schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
8
154
details
stringlengths
31
19.1k
severity
stringlengths
2
92
affected
stringlengths
75
28.5k
references
stringlengths
79
7.48k
database_specific
stringlengths
131
196
1.4.0
GHSA-qf38-f2fr-q4x9
2022-06-28T23:27:48Z
2022-05-13T01:01:02Z
null
['CVE-2018-1999002']
Improper Input Validation in Jenkins
A arbitrary file read vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in the Stapler web framework's org/kohsuke/stapler/Stapler.java that allows attackers to send crafted HTTP requests returning the contents of any file on the Jenkins master file system that the Jenkins master has access to.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.121.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.122'},...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1999002'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-07-18/#SECURITY-914'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/46453/'}, {'type': '...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T23:27:48Z', 'nvd_published_at': '2018-07-23T19:29:00Z'}
1.4.0
GHSA-8h53-fjgg-g42g
2022-07-07T23:14:07Z
2022-05-13T01:12:18Z
null
['CVE-2013-7397']
Insufficient Verification of Data Authenticity in Async Http Client
Async Http Client (aka AHC or async-http-client) before 1.9.0 skips X.509 certificate verification unless both a keyStore location and a trustStore location are explicitly set, which allows man-in-the-middle attackers to spoof HTTPS servers by presenting an arbitrary certificate during use of a typical AHC configuratio...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'com.ning:async-http-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7397'}, {'type': 'WEB', 'url': 'https://github.com/AsyncHttpClient/async-http-client/issues/352'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E...
{'cwe_ids': ['CWE-345'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T23:14:07Z', 'nvd_published_at': '2015-06-24T16:59:00Z'}
1.4.0
GHSA-7fc2-rm35-2pp7
2022-06-03T15:42:47Z
2022-05-17T00:35:13Z
null
['CVE-2015-5607']
IPython vulnerable to cross site request forgery (CSRF)
IPython (Interactive Python) is a command shell. Cross-site request forgery in the REST API is possible in in IPython 2 and 3. Versions 2.4.1 and 3.2.3 contain patches.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ipython'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.12'}, {'fixed': '2.4.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ipython'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5607'}, {'type': 'WEB', 'url': 'https://github.com/ipython/ipython/commit/1415a9710407e7c14900531813c15ba6165f0816'}, {'type': 'WEB', 'url': 'https://github.com/ipython/ipython/commit/a05fe052a18810e92d9be8c1185952c13fe4e5b0'}, {'type': 'WEB', 'url...
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T15:42:47Z', 'nvd_published_at': '2017-09-20T16:29:00Z'}
1.4.0
GHSA-4rgh-jx4f-qfcq
2022-08-04T21:05:04Z
2022-05-24T17:37:16Z
null
['CVE-2020-35669']
http before 0.13.3 vulnerable to header injection
An issue was discovered in the http package before 0.13.3 for Dart. If the attacker controls the HTTP method and the app is using Request directly, it's possible to achieve CRLF injection in an HTTP request via HTTP header injection. This issue has been addressed in commit abb2bb182 by validating request methods.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Pub', 'name': 'http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35669'}, {'type': 'WEB', 'url': 'https://github.com/dart-lang/http/issues/511'}, {'type': 'WEB', 'url': 'https://github.com/dart-lang/http/pull/512'}, {'type': 'WEB', 'url': 'https://github.com/dart-lang/http/commit/abb2bb182fbd7f03aafd1f889b902d7b...
{'cwe_ids': ['CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-04T21:05:04Z', 'nvd_published_at': '2020-12-24T03:15:00Z'}
1.4.0
GHSA-f5x2-xv93-4p23
2022-06-24T01:24:06Z
2022-05-24T17:27:24Z
null
['CVE-2020-1911']
Access of Resource Using Incompatible Type in Facebook Hermes
A type confusion vulnerability when resolving properties of JavaScript objects with specially-crafted prototype chains in Facebook Hermes prior to commit fe52854cdf6725c2eaa9e125995da76e6ceb27da allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the appl...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'hermes-engine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.4.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1911'}, {'type': 'WEB', 'url': 'https://github.com/facebook/hermes/commit/fe52854cdf6725c2eaa9e125995da76e6ceb27da'}, {'type': 'WEB', 'url': 'https://www.facebook.com/security/advisories/cve-2020-1911'}]
{'cwe_ids': ['CWE-843'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T01:24:06Z', 'nvd_published_at': '2020-09-04T03:15:00Z'}
1.4.0
GHSA-742j-jcfr-23w3
2022-06-29T14:08:39Z
2022-05-13T01:01:01Z
null
['CVE-2019-1003049']
Insufficient Session Expiration in Jenkins
Users who cached their CLI authentication before Jenkins was updated to 2.150.2 and newer, or 2.160 and newer, would remain authenticated in Jenkins 2.171 and earlier and Jenkins LTS 2.164.1 and earlier, because the fix for CVE-2019-1003004 in these releases did not reject existing remoting-based CLI authentication cac...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.164.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.164.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1003049'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenkins/commit/0eeaa087aac192fb39f52928be5a5bbf16627ea6'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:1605'}, {'type': 'PACKAGE', 'url': 'https://github.com/jen...
{'cwe_ids': ['CWE-613'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T14:08:39Z', 'nvd_published_at': '2019-04-10T21:29:00Z'}
1.4.0
GHSA-wjjr-h4wh-w6vv
2022-11-08T15:00:08Z
2022-05-02T03:22:35Z
null
['CVE-2009-1190']
Spring Framework Inefficient Regular Expression Complexity
Algorithmic complexity vulnerability in the java.util.regex.Pattern.compile method in Sun Java Development Kit (JDK) before 1.6, when used with spring.jar in SpringSource Spring Framework 1.1.0 through 2.5.6 and 3.0.0.M1 through 3.0.0.M2 and dm Server 1.0.0 through 1.0.2, allows remote attackers to cause a denial of se...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '3.0.0.RELEASE'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.5.6'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-1190'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=497161'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/50083'}, {'type': 'WEB', 'url': 'http://www.packetstormsecurity.org/hitb06/DAY_1_-_Ma...
{'cwe_ids': ['CWE-1333'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-08T15:00:08Z', 'nvd_published_at': '2009-04-27T22:30:00Z'}
1.4.0
GHSA-wm4w-8vc6-2j4h
2023-09-28T19:54:48Z
2022-05-13T01:05:20Z
null
['CVE-2019-3810']
Moodle XSS Vulnerability
A flaw was found in moodle versions 3.6 to 3.6.1, 3.5 to 3.5.3, 3.4 to 3.4.6, 3.1 to 3.1.15 and earlier unsupported versions. The /userpix/ page did not escape users' full names, which are included as text when hovering over profile images. Note this page is not linked to by default and its access is restricted.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.6.0'}, {'fixed': '3.6.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions':...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3810'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3810'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=381230#p1536767'}, {'typ...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T22:45:20Z', 'nvd_published_at': '2019-03-25T18:29:00Z'}
1.4.0
GHSA-435g-r2m8-gjvm
2022-11-04T18:44:24Z
2022-05-14T03:15:57Z
null
['CVE-2018-11651']
Cross-site Scripting in Graylog
Graylog before v2.4.4 has an XSS security issue with unescaped text in dashboard names, related to components/dashboard/Dashboard.jsx, components/dashboard/EditDashboardModal.jsx, and pages/ShowDashboardPage.jsx.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.graylog2:graylog2-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11651'}, {'type': 'WEB', 'url': 'https://github.com/Graylog2/graylog2-server/pull/4739'}, {'type': 'PACKAGE', 'url': 'https://github.com/Graylog2/graylog2-server'}, {'type': 'WEB', 'url': 'https://www.graylog.org/post/announcing-graylog-v2-4-4'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-04T18:44:24Z', 'nvd_published_at': '2018-06-01T14:29:00Z'}
1.4.0
GHSA-8wch-9gcg-v2pr
2022-06-17T22:10:05Z
2022-05-02T03:39:48Z
null
['CVE-2009-2902']
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Apache Tomcat
Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to delete work-directory files via directory traversal sequences in a WAR filename, as demonstrated by the ...war filename.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.5.0'}, {'fixed': '5.5.29'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.5.28'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-2902'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/55857'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E'}, {'t...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T22:10:05Z', 'nvd_published_at': '2010-01-28T20:30:00Z'}
1.4.0
GHSA-67f9-qmg7-fmcq
2023-07-20T22:36:27Z
2022-05-13T01:18:35Z
null
['CVE-2018-0874']
ChakraCore RCE Vulnerability
ChakraCore and Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the Chakra scripting engine handles objects in memory, aka "Chakra Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0872, CVE-2018-08...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-0874'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/7087c314a67631a0a3094bc2f741991ee10f5b5a'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0874'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T22:36:27Z', 'nvd_published_at': '2018-03-14T17:29:00Z'}
1.4.0
GHSA-f7p4-fmmh-4p8x
2023-07-31T19:12:45Z
2022-05-14T02:23:11Z
null
['CVE-2016-3390']
ChakraCore RCE Vulnerability
The scripting engines in Microsoft Internet Explorer 11 and Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, as demonstrated by the Chakra JavaScript engine, aka "Scripting Engine Memory Corruption Vulnerability."
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3390'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/1737'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/f05c42e64c3b2d057ae1a52fe1917af26c9f2737'}, {'type': 'WEB', 'url': 'https://docs.microso...
{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T19:12:45Z', 'nvd_published_at': '2016-10-14T02:59:00Z'}
1.4.0
GHSA-7gxq-5qqc-v3fc
2023-08-28T23:52:28Z
2022-05-17T05:08:47Z
null
['CVE-2013-1843']
TYPO3 Open redirect vulnerability in the Access tracking mechanism
Open redirect vulnerability in the Access tracking mechanism in TYPO3 4.5.x before 4.5.24, 4.6.x before 4.6.17, 4.7.x before 4.7.9, and 6.0.x before 6.0.3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.5.0'}, {'fixed': '4.5.24'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ecosystem_specific': {'affected_function...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1843'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3-CMS/core'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-03/msg00079.html'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/52433'}, {'type': 'WEB', 'url...
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-28T23:52:28Z', 'nvd_published_at': '2013-03-20T15:55:00Z'}
1.4.0
GHSA-c45w-p293-7cv6
2023-09-25T19:16:13Z
2022-05-24T16:52:28Z
null
['CVE-2019-7945']
Magento 2 Community Edition XSS Vulnerability
A stored cross-cite scripting vulnerability exists in Magento Open Source prior to 1.9.4.2, and Magento Commerce prior to 1.14.4.2, Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. An authenticated user with privileges to modify currency symbols can inject malicious javascript.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7945'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051916/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-23'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-14T23:14:51Z', 'nvd_published_at': '2019-08-02T22:15:00Z'}
1.4.0
GHSA-27mh-3343-6hg5
2023-07-12T20:40:16Z
2022-05-24T17:37:27Z
null
['CVE-2020-29244']
dhowden tag panic due to out-of-bounds read
Due to improper bounds checking, a number of methods in dhowden tag before 0.0.0-20201120070457-d52dcb253c63 can trigger a panic due to attempted out-of-bounds reads. If the package is used to parse user supplied input, this may be used as a vector for a denial of service attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/dhowden/tag'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20201120070457-d52dcb253c63'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-29244'}, {'type': 'WEB', 'url': 'https://github.com/dhowden/tag/issues/79'}, {'type': 'WEB', 'url': 'https://github.com/dhowden/tag/commit/4b595ed4fac79f467594aa92f8953f90f817116e'}, {'type': 'WEB', 'url': 'https://github.com/dhowden/tag/commit/6b1...
{'cwe_ids': ['CWE-129'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-07T22:40:44Z', 'nvd_published_at': '2020-12-28T08:15:00Z'}
1.4.0
GHSA-hrp6-w4v2-8737
2023-03-27T16:14:33Z
2022-05-17T05:05:40Z
null
['CVE-2012-2671']
Rack-Cache caches sensitive headers
The Rack::Cache rubygem 0.3.0 through 1.1 caches Set-Cookie and other sensitive headers, which allows attackers to obtain sensitive cookie information, hijack web sessions, or have other unspecified impact by accessing the cache.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rack-cache'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.0'}, {'fixed': '1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-2671'}, {'type': 'WEB', 'url': 'https://github.com/rtomayko/rack-cache/pull/52'}, {'type': 'WEB', 'url': 'https://github.com/rtomayko/rack-cache/commit/2e3a64d07daac4c757cc57620f2288e865a09b90'}, {'type': 'WEB', 'url': 'https://bugzilla.novell.com/...
{'cwe_ids': ['CWE-525'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-27T16:14:33Z', 'nvd_published_at': '2012-06-17T03:41:00Z'}
1.4.0
GHSA-vcwx-8mqh-2557
2023-08-04T21:52:41Z
2022-05-17T00:14:14Z
null
['CVE-2017-17054']
Aubio Divide-By-Zero DoS vulnerability in new_aubio_source_wavread function
In aubio 0.4.6, a divide-by-zero error exists in the function `new_aubio_source_wavread()` in source_wavread.c, which may lead to DoS when playing a crafted audio file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'aubio'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-17054'}, {'type': 'WEB', 'url': 'https://github.com/aubio/aubio/issues/148'}, {'type': 'WEB', 'url': 'https://github.com/aubio/aubio/commit/25ecb7338cebc5b8c79092347839c78349ec33f1'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/cgi-bin/bugrepor...
{'cwe_ids': ['CWE-369'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-04T21:52:41Z', 'nvd_published_at': '2017-11-29T07:29:00Z'}
1.4.0
GHSA-3x58-8qmv-wqw5
2023-08-04T21:51:56Z
2022-05-13T01:49:58Z
null
['CVE-2018-14523']
Aubio is vulnerable to out of bound read when samplerate > 50kHz
An issue was discovered in aubio 0.4.6. A buffer over-read can occur in `new_aubio_pitchyinfft` in `pitch/pitchyinfft.c` when the samplerate of the input file is larger than 50kHz.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'aubio'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14523'}, {'type': 'WEB', 'url': 'https://github.com/aubio/aubio/issues/189'}, {'type': 'WEB', 'url': 'https://github.com/aubio/aubio/commit/af4f9e6a93b629fb6defa2a229ec828885b9d187'}, {'type': 'PACKAGE', 'url': 'https://github.com/aubio/aubio'}, {'...
{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-04T21:51:56Z', 'nvd_published_at': '2018-07-23T08:29:00Z'}
1.4.0
GHSA-qxrx-m6v6-m767
2022-12-29T01:44:14Z
2022-05-24T17:28:26Z
null
['CVE-2020-2266']
Stored XSS vulnerability in Description Column Plugin
Jenkins Description Column Plugin 1.3 and earlier does not escape the job description in the column tooltip, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:description-column-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2266'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/description-column-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1916'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-se...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-29T01:44:14Z', 'nvd_published_at': '2020-09-16T14:15:00Z'}
1.4.0
GHSA-4wr9-2xc6-jmg5
2022-12-16T15:20:37Z
2022-05-24T19:06:36Z
null
['CVE-2021-21671']
Session fixation vulnerability in Jenkins
Jenkins 2.299 and earlier, LTS 2.289.1 and earlier does not invalidate the existing session on login. This allows attackers to use social engineering techniques to gain administrator access to Jenkins. This vulnerability was introduced in Jenkins 2.266 and LTS 2.277.1. Jenkins 2.300, LTS 2.289.2 invalidates the exist...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.292'}, {'fixed': '2.300'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.299'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21671'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-06-30/#SECURITY-2371'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/06/30...
{'cwe_ids': ['CWE-384'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-16T15:20:37Z', 'nvd_published_at': '2021-06-30T17:15:00Z'}
1.4.0
GHSA-qrj4-rmqg-4hcp
2023-09-22T21:07:18Z
2022-05-01T18:41:17Z
null
['CVE-2007-6286']
Apache Tomcat Does Not Properly Handle Empty Requests
Apache Tomcat 5.5.11 through 5.5.25 and 6.0.0 through 6.0.15, when the native APR connector is used, does not properly handle an empty request to the SSL port, which allows remote attackers to trigger handling of "a duplicate copy of one of the recent requests," as demonstrated by using netcat to send the empty request...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.5.11'}, {'last_affected': '5.5.25'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-6286'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-22T21:07:18Z', 'nvd_published_at': '2008-02-12T01:00:00Z'}
1.4.0
GHSA-68p4-pjpf-xwcq
2023-06-13T20:09:07Z
2022-05-24T17:41:47Z
null
['CVE-2021-26954']
insert_slice_clone can double drop if Clone panics.
Affected versions of this crate used ptr::copy when inserting into the middle of a Vec. When ownership was temporarily duplicated during this copy, it calls the clone method of a user provided element. This issue can result in an element being double-freed if the clone call panics. Commit `20cb73d` fixed this issue b...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'qwutils'}, 'ecosystem_specific': {'affected_functions': ['qwutils::imp::vec::VecExt::insert_slice_clone']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26954'}, {'type': 'WEB', 'url': 'https://github.com/qwertz19281/rust_utils/issues/3'}, {'type': 'WEB', 'url': 'https://github.com/qwertz19281/rust_utils/commit/20cb73d'}, {'type': 'PACKAGE', 'url': 'https://github.com/qwertz19281/rust_utils'}, {'ty...
{'cwe_ids': ['CWE-415'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:14:33Z', 'nvd_published_at': '2021-02-09T23:15:00Z'}
1.4.0
GHSA-fg44-w3fr-hgxv
2022-11-08T12:31:33Z
2022-05-14T01:30:10Z
null
['CVE-2018-8031']
Apache TomEE console vulnerable to Cross-site Scripting
The Apache TomEE console (tomee-webapp) has a XSS vulnerability which could allow javascript to be executed if the user is given a malicious URL. This web application is typically used to add TomEE features to a Tomcat installation. The TomEE bundles do not ship with this application included. This issue can be mitigat...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomee:tomee-webapp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8031'}, {'type': 'WEB', 'url': 'https://github.com/apache/tomee/commit/b8bbf50c23ce97dd64f3a5d77f78f84e47579863'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomee'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/c4b0d83a5...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-08T12:31:33Z', 'nvd_published_at': '2018-07-23T22:29:00Z'}
1.4.0
GHSA-xphj-m9cc-8fmq
2022-07-06T19:46:12Z
2022-05-13T01:25:19Z
null
['CVE-2016-6814']
Deserialization of Untrusted Data in Groovy
When an application with unsupported Codehaus versions of Groovy from 1.7.0 to 2.4.3, Apache Groovy 2.4.4 to 2.4.7 on classpath uses standard Java serialization mechanisms, e.g. to communicate between servers or to store local data, it was possible for an attacker to bake a special serialized object that will execute c...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.codehaus.groovy:groovy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '2.4.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.4.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6814'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:0868'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2486'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2596'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:46:12Z', 'nvd_published_at': '2018-01-18T18:29:00Z'}
1.4.0
GHSA-rr33-j5p5-ppf8
2022-05-18T19:10:33Z
2022-05-03T00:00:44Z
null
['CVE-2021-40822']
GeoServer allows SSRF via the option for setting a proxy host
GeoServer through 2.18.5 and 2.19.x through 2.19.2 allows SSRF via the option for setting a proxy host.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.geoserver:gs-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.18.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.geoserver:gs-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.19.0'}, {'last_affect...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40822'}, {'type': 'PACKAGE', 'url': 'https://github.com/geoserver/geoserver'}, {'type': 'WEB', 'url': 'https://github.com/geoserver/geoserver/compare/2.19.2...2.19.3'}, {'type': 'WEB', 'url': 'https://github.com/geoserver/geoserver/releases'}, {'ty...
{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-18T19:10:33Z', 'nvd_published_at': '2022-05-02T00:15:00Z'}
1.4.0
GHSA-3hxw-g85p-qgxm
2023-08-24T13:03:25Z
2022-05-24T16:45:24Z
null
['CVE-2019-11830']
PharStreamWrapper for Typo3 unsafe deserialization vulnerability
PharMetaDataInterceptor in the PharStreamWrapper (aka phar-stream-wrapper) package 2.x before 2.1.1 and 3.x before 3.1.1 for TYPO3 mishandles Phar stub parsing, which allows attackers to bypass a deserialization protection mechanism.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/phar-stream-wrapper'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.1.0'}}, {'package': {'ecosystem':...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11830'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3/phar-stream-wrapper'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/phar-stream-wrapper/releases/tag/v2.1.1'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/phar-stream-wrapper/re...
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-14T20:50:23Z', 'nvd_published_at': '2019-05-09T04:29:00Z'}
1.4.0
GHSA-hq2h-9mc3-h6w2
2022-12-29T01:34:09Z
2022-05-24T17:28:25Z
null
['CVE-2020-2256']
Stored XSS vulnerability in Pipeline Maven Integration Plugin via unescaped display name
Pipeline Maven Integration Plugin 3.9.2 and earlier does not escape the upstream job’s display name shown as part of a build cause. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission. Pipeline Maven Integration Plugin 3.9.3 escapes upstream job nam...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:pipeline-maven'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.9.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2256'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/pipeline-maven-plugin/'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1976'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secur...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-29T01:34:09Z', 'nvd_published_at': '2020-09-16T14:15:00Z'}
1.4.0
GHSA-qj2w-mw2r-pv39
2023-03-10T02:36:47Z
2022-05-14T01:01:12Z
null
['CVE-2018-1000074']
RubyGems Deserialization of Untrusted Data vulnerability
RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Deserialization of Untrusted Data vulnerability in owner command that can result in code execution. This attack requir...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rubygems-update'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jruby:jruby-stdlib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.1.16.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000074'}, {'type': 'WEB', 'url': 'https://github.com/jruby/jruby/commit/0b06b48ab4432237ce5fc1bef47f2c6bcf7843f7'}, {'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems/commit/254e3d0ee873c008c0b74e8b8abcbdab4caa0a6d'}, {'type': 'WEB', 'ur...
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-10T02:36:47Z', 'nvd_published_at': '2018-03-13T15:29:00Z'}
1.4.0
GHSA-3cwm-7jmm-774w
2022-07-07T23:11:39Z
2022-05-05T00:29:41Z
null
['CVE-2013-7489']
Deserialization of Untrusted Data in Beaker
The Beaker library through 1.11.0 for Python is affected by deserialization of untrusted data, which could lead to arbitrary code execution.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'Beaker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.11.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7489'}, {'type': 'WEB', 'url': 'https://github.com/bbangert/beaker/issues/191'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1850105'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3cwm-7jmm-774w'}, {'type...
{'cwe_ids': ['CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T23:11:39Z', 'nvd_published_at': '2020-06-26T20:15:00Z'}
1.4.0
GHSA-7m8v-w6f9-q2f9
2022-11-03T19:12:53Z
2022-05-14T01:38:17Z
null
['CVE-2018-1000415']
Cross-site Scripting in Jenkins Rebuilder Plugin
A cross-site scripting vulnerability exists in Jenkins Rebuilder Plugin 1.28 and earlier in ``` RebuildAction/BooleanParameterValue.jelly, RebuildAction/ExtendedChoiceParameterValue.jelly, RebuildAction/FileParameterValue.jelly, RebuildAction/LabelParameterValue.jelly, RebuildAction/ListSubversionTagsParameter...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.sonyericsson.hudson.plugins.rebuild:rebuild'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.29'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000415'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-09-25/#SECURITY-130'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106532'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T19:12:53Z', 'nvd_published_at': '2019-01-09T23:29:00Z'}
1.4.0
GHSA-wcj4-ff9m-5r7g
2023-08-16T23:13:10Z
2022-05-17T04:12:03Z
null
['CVE-2014-1836']
ImpressCMS Path Traversal to Arbitrary File Delete
Absolute path traversal vulnerability in `htdocs/libraries/image-editor/image-edit.php` in ImpressCMS before 1.3.6 allows remote attackers to delete arbitrary files via a full pathname in the `image_path` parameter in a cancel action.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'impresscms/impresscms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-1836'}, {'type': 'WEB', 'url': 'https://github.com/ImpressCMS/impresscms/issues/914'}, {'type': 'WEB', 'url': 'https://github.com/pedrib/PoC/blob/master/generic/impresscms-1.3.5.txt'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228234...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T23:13:10Z', 'nvd_published_at': '2015-07-01T14:59:00Z'}
1.4.0
GHSA-vc74-c4m6-9979
2023-08-28T23:35:27Z
2022-05-17T01:29:43Z
null
['CVE-2013-7082']
TYPO3 Flow Cross-site scripting (XSS) vulnerability
Cross-site scripting (XSS) vulnerability in the errorAction method in the ActionController base class in TYPO3 Flow (formerly FLOW3) 1.1.x before 1.1.1 and 2.0.x before 2.0.1 allows remote attackers to inject arbitrary web script or HTML via unspecified input, which is returned in an error message.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/flow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1'}, {'fixed': '1.1.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/flow'}, 'ecosystem_specific': {'affected_functions': ['']}, ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7082'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/89614'}, {'type': 'WEB', 'url': 'http://osvdb.org/100825'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/55996'}, {'type': 'WEB', 'url': 'http://typo3.org...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-28T23:35:27Z', 'nvd_published_at': '2013-12-21T00:55:00Z'}
1.4.0
GHSA-w2g4-g8xr-px4x
2023-07-07T17:26:31Z
2022-05-14T01:42:49Z
null
['CVE-2018-18921']
CSRF in PHP Server Monitor before 3.3.2
PHP Server Monitor before 3.3.2 has CSRF, as demonstrated by a Delete action.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpservermon/phpservermon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-18921'}, {'type': 'WEB', 'url': 'https://github.com/phpservermon/phpservermon/issues/670#issuecomment-440873239'}, {'type': 'WEB', 'url': 'https://github.com/phpservermon/phpservermon/commit/30150714a8af0c82259b733f604fce54c0dcbf40'}, {'type': 'WEB...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T17:26:31Z', 'nvd_published_at': '2018-12-18T22:29:00Z'}
1.4.0
GHSA-86p9-x5pw-94qx
2022-06-30T19:51:56Z
2022-05-13T01:14:24Z
null
['CVE-2017-9096']
Improper Restriction of XML External Entity Reference in iText
The XML parsers in iText before 5.5.12 and 7.x before 7.0.3 do not disable external entities, which might allow remote attackers to conduct XML external entity (XXE) attacks via a crafted PDF.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.itextpdf:itextpdf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.5.12'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.itextpdf:itextpdf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.3'}]}]}...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-9096'}, {'type': 'WEB', 'url': 'https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03902en_us'}, {'type': 'WEB', 'url': 'https://www.compass-security.com/fileadmin/Datein/Research/Advisories/CSNC-2017-017_itext_xml_...
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-30T19:51:56Z', 'nvd_published_at': '2017-11-08T16:29:00Z'}
1.4.0
GHSA-5jrq-582v-9767
2022-05-25T19:38:05Z
2022-05-09T00:00:51Z
null
['CVE-2018-25033']
Out-of-bounds read in admesh
ADMesh through 0.98.4 has a heap-based buffer over-read in stl_update_connects_remove_1 (called from stl_remove_degenerate) in connect.c in libadmesh.a.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'admesh'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.98.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25033'}, {'type': 'WEB', 'url': 'https://github.com/admesh/admesh/issues/28'}, {'type': 'PACKAGE', 'url': 'https://github.com/admesh/admesh'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5jrq-582v-9767'}, {'type': 'WEB', 'url': ...
{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T19:38:05Z', 'nvd_published_at': '2022-05-08T06:15:00Z'}
1.4.0
GHSA-9f37-ggxm-h6wx
2022-12-16T22:26:38Z
2022-05-24T17:35:08Z
null
['CVE-2020-2321']
CSRF vulnerability in Jenkins Shelve Project Plugin
Shelve Project Plugin 3.0 and earlier does not require POST requests for HTTP endpoints, resulting in cross-site request forgery (CSRF) vulnerabilities. These vulnerabilities allow attackers to shelve, unshelve, or delete a project. Shelve Project Plugin 3.1 requires POST requests for the affected HTTP endpoints.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:shelve-project-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2321'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/shelve-project-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-12-03/#SECURITY-2108'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-securi...
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-16T22:26:38Z', 'nvd_published_at': '2020-12-03T16:15:00Z'}
1.4.0
GHSA-2vvr-5757-qp87
2022-12-16T15:19:45Z
2022-05-24T19:06:35Z
null
['CVE-2021-21673']
Open redirect vulnerability in Jenkins CAS Plugin
CAS Plugin 1.6.0 and earlier improperly determines that a redirect URL after login is legitimately pointing to Jenkins. This allows attackers to perform phishing attacks by having users go to a Jenkins URL that will forward them to a different site after successful authentication. CAS Plugin 1.6.1 only redirects to r...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:cas-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.6.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21673'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/cas-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-06-30/#SECURITY-2387'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/06...
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-16T15:19:45Z', 'nvd_published_at': '2021-06-30T17:15:00Z'}
1.4.0
GHSA-8jfm-rgmg-3wq2
2022-11-22T18:47:52Z
2022-05-14T01:09:51Z
null
['CVE-2016-5005']
Apache Archiva vulnerable to Cross-site Scripting
Cross-site scripting (XSS) vulnerability in Apache Archiva prior to version 2.2.1 allows remote authenticated administrators to inject arbitrary web script or HTML via the connector.sourceRepoId parameter to admin/addProxyConnector_commit.action.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.archiva:archiva'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-5005'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/archiva'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url':...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T18:47:52Z', 'nvd_published_at': '2016-07-28T16:59:00Z'}
1.4.0
GHSA-59w8-4wm2-4xw8
2023-08-29T22:31:03Z
2022-05-17T05:12:01Z
null
['CVE-2012-3443']
Django Image Field Vulnerable to Image Decompression Bombs
The `django.forms.ImageField` class in the form system in Django before 1.3.2 and 1.4.x before 1.4.1 completely decompresses image data during image validation, which allows remote attackers to cause a denial of service (memory consumption) by uploading an image file.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-3443'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/9ca0ff6268eeff92d0d0ac2c315d4b6a8e229155'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/da33d67181b53fe6cc737ac1220153814a1509f6'}, {'type': 'PACKAGE', 'url...
{'cwe_ids': ['CWE-20', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T22:31:03Z', 'nvd_published_at': '2012-07-31T17:55:00Z'}
1.4.0
GHSA-6wfj-2mw7-p5cg
2023-08-15T22:10:33Z
2022-05-14T02:09:44Z
null
['CVE-2014-6300']
phpMyAdmin micro history Implementation XSS Vulnerability
Cross-site scripting (XSS) vulnerability in the micro history implementation in phpMyAdmin 4.0.x before 4.0.10.3, 4.1.x before 4.1.14.4, and 4.2.x before 4.2.8.1 allows remote attackers to inject arbitrary web script or HTML, and consequently conduct a cross-site request forgery (CSRF) attack to create a root account, ...
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.10.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ecosystem_specific': {'a...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-6300'}, {'type': 'WEB', 'url': 'https://github.com/phpmyadmin/phpmyadmin/commit/33b39f9f1dd9a4d27856530e5ac004e23b30e8ac'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201505-03'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-15T22:10:33Z', 'nvd_published_at': '2014-11-08T11:55:00Z'}
1.4.0
GHSA-4jhm-5f7g-75fp
2022-06-30T15:47:25Z
2022-05-13T01:48:39Z
null
['CVE-2018-1000863']
Improper Limitation of a Pathname to a Restricted Directory in Jenkins
A data modification vulnerability exists in Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in User.java, IdStrategy.java that allows attackers to submit crafted user names that can cause an improper migration of user record storage formats, potentially preventing the victim from logging into Jenkins.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.138.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.138.3'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000863'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:0024'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-12-05/#SECURITY-1072'}, {'ty...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-30T15:47:25Z', 'nvd_published_at': '2018-12-10T14:29:00Z'}
1.4.0
GHSA-29rm-6752-gvwv
2022-11-03T19:11:53Z
2022-05-13T01:26:13Z
null
['CVE-2017-9791']
Code execution in Apache Struts 1 plugin
The Struts 1 plugin used with Apache Struts 2.1.x and 2.3.x might allow remote code execution via a malicious field value passed in a raw message to the ActionMessage.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-struts1-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.37'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-9791'}, {'type': 'WEB', 'url': 'https://github.com/apache/struts/commit/ffe0e20edd9d5386f4410fddd970286a69373243'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20180706-0002/'}, {'type': 'WEB', 'url': 'https://www.exploit-db.c...
{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T19:11:53Z', 'nvd_published_at': '2017-07-10T16:29:00Z'}
1.4.0
GHSA-7w53-hfpw-rg3g
2023-08-28T23:40:22Z
2022-05-17T01:36:49Z
null
['CVE-2013-1397']
Symfony Arbitrary PHP code Execution
Symfony 2.0.x before 2.0.22, 2.1.x before 2.1.7, and 2.2.x remote attackers to execute arbitrary PHP code via a serialized PHP object to the (1) Yaml::parse or (2) Yaml\Parser::parse function, a different vulnerability than CVE-2013-1348.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0'}, {'fixed': '2.0.22'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ecosystem_specific': {'affected_function...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1397'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/81551'}, {'type': 'PACKAGE', 'url': 'https://github.com/symfony/symfony'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/51980'}, {'type': 'WEB', 'url': 'h...
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-28T23:40:22Z', 'nvd_published_at': '2014-06-02T15:55:00Z'}
1.4.0
GHSA-2p7x-jcr3-7p2c
2022-07-13T19:02:12Z
2022-05-13T01:09:22Z
null
['CVE-2012-0803']
Improper Authentication in Apache CXF
The WS-SP UsernameToken policy in Apache CXF 2.4.5 and 2.5.1 allows remote attackers to bypass authentication by sending an empty UsernameToken as part of a SOAP request.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.4.5'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf'}, 'ranges': [{'type': 'E...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-0803'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/cxf'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'ht...
{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T19:02:12Z', 'nvd_published_at': '2017-08-08T21:29:00Z'}
1.4.0
GHSA-8hfm-837h-hjg5
2022-11-08T14:55:27Z
2022-05-02T03:13:38Z
null
['CVE-2009-0217']
Apache XML Security For Java vulnerable to authentication bypass by HMAC truncation
The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in multiple products. The Apache XML Security (Java) is affected by the vulnerability published in US-Cert VU #466161. See: http://www.kb.cert.org/vuls/id/466161 for more information. This bug can allow an attacker to by...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.santuario:xmlsec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-0217'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=511915'}, {'type': 'WEB', 'url': 'https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-041'}, {'type': 'WEB', 'url': 'https://gitlab.gnome.org/Arch...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-08T14:55:27Z', 'nvd_published_at': '2009-07-14T23:30:00Z'}
1.4.0
GHSA-4xh9-5vh8-3p58
2023-07-27T21:12:39Z
2022-05-17T02:46:54Z
null
['CVE-2017-7271']
Yii Framework Reflected XSS
Reflected Cross-site scripting (XSS) vulnerability in Yii Framework before 2.0.11, when development mode is used, allows remote attackers to inject arbitrary web script or HTML via crafted request data that is mishandled on the debug-mode exception screen.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'yiisoft/yii2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7271'}, {'type': 'WEB', 'url': 'https://github.com/yiisoft/yii2/pull/13401'}, {'type': 'WEB', 'url': 'https://github.com/yiisoft/yii2/commit/97171a0db7cda0a49931ee0c3b998ef50bd06756'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210125191...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-27T21:12:39Z', 'nvd_published_at': '2017-03-27T17:59:00Z'}
1.4.0
GHSA-882r-r8fw-p538
2022-05-26T18:54:26Z
2022-05-13T01:31:35Z
null
['CVE-2019-1003015']
XXE vulnerability in Jenkins Job Import Plugin
An XML external entity (XXE) processing vulnerability exists in Jenkins Job Import Plugin 2.1 and earlier in src/main/java/org/jenkins/ci/plugins/jobimport/client/RestApiClient.java that allows attackers with the ability to control the HTTP server (Jenkins) queried in preparation of job import to read arbitrary files, ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:job-import-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1003015'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/job-import-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-01-28/#SECURITY-905%20(1)'}]
{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-05-26T18:54:26Z', 'nvd_published_at': '2019-02-06T16:29:00Z'}
1.4.0
GHSA-594h-cx6w-p4jf
2023-08-16T22:27:30Z
2022-05-14T04:01:58Z
null
['CVE-2014-3941']
Typo3 Host Header Spoofing Vulnerability
TYPO3 4.5.0 before 4.5.34, 4.7.0 before 4.7.19, 6.0.0 before 6.0.14, 6.1.0 before 6.1.9, and 6.2.0 before 6.2.3 allows remote attackers to have unspecified impact via a crafted HTTP Host header, related to "Host Spoofing."
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.5.0'}, {'fixed': '4.5.34'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.5.33'}}, {'package': {'ecosystem': 'Packagist', ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3941'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00028.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-06/msg00037.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse....
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T22:27:30Z', 'nvd_published_at': '2014-06-03T14:55:00Z'}
1.4.0
GHSA-692x-89xv-64jx
2023-09-26T19:49:50Z
2022-05-24T17:01:48Z
null
['CVE-2019-19013']
Pagekit File Upload vulnerability
A CSRF vulnerability in Pagekit 1.0.17 allows an attacker to upload an arbitrary file by removing the CSRF token from a request.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pagekit/pagekit'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.17'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19013'}, {'type': 'PACKAGE', 'url': 'https://github.com/pagekit/pagekit'}, {'type': 'WEB', 'url': 'https://gitlab.com/gitlab-org/security-products/gemnasium-db/-/commit/fdf885ccf7c57c69f4d256bbb3ec76a927267a2b'}, {'type': 'WEB', 'url': 'https://pac...
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T22:17:25Z', 'nvd_published_at': '2019-11-22T16:15:00Z'}
1.4.0
GHSA-6793-gmp9-2535
2023-01-05T21:39:10Z
2022-05-24T17:08:47Z
null
['CVE-2020-2128']
Password stored in plain text by ECX Copy Data Management Plugin
Jenkins ECX Copy Data Management Plugin 1.9 and earlier stores a password unencrypted in job config.xml files on the Jenkins master where it can be viewed by users with Extended Read permission, or access to the master file system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.catalogic.ecxjenkins:catalogic-ecx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2128'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/catalogic-ecx-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-02-12/#SECURITY-1549'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/20...
{'cwe_ids': ['CWE-256'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-05T21:39:10Z', 'nvd_published_at': '2020-02-12T15:15:00Z'}
1.4.0
GHSA-7qwv-cwgj-c8rj
2022-06-07T23:11:14Z
2022-05-01T06:50:42Z
null
['CVE-2006-1547']
Improper Input Validation in Apache Struts
ActionForm in Apache Software Foundation (ASF) Struts before 1.2.9 with BeanUtils 1.7 allows remote attackers to cause a denial of service via a multipart/form-data encoded form with a parameter name that references the public getMultipartRequestHandler method, which provides further access to elements in the CommonsMu...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'struts:struts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2006-1547'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/25613'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/struts'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-07T23:11:14Z', 'nvd_published_at': '2006-03-30T22:02:00Z'}
1.4.0
GHSA-92mr-v722-f48m
2022-07-06T20:09:00Z
2022-05-17T03:25:49Z
null
['CVE-2015-7337']
Improper Input Validation in Jupyter Notebook
The editor in IPython Notebook before 3.2.2 and Jupyter Notebook 4.0.x before 4.0.5 allows remote attackers to execute arbitrary JavaScript code via a crafted file, which triggers a redirect to files/, related to MIME types.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'notebook'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.0.4'}}, {'package': {'ecosystem': 'PyPI', 'name': 'ipython'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7337'}, {'type': 'WEB', 'url': 'https://github.com/ipython/ipython/commit/0a8096adf165e2465550bd5893d7e352544e5967'}, {'type': 'WEB', 'url': 'https://github.com/jupyter/notebook/commit/9e63dd89b603dfbe3a7e774d8a962ee0fa30c0b5'}, {'type': 'WEB', 'ur...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:09:00Z', 'nvd_published_at': '2015-09-29T19:59:00Z'}
1.4.0
GHSA-8hwr-589g-xpj2
2023-02-23T20:32:28Z
2022-05-24T16:56:46Z
null
['CVE-2019-10415']
Jenkins Violation Comments to GitLab Plugin has Insufficiently Protected Credentials
Violation Comments to GitLab Plugin stored API tokens unencrypted in job `config.xml` files and its global configuration file `org.jenkinsci.plugins.jvctgl.ViolationsToGitLabGlobalConfiguration.xml` on the Jenkins controller. These credentials could be viewed by users with Extended Read permission, or access to the Jen...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:violation-comments-to-gitlab'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.29'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10415'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-09-25/#SECURITY-1577'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/09/25/3'}]
{'cwe_ids': ['CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-23T20:32:28Z', 'nvd_published_at': '2019-09-25T16:15:00Z'}
1.4.0
GHSA-xg75-68x3-7p3q
2022-11-03T22:48:20Z
2022-05-17T02:16:00Z
null
['CVE-2016-4465']
Possible DoS attack when using URLValidator
The URLValidator class in Apache Struts 2 2.3.20 through 2.3.28.1 and 2.5.x before 2.5.1 allows remote attackers to cause a denial of service via a null value for a URL field.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.20'}, {'fixed': '2.3.29'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'},...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-4465'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1348253'}, {'type': 'WEB', 'url': 'https://struts.apache.org/docs/s2-041.html'}, {'type': 'WEB', 'url': 'http://jvn.jp/en/jp/JVN12352818/index.html'}, {'type': 'WEB', 'url'...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T22:48:20Z', 'nvd_published_at': '2016-07-04T22:59:00Z'}
1.4.0
GHSA-7f2f-crxg-cpfv
2023-07-25T21:02:47Z
2022-05-14T03:38:59Z
null
['CVE-2018-7302']
Tiki Wiki CMS XSS Vulnerability
Tiki 17.1 allows upload of a .PNG file that actually has SVG content, leading to XSS.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'tikiwiki/tiki-manager'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '17.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-7302'}, {'type': 'PACKAGE', 'url': 'https://github.com/TikiWiki/tiki-manager'}, {'type': 'WEB', 'url': 'https://websecnerd.blogspot.in/2018/01/tiki-wiki-cms-groupware-17.html'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T21:02:47Z', 'nvd_published_at': '2018-02-21T20:29:00Z'}
1.4.0
GHSA-g897-cgfc-7q8v
2023-01-23T14:33:19Z
2022-05-17T04:55:27Z
null
['CVE-2013-7222']
Fat Free CRM has fixed token value
`config/initializers/secret_token.rb` in Fat Free CRM before 0.12.1 has a fixed `FatFreeCRM::Application.config.secret_token` value, which makes it easier for remote attackers to spoof signed cookies by referring to the key in the source code.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'fat_free_crm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7222'}, {'type': 'WEB', 'url': 'https://github.com/fatfreecrm/fat_free_crm/issues/300'}, {'type': 'WEB', 'url': 'https://github.com/fatfreecrm/fat_free_crm/commit/93c182dd4c6f3620b721d2a15ba6a6ecab5669df'}, {'type': 'PACKAGE', 'url': 'https://githu...
{'cwe_ids': ['CWE-330'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-23T14:33:19Z', 'nvd_published_at': '2014-01-02T14:59:00Z'}
1.4.0
GHSA-vq7j-6pcq-f48p
2022-12-29T01:30:01Z
2022-05-24T17:28:24Z
null
['CVE-2020-2254']
Path traversal vulnerability in Blue Ocean Plugin
Blue Ocean Plugin 1.23.2 and earlier provides an undocumented feature flag, `blueocean.features.GIT_READ_SAVE_TYPE`, that when set to the value `clone` allows an attacker with Item/Configure or Item/Create permission to read arbitrary files on the Jenkins controller file system. Blue Ocean Plugin 1.23.3 no longer incl...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.blueocean:blueocean'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.23.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.23.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2254'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/blueocean-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1956'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/20...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-29T01:30:01Z', 'nvd_published_at': '2020-09-16T14:15:00Z'}
1.4.0
GHSA-cfmr-38g9-f2h7
2023-08-16T21:51:21Z
2022-05-14T02:05:20Z
null
['CVE-2014-3589']
Pillow denial of service via Crafted Block Size
`PIL/IcnsImagePlugin.py` in Python Imaging Library (PIL) and Pillow before 2.3.2 and 2.5.x before 2.5.2 allows remote attackers to cause a denial of service via a crafted block size.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'pillow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'pillow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5'}, {'fixed': '2.5.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3589'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/205e056f8f9b06ed7b925cf8aa0874bc4aaf8a7d'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/5efeed77666bfd17708f3434b1d2daa9db1e1335'}, {'type': '...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:51:21Z', 'nvd_published_at': '2014-08-25T14:55:00Z'}
1.4.0
GHSA-r5w3-pfq8-3r82
2022-12-15T16:35:03Z
2022-05-24T19:12:37Z
null
['CVE-2021-21678']
Jenkins SAML Plugin allows bypassing CSRF protection for any URL
An extension point in Jenkins allows selectively disabling cross-site request forgery (CSRF) protection for specific URLs. SAML Plugin implements this extension point for the URL that users are redirected to after login. In SAML Plugin 2.0.7 and earlier this implementation is too permissive, allowing attackers to craf...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:saml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.7'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21678'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/saml-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-08-31/#SECURITY-2469'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/0...
{'cwe_ids': ['CWE-693'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T16:35:03Z', 'nvd_published_at': '2021-08-31T14:15:00Z'}
1.4.0
GHSA-j788-fx57-99wp
2022-06-17T21:55:58Z
2022-05-02T03:18:14Z
null
['CVE-2009-0781']
Cross-site scripting in Apache Tomcat
Cross-site scripting (XSS) vulnerability in jsp/cal/cal2.jsp in the calendar application in the examples web application in Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 allows remote attackers to inject arbitrary web script or HTML via the time parameter, related to "invalid HTML."
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'last_affected': '4.1.39'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.5.0'}, {'la...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-0781'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2009:1164'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2009:1562'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2009-0781'}, {'type': '...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:55:58Z', 'nvd_published_at': '2009-03-09T21:30:00Z'}
1.4.0
GHSA-pw2f-m22m-p75c
2023-08-01T23:41:02Z
2022-05-24T16:52:26Z
null
['CVE-2019-7909']
Magento 2 Community Edition Cross-site Scripting Vulnerability
A stored cross-site scripting vulnerability exists in the admin panel of Magento Open Source prior to 1.9.4.2, and Magento Commerce prior to 1.14.4.2, Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This could be exploited by an authenticated user with privileges to email templates.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7909'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051916/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-23'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T23:41:02Z', 'nvd_published_at': '2019-08-02T22:15:00Z'}
1.4.0
GHSA-25h3-mw3p-w8r7
2023-08-22T14:34:53Z
2022-05-24T17:26:18Z
null
['CVE-2020-14201']
Dolibarr CRM allows Privilege Escalation
Dolibarr CRM before 11.0.5 allows privilege escalation. This could allow remote authenticated attackers to upload arbitrary files via societe/document.php in which "disabled" is changed to "enabled" in the HTML source code.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14201'}, {'type': 'PACKAGE', 'url': 'https://github.com/Dolibarr/dolibarr'}, {'type': 'WEB', 'url': 'https://github.com/Dolibarr/dolibarr/blob/e76641c491e4105e9cb1ded6149771c621d822b5/ChangeLog#L2933'}, {'type': 'WEB', 'url': 'https://www.wizlynxgr...
{'cwe_ids': ['CWE-269'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T20:18:41Z', 'nvd_published_at': '2020-08-21T19:15:00Z'}
1.4.0
GHSA-hxp8-r9g3-grfr
2022-06-27T14:23:09Z
2022-05-24T17:00:08Z
null
['CVE-2019-7619']
Exposure of Sensitive Information to an Unauthorized Actor in Elasticsearch
Elasticsearch versions 7.0.0-7.3.2 and 6.7.0-6.8.3 contain a username disclosure flaw was found in the API Key service. An unauthenticated attacker could send a specially crafted request and determine if a username exists in the Elasticsearch native realm.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.7.0'}, {'fixed': '6.8.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.8.3'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7619'}, {'type': 'WEB', 'url': 'https://discuss.elastic.co/t/elastic-stack-6-8-4-security-update/204908'}, {'type': 'WEB', 'url': 'https://discuss.elastic.co/t/elastic-stack-7-4-0-security-update/201831'}, {'type': 'PACKAGE', 'url': 'https://github...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-27T14:23:09Z', 'nvd_published_at': '2019-10-30T14:15:00Z'}
1.4.0
GHSA-77h8-xr85-3x5q
2023-01-27T00:52:31Z
2022-05-13T01:36:51Z
null
['CVE-2017-2667']
hammer_cli_foreman Improper Certificate Validation vulnerability
Hammer CLI, a CLI utility for Foreman, before version 0.10.0, did not explicitly set the verify_ssl flag for apipie-bindings that disable it by default. As a result the server certificates are not checked and connections are prone to man-in-the-middle attacks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'hammer_cli_foreman'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-2667'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0336'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1436262'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/h...
{'cwe_ids': ['CWE-295', 'CWE-345'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T00:52:31Z', 'nvd_published_at': '2018-03-12T15:29:00Z'}
1.4.0
GHSA-jf9v-fxfq-wm76
2023-08-29T18:47:53Z
2022-05-17T05:07:19Z
null
['CVE-2013-3300']
Lift Sensitive Information Disclosure
The JsonParser class in json/JsonParser.scala in Lift before 2.5 interprets a certain end-index value as a length value, which allows remote authenticated users to obtain sensitive information from other users' sessions via invalid input data containing a < (less than) character.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'net.liftweb:lift-webkit'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-3300'}, {'type': 'WEB', 'url': 'https://github.com/lift/framework/commit/099d9c86cf6d81f4953957add478ab699946e601'}, {'type': 'PACKAGE', 'url': 'https://github.com/lift/framework'}, {'type': 'WEB', 'url': 'http://blog.addepar.com/2013/07/an-atypica...
{'cwe_ids': ['CWE-119'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T18:47:53Z', 'nvd_published_at': '2013-07-29T13:59:00Z'}
1.4.0
GHSA-4r2p-wpv5-683w
2023-09-28T20:17:09Z
2022-05-13T01:14:27Z
null
['CVE-2019-3808']
Moodle XSS Vulnerability
A flaw was found in Moodle versions 3.6 to 3.6.1, 3.5 to 3.5.3, 3.4 to 3.4.6, 3.1 to 3.1.15 and earlier unsupported versions. The 'manage groups' capability did not have the 'XSS risk' flag assigned to it, but does have that access in certain places. Note that the capability is intended for use by trusted users, and is...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.6.0'}, {'fixed': '3.6.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.6.1'}}, {'package': {'ecosystem': 'Packagist'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3808'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/6360f87cdca744a6a71c315853f6d811a3e54e26'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3808'}, {'type': 'PACKAGE', 'url': 'https://github.com/...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T19:34:12Z', 'nvd_published_at': '2019-03-25T18:29:00Z'}
1.4.0
GHSA-hmjv-px3j-933c
2022-06-27T21:31:46Z
2022-05-24T16:59:30Z
null
['CVE-2019-16530']
Unrestricted Upload of File with Dangerous Type in Sonatype Nexus Repository Manager
Sonatype Nexus Repository Manager 2.x before 2.14.15 and 3.x before 3.19, and IQ Server before 72, has remote code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.sonatype.nexus:nexus-repository'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.14.15'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.sonatype.nexus:nexus-repository'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced':...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16530'}, {'type': 'WEB', 'url': 'https://issues.sonatype.org/secure/ReleaseNote.jspa'}, {'type': 'WEB', 'url': 'https://support.sonatype.com/hc/en-us/articles/360036132453'}]
{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-27T21:31:46Z', 'nvd_published_at': '2019-10-21T14:15:00Z'}
1.4.0
GHSA-p9cv-hrxr-fxx8
2023-09-01T10:29:38Z
2022-05-17T01:59:05Z
null
['CVE-2015-2674']
Restkit Does Not Validate TLS certificates
Restkit allows man-in-the-middle attackers to spoof TLS servers by leveraging use of the `ssl.wrap_socket` function in Python with the default CERT_NONE value for the cert_reqs argument.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'restkit'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-2674'}, {'type': 'WEB', 'url': 'https://github.com/benoitc/restkit/issues/140'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1202837'}, {'type': 'PACKAGE', 'url': 'https://github.com/benoitc/restkit'}, {'type': 'WEB', 'url':...
{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T21:27:58Z', 'nvd_published_at': '2017-08-09T18:29:00Z'}
1.4.0
GHSA-9hg2-395j-83rm
2022-07-01T13:44:41Z
2022-05-13T01:46:13Z
null
['CVE-2017-5651']
Expected Behavior Violation in Apache Tomcat
In Apache Tomcat 9.0.0.M1 to 9.0.0.M18 and 8.5.0 to 8.5.12, the refactoring of the HTTP connectors introduced a regression in the send file processing. If the send file processing completed quickly, it was possible for the Processor to be added to the processor cache twice. This could result in the same Processor being...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0.M1'}, {'fixed': '9.0.0.M19'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.0.0.M18'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'},...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-5651'}, {'type': 'WEB', 'url': 'https://bz.apache.org/bugzilla/show_bug.cgi?id=60918'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E'}, {'type': 'W...
{'cwe_ids': ['CWE-440'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T13:44:41Z', 'nvd_published_at': '2017-04-17T16:59:00Z'}
1.4.0
GHSA-97hp-6q9g-5cw2
2022-06-23T18:05:24Z
2022-05-24T17:32:58Z
null
['CVE-2020-25689']
Uncontrolled Resource Consumption in WildFly
A memory leak flaw was found in WildFly in all versions up to 21.0.0.Final, where host-controller tries to reconnect in a loop, generating new connections which are not properly closed while not able to connect to domain-controller. This flaw allows an attacker to cause an Out of memory (OOM) issue, leading to a denial...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.wildfly:wildfly-dist'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '21.0.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 21.0.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25689'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25689'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20201123-0006/'}]
{'cwe_ids': ['CWE-400', 'CWE-401'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T18:05:24Z', 'nvd_published_at': '2020-11-02T21:15:00Z'}
1.4.0
GHSA-mvmv-rq2j-97p2
2023-07-24T19:54:58Z
2022-05-13T01:53:11Z
null
['CVE-2018-6835']
Etherpad Lite Access Restriction Bypass
`node/hooks/express/apicalls.js` in Etherpad Lite before v1.6.3 mishandles JSONP, which allows remote attackers to bypass intended access restrictions.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'ep_etherpad-lite'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-6835'}, {'type': 'WEB', 'url': 'https://github.com/ether/etherpad-lite/commit/626e58cc5af1db3691b41fca7b06c28ea43141b1'}, {'type': 'WEB', 'url': 'https://github.com/ether/etherpad-lite/releases/tag/1.6.3'}]
{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-24T19:54:58Z', 'nvd_published_at': '2018-02-08T07:29:00Z'}
1.4.0
GHSA-j852-mp82-wv2g
2022-12-20T22:14:55Z
2022-05-24T17:19:04Z
null
['CVE-2020-2191']
Improper permission checks in Jenkins Swarm Plugin
Swarm Plugin adds API endpoints to add or remove agent labels. In Swarm Plugin 3.20 and earlier these only require a global Swarm secret to use, and no regular permission check is performed. This allows users with Agent/Create permission to add or remove labels of any agent. Swarm Plugin 3.21 requires Agent/Configure ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:swarm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.21'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2191'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/swarm-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-06-03/#SECURITY-1200'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/06/03...
{'cwe_ids': ['CWE-285'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T22:14:55Z', 'nvd_published_at': '2020-06-03T13:15:00Z'}
1.4.0
GHSA-wp32-wq34-2rqh
2023-08-28T23:09:37Z
2022-05-14T03:44:34Z
null
['CVE-2018-6561']
dijit editor cross-site scripting vulnerability
dijit.Editor in Dojo Toolkit 1.13 allows XSS via the onload attribute of an SVG element.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'dijit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-6561'}, {'type': 'WEB', 'url': 'https://github.com/dojo/dijit/commit/d22d6cc3458c3c29d2d1fc44652b4bd7f10751f6'}, {'type': 'PACKAGE', 'url': 'https://github.com/dojo/dijit'}, {'type': 'WEB', 'url': 'https://github.com/imsebao/404team/blob/master/dij...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-28T23:09:37Z', 'nvd_published_at': '2018-02-02T15:29:00Z'}
1.4.0
GHSA-6fgf-x7wg-hp8r
2023-08-29T18:25:42Z
2022-05-17T04:49:44Z
null
['CVE-2013-4193']
Plone Unrestricted Filed Manipulation vulnerability via content edit forms
typeswidget.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 does not properly enforce the immutable setting on unspecified content edit forms, which allows remote attackers to hide fields on the forms via a crafted URL.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1'}, {'fixed': '4.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1'}}, {'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'e...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4193'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=978469'}, {'type': 'PACKAGE', 'url': 'https://github.com/plone/Plone'}, {'type': 'WEB', 'url': 'http://plone.org/products/plone-hotfix/releases/20130618'}, {'type': 'WEB', ...
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T18:25:42Z', 'nvd_published_at': '2014-03-11T19:37:00Z'}
1.4.0
GHSA-4pmp-38hf-rmwj
2023-04-14T18:33:38Z
2022-05-17T03:06:07Z
2023-04-14T18:33:38Z
['CVE-2014-3555']
OpenStack Neutron allows remote authenticated users to cause a denial of service
OpenStack Neutron before 2013.2.4, 2014.x before 2014.1.2, and Juno before Juno-2 allows remote authenticated users to cause a denial of service (crash or long firewall rule updates) by creating a large number of allowed address pairs.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'neutron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2013.2.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'neutron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2014.1.0'}, {'fixed': '2014.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3555'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2014:1078'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2014:1119'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2014:1120'}, {'type': 'WEB',...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T19:55:29Z', 'nvd_published_at': '2014-07-23T14:55:00Z'}
1.4.0
GHSA-vj6f-q4w6-qx9p
2022-06-24T00:59:20Z
2022-05-24T17:08:47Z
null
['CVE-2020-2129']
Plaintext Storage of a Password in Jenkins Eagle Tester Plugin
Jenkins Eagle Tester Plugin 1.0.9 and earlier stores a password unencrypted in its global configuration file on the Jenkins master where it can be viewed by users with access to the master file system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.mobileenerlytics.eagle.tester:eagle-tester'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2129'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-02-12/#SECURITY-1552'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/02/12/3'}]
{'cwe_ids': ['CWE-256', 'CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T00:59:20Z', 'nvd_published_at': '2020-02-12T15:15:00Z'}
1.4.0
GHSA-5mfw-p6qv-wgvv
2022-12-21T18:28:51Z
2022-05-24T17:30:18Z
null
['CVE-2020-2293']
Arbitrary file read vulnerability in Jenkins Persona Plugin
Jenkins Persona Plugin 2.4 and earlier allows users with Overall/Read permission to read arbitrary files on the Jenkins controller.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:persona'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2293'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/persona-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-10-08/#SECURITY-2046'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T18:28:51Z', 'nvd_published_at': '2020-10-08T13:15:00Z'}
1.4.0
GHSA-jh69-6vv2-wfp5
2023-07-13T17:10:21Z
2022-05-24T17:09:07Z
null
['CVE-2020-9016']
Dolibarr ERP and CRM contain XSS Vulnerability
Dolibarr 11.0 allows XSS via the joinfiles, topic, or code parameter, or the HTTP Referer header.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '11.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-9016'}, {'type': 'WEB', 'url': 'https://code610.blogspot.com/2020/02/this-time-i-tried-to-check-one-of.html'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201203085334/https://therealcoiffeur.github.io/c10001'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T17:10:21Z', 'nvd_published_at': '2020-02-16T22:15:00Z'}
1.4.0
GHSA-2632-h32j-6rg9
2022-06-28T23:43:04Z
2022-05-13T01:50:55Z
null
['CVE-2018-1999043']
Missing Release of Resource after Effective Lifetime in Jenkins
A denial of service vulnerability exists in Jenkins 2.137 and earlier, 2.121.2 and earlier in BasicAuthenticationFilter.java, BasicHeaderApiTokenAuthenticator.java that allows attackers to create ephemeral in-memory user records by attempting to log in using invalid credentials.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.121.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.122'},...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1999043'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-08-15/#SECURITY-672'}]
{'cwe_ids': ['CWE-772'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T23:43:04Z', 'nvd_published_at': '2018-08-23T18:29:00Z'}
1.4.0
GHSA-jvgm-pfqv-887x
2023-06-23T21:46:31Z
2022-05-14T00:57:16Z
null
['CVE-2016-7954']
Bundler allows attacker to inject arbitrary code via secondary Gem source
Bundler 1.x might allow remote attackers to inject arbitrary Ruby code into an application by leveraging a gem name collision on a secondary source. NOTE: this might overlap CVE-2013-0334.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'bundler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '2.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-7954'}, {'type': 'WEB', 'url': 'https://github.com/bundler/bundler/issues/5051'}, {'type': 'WEB', 'url': 'https://github.com/bundler/bundler/issues/5062'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1381951'}, {'type': 'WEB...
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-23T21:46:31Z', 'nvd_published_at': '2016-12-22T22:59:00Z'}
1.4.0
GHSA-jgpr-qrw2-6gp3
2022-11-02T00:40:32Z
2022-05-14T03:58:16Z
null
['CVE-2016-0790']
Exposure of Sensitive Information in Jenkins Core
Jenkins before 1.650 and LTS before 1.642.2 do not use a constant-time algorithm to verify API tokens, which makes it easier for remote attackers to determine API tokens via a brute-force approach.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.650'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-0790'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:0711'}, {'type': 'WEB', 'url': 'https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-02-24'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHS...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-02T00:40:32Z', 'nvd_published_at': '2016-04-07T23:59:00Z'}
1.4.0
GHSA-6gj2-5366-p95v
2023-08-28T22:27:16Z
2022-05-13T01:20:50Z
null
['CVE-2018-8381']
ChakraCore RCE Vulnerability
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8266, CVE-2018-8380, CVE-2018-8384.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8381'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/5596'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/1b77d559416116f9719febb7dee3354150277588'}, {'type': 'WEB', 'url': 'https://github.com/c...
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-28T22:27:16Z', 'nvd_published_at': '2018-08-15T17:29:00Z'}
1.4.0
GHSA-jwf8-mjj8-r8hq
2023-09-20T19:21:02Z
2022-05-17T19:57:15Z
null
['CVE-2014-5011']
DOMPDF Information Disclosure
DOMPDF before 0.6.2 allows Information Disclosure.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'dompdf/dompdf'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-5011'}, {'type': 'WEB', 'url': 'https://github.com/dompdf/dompdf/commit/cc06008f75262510ee135b8cbb14e333a309f651'}, {'type': 'WEB', 'url': 'https://github.com/dompdf/dompdf/compare/v0.6.1...v0.6.2'}, {'type': 'WEB', 'url': 'https://github.com/dompd...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-07T20:33:47Z', 'nvd_published_at': '2020-01-10T06:15:00Z'}
1.4.0
GHSA-r8rw-xx57-m64q
2022-06-29T15:02:39Z
2022-05-14T01:06:45Z
null
['CVE-2019-1003010']
Cross-Site Request Forgery in Jenkins Git Plugin
A cross-site request forgery vulnerability exists in Jenkins Git Plugin 3.9.1 and earlier in src/main/java/hudson/plugins/git/GitTagAction.java that allows attackers to create a Git tag in a workspace and attach corresponding metadata to a build record.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:git'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.9.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1003010'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:0326'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:0327'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-01-28/#SECURITY-1095'...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T15:02:39Z', 'nvd_published_at': '2019-02-06T16:29:00Z'}
1.4.0
GHSA-7pfc-cx3m-v22x
2022-05-23T19:37:17Z
2022-05-03T00:00:46Z
null
['CVE-2022-21149']
SCart is vulnerable to cross-site scripting (XSS)
SCart e-commerce is a free open source for businesses, built on the Laravel framework. The package s-cart/s-cart before 6.9 and the package s-cart/core before 6.9 are vulnerable to cross-site Scripting (XSS) which can lead to cookie stealing of any victim that visits the affected URL. An attacker can gain unauthorized ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 's-cart/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.9'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 's-cart/s-cart'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21149'}, {'type': 'PACKAGE', 'url': 'https://github.com/s-cart/core'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PHP-SCARTCORE-2389036'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PHP-SCARTSCART-2389035'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-23T19:37:17Z', 'nvd_published_at': '2022-05-01T16:15:00Z'}
1.4.0
GHSA-58xm-mxjf-254g
2022-12-16T20:19:52Z
2022-05-24T19:19:44Z
null
['CVE-2021-21685']
Multiple vulnerabilities allow bypassing path filtering of agent-to-controller access control in Jenkins
The agent-to-controller security subsystem limits which files on the Jenkins controller can be accessed by agent processes. Multiple vulnerabilities in the file path filtering implementation of Jenkins 2.318 and earlier, LTS 2.303.2 and earlier allow agent processes to read and write arbitrary files on the Jenkins con...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.303.3'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.303.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-cor...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21685'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-11-04/#SECURITY-2455'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/11/04...
{'cwe_ids': ['CWE-862'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T06:49:18Z', 'nvd_published_at': '2021-11-04T17:15:00Z'}
1.4.0
GHSA-f3fp-gc8g-vw66
2023-03-27T22:23:50Z
2022-05-24T17:36:56Z
null
['CVE-2022-29162']
Default inheritable capabilities for linux container should be empty
### Impact A bug was found in runc where `runc exec --cap` executed processes with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during execve(2). This bug did not aff...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/opencontainers/runc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/security/advisories/GHSA-f3fp-gc8g-vw66'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29162'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/commit/d04de3a9b72d7a2455c1885fc75eb36d02cd17b5'}, {'type': 'WEB', 'ur...
{'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T17:36:56Z', 'nvd_published_at': '2022-05-17T21:15:00Z'}
1.4.0
GHSA-rp4p-g69r-438x
2022-07-08T19:18:09Z
2022-05-13T01:02:38Z
null
['CVE-2013-4152']
Cross-Site Request Forgery in Spring Framework
The Spring OXM wrapper in Spring Framework before 3.2.4 and 4.0.0.M1, when using the JAXB marshaller, does not disable entity resolution, which allows context-dependent attackers to read arbitrary files, cause a denial of service, and conduct CSRF attacks via an XML external entity declaration in conjunction with an en...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-oxm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.4.RELEASE'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.3.RELEASE'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4152'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-framework/pull/317/files'}, {'type': 'WEB', 'url': 'https://jira.springsource.org/browse/SPR-10806'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0212.html...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T19:18:09Z', 'nvd_published_at': '2014-01-23T21:55:00Z'}
1.4.0
GHSA-cw58-gpgw-hwx2
2023-08-09T20:14:15Z
2022-05-24T17:07:14Z
null
['CVE-2020-7940']
Plone allows weak passwords
Missing password strength checks on some forms in Plone 4.3 through 5.2.0 allow users to set weak passwords, leading to easier cracking.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3'}, {'fixed': '4.3.20'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type':...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7940'}, {'type': 'PACKAGE', 'url': 'https://github.com/plone/Plone'}, {'type': 'WEB', 'url': 'https://plone.org/security/hotfix/20200121'}, {'type': 'WEB', 'url': 'https://plone.org/security/hotfix/20200121/password-strength-checks-were-not-always-...
{'cwe_ids': ['CWE-521'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T23:58:09Z', 'nvd_published_at': '2020-01-23T21:15:00Z'}
1.4.0
GHSA-6xqj-wvgp-rqp8
2022-12-22T03:34:18Z
2022-05-24T17:33:08Z
null
['CVE-2020-2310']
Missing permission checks in Jenkins Ansible Plugin allow enumerating credentials IDs
Ansible Plugin 1.0 and earlier does not perform permission checks in methods implementing form validation. This allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. Those can be used as part of an attack to capture the credentials using another vulnerability. An...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2310'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ansible-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-11-04/#SECURITY-1943'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T03:34:18Z', 'nvd_published_at': '2020-11-04T15:15:00Z'}
1.4.0
GHSA-xqqw-cqjp-52xm
2023-02-23T19:40:09Z
2022-05-24T16:56:45Z
null
['CVE-2019-10410']
Jenkins Log Parser Plugin vulnerable to Cross-site Scripting
Log Parser Plugin did not escape an error message shown when log parsing patterns are invalid. This resulted in a persisted cross-site scripting vulnerability exploitable by attackers able to control the log parsing rules configuration, typically users with Job/Configure permission. Jenkins applies the missing escapin...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:log-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10410'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/log-parser-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-09-25/#SECURITY-732'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-23T19:40:09Z', 'nvd_published_at': '2019-09-25T16:15:00Z'}
1.4.0
GHSA-fxwr-2vxm-cg7p
2023-02-08T17:59:29Z
2022-05-17T03:29:51Z
null
['CVE-2016-0738']
OpenStack Object Storage (Swift) allows remote attackers to cause a denial of service
OpenStack Object Storage (Swift) before 2.3.1 (Kilo), 2.4.x, and 2.5.x before 2.5.1 (Liberty) do not properly close server connections, which allows remote attackers to cause a denial of service (proxy-server resource consumption) via a series of interrupted requests to a Large Object URL.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'swift'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'swift'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.5.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-0738'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:0126'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:0127'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:0128'}, {'type': 'WEB',...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T17:59:29Z', 'nvd_published_at': '2016-01-29T20:59:00Z'}
1.4.0
GHSA-jqmr-wqgp-8mh2
2023-08-16T23:00:32Z
2022-05-17T03:20:58Z
null
['CVE-2014-4986']
phpMyAdmin cross-site scripting Vulnerability in Table or Column Names
Multiple cross-site scripting (XSS) vulnerabilities in js/functions.js in phpMyAdmin 4.0.x before 4.0.10.1, 4.1.x before 4.1.14.2, and 4.2.x before 4.2.6 allow remote authenticated users to inject arbitrary web script or HTML via a crafted (1) table name or (2) column name that is improperly handled during construction...
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.10.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ecosystem_specific': {'a...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-4986'}, {'type': 'WEB', 'url': 'https://github.com/phpmyadmin/phpmyadmin/commit/29a1f56495a7d1d98da31a614f23c0819a606a4d'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201505-03'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20...
{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T23:00:32Z', 'nvd_published_at': '2014-07-20T11:12:00Z'}
1.4.0
GHSA-jjm6-4vf7-cjh4
2022-05-24T22:11:56Z
2022-05-24T22:11:56Z
null
['CVE-2022-29203']
Integer overflow in `SpaceToBatchND`
### Impact The implementation of `tf.raw_ops.SpaceToBatchND` (in all backends such as XLA and handwritten kernels) is vulnerable to an integer overflow: ```python import tensorflow as tf input = tf.constant(-3.5e+35, shape=[10,19,22], dtype=tf.float32) block_shape = tf.constant(-1879048192, shape=[2], dtype=tf.int64)...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jjm6-4vf7-cjh4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29203'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/acd56b8bcb72b163c834ae4f18469047b001fadf'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-190'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:11:56Z', 'nvd_published_at': '2022-05-20T23:15:00Z'}
1.4.0
GHSA-fjq5-5j5f-mvxh
2022-11-03T22:57:31Z
2022-05-13T01:25:20Z
null
['CVE-2015-7501']
Deserialization of Untrusted Data in Apache commons collections
It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'commons-collections:commons-collections'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.commons:commons-collections4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7501'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/vulnerabilities/2059393'}, {'type': 'WEB', 'url': 'https://access.redhat.com/solutions/2045023'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1279330'}, {'ty...
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T22:57:31Z', 'nvd_published_at': '2017-11-09T17:29:00Z'}
1.4.0
GHSA-2q65-xxg6-3qh5
2022-11-22T18:57:24Z
2022-05-13T01:47:04Z
null
['CVE-2017-7682']
Apache OpenMeetings vulnerable to parameter manipulation attacks
Apache OpenMeetings 3.2.0 is vulnerable to parameter manipulation attacks, as a result attacker has access to restricted areas.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.openmeetings:openmeetings-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7682'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/openmeetings'}, {'type': 'WEB', 'url': 'http://markmail.org/message/dbrbvf5k343ulivf'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T18:57:24Z', 'nvd_published_at': '2017-07-17T13:18:00Z'}
1.4.0
GHSA-rf6q-vx79-mjxr
2023-02-07T23:22:22Z
2022-05-25T00:00:22Z
null
['CVE-2021-3629']
Undertow Uncontrolled Resource Consumption
A flaw was found in Undertow. A potential security issue in flow control handling by the browser over HTTP/2 may potentially cause overhead or a denial of service in the server. The highest threat from this vulnerability is availability. This flaw affects Undertow versions prior to 2.0.40.Final and prior to 2.2.11.Fina...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.40.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.39.Final'}}, {'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3629'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1977362'}, {'type': 'PACKAGE', 'url': 'https://github.com/undertow-io'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220729-0008/'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T22:41:25Z', 'nvd_published_at': '2022-05-24T19:15:00Z'}
1.4.0
GHSA-4f7h-9j2x-cmr4
2022-07-13T18:27:31Z
2022-05-14T01:17:03Z
null
['CVE-2011-5062']
Improper Authentication in Apache Tomcat
The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 does not check qop values, which might allow remote attackers to bypass intended integrity-protection requirements via a qop=auth value, a different vulnerability than CVE-2011-1184.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.5.0'}, {'fixed': '5.5.34'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-5062'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'htt...
{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T18:27:31Z', 'nvd_published_at': '2012-01-14T21:55:00Z'}
1.4.0
GHSA-qqfc-m9hc-pqv3
2022-06-29T23:25:35Z
2022-05-13T01:33:29Z
null
['CVE-2018-1131']
Deserialization of Untrusted Data in Infinispan
Infinispan permits improper deserialization of trusted data via XML and JSON transcoders under certain server configurations. A user with authenticated access to the server could send a malicious object to a cache configured to accept certain types of objects, achieving code execution and possible further attacks. Vers...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.infinispan:infinispan-core'}, 'versions': ['8.2.10.Final']}, {'package': {'ecosystem': 'Maven', 'name': 'org.infinispan:infinispan-core'}, 'versions': ['9.0.3.Final']}, {'package': {'ecosystem': 'Maven', 'name': 'org.infinispan:infinispan-core'}, 'versions': ['9.1.7.Fina...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1131'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1833'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3892'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1576492'}, {'type': 'P...
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T23:25:35Z', 'nvd_published_at': '2018-05-15T13:29:00Z'}
1.4.0
GHSA-5m4q-x28v-q6wp
2022-12-02T20:49:07Z
2022-05-18T00:00:41Z
null
['CVE-2022-30954']
Missing permission check in Jenkins Blue Ocean Plugin
Jenkins Blue Ocean Plugin 1.25.3 and earlier does not perform a permission check in several HTTP endpoints, allowing attackers with Overall/Read permission to connect to an attacker-specified HTTP server. Blue Ocean Plugin 1.25.4 requires POST requests and the appropriate permissions for the affected HTTP endpoints.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.blueocean:blueocean-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.25.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30954'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/blueocean-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2502'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2...
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-02T14:56:08Z', 'nvd_published_at': '2022-05-17T15:15:00Z'}