://git... | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T21:47:32Z', 'nvd_published_at': '2018-01-03T20:29:00Z'} |
1.4.0 | GHSA-vr6v-g96p-cjc3 | 2023-08-21T18:35:49Z | 2022-05-24T17:18:14Z | null | ['CVE-2020-10738'] | Moodle vulnerable to RCE | A flaw was found in Moodle versions 3.8 before 3.8.3, 3.7 before 3.7.6, 3.6 before 3.6.10, 3.5 before 3.5.12 and earlier unsupported versions. It was possible to create a SCORM package in such a way that when added to a course, it could be interacted with via web services in order to achieve remote code execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.8'}, {'fixed': '3.8.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.8.2'}}, {'package': {'ecosystem': 'Packagist', ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10738'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/2cd534a7df3867813e3aad42db615865149a58c6'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10738'}, {'type': 'PACKAGE', 'url': 'https://github.co... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T01:18:01Z', 'nvd_published_at': '2020-05-21T16:15:00Z'} |
1.4.0 | GHSA-q564-vvx8-9388 | 2022-12-19T23:50:41Z | 2022-05-24T17:29:16Z | null | ['CVE-2020-2280'] | CSRF vulnerability in Jenkins warnings Plugin allows remote code execution | warnings Plugin 5.0.1 and earlier does not require POST requests for a form validation method intended for testing custom warnings parsers, resulting in a cross-site request forgery (CSRF) vulnerability.
This vulnerability allows attackers to execute arbitrary code.
warnings Plugin 5.0.2 requires POST requests for th... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jvnet.hudson.plugins:warnings'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.0.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2280'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/warnings-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-09-23/#SECURITY-2042'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/202... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-19T23:50:41Z', 'nvd_published_at': '2020-09-23T14:15:00Z'} |
1.4.0 | GHSA-fv4q-4h24-23qr | 2023-03-02T16:40:43Z | 2022-05-24T16:55:59Z | null | ['CVE-2019-10396'] | Jenkins Dashboard View Plugin vulnerable to Cross-site Scripting | Dashboard View Plugin did not escape the build description on the Latest Builds View. This resulted in a cross-site scripting vulnerability exploitable by attackers able to control the description of builds shown on that view.
Dashboard View Plugin now applies the configured markup formatter to the build description, ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:dashboard-view'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.12'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10396'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1489'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/09/12/2'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-02T16:40:43Z', 'nvd_published_at': '2019-09-12T14:15:00Z'} |
1.4.0 | GHSA-44cm-p9q7-rr3p | 2022-12-19T23:52:41Z | 2022-05-24T17:29:16Z | null | ['CVE-2020-2285'] | Missing permission check in Jenkins Liquibase Runner Plugin allows enumerating credentials IDs | Liquibase Runner Plugin 1.4.7 and earlier does not perform a permission check in an HTTP endpoint.
This allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. Those can be used as part of an attack to capture the credentials using another vulnerability.
An enumera... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:liquibase-runner'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.7'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2285'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/liquibase-runner-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-09-23/#SECURITY-2030'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secu... | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-19T23:52:41Z', 'nvd_published_at': '2020-09-23T14:15:00Z'} |
1.4.0 | GHSA-9cvr-8xq4-2m73 | 2022-07-06T21:04:31Z | 2022-05-14T01:14:52Z | null | ['CVE-2014-8110'] | Improper Neutralization of Input During Web Page Generation in Apache ActiveMQ | Multiple cross-site scripting (XSS) vulnerabilities in the web based administration console in Apache ActiveMQ 5.x before 5.10.1 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.activemq:activemq-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.10.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-8110'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/100724'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a859563f05fbe7c31916b3178c2697165bd9bbf5a65d1cf62aef27d2%40%3Ccommits.activemq.apache.org%3E... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T21:04:31Z', 'nvd_published_at': '2015-02-12T16:59:00Z'} |
1.4.0 | GHSA-r9q2-3r6x-qmgp | 2022-07-01T18:29:06Z | 2022-05-13T01:36:56Z | null | ['CVE-2017-2598'] | Inadequate Encryption Strength in Jenkins | Jenkins before versions 2.44 and 2.32.2 uses AES ECB block cipher mode without IV for encrypting secrets which makes Jenkins and the stored secrets vulnerable to unnecessary risks (SECURITY-304). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.32.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.32.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-2598'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenkins/commit/e6aa166246d1734f4798a9e31f78842f4c85c28b'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2598'}, {'type': 'PACKAGE', 'url': 'https://github.... | {'cwe_ids': ['CWE-326'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T18:29:06Z', 'nvd_published_at': '2018-05-23T13:29:00Z'} |
1.4.0 | GHSA-m8x8-5ch7-c5w9 | 2023-07-20T18:23:25Z | 2022-05-13T01:18:32Z | null | ['CVE-2018-0836'] | ChakraCore RCE Vulnerability | Microsoft Edge and ChakraCore in Microsoft Windows 10 1703 and 1709 allows remote code execution, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0834, CVE-2018-0835, CVE-2018-0837, CVE-2018-0838, CVE-2018-0840, CVE-2... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-0836'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/b99d0dcbf5a890e3f5dcdbfcec033f5c92b2bd6d'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0836'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T18:23:25Z', 'nvd_published_at': '2018-02-15T02:29:00Z'} |
1.4.0 | GHSA-6hvf-xvwm-vrw4 | 2023-08-01T18:26:15Z | 2022-05-13T01:02:16Z | 2023-08-01T18:26:15Z | ['CVE-2019-9628'] | XMLTooling Library Incorrectly Handles Some Exceptions | The XMLTooling library all versions prior to V3.0.4, provided with the OpenSAML and Shibboleth Service Provider software, contains an XML parsing class. Invalid data in the XML declaration causes an exception of a type that was not handled properly in the parser class and propagates an unexpected exception type. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.opensaml:xmltooling'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-9628'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/ubuntu/+source/xmltooling/+bug/1819912'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190611-0003/'}, {'type': 'WEB', 'url': 'https://shibboleth.net/community/adviso... | {'cwe_ids': ['CWE-755'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T23:18:21Z', 'nvd_published_at': '2019-04-11T20:29:00Z'} |
1.4.0 | GHSA-2chv-87wj-pjv2 | 2022-11-22T18:45:23Z | 2022-05-24T16:54:46Z | null | ['CVE-2019-15563'] | OHDSI WebAPI vulnerable to SQL Injection | Observational Health Data Sciences and Informatics (OHDSI) WebAPI before 2.7.2 allows SQL injection in `FeatureExtractionService.java`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.ohdsi:WebAPI'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15563'}, {'type': 'WEB', 'url': 'https://github.com/OHDSI/WebAPI/pull/1101'}, {'type': 'WEB', 'url': 'https://github.com/OHDSI/WebAPI/commit/d7b12b2f5234e425e5bc76545e75de0d6eb3f8fd'}, {'type': 'PACKAGE', 'url': 'https://github.com/OHDSI/WebAPI'}, ... | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T18:45:23Z', 'nvd_published_at': '2019-08-26T15:15:00Z'} |
1.4.0 | GHSA-v6fh-vg22-r6cm | 2023-08-03T21:42:49Z | 2022-05-17T03:18:28Z | null | ['CVE-2015-6830'] | phpMyAdmin ReCaptcha bypass | libraries/plugins/auth/AuthenticationCookie.class.php in phpMyAdmin 4.3.x before 4.3.13.2 and 4.4.x before 4.4.14.1 allows remote attackers to bypass a multiple-reCaptcha protection mechanism against brute-force credential guessing by providing a correct response to a single reCaptcha. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.3.13.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-6830'}, {'type': 'WEB', 'url': 'https://github.com/phpmyadmin/phpmyadmin/commit/0314e67900f01410bc8c81c58a40dc0515e3c91d'}, {'type': 'WEB', 'url': 'https://github.com/phpmyadmin/phpmyadmin/commit/785f4e2711848eb8945894199d5870253a88584e'}, {'type':... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T21:42:49Z', 'nvd_published_at': '2015-09-14T01:59:00Z'} |
1.4.0 | GHSA-3xpj-jgv5-q4vv | 2023-02-14T01:01:49Z | 2022-05-14T02:55:47Z | null | ['CVE-2011-1582'] | Access restriction bypass in Apache Tomcat | Apache Tomcat 7.0.12 and 7.0.13 processes the first request to a servlet without following security constraints that have been configured through annotations, which allows remote attackers to bypass intended access restrictions via HTTP requests. NOTE: this vulnerability exists because of an incomplete fix for CVE-201... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.12'}, {'fixed': '7.0.14'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-1582'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/67515'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'http://mail-archives.apache.org/mod_mbox/www-announce/201105.mbox/... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T01:01:49Z', 'nvd_published_at': '2011-05-20T22:55:00Z'} |
1.4.0 | GHSA-cgvf-22vv-83h5 | 2023-08-02T21:03:00Z | 2022-05-14T02:47:30Z | null | ['CVE-2015-7611'] | Apache James Server OS Command Injection | Apache James Server 2.3.2, when configured with file-based user repositories, allows attackers to execute arbitrary system commands via unspecified vectors. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.james:james-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7611'}, {'type': 'WEB', 'url': 'https://blogs.apache.org/james/entry/apache_james_server_2_3'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201207092339/http://www.securityfocus.com/archive/1/536575/100/0/threaded'}, {'type': 'WEB', 'url'... | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-02T21:03:00Z', 'nvd_published_at': '2016-06-07T14:06:00Z'} |
1.4.0 | GHSA-w7f2-gjxf-2gm9 | 2022-07-06T20:40:57Z | 2022-05-14T02:49:56Z | null | ['CVE-2015-0225'] | Improper Neutralization of Special Elements used in a Command in Apache Cassandra | The default configuration in Apache Cassandra 1.2.0 through 1.2.19, 2.0.0 through 2.0.13, and 2.1.0 through 2.1.3 binds an unauthenticated JMX/RMI interface to all network interfaces, which allows remote attackers to execute arbitrary Java code via an RMI request. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cassandra:apache-cassandra'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '2.0.14'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cassandra:apache-cassandra'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduce... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-0225'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/131249/Apache-Cassandra-Remote-Code-Execution.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2015-1947.html'}, {'type': 'WEB', 'url': 'http://www.mail-archive.c... | {'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:40:57Z', 'nvd_published_at': '2015-04-03T14:59:00Z'} |
1.4.0 | GHSA-pjv3-rh6v-2pj8 | 2022-11-03T19:08:21Z | 2022-05-14T00:58:29Z | null | ['CVE-2018-1325'] | Cross-site Scripting in wicket-jquery-ui | In wicket-jquery-ui <= 6.29.0, <= 7.10.1, <= 8.0.0-M9.1, JS code created in WYSIWYG editor will be executed on display. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.googlecode.wicket-jquery-ui:wicket-jquery-ui-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.29.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.googlecode.wicket-jquery-ui:wicket-jquery-ui-parent'}, 'ranges': [{'type': 'EC... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1325'}, {'type': 'WEB', 'url': 'https://markmail.org/message/6bxjyaolehhq7jrl'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T19:08:21Z', 'nvd_published_at': '2018-04-18T19:29:00Z'} |
1.4.0 | GHSA-wgw2-gw4v-9w4j | 2022-07-07T22:32:22Z | 2022-05-17T04:17:55Z | null | ['CVE-2014-3628'] | Improper Neutralization of Input During Web Page Generation in Apache Solr | Cross-site scripting (XSS) vulnerability in the Admin UI Plugin / Stats page in Apache Solr 4.x before 4.10.3 allows remote attackers to inject arbitrary web script or HTML via the fieldvaluecache object. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.10.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3628'}, {'type': 'WEB', 'url': 'http://mail-archives.us.apache.org/mod_mbox/www-announce/201412.mbox/%3C54A1A7C7.2070804@apache.org%3E'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T22:32:22Z', 'nvd_published_at': '2015-01-06T15:59:00Z'} |
1.4.0 | GHSA-jjf5-wx3j-3fv7 | 2022-05-25T22:54:49Z | 2022-05-14T00:01:09Z | null | ['CVE-2022-21190'] | Prototype Pollution in convict | This affects the package convict before 6.2.3. This is a bypass of [CVE-2022-22143](https://security.snyk.io/vuln/SNYK-JS-CONVICT-2340604). The [fix](https://github.com/mozilla/node-convict/commit/3b86be087d8f14681a9c889d45da7fe3ad9cd880) introduced, relies on the startsWith method and does not prevent the vulnerabilit... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'convict'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.2.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21190'}, {'type': 'WEB', 'url': 'https://github.com/mozilla/node-convict/commit/1ea0ab19c5208f66509e1c43b0d0f21c1fd29b75'}, {'type': 'WEB', 'url': 'https://gist.github.com/dellalibera/cebce20e51410acebff1f46afdc89808'}, {'type': 'PACKAGE', 'url': '... | {'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T22:54:49Z', 'nvd_published_at': '2022-05-13T20:15:00Z'} |
1.4.0 | GHSA-3g6w-4m7x-97v6 | 2023-08-29T21:36:44Z | 2022-05-17T04:32:23Z | null | ['CVE-2012-5494'] | Plone Cross-site scripting Vulnerability | Cross-site scripting (XSS) vulnerability in python_scripts.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, related to "{u,}translate." | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3a1'}, {'fixed': '4.3b1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-5494'}, {'type': 'WEB', 'url': 'https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt'}, {'type': 'WEB', 'url': 'https://plone.org/products/plone-hotfix/releases/20121106'}, {'type': 'WEB', 'url': 'https://plone.org/products/plone/... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T21:36:44Z', 'nvd_published_at': '2014-09-30T14:55:00Z'} |
1.4.0 | GHSA-w39x-chvm-pj3c | 2022-05-19T22:21:59Z | 2022-05-03T00:00:44Z | null | ['CVE-2022-25767'] | Deserialization of Untrusted Data in com.bstek.ureport:ureport2-console | All versions of package com.bstek.ureport:ureport2-console are vulnerable to Remote Code Execution by connecting to a malicious database server, causing arbitrary file read and deserialization of local gadgets. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.bstek.ureport:ureport2-console'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25767'}, {'type': 'WEB', 'url': 'https://github.com/JinYiTong/CVE-Req/blob/main/ureport2/ureport2-console.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/youseries/ureport'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-COMBSTEKUREPO... | {'cwe_ids': ['CWE-502', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-05-19T22:21:59Z', 'nvd_published_at': '2022-05-01T16:15:00Z'} |
1.4.0 | GHSA-cm8f-h6j3-p25c | 2023-08-29T23:32:40Z | 2022-05-24T22:05:00Z | null | ['CVE-2022-29190'] | Pion DTLS Header reconstruction method can be thrown into an infinite loop | ### Impact
An attacker can send packets that will send Pion DTLS into an infinite loop when processing.
### Patches
Upgrade to Pion DTLS v2.1.4
### Workarounds
No workarounds available, upgrade to Pion DTLS v2.1.4
### References
Thank you to [Juho Nurminen](https://github.com/jupenur) and the Mattermost team for dis... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/pion/dtls'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/pion/dtls/v2'}, 'ecosystem_specific': {'affected_functions': ... | [{'type': 'WEB', 'url': 'https://github.com/pion/dtls/security/advisories/GHSA-cm8f-h6j3-p25c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29190'}, {'type': 'WEB', 'url': 'https://github.com/pion/dtls/commit/e0b2ce3592e8e7d73713ac67b363a2e192a4cecf'}, {'type': 'WEB', 'url': 'https://github.... | {'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:05:00Z', 'nvd_published_at': '2022-05-21T00:15:00Z'} |
1.4.0 | GHSA-h8jq-5737-hpcf | 2023-07-21T22:05:16Z | 2022-05-13T01:20:48Z | null | ['CVE-2018-8355'] | ChakraCore RCE Vulnerability | A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka "Scripting Engine Memory Corruption Vulnerability." This affects ChakraCore, Internet Explorer 11, Microsoft Edge. This CVE ID is unique from CVE-2018-8353, CVE-2018-8359, CVE-2018-8371, CVE... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8355'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/5596'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/cf3ef506236da5b7651f4785966ab3131a4aa083'}, {'type': 'WEB', 'url': 'https://portal.msrc.... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T22:05:16Z', 'nvd_published_at': '2018-08-15T17:29:00Z'} |
1.4.0 | GHSA-9hcr-66cj-r9hp | 2022-12-20T22:38:49Z | 2022-05-24T17:27:06Z | null | ['CVE-2020-2246'] | Stored XSS vulnerability in Jenkins Valgrind Plugin | Jenkins Valgrind Plugin 0.28 and earlier does not escape content in Valgrind XML reports, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control Valgrind XML report contents. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:valgrind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.28'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2246'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/valgrind-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-09-01/#SECURITY-1830'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/09... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T22:38:49Z', 'nvd_published_at': '2020-09-01T14:15:00Z'} |
1.4.0 | GHSA-g549-jfg6-98ch | 2023-07-21T18:40:06Z | 2022-05-13T01:18:42Z | null | ['CVE-2018-0994'] | ChakraCore RCE Vulnerability | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-0979, CVE-2018-0980, CVE-2018-0990, CVE-2018-0... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-0994'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/0578ca55215d2eda74280e17c4b9bcc3c38dfd6a'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0994'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T18:40:06Z', 'nvd_published_at': '2018-04-12T01:29:00Z'} |
1.4.0 | GHSA-pc54-pchm-xcw6 | 2022-06-17T01:12:47Z | 2022-05-17T04:13:50Z | null | ['CVE-2014-7839'] | XML External Entity Reference in RESTEasy | DocumentProvider in RESTEasy 2.3.7 and 3.0.9 does not configure the (1) external-general-entities or (2) external-parameter-entities features, which allows remote attackers to conduct XML external entity (XXE) attacks via unspecified vectors. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:resteasy-jaxrs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.11.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.10.Final'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-7839'}, {'type': 'WEB', 'url': 'https://github.com/resteasy/resteasy/pull/611/commits/3ab999c899c455a0b0a00bf5e455ed3e8d9ae347'}, {'type': 'WEB', 'url': 'https://github.com/resteasy/resteasy/pull/611/commits/8b5d8cfc963794a74636d9a840e899408ec8fdc6... | {'cwe_ids': ['CWE-20', 'CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T01:12:47Z', 'nvd_published_at': '2014-11-25T15:59:00Z'} |
1.4.0 | GHSA-rc7h-x6cq-988q | 2023-06-01T19:57:55Z | 2022-05-13T01:03:31Z | null | ['CVE-2016-2141'] | Improper Input Validation in JGroups | JGroups before 4.0 does not require the proper headers for the ENCRYPT and AUTH protocols from nodes joining the cluster, which allows remote attackers to bypass security restrictions and send and receive messages within the cluster via unspecified vectors. Fixes for this issue have been backported to versions 3.6.10.F... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jgroups:jgroups'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.0.Alpha1'}, {'fixed': '3.6.10.Final'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jgroups:jgroups'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-2141'}, {'type': 'WEB', 'url': 'https://github.com/belaban/JGroups/commit/eeaf5241cce464ef21a2dfc4938729ade9ebef36'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:1345'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errat... | {'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:02:18Z', 'nvd_published_at': '2016-06-30T16:59:00Z'} |
1.4.0 | GHSA-5c2c-cvg6-ghjm | 2022-12-16T15:47:12Z | 2022-05-24T19:12:36Z | null | ['CVE-2021-21681'] | Password stored in plain text by Jenkins Nomad Plugin | Nomad Plugin 0.7.4 and earlier stores the passwords to authenticate against the Docker registry unencrypted in the global `config.xml` file on the Jenkins controller as part of its worker templates configuration.
These passwords can be viewed by users with access to the Jenkins controller file system.
Nomad Plugin 0.... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.7.4'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21681'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/nomad-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-08-31/#SECURITY-2396'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/... | {'cwe_ids': ['CWE-256', 'CWE-522'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-16T15:47:12Z', 'nvd_published_at': '2021-08-31T14:15:00Z'} |
1.4.0 | GHSA-v222-w2mw-xjc6 | 2022-07-01T17:41:02Z | 2022-05-13T01:36:54Z | null | ['CVE-2017-2609'] | Exposure of Sensitive Information to an Unauthorized Actor in Jenkins | jenkins before versions 2.44, 2.32.2 is vulnerable to an information disclosure vulnerability in search suggestions (SECURITY-385). The autocomplete feature on the search box discloses the names of the views in its suggestions, including the ones for which the current user does not have access to. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.32.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.34'}, {... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-2609'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenkins/commit/13905d8224899ba7332fe9af4e330ea96a2ae319'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2609'}, {'type': 'PACKAGE', 'url': 'https://github.... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T17:41:02Z', 'nvd_published_at': '2018-05-22T17:29:00Z'} |
1.4.0 | GHSA-52gq-7j6c-xw6x | 2022-06-29T18:54:45Z | 2022-05-13T01:53:28Z | null | ['CVE-2018-8016'] | Missing Authentication for Critical Function in Apache Cassandra | The default configuration in Apache Cassandra 3.8 through 3.11.1 binds an unauthenticated JMX/RMI interface to all network interfaces, which allows remote attackers to execute arbitrary Java code via an RMI request. This issue is a regression of CVE-2015-0225. The regression was introduced in https://issues.apache.org/... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cassandra:cassandra-all'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.8'}, {'fixed': '3.11.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.11.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8016'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/bafb9060bbdf958a1c15ba66c68531116fba4a83858a2796254da066@%3Cuser.cassandra.apache.org%3E'}] | {'cwe_ids': ['CWE-306'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T18:54:45Z', 'nvd_published_at': '2018-06-28T16:29:00Z'} |
1.4.0 | GHSA-q2rq-qgcf-m22w | 2023-08-03T22:44:35Z | 2022-05-14T00:57:47Z | null | ['CVE-2016-3953'] | web2py remote code execution via hardcoded encryption key in session.connect function | The sample web application in web2py before 2.14.2 might allow remote attackers to execute arbitrary code via vectors involving use of a hardcoded encryption key when calling the `session.connect` function. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'web2py'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.14.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3953'}, {'type': 'WEB', 'url': 'https://github.com/web2py/web2py/issues/1205'}, {'type': 'WEB', 'url': 'https://github.com/web2py/web2py/commit/9706d125b42481178d2b423de245f5d2faadbf40'}, {'type': 'WEB', 'url': 'https://devco.re/blog/2017/01/03/web... | {'cwe_ids': ['CWE-798'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T22:44:35Z', 'nvd_published_at': '2018-02-06T18:29:00Z'} |
1.4.0 | GHSA-59fm-6x3q-q3q5 | 2022-11-02T00:40:54Z | 2022-05-14T03:57:44Z | null | ['CVE-2016-3725'] | Missing permissions check in Jenkins Core | Jenkins before 2.3 and LTS before 1.651.2 allows remote authenticated users to trigger updating of update site metadata by leveraging a missing permissions check. NOTE: this issue can be combined with DNS cache poisoning to cause a denial of service (service disruption). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3725'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:1206'}, {'type': 'WEB', 'url': 'https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-05-11'}, {'type': 'WEB', 'url': 'https://www.cloudbees.com/jenkin... | {'cwe_ids': ['CWE-280'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-02T00:40:54Z', 'nvd_published_at': '2016-05-17T14:08:00Z'} |
1.4.0 | GHSA-92pw-mff9-jqgm | 2023-08-03T22:16:50Z | 2022-05-17T02:49:26Z | null | ['CVE-2015-1838'] | Salt improper handling of tmp files | `modules/serverdensity_device.py` in SaltStack before 2014.7.4 does not properly handle files in `/tmp`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'salt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2014.7.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-1838'}, {'type': 'WEB', 'url': 'https://github.com/saltstack/salt/commit/e11298d7155e9982749483ca5538e46090caef9c'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1212784'}, {'type': 'WEB', 'url': 'https://docs.saltstack.com/e... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T22:16:50Z', 'nvd_published_at': '2017-04-13T14:59:00Z'} |
1.4.0 | GHSA-q6x7-f33r-3wxx | 2022-07-06T19:45:35Z | 2022-05-13T01:02:15Z | null | ['CVE-2016-6797'] | Incorrect Authorization in Apache Tomcat | The ResourceLinkFactory implementation in Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 did not limit web application access to global JNDI resources to those resources explicitly linked to the web application. Therefore, it was possible for a web applicati... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat-catalina'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0.M1'}, {'fixed': '9.0.0.M10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.0.0.M9'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:t... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6797'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:0455'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:0456'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2247'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:45:35Z', 'nvd_published_at': '2017-08-10T22:29:00Z'} |
1.4.0 | GHSA-56f9-5563-m2h7 | 2023-08-04T23:08:49Z | 2022-05-17T03:59:51Z | null | ['CVE-2015-8755'] | Typo3 XSS Vulnerability | Multiple cross-site scripting (XSS) vulnerabilities in unspecified backend components in TYPO3 6.2.x before 6.2.16 and 7.x before 7.6.1 allow remote authenticated editors to inject arbitrary web script or HTML via unknown vectors. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.2'}, {'fixed': '6.2.16'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0'}, {'fixed': '7.6.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8755'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20160621193435/http://www.securityfocus.com/bid/79236'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20161012163838/http://www.securitytracker.com/id/1034483'}, {'type': 'WEB', 'ur... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-04T23:08:49Z', 'nvd_published_at': '2016-01-08T19:59:00Z'} |
1.4.0 | GHSA-g74w-93cp-5p3p | 2022-12-02T20:50:47Z | 2022-05-18T00:00:40Z | null | ['CVE-2022-30952'] | Insufficiently Protected Credentials in Jenkins Pipeline SCM API for Blue Ocean Plugin | When pipelines are created using the pipeline creation wizard in Blue Ocean, the credentials used are stored in the per-user credentials store of the user creating the pipeline. To allow pipelines to use this credential to scan repositories and checkout from SCM, the Blue Ocean Credentials Provider allows pipelines to ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.blueocean:blueocean-pipeline-scm-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.25.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30952'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/blueocean-plugin/tree/master/blueocean-pipeline-scm-api'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-714'}, {'type': 'WEB', 'url': 'http:/... | {'cwe_ids': ['CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-02T14:57:49Z', 'nvd_published_at': '2022-05-17T15:15:00Z'} |
1.4.0 | GHSA-gmpm-xp43-f7g6 | 2022-06-24T01:23:39Z | 2022-05-24T17:27:39Z | null | ['CVE-2020-1913'] | Signed to Unsigned Conversion Error in Facebook Hermes | An Integer signedness error in the JavaScript Interpreter in Facebook Hermes prior to commit 2c7af7ec481ceffd0d14ce2d7c045e475fd71dc6 allows attackers to cause a denial of service attack or a potential RCE via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of u... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'hermes-engine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.4.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1913'}, {'type': 'WEB', 'url': 'https://github.com/facebook/hermes/commit/2c7af7ec481ceffd0d14ce2d7c045e475fd71dc6'}, {'type': 'WEB', 'url': 'https://www.facebook.com/security/advisories/cve-2020-1913'}] | {'cwe_ids': ['CWE-195', 'CWE-681'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T01:23:39Z', 'nvd_published_at': '2020-09-09T19:15:00Z'} |
1.4.0 | GHSA-p83v-8vmr-qfv9 | 2023-07-25T00:30:32Z | 2022-05-14T01:39:14Z | null | ['CVE-2018-19295'] | Sylabs Singularity Improper Input Validation | Sylabs Singularity 2.4 to 2.6 allows local users to conduct Improper Input Validation attacks. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/sylabs/singularity'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4'}, {'last_affected': '2.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19295'}, {'type': 'WEB', 'url': 'https://github.com/sylabs/singularity/releases/tag/2.6.1'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T00:30:32Z', 'nvd_published_at': '2018-12-17T15:29:00Z'} |
1.4.0 | GHSA-c79v-2rjq-965m | 2023-07-26T19:37:50Z | 2022-05-13T01:42:32Z | null | ['CVE-2017-11767'] | ChakraCore Privilege Escalation | ChakraCore allows an attacker to gain the same user rights as the current user, due to the way that the ChakraCore scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-11767'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/3727'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/3727/commits/b3e3959d14814f42ee2197c504c322bcbe12347d'}, {'type': 'WEB', 'url': 'https://... | {'cwe_ids': ['CWE-119'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T19:37:50Z', 'nvd_published_at': '2017-11-02T19:29:00Z'} |
1.4.0 | GHSA-7hxc-mwx7-5hmc | 2023-08-15T22:21:45Z | 2022-05-17T04:31:32Z | null | ['CVE-2012-5485'] | Plone Code Injection vulnerability | `registerConfiglet.py` in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via unspecified vectors, related to the admin interface. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'E... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-5485'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2014:1194'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2012-5485'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=878934'}, {'type'... | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T17:57:05Z', 'nvd_published_at': '2014-09-30T14:55:00Z'} |
1.4.0 | GHSA-vm69-474v-7q2w | 2022-07-08T18:59:32Z | 2022-05-05T02:48:41Z | null | ['CVE-2013-0248'] | Incorrect Default Permissions in Apache Commons FileUpload | The default configuration of javax.servlet.context.tempdir in Apache Commons FileUpload 1.0 through 1.2.2 uses the /tmp directory for uploaded files, which allows local users to overwrite arbitrary files via an unspecified symlink attack. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'commons-fileupload:commons-fileupload'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0'}, {'fixed': '1.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0248'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202107-39'}, {'type': 'WEB', 'url': 'http://archives.neohapsis.com/archives/bugtraq/2013-03/0035.html'}, {'type': 'WEB', 'url': 'http://marc.info/?l=bugtraq&m=144050155601375&w=2'}, {... | {'cwe_ids': ['CWE-276'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T18:59:32Z', 'nvd_published_at': '2013-03-15T20:55:00Z'} |
1.4.0 | GHSA-rvx4-gg8w-qw24 | 2022-12-07T18:18:52Z | 2022-05-13T01:48:31Z | null | ['CVE-2018-1000109'] | Jenkins Google Play Android Publisher Plugin allows attacker to obtain credential IDs | An improper authorization vulnerability exists in Jenkins Google Play Android Publisher Plugin version 1.6 and earlier in `GooglePlayBuildStepDescriptor.java` that allow an attacker to obtain credential IDs. As of version 1.7, enumeration of credentials IDs and validation of specified credentials in this plugin require... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:google-play-android-publisher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.6'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000109'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/google-play-android-publisher-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-02-26/#SECURITY-715'}] | {'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-07T18:18:52Z', 'nvd_published_at': '2018-03-13T13:29:00Z'} |
1.4.0 | GHSA-5m64-9hq5-5pf2 | 2023-07-25T23:22:35Z | 2022-05-13T01:12:20Z | null | ['CVE-2017-11422'] | Statamic framework Incorrect Permission Assignment | Statamic framework before 2.6.0 does not correctly check a session's permissions when the methods from a user's class are called. Problematic methods include reset password, create new account, create new role, etc. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'statamic/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-11422'}] | {'cwe_ids': ['CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T23:22:35Z', 'nvd_published_at': '2017-07-24T12:29:00Z'} |
1.4.0 | GHSA-v6c7-8qx5-8gmp | 2022-11-03T21:09:17Z | 2022-05-17T03:47:51Z | null | ['CVE-2013-2185'] | Deserialization of Untrusted Data in Apache Tomcat | The readObject method in the DiskFileItem class in Apache Tomcat and JBoss Web, as used in Red Hat JBoss Enterprise Application Platform 6.1.0 and Red Hat JBoss Portal 6.0.0, allows remote attackers to write to arbitrary files via a NULL byte in a file name in a serialized instance, a similar issue to CVE-2013-2186.
... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.39'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2185'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2014/10/24/12'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2013-1193.html'}, {'type': 'WEB', 'url... | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T21:09:17Z', 'nvd_published_at': '2014-01-19T18:02:00Z'} |
1.4.0 | GHSA-5gq7-826w-8282 | 2023-07-06T23:51:23Z | 2022-05-24T19:18:01Z | null | ['CVE-2021-3846'] | Unrestricted File Upload vulnerability in Firefly III | firefly-iii is vulnerable to Unrestricted Upload of File with Dangerous Type | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'grumpydictator/firefly-iii'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3846'}, {'type': 'WEB', 'url': 'https://github.com/firefly-iii/firefly-iii/commit/a85b6420c19ace35134f896e094e1971d8c7954b'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/5267ec1c-d204-40d2-bd4f-6c2dd495ee18'}] | {'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T23:51:23Z', 'nvd_published_at': '2021-10-19T13:15:00Z'} |
1.4.0 | GHSA-77m7-9wvw-87fx | 2022-05-23T20:10:38Z | 2022-05-03T00:00:46Z | null | ['CVE-2022-23923'] | Privilege Issues in jailed | All versions of package jailed are vulnerable to Sandbox Bypass via an exported alert() method which can access the main application. Exported methods are stored in the application.remote object. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'jailed'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23923'}, {'type': 'PACKAGE', 'url': 'https://github.com/asvd/jailed'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2441254'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-JAILED-2391490'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-23T20:10:38Z', 'nvd_published_at': '2022-05-01T16:15:00Z'} |
1.4.0 | GHSA-93c7-2942-3h47 | 2023-07-25T19:29:48Z | 2022-05-14T02:03:04Z | null | ['CVE-2018-8315'] | ChakraCore information disclosure vulnerability | An information disclosure vulnerability exists when the browser scripting engine improperly handle object types, aka "Microsoft Scripting Engine Information Disclosure Vulnerability." This affects ChakraCore, Internet Explorer 11, Microsoft Edge, Internet Explorer 10. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8315'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/5688'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/e03b3e30160ac5846b246931634962ce6bd1db83'}, {'type': 'WEB', 'url': 'https://portal.msrc.... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T19:29:48Z', 'nvd_published_at': '2018-09-13T00:29:00Z'} |
1.4.0 | GHSA-hw26-fw67-qxm9 | 2023-01-06T17:05:22Z | 2022-05-24T17:08:46Z | null | ['CVE-2020-2112'] | Jenkins Git Parameter Plugin vulnerable to Stored cross-site scripting (XSS) | Jenkins Git Parameter Plugin 0.9.11 and earlier does not escape the parameter name shown on the UI, resulting in a stored cross-site scripting vulnerability exploitable by users with Job/Configure permission. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.tools:git-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.12'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.11'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2112'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/git-parameter-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-02-12/#SECURITY-1709'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/20... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-06T17:05:22Z', 'nvd_published_at': '2020-02-12T15:15:00Z'} |
1.4.0 | GHSA-8h2q-qm9x-55jc | 2022-07-13T18:43:06Z | 2022-05-04T00:27:43Z | null | ['CVE-2012-0022'] | Denial of Service in Apache Tomcat | Apache Tomcat 5.5.x before 5.5.35, 6.x before 6.0.34, and 7.x before 7.0.23 uses an inefficient approach for handling parameters, which allows remote attackers to cause a denial of service (CPU consumption) via a request that contains many parameters and parameter values, a different vulnerability than CVE-2011-4858. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.5.0'}, {'fixed': '5.5.35'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-0022'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/72425'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f1180... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T18:43:06Z', 'nvd_published_at': '2012-01-19T04:01:00Z'} |
1.4.0 | GHSA-qvhv-pwww-53jj | 2023-09-21T09:46:22Z | 2022-05-24T17:07:30Z | null | ['CVE-2020-8091'] | Typo3 Cross-Site Scripting in Flash component (ELTS) | TYPO3 6.2.0 to 6.2.38 ELTS and 7.0.0 to 7.1.0 included a vulnerable external component, which could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack on a targeted system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.2.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.1.0'}}, {'package': {'ecosystem': 'Packagist', 'n... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8091'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/commit/482e2e992f80f5e38cb48fcaea40fd9812a5252c'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3/typo3'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/blob/4cb53e828bd5... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T23:19:58Z', 'nvd_published_at': '2020-01-27T22:15:00Z'} |
1.4.0 | GHSA-qrhq-x7xh-2784 | 2023-08-23T18:01:01Z | 2022-05-24T17:30:01Z | null | ['CVE-2020-26523'] | Froala WYSIWYG Editor XSS Vulnerability | Froala Editor before 3.2.2 allows XSS via pasted content. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'froala/wysiwyg-editor'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26523'}, {'type': 'WEB', 'url': 'https://froala.com/wysiwyg-editor/changelog/'}, {'type': 'PACKAGE', 'url': 'https://github.com/froala/wysiwyg-editor'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T23:09:43Z', 'nvd_published_at': '2020-10-02T07:15:00Z'} |
1.4.0 | GHSA-x5fc-pgpx-59j5 | 2023-08-17T16:14:30Z | 2022-05-13T01:14:26Z | null | ['CVE-2010-1870'] | Server side object manipulation in Apache Struts | OGNL provides, among other features, extensive expression evaluation capabilities. This vulnerability allows a malicious user to bypass the '#'-usage protection built into the ParametersInterceptor, thus being able to manipulate server side context objects. This behavior was already addressed in [S2-003](https://cwiki.... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-1870'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/WW/S2-003'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/struts'}, {'type': 'WEB', 'url': 'http://blog.o0o.nu/2010/07/cve-2010-1870-struts2xwork-remote.html'}, {'... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T19:11:38Z', 'nvd_published_at': '2010-08-17T20:00:00Z'} |
1.4.0 | GHSA-h3j8-fr5q-8rfr | 2023-07-11T16:45:32Z | 2022-05-24T19:06:05Z | null | ['CVE-2021-31649'] | JFinal Java Deserialization Vulnerability | In applications using jfinal 4.9.08 and below, there is a deserialization vulnerability when using redis which can lead to remote code execution | [] | [{'package': {'ecosystem': 'Maven', 'name': 'com.jfinal:jfinal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.9.08'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31649'}, {'type': 'WEB', 'url': 'https://github.com/jfinal/jfinal/issues/184'}, {'type': 'WEB', 'url': 'http://note.youdao.com/noteshare?id=787ccbb8345dbd4a905aebe35f1d8aa8&sub=6C5C072C901949429EFD978405212FA4'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-11T16:45:32Z', 'nvd_published_at': '2021-06-24T16:15:00Z'} |
1.4.0 | GHSA-v8jw-x9wq-hw4v | 2023-08-01T23:30:45Z | 2022-05-24T22:00:06Z | null | ['CVE-2019-1052'] | ChakraCore RCE via Out-of-bounds write | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0989, CVE-2019-0991, CVE-2019-0992, CVE-2019-0993, CVE-2019-1002, CVE-2019-1003, CVE-20... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1052'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/3d6226cc2d1077537220361c82e34a362c6c76ee'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/66ab97c09c49c631234c0ec202b0822d0c2833cc'}, {'type... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T23:30:45Z', 'nvd_published_at': '2019-06-12T14:29:00Z'} |
1.4.0 | GHSA-3f2c-jm6v-cr35 | 2023-09-05T14:09:01Z | 2022-05-17T00:27:18Z | null | ['CVE-2016-9014'] | Django DNS Rebinding Vulnerability | Django before 1.8.x before 1.8.16, 1.9.x before 1.9.11, and 1.10.x before 1.10.3, when settings.DEBUG is True, allow remote attackers to conduct DNS rebinding attacks by leveraging failure to validate the HTTP Host header against settings.ALLOWED_HOSTS. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8'}, {'fixed': '1.8.16'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-9014'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OG5ROMUPS6C7BXELD3TAUUH7OBYV56WQ/'}, {'type': 'WEB', 'url... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T22:41:12Z', 'nvd_published_at': '2016-12-09T20:59:00Z'} |
1.4.0 | GHSA-hqhf-8jgc-h5hx | 2023-09-25T19:02:03Z | 2022-05-24T16:52:23Z | null | ['CVE-2019-7859'] | Magento 2 Community Edition Path Traversal Vulnerability | A path traversal vulnerability in the WYSIWYG editor for Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2 could result in unauthorized access to uploaded images due to insufficient access control. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7859'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220127030535/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-24'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T21:54:11Z', 'nvd_published_at': '2019-08-02T22:15:00Z'} |
1.4.0 | GHSA-87r3-4gc8-f897 | 2023-09-26T20:40:35Z | 2022-05-24T17:11:33Z | null | ['CVE-2019-19210'] | Dolibarr ERP and CRM contain XSS Vulnerability | Dolibarr ERP/CRM before 10.0.3 allows XSS because uploaded HTML documents are served as text/html despite being renamed to .noexe files. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19210'}, {'type': 'PACKAGE', 'url': 'https://github.com/Dolibarr/dolibarr'}, {'type': 'WEB', 'url': 'https://herolab.usd.de/security-advisories/usd-2019-0052/'}, {'type': 'WEB', 'url': 'https://www.dolibarr.org/forum/dolibarr-changelogs'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T23:43:43Z', 'nvd_published_at': '2020-03-16T15:15:00Z'} |
1.4.0 | GHSA-w45j-f832-hxvh | 2023-08-29T23:28:42Z | 2022-05-25T19:26:09Z | null | ['CVE-2022-29222'] | Pion/DLTS Accepts Client Certificates Without CertificateVerify | ### Impact
A DTLS Client could provide a Certificate that it doesn't posses the private key for and Pion DTLS wouldn't reject it.
This issue affects users that are using Client certificates only. The connection itself is still secure. The Certificate provided by clients can't be trusted when using a Pion DTLS server ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/pion/dtls'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.5'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/pion/dtls/v2'}, 'ecosystem_specific': {'affected_functions': ... | [{'type': 'WEB', 'url': 'https://github.com/pion/dtls/security/advisories/GHSA-w45j-f832-hxvh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29222'}, {'type': 'WEB', 'url': 'https://github.com/pion/dtls/commit/d2f797183a9f044ce976e6df6f362662ca722412'}, {'type': 'WEB', 'url': 'https://github.... | {'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T19:26:09Z', 'nvd_published_at': '2022-05-21T00:15:00Z'} |
1.4.0 | GHSA-65x8-9vgm-5fg5 | 2023-07-07T13:48:29Z | 2022-05-24T17:40:04Z | null | ['CVE-2020-22643'] | Feehi CMS arbitrary file upload vulnerability | Feehi CMS 2.1.0-beta is affected by an arbitrary file upload vulnerability, potentially resulting in remote code execution. After an administrator logs in, open the administrator image upload page to potentially upload malicious files. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'feehi/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.0-beta'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-22643'}, {'type': 'WEB', 'url': 'https://github.com/liufee/cms/issues/51'}, {'type': 'PACKAGE', 'url': 'https://github.com/liufee/cms'}] | {'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T13:48:29Z', 'nvd_published_at': '2021-01-26T18:15:00Z'} |
1.4.0 | GHSA-r83x-wj75-v89r | 2023-07-21T23:24:45Z | 2022-05-13T01:32:03Z | null | ['CVE-2018-6333'] | Nuclide Improper Input Validation | The hhvm-attach deep link handler in Nuclide did not properly sanitize the provided hostname parameter when rendering. As a result, a malicious URL could be used to render HTML and other content inside of the editor's context, which could potentially be chained to lead to code execution. This issue affected Nuclide pri... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'nuclide'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.290.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-6333'}, {'type': 'WEB', 'url': 'https://github.com/facebook/nuclide/commit/65f6bbd683404be1bb569b8d1be84b5d4c74a324'}] | {'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T23:24:45Z', 'nvd_published_at': '2018-12-31T23:29:00Z'} |
1.4.0 | GHSA-527r-mfmj-prqf | 2023-02-08T18:11:20Z | 2022-05-14T01:09:00Z | null | ['CVE-2016-3072'] | Katello SQL Injection vulnerabilities | Multiple SQL injection vulnerabilities in the scoped_search function in app/controllers/katello/api/v2/api_controller.rb in Katello allow remote authenticated users to execute arbitrary SQL commands via the (1) sort_by or (2) sort_order parameter. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'katello'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3072'}, {'type': 'WEB', 'url': 'https://github.com/Katello/katello/pull/6051'}, {'type': 'WEB', 'url': 'https://github.com/Katello/katello/commit/5645ed4365980a34e30a9c57fe0793dff729e8e4'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/R... | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T18:11:20Z', 'nvd_published_at': '2016-06-07T18:59:00Z'} |
1.4.0 | GHSA-v6gf-x8fp-532v | 2022-07-06T20:08:26Z | 2022-05-17T03:58:49Z | null | ['CVE-2015-8797'] | Improper Neutralization of Input During Web Page Generation in Apache Solr | Cross-site scripting (XSS) vulnerability in webapp/web/js/scripts/plugins.js in the stats page in the Admin UI in Apache Solr before 5.3.1 allows remote attackers to inject arbitrary web script or HTML via the entry parameter to a plugins/cache URI. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.3.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8797'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/SOLR-7949'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg21975544'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:08:26Z', 'nvd_published_at': '2016-02-15T02:59:00Z'} |
1.4.0 | GHSA-73rp-q4rx-5grc | 2022-05-24T22:00:35Z | 2022-05-10T00:00:21Z | null | ['CVE-2022-1631'] | Incorrect Authorization in microweber | Users Account Pre-Takeover or Users Account Takeover. in GitHub repository microweber/microweber prior to 1.2.15. Victim Account Take Over. Since, there is no email confirmation, an attacker can easily create an account in the application using the Victim’s Email. This allows an attacker to gain pre-authentication to t... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.15'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1631'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/c162dfffb9bfd264d232aaaf5bb3daee16a3cb38'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/5... | {'cwe_ids': ['CWE-284', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:00:35Z', 'nvd_published_at': '2022-05-09T14:15:00Z'} |
1.4.0 | GHSA-xprw-xvvm-vqmv | 2022-07-08T18:49:01Z | 2022-05-17T00:29:52Z | null | ['CVE-2010-2232'] | Improper Access Control in Apache Derby | In Apache Derby 10.1.2.1, 10.2.2.0, 10.3.1.4, and 10.4.1.3, Export processing may allow an attacker to overwrite an existing file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.derby:derby'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.1.2.1'}, {'fixed': '10.4.2.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.4.1.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-2232'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/DERBY-2925'}, {'type': 'WEB', 'url': 'http://db.apache.org/derby/releases/release-10.6.2.1.html#Note+for+DERBY-2925'}] | {'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T18:49:01Z', 'nvd_published_at': '2017-10-23T13:29:00Z'} |
1.4.0 | GHSA-frqh-x6r7-h6mq | 2022-11-04T18:45:07Z | 2022-05-17T01:17:22Z | null | ['CVE-2017-3153'] | Cross-site Scripting in Apache Atlas | Apache Atlas versions 0.6.0-incubating and 0.7.0-incubating were found vulnerable to Reflected XSS in the search functionality. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.atlas:atlas-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.1-incubating'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-3153'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/atlas'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/4a4fef91e067fd0d9da569e30867c1fa65e2a0520acde71ddefee0ea@%3Cdev.atlas.apache.org%3E'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-04T18:45:07Z', 'nvd_published_at': '2017-08-29T20:29:00Z'} |
1.4.0 | GHSA-h4v9-jf2r-9h6m | 2022-11-03T20:34:17Z | 2022-05-14T02:50:59Z | null | ['CVE-2014-7809'] | Cross-Site Request Forgery in Apache Struts | Apache Struts 2.0.0 through 2.3.x before 2.3.20 uses predictable <s:token/> values, which allows remote attackers to bypass the CSRF protection mechanism. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.20'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-7809'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20150201180327/http://www.securitytracker.com/id/1031309'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20150820131625/http://www.securityfocus.com/bid/71548'}, {'type': 'WEB', 'ur... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T20:34:17Z', 'nvd_published_at': '2014-12-10T15:59:00Z'} |
1.4.0 | GHSA-pr9h-g7p7-rrqh | 2022-11-03T19:13:08Z | 2022-05-14T03:46:08Z | null | ['CVE-2018-1000011'] | XML External Entity Reference in Jenkins FindBugs Plugin | Jenkins FindBugs Plugin 4.71 and earlier processes XML external entities in files it parses as part of the build process, allowing attackers with user permissions in Jenkins to extract secrets from the Jenkins master, perform server-side request forgery, or denial-of-service attacks. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jvnet.hudson.plugins.findbugs:library'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.7.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000011'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-01-22/'}] | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T19:13:08Z', 'nvd_published_at': '2018-01-23T14:29:00Z'} |
1.4.0 | GHSA-jm4g-8rvq-v87j | 2022-12-14T16:18:06Z | 2022-05-24T19:04:53Z | null | ['CVE-2021-21664'] | Missing permission check in XebiaLabs XL Deploy Plugin allows capturing credentials | An incorrect permission check in Jenkins XebiaLabs XL Deploy Plugin 10.0.1 and earlier allows attackers with Generic Create permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing Username/password credentials stored in Jenkins. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.xebialabs.deployit.ci:deployit-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.0.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.0.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21664'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/xldeploy-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-06-10/#SECURITY-1982'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/20... | {'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-14T16:18:06Z', 'nvd_published_at': '2021-06-10T15:15:00Z'} |
1.4.0 | GHSA-2cjc-rgmp-x649 | 2023-07-19T23:20:05Z | 2022-05-13T01:07:40Z | null | ['CVE-2018-15598'] | Traefik Missing Authentication | Containous Traefik 1.6.x before 1.6.6, when `--api` is used, exposes the configuration and secret if authentication is missing and the API's port is publicly reachable. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/traefik/traefik/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6'}, {'fixed': '1.6.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-15598'}, {'type': 'WEB', 'url': 'https://github.com/containous/traefik/pull/3790'}, {'type': 'WEB', 'url': 'https://github.com/containous/traefik/pull/3790/commits/113250ce5735d554c502ca16fb03bb9119ca79f1'}, {'type': 'WEB', 'url': 'https://github.c... | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T23:20:05Z', 'nvd_published_at': '2018-08-21T01:29:00Z'} |
1.4.0 | GHSA-vx6p-q4gj-x6xx | 2023-01-26T23:52:12Z | 2022-05-24T19:18:04Z | null | ['CVE-2021-25972'] | Camaleon CMS vulnerable to Server-Side Request Forgery | In Camaleon CMS, versions 2.1.2.0 through 2.6.0, are vulnerable to Server-Side Request Forgery (SSRF) in the media upload feature, which allows admin users to fetch media files from external URLs but fails to validate URLs referencing to localhost or other internal servers. This allows attackers to read files stored in... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'camaleon_cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.2.0'}, {'fixed': '2.6.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25972'}, {'type': 'WEB', 'url': 'https://github.com/owen2345/camaleon-cms/commit/5a252d537411fdd0127714d66c1d76069dc7e190'}, {'type': 'PACKAGE', 'url': 'https://github.com/owen2345/camaleon-cms'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/... | {'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-26T23:52:12Z', 'nvd_published_at': '2021-10-20T12:15:00Z'} |
1.4.0 | GHSA-7mfw-g8x4-rq2w | 2023-07-27T00:29:53Z | 2022-05-17T00:51:04Z | null | ['CVE-2017-12156'] | Moodle XSS Vulnerability | Moodle 3.x has XSS in the contact form on the "non-respondents" page in non-anonymous feedback. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3'}, {'fixed': '3.3.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.1'}}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSY... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12156'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/a39d2976fe5e91da7a28a8512d5b94d4a27067b8'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=358585'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-27T00:29:53Z', 'nvd_published_at': '2017-09-18T04:29:00Z'} |
1.4.0 | GHSA-g8xg-jgj6-49r3 | 2023-08-17T23:06:01Z | 2022-05-05T02:48:45Z | null | ['CVE-2013-0306'] | Django is vulnerable to Denial of Service attack in formset | The form library in Django 1.3.x before 1.3.6, 1.4.x before 1.4.4, and 1.5 before release candidate 2 allows remote attackers to bypass intended resource limits for formsets and cause a denial of service (memory consumption) or trigger server errors via a modified max_num parameter. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.6'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0306'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/0cc350a896f70ace18280410eb616a9197d862b0'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/d7094bbce8cb838f3b40f504f198c098ff1cf727'}, {'type': 'PACKAGE', 'url... | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-17T23:06:01Z', 'nvd_published_at': '2013-05-02T14:55:00Z'} |
1.4.0 | GHSA-cmv8-6362-r5w9 | 2022-05-23T20:16:05Z | 2022-05-23T20:16:05Z | null | ['CVE-2022-29164'] | Malicious HTML+XHR Artifact Privilege Escalation in Argo Workflows | Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes.
* The attacker creates a workflow that produces a HTML artifact that contains a HTML file that contains a script which uses XHR calls to interact with the Argo Server API.
* The attacker emails the deep-lin... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-workflows/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '3.2.11'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-workflows/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3... | [{'type': 'WEB', 'url': 'https://github.com/argoproj/argo-workflows/security/advisories/GHSA-cmv8-6362-r5w9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29164'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-workflows/pull/8585'}, {'type': 'WEB', 'url': 'https://github.com/argopr... | {'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-23T20:16:05Z', 'nvd_published_at': '2022-05-06T00:15:00Z'} |
1.4.0 | GHSA-674j-7m97-j2p9 | 2023-03-01T22:23:11Z | 2022-05-14T00:58:02Z | null | ['CVE-2018-1000120'] | curl FTP path confusion leads to NIL byte out of bounds write | curl can be coerced into writing a zero byte out of bounds.
This bug can trigger when curl is told to work on an FTP URL, with the setting to only issue a single CWD command (--ftp-method singlecwd or the libcurl alternative [CURLOPT_FTP_FILEMETHOD](https://curl.se/libcurl/c/CURLOPT_FTP_FILEMETHOD.html)).
curl then U... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'curl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.12.3'}]}], 'database_specific': {'last_known_affected_version_range': '< 7.59.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000120'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:0327'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:3157'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:3558'}, {'type': 'WE... | {'cwe_ids': ['CWE-787'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-01T22:23:11Z', 'nvd_published_at': '2018-03-14T18:29:00Z'} |
1.4.0 | GHSA-h4g7-8m7r-87r9 | 2022-06-17T22:29:32Z | 2022-05-02T04:00:26Z | null | ['CVE-2009-5012'] | Improper Access Control in pyftpdlib | ftpserver.py in pyftpdlib before 0.5.2 does not require the l permission for the MLST command, which allows remote authenticated users to bypass intended access restrictions and list the root directory via an FTP session. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'pyftpdlib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.5.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-5012'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h4g7-8m7r-87r9'}, {'type': 'PACKAGE', 'url': 'https://github.com/giampaolo/pyftpdlib'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/pyftpd... | {'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T22:29:32Z', 'nvd_published_at': '2010-10-19T20:00:00Z'} |
1.4.0 | GHSA-grw3-hjjm-5cjm | 2023-09-22T22:27:09Z | 2022-05-14T02:38:47Z | null | ['CVE-2008-6540'] | DotNetNuke Default Machine Key Exposure | DotNetNuke before 4.8.2, during installation or upgrade, does not warn the administrator when the default (1) ValidationKey and (2) DecryptionKey values cannot be modified in the web.config file, which allows remote attackers to bypass intended access restrictions by using the default keys. | [] | [{'package': {'ecosystem': 'NuGet', 'name': 'DotNetNuke.Core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.8.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2008-6540'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/41399'}, {'type': 'PACKAGE', 'url': 'https://github.com/dnnsoftware/Dnn.Platform'}, {'type': 'WEB', 'url': 'http://osvdb.org/43720'}, {'type': 'WEB', 'url': 'http:... | {'cwe_ids': ['CWE-453'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-22T22:27:09Z', 'nvd_published_at': '2009-03-30T01:30:00Z'} |
1.4.0 | GHSA-47wc-p5cp-w7pw | 2022-06-28T16:17:01Z | 2022-05-24T22:00:43Z | null | ['CVE-2019-10405'] | Exposure of Sensitive Information to an Unauthorized Actor in Jenkins | Jenkins 2.196 and earlier, LTS 2.176.3 and earlier printed the value of the "Cookie" HTTP request header on the /whoAmI/ URL, allowing attackers exploiting another XSS vulnerability to obtain the HTTP session cookie despite it being marked HttpOnly. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.176.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.176.3'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10405'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-09-25/#SECURITY-1505'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/09/25/3'}] | {'cwe_ids': ['CWE-200', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T16:17:01Z', 'nvd_published_at': '2019-09-25T16:15:00Z'} |
1.4.0 | GHSA-4vhf-2hv7-8mrx | 2022-07-07T22:38:48Z | 2022-05-14T01:14:52Z | null | ['CVE-2014-3600'] | Improper Restriction of XML External Entity Reference in Apache ActiveMQ | XML external entity (XXE) vulnerability in Apache ActiveMQ 5.x before 5.10.1 allows remote consumers to have unspecified impact via vectors involving an XPath based selector when dequeuing XML messages. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.activemq:activemq-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.10.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3600'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/100722'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/AMQ-5333'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/a859563f05fbe7c319... | {'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T22:38:48Z', 'nvd_published_at': '2017-10-27T19:29:00Z'} |
1.4.0 | GHSA-q9xf-jwr4-v445 | 2022-07-13T17:16:01Z | 2022-05-14T01:17:02Z | null | ['CVE-2011-1184'] | Authentication Bypass in Apache Tomcat | The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 does not have the expected countermeasures against replay attacks, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid reque... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.5.0'}, {'fixed': '5.5.34'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-1184'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T17:16:01Z', 'nvd_published_at': '2012-01-14T21:55:00Z'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.