schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 8 154 | details stringlengths 31 19.1k | severity stringlengths 2 92 | affected stringlengths 75 28.5k | references stringlengths 79 7.48k | database_specific stringlengths 131 196 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-5fj8-wh3g-qvq2 | 2023-08-29T19:02:14Z | 2022-05-17T04:54:37Z | null | ['CVE-2013-7080'] | TYPO3 is vulnerable to Mass Assignment in the Extension table administration library | The creating record functionality in Extension table administration library (feuser_adminLib.inc) in TYPO3 4.5.0 through 4.5.31, 4.7.0 through 4.7.16, and 6.0.0 through 6.0.11 allows remote attackers to write to arbitrary fields in the configuration database table via crafted links, aka "Mass Assignment." | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.5.0'}, {'fixed': '4.5.31'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ecosystem_specific': {'affected_function... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7080'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3-CMS/core'}, {'type': 'WEB', 'url': 'http://seclists.org/oss-sec/2013/q4/473'}, {'type': 'WEB', 'url': 'http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-004... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T19:02:14Z', 'nvd_published_at': '2013-12-23T23:55:00Z'} |
1.4.0 | GHSA-v723-58jv-2qc4 | 2022-07-07T23:18:33Z | 2022-05-13T01:04:00Z | null | ['CVE-2013-6440'] | Exposure of Sensitive Information to an Unauthorized Actor in OpenSAML | The (1) BasicParserPool, (2) StaticBasicParserPool, (3) XML Decrypter, and (4) SAML Decrypter in Shibboleth OpenSAML-Java before 2.6.1 set the expandEntityReferences property to true, which allows remote attackers to conduct XML external entity (XXE) attacks via a crafted XML DOCTYPE declaration. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.opensaml:opensaml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-6440'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1043332'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2022.html'}, {'type': 'WEB', 'url': 'http://blog.sendsafely.com/post/69590974866/web-based-s... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T23:18:33Z', 'nvd_published_at': '2014-02-14T15:55:00Z'} |
1.4.0 | GHSA-567r-vqj7-5cw7 | 2023-07-31T19:54:22Z | 2022-05-17T02:37:14Z | null | ['CVE-2016-6629'] | phpMyAdmin Authentication Bypass | An issue was discovered in phpMyAdmin involving the `$cfg['ArbitraryServerRegexp']` configuration directive. An attacker could reuse certain cookie values in a way of bypassing the servers defined by ArbitraryServerRegexp. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prio... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.6'}, {'fixed': '4.6.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4'}, {'fixed': '4.4.... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6629'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201701-32'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210725054025/http://www.securityfocus.com/bid/92493'}, {'type': 'WEB', 'url': 'https://www.phpmyadmin.net/security/P... | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T19:54:22Z', 'nvd_published_at': '2016-12-11T02:59:00Z'} |
1.4.0 | GHSA-qqjv-mc2v-p7mc | 2023-07-22T00:11:12Z | 2022-05-14T00:55:53Z | null | ['CVE-2018-1042'] | Moodle SSRF Vulnerability | Moodle 3.x has Server Side Request Forgery in the filepicker. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.4'}, {'fixed': '3.4.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': [... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1042'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/f1d1a60e0ac8549c08e66062f3cd0110e4a92e24'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=364381'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/202... | {'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-22T00:11:12Z', 'nvd_published_at': '2018-01-22T08:29:00Z'} |
1.4.0 | GHSA-hxj4-885f-grgp | 2023-08-23T13:34:10Z | 2022-05-24T17:30:10Z | null | ['CVE-2020-25644'] | Wildfly-OpenSSL memory leak flaw | A memory leak flaw was found in WildFly OpenSSL in versions prior to 1.1.3.Final, where it removes an HTTP session. It may allow the attacker to cause OOM leading to a denial of service. The highest threat from this vulnerability is to system availability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.wildfly.openssl:wildfly-openssl-natives-parent'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.3.Final'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25644'}, {'type': 'WEB', 'url': 'https://github.com/wildfly-security/wildfly-openssl-natives/pull/4'}, {'type': 'WEB', 'url': 'https://github.com/wildfly-security/wildfly-openssl-natives/commit/7c26514676f3fb0dee0bcaa7d4680f982372950f'}, {'type': '... | {'cwe_ids': ['CWE-401'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T23:13:57Z', 'nvd_published_at': '2020-10-06T14:15:00Z'} |
1.4.0 | GHSA-p9jg-9w87-6rg4 | 2023-08-28T23:35:04Z | 2022-05-17T04:43:27Z | null | ['CVE-2013-4320'] | TYPO3 Improper Access Management in the File Abstraction Layer | The File Abstraction Layer (FAL) in TYPO3 6.0.x before 6.0.9 and 6.1.x before 6.1.4 does not properly check permissions, which allows remote authenticated users to create or read arbitrary files via a crafted URL. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0'}, {'fixed': '6.0.9'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ecosystem_specific': {'affected_functions':... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4320'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3-CMS/core'}, {'type': 'WEB', 'url': 'https://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2013-003/'}] | {'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-28T23:35:04Z', 'nvd_published_at': '2014-05-20T14:55:00Z'} |
1.4.0 | GHSA-47vg-483w-hp3m | 2022-06-06T17:58:46Z | 2022-05-25T00:00:31Z | null | ['CVE-2022-1849'] | Improper user session handling in filegator | FileGator prior to version 7.8.0 is vulnerable to session fixation. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'filegator/filegator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.8.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1849'}, {'type': 'WEB', 'url': 'https://github.com/filegator/filegator/commit/fcd3995f64f5dfc6a4c2c059cc22a2fef1e81225'}, {'type': 'PACKAGE', 'url': 'https://github.com/filegator/filegator'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/881f8... | {'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T22:44:17Z', 'nvd_published_at': '2022-05-24T16:15:00Z'} |
1.4.0 | GHSA-xgcp-59g2-wm8g | 2023-09-26T19:14:05Z | 2022-05-24T17:00:26Z | null | ['CVE-2019-8136'] | Magento 2 Community Edition Insecure Component | An insecure component vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. Magento 2 codebase leveraged outdated versions of HTTP specification abstraction implemented in symphony component. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8136'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051105/https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T18:05:56Z', 'nvd_published_at': '2019-11-06T00:15:00Z'} |
1.4.0 | GHSA-c92w-72c5-9x59 | 2023-02-08T00:31:28Z | 2022-05-24T17:00:21Z | null | ['CVE-2019-10223'] | kube-state-metrics may expose secret content in metrics | A security issue was discovered in the kube-state-metrics versions v1.7.0 and v1.7.1. An experimental feature was added to the v1.7.0 release that enabled annotations to be exposed as metrics. By default, the kube-state-metrics metrics only expose metadata about Secrets. However, a combination of the default `kubectl` ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'k8s.io/kube-state-metrics'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.7.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10223'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kube-state-metrics/commit/03122fe3e2df49a9a7298b8af921d3c37c430f7f'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10223'}, {'type': 'PACKAGE', 'url': 'h... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T00:31:28Z', 'nvd_published_at': '2019-11-05T12:15:00Z'} |
1.4.0 | GHSA-5jxp-4x68-mhqc | 2023-07-21T22:58:58Z | 2022-05-14T00:55:28Z | null | ['CVE-2018-19312'] | Centreon SQL Injection | Centreon 3.4.x (fixed in Centreon 18.10.0 and Centreon web 2.8.24) allows SQL Injection via the searchVM parameter to the main.php?p=20408 URI. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '18.0.0'}, {'fixed': '18.10.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ecosystem_specific': {'affected_... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19312'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon-archived/pull/6257'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon-archived/pull/6628'}, {'type': 'WEB', 'url': 'https://documentation.centreon.com/docs/centreon/... | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T22:58:58Z', 'nvd_published_at': '2018-11-16T19:29:00Z'} |
1.4.0 | GHSA-2jxh-3cx8-xw65 | 2022-07-28T15:28:00Z | 2022-05-01T06:38:20Z | null | ['CVE-2006-0254'] | Apache Geronimo console 1.0 vulnerable to cross-site scripting | Multiple cross-site scripting (XSS) vulnerabilities in Apache Geronimo 1.0 allow remote attackers to inject arbitrary web script or HTML via the (1) time parameter to cal2.jsp and (2) any invalid parameter, which causes an XSS when the log file is viewed by the Web-Access-Log viewer. Version 1.1 contains fixes for thes... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'geronimo:geronimo-console-standard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2006-0254'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/24158'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/24159'}, {'type': 'WEB', 'url': 'https://geronimo.apache.org/GMOxDOC11/releas... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-28T15:28:00Z', 'nvd_published_at': '2006-01-18T01:51:00Z'} |
1.4.0 | GHSA-5p59-v5wm-77v4 | 2022-06-28T23:52:17Z | 2022-05-13T01:01:01Z | null | ['CVE-2018-6356'] | Improper Limitation of a Pathname to a Restricted Directory in Jenkins | Jenkins before 2.107 and Jenkins LTS before 2.89.4 did not properly prevent specifying relative paths that escape a base directory for URLs accessing plugin resource files. This allowed users with Overall/Read permission to download files from the Jenkins master they should not have access to. On Windows, any file acce... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.89.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.90'}, {... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-6356'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-02-14/'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2018/02/14/1'},... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T23:52:17Z', 'nvd_published_at': '2018-02-20T15:29:00Z'} |
1.4.0 | GHSA-4pjx-86pg-x4j5 | 2022-12-12T17:10:16Z | 2022-05-14T03:07:02Z | null | ['CVE-2018-1000602'] | Jenkins SAML Plugin Session Fixation vulnerability | A session fixation vulnerability exists in Jenkins SAML Plugin 1.0.6 and earlier in SamlSecurityRealm.java that allows unauthorized attackers to impersonate another users if they can control the pre-authentication session. SAML Plugin 1.0.7 invalidates the previous session during login and creates a new one. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:saml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.6'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000602'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/saml-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-06-25/#SECURITY-916'}] | {'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T17:10:16Z', 'nvd_published_at': '2018-06-26T17:29:00Z'} |
1.4.0 | GHSA-42j3-498q-m6vp | 2022-07-07T22:52:25Z | 2022-05-14T01:10:18Z | null | ['CVE-2014-0227'] | Improper Input Validation in Apache Tomcat | java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat 6.x before 6.0.42, 7.x before 7.0.55, and 8.x before 8.0.9 does not properly handle attempts to continue reading data after an error has occurred, which allows remote attackers to conduct HTTP request smuggling attacks or cause a denial of s... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.42'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0227'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1109196'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WE... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T22:52:25Z', 'nvd_published_at': '2015-02-16T00:59:00Z'} |
1.4.0 | GHSA-qf8x-vqjv-92gr | 2022-06-02T17:39:42Z | 2022-05-04T18:59:46Z | null | ['CVE-2022-24901'] | Authentication bypass and denial of service (DoS) vulnerabilities in Apple Game Center auth adapter | ### Impact
Weak validation of the Apple certificate URL in the Apple Game Center authentication adapter allows to bypass authentication and makes the server vulnerable to DoS attacks.
### Patches
The vulnerability has been fixed by improving the URL validation and adding additional checks of the resource the URL point... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.10.10'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/security/advisories/GHSA-qf8x-vqjv-92gr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24901'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/commit/af4a0417a9f3c1e99b3793806b4b18e04d9fa999'}, {... | {'cwe_ids': ['CWE-287', 'CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-04T18:59:46Z', 'nvd_published_at': '2022-05-04T01:15:00Z'} |
1.4.0 | GHSA-6pcv-qqx4-mxm3 | 2023-07-21T21:47:33Z | 2022-05-13T01:35:04Z | null | ['CVE-2018-1002103'] | Minikube RCE via DNS Rebinding | In Minikube versions 0.3.0-0.29.0, minikube exposes the Kubernetes Dashboard listening on the VM IP at port 30000. In VM environments where the IP is easy to predict, the attacker can use DNS rebinding to indirectly make requests to the Kubernetes Dashboard, create a new Kubernetes Deployment running arbitrary code. If... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'k8s.io/minikube'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.0'}, {'last_affected': '0.29.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1002103'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/minikube/issues/3208'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T21:47:33Z', 'nvd_published_at': '2018-12-05T21:29:00Z'} |
1.4.0 | GHSA-4jjw-xrr6-9v3p | 2023-08-22T23:30:03Z | 2022-05-01T18:45:22Z | null | ['CVE-2007-6672'] | Mortbay Jetty Double Slash URI Information Disclosure Vulnerability | Mortbay Jetty 6.1.5 and 6.1.6 allows remote attackers to bypass protection mechanisms and read the source of files via multiple `/` (slash) characters in the URI. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.mortbay.jetty:jetty'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.1.5'}, {'fixed': '6.1.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.1.6'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-6672'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20080113051254/http://www.kb.cert.org/vuls/id/553235'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20080120225723/http://jira.codehaus.org/browse/JETTY-386'}, {'type': 'WEB', 'url... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-22T23:30:03Z', 'nvd_published_at': '2008-01-08T11:46:00Z'} |
1.4.0 | GHSA-cpp8-r8pr-wv4v | 2023-08-16T22:45:20Z | 2022-05-17T00:24:06Z | null | ['CVE-2014-0115'] | Apache Storm log viewer path traversal vulnerability | Directory traversal vulnerability in the log viewer in Apache Storm 0.9.0.1 allows remote attackers to read arbitrary files via a `..` (dot dot) in the file parameter to log. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.storm:storm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.9.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0115'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/STORM-269'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/storm-dev/201404.mbox/%3CJIRA.12704141.1395964296891.201561.1398799995645@arcas%3E'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T22:45:20Z', 'nvd_published_at': '2017-10-30T16:29:00Z'} |
1.4.0 | GHSA-mx2h-hf7j-2x3p | 2022-07-06T20:08:28Z | 2022-05-17T03:59:03Z | null | ['CVE-2015-8795'] | Improper Neutralization of Input During Web Page Generation in Apache Solr | Multiple cross-site scripting (XSS) vulnerabilities in the Admin UI in Apache Solr before 5.1 allow remote attackers to inject arbitrary web script or HTML via crafted fields that are mishandled during the rendering of the (1) Analysis page, related to webapp/web/js/scripts/analysis.js or (2) Schema-Browser page, relat... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8795'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/SOLR-7346'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:08:28Z', 'nvd_published_at': '2016-02-15T02:59:00Z'} |
1.4.0 | GHSA-vmhh-xh3g-j992 | 2022-06-08T17:31:04Z | 2022-05-25T22:40:57Z | null | ['CVE-2022-29251'] | Cross-site Scripting in the Flamingo theme manager | ### Impact
We found a possible XSS vector in the `FlamingoThemesCode.WebHomeSheet` wiki page related to the "newThemeName" form field.
### Patches
The issue is patched in versions 12.10.11, 14.0-rc-1, 13.4.7, 13.10.3.
### Workarounds
The easiest workaround is to edit the wiki page `FlamingoThemesCode.WebHomeSheet` (... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-flamingo-theme-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.10.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-flamingo-theme-ui'}, 'ranges': [{'type': 'ECOSYSTE... | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-vmhh-xh3g-j992'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29251'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/bd935320bee3c27cf7548351b1d0f935f116d437'}, {'type': 'PACKAGE... | {'cwe_ids': ['CWE-116', 'CWE-79', 'CWE-80'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T22:40:57Z', 'nvd_published_at': '2022-05-25T21:15:00Z'} |
1.4.0 | GHSA-86vm-8m4p-6263 | 2022-11-22T19:26:44Z | 2022-05-14T03:06:10Z | null | ['CVE-2018-13003'] | OpenTSDB Cross-site Scripting vulnerability | An issue was discovered in OpenTSDB 2.3.0. There is XSS in parameter `type` to the /suggest URI. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'net.opentsdb:opentsdb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-13003'}, {'type': 'WEB', 'url': 'https://github.com/OpenTSDB/opentsdb/issues/1241'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenTSDB/opentsdb'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T19:26:44Z', 'nvd_published_at': '2018-06-29T14:29:00Z'} |
1.4.0 | GHSA-7m2w-9gw7-c3xp | 2023-07-03T23:13:40Z | 2022-05-13T01:13:48Z | null | ['CVE-2015-3649'] | open-uri-cached Gem for Ruby Unsafe Temporary File Creation Enables Code Execution | The open-uri-cached rubygem allows local users to execute arbitrary Ruby code by creating a directory under /tmp containing "openuri-" followed by a crafted UID, and putting Ruby code in said directory once a metafile is created. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'open-uri-cached'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3649'}, {'type': 'WEB', 'url': 'https://github.com/tigris/open-uri-cached/issues/8'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/open-uri-cached/CVE-2015-3649.yml'}, {'type': 'PACKAGE', 'url': 'https://gith... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T23:05:43Z', 'nvd_published_at': '2017-08-18T16:29:00Z'} |
1.4.0 | GHSA-6x4f-5v4h-r29j | 2023-09-28T20:18:07Z | 2022-05-13T01:21:17Z | null | ['CVE-2019-0567'] | ChakraCore RCE Vulnerability | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2019-0539, CVE-2019-0568. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0567'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/788f17b0ce06ea84553b123c174d1ff7052112a0'}, {'type': 'PACKAGE', 'url': 'https://github.com/chakra-core/ChakraCore'}, {'type': 'WEB', 'url': 'https://portal.msrc.micros... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T20:22:19Z', 'nvd_published_at': '2019-01-08T21:29:00Z'} |
1.4.0 | GHSA-r5x3-2446-hrp7 | 2022-07-01T21:46:30Z | 2022-05-14T03:45:22Z | null | ['CVE-2017-1000503'] | Race Condition in Jenkins | A race condition during Jenkins 2.81 through 2.94 (inclusive); 2.89.1 startup could result in the wrong order of execution of commands during initialization. This could in rare cases result in failure to initialize the setup wizard on the first startup. This resulted in multiple security-related settings not being set ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.81'}, {'fixed': '2.89.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.89.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-c... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000503'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2017-12-14/'}] | {'cwe_ids': ['CWE-362'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T21:46:30Z', 'nvd_published_at': '2018-01-24T23:29:00Z'} |
1.4.0 | GHSA-pv4c-rj4h-gr9m | 2022-11-22T19:09:12Z | 2022-05-24T17:03:48Z | null | ['CVE-2019-16573'] | Jenkins Alauda DevOps Pipeline Plugin vulnerable to cross-site request forgery | A cross-site request forgery vulnerability in Jenkins Alauda DevOps Pipeline Plugin 2.3.2 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.alauda.jenkins.plugins:alauda-devops-pipeline'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16573'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1600'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/12/17/1'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T19:09:12Z', 'nvd_published_at': '2019-12-17T15:15:00Z'} |
1.4.0 | GHSA-hmhq-382q-mp56 | 2022-11-03T22:53:33Z | 2022-05-14T00:54:14Z | null | ['CVE-2014-0116'] | ClassLoader manipulation in Apache Struts | CookieInterceptor in Apache Struts 2.x before 2.3.20, when a wildcard cookiesName value is used, does not properly restrict access to the getClass method, which allows remote attackers to "manipulate" the ClassLoader and modify session state via a crafted request. NOTE: this vulnerability exists because of an incomplet... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.20'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0116'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/struts'}, {'type': 'WEB', 'url': 'http://struts.apache.org/release/2.3.x/docs/s2-022.html'}, {'type': 'WEB', 'url': 'http://www.huawei.com/en/security/psirt/security-bulletins/security-a... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T22:53:33Z', 'nvd_published_at': '2014-05-08T10:55:00Z'} |
1.4.0 | GHSA-qg66-xv7v-m834 | 2022-12-29T01:42:04Z | 2022-05-24T17:28:25Z | null | ['CVE-2020-2259'] | Stored XSS vulnerability in computer-queue-plugin Plugin | computer-queue-plugin Plugin 1.5 and earlier does not escape the agent name in tooltips.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Agent/Configure permission.
computer-queue-plugin Plugin 1.6 escapes the agent name in tooltips. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'jenkins.ci.plugins.computerqueue:computer-queue-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.5'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2259'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/computer-queue-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1912'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-securi... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-29T01:42:04Z', 'nvd_published_at': '2020-09-16T14:15:00Z'} |
1.4.0 | GHSA-v64w-96p6-fx7w | 2022-07-27T21:38:21Z | 2022-05-17T04:48:11Z | null | ['CVE-2013-1777'] | Apache Geronimo JMX Remoting functionality allows remote code execution in 3.x before v3.0.1 | The JMX Remoting functionality in Apache Geronimo 3.x before 3.0.1, as used in IBM WebSphere Application Server (WAS) Community Edition 3.0.0.3 and other products, does not properly implement the RMI classloader, which allows remote attackers to execute arbitrary code by using the JMX connector to send a crafted serial... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.geronimo.framework:geronimo-jmx-remoting'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0-beta-1'}, {'fixed': '3.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1777'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/GERONIMO-6477'}, {'type': 'WEB', 'url': 'http://archives.neohapsis.com/archives/bugtraq/2013-07/0008.html'}, {'type': 'WEB', 'url': 'http://geronimo.apache.org/30x-security-repor... | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-27T21:38:21Z', 'nvd_published_at': '2013-07-11T22:55:00Z'} |
1.4.0 | GHSA-x5q5-6wvf-2fpq | 2023-09-26T19:09:58Z | 2022-05-24T17:00:25Z | null | ['CVE-2019-8124'] | Magento 2 Community Edition Insufficient Logging | An insufficient logging and monitoring vulnerability exists in Magento 2.1 prior to 2.1.19, Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3. Failure to track admin actions related to design configuration could lead to repudiation attacks. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.19'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8124'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051105/https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}] | {'cwe_ids': ['CWE-345'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T17:52:47Z', 'nvd_published_at': '2019-11-05T23:15:00Z'} |
1.4.0 | GHSA-cqm6-hrgq-6869 | 2022-11-22T18:57:29Z | 2022-05-13T01:47:04Z | null | ['CVE-2017-7673'] | Apache OpenMeetings has Inadequate Encryption Strength | Apache OpenMeetings 1.0.0 uses not very strong cryptographic storage, captcha is not used in registration and forget password dialogs and auth forms missing brute force protection. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.openmeetings:openmeetings-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '3.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7673'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/openmeetings'}, {'type': 'WEB', 'url': 'http://markmail.org/message/3hshl26omwjo6c5i'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/99587'}] | {'cwe_ids': ['CWE-326'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T18:57:29Z', 'nvd_published_at': '2017-07-17T13:18:00Z'} |
1.4.0 | GHSA-jjvw-3h9j-p7jf | 2023-08-29T18:25:43Z | 2022-05-17T04:49:44Z | null | ['CVE-2013-4197'] | Plone Improper Access Control Vulnerability | member_portrait.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 allows remote authenticated users to modify or delete portraits of other users via unspecified vectors. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1'}, {'fixed': '4.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1'}}, {'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'e... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4197'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=978478'}, {'type': 'PACKAGE', 'url': 'https://github.com/plone/Plone'}, {'type': 'WEB', 'url': 'http://plone.org/products/plone-hotfix/releases/20130618'}, {'type': 'WEB', ... | {'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T18:25:43Z', 'nvd_published_at': '2014-03-11T19:37:00Z'} |
1.4.0 | GHSA-gjjm-4x3g-3h33 | 2023-09-26T19:15:09Z | 2022-05-24T17:00:27Z | null | ['CVE-2019-8139'] | Magento 2 Community Edition XSS Vulnerability | A stored cross-site scripting (XSS) vulnerability exists in Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated user can inject arbitrary Javascript code into the dynamic block when invoking page builder on a product. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8139'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051105/https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T23:48:27Z', 'nvd_published_at': '2019-11-06T00:15:00Z'} |
1.4.0 | GHSA-qmqw-mpqp-mr54 | 2023-08-03T21:47:36Z | 2022-05-17T03:11:51Z | null | ['CVE-2015-4050'] | Symfony Incorrect Access Control | FragmentListener in the HttpKernel component in Symfony 2.3.19 through 2.3.28, 2.4.9 through 2.4.10, 2.5.4 through 2.5.11, and 2.6.0 through 2.6.7, when ESI or SSI support enabled, does not check if the `_controller` attribute is set, which allows remote attackers to bypass URL signing and security rules by including (... | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.19'}, {'fixed': '2.3.29'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.3.28'}}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-4050'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228090443/http://www.securityfocus.com/bid/74928'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159513.html'}, {'type': 'WEB', 'url': '... | {'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T21:47:36Z', 'nvd_published_at': '2015-06-02T14:59:00Z'} |
1.4.0 | GHSA-mxfv-c8p8-qw5h | 2023-07-07T21:01:59Z | 2022-05-17T02:45:09Z | null | ['CVE-2016-4880'] | baserCMS Cross-site Scripting vulnerability | Cross-site scripting vulnerability in baserCMS plugin Blog version 3.0.10 and earlier allows remote authenticated attackers to inject arbitrary web script or HTML via unspecified vectors. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'baserproject/basercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.10'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-4880'}, {'type': 'PACKAGE', 'url': 'https://github.com/baserproject/basercms'}, {'type': 'WEB', 'url': 'https://jvn.jp/en/jp/JVN92765814/index.html'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210308130052/http://www.securityfocus.com/b... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T21:01:59Z', 'nvd_published_at': '2017-05-12T18:29:00Z'} |
1.4.0 | GHSA-gcv6-2v9c-rj48 | 2023-07-07T13:52:40Z | 2022-05-24T16:55:25Z | null | ['CVE-2019-14470'] | Cosenary Instagram-PHP-API contains reflected XSS vulnerability | cosenary Instagram-PHP-API (aka Instagram PHP API V2), used in the UserPro plugin through 4.9.32 for WordPress, is vulnerable to cross-site scripting via the [example/success.php](https://github.com/cosenary/Instagram-PHP-API/blob/master/example/success.php#L36
) error_description parameter.
Vulnerable code:
```php
... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'cosenary/instagram'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14470'}, {'type': 'PACKAGE', 'url': 'https://github.com/cosenary/Instagram-PHP-API'}, {'type': 'WEB', 'url': 'https://github.com/cosenary/Instagram-PHP-API/blob/master/example/success.php#L33-L36'}, {'type': 'WEB', 'url': 'https://wpvulndb.com/vuln... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T13:52:40Z', 'nvd_published_at': '2019-09-04T20:15:00Z'} |
1.4.0 | GHSA-h8c5-c92g-jq6x | 2022-07-01T21:51:49Z | 2022-05-14T01:04:35Z | null | ['CVE-2017-1000401'] | Improper Input Validation in Jenkins | The Jenkins 2.73.1 and earlier, 2.83 and earlier default form control for passwords and other secrets, <f:password/>, supports form validation (e.g. for API keys). The form validation AJAX requests were sent via GET, which could result in secrets being logged to a HTTP access log in non-default configurations of Jenkin... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.73.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.73.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000401'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenkins/commit/09d60462b9edf775f08568601bb3e2cfd8075368'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenkins/blob/6d179998e18adfbaa4e443c7e837135bf36c53d7/test/src/test/java... | {'cwe_ids': ['CWE-20'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T21:51:49Z', 'nvd_published_at': '2018-01-26T02:29:00Z'} |
1.4.0 | GHSA-m66x-wm27-xxpc | 2023-07-17T19:27:02Z | 2022-05-24T17:15:34Z | null | ['CVE-2020-11825'] | Dolibarr Cross-Site Request Forgery Vulnerability | In Dolibarr 10.0.6, forms are protected with a Cross-Site Request Forgery (CSRF) token against CSRF attacks. The problem is any CSRF token in any user's session can be used in another user's session. CSRF tokens should not be valid in this situation. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '10.0.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11825'}, {'type': 'WEB', 'url': 'https://fatihhcelik.blogspot.com/2020/04/dolibarr-csrf.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/Dolibarr/dolibarr'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T19:27:02Z', 'nvd_published_at': '2020-04-16T19:15:00Z'} |
1.4.0 | GHSA-g6h2-4x64-c59x | 2022-06-28T23:09:04Z | 2022-05-24T16:47:43Z | null | ['CVE-2019-10337'] | Improper Restriction of XML External Entity Reference Jenkins Token Macro Plugin | An XML external entities (XXE) vulnerability in Jenkins Token Macro Plugin 2.7 and earlier allowed attackers able to control a the content of the input file for the "XML" macro to have Jenkins resolve external entities, resulting in the extraction of secrets from the Jenkins agent, server-side request forgery, or denia... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:oken-macro'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10337'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-06-11/#SECURITY-1399'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/06/11/1'}] | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T23:09:04Z', 'nvd_published_at': '2019-06-11T14:29:00Z'} |
1.4.0 | GHSA-698c-2x4j-g9gq | 2022-07-06T19:47:31Z | 2022-05-14T01:10:16Z | null | ['CVE-2016-6817'] | Improper Restriction of Operations within the Bounds of a Memory Buffer in Apache Tomcat | The HTTP/2 header parser in Apache Tomcat 9.0.0.M1 to 9.0.0.M11 and 8.5.0 to 8.5.6 entered an infinite loop if a header was received that was larger than the available buffer. This made a denial of service attack possible. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0.M1'}, {'fixed': '9.0.0.M12'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.0.0.M11'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'},... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6817'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff228... | {'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:47:31Z', 'nvd_published_at': '2017-08-10T22:29:00Z'} |
1.4.0 | GHSA-rp7r-79rm-2758 | 2022-05-25T20:21:39Z | 2022-05-01T02:31:27Z | null | ['CVE-2005-4849'] | Apache Derby exposes user and password attributes | Apache Derby before 10.1.2.1 exposes the (1) user and (2) password attributes in cleartext via (a) the RDBNAM parameter of the ACCSEC command and (b) the output of the DatabaseMetaData.getURL function, which allows context-dependent attackers to obtain sensitive information. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.derby:derby'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.1.2.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.1.1.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2005-4849'}, {'type': 'WEB', 'url': 'https://github.com/apache/derby/commit/09a7325f75a4f96a7735e46c9723930f88ea2613'}, {'type': 'WEB', 'url': 'https://github.com/apache/derby/commit/82d721fd53e30dbb86d6d742c085030985091968'}, {'type': 'WEB', 'url': 'ht... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T20:21:39Z', 'nvd_published_at': '2005-12-31T05:00:00Z'} |
1.4.0 | GHSA-wqmp-2p5r-rhfv | 2022-12-02T20:07:45Z | 2022-05-18T00:00:42Z | null | ['CVE-2022-30971'] | XML External Entity Reference in Jenkins Storable Configs Plugin | Jenkins Storable Configs Plugin 1.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
This allows attackers with Item/Configure permission to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller or server-side requ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jvnet.hudson.plugins:storable-configs-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30971'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/storable-configs-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-1969'}] | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-01T21:16:28Z', 'nvd_published_at': '2022-05-17T15:15:00Z'} |
1.4.0 | GHSA-rvrj-j7cc-236p | 2023-08-28T23:44:04Z | 2022-05-17T01:33:02Z | null | ['CVE-2013-4649'] | DotNetNuke (DNN) Cross-site scripting (XSS) vulnerability via the __dnnVariable parameter | Cross-site scripting (XSS) vulnerability in DotNetNuke (DNN) before 6.2.9 and 7.x before 7.1.1 allows remote attackers to inject arbitrary web script or HTML via the __dnnVariable parameter to the default URI. | [] | [{'package': {'ecosystem': 'NuGet', 'name': 'DotNetNuke.Core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.2.9'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'DotNetNuke.Core'}, 'ecosystem_specific': {'affected_functions': ['']}, ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4649'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/86432'}, {'type': 'PACKAGE', 'url': 'https://github.com/dnnsoftware/Dnn.Platform'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/122792/DotNetNuke-... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-28T23:44:04Z', 'nvd_published_at': '2014-03-12T14:55:00Z'} |
1.4.0 | GHSA-hxqx-xwvh-44m2 | 2023-08-28T13:59:06Z | 2022-05-27T16:36:52Z | null | ['CVE-2022-30122'] | Denial of Service Vulnerability in Rack Multipart Parsing | There is a possible denial of service vulnerability in the multipart parsing component of Rack. This vulnerability has been assigned the CVE identifier CVE-2022-30122.
Versions Affected: >= 1.2
Not affected: < 1.2
Fixed Versions: 2.0.9.1, 2.1.4.1, 2.2.3.1
## Impact
Carefully crafted multipart POST request... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2'}, {'fixed': '2.0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.9.0'}}, {'package': {'ecosystem': 'RubyGems', 'name':... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30122'}, {'type': 'WEB', 'url': 'https://discuss.rubyonrails.org/t/cve-2022-30122-denial-of-service-vulnerability-in-rack-multipart-parsing/80729'}, {'type': 'PACKAGE', 'url': 'https://github.com/rack/rack'}, {'type': 'WEB', 'url': 'https://github.... | {'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-27T16:36:52Z', 'nvd_published_at': '2022-12-05T22:15:00Z'} |
1.4.0 | GHSA-5jm7-g527-m694 | 2023-08-25T21:56:45Z | 2022-05-17T00:01:41Z | null | ['CVE-2022-1553'] | Publify exposes article metadata | Leaking password protected articles content due to improper access control in GitHub repository publify/publify prior to 9.2.8. Attackers can leverage this vulnerability to view the contents of any password-protected article present on the publify website, compromising confidentiality and integrity of users. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'publify_core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.2.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1553'}, {'type': 'WEB', 'url': 'https://github.com/publify/publify/commit/1a78f16f460847274265a12a9555b3524892d7db'}, {'type': 'PACKAGE', 'url': 'https://github.com/publify/publify/'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisor... | {'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-01T21:44:51Z', 'nvd_published_at': '2022-05-16T15:15:00Z'} |
1.4.0 | GHSA-v936-x3j5-c76j | 2022-07-01T11:58:52Z | 2022-05-13T01:09:19Z | null | ['CVE-2017-5656'] | Session Fixation in Apache CXF | Apache CXF's STSClient before 3.1.11 and 3.0.13 uses a flawed way of caching tokens that are associated with delegation tokens, which means that an attacker could craft a token which would return an identifer corresponding to a cached token for another user. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.1.10'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf-core'}, 'ranges': ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-5656'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1832'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:1694'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaab... | {'cwe_ids': ['CWE-384'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T11:58:52Z', 'nvd_published_at': '2017-04-18T16:59:00Z'} |
1.4.0 | GHSA-5ppx-g65v-4vfv | 2023-07-31T19:10:08Z | 2022-05-14T02:23:44Z | null | ['CVE-2016-3296'] | ChakraCore RCE Vulnerability | The Chakra JavaScript engine in Microsoft Edge allows remote attackers to execute arbitrary code via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability." | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3296'}, {'type': 'WEB', 'url': 'https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-096'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210116095719/http://www.securitytracker.com/id/1036569'}, {'type': 'WEB', 'ur... | {'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T19:10:08Z', 'nvd_published_at': '2016-08-09T21:59:00Z'} |
1.4.0 | GHSA-x78v-4fvj-rg9j | 2023-01-26T23:54:19Z | 2022-05-24T22:33:54Z | null | ['CVE-2021-25969'] | Camaleon CMS Stored Cross-site Scripting vulnerability | In “Camaleon CMS” application, versions 0.0.1 through 2.6.0 are vulnerable to stored XSS, that allows unprivileged application users to store malicious scripts in the comments section of the post. These scripts are executed in a victim’s browser when they open the page containing the malicious comment. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'camaleon_cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.1'}, {'fixed': '2.6.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25969'}, {'type': 'WEB', 'url': 'https://github.com/owen2345/camaleon-cms/commit/05506e9087bb05282c0bae6ccfe0283d0332ab3c'}, {'type': 'PACKAGE', 'url': 'https://github.com/owen2345/camaleon-cms'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoft... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-26T23:54:19Z', 'nvd_published_at': '2021-10-20T12:15:00Z'} |
1.4.0 | GHSA-w3x4-9854-95x8 | 2023-07-25T21:57:14Z | 2022-05-13T01:02:31Z | null | ['CVE-2017-7297'] | Rancher Access Control Vulnerability | Rancher Labs rancher server 1.2.0+ is vulnerable to authenticated users disabling access control via an API call. This is fixed in versions rancher/server:v1.2.4, rancher/server:v1.3.5, rancher/server:v1.4.3, and rancher/server:v1.5.3. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/rancher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5'}, {'fixed': '1.5.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/rancher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4'}, {'fixed': '1.4.3'}]... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7297'}, {'type': 'WEB', 'url': 'https://github.com/rancher/rancher/issues/8296'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/97180'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T21:57:14Z', 'nvd_published_at': '2017-03-29T00:59:00Z'} |
1.4.0 | GHSA-p9wj-wrrm-84m5 | 2023-07-21T23:22:08Z | 2022-05-13T01:28:41Z | null | ['CVE-2018-6464'] | Simditor XSS Vulnerability | Simditor v2.3.11 allows XSS via crafted use of `svg/onload=alert` in a TEXTAREA element, as demonstrated by Firefox 54.0.1. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'simditor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-6464'}, {'type': 'WEB', 'url': 'https://github.com/Heartway/simditor/blob/master/simditor.docx'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T23:22:08Z', 'nvd_published_at': '2018-01-31T18:29:00Z'} |
1.4.0 | GHSA-gg48-mpp8-cgqc | 2023-07-18T15:42:42Z | 2022-05-24T17:22:32Z | null | ['CVE-2020-15517'] | ke_search for Typo3 XSS Vulnerability | The ke_search (aka Faceted Search) extension through 2.8.2, and 3.x through 3.1.3, for TYPO3 allows XSS. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'tpwd/ke_search'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.1.3'}}, {'package': {'ecosystem': 'Packagist', 'name': 'tpwd/ke_search'}, 'ranges': [{'type': 'E... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15517'}, {'type': 'WEB', 'url': 'https://github.com/tpwd/ke_search/commit/1cde32c3ebfcb6cda5d364f099979be9741f6714'}, {'type': 'WEB', 'url': 'https://github.com/tpwd/ke_search/commit/9551aa4eef441a3e9825776d4a19ee4b6fe6f8ea'}, {'type': 'PACKAGE', '... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T15:42:42Z', 'nvd_published_at': '2020-07-07T14:15:00Z'} |
1.4.0 | GHSA-7c3v-2jjv-hq3c | 2022-12-02T20:09:39Z | 2022-05-18T00:00:42Z | null | ['CVE-2022-30969'] | Cross-Site Request Forgery in Jenkins Autocomplete Parameter Plugin | A cross-site request forgery (CSRF) vulnerability in Jenkins Autocomplete Parameter Plugin 1.1 and earlier allows attackers to execute arbitrary code without sandbox protection if the victim is an administrator. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:autocomplete-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30969'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/autocomplete-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2322'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-01T21:18:40Z', 'nvd_published_at': '2022-05-17T15:15:00Z'} |
1.4.0 | GHSA-h3v9-46pp-h33w | 2022-12-02T20:17:59Z | 2022-05-18T00:00:41Z | null | ['CVE-2022-30964'] | Cross-site Scripting in Jenkins Multiselect parameter Plugin | Jenkins Multiselect parameter Plugin 1.3 and earlier does not escape the name and description of Multiselect parameters on views displaying parameters. This results in stored cross-site scripting (XSS) vulnerabilities exploitable by attackers with Item/Configure permission.
Exploitation of this vulnerability requires ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:multiselect-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30964'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/multiselect-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2717'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-01T20:55:44Z', 'nvd_published_at': '2022-05-17T15:15:00Z'} |
1.4.0 | GHSA-2xrc-27mc-638q | 2023-08-28T22:24:52Z | 2022-05-13T01:21:03Z | null | ['CVE-2018-8624'] | ChakraCore Remote code execution Vulnerability | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8583, CVE-2018-8617, CVE-2018-8618, CVE-2018-8... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8624'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/5869'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/8264b9bcdb08daf4309415319c7a8e03d1736dce'}, {'type': 'WEB', 'url': 'https://github.com/M... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-28T22:24:52Z', 'nvd_published_at': '2018-12-12T00:29:00Z'} |
1.4.0 | GHSA-54m9-h7qp-fwvg | 2023-01-05T21:46:58Z | 2022-05-24T17:08:48Z | null | ['CVE-2020-2133'] | Password stored in plain text by Applatix Plugin | Jenkins Applatix Plugin 1.1 and earlier stores a password unencrypted in job config.xml files on the Jenkins master where it can be viewed by users with Extended Read permission, or access to the master file system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.applatix.jenkins:applatix'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2133'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/applatix-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-02-12/#SECURITY-1540'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/02... | {'cwe_ids': ['CWE-256', 'CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-05T21:46:58Z', 'nvd_published_at': '2020-02-12T15:15:00Z'} |
1.4.0 | GHSA-x546-xrx3-hjx4 | 2022-12-06T21:44:45Z | 2022-05-24T16:59:37Z | null | ['CVE-2019-10462'] | Jenkins Dynatrace Plugin vulnerable to Cross-Site Request Forgery | A cross-site request forgery vulnerability in Jenkins Dynatrace Application Monitoring Plugin prior to 2.1.4 allows attackers to connect to an attacker-specified URL using attacker-specified credentials.
##NOTE: This plugin is marked as DEPRECATED | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:dynatrace-dashboard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10462'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/dynatrace-plugin/commit/373adaa1161d59ccd4e5e3469a9b6aeec17968ae'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/dynatrace-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.i... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T21:44:45Z', 'nvd_published_at': '2019-10-23T13:15:00Z'} |
1.4.0 | GHSA-x7c8-4x3h-874w | 2022-07-01T21:43:13Z | 2022-05-13T01:42:26Z | null | ['CVE-2017-11610'] | Incorrect Default Permissions in Supervisor | The XML-RPC server in supervisor before 3.0.1, 3.1.x before 3.1.4, 3.2.x before 3.2.4, and 3.3.x before 3.3.3 allows remote authenticated users to execute arbitrary commands via a crafted XML-RPC request, related to nested supervisord namespace lookups. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'supervisor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'supervisor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.4'}]}]}, {'package': {'ecosystem... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-11610'}, {'type': 'WEB', 'url': 'https://github.com/Supervisor/supervisor/issues/964'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3005'}, {'type': 'PACKAGE', 'url': 'https://github.com/Supervisor/supervisor/'}, {'type': 'WE... | {'cwe_ids': ['CWE-276'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T21:43:13Z', 'nvd_published_at': '2017-08-23T14:29:00Z'} |
1.4.0 | GHSA-h7vh-6gmm-g7h9 | 2023-07-07T00:10:59Z | 2022-05-14T03:49:58Z | null | ['CVE-2017-1000467'] | Stored XSS in LavaLite 5.2.4 | LavaLite version 5.2.4 is vulnerable to stored cross-site scripting vulnerability, within the blog creation page, which can result in disruption of service and execution of javascript code. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'lavalite/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000467'}, {'type': 'WEB', 'url': 'https://github.com/LavaLite/cms/issues/209'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T00:10:59Z', 'nvd_published_at': '2018-01-03T15:29:00Z'} |
1.4.0 | GHSA-x6gm-qqwp-76gr | 2022-06-02T20:14:19Z | 2022-05-19T00:00:15Z | null | ['CVE-2022-30597'] | External Control of Assumed-Immutable Web Parameter in moodle | A flaw was found in moodle where the description user field was not hidden when being set as a hidden user field. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0'}, {'fixed': '4.0.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': [... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30597'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/670268900cca1d55a718d708ae91bda826f8b9a3'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2083585'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodl... | {'cwe_ids': ['CWE-472'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-02T20:14:19Z', 'nvd_published_at': '2022-05-18T18:15:00Z'} |
1.4.0 | GHSA-w24g-24qg-v4w2 | 2022-12-15T17:29:07Z | 2022-05-24T17:45:44Z | null | ['CVE-2021-21629'] | CSRF vulnerability in Jenkins Build With Parameters Plugin | Build With Parameters Plugin 1.5 and earlier does not require POST requests for its form submission endpoint, resulting in a cross-site request forgery (CSRF) vulnerability.
This vulnerability allows attackers to build a project with attacker-specified parameters. Build With Parameters Plugin 1.5.1 requires POST reque... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:build-with-parameters'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.5'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21629'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/build-with-parameters-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-03-30/#SECURITY-2257'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/os... | {'cwe_ids': ['CWE-352'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T17:29:07Z', 'nvd_published_at': '2021-03-30T12:16:00Z'} |
1.4.0 | GHSA-hhx8-cr55-qcxx | 2022-06-24T14:47:43Z | 2022-05-14T01:10:43Z | null | ['CVE-2019-9644'] | Improper Neutralization of Input During Web Page Generation in Jupyter Notebook | An XSSI (cross-site inclusion) vulnerability in Jupyter Notebook before 5.7.6 allows inclusion of resources on malicious pages when visited by users who are authenticated with a Jupyter server. Access to the content of resources has been demonstrated with Internet Explorer through capturing of error messages, though no... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'jupyter-notebook'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.7.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.7.5'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-9644'}, {'type': 'PACKAGE', 'url': 'https://github.com/jupyter/notebook'}, {'type': 'WEB', 'url': 'https://github.com/jupyter/notebook/compare/f3f00df...05aa4b2'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announ... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T14:47:43Z', 'nvd_published_at': '2019-03-12T09:29:00Z'} |
1.4.0 | GHSA-f3xr-q258-h7m9 | 2023-09-25T19:58:13Z | 2022-05-24T16:58:38Z | null | ['CVE-2019-17496'] | Craft CMS XSS Vulnerability | Craft CMS before 3.3.8 has stored XSS via a name field. This field is mishandled during site deletion. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17496'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/commit/0ee66d29281af2b6c4f866e1437842c61983a672'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftcms/cms'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/blob/develop/... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T23:53:19Z', 'nvd_published_at': '2019-10-11T00:15:00Z'} |
1.4.0 | GHSA-5wqf-h3r3-gxvh | 2022-07-07T23:01:36Z | 2022-05-13T01:09:20Z | null | ['CVE-2014-0109'] | Uncontrolled Resource Consumption in Apache CXF | Apache CXF before 2.6.14 and 2.7.x before 2.7.11 allows remote attackers to cause a denial of service (memory consumption) via a large request with the Content-Type set to text/html to a SOAP endpoint, which triggers an error. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.14'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.11'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0109'}, {'type': 'WEB', 'url': 'https://cxf.apache.org/security-advisories.data/CVE-2014-0109.txt.asc?version=1&modificationDate=1398873370740&api=v2'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9... | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T23:01:36Z', 'nvd_published_at': '2014-05-08T14:29:00Z'} |
1.4.0 | GHSA-hr74-2j5v-ghfv | 2022-12-12T21:06:35Z | 2022-05-14T03:23:44Z | null | ['CVE-2018-1000142'] | Jenkins GitHub Pull Request Builder Plugin allows attacker with local file system access to obtain GitHub credentials | An exposure of sensitive information vulnerability exists in Jenkins GitHub Pull Request Builder Plugin version 1.39.0 and older in GhprbCause.java that allows an attacker with local file system access to obtain GitHub credentials. Since 1.40.0, the plugin no longer stores serialized objects containing the credential o... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ghprb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.40.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.39.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000142'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ghprb-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-03-26/#SECURITY-261'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T21:06:35Z', 'nvd_published_at': '2018-04-05T13:29:00Z'} |
1.4.0 | GHSA-cww4-vj5r-rx57 | 2023-02-14T00:59:09Z | 2022-05-01T18:32:19Z | null | ['CVE-2007-5333'] | Exposure of Sensitive Information in Apache Tomcat | Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0 through 4.1.36 does not properly handle (1) double quote (") characters or (2) %5C (encoded backslash) sequences in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijackin... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.15'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.5.0'}, {'fixed': '5... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-5333'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=532111'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T00:59:09Z', 'nvd_published_at': '2008-02-12T01:00:00Z'} |
1.4.0 | GHSA-jwr9-h4jm-c9ch | 2022-12-14T16:27:02Z | 2022-05-24T17:44:48Z | null | ['CVE-2021-21625'] | Missing permission checks in Jenkins CloudBees AWS Credentials Plugin allows enumerating credentials IDs | CloudBees AWS Credentials Plugin 1.28 and earlier does not perform a permission check in a helper method for HTTP endpoints.
This allows attackers with Overall/Read permission to enumerate credentials IDs of AWS credentials stored in Jenkins if any of the following plugins are installed:
- [Amazon Elastic Container S... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:aws-credentials'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.28.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.28'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21625'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/aws-credentials-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-03-18/#SECURITY-2032'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secu... | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-14T16:27:02Z', 'nvd_published_at': '2021-03-18T14:15:00Z'} |
1.4.0 | GHSA-m27m-628v-xxp2 | 2022-07-06T20:05:20Z | 2022-05-14T02:47:05Z | null | ['CVE-2016-0956'] | Exposure of Sensitive Information to an Unauthorized Actor in Apache Sling Servlets Post | The Servlets Post component 2.3.6 in Apache Sling, as used in Adobe Experience Manager 5.6.1, 6.0.0, and 6.1.0, allows remote attackers to obtain sensitive information via unspecified vectors. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.sling:org.apache.sling.servlets.post'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.3.6'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-0956'}, {'type': 'WEB', 'url': 'https://helpx.adobe.com/security/products/experience-manager/apsb16-05.html'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/39435/'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/135720... | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:05:20Z', 'nvd_published_at': '2016-02-10T20:59:00Z'} |
1.4.0 | GHSA-77hg-g8cc-5r37 | 2023-08-29T21:12:37Z | 2022-05-14T00:56:44Z | null | ['CVE-2012-1053'] | Puppet Privilege Escallation | The change_user method in the SUIDManager (lib/puppet/util/suidmanager.rb) in Puppet 2.6.x before 2.6.14 and 2.7.x before 2.7.11, and Puppet Enterprise (PE) Users 1.0, 1.1, 1.2.x, 2.0.x before 2.0.3 does not properly manage group privileges, which allows local users to gain privileges via vectors related to (1) the cha... | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6'}, {'fixed': '2.6.14'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puppet'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges':... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-1053'}, {'type': 'WEB', 'url': 'https://github.com/puppetlabs/puppet/commit/76d0749f0a9a496b70e7dc7e6d6d6ff692224e36'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/73445'}, {'type': 'WEB', 'url': 'https://ubuntu.com... | {'cwe_ids': ['CWE-269'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T21:12:37Z', 'nvd_published_at': '2012-05-29T20:55:00Z'} |
1.4.0 | GHSA-68qx-whxm-h4c4 | 2022-11-01T22:31:50Z | 2022-05-14T02:57:33Z | null | ['CVE-2018-1999041'] | Exposure of sensitive information vulnerability | An exposure of sensitive information vulnerability exists in Jenkins Tinfoil Security Plugin 1.6.1 and earlier in TinfoilScanRecorder.java that allows attackers with file system access to the Jenkins master to obtain the API secret key stored in this plugin's configuration. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.tinfoilsecurity.plugins:tinfoil-scan'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1999041'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/tinfoil-scan-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-07-30/#SECURITY-840'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T22:31:50Z', 'nvd_published_at': '2018-08-01T13:29:00Z'} |
1.4.0 | GHSA-pwpc-hqq2-hx2x | 2022-11-03T19:08:08Z | 2022-05-14T00:58:28Z | null | ['CVE-2017-15719'] | Cross-site Scripting in wicket-jquery-ui | In Wicket jQuery UI 6.28.0 and earlier, 7.9.1 and earlier, and 8.0.0-M8 and earlier, a security issue has been discovered in the WYSIWYG editor that allows an attacker to submit arbitrary JS code to WYSIWYG editor. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.googlecode.wicket-jquery-ui:wicket-jquery-ui-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.28.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.googlecode.wicket-jquery-ui:wicket-jquery-ui-parent'}, 'ranges': [{'type': 'EC... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15719'}, {'type': 'WEB', 'url': 'https://github.com/sebfz1/wicket-jquery-ui/wiki#cve-2017-15719---xss-in-wysiwyg-editor'}, {'type': 'WEB', 'url': 'http://openmeetings.apache.org/security.html#_toc_cve-2017-15719_-_wicket_jquery_ui_xss_in_wysiwyg_e'... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T19:08:08Z', 'nvd_published_at': '2018-03-12T13:29:00Z'} |
1.4.0 | GHSA-p9qf-56xw-h2vj | 2023-07-21T19:26:28Z | 2022-05-13T01:21:02Z | null | ['CVE-2018-8617'] | ChakraCore RCE Vulnerability | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8583, CVE-2018-8618, CVE-2018-8624, CVE-2018-8... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8617'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/5869'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/c04787f16efe8564cd3acee7549854dc156419b2'}, {'type': 'WEB', 'url': 'https://portal.msrc.... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T19:26:28Z', 'nvd_published_at': '2018-12-12T00:29:00Z'} |
1.4.0 | GHSA-4qgj-9mvg-3929 | 2022-11-03T22:43:38Z | 2022-05-14T03:15:08Z | null | ['CVE-2015-5209'] | Special top object can be used to access Struts' internals | ValueStack defines special top object which represents root of execution context. It can be used to manipulate Struts' internals or can be used to affect container's settings. Applying better regex which includes pattern to exclude request parameters trying to use top object. This issue was patched in Struts 2.3.24.1. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.24.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5209'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20180629-0002/'}, {'type': 'WEB', 'url': 'https://struts.apache.org/docs/s2-026.html'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T22:43:38Z', 'nvd_published_at': '2017-08-29T15:29:00Z'} |
1.4.0 | GHSA-5889-7v45-q28m | 2022-06-08T18:10:19Z | 2022-05-24T22:16:29Z | null | ['CVE-2022-29213'] | Incomplete validation in signal ops leads to crashes in TensorFlow | ### Impact
The `tf.compat.v1.signal.rfft2d` and `tf.compat.v1.signal.rfft3d` lack input validation and under certain condition can result in crashes (due to `CHECK`-failures).
### Patches
We have patched the issue in GitHub commit [0a8a781e597b18ead006d19b7d23d0a369e9ad73](https://github.com/tensorflow/tensorflow/com... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5889-7v45-q28m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29213'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/issues/55263'}, {'type': 'WEB', 'url': 'https://github.com/tensorf... | {'cwe_ids': ['CWE-20', 'CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:16:29Z', 'nvd_published_at': '2022-05-21T00:15:00Z'} |
1.4.0 | GHSA-jwg3-v9xm-v6q9 | 2023-08-25T21:26:33Z | 2022-05-24T16:51:38Z | null | ['CVE-2019-11201'] | Dolibarr ERP and CRM Code Injection | Dolibarr ERP/CRM 9.0.1 provides a module named website that provides for creation of public websites with a WYSIWYG editor. It was identified that the editor also allowed inclusion of dynamic code, which can lead to code execution on the host machine. An attacker has to check a setting on the same page, which specifies... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.0.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11201'}, {'type': 'WEB', 'url': 'https://github.com/Dolibarr/dolibarr/issues/10984#issuecomment-485841141'}, {'type': 'WEB', 'url': 'https://github.com/Dolibarr/dolibarr/commit/63c0ab93fb21f86c1b736061af9fa1eee90148fd'}, {'type': 'PACKAGE', 'url': ... | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-14T22:16:25Z', 'nvd_published_at': '2019-07-29T16:15:00Z'} |
1.4.0 | GHSA-9523-474x-5h36 | 2022-11-01T22:51:21Z | 2022-05-24T17:03:48Z | null | ['CVE-2019-16563'] | Cross site scripting in Jenkins Mission Control Plugin | Jenkins Mission Control Plugin 0.9.16 and earlier does not escape job display names and build names shown on its view, resulting in a stored XSS vulnerability exploitable by attackers able to change these properties. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'tech.andrey.jenkins:mission-control-view'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.9.16'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16563'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1592'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/12/17/1'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T22:51:21Z', 'nvd_published_at': '2019-12-17T15:15:00Z'} |
1.4.0 | GHSA-rqhg-cxfr-8xqw | 2023-02-08T18:05:41Z | 2022-05-05T02:48:48Z | null | ['CVE-2013-0327'] | Jenkins Cross-Site Request Forgery vulnerability | Cross-site request forgery (CSRF) vulnerability in Jenkins master in Jenkins before 1.502 and LTS before 1.480.3 allows remote attackers to hijack the authentication of users via unknown vectors. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.481'}, {'fixed': '1.502'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-0327'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0638'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2013-0327'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=914875'}, {'type'... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T18:05:41Z', 'nvd_published_at': '2013-03-19T14:55:00Z'} |
1.4.0 | GHSA-rp82-xvg3-727c | 2022-12-12T16:57:06Z | 2022-05-14T03:18:40Z | null | ['CVE-2018-1000173'] | Jenkins Google Login Plugin Session Fixation vulnerability | A session fixaction vulnerability exists in Jenkins Google Login Plugin 1.3 and older in GoogleOAuth2SecurityRealm.java that allows unauthorized attackers to impersonate another user if they can control the pre-authentication session. Google Login Plugin 1.3.1 invalidates the previous session during login, and creates ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:google-login'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000173'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/google-login-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-04-16/'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/104210'}] | {'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T16:57:06Z', 'nvd_published_at': '2018-05-08T15:29:00Z'} |
1.4.0 | GHSA-6465-r752-2h8v | 2022-05-24T22:35:07Z | 2022-05-13T00:01:12Z | null | ['CVE-2022-1682'] | Cross-site Scripting in facturascripts | Reflected cross-site scripting using url based payload in GitHub repository neorazorx/facturascripts prior to 2022.08. This can lead to theft of a user's cookies, which in turn could lead to account takeover or do other malicious activities in a victim's browser. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'facturascripts/facturascripts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2022.08'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1682'}, {'type': 'WEB', 'url': 'https://github.com/neorazorx/facturascripts/commit/8e31d8434014a6d1e8791a489d84268fd74b0c9a'}, {'type': 'PACKAGE', 'url': 'https://github.com/neorazorx/facturascripts'}, {'type': 'WEB', 'url': 'https://huntr.dev/boun... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:35:07Z', 'nvd_published_at': '2022-05-12T09:15:00Z'} |
1.4.0 | GHSA-qp4f-2w67-c8hw | 2022-12-16T22:56:05Z | 2022-05-24T17:07:40Z | null | ['CVE-2020-2099'] | Inbound TCP Agent Protocol/3 authentication bypass in Jenkins | Jenkins 2.213 and earlier, LTS 2.204.1 and earlier includes support for the Inbound TCP Agent Protocol/3 for communication between controller and agents. While [this protocol has been deprecated in 2018](https://www.jenkins.io/changelog-old/#v2.128) and was recently removed from Jenkins in 2.214, it could still easily ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.204.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.205'},... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2099'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2020:0402'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2020:0675'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0681'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-323', 'CWE-330'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-16T22:56:05Z', 'nvd_published_at': '2020-01-29T16:15:00Z'} |
1.4.0 | GHSA-8g72-gq68-6gqh | 2023-07-26T21:54:46Z | 2022-05-14T03:49:10Z | null | ['CVE-2017-1000481'] | Plone Open Redirect Vulnerability | When you visit a page where you need to login, Plone 2.5-5.1rc1 sends you to the login form with a 'came_from' parameter set to the previous url. After you login, you get redirected to the page you tried to view before. An attacker might try to abuse this by letting you click on a specially crafted link. You would logi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.5-5.1rc1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000481'}, {'type': 'WEB', 'url': 'https://github.com/plone/Products.CMFPlone/issues/2232'}, {'type': 'WEB', 'url': 'https://plone.org/security/hotfix/20171128/open-redirection-on-login-form'}] | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T21:54:46Z', 'nvd_published_at': '2018-01-03T18:29:00Z'} |
1.4.0 | GHSA-f9hx-5jq4-fgjm | 2023-07-26T21:53:03Z | 2022-05-14T01:05:59Z | null | ['CVE-2017-1000499'] | phpMyAdmin CSRF Vulnerability | phpMyAdmin versions 4.7.x (prior to 4.7.6.1/4.7.7) are vulnerable to a CSRF weakness. By deceiving a user to click on a crafted URL, it is possible to perform harmful database operations such as deleting records, dropping/truncating tables etc. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.7'}, {'fixed': '4.7.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000499'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201208204518/http://www.securitytracker.com/id/1040163'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/45284/'}, {'type': 'WEB', 'url': 'https://www.phpmyadmin.net/secu... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T21:53:03Z', 'nvd_published_at': '2018-01-03T14:29:00Z'} |
1.4.0 | GHSA-hffm-fqv4-w27r | 2022-07-13T18:29:02Z | 2022-05-14T01:17:03Z | null | ['CVE-2011-5063'] | Improper Authentication in Apache Tomcat | The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 does not check realm values, which might allow remote attackers to bypass intended access restrictions by leveraging the availability of a protection space with weaker authentication or au... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.5.0'}, {'fixed': '5.5.34'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-5063'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'htt... | {'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T18:29:02Z', 'nvd_published_at': '2012-01-14T21:55:00Z'} |
1.4.0 | GHSA-5pmp-7wc9-v7vw | 2022-12-02T20:20:48Z | 2022-05-18T00:00:41Z | null | ['CVE-2022-30963'] | Cross-site Scripting in Jenkins JDK Parameter Plugin | Jenkins JDK Parameter Plugin 1.0 and earlier does not escape the name and description of JDK parameters on views displaying parameters. This results in stored cross-site scripting (XSS) vulnerabilities exploitable by attackers with Item/Configure permission.
Exploitation of this vulnerability requires that parameters ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:JDK_Parameter_Plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30963'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/JDK_Parameter_Plugin-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2717'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-01T21:26:09Z', 'nvd_published_at': '2022-05-17T15:15:00Z'} |
1.4.0 | GHSA-vmhj-p9hw-vgrf | 2023-02-08T18:07:43Z | 2022-05-24T17:08:34Z | null | ['CVE-2020-1726'] | Podman has Files or Directories Accessible to External Parties | A flaw was discovered in Podman where it incorrectly allows containers when created to overwrite existing files in volumes, even if they are mounted as read-only. When a user runs a malicious container or a container based on a malicious image with an attached volume that is used for the first time, it is possible to t... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/containers/podman'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '2.0.6'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/containers/podman/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1726'}, {'type': 'WEB', 'url': 'https://github.com/containers/podman/commit/c140ecdc9b416ab4efd4d21d14acd63b6adbdd42'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0680'}, {'type': 'WEB', 'url': 'https://access.redhat.com/err... | {'cwe_ids': ['CWE-552'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T18:07:43Z', 'nvd_published_at': '2020-02-11T20:15:00Z'} |
1.4.0 | GHSA-3vm4-22fp-5rfm | 2023-07-12T20:45:53Z | 2022-05-24T22:01:25Z | null | ['CVE-2020-29652'] | golang.org/x/crypto/ssh NULL Pointer Dereference vulnerability | A nil pointer dereference in the golang.org/x/crypto/ssh component through v0.0.0-20201203163018-be400aefbc4c for Go allows remote attackers to cause a denial of service against SSH servers. An attacker can craft an authentication request message for the `gssapi-with-mic` method which will cause NewServerConn to panic ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'golang.org/x/crypto/ssh'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20201216223049-8b5274cf687f'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'golang.org/x/crypto'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fix... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-29652'}, {'type': 'WEB', 'url': 'https://go-review.googlesource.com/c/crypto/+/278852'}, {'type': 'WEB', 'url': 'https://go.dev/cl/278852'}, {'type': 'WEB', 'url': 'https://go.googlesource.com/crypto/+/8b5274cf687fd9316b4108863654cc57385531e8'}, {'... | {'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T00:29:05Z', 'nvd_published_at': '2020-12-17T05:15:00Z'} |
1.4.0 | GHSA-3p87-gqw8-4pf2 | 2023-07-24T20:49:09Z | 2022-05-14T01:45:29Z | null | ['CVE-2018-19621'] | Showdoc CSRF Vulnerability | `server/index.php?s=/api/teamMember/save` in ShowDoc 2.4.2 has a CSRF that can add members to a team. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19621'}, {'type': 'WEB', 'url': 'https://github.com/CCCCCrash/POCs/tree/master/Web/showdoc/csrf'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-24T20:49:09Z', 'nvd_published_at': '2018-11-28T08:29:00Z'} |
1.4.0 | GHSA-f8pg-wp5j-rjxx | 2023-08-29T21:35:55Z | 2022-05-17T04:32:26Z | null | ['CVE-2012-5491'] | Plone Information Disclosure | `z3c.form`, as used in Plone before 4.2.3 and 4.3 before beta 1, allows remote attackers to obtain the default form field values by leveraging knowledge of the form location and the element id. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'E... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-5491'}, {'type': 'WEB', 'url': 'https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt'}, {'type': 'WEB', 'url': 'https://plone.org/products/plone-hotfix/releases/20121106'}, {'type': 'WEB', 'url': 'https://plone.org/products/plone/... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T21:35:55Z', 'nvd_published_at': '2014-09-30T14:55:00Z'} |
1.4.0 | GHSA-mf7c-35mq-75pj | 2022-07-06T19:45:49Z | 2022-05-14T03:24:59Z | null | ['CVE-2016-6811'] | Insecure Inherited Permissions in Apache Hadoop | In Apache Hadoop 2.x before 2.7.4, a user who can escalate to yarn user can possibly run arbitrary commands as root user. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-alpha'}, {'fixed': '2.7.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6811'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/9ba3c12bbdfd5b2cae60909e48f92608e00c8d99196390b8cfeca307@%3Cgeneral.hadoop.apache.org%3E'}] | {'cwe_ids': ['CWE-277'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:45:49Z', 'nvd_published_at': '2017-04-11T14:59:00Z'} |
1.4.0 | GHSA-485q-v457-3p58 | 2022-12-22T13:49:20Z | 2022-05-24T17:33:09Z | null | ['CVE-2020-2318'] | Passwords stored in plain text by Mail Commander Plugin for Jenkins-ci Plugin | Jenkins Mail Commander Plugin for Jenkins-ci Plugin 1.0.0 and earlier stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:mailcommander'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2318'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/mail-commander-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-11-04/#SECURITY-2085'}] | {'cwe_ids': ['CWE-256', 'CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T13:49:20Z', 'nvd_published_at': '2020-11-04T15:15:00Z'} |
1.4.0 | GHSA-6vvc-c2m3-cjf3 | 2023-01-26T23:53:52Z | 2022-05-17T19:57:29Z | null | ['CVE-2014-9390'] | JGit Improper Input Validation vulnerability | Git before 1.8.5.6, 1.9.x before 1.9.5, 2.0.x before 2.0.5, 2.1.x before 2.1.4, and 2.2.x before 2.2.1 on Windows and OS X; Mercurial before 3.2.3 on Windows and OS X; Apple Xcode before 6.2 beta 3; mine; libgit2; Egit; and JGit allow remote Git servers to execute arbitrary commands via a tree containing a crafted .git... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jgit:org.eclipse.jgit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-9390'}, {'type': 'WEB', 'url': 'https://github.com/libgit2/libgit2/commit/928429c5c96a701bcbcafacb2421a82602b36915'}, {'type': 'WEB', 'url': 'https://github.com/blog/1938-git-client-vulnerability-announced'}, {'type': 'WEB', 'url': 'https://libgit2... | {'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-26T23:53:52Z', 'nvd_published_at': '2020-02-12T02:15:00Z'} |
1.4.0 | GHSA-r2pg-w96p-pcpj | 2023-07-31T19:39:55Z | 2022-05-17T02:40:59Z | null | ['CVE-2016-5004'] | ws-xmlrpc DoS Vulnerability | The Content-Encoding HTTP header feature in ws-xmlrpc 3.1.3 as used in Apache Archiva allows remote attackers to cause a denial of service (resource consumption) by decompressing a large file containing zeroes. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.xmlrpc:xmlrpc-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-5004'}, {'type': 'WEB', 'url': 'https://0ang3el.blogspot.in/2016/07/beware-of-ws-xmlrpc-library-in-your.html'}, {'type': 'WEB', 'url': 'https://github.com/0ang3el/unsafe-xmlrpc'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2... | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T19:39:55Z', 'nvd_published_at': '2017-06-06T18:29:00Z'} |
1.4.0 | GHSA-cf8f-w2c5-p5jr | 2022-09-12T16:51:57Z | 2022-05-24T17:05:43Z | null | ['CVE-2019-14837'] | keycloak vulnerable to unauthorized login via mail server setup | A flaw was found in keycloack before version 8.0.0. The owner of 'placeholder.org' domain can setup mail server on this domain and knowing only name of a client can reset password and then log in. For example, for client name 'test' the email address will be 'service-account-test@placeholder.org'. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14837'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/commit/9a7c1a91a59ab85e7f8889a505be04a71580777f'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14837'}, {'type': 'PACKAGE', 'url': 'https://githu... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-12T16:51:57Z', 'nvd_published_at': '2020-01-07T17:15:00Z'} |
1.4.0 | GHSA-j65f-mvgw-prp2 | 2022-07-08T19:03:11Z | 2022-05-14T03:30:19Z | null | ['CVE-2013-1768'] | Deserialization of Untrusted Data in Apache OpenJPA | The BrokerFactory functionality in Apache OpenJPA 1.x before 1.2.3 and 2.x before 2.2.2 creates local executable JSP files containing logging trace data produced during deserialization of certain crafted OpenJPA objects, which makes it easier for remote attackers to execute arbitrary code by creating a serialized objec... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.openjpa:openjpa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.2.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.openjpa:openjpa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed':... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-1768'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/82268'}, {'type': 'WEB', 'url': 'http://archives.neohapsis.com/archives/fulldisclosure/2013-06/0099.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RH... | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T19:03:11Z', 'nvd_published_at': '2013-07-11T22:55:00Z'} |
1.4.0 | GHSA-78vv-qj73-h9m5 | 2022-07-01T16:57:07Z | 2022-05-13T01:14:24Z | null | ['CVE-2017-5644'] | Improper Restriction of Recursive Entity References in DTDs in Apache POI | Apache POI in versions prior to release 3.15 allows remote attackers to cause a denial of service (CPU consumption) via a specially crafted OOXML file, aka an XML Entity Expansion (XEE) attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.poi:poi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.15'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-5644'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'http://poi.apache.org/#20+March+2017+-+CVE-2017-5644+-+Possible+DOS+%28Denial+of+Service%29+in+Apache+POI+versions+prior+to+3.15'}, {'... | {'cwe_ids': ['CWE-776'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T16:57:07Z', 'nvd_published_at': '2017-03-24T14:59:00Z'} |
1.4.0 | GHSA-6xxf-rwv4-mrjm | 2023-01-05T20:18:11Z | 2022-05-24T17:10:27Z | null | ['CVE-2020-2137'] | Stored XSS vulnerability in Jenkins Timestamper Plugin | Timestamper Plugin 1.11.1 and earlier does not escape or sanitize the HTML formatting used to display the timestamps in console output for builds.
This results in a stored cross-site scripting vulnerability that can be exploited by users with Overall/Administer permission.
Timestamper Plugin 1.11.2 sanitizes the HTML... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:timestamper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.11.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2137'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/timestamper-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-03-09/#SECURITY-1784'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-05T20:18:11Z', 'nvd_published_at': '2020-03-09T16:15:00Z'} |
1.4.0 | GHSA-q4q2-fvwf-6ghv | 2022-11-04T18:41:35Z | 2022-05-13T01:36:16Z | null | ['CVE-2017-7556'] | Cross-Site Request Forgery in hawtio | It was found that hawtio contains a CSRF flaw that allows unrelated websites to perform actions as the authenticated user. Attackers could use this vulnerability to trick the user to visit his website that contains a malicious script which can be submitted to hawtio server on behalf of the user. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.hawt:project'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7556'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1480060'}, {'type': 'PACKAGE', 'url': 'https://github.com/hawtio/hawtio'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-04T18:41:35Z', 'nvd_published_at': '2017-08-17T19:29:00Z'} |
1.4.0 | GHSA-99xx-83jm-h24m | 2023-08-23T13:39:25Z | 2022-05-24T17:38:37Z | null | ['CVE-2020-35459'] | ClusterLabs crmsh vulnerable to shell code injection | An issue was discovered in ClusterLabs crmsh through 4.2.1. Local attackers able to call `crm history` (when `crm` is run) were able to execute commands via shell code injection to the crm history commandline, potentially allowing escalation of privileges. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'crmsh'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35459'}, {'type': 'WEB', 'url': 'https://bugzilla.suse.com/show_bug.cgi?id=1179999'}, {'type': 'PACKAGE', 'url': 'https://github.com/ClusterLabs/crmsh'}, {'type': 'WEB', 'url': 'https://github.com/ClusterLabs/crmsh/blob/a403aa15f3ea575adfe5e43bf2a3... | {'cwe_ids': ['CWE-269', 'CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T22:35:36Z', 'nvd_published_at': '2021-01-12T15:15:00Z'} |
1.4.0 | GHSA-f3mv-g3xr-fp7w | 2023-08-29T18:02:19Z | 2022-05-17T03:28:57Z | null | ['CVE-2013-4271'] | Restlet Arbitrary Java Code Execution via a serialized object | The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources, which allows remote attackers to execute arbitrary Java code via a serialized object, a different vulnerability than CVE-2013-4221. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.restlet.jse:org.restlet'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4271'}, {'type': 'WEB', 'url': 'https://github.com/restlet/restlet-framework-java/issues/778'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=999735'}, {'type': 'PACKAGE', 'url': 'https://github.com/restlet/restlet-framework-j... | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T18:02:19Z', 'nvd_published_at': '2013-10-10T00:55:00Z'} |
1.4.0 | GHSA-438x-2p9v-g8h9 | 2023-03-01T18:56:46Z | 2022-05-24T22:28:10Z | null | ['CVE-2021-25970'] | Camaleon CMS Insufficient Session Expiration vulnerability | Camaleon CMS 0.1.7 through 2.6.0 doesn’t terminate the active session of the users, even after the admin changes the user’s password. A user that was already logged in, will still have access to the application even after the password was changed. Resolved in commit `77e31bc6cdde7c951fba104aebcd5ebb3f02b030` which is i... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'camaleon_cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.7'}, {'fixed': '2.6.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25970'}, {'type': 'WEB', 'url': 'https://github.com/owen2345/camaleon-cms/commit/77e31bc6cdde7c951fba104aebcd5ebb3f02b030'}, {'type': 'PACKAGE', 'url': 'https://github.com/owen2345/camaleon-cms'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/... | {'cwe_ids': ['CWE-613'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-24T15:59:43Z', 'nvd_published_at': '2021-10-20T12:15:00Z'} |
1.4.0 | GHSA-vmq9-cm7m-4p8p | 2023-09-08T21:17:28Z | 2022-05-14T02:01:21Z | null | ['CVE-2018-1000665'] | Improper Neutralization of Input During Web Page Generation in Dojo Dojo Objective Harness | Dojo Dojo Objective Harness (DOH) version prior to version 1.14 contains a Cross Site Scripting (XSS) vulnerability in `unit.html` and `testsDOH/_base/loader/i18n-exhaustive/i18n-test/unit.html` and `testsDOH/_base/i18nExhaustive.js` in the DOH that can result in Victim attacked through their browser - deliver malware,... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.dojotoolkit:dojo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.14'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000665'}, {'type': 'WEB', 'url': 'https://github.com/dojo/dojo/pull/307'}, {'type': 'WEB', 'url': 'https://dojotoolkit.org/blog/dojo-1-14-released'}, {'type': 'PACKAGE', 'url': 'https://github.com/dojo/dojo'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-30T15:59:42Z', 'nvd_published_at': '2018-09-06T17:29:00Z'} |
1.4.0 | GHSA-m2h2-264f-f486 | 2022-05-04T20:12:02Z | 2022-05-03T00:00:44Z | null | ['CVE-2022-25844'] | angular vulnerable to regular expression denial of service (ReDoS) | AngularJS lets users write client-side web applications. The package angular after 1.7.0 is vulnerable to Regular Expression Denial of Service (ReDoS) by providing a custom locale rule that makes it possible to assign the parameter in posPre: ' '.repeat() of NUMBER_FORMATS.PATTERNS[1].posPre with a very high value.
**... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'angular'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25844'}, {'type': 'PACKAGE', 'url': 'https://github.com/angular/angular.js'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2WUSPYOTOMAZPDEFPWPSCSPMNODRDKK3/'}, {'type': 'WEB'... | {'cwe_ids': ['CWE-1333', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-04T20:12:02Z', 'nvd_published_at': '2022-05-01T16:15:00Z'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.