schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
8
154
details
stringlengths
31
19.1k
severity
stringlengths
2
92
affected
stringlengths
75
28.5k
references
stringlengths
79
7.48k
database_specific
stringlengths
131
196
1.4.0
GHSA-5fj8-wh3g-qvq2
2023-08-29T19:02:14Z
2022-05-17T04:54:37Z
null
['CVE-2013-7080']
TYPO3 is vulnerable to Mass Assignment in the Extension table administration library
The creating record functionality in Extension table administration library (feuser_adminLib.inc) in TYPO3 4.5.0 through 4.5.31, 4.7.0 through 4.7.16, and 6.0.0 through 6.0.11 allows remote attackers to write to arbitrary fields in the configuration database table via crafted links, aka "Mass Assignment."
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.5.0'}, {'fixed': '4.5.31'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ecosystem_specific': {'affected_function...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7080'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3-CMS/core'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2013/q4/473'}, {'type': 'WEB', 'url': 'http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-004...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T19:02:14Z', 'nvd_published_at': '2013-12-23T23:55:00Z'}
1.4.0
GHSA-v723-58jv-2qc4
2022-07-07T23:18:33Z
2022-05-13T01:04:00Z
null
['CVE-2013-6440']
Exposure of Sensitive Information to an Unauthorized Actor in OpenSAML
The (1) BasicParserPool, (2) StaticBasicParserPool, (3) XML Decrypter, and (4) SAML Decrypter in Shibboleth OpenSAML-Java before 2.6.1 set the expandEntityReferences property to true, which allows remote attackers to conduct XML external entity (XXE) attacks via a crafted XML DOCTYPE declaration.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.opensaml:opensaml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-6440'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1043332'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'http://blog.sendsafely.com/post/69590974866/web-based-s...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T23:18:33Z', 'nvd_published_at': '2014-02-14T15:55:00Z'}
1.4.0
GHSA-567r-vqj7-5cw7
2023-07-31T19:54:22Z
2022-05-17T02:37:14Z
null
['CVE-2016-6629']
phpMyAdmin Authentication Bypass
An issue was discovered in phpMyAdmin involving the `$cfg['ArbitraryServerRegexp']` configuration directive. An attacker could reuse certain cookie values in a way of bypassing the servers defined by ArbitraryServerRegexp. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prio...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.6'}, {'fixed': '4.6.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4'}, {'fixed': '4.4....
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6629'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201701-32'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210725054025/http://www.securityfocus.com/bid/92493'}, {'type': 'WEB', 'url': 'https://www.phpmyadmin.net/security/P...
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T19:54:22Z', 'nvd_published_at': '2016-12-11T02:59:00Z'}
1.4.0
GHSA-qqjv-mc2v-p7mc
2023-07-22T00:11:12Z
2022-05-14T00:55:53Z
null
['CVE-2018-1042']
Moodle SSRF Vulnerability
Moodle 3.x has Server Side Request Forgery in the filepicker.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.4'}, {'fixed': '3.4.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': [...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1042'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/f1d1a60e0ac8549c08e66062f3cd0110e4a92e24'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=364381'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/202...
{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-22T00:11:12Z', 'nvd_published_at': '2018-01-22T08:29:00Z'}
1.4.0
GHSA-hxj4-885f-grgp
2023-08-23T13:34:10Z
2022-05-24T17:30:10Z
null
['CVE-2020-25644']
Wildfly-OpenSSL memory leak flaw
A memory leak flaw was found in WildFly OpenSSL in versions prior to 1.1.3.Final, where it removes an HTTP session. It may allow the attacker to cause OOM leading to a denial of service. The highest threat from this vulnerability is to system availability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.wildfly.openssl:wildfly-openssl-natives-parent'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.3.Final'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25644'}, {'type': 'WEB', 'url': 'https://github.com/wildfly-security/wildfly-openssl-natives/pull/4'}, {'type': 'WEB', 'url': 'https://github.com/wildfly-security/wildfly-openssl-natives/commit/7c26514676f3fb0dee0bcaa7d4680f982372950f'}, {'type': '...
{'cwe_ids': ['CWE-401'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T23:13:57Z', 'nvd_published_at': '2020-10-06T14:15:00Z'}
1.4.0
GHSA-p9jg-9w87-6rg4
2023-08-28T23:35:04Z
2022-05-17T04:43:27Z
null
['CVE-2013-4320']
TYPO3 Improper Access Management in the File Abstraction Layer
The File Abstraction Layer (FAL) in TYPO3 6.0.x before 6.0.9 and 6.1.x before 6.1.4 does not properly check permissions, which allows remote authenticated users to create or read arbitrary files via a crafted URL.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0'}, {'fixed': '6.0.9'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ecosystem_specific': {'affected_functions':...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4320'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3-CMS/core'}, {'type': 'WEB', 'url': 'https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-003/'}]
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-28T23:35:04Z', 'nvd_published_at': '2014-05-20T14:55:00Z'}
1.4.0
GHSA-47vg-483w-hp3m
2022-06-06T17:58:46Z
2022-05-25T00:00:31Z
null
['CVE-2022-1849']
Improper user session handling in filegator
FileGator prior to version 7.8.0 is vulnerable to session fixation.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'filegator/filegator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.8.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1849'}, {'type': 'WEB', 'url': 'https://github.com/filegator/filegator/commit/fcd3995f64f5dfc6a4c2c059cc22a2fef1e81225'}, {'type': 'PACKAGE', 'url': 'https://github.com/filegator/filegator'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/881f8...
{'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T22:44:17Z', 'nvd_published_at': '2022-05-24T16:15:00Z'}
1.4.0
GHSA-xgcp-59g2-wm8g
2023-09-26T19:14:05Z
2022-05-24T17:00:26Z
null
['CVE-2019-8136']
Magento 2 Community Edition Insecure Component
An insecure component vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. Magento 2 codebase leveraged outdated versions of HTTP specification abstraction implemented in symphony component.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8136'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051105/https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T18:05:56Z', 'nvd_published_at': '2019-11-06T00:15:00Z'}
1.4.0
GHSA-c92w-72c5-9x59
2023-02-08T00:31:28Z
2022-05-24T17:00:21Z
null
['CVE-2019-10223']
kube-state-metrics may expose secret content in metrics
A security issue was discovered in the kube-state-metrics versions v1.7.0 and v1.7.1. An experimental feature was added to the v1.7.0 release that enabled annotations to be exposed as metrics. By default, the kube-state-metrics metrics only expose metadata about Secrets. However, a combination of the default `kubectl` ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'k8s.io/kube-state-metrics'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.7.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10223'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kube-state-metrics/commit/03122fe3e2df49a9a7298b8af921d3c37c430f7f'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10223'}, {'type': 'PACKAGE', 'url': 'h...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T00:31:28Z', 'nvd_published_at': '2019-11-05T12:15:00Z'}
1.4.0
GHSA-5jxp-4x68-mhqc
2023-07-21T22:58:58Z
2022-05-14T00:55:28Z
null
['CVE-2018-19312']
Centreon SQL Injection
Centreon 3.4.x (fixed in Centreon 18.10.0 and Centreon web 2.8.24) allows SQL Injection via the searchVM parameter to the main.php?p=20408 URI.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '18.0.0'}, {'fixed': '18.10.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ecosystem_specific': {'affected_...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19312'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon-archived/pull/6257'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon-archived/pull/6628'}, {'type': 'WEB', 'url': 'https://documentation.centreon.com/docs/centreon/...
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T22:58:58Z', 'nvd_published_at': '2018-11-16T19:29:00Z'}
1.4.0
GHSA-2jxh-3cx8-xw65
2022-07-28T15:28:00Z
2022-05-01T06:38:20Z
null
['CVE-2006-0254']
Apache Geronimo console 1.0 vulnerable to cross-site scripting
Multiple cross-site scripting (XSS) vulnerabilities in Apache Geronimo 1.0 allow remote attackers to inject arbitrary web script or HTML via the (1) time parameter to cal2.jsp and (2) any invalid parameter, which causes an XSS when the log file is viewed by the Web-Access-Log viewer. Version 1.1 contains fixes for thes...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'geronimo:geronimo-console-standard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2006-0254'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/24158'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/24159'}, {'type': 'WEB', 'url': 'https://geronimo.apache.org/GMOxDOC11/releas...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-28T15:28:00Z', 'nvd_published_at': '2006-01-18T01:51:00Z'}
1.4.0
GHSA-5p59-v5wm-77v4
2022-06-28T23:52:17Z
2022-05-13T01:01:01Z
null
['CVE-2018-6356']
Improper Limitation of a Pathname to a Restricted Directory in Jenkins
Jenkins before 2.107 and Jenkins LTS before 2.89.4 did not properly prevent specifying relative paths that escape a base directory for URLs accessing plugin resource files. This allowed users with Overall/Read permission to download files from the Jenkins master they should not have access to. On Windows, any file acce...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.89.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.90'}, {...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-6356'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-02-14/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2018/02/14/1'},...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T23:52:17Z', 'nvd_published_at': '2018-02-20T15:29:00Z'}
1.4.0
GHSA-4pjx-86pg-x4j5
2022-12-12T17:10:16Z
2022-05-14T03:07:02Z
null
['CVE-2018-1000602']
Jenkins SAML Plugin Session Fixation vulnerability
A session fixation vulnerability exists in Jenkins SAML Plugin 1.0.6 and earlier in SamlSecurityRealm.java that allows unauthorized attackers to impersonate another users if they can control the pre-authentication session. SAML Plugin 1.0.7 invalidates the previous session during login and creates a new one.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:saml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.6'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000602'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/saml-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-06-25/#SECURITY-916'}]
{'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T17:10:16Z', 'nvd_published_at': '2018-06-26T17:29:00Z'}
1.4.0
GHSA-42j3-498q-m6vp
2022-07-07T22:52:25Z
2022-05-14T01:10:18Z
null
['CVE-2014-0227']
Improper Input Validation in Apache Tomcat
java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat 6.x before 6.0.42, 7.x before 7.0.55, and 8.x before 8.0.9 does not properly handle attempts to continue reading data after an error has occurred, which allows remote attackers to conduct HTTP request smuggling attacks or cause a denial of s...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.42'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0227'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1109196'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WE...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T22:52:25Z', 'nvd_published_at': '2015-02-16T00:59:00Z'}
1.4.0
GHSA-qf8x-vqjv-92gr
2022-06-02T17:39:42Z
2022-05-04T18:59:46Z
null
['CVE-2022-24901']
Authentication bypass and denial of service (DoS) vulnerabilities in Apple Game Center auth adapter
### Impact Weak validation of the Apple certificate URL in the Apple Game Center authentication adapter allows to bypass authentication and makes the server vulnerable to DoS attacks. ### Patches The vulnerability has been fixed by improving the URL validation and adding additional checks of the resource the URL point...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.10.10'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/security/advisories/GHSA-qf8x-vqjv-92gr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24901'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/commit/af4a0417a9f3c1e99b3793806b4b18e04d9fa999'}, {...
{'cwe_ids': ['CWE-287', 'CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-04T18:59:46Z', 'nvd_published_at': '2022-05-04T01:15:00Z'}
1.4.0
GHSA-6pcv-qqx4-mxm3
2023-07-21T21:47:33Z
2022-05-13T01:35:04Z
null
['CVE-2018-1002103']
Minikube RCE via DNS Rebinding
In Minikube versions 0.3.0-0.29.0, minikube exposes the Kubernetes Dashboard listening on the VM IP at port 30000. In VM environments where the IP is easy to predict, the attacker can use DNS rebinding to indirectly make requests to the Kubernetes Dashboard, create a new Kubernetes Deployment running arbitrary code. If...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'k8s.io/minikube'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.0'}, {'last_affected': '0.29.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1002103'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/minikube/issues/3208'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T21:47:33Z', 'nvd_published_at': '2018-12-05T21:29:00Z'}
1.4.0
GHSA-4jjw-xrr6-9v3p
2023-08-22T23:30:03Z
2022-05-01T18:45:22Z
null
['CVE-2007-6672']
Mortbay Jetty Double Slash URI Information Disclosure Vulnerability
Mortbay Jetty 6.1.5 and 6.1.6 allows remote attackers to bypass protection mechanisms and read the source of files via multiple `/` (slash) characters in the URI.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.mortbay.jetty:jetty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.5'}, {'fixed': '6.1.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.1.6'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-6672'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20080113051254/http://www.kb.cert.org/vuls/id/553235'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20080120225723/http://jira.codehaus.org/browse/JETTY-386'}, {'type': 'WEB', 'url...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-22T23:30:03Z', 'nvd_published_at': '2008-01-08T11:46:00Z'}
1.4.0
GHSA-cpp8-r8pr-wv4v
2023-08-16T22:45:20Z
2022-05-17T00:24:06Z
null
['CVE-2014-0115']
Apache Storm log viewer path traversal vulnerability
Directory traversal vulnerability in the log viewer in Apache Storm 0.9.0.1 allows remote attackers to read arbitrary files via a `..` (dot dot) in the file parameter to log.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.storm:storm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.9.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0115'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/STORM-269'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/storm-dev/201404.mbox/%3CJIRA.12704141.1395964296891.201561.1398799995645@arcas%3E'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T22:45:20Z', 'nvd_published_at': '2017-10-30T16:29:00Z'}
1.4.0
GHSA-mx2h-hf7j-2x3p
2022-07-06T20:08:28Z
2022-05-17T03:59:03Z
null
['CVE-2015-8795']
Improper Neutralization of Input During Web Page Generation in Apache Solr
Multiple cross-site scripting (XSS) vulnerabilities in the Admin UI in Apache Solr before 5.1 allow remote attackers to inject arbitrary web script or HTML via crafted fields that are mishandled during the rendering of the (1) Analysis page, related to webapp/web/js/scripts/analysis.js or (2) Schema-Browser page, relat...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8795'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/SOLR-7346'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:08:28Z', 'nvd_published_at': '2016-02-15T02:59:00Z'}
1.4.0
GHSA-vmhh-xh3g-j992
2022-06-08T17:31:04Z
2022-05-25T22:40:57Z
null
['CVE-2022-29251']
Cross-site Scripting in the Flamingo theme manager
### Impact We found a possible XSS vector in the `FlamingoThemesCode.WebHomeSheet` wiki page related to the "newThemeName" form field. ### Patches The issue is patched in versions 12.10.11, 14.0-rc-1, 13.4.7, 13.10.3. ### Workarounds The easiest workaround is to edit the wiki page `FlamingoThemesCode.WebHomeSheet` (...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-flamingo-theme-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.10.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-flamingo-theme-ui'}, 'ranges': [{'type': 'ECOSYSTE...
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-vmhh-xh3g-j992'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29251'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/bd935320bee3c27cf7548351b1d0f935f116d437'}, {'type': 'PACKAGE...
{'cwe_ids': ['CWE-116', 'CWE-79', 'CWE-80'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T22:40:57Z', 'nvd_published_at': '2022-05-25T21:15:00Z'}
1.4.0
GHSA-86vm-8m4p-6263
2022-11-22T19:26:44Z
2022-05-14T03:06:10Z
null
['CVE-2018-13003']
OpenTSDB Cross-site Scripting vulnerability
An issue was discovered in OpenTSDB 2.3.0. There is XSS in parameter `type` to the /suggest URI.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'net.opentsdb:opentsdb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-13003'}, {'type': 'WEB', 'url': 'https://github.com/OpenTSDB/opentsdb/issues/1241'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenTSDB/opentsdb'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T19:26:44Z', 'nvd_published_at': '2018-06-29T14:29:00Z'}
1.4.0
GHSA-7m2w-9gw7-c3xp
2023-07-03T23:13:40Z
2022-05-13T01:13:48Z
null
['CVE-2015-3649']
open-uri-cached Gem for Ruby Unsafe Temporary File Creation Enables Code Execution
The open-uri-cached rubygem allows local users to execute arbitrary Ruby code by creating a directory under /tmp containing "openuri-" followed by a crafted UID, and putting Ruby code in said directory once a metafile is created.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'open-uri-cached'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3649'}, {'type': 'WEB', 'url': 'https://github.com/tigris/open-uri-cached/issues/8'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/open-uri-cached/CVE-2015-3649.yml'}, {'type': 'PACKAGE', 'url': 'https://gith...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T23:05:43Z', 'nvd_published_at': '2017-08-18T16:29:00Z'}
1.4.0
GHSA-6x4f-5v4h-r29j
2023-09-28T20:18:07Z
2022-05-13T01:21:17Z
null
['CVE-2019-0567']
ChakraCore RCE Vulnerability
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2019-0539, CVE-2019-0568.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0567'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/788f17b0ce06ea84553b123c174d1ff7052112a0'}, {'type': 'PACKAGE', 'url': 'https://github.com/chakra-core/ChakraCore'}, {'type': 'WEB', 'url': 'https://portal.msrc.micros...
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T20:22:19Z', 'nvd_published_at': '2019-01-08T21:29:00Z'}
1.4.0
GHSA-r5x3-2446-hrp7
2022-07-01T21:46:30Z
2022-05-14T03:45:22Z
null
['CVE-2017-1000503']
Race Condition in Jenkins
A race condition during Jenkins 2.81 through 2.94 (inclusive); 2.89.1 startup could result in the wrong order of execution of commands during initialization. This could in rare cases result in failure to initialize the setup wizard on the first startup. This resulted in multiple security-related settings not being set ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.81'}, {'fixed': '2.89.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.89.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-c...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000503'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2017-12-14/'}]
{'cwe_ids': ['CWE-362'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T21:46:30Z', 'nvd_published_at': '2018-01-24T23:29:00Z'}
1.4.0
GHSA-pv4c-rj4h-gr9m
2022-11-22T19:09:12Z
2022-05-24T17:03:48Z
null
['CVE-2019-16573']
Jenkins Alauda DevOps Pipeline Plugin vulnerable to cross-site request forgery
A cross-site request forgery vulnerability in Jenkins Alauda DevOps Pipeline Plugin 2.3.2 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.alauda.jenkins.plugins:alauda-devops-pipeline'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16573'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1600'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/12/17/1'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T19:09:12Z', 'nvd_published_at': '2019-12-17T15:15:00Z'}
1.4.0
GHSA-hmhq-382q-mp56
2022-11-03T22:53:33Z
2022-05-14T00:54:14Z
null
['CVE-2014-0116']
ClassLoader manipulation in Apache Struts
CookieInterceptor in Apache Struts 2.x before 2.3.20, when a wildcard cookiesName value is used, does not properly restrict access to the getClass method, which allows remote attackers to "manipulate" the ClassLoader and modify session state via a crafted request. NOTE: this vulnerability exists because of an incomplet...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.20'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0116'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/struts'}, {'type': 'WEB', 'url': 'http://struts.apache.org/release/2.3.x/docs/s2-022.html'}, {'type': 'WEB', 'url': 'http://www.huawei.com/en/security/psirt/security-bulletins/security-a...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T22:53:33Z', 'nvd_published_at': '2014-05-08T10:55:00Z'}
1.4.0
GHSA-qg66-xv7v-m834
2022-12-29T01:42:04Z
2022-05-24T17:28:25Z
null
['CVE-2020-2259']
Stored XSS vulnerability in computer-queue-plugin Plugin
computer-queue-plugin Plugin 1.5 and earlier does not escape the agent name in tooltips. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Agent/Configure permission. computer-queue-plugin Plugin 1.6 escapes the agent name in tooltips.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'jenkins.ci.plugins.computerqueue:computer-queue-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.5'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2259'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/computer-queue-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1912'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-securi...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-29T01:42:04Z', 'nvd_published_at': '2020-09-16T14:15:00Z'}
1.4.0
GHSA-v64w-96p6-fx7w
2022-07-27T21:38:21Z
2022-05-17T04:48:11Z
null
['CVE-2013-1777']
Apache Geronimo JMX Remoting functionality allows remote code execution in 3.x before v3.0.1
The JMX Remoting functionality in Apache Geronimo 3.x before 3.0.1, as used in IBM WebSphere Application Server (WAS) Community Edition 3.0.0.3 and other products, does not properly implement the RMI classloader, which allows remote attackers to execute arbitrary code by using the JMX connector to send a crafted serial...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.geronimo.framework:geronimo-jmx-remoting'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0-beta-1'}, {'fixed': '3.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1777'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/GERONIMO-6477'}, {'type': 'WEB', 'url': 'http://archives.neohapsis.com/archives/bugtraq/2013-07/0008.html'}, {'type': 'WEB', 'url': 'http://geronimo.apache.org/30x-security-repor...
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-27T21:38:21Z', 'nvd_published_at': '2013-07-11T22:55:00Z'}
1.4.0
GHSA-x5q5-6wvf-2fpq
2023-09-26T19:09:58Z
2022-05-24T17:00:25Z
null
['CVE-2019-8124']
Magento 2 Community Edition Insufficient Logging
An insufficient logging and monitoring vulnerability exists in Magento 2.1 prior to 2.1.19, Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3. Failure to track admin actions related to design configuration could lead to repudiation attacks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.19'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8124'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051105/https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}]
{'cwe_ids': ['CWE-345'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T17:52:47Z', 'nvd_published_at': '2019-11-05T23:15:00Z'}
1.4.0
GHSA-cqm6-hrgq-6869
2022-11-22T18:57:29Z
2022-05-13T01:47:04Z
null
['CVE-2017-7673']
Apache OpenMeetings has Inadequate Encryption Strength
Apache OpenMeetings 1.0.0 uses not very strong cryptographic storage, captcha is not used in registration and forget password dialogs and auth forms missing brute force protection.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.openmeetings:openmeetings-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '3.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7673'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/openmeetings'}, {'type': 'WEB', 'url': 'http://markmail.org/message/3hshl26omwjo6c5i'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/99587'}]
{'cwe_ids': ['CWE-326'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T18:57:29Z', 'nvd_published_at': '2017-07-17T13:18:00Z'}
1.4.0
GHSA-jjvw-3h9j-p7jf
2023-08-29T18:25:43Z
2022-05-17T04:49:44Z
null
['CVE-2013-4197']
Plone Improper Access Control Vulnerability
member_portrait.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 allows remote authenticated users to modify or delete portraits of other users via unspecified vectors.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1'}, {'fixed': '4.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1'}}, {'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'e...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4197'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=978478'}, {'type': 'PACKAGE', 'url': 'https://github.com/plone/Plone'}, {'type': 'WEB', 'url': 'http://plone.org/products/plone-hotfix/releases/20130618'}, {'type': 'WEB', ...
{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T18:25:43Z', 'nvd_published_at': '2014-03-11T19:37:00Z'}
1.4.0
GHSA-gjjm-4x3g-3h33
2023-09-26T19:15:09Z
2022-05-24T17:00:27Z
null
['CVE-2019-8139']
Magento 2 Community Edition XSS Vulnerability
A stored cross-site scripting (XSS) vulnerability exists in Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated user can inject arbitrary Javascript code into the dynamic block when invoking page builder on a product.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8139'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051105/https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T23:48:27Z', 'nvd_published_at': '2019-11-06T00:15:00Z'}
1.4.0
GHSA-qmqw-mpqp-mr54
2023-08-03T21:47:36Z
2022-05-17T03:11:51Z
null
['CVE-2015-4050']
Symfony Incorrect Access Control
FragmentListener in the HttpKernel component in Symfony 2.3.19 through 2.3.28, 2.4.9 through 2.4.10, 2.5.4 through 2.5.11, and 2.6.0 through 2.6.7, when ESI or SSI support enabled, does not check if the `_controller` attribute is set, which allows remote attackers to bypass URL signing and security rules by including (...
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.19'}, {'fixed': '2.3.29'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.3.28'}}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-4050'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228090443/http://www.securityfocus.com/bid/74928'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159513.html'}, {'type': 'WEB', 'url': '...
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T21:47:36Z', 'nvd_published_at': '2015-06-02T14:59:00Z'}
1.4.0
GHSA-mxfv-c8p8-qw5h
2023-07-07T21:01:59Z
2022-05-17T02:45:09Z
null
['CVE-2016-4880']
baserCMS Cross-site Scripting vulnerability
Cross-site scripting vulnerability in baserCMS plugin Blog version 3.0.10 and earlier allows remote authenticated attackers to inject arbitrary web script or HTML via unspecified vectors.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'baserproject/basercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.10'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-4880'}, {'type': 'PACKAGE', 'url': 'https://github.com/baserproject/basercms'}, {'type': 'WEB', 'url': 'https://jvn.jp/en/jp/JVN92765814/index.html'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210308130052/http://www.securityfocus.com/b...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T21:01:59Z', 'nvd_published_at': '2017-05-12T18:29:00Z'}
1.4.0
GHSA-gcv6-2v9c-rj48
2023-07-07T13:52:40Z
2022-05-24T16:55:25Z
null
['CVE-2019-14470']
Cosenary Instagram-PHP-API contains reflected XSS vulnerability
cosenary Instagram-PHP-API (aka Instagram PHP API V2), used in the UserPro plugin through 4.9.32 for WordPress, is vulnerable to cross-site scripting via the [example/success.php](https://github.com/cosenary/Instagram-PHP-API/blob/master/example/success.php#L36 ) error_description parameter. Vulnerable code: ```php ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'cosenary/instagram'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14470'}, {'type': 'PACKAGE', 'url': 'https://github.com/cosenary/Instagram-PHP-API'}, {'type': 'WEB', 'url': 'https://github.com/cosenary/Instagram-PHP-API/blob/master/example/success.php#L33-L36'}, {'type': 'WEB', 'url': 'https://wpvulndb.com/vuln...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T13:52:40Z', 'nvd_published_at': '2019-09-04T20:15:00Z'}
1.4.0
GHSA-h8c5-c92g-jq6x
2022-07-01T21:51:49Z
2022-05-14T01:04:35Z
null
['CVE-2017-1000401']
Improper Input Validation in Jenkins
The Jenkins 2.73.1 and earlier, 2.83 and earlier default form control for passwords and other secrets, <f:password/>, supports form validation (e.g. for API keys). The form validation AJAX requests were sent via GET, which could result in secrets being logged to a HTTP access log in non-default configurations of Jenkin...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.73.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.73.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000401'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenkins/commit/09d60462b9edf775f08568601bb3e2cfd8075368'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenkins/blob/6d179998e18adfbaa4e443c7e837135bf36c53d7/test/src/test/java...
{'cwe_ids': ['CWE-20'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T21:51:49Z', 'nvd_published_at': '2018-01-26T02:29:00Z'}
1.4.0
GHSA-m66x-wm27-xxpc
2023-07-17T19:27:02Z
2022-05-24T17:15:34Z
null
['CVE-2020-11825']
Dolibarr Cross-Site Request Forgery Vulnerability
In Dolibarr 10.0.6, forms are protected with a Cross-Site Request Forgery (CSRF) token against CSRF attacks. The problem is any CSRF token in any user's session can be used in another user's session. CSRF tokens should not be valid in this situation.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '10.0.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11825'}, {'type': 'WEB', 'url': 'https://fatihhcelik.blogspot.com/2020/04/dolibarr-csrf.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/Dolibarr/dolibarr'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T19:27:02Z', 'nvd_published_at': '2020-04-16T19:15:00Z'}
1.4.0
GHSA-g6h2-4x64-c59x
2022-06-28T23:09:04Z
2022-05-24T16:47:43Z
null
['CVE-2019-10337']
Improper Restriction of XML External Entity Reference Jenkins Token Macro Plugin
An XML external entities (XXE) vulnerability in Jenkins Token Macro Plugin 2.7 and earlier allowed attackers able to control a the content of the input file for the "XML" macro to have Jenkins resolve external entities, resulting in the extraction of secrets from the Jenkins agent, server-side request forgery, or denia...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:oken-macro'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10337'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1399'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/06/11/1'}]
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T23:09:04Z', 'nvd_published_at': '2019-06-11T14:29:00Z'}
1.4.0
GHSA-698c-2x4j-g9gq
2022-07-06T19:47:31Z
2022-05-14T01:10:16Z
null
['CVE-2016-6817']
Improper Restriction of Operations within the Bounds of a Memory Buffer in Apache Tomcat
The HTTP/2 header parser in Apache Tomcat 9.0.0.M1 to 9.0.0.M11 and 8.5.0 to 8.5.6 entered an infinite loop if a header was received that was larger than the available buffer. This made a denial of service attack possible.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0.M1'}, {'fixed': '9.0.0.M12'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.0.0.M11'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'},...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6817'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff228...
{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:47:31Z', 'nvd_published_at': '2017-08-10T22:29:00Z'}
1.4.0
GHSA-rp7r-79rm-2758
2022-05-25T20:21:39Z
2022-05-01T02:31:27Z
null
['CVE-2005-4849']
Apache Derby exposes user and password attributes
Apache Derby before 10.1.2.1 exposes the (1) user and (2) password attributes in cleartext via (a) the RDBNAM parameter of the ACCSEC command and (b) the output of the DatabaseMetaData.getURL function, which allows context-dependent attackers to obtain sensitive information.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.derby:derby'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.1.2.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.1.1.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2005-4849'}, {'type': 'WEB', 'url': 'https://github.com/apache/derby/commit/09a7325f75a4f96a7735e46c9723930f88ea2613'}, {'type': 'WEB', 'url': 'https://github.com/apache/derby/commit/82d721fd53e30dbb86d6d742c085030985091968'}, {'type': 'WEB', 'url': 'ht...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T20:21:39Z', 'nvd_published_at': '2005-12-31T05:00:00Z'}
1.4.0
GHSA-wqmp-2p5r-rhfv
2022-12-02T20:07:45Z
2022-05-18T00:00:42Z
null
['CVE-2022-30971']
XML External Entity Reference in Jenkins Storable Configs Plugin
Jenkins Storable Configs Plugin 1.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. This allows attackers with Item/Configure permission to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller or server-side requ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jvnet.hudson.plugins:storable-configs-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30971'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/storable-configs-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-1969'}]
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-01T21:16:28Z', 'nvd_published_at': '2022-05-17T15:15:00Z'}
1.4.0
GHSA-rvrj-j7cc-236p
2023-08-28T23:44:04Z
2022-05-17T01:33:02Z
null
['CVE-2013-4649']
DotNetNuke (DNN) Cross-site scripting (XSS) vulnerability via the __dnnVariable parameter
Cross-site scripting (XSS) vulnerability in DotNetNuke (DNN) before 6.2.9 and 7.x before 7.1.1 allows remote attackers to inject arbitrary web script or HTML via the __dnnVariable parameter to the default URI.
[]
[{'package': {'ecosystem': 'NuGet', 'name': 'DotNetNuke.Core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.2.9'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'DotNetNuke.Core'}, 'ecosystem_specific': {'affected_functions': ['']}, ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4649'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/86432'}, {'type': 'PACKAGE', 'url': 'https://github.com/dnnsoftware/Dnn.Platform'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/122792/DotNetNuke-...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-28T23:44:04Z', 'nvd_published_at': '2014-03-12T14:55:00Z'}
1.4.0
GHSA-hxqx-xwvh-44m2
2023-08-28T13:59:06Z
2022-05-27T16:36:52Z
null
['CVE-2022-30122']
Denial of Service Vulnerability in Rack Multipart Parsing
There is a possible denial of service vulnerability in the multipart parsing component of Rack. This vulnerability has been assigned the CVE identifier CVE-2022-30122. Versions Affected: >= 1.2 Not affected: < 1.2 Fixed Versions: 2.0.9.1, 2.1.4.1, 2.2.3.1 ## Impact Carefully crafted multipart POST request...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2'}, {'fixed': '2.0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.9.0'}}, {'package': {'ecosystem': 'RubyGems', 'name':...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30122'}, {'type': 'WEB', 'url': 'https://discuss.rubyonrails.org/t/cve-2022-30122-denial-of-service-vulnerability-in-rack-multipart-parsing/80729'}, {'type': 'PACKAGE', 'url': 'https://github.com/rack/rack'}, {'type': 'WEB', 'url': 'https://github....
{'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-27T16:36:52Z', 'nvd_published_at': '2022-12-05T22:15:00Z'}
1.4.0
GHSA-5jm7-g527-m694
2023-08-25T21:56:45Z
2022-05-17T00:01:41Z
null
['CVE-2022-1553']
Publify exposes article metadata
Leaking password protected articles content due to improper access control in GitHub repository publify/publify prior to 9.2.8. Attackers can leverage this vulnerability to view the contents of any password-protected article present on the publify website, compromising confidentiality and integrity of users.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'publify_core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.2.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1553'}, {'type': 'WEB', 'url': 'https://github.com/publify/publify/commit/1a78f16f460847274265a12a9555b3524892d7db'}, {'type': 'PACKAGE', 'url': 'https://github.com/publify/publify/'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisor...
{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-01T21:44:51Z', 'nvd_published_at': '2022-05-16T15:15:00Z'}
1.4.0
GHSA-v936-x3j5-c76j
2022-07-01T11:58:52Z
2022-05-13T01:09:19Z
null
['CVE-2017-5656']
Session Fixation in Apache CXF
Apache CXF's STSClient before 3.1.11 and 3.0.13 uses a flawed way of caching tokens that are associated with delegation tokens, which means that an attacker could craft a token which would return an identifer corresponding to a cached token for another user.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.1.10'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf-core'}, 'ranges': ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-5656'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1832'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1694'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaab...
{'cwe_ids': ['CWE-384'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T11:58:52Z', 'nvd_published_at': '2017-04-18T16:59:00Z'}
1.4.0
GHSA-5ppx-g65v-4vfv
2023-07-31T19:10:08Z
2022-05-14T02:23:44Z
null
['CVE-2016-3296']
ChakraCore RCE Vulnerability
The Chakra JavaScript engine in Microsoft Edge allows remote attackers to execute arbitrary code via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability."
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3296'}, {'type': 'WEB', 'url': 'https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-096'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210116095719/http://www.securitytracker.com/id/1036569'}, {'type': 'WEB', 'ur...
{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T19:10:08Z', 'nvd_published_at': '2016-08-09T21:59:00Z'}
1.4.0
GHSA-x78v-4fvj-rg9j
2023-01-26T23:54:19Z
2022-05-24T22:33:54Z
null
['CVE-2021-25969']
Camaleon CMS Stored Cross-site Scripting vulnerability
In “Camaleon CMS” application, versions 0.0.1 through 2.6.0 are vulnerable to stored XSS, that allows unprivileged application users to store malicious scripts in the comments section of the post. These scripts are executed in a victim’s browser when they open the page containing the malicious comment.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'camaleon_cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.1'}, {'fixed': '2.6.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25969'}, {'type': 'WEB', 'url': 'https://github.com/owen2345/camaleon-cms/commit/05506e9087bb05282c0bae6ccfe0283d0332ab3c'}, {'type': 'PACKAGE', 'url': 'https://github.com/owen2345/camaleon-cms'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoft...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-26T23:54:19Z', 'nvd_published_at': '2021-10-20T12:15:00Z'}
1.4.0
GHSA-w3x4-9854-95x8
2023-07-25T21:57:14Z
2022-05-13T01:02:31Z
null
['CVE-2017-7297']
Rancher Access Control Vulnerability
Rancher Labs rancher server 1.2.0+ is vulnerable to authenticated users disabling access control via an API call. This is fixed in versions rancher/server:v1.2.4, rancher/server:v1.3.5, rancher/server:v1.4.3, and rancher/server:v1.5.3.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/rancher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5'}, {'fixed': '1.5.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/rancher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4'}, {'fixed': '1.4.3'}]...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7297'}, {'type': 'WEB', 'url': 'https://github.com/rancher/rancher/issues/8296'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/97180'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T21:57:14Z', 'nvd_published_at': '2017-03-29T00:59:00Z'}
1.4.0
GHSA-p9wj-wrrm-84m5
2023-07-21T23:22:08Z
2022-05-13T01:28:41Z
null
['CVE-2018-6464']
Simditor XSS Vulnerability
Simditor v2.3.11 allows XSS via crafted use of `svg/onload=alert` in a TEXTAREA element, as demonstrated by Firefox 54.0.1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'simditor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-6464'}, {'type': 'WEB', 'url': 'https://github.com/Heartway/simditor/blob/master/simditor.docx'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T23:22:08Z', 'nvd_published_at': '2018-01-31T18:29:00Z'}
1.4.0
GHSA-gg48-mpp8-cgqc
2023-07-18T15:42:42Z
2022-05-24T17:22:32Z
null
['CVE-2020-15517']
ke_search for Typo3 XSS Vulnerability
The ke_search (aka Faceted Search) extension through 2.8.2, and 3.x through 3.1.3, for TYPO3 allows XSS.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'tpwd/ke_search'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.1.3'}}, {'package': {'ecosystem': 'Packagist', 'name': 'tpwd/ke_search'}, 'ranges': [{'type': 'E...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15517'}, {'type': 'WEB', 'url': 'https://github.com/tpwd/ke_search/commit/1cde32c3ebfcb6cda5d364f099979be9741f6714'}, {'type': 'WEB', 'url': 'https://github.com/tpwd/ke_search/commit/9551aa4eef441a3e9825776d4a19ee4b6fe6f8ea'}, {'type': 'PACKAGE', '...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T15:42:42Z', 'nvd_published_at': '2020-07-07T14:15:00Z'}
1.4.0
GHSA-7c3v-2jjv-hq3c
2022-12-02T20:09:39Z
2022-05-18T00:00:42Z
null
['CVE-2022-30969']
Cross-Site Request Forgery in Jenkins Autocomplete Parameter Plugin
A cross-site request forgery (CSRF) vulnerability in Jenkins Autocomplete Parameter Plugin 1.1 and earlier allows attackers to execute arbitrary code without sandbox protection if the victim is an administrator.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:autocomplete-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30969'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/autocomplete-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2322'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-01T21:18:40Z', 'nvd_published_at': '2022-05-17T15:15:00Z'}
1.4.0
GHSA-h3v9-46pp-h33w
2022-12-02T20:17:59Z
2022-05-18T00:00:41Z
null
['CVE-2022-30964']
Cross-site Scripting in Jenkins Multiselect parameter Plugin
Jenkins Multiselect parameter Plugin 1.3 and earlier does not escape the name and description of Multiselect parameters on views displaying parameters. This results in stored cross-site scripting (XSS) vulnerabilities exploitable by attackers with Item/Configure permission. Exploitation of this vulnerability requires ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:multiselect-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30964'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/multiselect-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2717'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-01T20:55:44Z', 'nvd_published_at': '2022-05-17T15:15:00Z'}
1.4.0
GHSA-2xrc-27mc-638q
2023-08-28T22:24:52Z
2022-05-13T01:21:03Z
null
['CVE-2018-8624']
ChakraCore Remote code execution Vulnerability
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8583, CVE-2018-8617, CVE-2018-8618, CVE-2018-8...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8624'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/5869'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/8264b9bcdb08daf4309415319c7a8e03d1736dce'}, {'type': 'WEB', 'url': 'https://github.com/M...
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-28T22:24:52Z', 'nvd_published_at': '2018-12-12T00:29:00Z'}
1.4.0
GHSA-54m9-h7qp-fwvg
2023-01-05T21:46:58Z
2022-05-24T17:08:48Z
null
['CVE-2020-2133']
Password stored in plain text by Applatix Plugin
Jenkins Applatix Plugin 1.1 and earlier stores a password unencrypted in job config.xml files on the Jenkins master where it can be viewed by users with Extended Read permission, or access to the master file system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.applatix.jenkins:applatix'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2133'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/applatix-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-02-12/#SECURITY-1540'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/02...
{'cwe_ids': ['CWE-256', 'CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-05T21:46:58Z', 'nvd_published_at': '2020-02-12T15:15:00Z'}
1.4.0
GHSA-x546-xrx3-hjx4
2022-12-06T21:44:45Z
2022-05-24T16:59:37Z
null
['CVE-2019-10462']
Jenkins Dynatrace Plugin vulnerable to Cross-Site Request Forgery
A cross-site request forgery vulnerability in Jenkins Dynatrace Application Monitoring Plugin prior to 2.1.4 allows attackers to connect to an attacker-specified URL using attacker-specified credentials. ##NOTE: This plugin is marked as DEPRECATED
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:dynatrace-dashboard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10462'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/dynatrace-plugin/commit/373adaa1161d59ccd4e5e3469a9b6aeec17968ae'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/dynatrace-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.i...
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T21:44:45Z', 'nvd_published_at': '2019-10-23T13:15:00Z'}
1.4.0
GHSA-x7c8-4x3h-874w
2022-07-01T21:43:13Z
2022-05-13T01:42:26Z
null
['CVE-2017-11610']
Incorrect Default Permissions in Supervisor
The XML-RPC server in supervisor before 3.0.1, 3.1.x before 3.1.4, 3.2.x before 3.2.4, and 3.3.x before 3.3.3 allows remote authenticated users to execute arbitrary commands via a crafted XML-RPC request, related to nested supervisord namespace lookups.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'supervisor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'supervisor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.4'}]}]}, {'package': {'ecosystem...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-11610'}, {'type': 'WEB', 'url': 'https://github.com/Supervisor/supervisor/issues/964'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3005'}, {'type': 'PACKAGE', 'url': 'https://github.com/Supervisor/supervisor/'}, {'type': 'WE...
{'cwe_ids': ['CWE-276'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T21:43:13Z', 'nvd_published_at': '2017-08-23T14:29:00Z'}
1.4.0
GHSA-h7vh-6gmm-g7h9
2023-07-07T00:10:59Z
2022-05-14T03:49:58Z
null
['CVE-2017-1000467']
Stored XSS in LavaLite 5.2.4
LavaLite version 5.2.4 is vulnerable to stored cross-site scripting vulnerability, within the blog creation page, which can result in disruption of service and execution of javascript code.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'lavalite/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000467'}, {'type': 'WEB', 'url': 'https://github.com/LavaLite/cms/issues/209'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T00:10:59Z', 'nvd_published_at': '2018-01-03T15:29:00Z'}
1.4.0
GHSA-x6gm-qqwp-76gr
2022-06-02T20:14:19Z
2022-05-19T00:00:15Z
null
['CVE-2022-30597']
External Control of Assumed-Immutable Web Parameter in moodle
A flaw was found in moodle where the description user field was not hidden when being set as a hidden user field.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0'}, {'fixed': '4.0.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': [...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30597'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/670268900cca1d55a718d708ae91bda826f8b9a3'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2083585'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodl...
{'cwe_ids': ['CWE-472'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-02T20:14:19Z', 'nvd_published_at': '2022-05-18T18:15:00Z'}
1.4.0
GHSA-w24g-24qg-v4w2
2022-12-15T17:29:07Z
2022-05-24T17:45:44Z
null
['CVE-2021-21629']
CSRF vulnerability in Jenkins Build With Parameters Plugin
Build With Parameters Plugin 1.5 and earlier does not require POST requests for its form submission endpoint, resulting in a cross-site request forgery (CSRF) vulnerability. This vulnerability allows attackers to build a project with attacker-specified parameters. Build With Parameters Plugin 1.5.1 requires POST reque...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:build-with-parameters'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.5'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21629'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/build-with-parameters-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2257'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/os...
{'cwe_ids': ['CWE-352'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T17:29:07Z', 'nvd_published_at': '2021-03-30T12:16:00Z'}
1.4.0
GHSA-hhx8-cr55-qcxx
2022-06-24T14:47:43Z
2022-05-14T01:10:43Z
null
['CVE-2019-9644']
Improper Neutralization of Input During Web Page Generation in Jupyter Notebook
An XSSI (cross-site inclusion) vulnerability in Jupyter Notebook before 5.7.6 allows inclusion of resources on malicious pages when visited by users who are authenticated with a Jupyter server. Access to the content of resources has been demonstrated with Internet Explorer through capturing of error messages, though no...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'jupyter-notebook'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.7.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.7.5'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-9644'}, {'type': 'PACKAGE', 'url': 'https://github.com/jupyter/notebook'}, {'type': 'WEB', 'url': 'https://github.com/jupyter/notebook/compare/f3f00df...05aa4b2'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announ...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T14:47:43Z', 'nvd_published_at': '2019-03-12T09:29:00Z'}
1.4.0
GHSA-f3xr-q258-h7m9
2023-09-25T19:58:13Z
2022-05-24T16:58:38Z
null
['CVE-2019-17496']
Craft CMS XSS Vulnerability
Craft CMS before 3.3.8 has stored XSS via a name field. This field is mishandled during site deletion.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17496'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/commit/0ee66d29281af2b6c4f866e1437842c61983a672'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftcms/cms'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/blob/develop/...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T23:53:19Z', 'nvd_published_at': '2019-10-11T00:15:00Z'}
1.4.0
GHSA-5wqf-h3r3-gxvh
2022-07-07T23:01:36Z
2022-05-13T01:09:20Z
null
['CVE-2014-0109']
Uncontrolled Resource Consumption in Apache CXF
Apache CXF before 2.6.14 and 2.7.x before 2.7.11 allows remote attackers to cause a denial of service (memory consumption) via a large request with the Content-Type set to text/html to a SOAP endpoint, which triggers an error.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.14'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.11'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0109'}, {'type': 'WEB', 'url': 'https://cxf.apache.org/security-advisories.data/CVE-2014-0109.txt.asc?version=1&modificationDate=1398873370740&api=v2'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9...
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T23:01:36Z', 'nvd_published_at': '2014-05-08T14:29:00Z'}
1.4.0
GHSA-hr74-2j5v-ghfv
2022-12-12T21:06:35Z
2022-05-14T03:23:44Z
null
['CVE-2018-1000142']
Jenkins GitHub Pull Request Builder Plugin allows attacker with local file system access to obtain GitHub credentials
An exposure of sensitive information vulnerability exists in Jenkins GitHub Pull Request Builder Plugin version 1.39.0 and older in GhprbCause.java that allows an attacker with local file system access to obtain GitHub credentials. Since 1.40.0, the plugin no longer stores serialized objects containing the credential o...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ghprb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.40.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.39.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000142'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ghprb-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-03-26/#SECURITY-261'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T21:06:35Z', 'nvd_published_at': '2018-04-05T13:29:00Z'}
1.4.0
GHSA-cww4-vj5r-rx57
2023-02-14T00:59:09Z
2022-05-01T18:32:19Z
null
['CVE-2007-5333']
Exposure of Sensitive Information in Apache Tomcat
Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0 through 4.1.36 does not properly handle (1) double quote (") characters or (2) %5C (encoded backslash) sequences in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijackin...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.15'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.5.0'}, {'fixed': '5...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-5333'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=532111'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T00:59:09Z', 'nvd_published_at': '2008-02-12T01:00:00Z'}
1.4.0
GHSA-jwr9-h4jm-c9ch
2022-12-14T16:27:02Z
2022-05-24T17:44:48Z
null
['CVE-2021-21625']
Missing permission checks in Jenkins CloudBees AWS Credentials Plugin allows enumerating credentials IDs
CloudBees AWS Credentials Plugin 1.28 and earlier does not perform a permission check in a helper method for HTTP endpoints. This allows attackers with Overall/Read permission to enumerate credentials IDs of AWS credentials stored in Jenkins if any of the following plugins are installed: - [Amazon Elastic Container S...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:aws-credentials'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.28.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.28'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21625'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/aws-credentials-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-03-18/#SECURITY-2032'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secu...
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-14T16:27:02Z', 'nvd_published_at': '2021-03-18T14:15:00Z'}
1.4.0
GHSA-m27m-628v-xxp2
2022-07-06T20:05:20Z
2022-05-14T02:47:05Z
null
['CVE-2016-0956']
Exposure of Sensitive Information to an Unauthorized Actor in Apache Sling Servlets Post
The Servlets Post component 2.3.6 in Apache Sling, as used in Adobe Experience Manager 5.6.1, 6.0.0, and 6.1.0, allows remote attackers to obtain sensitive information via unspecified vectors.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.sling:org.apache.sling.servlets.post'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.3.6'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-0956'}, {'type': 'WEB', 'url': 'https://helpx.adobe.com/security/products/experience-manager/apsb16-05.html'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/39435/'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/135720...
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:05:20Z', 'nvd_published_at': '2016-02-10T20:59:00Z'}
1.4.0
GHSA-77hg-g8cc-5r37
2023-08-29T21:12:37Z
2022-05-14T00:56:44Z
null
['CVE-2012-1053']
Puppet Privilege Escallation
The change_user method in the SUIDManager (lib/puppet/util/suidmanager.rb) in Puppet 2.6.x before 2.6.14 and 2.7.x before 2.7.11, and Puppet Enterprise (PE) Users 1.0, 1.1, 1.2.x, 2.0.x before 2.0.3 does not properly manage group privileges, which allows local users to gain privileges via vectors related to (1) the cha...
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6'}, {'fixed': '2.6.14'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges':...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-1053'}, {'type': 'WEB', 'url': 'https://github.com/puppetlabs/puppet/commit/76d0749f0a9a496b70e7dc7e6d6d6ff692224e36'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/73445'}, {'type': 'WEB', 'url': 'https://ubuntu.com...
{'cwe_ids': ['CWE-269'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T21:12:37Z', 'nvd_published_at': '2012-05-29T20:55:00Z'}
1.4.0
GHSA-68qx-whxm-h4c4
2022-11-01T22:31:50Z
2022-05-14T02:57:33Z
null
['CVE-2018-1999041']
Exposure of sensitive information vulnerability
An exposure of sensitive information vulnerability exists in Jenkins Tinfoil Security Plugin 1.6.1 and earlier in TinfoilScanRecorder.java that allows attackers with file system access to the Jenkins master to obtain the API secret key stored in this plugin's configuration.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.tinfoilsecurity.plugins:tinfoil-scan'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1999041'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/tinfoil-scan-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-07-30/#SECURITY-840'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T22:31:50Z', 'nvd_published_at': '2018-08-01T13:29:00Z'}
1.4.0
GHSA-pwpc-hqq2-hx2x
2022-11-03T19:08:08Z
2022-05-14T00:58:28Z
null
['CVE-2017-15719']
Cross-site Scripting in wicket-jquery-ui
In Wicket jQuery UI 6.28.0 and earlier, 7.9.1 and earlier, and 8.0.0-M8 and earlier, a security issue has been discovered in the WYSIWYG editor that allows an attacker to submit arbitrary JS code to WYSIWYG editor.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.googlecode.wicket-jquery-ui:wicket-jquery-ui-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.28.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.googlecode.wicket-jquery-ui:wicket-jquery-ui-parent'}, 'ranges': [{'type': 'EC...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15719'}, {'type': 'WEB', 'url': 'https://github.com/sebfz1/wicket-jquery-ui/wiki#cve-2017-15719---xss-in-wysiwyg-editor'}, {'type': 'WEB', 'url': 'http://openmeetings.apache.org/security.html#_toc_cve-2017-15719_-_wicket_jquery_ui_xss_in_wysiwyg_e'...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T19:08:08Z', 'nvd_published_at': '2018-03-12T13:29:00Z'}
1.4.0
GHSA-p9qf-56xw-h2vj
2023-07-21T19:26:28Z
2022-05-13T01:21:02Z
null
['CVE-2018-8617']
ChakraCore RCE Vulnerability
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8583, CVE-2018-8618, CVE-2018-8624, CVE-2018-8...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8617'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/5869'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/c04787f16efe8564cd3acee7549854dc156419b2'}, {'type': 'WEB', 'url': 'https://portal.msrc....
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T19:26:28Z', 'nvd_published_at': '2018-12-12T00:29:00Z'}
1.4.0
GHSA-4qgj-9mvg-3929
2022-11-03T22:43:38Z
2022-05-14T03:15:08Z
null
['CVE-2015-5209']
Special top object can be used to access Struts' internals
ValueStack defines special top object which represents root of execution context. It can be used to manipulate Struts' internals or can be used to affect container's settings. Applying better regex which includes pattern to exclude request parameters trying to use top object. This issue was patched in Struts 2.3.24.1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.24.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5209'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20180629-0002/'}, {'type': 'WEB', 'url': 'https://struts.apache.org/docs/s2-026.html'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T22:43:38Z', 'nvd_published_at': '2017-08-29T15:29:00Z'}
1.4.0
GHSA-5889-7v45-q28m
2022-06-08T18:10:19Z
2022-05-24T22:16:29Z
null
['CVE-2022-29213']
Incomplete validation in signal ops leads to crashes in TensorFlow
### Impact The `tf.compat.v1.signal.rfft2d` and `tf.compat.v1.signal.rfft3d` lack input validation and under certain condition can result in crashes (due to `CHECK`-failures). ### Patches We have patched the issue in GitHub commit [0a8a781e597b18ead006d19b7d23d0a369e9ad73](https://github.com/tensorflow/tensorflow/com...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5889-7v45-q28m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29213'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/issues/55263'}, {'type': 'WEB', 'url': 'https://github.com/tensorf...
{'cwe_ids': ['CWE-20', 'CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:16:29Z', 'nvd_published_at': '2022-05-21T00:15:00Z'}
1.4.0
GHSA-jwg3-v9xm-v6q9
2023-08-25T21:26:33Z
2022-05-24T16:51:38Z
null
['CVE-2019-11201']
Dolibarr ERP and CRM Code Injection
Dolibarr ERP/CRM 9.0.1 provides a module named website that provides for creation of public websites with a WYSIWYG editor. It was identified that the editor also allowed inclusion of dynamic code, which can lead to code execution on the host machine. An attacker has to check a setting on the same page, which specifies...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.0.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11201'}, {'type': 'WEB', 'url': 'https://github.com/Dolibarr/dolibarr/issues/10984#issuecomment-485841141'}, {'type': 'WEB', 'url': 'https://github.com/Dolibarr/dolibarr/commit/63c0ab93fb21f86c1b736061af9fa1eee90148fd'}, {'type': 'PACKAGE', 'url': ...
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-14T22:16:25Z', 'nvd_published_at': '2019-07-29T16:15:00Z'}
1.4.0
GHSA-9523-474x-5h36
2022-11-01T22:51:21Z
2022-05-24T17:03:48Z
null
['CVE-2019-16563']
Cross site scripting in Jenkins Mission Control Plugin
Jenkins Mission Control Plugin 0.9.16 and earlier does not escape job display names and build names shown on its view, resulting in a stored XSS vulnerability exploitable by attackers able to change these properties.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'tech.andrey.jenkins:mission-control-view'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.9.16'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16563'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1592'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/12/17/1'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T22:51:21Z', 'nvd_published_at': '2019-12-17T15:15:00Z'}
1.4.0
GHSA-rqhg-cxfr-8xqw
2023-02-08T18:05:41Z
2022-05-05T02:48:48Z
null
['CVE-2013-0327']
Jenkins Cross-Site Request Forgery vulnerability
Cross-site request forgery (CSRF) vulnerability in Jenkins master in Jenkins before 1.502 and LTS before 1.480.3 allows remote attackers to hijack the authentication of users via unknown vectors.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.481'}, {'fixed': '1.502'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0327'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0638'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2013-0327'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=914875'}, {'type'...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T18:05:41Z', 'nvd_published_at': '2013-03-19T14:55:00Z'}
1.4.0
GHSA-rp82-xvg3-727c
2022-12-12T16:57:06Z
2022-05-14T03:18:40Z
null
['CVE-2018-1000173']
Jenkins Google Login Plugin Session Fixation vulnerability
A session fixaction vulnerability exists in Jenkins Google Login Plugin 1.3 and older in GoogleOAuth2SecurityRealm.java that allows unauthorized attackers to impersonate another user if they can control the pre-authentication session. Google Login Plugin 1.3.1 invalidates the previous session during login, and creates ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:google-login'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000173'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/google-login-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-04-16/'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/104210'}]
{'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T16:57:06Z', 'nvd_published_at': '2018-05-08T15:29:00Z'}
1.4.0
GHSA-6465-r752-2h8v
2022-05-24T22:35:07Z
2022-05-13T00:01:12Z
null
['CVE-2022-1682']
Cross-site Scripting in facturascripts
Reflected cross-site scripting using url based payload in GitHub repository neorazorx/facturascripts prior to 2022.08. This can lead to theft of a user's cookies, which in turn could lead to account takeover or do other malicious activities in a victim's browser.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'facturascripts/facturascripts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2022.08'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1682'}, {'type': 'WEB', 'url': 'https://github.com/neorazorx/facturascripts/commit/8e31d8434014a6d1e8791a489d84268fd74b0c9a'}, {'type': 'PACKAGE', 'url': 'https://github.com/neorazorx/facturascripts'}, {'type': 'WEB', 'url': 'https://huntr.dev/boun...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:35:07Z', 'nvd_published_at': '2022-05-12T09:15:00Z'}
1.4.0
GHSA-qp4f-2w67-c8hw
2022-12-16T22:56:05Z
2022-05-24T17:07:40Z
null
['CVE-2020-2099']
Inbound TCP Agent Protocol/3 authentication bypass in Jenkins
Jenkins 2.213 and earlier, LTS 2.204.1 and earlier includes support for the Inbound TCP Agent Protocol/3 for communication between controller and agents. While [this protocol has been deprecated in 2018](https://www.jenkins.io/changelog-old/#v2.128) and was recently removed from Jenkins in 2.214, it could still easily ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.204.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.205'},...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2099'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2020:0402'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2020:0675'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0681'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-323', 'CWE-330'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-16T22:56:05Z', 'nvd_published_at': '2020-01-29T16:15:00Z'}
1.4.0
GHSA-8g72-gq68-6gqh
2023-07-26T21:54:46Z
2022-05-14T03:49:10Z
null
['CVE-2017-1000481']
Plone Open Redirect Vulnerability
When you visit a page where you need to login, Plone 2.5-5.1rc1 sends you to the login form with a 'came_from' parameter set to the previous url. After you login, you get redirected to the page you tried to view before. An attacker might try to abuse this by letting you click on a specially crafted link. You would logi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.5-5.1rc1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000481'}, {'type': 'WEB', 'url': 'https://github.com/plone/Products.CMFPlone/issues/2232'}, {'type': 'WEB', 'url': 'https://plone.org/security/hotfix/20171128/open-redirection-on-login-form'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T21:54:46Z', 'nvd_published_at': '2018-01-03T18:29:00Z'}
1.4.0
GHSA-f9hx-5jq4-fgjm
2023-07-26T21:53:03Z
2022-05-14T01:05:59Z
null
['CVE-2017-1000499']
phpMyAdmin CSRF Vulnerability
phpMyAdmin versions 4.7.x (prior to 4.7.6.1/4.7.7) are vulnerable to a CSRF weakness. By deceiving a user to click on a crafted URL, it is possible to perform harmful database operations such as deleting records, dropping/truncating tables etc.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.7'}, {'fixed': '4.7.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000499'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201208204518/http://www.securitytracker.com/id/1040163'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/45284/'}, {'type': 'WEB', 'url': 'https://www.phpmyadmin.net/secu...
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T21:53:03Z', 'nvd_published_at': '2018-01-03T14:29:00Z'}
1.4.0
GHSA-hffm-fqv4-w27r
2022-07-13T18:29:02Z
2022-05-14T01:17:03Z
null
['CVE-2011-5063']
Improper Authentication in Apache Tomcat
The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 does not check realm values, which might allow remote attackers to bypass intended access restrictions by leveraging the availability of a protection space with weaker authentication or au...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.5.0'}, {'fixed': '5.5.34'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-5063'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'htt...
{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T18:29:02Z', 'nvd_published_at': '2012-01-14T21:55:00Z'}
1.4.0
GHSA-5pmp-7wc9-v7vw
2022-12-02T20:20:48Z
2022-05-18T00:00:41Z
null
['CVE-2022-30963']
Cross-site Scripting in Jenkins JDK Parameter Plugin
Jenkins JDK Parameter Plugin 1.0 and earlier does not escape the name and description of JDK parameters on views displaying parameters. This results in stored cross-site scripting (XSS) vulnerabilities exploitable by attackers with Item/Configure permission. Exploitation of this vulnerability requires that parameters ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:JDK_Parameter_Plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30963'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/JDK_Parameter_Plugin-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2717'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-01T21:26:09Z', 'nvd_published_at': '2022-05-17T15:15:00Z'}
1.4.0
GHSA-vmhj-p9hw-vgrf
2023-02-08T18:07:43Z
2022-05-24T17:08:34Z
null
['CVE-2020-1726']
Podman has Files or Directories Accessible to External Parties
A flaw was discovered in Podman where it incorrectly allows containers when created to overwrite existing files in volumes, even if they are mounted as read-only. When a user runs a malicious container or a container based on a malicious image with an attached volume that is used for the first time, it is possible to t...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/containers/podman'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '2.0.6'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/containers/podman/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1726'}, {'type': 'WEB', 'url': 'https://github.com/containers/podman/commit/c140ecdc9b416ab4efd4d21d14acd63b6adbdd42'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0680'}, {'type': 'WEB', 'url': 'https://access.redhat.com/err...
{'cwe_ids': ['CWE-552'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T18:07:43Z', 'nvd_published_at': '2020-02-11T20:15:00Z'}
1.4.0
GHSA-3vm4-22fp-5rfm
2023-07-12T20:45:53Z
2022-05-24T22:01:25Z
null
['CVE-2020-29652']
golang.org/x/crypto/ssh NULL Pointer Dereference vulnerability
A nil pointer dereference in the golang.org/x/crypto/ssh component through v0.0.0-20201203163018-be400aefbc4c for Go allows remote attackers to cause a denial of service against SSH servers. An attacker can craft an authentication request message for the `gssapi-with-mic` method which will cause NewServerConn to panic ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'golang.org/x/crypto/ssh'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20201216223049-8b5274cf687f'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'golang.org/x/crypto'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fix...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-29652'}, {'type': 'WEB', 'url': 'https://go-review.googlesource.com/c/crypto/+/278852'}, {'type': 'WEB', 'url': 'https://go.dev/cl/278852'}, {'type': 'WEB', 'url': 'https://go.googlesource.com/crypto/+/8b5274cf687fd9316b4108863654cc57385531e8'}, {'...
{'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T00:29:05Z', 'nvd_published_at': '2020-12-17T05:15:00Z'}
1.4.0
GHSA-3p87-gqw8-4pf2
2023-07-24T20:49:09Z
2022-05-14T01:45:29Z
null
['CVE-2018-19621']
Showdoc CSRF Vulnerability
`server/index.php?s=/api/teamMember/save` in ShowDoc 2.4.2 has a CSRF that can add members to a team.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19621'}, {'type': 'WEB', 'url': 'https://github.com/CCCCCrash/POCs/tree/master/Web/showdoc/csrf'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-24T20:49:09Z', 'nvd_published_at': '2018-11-28T08:29:00Z'}
1.4.0
GHSA-f8pg-wp5j-rjxx
2023-08-29T21:35:55Z
2022-05-17T04:32:26Z
null
['CVE-2012-5491']
Plone Information Disclosure
`z3c.form`, as used in Plone before 4.2.3 and 4.3 before beta 1, allows remote attackers to obtain the default form field values by leveraging knowledge of the form location and the element id.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'E...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-5491'}, {'type': 'WEB', 'url': 'https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt'}, {'type': 'WEB', 'url': 'https://plone.org/products/plone-hotfix/releases/20121106'}, {'type': 'WEB', 'url': 'https://plone.org/products/plone/...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T21:35:55Z', 'nvd_published_at': '2014-09-30T14:55:00Z'}
1.4.0
GHSA-mf7c-35mq-75pj
2022-07-06T19:45:49Z
2022-05-14T03:24:59Z
null
['CVE-2016-6811']
Insecure Inherited Permissions in Apache Hadoop
In Apache Hadoop 2.x before 2.7.4, a user who can escalate to yarn user can possibly run arbitrary commands as root user.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-alpha'}, {'fixed': '2.7.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6811'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/9ba3c12bbdfd5b2cae60909e48f92608e00c8d99196390b8cfeca307@%3Cgeneral.hadoop.apache.org%3E'}]
{'cwe_ids': ['CWE-277'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:45:49Z', 'nvd_published_at': '2017-04-11T14:59:00Z'}
1.4.0
GHSA-485q-v457-3p58
2022-12-22T13:49:20Z
2022-05-24T17:33:09Z
null
['CVE-2020-2318']
Passwords stored in plain text by Mail Commander Plugin for Jenkins-ci Plugin
Jenkins Mail Commander Plugin for Jenkins-ci Plugin 1.0.0 and earlier stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:mailcommander'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2318'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/mail-commander-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-11-04/#SECURITY-2085'}]
{'cwe_ids': ['CWE-256', 'CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T13:49:20Z', 'nvd_published_at': '2020-11-04T15:15:00Z'}
1.4.0
GHSA-6vvc-c2m3-cjf3
2023-01-26T23:53:52Z
2022-05-17T19:57:29Z
null
['CVE-2014-9390']
JGit Improper Input Validation vulnerability
Git before 1.8.5.6, 1.9.x before 1.9.5, 2.0.x before 2.0.5, 2.1.x before 2.1.4, and 2.2.x before 2.2.1 on Windows and OS X; Mercurial before 3.2.3 on Windows and OS X; Apple Xcode before 6.2 beta 3; mine; libgit2; Egit; and JGit allow remote Git servers to execute arbitrary commands via a tree containing a crafted .git...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jgit:org.eclipse.jgit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-9390'}, {'type': 'WEB', 'url': 'https://github.com/libgit2/libgit2/commit/928429c5c96a701bcbcafacb2421a82602b36915'}, {'type': 'WEB', 'url': 'https://github.com/blog/1938-git-client-vulnerability-announced'}, {'type': 'WEB', 'url': 'https://libgit2...
{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-26T23:53:52Z', 'nvd_published_at': '2020-02-12T02:15:00Z'}
1.4.0
GHSA-r2pg-w96p-pcpj
2023-07-31T19:39:55Z
2022-05-17T02:40:59Z
null
['CVE-2016-5004']
ws-xmlrpc DoS Vulnerability
The Content-Encoding HTTP header feature in ws-xmlrpc 3.1.3 as used in Apache Archiva allows remote attackers to cause a denial of service (resource consumption) by decompressing a large file containing zeroes.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.xmlrpc:xmlrpc-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-5004'}, {'type': 'WEB', 'url': 'https://0ang3el.blogspot.in/2016/07/beware-of-ws-xmlrpc-library-in-your.html'}, {'type': 'WEB', 'url': 'https://github.com/0ang3el/unsafe-xmlrpc'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2...
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T19:39:55Z', 'nvd_published_at': '2017-06-06T18:29:00Z'}
1.4.0
GHSA-cf8f-w2c5-p5jr
2022-09-12T16:51:57Z
2022-05-24T17:05:43Z
null
['CVE-2019-14837']
keycloak vulnerable to unauthorized login via mail server setup
A flaw was found in keycloack before version 8.0.0. The owner of 'placeholder.org' domain can setup mail server on this domain and knowing only name of a client can reset password and then log in. For example, for client name 'test' the email address will be 'service-account-test@placeholder.org'.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14837'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/commit/9a7c1a91a59ab85e7f8889a505be04a71580777f'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14837'}, {'type': 'PACKAGE', 'url': 'https://githu...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-12T16:51:57Z', 'nvd_published_at': '2020-01-07T17:15:00Z'}
1.4.0
GHSA-j65f-mvgw-prp2
2022-07-08T19:03:11Z
2022-05-14T03:30:19Z
null
['CVE-2013-1768']
Deserialization of Untrusted Data in Apache OpenJPA
The BrokerFactory functionality in Apache OpenJPA 1.x before 1.2.3 and 2.x before 2.2.2 creates local executable JSP files containing logging trace data produced during deserialization of certain crafted OpenJPA objects, which makes it easier for remote attackers to execute arbitrary code by creating a serialized objec...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.openjpa:openjpa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.2.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.openjpa:openjpa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed':...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1768'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/82268'}, {'type': 'WEB', 'url': 'http://archives.neohapsis.com/archives/fulldisclosure/2013-06/0099.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RH...
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T19:03:11Z', 'nvd_published_at': '2013-07-11T22:55:00Z'}
1.4.0
GHSA-78vv-qj73-h9m5
2022-07-01T16:57:07Z
2022-05-13T01:14:24Z
null
['CVE-2017-5644']
Improper Restriction of Recursive Entity References in DTDs in Apache POI
Apache POI in versions prior to release 3.15 allows remote attackers to cause a denial of service (CPU consumption) via a specially crafted OOXML file, aka an XML Entity Expansion (XEE) attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.poi:poi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.15'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-5644'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'http://poi.apache.org/#20+March+2017+-+CVE-2017-5644+-+Possible+DOS+%28Denial+of+Service%29+in+Apache+POI+versions+prior+to+3.15'}, {'...
{'cwe_ids': ['CWE-776'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T16:57:07Z', 'nvd_published_at': '2017-03-24T14:59:00Z'}
1.4.0
GHSA-6xxf-rwv4-mrjm
2023-01-05T20:18:11Z
2022-05-24T17:10:27Z
null
['CVE-2020-2137']
Stored XSS vulnerability in Jenkins Timestamper Plugin
Timestamper Plugin 1.11.1 and earlier does not escape or sanitize the HTML formatting used to display the timestamps in console output for builds. This results in a stored cross-site scripting vulnerability that can be exploited by users with Overall/Administer permission. Timestamper Plugin 1.11.2 sanitizes the HTML...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:timestamper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.11.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2137'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/timestamper-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-03-09/#SECURITY-1784'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-05T20:18:11Z', 'nvd_published_at': '2020-03-09T16:15:00Z'}
1.4.0
GHSA-q4q2-fvwf-6ghv
2022-11-04T18:41:35Z
2022-05-13T01:36:16Z
null
['CVE-2017-7556']
Cross-Site Request Forgery in hawtio
It was found that hawtio contains a CSRF flaw that allows unrelated websites to perform actions as the authenticated user. Attackers could use this vulnerability to trick the user to visit his website that contains a malicious script which can be submitted to hawtio server on behalf of the user.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.hawt:project'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7556'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1480060'}, {'type': 'PACKAGE', 'url': 'https://github.com/hawtio/hawtio'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-04T18:41:35Z', 'nvd_published_at': '2017-08-17T19:29:00Z'}
1.4.0
GHSA-99xx-83jm-h24m
2023-08-23T13:39:25Z
2022-05-24T17:38:37Z
null
['CVE-2020-35459']
ClusterLabs crmsh vulnerable to shell code injection
An issue was discovered in ClusterLabs crmsh through 4.2.1. Local attackers able to call `crm history` (when `crm` is run) were able to execute commands via shell code injection to the crm history commandline, potentially allowing escalation of privileges.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'crmsh'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35459'}, {'type': 'WEB', 'url': 'https://bugzilla.suse.com/show_bug.cgi?id=1179999'}, {'type': 'PACKAGE', 'url': 'https://github.com/ClusterLabs/crmsh'}, {'type': 'WEB', 'url': 'https://github.com/ClusterLabs/crmsh/blob/a403aa15f3ea575adfe5e43bf2a3...
{'cwe_ids': ['CWE-269', 'CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T22:35:36Z', 'nvd_published_at': '2021-01-12T15:15:00Z'}
1.4.0
GHSA-f3mv-g3xr-fp7w
2023-08-29T18:02:19Z
2022-05-17T03:28:57Z
null
['CVE-2013-4271']
Restlet Arbitrary Java Code Execution via a serialized object
The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources, which allows remote attackers to execute arbitrary Java code via a serialized object, a different vulnerability than CVE-2013-4221.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.restlet.jse:org.restlet'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4271'}, {'type': 'WEB', 'url': 'https://github.com/restlet/restlet-framework-java/issues/778'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=999735'}, {'type': 'PACKAGE', 'url': 'https://github.com/restlet/restlet-framework-j...
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T18:02:19Z', 'nvd_published_at': '2013-10-10T00:55:00Z'}
1.4.0
GHSA-438x-2p9v-g8h9
2023-03-01T18:56:46Z
2022-05-24T22:28:10Z
null
['CVE-2021-25970']
Camaleon CMS Insufficient Session Expiration vulnerability
Camaleon CMS 0.1.7 through 2.6.0 doesn’t terminate the active session of the users, even after the admin changes the user’s password. A user that was already logged in, will still have access to the application even after the password was changed. Resolved in commit `77e31bc6cdde7c951fba104aebcd5ebb3f02b030` which is i...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'camaleon_cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.7'}, {'fixed': '2.6.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25970'}, {'type': 'WEB', 'url': 'https://github.com/owen2345/camaleon-cms/commit/77e31bc6cdde7c951fba104aebcd5ebb3f02b030'}, {'type': 'PACKAGE', 'url': 'https://github.com/owen2345/camaleon-cms'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/...
{'cwe_ids': ['CWE-613'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-24T15:59:43Z', 'nvd_published_at': '2021-10-20T12:15:00Z'}
1.4.0
GHSA-vmq9-cm7m-4p8p
2023-09-08T21:17:28Z
2022-05-14T02:01:21Z
null
['CVE-2018-1000665']
Improper Neutralization of Input During Web Page Generation in Dojo Dojo Objective Harness
Dojo Dojo Objective Harness (DOH) version prior to version 1.14 contains a Cross Site Scripting (XSS) vulnerability in `unit.html` and `testsDOH/_base/loader/i18n-exhaustive/i18n-test/unit.html` and `testsDOH/_base/i18nExhaustive.js` in the DOH that can result in Victim attacked through their browser - deliver malware,...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.dojotoolkit:dojo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.14'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000665'}, {'type': 'WEB', 'url': 'https://github.com/dojo/dojo/pull/307'}, {'type': 'WEB', 'url': 'https://dojotoolkit.org/blog/dojo-1-14-released'}, {'type': 'PACKAGE', 'url': 'https://github.com/dojo/dojo'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-30T15:59:42Z', 'nvd_published_at': '2018-09-06T17:29:00Z'}
1.4.0
GHSA-m2h2-264f-f486
2022-05-04T20:12:02Z
2022-05-03T00:00:44Z
null
['CVE-2022-25844']
angular vulnerable to regular expression denial of service (ReDoS)
AngularJS lets users write client-side web applications. The package angular after 1.7.0 is vulnerable to Regular Expression Denial of Service (ReDoS) by providing a custom locale rule that makes it possible to assign the parameter in posPre: ' '.repeat() of NUMBER_FORMATS.PATTERNS[1].posPre with a very high value. **...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'angular'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25844'}, {'type': 'PACKAGE', 'url': 'https://github.com/angular/angular.js'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2WUSPYOTOMAZPDEFPWPSCSPMNODRDKK3/'}, {'type': 'WEB'...
{'cwe_ids': ['CWE-1333', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-04T20:12:02Z', 'nvd_published_at': '2022-05-01T16:15:00Z'}