schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 8 154 | details stringlengths 31 19.1k | severity stringlengths 2 92 | affected stringlengths 75 28.5k | references stringlengths 79 7.48k | database_specific stringlengths 131 196 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-qf38-f2fr-q4x9 | 2022-06-28T23:27:48Z | 2022-05-13T01:01:02Z | null | ['CVE-2018-1999002'] | Improper Input Validation in Jenkins | A arbitrary file read vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in the Stapler web framework's org/kohsuke/stapler/Stapler.java that allows attackers to send crafted HTTP requests returning the contents of any file on the Jenkins master file system that the Jenkins master has access to. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.121.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.122'},... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1999002'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-07-18/#SECURITY-914'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/46453/'}, {'type': '... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T23:27:48Z', 'nvd_published_at': '2018-07-23T19:29:00Z'} |
1.4.0 | GHSA-8h53-fjgg-g42g | 2022-07-07T23:14:07Z | 2022-05-13T01:12:18Z | null | ['CVE-2013-7397'] | Insufficient Verification of Data Authenticity in Async Http Client | Async Http Client (aka AHC or async-http-client) before 1.9.0 skips X.509 certificate verification unless both a keyStore location and a trustStore location are explicitly set, which allows man-in-the-middle attackers to spoof HTTPS servers by presenting an arbitrary certificate during use of a typical AHC configuratio... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'com.ning:async-http-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7397'}, {'type': 'WEB', 'url': 'https://github.com/AsyncHttpClient/async-http-client/issues/352'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E... | {'cwe_ids': ['CWE-345'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T23:14:07Z', 'nvd_published_at': '2015-06-24T16:59:00Z'} |
1.4.0 | GHSA-7fc2-rm35-2pp7 | 2022-06-03T15:42:47Z | 2022-05-17T00:35:13Z | null | ['CVE-2015-5607'] | IPython vulnerable to cross site request forgery (CSRF) | IPython (Interactive Python) is a command shell. Cross-site request forgery in the REST API is possible in in IPython 2 and 3. Versions 2.4.1 and 3.2.3 contain patches. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ipython'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.12'}, {'fixed': '2.4.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ipython'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5607'}, {'type': 'WEB', 'url': 'https://github.com/ipython/ipython/commit/1415a9710407e7c14900531813c15ba6165f0816'}, {'type': 'WEB', 'url': 'https://github.com/ipython/ipython/commit/a05fe052a18810e92d9be8c1185952c13fe4e5b0'}, {'type': 'WEB', 'url... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T15:42:47Z', 'nvd_published_at': '2017-09-20T16:29:00Z'} |
1.4.0 | GHSA-4rgh-jx4f-qfcq | 2022-08-04T21:05:04Z | 2022-05-24T17:37:16Z | null | ['CVE-2020-35669'] | http before 0.13.3 vulnerable to header injection | An issue was discovered in the http package before 0.13.3 for Dart. If the attacker controls the HTTP method and the app is using Request directly, it's possible to achieve CRLF injection in an HTTP request via HTTP header injection. This issue has been addressed in commit abb2bb182 by validating request methods. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Pub', 'name': 'http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35669'}, {'type': 'WEB', 'url': 'https://github.com/dart-lang/http/issues/511'}, {'type': 'WEB', 'url': 'https://github.com/dart-lang/http/pull/512'}, {'type': 'WEB', 'url': 'https://github.com/dart-lang/http/commit/abb2bb182fbd7f03aafd1f889b902d7b... | {'cwe_ids': ['CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-04T21:05:04Z', 'nvd_published_at': '2020-12-24T03:15:00Z'} |
1.4.0 | GHSA-f5x2-xv93-4p23 | 2022-06-24T01:24:06Z | 2022-05-24T17:27:24Z | null | ['CVE-2020-1911'] | Access of Resource Using Incompatible Type in Facebook Hermes | A type confusion vulnerability when resolving properties of JavaScript objects with specially-crafted prototype chains in Facebook Hermes prior to commit fe52854cdf6725c2eaa9e125995da76e6ceb27da allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the appl... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'hermes-engine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.4.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1911'}, {'type': 'WEB', 'url': 'https://github.com/facebook/hermes/commit/fe52854cdf6725c2eaa9e125995da76e6ceb27da'}, {'type': 'WEB', 'url': 'https://www.facebook.com/security/advisories/cve-2020-1911'}] | {'cwe_ids': ['CWE-843'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T01:24:06Z', 'nvd_published_at': '2020-09-04T03:15:00Z'} |
1.4.0 | GHSA-742j-jcfr-23w3 | 2022-06-29T14:08:39Z | 2022-05-13T01:01:01Z | null | ['CVE-2019-1003049'] | Insufficient Session Expiration in Jenkins | Users who cached their CLI authentication before Jenkins was updated to 2.150.2 and newer, or 2.160 and newer, would remain authenticated in Jenkins 2.171 and earlier and Jenkins LTS 2.164.1 and earlier, because the fix for CVE-2019-1003004 in these releases did not reject existing remoting-based CLI authentication cac... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.164.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.164.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1003049'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenkins/commit/0eeaa087aac192fb39f52928be5a5bbf16627ea6'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:1605'}, {'type': 'PACKAGE', 'url': 'https://github.com/jen... | {'cwe_ids': ['CWE-613'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T14:08:39Z', 'nvd_published_at': '2019-04-10T21:29:00Z'} |
1.4.0 | GHSA-wjjr-h4wh-w6vv | 2022-11-08T15:00:08Z | 2022-05-02T03:22:35Z | null | ['CVE-2009-1190'] | Spring Framework Inefficient Regular Expression Complexity | Algorithmic complexity vulnerability in the java.util.regex.Pattern.compile method in Sun Java Development Kit (JDK) before 1.6, when used with spring.jar in SpringSource Spring Framework 1.1.0 through 2.5.6 and 3.0.0.M1 through 3.0.0.M2 and dm Server 1.0.0 through 1.0.2, allows remote attackers to cause a denial of se... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '3.0.0.RELEASE'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.5.6'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-1190'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=497161'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/50083'}, {'type': 'WEB', 'url': 'http://www.packetstormsecurity.org/hitb06/DAY_1_-_Ma... | {'cwe_ids': ['CWE-1333'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-08T15:00:08Z', 'nvd_published_at': '2009-04-27T22:30:00Z'} |
1.4.0 | GHSA-wm4w-8vc6-2j4h | 2023-09-28T19:54:48Z | 2022-05-13T01:05:20Z | null | ['CVE-2019-3810'] | Moodle XSS Vulnerability | A flaw was found in moodle versions 3.6 to 3.6.1, 3.5 to 3.5.3, 3.4 to 3.4.6, 3.1 to 3.1.15 and earlier unsupported versions. The /userpix/ page did not escape users' full names, which are included as text when hovering over profile images. Note this page is not linked to by default and its access is restricted. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.6.0'}, {'fixed': '3.6.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions':... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3810'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3810'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=381230#p1536767'}, {'typ... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T22:45:20Z', 'nvd_published_at': '2019-03-25T18:29:00Z'} |
1.4.0 | GHSA-435g-r2m8-gjvm | 2022-11-04T18:44:24Z | 2022-05-14T03:15:57Z | null | ['CVE-2018-11651'] | Cross-site Scripting in Graylog | Graylog before v2.4.4 has an XSS security issue with unescaped text in dashboard names, related to components/dashboard/Dashboard.jsx, components/dashboard/EditDashboardModal.jsx, and pages/ShowDashboardPage.jsx. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.graylog2:graylog2-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11651'}, {'type': 'WEB', 'url': 'https://github.com/Graylog2/graylog2-server/pull/4739'}, {'type': 'PACKAGE', 'url': 'https://github.com/Graylog2/graylog2-server'}, {'type': 'WEB', 'url': 'https://www.graylog.org/post/announcing-graylog-v2-4-4'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-04T18:44:24Z', 'nvd_published_at': '2018-06-01T14:29:00Z'} |
1.4.0 | GHSA-8wch-9gcg-v2pr | 2022-06-17T22:10:05Z | 2022-05-02T03:39:48Z | null | ['CVE-2009-2902'] | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Apache Tomcat | Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to delete work-directory files via directory traversal sequences in a WAR filename, as demonstrated by the ...war filename. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.5.0'}, {'fixed': '5.5.29'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.5.28'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-2902'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/55857'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E'}, {'t... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T22:10:05Z', 'nvd_published_at': '2010-01-28T20:30:00Z'} |
1.4.0 | GHSA-67f9-qmg7-fmcq | 2023-07-20T22:36:27Z | 2022-05-13T01:18:35Z | null | ['CVE-2018-0874'] | ChakraCore RCE Vulnerability | ChakraCore and Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the Chakra scripting engine handles objects in memory, aka "Chakra Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0872, CVE-2018-08... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-0874'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/7087c314a67631a0a3094bc2f741991ee10f5b5a'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0874'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T22:36:27Z', 'nvd_published_at': '2018-03-14T17:29:00Z'} |
1.4.0 | GHSA-f7p4-fmmh-4p8x | 2023-07-31T19:12:45Z | 2022-05-14T02:23:11Z | null | ['CVE-2016-3390'] | ChakraCore RCE Vulnerability | The scripting engines in Microsoft Internet Explorer 11 and Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, as demonstrated by the Chakra JavaScript engine, aka "Scripting Engine Memory Corruption Vulnerability." | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3390'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/1737'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/f05c42e64c3b2d057ae1a52fe1917af26c9f2737'}, {'type': 'WEB', 'url': 'https://docs.microso... | {'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T19:12:45Z', 'nvd_published_at': '2016-10-14T02:59:00Z'} |
1.4.0 | GHSA-7gxq-5qqc-v3fc | 2023-08-28T23:52:28Z | 2022-05-17T05:08:47Z | null | ['CVE-2013-1843'] | TYPO3 Open redirect vulnerability in the Access tracking mechanism | Open redirect vulnerability in the Access tracking mechanism in TYPO3 4.5.x before 4.5.24, 4.6.x before 4.6.17, 4.7.x before 4.7.9, and 6.0.x before 6.0.3 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.5.0'}, {'fixed': '4.5.24'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ecosystem_specific': {'affected_function... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1843'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3-CMS/core'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2013-03/msg00079.html'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/52433'}, {'type': 'WEB', 'url... | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-28T23:52:28Z', 'nvd_published_at': '2013-03-20T15:55:00Z'} |
1.4.0 | GHSA-c45w-p293-7cv6 | 2023-09-25T19:16:13Z | 2022-05-24T16:52:28Z | null | ['CVE-2019-7945'] | Magento 2 Community Edition XSS Vulnerability | A stored cross-cite scripting vulnerability exists in Magento Open Source prior to 1.9.4.2, and Magento Commerce prior to 1.14.4.2, Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. An authenticated user with privileges to modify currency symbols can inject malicious javascript. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7945'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051916/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-23'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-14T23:14:51Z', 'nvd_published_at': '2019-08-02T22:15:00Z'} |
1.4.0 | GHSA-27mh-3343-6hg5 | 2023-07-12T20:40:16Z | 2022-05-24T17:37:27Z | null | ['CVE-2020-29244'] | dhowden tag panic due to out-of-bounds read | Due to improper bounds checking, a number of methods in dhowden tag before 0.0.0-20201120070457-d52dcb253c63 can trigger a panic due to attempted out-of-bounds reads. If the package is used to parse user supplied input, this may be used as a vector for a denial of service attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/dhowden/tag'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20201120070457-d52dcb253c63'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-29244'}, {'type': 'WEB', 'url': 'https://github.com/dhowden/tag/issues/79'}, {'type': 'WEB', 'url': 'https://github.com/dhowden/tag/commit/4b595ed4fac79f467594aa92f8953f90f817116e'}, {'type': 'WEB', 'url': 'https://github.com/dhowden/tag/commit/6b1... | {'cwe_ids': ['CWE-129'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-07T22:40:44Z', 'nvd_published_at': '2020-12-28T08:15:00Z'} |
1.4.0 | GHSA-hrp6-w4v2-8737 | 2023-03-27T16:14:33Z | 2022-05-17T05:05:40Z | null | ['CVE-2012-2671'] | Rack-Cache caches sensitive headers | The Rack::Cache rubygem 0.3.0 through 1.1 caches Set-Cookie and other sensitive headers, which allows attackers to obtain sensitive cookie information, hijack web sessions, or have other unspecified impact by accessing the cache. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rack-cache'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.0'}, {'fixed': '1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-2671'}, {'type': 'WEB', 'url': 'https://github.com/rtomayko/rack-cache/pull/52'}, {'type': 'WEB', 'url': 'https://github.com/rtomayko/rack-cache/commit/2e3a64d07daac4c757cc57620f2288e865a09b90'}, {'type': 'WEB', 'url': 'https://bugzilla.novell.com/... | {'cwe_ids': ['CWE-525'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-27T16:14:33Z', 'nvd_published_at': '2012-06-17T03:41:00Z'} |
1.4.0 | GHSA-vcwx-8mqh-2557 | 2023-08-04T21:52:41Z | 2022-05-17T00:14:14Z | null | ['CVE-2017-17054'] | Aubio Divide-By-Zero DoS vulnerability in new_aubio_source_wavread function | In aubio 0.4.6, a divide-by-zero error exists in the function `new_aubio_source_wavread()` in source_wavread.c, which may lead to DoS when playing a crafted audio file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'aubio'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-17054'}, {'type': 'WEB', 'url': 'https://github.com/aubio/aubio/issues/148'}, {'type': 'WEB', 'url': 'https://github.com/aubio/aubio/commit/25ecb7338cebc5b8c79092347839c78349ec33f1'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/cgi-bin/bugrepor... | {'cwe_ids': ['CWE-369'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-04T21:52:41Z', 'nvd_published_at': '2017-11-29T07:29:00Z'} |
1.4.0 | GHSA-3x58-8qmv-wqw5 | 2023-08-04T21:51:56Z | 2022-05-13T01:49:58Z | null | ['CVE-2018-14523'] | Aubio is vulnerable to out of bound read when samplerate > 50kHz | An issue was discovered in aubio 0.4.6. A buffer over-read can occur in `new_aubio_pitchyinfft` in `pitch/pitchyinfft.c` when the samplerate of the input file is larger than 50kHz. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'aubio'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14523'}, {'type': 'WEB', 'url': 'https://github.com/aubio/aubio/issues/189'}, {'type': 'WEB', 'url': 'https://github.com/aubio/aubio/commit/af4f9e6a93b629fb6defa2a229ec828885b9d187'}, {'type': 'PACKAGE', 'url': 'https://github.com/aubio/aubio'}, {'... | {'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-04T21:51:56Z', 'nvd_published_at': '2018-07-23T08:29:00Z'} |
1.4.0 | GHSA-qxrx-m6v6-m767 | 2022-12-29T01:44:14Z | 2022-05-24T17:28:26Z | null | ['CVE-2020-2266'] | Stored XSS vulnerability in Description Column Plugin | Jenkins Description Column Plugin 1.3 and earlier does not escape the job description in the column tooltip, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:description-column-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2266'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/description-column-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1916'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-se... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-29T01:44:14Z', 'nvd_published_at': '2020-09-16T14:15:00Z'} |
1.4.0 | GHSA-4wr9-2xc6-jmg5 | 2022-12-16T15:20:37Z | 2022-05-24T19:06:36Z | null | ['CVE-2021-21671'] | Session fixation vulnerability in Jenkins | Jenkins 2.299 and earlier, LTS 2.289.1 and earlier does not invalidate the existing session on login. This allows attackers to use social engineering techniques to gain administrator access to Jenkins.
This vulnerability was introduced in Jenkins 2.266 and LTS 2.277.1.
Jenkins 2.300, LTS 2.289.2 invalidates the exist... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.292'}, {'fixed': '2.300'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.299'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21671'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-06-30/#SECURITY-2371'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/06/30... | {'cwe_ids': ['CWE-384'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-16T15:20:37Z', 'nvd_published_at': '2021-06-30T17:15:00Z'} |
1.4.0 | GHSA-qrj4-rmqg-4hcp | 2023-09-22T21:07:18Z | 2022-05-01T18:41:17Z | null | ['CVE-2007-6286'] | Apache Tomcat Does Not Properly Handle Empty Requests | Apache Tomcat 5.5.11 through 5.5.25 and 6.0.0 through 6.0.15, when the native APR connector is used, does not properly handle an empty request to the SSL port, which allows remote attackers to trigger handling of "a duplicate copy of one of the recent requests," as demonstrated by using netcat to send the empty request... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.5.11'}, {'last_affected': '5.5.25'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-6286'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-22T21:07:18Z', 'nvd_published_at': '2008-02-12T01:00:00Z'} |
1.4.0 | GHSA-68p4-pjpf-xwcq | 2023-06-13T20:09:07Z | 2022-05-24T17:41:47Z | null | ['CVE-2021-26954'] | insert_slice_clone can double drop if Clone panics. | Affected versions of this crate used ptr::copy when inserting into the middle of a Vec. When ownership was temporarily duplicated during this copy, it calls the clone method of a user provided element.
This issue can result in an element being double-freed if the clone call panics.
Commit `20cb73d` fixed this issue b... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'qwutils'}, 'ecosystem_specific': {'affected_functions': ['qwutils::imp::vec::VecExt::insert_slice_clone']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26954'}, {'type': 'WEB', 'url': 'https://github.com/qwertz19281/rust_utils/issues/3'}, {'type': 'WEB', 'url': 'https://github.com/qwertz19281/rust_utils/commit/20cb73d'}, {'type': 'PACKAGE', 'url': 'https://github.com/qwertz19281/rust_utils'}, {'ty... | {'cwe_ids': ['CWE-415'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:14:33Z', 'nvd_published_at': '2021-02-09T23:15:00Z'} |
1.4.0 | GHSA-fg44-w3fr-hgxv | 2022-11-08T12:31:33Z | 2022-05-14T01:30:10Z | null | ['CVE-2018-8031'] | Apache TomEE console vulnerable to Cross-site Scripting | The Apache TomEE console (tomee-webapp) has a XSS vulnerability which could allow javascript to be executed if the user is given a malicious URL. This web application is typically used to add TomEE features to a Tomcat installation. The TomEE bundles do not ship with this application included. This issue can be mitigat... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomee:tomee-webapp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8031'}, {'type': 'WEB', 'url': 'https://github.com/apache/tomee/commit/b8bbf50c23ce97dd64f3a5d77f78f84e47579863'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomee'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/c4b0d83a5... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-08T12:31:33Z', 'nvd_published_at': '2018-07-23T22:29:00Z'} |
1.4.0 | GHSA-xphj-m9cc-8fmq | 2022-07-06T19:46:12Z | 2022-05-13T01:25:19Z | null | ['CVE-2016-6814'] | Deserialization of Untrusted Data in Groovy | When an application with unsupported Codehaus versions of Groovy from 1.7.0 to 2.4.3, Apache Groovy 2.4.4 to 2.4.7 on classpath uses standard Java serialization mechanisms, e.g. to communicate between servers or to store local data, it was possible for an attacker to bake a special serialized object that will execute c... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.codehaus.groovy:groovy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '2.4.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.4.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6814'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:0868'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2486'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2596'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:46:12Z', 'nvd_published_at': '2018-01-18T18:29:00Z'} |
1.4.0 | GHSA-rr33-j5p5-ppf8 | 2022-05-18T19:10:33Z | 2022-05-03T00:00:44Z | null | ['CVE-2021-40822'] | GeoServer allows SSRF via the option for setting a proxy host | GeoServer through 2.18.5 and 2.19.x through 2.19.2 allows SSRF via the option for setting a proxy host. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.geoserver:gs-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.18.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.geoserver:gs-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.19.0'}, {'last_affect... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40822'}, {'type': 'PACKAGE', 'url': 'https://github.com/geoserver/geoserver'}, {'type': 'WEB', 'url': 'https://github.com/geoserver/geoserver/compare/2.19.2...2.19.3'}, {'type': 'WEB', 'url': 'https://github.com/geoserver/geoserver/releases'}, {'ty... | {'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-18T19:10:33Z', 'nvd_published_at': '2022-05-02T00:15:00Z'} |
1.4.0 | GHSA-3hxw-g85p-qgxm | 2023-08-24T13:03:25Z | 2022-05-24T16:45:24Z | null | ['CVE-2019-11830'] | PharStreamWrapper for Typo3 unsafe deserialization vulnerability | PharMetaDataInterceptor in the PharStreamWrapper (aka phar-stream-wrapper) package 2.x before 2.1.1 and 3.x before 3.1.1 for TYPO3 mishandles Phar stub parsing, which allows attackers to bypass a deserialization protection mechanism. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'typo3/phar-stream-wrapper'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.1.0'}}, {'package': {'ecosystem':... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11830'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3/phar-stream-wrapper'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/phar-stream-wrapper/releases/tag/v2.1.1'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/phar-stream-wrapper/re... | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-14T20:50:23Z', 'nvd_published_at': '2019-05-09T04:29:00Z'} |
1.4.0 | GHSA-hq2h-9mc3-h6w2 | 2022-12-29T01:34:09Z | 2022-05-24T17:28:25Z | null | ['CVE-2020-2256'] | Stored XSS vulnerability in Pipeline Maven Integration Plugin via unescaped display name | Pipeline Maven Integration Plugin 3.9.2 and earlier does not escape the upstream job’s display name shown as part of a build cause.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
Pipeline Maven Integration Plugin 3.9.3 escapes upstream job nam... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:pipeline-maven'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.9.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2256'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/pipeline-maven-plugin/'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1976'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secur... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-29T01:34:09Z', 'nvd_published_at': '2020-09-16T14:15:00Z'} |
1.4.0 | GHSA-qj2w-mw2r-pv39 | 2023-03-10T02:36:47Z | 2022-05-14T01:01:12Z | null | ['CVE-2018-1000074'] | RubyGems Deserialization of Untrusted Data vulnerability | RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Deserialization of Untrusted Data vulnerability in owner command that can result in code execution. This attack requir... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rubygems-update'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jruby:jruby-stdlib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.1.16.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000074'}, {'type': 'WEB', 'url': 'https://github.com/jruby/jruby/commit/0b06b48ab4432237ce5fc1bef47f2c6bcf7843f7'}, {'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems/commit/254e3d0ee873c008c0b74e8b8abcbdab4caa0a6d'}, {'type': 'WEB', 'ur... | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-10T02:36:47Z', 'nvd_published_at': '2018-03-13T15:29:00Z'} |
1.4.0 | GHSA-3cwm-7jmm-774w | 2022-07-07T23:11:39Z | 2022-05-05T00:29:41Z | null | ['CVE-2013-7489'] | Deserialization of Untrusted Data in Beaker | The Beaker library through 1.11.0 for Python is affected by deserialization of untrusted data, which could lead to arbitrary code execution. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'Beaker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.11.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7489'}, {'type': 'WEB', 'url': 'https://github.com/bbangert/beaker/issues/191'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1850105'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3cwm-7jmm-774w'}, {'type... | {'cwe_ids': ['CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T23:11:39Z', 'nvd_published_at': '2020-06-26T20:15:00Z'} |
1.4.0 | GHSA-7m8v-w6f9-q2f9 | 2022-11-03T19:12:53Z | 2022-05-14T01:38:17Z | null | ['CVE-2018-1000415'] | Cross-site Scripting in Jenkins Rebuilder Plugin | A cross-site scripting vulnerability exists in Jenkins Rebuilder Plugin 1.28 and earlier in
```
RebuildAction/BooleanParameterValue.jelly,
RebuildAction/ExtendedChoiceParameterValue.jelly,
RebuildAction/FileParameterValue.jelly,
RebuildAction/LabelParameterValue.jelly,
RebuildAction/ListSubversionTagsParameter... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.sonyericsson.hudson.plugins.rebuild:rebuild'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.29'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000415'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-09-25/#SECURITY-130'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/106532'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T19:12:53Z', 'nvd_published_at': '2019-01-09T23:29:00Z'} |
1.4.0 | GHSA-wcj4-ff9m-5r7g | 2023-08-16T23:13:10Z | 2022-05-17T04:12:03Z | null | ['CVE-2014-1836'] | ImpressCMS Path Traversal to Arbitrary File Delete | Absolute path traversal vulnerability in `htdocs/libraries/image-editor/image-edit.php` in ImpressCMS before 1.3.6 allows remote attackers to delete arbitrary files via a full pathname in the `image_path` parameter in a cancel action. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'impresscms/impresscms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-1836'}, {'type': 'WEB', 'url': 'https://github.com/ImpressCMS/impresscms/issues/914'}, {'type': 'WEB', 'url': 'https://github.com/pedrib/PoC/blob/master/generic/impresscms-1.3.5.txt'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228234... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T23:13:10Z', 'nvd_published_at': '2015-07-01T14:59:00Z'} |
1.4.0 | GHSA-vc74-c4m6-9979 | 2023-08-28T23:35:27Z | 2022-05-17T01:29:43Z | null | ['CVE-2013-7082'] | TYPO3 Flow Cross-site scripting (XSS) vulnerability | Cross-site scripting (XSS) vulnerability in the errorAction method in the ActionController base class in TYPO3 Flow (formerly FLOW3) 1.1.x before 1.1.1 and 2.0.x before 2.0.1 allows remote attackers to inject arbitrary web script or HTML via unspecified input, which is returned in an error message. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'typo3/flow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1'}, {'fixed': '1.1.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/flow'}, 'ecosystem_specific': {'affected_functions': ['']}, ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7082'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/89614'}, {'type': 'WEB', 'url': 'http://osvdb.org/100825'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/55996'}, {'type': 'WEB', 'url': 'http://typo3.org... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-28T23:35:27Z', 'nvd_published_at': '2013-12-21T00:55:00Z'} |
1.4.0 | GHSA-w2g4-g8xr-px4x | 2023-07-07T17:26:31Z | 2022-05-14T01:42:49Z | null | ['CVE-2018-18921'] | CSRF in PHP Server Monitor before 3.3.2 | PHP Server Monitor before 3.3.2 has CSRF, as demonstrated by a Delete action. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpservermon/phpservermon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-18921'}, {'type': 'WEB', 'url': 'https://github.com/phpservermon/phpservermon/issues/670#issuecomment-440873239'}, {'type': 'WEB', 'url': 'https://github.com/phpservermon/phpservermon/commit/30150714a8af0c82259b733f604fce54c0dcbf40'}, {'type': 'WEB... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T17:26:31Z', 'nvd_published_at': '2018-12-18T22:29:00Z'} |
1.4.0 | GHSA-86p9-x5pw-94qx | 2022-06-30T19:51:56Z | 2022-05-13T01:14:24Z | null | ['CVE-2017-9096'] | Improper Restriction of XML External Entity Reference in iText | The XML parsers in iText before 5.5.12 and 7.x before 7.0.3 do not disable external entities, which might allow remote attackers to conduct XML external entity (XXE) attacks via a crafted PDF. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.itextpdf:itextpdf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.5.12'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.itextpdf:itextpdf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.3'}]}]}... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-9096'}, {'type': 'WEB', 'url': 'https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03902en_us'}, {'type': 'WEB', 'url': 'https://www.compass-security.com/fileadmin/Datein/Research/Advisories/CSNC-2017-017_itext_xml_... | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-30T19:51:56Z', 'nvd_published_at': '2017-11-08T16:29:00Z'} |
1.4.0 | GHSA-5jrq-582v-9767 | 2022-05-25T19:38:05Z | 2022-05-09T00:00:51Z | null | ['CVE-2018-25033'] | Out-of-bounds read in admesh | ADMesh through 0.98.4 has a heap-based buffer over-read in stl_update_connects_remove_1 (called from stl_remove_degenerate) in connect.c in libadmesh.a. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'admesh'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.98.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25033'}, {'type': 'WEB', 'url': 'https://github.com/admesh/admesh/issues/28'}, {'type': 'PACKAGE', 'url': 'https://github.com/admesh/admesh'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5jrq-582v-9767'}, {'type': 'WEB', 'url': ... | {'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T19:38:05Z', 'nvd_published_at': '2022-05-08T06:15:00Z'} |
1.4.0 | GHSA-9f37-ggxm-h6wx | 2022-12-16T22:26:38Z | 2022-05-24T17:35:08Z | null | ['CVE-2020-2321'] | CSRF vulnerability in Jenkins Shelve Project Plugin | Shelve Project Plugin 3.0 and earlier does not require POST requests for HTTP endpoints, resulting in cross-site request forgery (CSRF) vulnerabilities.
These vulnerabilities allow attackers to shelve, unshelve, or delete a project.
Shelve Project Plugin 3.1 requires POST requests for the affected HTTP endpoints. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:shelve-project-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2321'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/shelve-project-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-12-03/#SECURITY-2108'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-securi... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-16T22:26:38Z', 'nvd_published_at': '2020-12-03T16:15:00Z'} |
1.4.0 | GHSA-2vvr-5757-qp87 | 2022-12-16T15:19:45Z | 2022-05-24T19:06:35Z | null | ['CVE-2021-21673'] | Open redirect vulnerability in Jenkins CAS Plugin | CAS Plugin 1.6.0 and earlier improperly determines that a redirect URL after login is legitimately pointing to Jenkins.
This allows attackers to perform phishing attacks by having users go to a Jenkins URL that will forward them to a different site after successful authentication.
CAS Plugin 1.6.1 only redirects to r... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:cas-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.6.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21673'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/cas-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-06-30/#SECURITY-2387'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/06... | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-16T15:19:45Z', 'nvd_published_at': '2021-06-30T17:15:00Z'} |
1.4.0 | GHSA-8jfm-rgmg-3wq2 | 2022-11-22T18:47:52Z | 2022-05-14T01:09:51Z | null | ['CVE-2016-5005'] | Apache Archiva vulnerable to Cross-site Scripting | Cross-site scripting (XSS) vulnerability in Apache Archiva prior to version 2.2.1 allows remote authenticated administrators to inject arbitrary web script or HTML via the connector.sourceRepoId parameter to admin/addProxyConnector_commit.action. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.archiva:archiva'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-5005'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/archiva'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E'}, {'type': 'WEB', 'url':... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T18:47:52Z', 'nvd_published_at': '2016-07-28T16:59:00Z'} |
1.4.0 | GHSA-59w8-4wm2-4xw8 | 2023-08-29T22:31:03Z | 2022-05-17T05:12:01Z | null | ['CVE-2012-3443'] | Django Image Field Vulnerable to Image Decompression Bombs | The `django.forms.ImageField` class in the form system in Django before 1.3.2 and 1.4.x before 1.4.1 completely decompresses image data during image validation, which allows remote attackers to cause a denial of service (memory consumption) by uploading an image file. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-3443'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/9ca0ff6268eeff92d0d0ac2c315d4b6a8e229155'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/da33d67181b53fe6cc737ac1220153814a1509f6'}, {'type': 'PACKAGE', 'url... | {'cwe_ids': ['CWE-20', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T22:31:03Z', 'nvd_published_at': '2012-07-31T17:55:00Z'} |
1.4.0 | GHSA-6wfj-2mw7-p5cg | 2023-08-15T22:10:33Z | 2022-05-14T02:09:44Z | null | ['CVE-2014-6300'] | phpMyAdmin micro history Implementation XSS Vulnerability | Cross-site scripting (XSS) vulnerability in the micro history implementation in phpMyAdmin 4.0.x before 4.0.10.3, 4.1.x before 4.1.14.4, and 4.2.x before 4.2.8.1 allows remote attackers to inject arbitrary web script or HTML, and consequently conduct a cross-site request forgery (CSRF) attack to create a root account, ... | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.10.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ecosystem_specific': {'a... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-6300'}, {'type': 'WEB', 'url': 'https://github.com/phpmyadmin/phpmyadmin/commit/33b39f9f1dd9a4d27856530e5ac004e23b30e8ac'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201505-03'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-15T22:10:33Z', 'nvd_published_at': '2014-11-08T11:55:00Z'} |
1.4.0 | GHSA-4jhm-5f7g-75fp | 2022-06-30T15:47:25Z | 2022-05-13T01:48:39Z | null | ['CVE-2018-1000863'] | Improper Limitation of a Pathname to a Restricted Directory in Jenkins | A data modification vulnerability exists in Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in User.java, IdStrategy.java that allows attackers to submit crafted user names that can cause an improper migration of user record storage formats, potentially preventing the victim from logging into Jenkins. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.138.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.138.3'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000863'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:0024'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-12-05/#SECURITY-1072'}, {'ty... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-30T15:47:25Z', 'nvd_published_at': '2018-12-10T14:29:00Z'} |
1.4.0 | GHSA-29rm-6752-gvwv | 2022-11-03T19:11:53Z | 2022-05-13T01:26:13Z | null | ['CVE-2017-9791'] | Code execution in Apache Struts 1 plugin | The Struts 1 plugin used with Apache Struts 2.1.x and 2.3.x might allow remote code execution via a malicious field value passed in a raw message to the ActionMessage. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-struts1-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.37'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-9791'}, {'type': 'WEB', 'url': 'https://github.com/apache/struts/commit/ffe0e20edd9d5386f4410fddd970286a69373243'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20180706-0002/'}, {'type': 'WEB', 'url': 'https://www.exploit-db.c... | {'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T19:11:53Z', 'nvd_published_at': '2017-07-10T16:29:00Z'} |
1.4.0 | GHSA-7w53-hfpw-rg3g | 2023-08-28T23:40:22Z | 2022-05-17T01:36:49Z | null | ['CVE-2013-1397'] | Symfony Arbitrary PHP code Execution | Symfony 2.0.x before 2.0.22, 2.1.x before 2.1.7, and 2.2.x remote attackers to execute arbitrary PHP code via a serialized PHP object to the (1) Yaml::parse or (2) Yaml\Parser::parse function, a different vulnerability than CVE-2013-1348. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0'}, {'fixed': '2.0.22'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ecosystem_specific': {'affected_function... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1397'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/81551'}, {'type': 'PACKAGE', 'url': 'https://github.com/symfony/symfony'}, {'type': 'WEB', 'url': 'http://secunia.com/advisories/51980'}, {'type': 'WEB', 'url': 'h... | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-28T23:40:22Z', 'nvd_published_at': '2014-06-02T15:55:00Z'} |
1.4.0 | GHSA-2p7x-jcr3-7p2c | 2022-07-13T19:02:12Z | 2022-05-13T01:09:22Z | null | ['CVE-2012-0803'] | Improper Authentication in Apache CXF | The WS-SP UsernameToken policy in Apache CXF 2.4.5 and 2.5.1 allows remote attackers to bypass authentication by sending an empty UsernameToken as part of a SOAP request. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.4.5'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf'}, 'ranges': [{'type': 'E... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-0803'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/cxf'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'ht... | {'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T19:02:12Z', 'nvd_published_at': '2017-08-08T21:29:00Z'} |
1.4.0 | GHSA-8hfm-837h-hjg5 | 2022-11-08T14:55:27Z | 2022-05-02T03:13:38Z | null | ['CVE-2009-0217'] | Apache XML Security For Java vulnerable to authentication bypass by HMAC truncation | The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in multiple products.
The Apache XML Security (Java) is affected by the vulnerability published in US-Cert VU #466161. See: http://www.kb.cert.org/vuls/id/466161 for more information. This bug can allow an attacker to by... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.santuario:xmlsec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-0217'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=511915'}, {'type': 'WEB', 'url': 'https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-041'}, {'type': 'WEB', 'url': 'https://gitlab.gnome.org/Arch... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-08T14:55:27Z', 'nvd_published_at': '2009-07-14T23:30:00Z'} |
1.4.0 | GHSA-4xh9-5vh8-3p58 | 2023-07-27T21:12:39Z | 2022-05-17T02:46:54Z | null | ['CVE-2017-7271'] | Yii Framework Reflected XSS | Reflected Cross-site scripting (XSS) vulnerability in Yii Framework before 2.0.11, when development mode is used, allows remote attackers to inject arbitrary web script or HTML via crafted request data that is mishandled on the debug-mode exception screen. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'yiisoft/yii2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7271'}, {'type': 'WEB', 'url': 'https://github.com/yiisoft/yii2/pull/13401'}, {'type': 'WEB', 'url': 'https://github.com/yiisoft/yii2/commit/97171a0db7cda0a49931ee0c3b998ef50bd06756'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210125191... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-27T21:12:39Z', 'nvd_published_at': '2017-03-27T17:59:00Z'} |
1.4.0 | GHSA-882r-r8fw-p538 | 2022-05-26T18:54:26Z | 2022-05-13T01:31:35Z | null | ['CVE-2019-1003015'] | XXE vulnerability in Jenkins Job Import Plugin | An XML external entity (XXE) processing vulnerability exists in Jenkins Job Import Plugin 2.1 and earlier in src/main/java/org/jenkins/ci/plugins/jobimport/client/RestApiClient.java that allows attackers with the ability to control the HTTP server (Jenkins) queried in preparation of job import to read arbitrary files, ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:job-import-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1003015'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/job-import-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-01-28/#SECURITY-905%20(1)'}] | {'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-05-26T18:54:26Z', 'nvd_published_at': '2019-02-06T16:29:00Z'} |
1.4.0 | GHSA-594h-cx6w-p4jf | 2023-08-16T22:27:30Z | 2022-05-14T04:01:58Z | null | ['CVE-2014-3941'] | Typo3 Host Header Spoofing Vulnerability | TYPO3 4.5.0 before 4.5.34, 4.7.0 before 4.7.19, 6.0.0 before 6.0.14, 6.1.0 before 6.1.9, and 6.2.0 before 6.2.3 allows remote attackers to have unspecified impact via a crafted HTTP Host header, related to "Host Spoofing." | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.5.0'}, {'fixed': '4.5.34'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.5.33'}}, {'package': {'ecosystem': 'Packagist', ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3941'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00028.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-06/msg00037.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T22:27:30Z', 'nvd_published_at': '2014-06-03T14:55:00Z'} |
1.4.0 | GHSA-692x-89xv-64jx | 2023-09-26T19:49:50Z | 2022-05-24T17:01:48Z | null | ['CVE-2019-19013'] | Pagekit File Upload vulnerability | A CSRF vulnerability in Pagekit 1.0.17 allows an attacker to upload an arbitrary file by removing the CSRF token from a request. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pagekit/pagekit'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.17'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19013'}, {'type': 'PACKAGE', 'url': 'https://github.com/pagekit/pagekit'}, {'type': 'WEB', 'url': 'https://gitlab.com/gitlab-org/security-products/gemnasium-db/-/commit/fdf885ccf7c57c69f4d256bbb3ec76a927267a2b'}, {'type': 'WEB', 'url': 'https://pac... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T22:17:25Z', 'nvd_published_at': '2019-11-22T16:15:00Z'} |
1.4.0 | GHSA-6793-gmp9-2535 | 2023-01-05T21:39:10Z | 2022-05-24T17:08:47Z | null | ['CVE-2020-2128'] | Password stored in plain text by ECX Copy Data Management Plugin | Jenkins ECX Copy Data Management Plugin 1.9 and earlier stores a password unencrypted in job config.xml files on the Jenkins master where it can be viewed by users with Extended Read permission, or access to the master file system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.catalogic.ecxjenkins:catalogic-ecx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2128'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/catalogic-ecx-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-02-12/#SECURITY-1549'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/20... | {'cwe_ids': ['CWE-256'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-05T21:39:10Z', 'nvd_published_at': '2020-02-12T15:15:00Z'} |
1.4.0 | GHSA-7qwv-cwgj-c8rj | 2022-06-07T23:11:14Z | 2022-05-01T06:50:42Z | null | ['CVE-2006-1547'] | Improper Input Validation in Apache Struts | ActionForm in Apache Software Foundation (ASF) Struts before 1.2.9 with BeanUtils 1.7 allows remote attackers to cause a denial of service via a multipart/form-data encoded form with a parameter name that references the public getMultipartRequestHandler method, which provides further access to elements in the CommonsMu... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'struts:struts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2006-1547'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/25613'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/struts'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-07T23:11:14Z', 'nvd_published_at': '2006-03-30T22:02:00Z'} |
1.4.0 | GHSA-92mr-v722-f48m | 2022-07-06T20:09:00Z | 2022-05-17T03:25:49Z | null | ['CVE-2015-7337'] | Improper Input Validation in Jupyter Notebook | The editor in IPython Notebook before 3.2.2 and Jupyter Notebook 4.0.x before 4.0.5 allows remote attackers to execute arbitrary JavaScript code via a crafted file, which triggers a redirect to files/, related to MIME types. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'notebook'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.0.4'}}, {'package': {'ecosystem': 'PyPI', 'name': 'ipython'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7337'}, {'type': 'WEB', 'url': 'https://github.com/ipython/ipython/commit/0a8096adf165e2465550bd5893d7e352544e5967'}, {'type': 'WEB', 'url': 'https://github.com/jupyter/notebook/commit/9e63dd89b603dfbe3a7e774d8a962ee0fa30c0b5'}, {'type': 'WEB', 'ur... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:09:00Z', 'nvd_published_at': '2015-09-29T19:59:00Z'} |
1.4.0 | GHSA-8hwr-589g-xpj2 | 2023-02-23T20:32:28Z | 2022-05-24T16:56:46Z | null | ['CVE-2019-10415'] | Jenkins Violation Comments to GitLab Plugin has Insufficiently Protected Credentials | Violation Comments to GitLab Plugin stored API tokens unencrypted in job `config.xml` files and its global configuration file `org.jenkinsci.plugins.jvctgl.ViolationsToGitLabGlobalConfiguration.xml` on the Jenkins controller. These credentials could be viewed by users with Extended Read permission, or access to the Jen... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:violation-comments-to-gitlab'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.29'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10415'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-09-25/#SECURITY-1577'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/09/25/3'}] | {'cwe_ids': ['CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-23T20:32:28Z', 'nvd_published_at': '2019-09-25T16:15:00Z'} |
1.4.0 | GHSA-xg75-68x3-7p3q | 2022-11-03T22:48:20Z | 2022-05-17T02:16:00Z | null | ['CVE-2016-4465'] | Possible DoS attack when using URLValidator | The URLValidator class in Apache Struts 2 2.3.20 through 2.3.28.1 and 2.5.x before 2.5.1 allows remote attackers to cause a denial of service via a null value for a URL field. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.20'}, {'fixed': '2.3.29'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'},... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-4465'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1348253'}, {'type': 'WEB', 'url': 'https://struts.apache.org/docs/s2-041.html'}, {'type': 'WEB', 'url': 'http://jvn.jp/en/jp/JVN12352818/index.html'}, {'type': 'WEB', 'url'... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T22:48:20Z', 'nvd_published_at': '2016-07-04T22:59:00Z'} |
1.4.0 | GHSA-7f2f-crxg-cpfv | 2023-07-25T21:02:47Z | 2022-05-14T03:38:59Z | null | ['CVE-2018-7302'] | Tiki Wiki CMS XSS Vulnerability | Tiki 17.1 allows upload of a .PNG file that actually has SVG content, leading to XSS. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'tikiwiki/tiki-manager'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '17.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-7302'}, {'type': 'PACKAGE', 'url': 'https://github.com/TikiWiki/tiki-manager'}, {'type': 'WEB', 'url': 'https://websecnerd.blogspot.in/2018/01/tiki-wiki-cms-groupware-17.html'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T21:02:47Z', 'nvd_published_at': '2018-02-21T20:29:00Z'} |
1.4.0 | GHSA-g897-cgfc-7q8v | 2023-01-23T14:33:19Z | 2022-05-17T04:55:27Z | null | ['CVE-2013-7222'] | Fat Free CRM has fixed token value | `config/initializers/secret_token.rb` in Fat Free CRM before 0.12.1 has a fixed `FatFreeCRM::Application.config.secret_token` value, which makes it easier for remote attackers to spoof signed cookies by referring to the key in the source code. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'fat_free_crm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7222'}, {'type': 'WEB', 'url': 'https://github.com/fatfreecrm/fat_free_crm/issues/300'}, {'type': 'WEB', 'url': 'https://github.com/fatfreecrm/fat_free_crm/commit/93c182dd4c6f3620b721d2a15ba6a6ecab5669df'}, {'type': 'PACKAGE', 'url': 'https://githu... | {'cwe_ids': ['CWE-330'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-23T14:33:19Z', 'nvd_published_at': '2014-01-02T14:59:00Z'} |
1.4.0 | GHSA-vq7j-6pcq-f48p | 2022-12-29T01:30:01Z | 2022-05-24T17:28:24Z | null | ['CVE-2020-2254'] | Path traversal vulnerability in Blue Ocean Plugin | Blue Ocean Plugin 1.23.2 and earlier provides an undocumented feature flag, `blueocean.features.GIT_READ_SAVE_TYPE`, that when set to the value `clone` allows an attacker with Item/Configure or Item/Create permission to read arbitrary files on the Jenkins controller file system.
Blue Ocean Plugin 1.23.3 no longer incl... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.blueocean:blueocean'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.23.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.23.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2254'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/blueocean-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1956'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/20... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-29T01:30:01Z', 'nvd_published_at': '2020-09-16T14:15:00Z'} |
1.4.0 | GHSA-cfmr-38g9-f2h7 | 2023-08-16T21:51:21Z | 2022-05-14T02:05:20Z | null | ['CVE-2014-3589'] | Pillow denial of service via Crafted Block Size | `PIL/IcnsImagePlugin.py` in Python Imaging Library (PIL) and Pillow before 2.3.2 and 2.5.x before 2.5.2 allows remote attackers to cause a denial of service via a crafted block size. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'pillow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'pillow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5'}, {'fixed': '2.5.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3589'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/205e056f8f9b06ed7b925cf8aa0874bc4aaf8a7d'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/5efeed77666bfd17708f3434b1d2daa9db1e1335'}, {'type': '... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T21:51:21Z', 'nvd_published_at': '2014-08-25T14:55:00Z'} |
1.4.0 | GHSA-r5w3-pfq8-3r82 | 2022-12-15T16:35:03Z | 2022-05-24T19:12:37Z | null | ['CVE-2021-21678'] | Jenkins SAML Plugin allows bypassing CSRF protection for any URL | An extension point in Jenkins allows selectively disabling cross-site request forgery (CSRF) protection for specific URLs. SAML Plugin implements this extension point for the URL that users are redirected to after login.
In SAML Plugin 2.0.7 and earlier this implementation is too permissive, allowing attackers to craf... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:saml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.7'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21678'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/saml-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-08-31/#SECURITY-2469'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/0... | {'cwe_ids': ['CWE-693'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T16:35:03Z', 'nvd_published_at': '2021-08-31T14:15:00Z'} |
1.4.0 | GHSA-j788-fx57-99wp | 2022-06-17T21:55:58Z | 2022-05-02T03:18:14Z | null | ['CVE-2009-0781'] | Cross-site scripting in Apache Tomcat | Cross-site scripting (XSS) vulnerability in jsp/cal/cal2.jsp in the calendar application in the examples web application in Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 allows remote attackers to inject arbitrary web script or HTML via the time parameter, related to "invalid HTML." | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'last_affected': '4.1.39'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.5.0'}, {'la... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-0781'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2009:1164'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2009:1562'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2009-0781'}, {'type': '... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:55:58Z', 'nvd_published_at': '2009-03-09T21:30:00Z'} |
1.4.0 | GHSA-pw2f-m22m-p75c | 2023-08-01T23:41:02Z | 2022-05-24T16:52:26Z | null | ['CVE-2019-7909'] | Magento 2 Community Edition Cross-site Scripting Vulnerability | A stored cross-site scripting vulnerability exists in the admin panel of Magento Open Source prior to 1.9.4.2, and Magento Commerce prior to 1.14.4.2, Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This could be exploited by an authenticated user with privileges to email templates. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7909'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051916/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-23'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T23:41:02Z', 'nvd_published_at': '2019-08-02T22:15:00Z'} |
1.4.0 | GHSA-25h3-mw3p-w8r7 | 2023-08-22T14:34:53Z | 2022-05-24T17:26:18Z | null | ['CVE-2020-14201'] | Dolibarr CRM allows Privilege Escalation | Dolibarr CRM before 11.0.5 allows privilege escalation. This could allow remote authenticated attackers to upload arbitrary files via societe/document.php in which "disabled" is changed to "enabled" in the HTML source code. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.0.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14201'}, {'type': 'PACKAGE', 'url': 'https://github.com/Dolibarr/dolibarr'}, {'type': 'WEB', 'url': 'https://github.com/Dolibarr/dolibarr/blob/e76641c491e4105e9cb1ded6149771c621d822b5/ChangeLog#L2933'}, {'type': 'WEB', 'url': 'https://www.wizlynxgr... | {'cwe_ids': ['CWE-269'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T20:18:41Z', 'nvd_published_at': '2020-08-21T19:15:00Z'} |
1.4.0 | GHSA-hxp8-r9g3-grfr | 2022-06-27T14:23:09Z | 2022-05-24T17:00:08Z | null | ['CVE-2019-7619'] | Exposure of Sensitive Information to an Unauthorized Actor in Elasticsearch | Elasticsearch versions 7.0.0-7.3.2 and 6.7.0-6.8.3 contain a username disclosure flaw was found in the API Key service. An unauthenticated attacker could send a specially crafted request and determine if a username exists in the Elasticsearch native realm. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.7.0'}, {'fixed': '6.8.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.8.3'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7619'}, {'type': 'WEB', 'url': 'https://discuss.elastic.co/t/elastic-stack-6-8-4-security-update/204908'}, {'type': 'WEB', 'url': 'https://discuss.elastic.co/t/elastic-stack-7-4-0-security-update/201831'}, {'type': 'PACKAGE', 'url': 'https://github... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-27T14:23:09Z', 'nvd_published_at': '2019-10-30T14:15:00Z'} |
1.4.0 | GHSA-77h8-xr85-3x5q | 2023-01-27T00:52:31Z | 2022-05-13T01:36:51Z | null | ['CVE-2017-2667'] | hammer_cli_foreman Improper Certificate Validation vulnerability | Hammer CLI, a CLI utility for Foreman, before version 0.10.0, did not explicitly set the verify_ssl flag for apipie-bindings that disable it by default. As a result the server certificates are not checked and connections are prone to man-in-the-middle attacks. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'hammer_cli_foreman'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-2667'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0336'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1436262'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/h... | {'cwe_ids': ['CWE-295', 'CWE-345'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T00:52:31Z', 'nvd_published_at': '2018-03-12T15:29:00Z'} |
1.4.0 | GHSA-jf9v-fxfq-wm76 | 2023-08-29T18:47:53Z | 2022-05-17T05:07:19Z | null | ['CVE-2013-3300'] | Lift Sensitive Information Disclosure | The JsonParser class in json/JsonParser.scala in Lift before 2.5 interprets a certain end-index value as a length value, which allows remote authenticated users to obtain sensitive information from other users' sessions via invalid input data containing a < (less than) character. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'net.liftweb:lift-webkit'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-3300'}, {'type': 'WEB', 'url': 'https://github.com/lift/framework/commit/099d9c86cf6d81f4953957add478ab699946e601'}, {'type': 'PACKAGE', 'url': 'https://github.com/lift/framework'}, {'type': 'WEB', 'url': 'http://blog.addepar.com/2013/07/an-atypica... | {'cwe_ids': ['CWE-119'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T18:47:53Z', 'nvd_published_at': '2013-07-29T13:59:00Z'} |
1.4.0 | GHSA-4r2p-wpv5-683w | 2023-09-28T20:17:09Z | 2022-05-13T01:14:27Z | null | ['CVE-2019-3808'] | Moodle XSS Vulnerability | A flaw was found in Moodle versions 3.6 to 3.6.1, 3.5 to 3.5.3, 3.4 to 3.4.6, 3.1 to 3.1.15 and earlier unsupported versions. The 'manage groups' capability did not have the 'XSS risk' flag assigned to it, but does have that access in certain places. Note that the capability is intended for use by trusted users, and is... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.6.0'}, {'fixed': '3.6.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.6.1'}}, {'package': {'ecosystem': 'Packagist'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3808'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/6360f87cdca744a6a71c315853f6d811a3e54e26'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3808'}, {'type': 'PACKAGE', 'url': 'https://github.com/... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T19:34:12Z', 'nvd_published_at': '2019-03-25T18:29:00Z'} |
1.4.0 | GHSA-hmjv-px3j-933c | 2022-06-27T21:31:46Z | 2022-05-24T16:59:30Z | null | ['CVE-2019-16530'] | Unrestricted Upload of File with Dangerous Type in Sonatype Nexus Repository Manager | Sonatype Nexus Repository Manager 2.x before 2.14.15 and 3.x before 3.19, and IQ Server before 72, has remote code execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.sonatype.nexus:nexus-repository'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.14.15'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.sonatype.nexus:nexus-repository'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced':... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16530'}, {'type': 'WEB', 'url': 'https://issues.sonatype.org/secure/ReleaseNote.jspa'}, {'type': 'WEB', 'url': 'https://support.sonatype.com/hc/en-us/articles/360036132453'}] | {'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-27T21:31:46Z', 'nvd_published_at': '2019-10-21T14:15:00Z'} |
1.4.0 | GHSA-p9cv-hrxr-fxx8 | 2023-09-01T10:29:38Z | 2022-05-17T01:59:05Z | null | ['CVE-2015-2674'] | Restkit Does Not Validate TLS certificates | Restkit allows man-in-the-middle attackers to spoof TLS servers by leveraging use of the `ssl.wrap_socket` function in Python with the default CERT_NONE value for the cert_reqs argument. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'restkit'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-2674'}, {'type': 'WEB', 'url': 'https://github.com/benoitc/restkit/issues/140'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1202837'}, {'type': 'PACKAGE', 'url': 'https://github.com/benoitc/restkit'}, {'type': 'WEB', 'url':... | {'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T21:27:58Z', 'nvd_published_at': '2017-08-09T18:29:00Z'} |
1.4.0 | GHSA-9hg2-395j-83rm | 2022-07-01T13:44:41Z | 2022-05-13T01:46:13Z | null | ['CVE-2017-5651'] | Expected Behavior Violation in Apache Tomcat | In Apache Tomcat 9.0.0.M1 to 9.0.0.M18 and 8.5.0 to 8.5.12, the refactoring of the HTTP connectors introduced a regression in the send file processing. If the send file processing completed quickly, it was possible for the Processor to be added to the processor cache twice. This could result in the same Processor being... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0.M1'}, {'fixed': '9.0.0.M19'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.0.0.M18'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'},... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-5651'}, {'type': 'WEB', 'url': 'https://bz.apache.org/bugzilla/show_bug.cgi?id=60918'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E'}, {'type': 'W... | {'cwe_ids': ['CWE-440'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T13:44:41Z', 'nvd_published_at': '2017-04-17T16:59:00Z'} |
1.4.0 | GHSA-97hp-6q9g-5cw2 | 2022-06-23T18:05:24Z | 2022-05-24T17:32:58Z | null | ['CVE-2020-25689'] | Uncontrolled Resource Consumption in WildFly | A memory leak flaw was found in WildFly in all versions up to 21.0.0.Final, where host-controller tries to reconnect in a loop, generating new connections which are not properly closed while not able to connect to domain-controller. This flaw allows an attacker to cause an Out of memory (OOM) issue, leading to a denial... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.wildfly:wildfly-dist'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '21.0.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 21.0.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25689'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25689'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20201123-0006/'}] | {'cwe_ids': ['CWE-400', 'CWE-401'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T18:05:24Z', 'nvd_published_at': '2020-11-02T21:15:00Z'} |
1.4.0 | GHSA-mvmv-rq2j-97p2 | 2023-07-24T19:54:58Z | 2022-05-13T01:53:11Z | null | ['CVE-2018-6835'] | Etherpad Lite Access Restriction Bypass | `node/hooks/express/apicalls.js` in Etherpad Lite before v1.6.3 mishandles JSONP, which allows remote attackers to bypass intended access restrictions. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'ep_etherpad-lite'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-6835'}, {'type': 'WEB', 'url': 'https://github.com/ether/etherpad-lite/commit/626e58cc5af1db3691b41fca7b06c28ea43141b1'}, {'type': 'WEB', 'url': 'https://github.com/ether/etherpad-lite/releases/tag/1.6.3'}] | {'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-24T19:54:58Z', 'nvd_published_at': '2018-02-08T07:29:00Z'} |
1.4.0 | GHSA-j852-mp82-wv2g | 2022-12-20T22:14:55Z | 2022-05-24T17:19:04Z | null | ['CVE-2020-2191'] | Improper permission checks in Jenkins Swarm Plugin | Swarm Plugin adds API endpoints to add or remove agent labels. In Swarm Plugin 3.20 and earlier these only require a global Swarm secret to use, and no regular permission check is performed. This allows users with Agent/Create permission to add or remove labels of any agent.
Swarm Plugin 3.21 requires Agent/Configure ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:swarm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.21'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2191'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/swarm-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-06-03/#SECURITY-1200'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/06/03... | {'cwe_ids': ['CWE-285'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T22:14:55Z', 'nvd_published_at': '2020-06-03T13:15:00Z'} |
1.4.0 | GHSA-wp32-wq34-2rqh | 2023-08-28T23:09:37Z | 2022-05-14T03:44:34Z | null | ['CVE-2018-6561'] | dijit editor cross-site scripting vulnerability | dijit.Editor in Dojo Toolkit 1.13 allows XSS via the onload attribute of an SVG element. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'dijit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-6561'}, {'type': 'WEB', 'url': 'https://github.com/dojo/dijit/commit/d22d6cc3458c3c29d2d1fc44652b4bd7f10751f6'}, {'type': 'PACKAGE', 'url': 'https://github.com/dojo/dijit'}, {'type': 'WEB', 'url': 'https://github.com/imsebao/404team/blob/master/dij... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-28T23:09:37Z', 'nvd_published_at': '2018-02-02T15:29:00Z'} |
1.4.0 | GHSA-6fgf-x7wg-hp8r | 2023-08-29T18:25:42Z | 2022-05-17T04:49:44Z | null | ['CVE-2013-4193'] | Plone Unrestricted Filed Manipulation vulnerability via content edit forms | typeswidget.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 does not properly enforce the immutable setting on unspecified content edit forms, which allows remote attackers to hide fields on the forms via a crafted URL. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1'}, {'fixed': '4.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1'}}, {'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'e... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4193'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=978469'}, {'type': 'PACKAGE', 'url': 'https://github.com/plone/Plone'}, {'type': 'WEB', 'url': 'http://plone.org/products/plone-hotfix/releases/20130618'}, {'type': 'WEB', ... | {'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T18:25:42Z', 'nvd_published_at': '2014-03-11T19:37:00Z'} |
1.4.0 | GHSA-4pmp-38hf-rmwj | 2023-04-14T18:33:38Z | 2022-05-17T03:06:07Z | 2023-04-14T18:33:38Z | ['CVE-2014-3555'] | OpenStack Neutron allows remote authenticated users to cause a denial of service | OpenStack Neutron before 2013.2.4, 2014.x before 2014.1.2, and Juno before Juno-2 allows remote authenticated users to cause a denial of service (crash or long firewall rule updates) by creating a large number of allowed address pairs. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'neutron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2013.2.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'neutron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2014.1.0'}, {'fixed': '2014.1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3555'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2014:1078'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2014:1119'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2014:1120'}, {'type': 'WEB',... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T19:55:29Z', 'nvd_published_at': '2014-07-23T14:55:00Z'} |
1.4.0 | GHSA-vj6f-q4w6-qx9p | 2022-06-24T00:59:20Z | 2022-05-24T17:08:47Z | null | ['CVE-2020-2129'] | Plaintext Storage of a Password in Jenkins Eagle Tester Plugin | Jenkins Eagle Tester Plugin 1.0.9 and earlier stores a password unencrypted in its global configuration file on the Jenkins master where it can be viewed by users with access to the master file system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.mobileenerlytics.eagle.tester:eagle-tester'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2129'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-02-12/#SECURITY-1552'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/02/12/3'}] | {'cwe_ids': ['CWE-256', 'CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T00:59:20Z', 'nvd_published_at': '2020-02-12T15:15:00Z'} |
1.4.0 | GHSA-5mfw-p6qv-wgvv | 2022-12-21T18:28:51Z | 2022-05-24T17:30:18Z | null | ['CVE-2020-2293'] | Arbitrary file read vulnerability in Jenkins Persona Plugin | Jenkins Persona Plugin 2.4 and earlier allows users with Overall/Read permission to read arbitrary files on the Jenkins controller. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:persona'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2293'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/persona-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-10-08/#SECURITY-2046'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T18:28:51Z', 'nvd_published_at': '2020-10-08T13:15:00Z'} |
1.4.0 | GHSA-jh69-6vv2-wfp5 | 2023-07-13T17:10:21Z | 2022-05-24T17:09:07Z | null | ['CVE-2020-9016'] | Dolibarr ERP and CRM contain XSS Vulnerability | Dolibarr 11.0 allows XSS via the joinfiles, topic, or code parameter, or the HTTP Referer header. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '11.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-9016'}, {'type': 'WEB', 'url': 'https://code610.blogspot.com/2020/02/this-time-i-tried-to-check-one-of.html'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201203085334/https://therealcoiffeur.github.io/c10001'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T17:10:21Z', 'nvd_published_at': '2020-02-16T22:15:00Z'} |
1.4.0 | GHSA-2632-h32j-6rg9 | 2022-06-28T23:43:04Z | 2022-05-13T01:50:55Z | null | ['CVE-2018-1999043'] | Missing Release of Resource after Effective Lifetime in Jenkins | A denial of service vulnerability exists in Jenkins 2.137 and earlier, 2.121.2 and earlier in BasicAuthenticationFilter.java, BasicHeaderApiTokenAuthenticator.java that allows attackers to create ephemeral in-memory user records by attempting to log in using invalid credentials. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.121.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.122'},... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1999043'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-08-15/#SECURITY-672'}] | {'cwe_ids': ['CWE-772'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T23:43:04Z', 'nvd_published_at': '2018-08-23T18:29:00Z'} |
1.4.0 | GHSA-jvgm-pfqv-887x | 2023-06-23T21:46:31Z | 2022-05-14T00:57:16Z | null | ['CVE-2016-7954'] | Bundler allows attacker to inject arbitrary code via secondary Gem source | Bundler 1.x might allow remote attackers to inject arbitrary Ruby code into an application by leveraging a gem name collision on a secondary source. NOTE: this might overlap CVE-2013-0334. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'bundler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '2.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-7954'}, {'type': 'WEB', 'url': 'https://github.com/bundler/bundler/issues/5051'}, {'type': 'WEB', 'url': 'https://github.com/bundler/bundler/issues/5062'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1381951'}, {'type': 'WEB... | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-23T21:46:31Z', 'nvd_published_at': '2016-12-22T22:59:00Z'} |
1.4.0 | GHSA-jgpr-qrw2-6gp3 | 2022-11-02T00:40:32Z | 2022-05-14T03:58:16Z | null | ['CVE-2016-0790'] | Exposure of Sensitive Information in Jenkins Core | Jenkins before 1.650 and LTS before 1.642.2 do not use a constant-time algorithm to verify API tokens, which makes it easier for remote attackers to determine API tokens via a brute-force approach. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.650'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-0790'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:0711'}, {'type': 'WEB', 'url': 'https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-02-24'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHS... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-02T00:40:32Z', 'nvd_published_at': '2016-04-07T23:59:00Z'} |
1.4.0 | GHSA-6gj2-5366-p95v | 2023-08-28T22:27:16Z | 2022-05-13T01:20:50Z | null | ['CVE-2018-8381'] | ChakraCore RCE Vulnerability | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8266, CVE-2018-8380, CVE-2018-8384. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8381'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/5596'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/1b77d559416116f9719febb7dee3354150277588'}, {'type': 'WEB', 'url': 'https://github.com/c... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-28T22:27:16Z', 'nvd_published_at': '2018-08-15T17:29:00Z'} |
1.4.0 | GHSA-jwf8-mjj8-r8hq | 2023-09-20T19:21:02Z | 2022-05-17T19:57:15Z | null | ['CVE-2014-5011'] | DOMPDF Information Disclosure | DOMPDF before 0.6.2 allows Information Disclosure. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'dompdf/dompdf'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-5011'}, {'type': 'WEB', 'url': 'https://github.com/dompdf/dompdf/commit/cc06008f75262510ee135b8cbb14e333a309f651'}, {'type': 'WEB', 'url': 'https://github.com/dompdf/dompdf/compare/v0.6.1...v0.6.2'}, {'type': 'WEB', 'url': 'https://github.com/dompd... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-07T20:33:47Z', 'nvd_published_at': '2020-01-10T06:15:00Z'} |
1.4.0 | GHSA-r8rw-xx57-m64q | 2022-06-29T15:02:39Z | 2022-05-14T01:06:45Z | null | ['CVE-2019-1003010'] | Cross-Site Request Forgery in Jenkins Git Plugin | A cross-site request forgery vulnerability exists in Jenkins Git Plugin 3.9.1 and earlier in src/main/java/hudson/plugins/git/GitTagAction.java that allows attackers to create a Git tag in a workspace and attach corresponding metadata to a build record. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:git'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.9.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1003010'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:0326'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2019:0327'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-01-28/#SECURITY-1095'... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T15:02:39Z', 'nvd_published_at': '2019-02-06T16:29:00Z'} |
1.4.0 | GHSA-7pfc-cx3m-v22x | 2022-05-23T19:37:17Z | 2022-05-03T00:00:46Z | null | ['CVE-2022-21149'] | SCart is vulnerable to cross-site scripting (XSS) | SCart e-commerce is a free open source for businesses, built on the Laravel framework. The package s-cart/s-cart before 6.9 and the package s-cart/core before 6.9 are vulnerable to cross-site Scripting (XSS) which can lead to cookie stealing of any victim that visits the affected URL. An attacker can gain unauthorized ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 's-cart/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.9'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 's-cart/s-cart'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21149'}, {'type': 'PACKAGE', 'url': 'https://github.com/s-cart/core'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PHP-SCARTCORE-2389036'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-PHP-SCARTSCART-2389035'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-23T19:37:17Z', 'nvd_published_at': '2022-05-01T16:15:00Z'} |
1.4.0 | GHSA-58xm-mxjf-254g | 2022-12-16T20:19:52Z | 2022-05-24T19:19:44Z | null | ['CVE-2021-21685'] | Multiple vulnerabilities allow bypassing path filtering of agent-to-controller access control in Jenkins | The agent-to-controller security subsystem limits which files on the Jenkins controller can be accessed by agent processes.
Multiple vulnerabilities in the file path filtering implementation of Jenkins 2.318 and earlier, LTS 2.303.2 and earlier allow agent processes to read and write arbitrary files on the Jenkins con... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.303.3'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.303.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-cor... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21685'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-11-04/#SECURITY-2455'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/11/04... | {'cwe_ids': ['CWE-862'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T06:49:18Z', 'nvd_published_at': '2021-11-04T17:15:00Z'} |
1.4.0 | GHSA-f3fp-gc8g-vw66 | 2023-03-27T22:23:50Z | 2022-05-24T17:36:56Z | null | ['CVE-2022-29162'] | Default inheritable capabilities for linux container should be empty | ### Impact
A bug was found in runc where `runc exec --cap` executed processes with non-empty inheritable Linux process capabilities, creating an atypical Linux environment and enabling programs with inheritable file capabilities to elevate those capabilities to the permitted set during execve(2).
This bug did not aff... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/opencontainers/runc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/security/advisories/GHSA-f3fp-gc8g-vw66'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29162'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/commit/d04de3a9b72d7a2455c1885fc75eb36d02cd17b5'}, {'type': 'WEB', 'ur... | {'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T17:36:56Z', 'nvd_published_at': '2022-05-17T21:15:00Z'} |
1.4.0 | GHSA-rp4p-g69r-438x | 2022-07-08T19:18:09Z | 2022-05-13T01:02:38Z | null | ['CVE-2013-4152'] | Cross-Site Request Forgery in Spring Framework | The Spring OXM wrapper in Spring Framework before 3.2.4 and 4.0.0.M1, when using the JAXB marshaller, does not disable entity resolution, which allows context-dependent attackers to read arbitrary files, cause a denial of service, and conduct CSRF attacks via an XML external entity declaration in conjunction with an en... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-oxm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.4.RELEASE'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.3.RELEASE'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4152'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-framework/pull/317/files'}, {'type': 'WEB', 'url': 'https://jira.springsource.org/browse/SPR-10806'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0212.html... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T19:18:09Z', 'nvd_published_at': '2014-01-23T21:55:00Z'} |
1.4.0 | GHSA-cw58-gpgw-hwx2 | 2023-08-09T20:14:15Z | 2022-05-24T17:07:14Z | null | ['CVE-2020-7940'] | Plone allows weak passwords | Missing password strength checks on some forms in Plone 4.3 through 5.2.0 allow users to set weak passwords, leading to easier cracking. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3'}, {'fixed': '4.3.20'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type':... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7940'}, {'type': 'PACKAGE', 'url': 'https://github.com/plone/Plone'}, {'type': 'WEB', 'url': 'https://plone.org/security/hotfix/20200121'}, {'type': 'WEB', 'url': 'https://plone.org/security/hotfix/20200121/password-strength-checks-were-not-always-... | {'cwe_ids': ['CWE-521'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T23:58:09Z', 'nvd_published_at': '2020-01-23T21:15:00Z'} |
1.4.0 | GHSA-6xqj-wvgp-rqp8 | 2022-12-22T03:34:18Z | 2022-05-24T17:33:08Z | null | ['CVE-2020-2310'] | Missing permission checks in Jenkins Ansible Plugin allow enumerating credentials IDs | Ansible Plugin 1.0 and earlier does not perform permission checks in methods implementing form validation.
This allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. Those can be used as part of an attack to capture the credentials using another vulnerability.
An... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2310'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ansible-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-11-04/#SECURITY-1943'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T03:34:18Z', 'nvd_published_at': '2020-11-04T15:15:00Z'} |
1.4.0 | GHSA-xqqw-cqjp-52xm | 2023-02-23T19:40:09Z | 2022-05-24T16:56:45Z | null | ['CVE-2019-10410'] | Jenkins Log Parser Plugin vulnerable to Cross-site Scripting | Log Parser Plugin did not escape an error message shown when log parsing patterns are invalid. This resulted in a persisted cross-site scripting vulnerability exploitable by attackers able to control the log parsing rules configuration, typically users with Job/Configure permission.
Jenkins applies the missing escapin... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:log-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10410'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/log-parser-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-09-25/#SECURITY-732'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-23T19:40:09Z', 'nvd_published_at': '2019-09-25T16:15:00Z'} |
1.4.0 | GHSA-fxwr-2vxm-cg7p | 2023-02-08T17:59:29Z | 2022-05-17T03:29:51Z | null | ['CVE-2016-0738'] | OpenStack Object Storage (Swift) allows remote attackers to cause a denial of service | OpenStack Object Storage (Swift) before 2.3.1 (Kilo), 2.4.x, and 2.5.x before 2.5.1 (Liberty) do not properly close server connections, which allows remote attackers to cause a denial of service (proxy-server resource consumption) via a series of interrupted requests to a Large Object URL. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'swift'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'swift'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.5.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-0738'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:0126'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:0127'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:0128'}, {'type': 'WEB',... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T17:59:29Z', 'nvd_published_at': '2016-01-29T20:59:00Z'} |
1.4.0 | GHSA-jqmr-wqgp-8mh2 | 2023-08-16T23:00:32Z | 2022-05-17T03:20:58Z | null | ['CVE-2014-4986'] | phpMyAdmin cross-site scripting Vulnerability in Table or Column Names | Multiple cross-site scripting (XSS) vulnerabilities in js/functions.js in phpMyAdmin 4.0.x before 4.0.10.1, 4.1.x before 4.1.14.2, and 4.2.x before 4.2.6 allow remote authenticated users to inject arbitrary web script or HTML via a crafted (1) table name or (2) column name that is improperly handled during construction... | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.10.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ecosystem_specific': {'a... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-4986'}, {'type': 'WEB', 'url': 'https://github.com/phpmyadmin/phpmyadmin/commit/29a1f56495a7d1d98da31a614f23c0819a606a4d'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201505-03'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20... | {'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T23:00:32Z', 'nvd_published_at': '2014-07-20T11:12:00Z'} |
1.4.0 | GHSA-jjm6-4vf7-cjh4 | 2022-05-24T22:11:56Z | 2022-05-24T22:11:56Z | null | ['CVE-2022-29203'] | Integer overflow in `SpaceToBatchND` | ### Impact
The implementation of `tf.raw_ops.SpaceToBatchND` (in all backends such as XLA and handwritten kernels) is vulnerable to an integer overflow:
```python
import tensorflow as tf
input = tf.constant(-3.5e+35, shape=[10,19,22], dtype=tf.float32)
block_shape = tf.constant(-1879048192, shape=[2], dtype=tf.int64)... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jjm6-4vf7-cjh4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29203'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/acd56b8bcb72b163c834ae4f18469047b001fadf'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-190'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:11:56Z', 'nvd_published_at': '2022-05-20T23:15:00Z'} |
1.4.0 | GHSA-fjq5-5j5f-mvxh | 2022-11-03T22:57:31Z | 2022-05-13T01:25:20Z | null | ['CVE-2015-7501'] | Deserialization of Untrusted Data in Apache commons collections | It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'commons-collections:commons-collections'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.commons:commons-collections4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7501'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/vulnerabilities/2059393'}, {'type': 'WEB', 'url': 'https://access.redhat.com/solutions/2045023'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1279330'}, {'ty... | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T22:57:31Z', 'nvd_published_at': '2017-11-09T17:29:00Z'} |
1.4.0 | GHSA-2q65-xxg6-3qh5 | 2022-11-22T18:57:24Z | 2022-05-13T01:47:04Z | null | ['CVE-2017-7682'] | Apache OpenMeetings vulnerable to parameter manipulation attacks | Apache OpenMeetings 3.2.0 is vulnerable to parameter manipulation attacks, as a result attacker has access to restricted areas. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.openmeetings:openmeetings-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7682'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/openmeetings'}, {'type': 'WEB', 'url': 'http://markmail.org/message/dbrbvf5k343ulivf'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T18:57:24Z', 'nvd_published_at': '2017-07-17T13:18:00Z'} |
1.4.0 | GHSA-rf6q-vx79-mjxr | 2023-02-07T23:22:22Z | 2022-05-25T00:00:22Z | null | ['CVE-2021-3629'] | Undertow Uncontrolled Resource Consumption | A flaw was found in Undertow. A potential security issue in flow control handling by the browser over HTTP/2 may potentially cause overhead or a denial of service in the server. The highest threat from this vulnerability is availability. This flaw affects Undertow versions prior to 2.0.40.Final and prior to 2.2.11.Fina... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.40.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.39.Final'}}, {'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3629'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1977362'}, {'type': 'PACKAGE', 'url': 'https://github.com/undertow-io'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220729-0008/'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T22:41:25Z', 'nvd_published_at': '2022-05-24T19:15:00Z'} |
1.4.0 | GHSA-4f7h-9j2x-cmr4 | 2022-07-13T18:27:31Z | 2022-05-14T01:17:03Z | null | ['CVE-2011-5062'] | Improper Authentication in Apache Tomcat | The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 does not check qop values, which might allow remote attackers to bypass intended integrity-protection requirements via a qop=auth value, a different vulnerability than CVE-2011-1184. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.5.0'}, {'fixed': '5.5.34'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-5062'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'htt... | {'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T18:27:31Z', 'nvd_published_at': '2012-01-14T21:55:00Z'} |
1.4.0 | GHSA-qqfc-m9hc-pqv3 | 2022-06-29T23:25:35Z | 2022-05-13T01:33:29Z | null | ['CVE-2018-1131'] | Deserialization of Untrusted Data in Infinispan | Infinispan permits improper deserialization of trusted data via XML and JSON transcoders under certain server configurations. A user with authenticated access to the server could send a malicious object to a cache configured to accept certain types of objects, achieving code execution and possible further attacks. Vers... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.infinispan:infinispan-core'}, 'versions': ['8.2.10.Final']}, {'package': {'ecosystem': 'Maven', 'name': 'org.infinispan:infinispan-core'}, 'versions': ['9.0.3.Final']}, {'package': {'ecosystem': 'Maven', 'name': 'org.infinispan:infinispan-core'}, 'versions': ['9.1.7.Fina... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1131'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1833'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3892'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1576492'}, {'type': 'P... | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T23:25:35Z', 'nvd_published_at': '2018-05-15T13:29:00Z'} |
1.4.0 | GHSA-5m4q-x28v-q6wp | 2022-12-02T20:49:07Z | 2022-05-18T00:00:41Z | null | ['CVE-2022-30954'] | Missing permission check in Jenkins Blue Ocean Plugin | Jenkins Blue Ocean Plugin 1.25.3 and earlier does not perform a permission check in several HTTP endpoints, allowing attackers with Overall/Read permission to connect to an attacker-specified HTTP server. Blue Ocean Plugin 1.25.4 requires POST requests and the appropriate permissions for the affected HTTP endpoints. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.blueocean:blueocean-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.25.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30954'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/blueocean-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2502'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2... | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-02T14:56:08Z', 'nvd_published_at': '2022-05-17T15:15:00Z'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.