schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 8 154 | details stringlengths 31 19.1k | severity stringlengths 2 92 | affected stringlengths 75 28.5k | references stringlengths 79 7.48k | database_specific stringlengths 131 196 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-9r7g-325h-mxrm | 2022-07-07T22:54:01Z | 2022-05-17T02:53:20Z | null | ['CVE-2014-0229'] | Improper Authentication in Apache Hadoop | Apache Hadoop 0.23.x before 0.23.11 and 2.x before 2.4.1, as used in Cloudera CDH 5.0.x before 5.0.2, do not check authorization for the (1) refreshNamenodes, (2) deleteBlockPool, and (3) shutdownDatanode HDFS admin commands, which allows remote authenticated users to cause a denial of service (DataNodes shutdown) or p... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.23.0'}, {'fixed': '0.23.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0229'}, {'type': 'WEB', 'url': 'https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html#concept_i1q_xvk_2r'}] | {'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T22:54:01Z', 'nvd_published_at': '2017-03-23T20:59:00Z'} |
1.4.0 | GHSA-3qh2-mccc-q5m6 | 2023-07-21T22:48:34Z | 2022-05-13T01:34:29Z | null | ['CVE-2018-14658'] | Keycloak Open Redirect | A flaw was found in JBOSS Keycloak 3.2.1.Final. The Redirect URL for both Login and Logout are not normalized in `org.keycloak.protocol.oidc.utils.RedirectUtils` before the redirect url is verified. This can lead to an Open Redirection attack | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.2.1.Final'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14658'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:3592'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:3593'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:3595'}, {'type': 'WEB'... | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T22:48:34Z', 'nvd_published_at': '2018-11-13T19:29:00Z'} |
1.4.0 | GHSA-g2r3-4g8q-h5rj | 2023-05-24T13:55:09Z | 2022-05-24T17:33:08Z | null | ['CVE-2020-2309'] | Missing authorization in Jenkins Kubernetes Plugin | Jenkins Kubernetes Plugin prior to 1.27.4, 1.26.5, 1.25.4.1, and 1.21.6 does not perform a permission check in an HTTP endpoint.
This allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. Those can be used as part of an attack to capture the credentials using anot... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.csanchez.jenkins.plugins:kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.27.0'}, {'fixed': '1.27.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.csanchez.jenkins.plugins:kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'intr... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2309'}, {'type': 'WEB', 'url': 'https://github.com/CVEProject/cvelist/blob/381fe967666a5ce01625a7a050427aa4757e3ca6/2020/2xxx/CVE-2020-2309.json'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/kubernetes-plugin'}, {'type': 'WEB', 'url':... | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T00:51:30Z', 'nvd_published_at': '2020-11-04T15:15:00Z'} |
1.4.0 | GHSA-p6m5-x83r-hqmr | 2023-07-24T21:00:08Z | 2022-05-14T01:44:13Z | null | ['CVE-2018-19133'] | Flarum Core Leaks PII | In Flarum Core 0.1.0-beta.7.1, a serious leak can get everyone's email address. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'flarum/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.0-beta.7.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19133'}, {'type': 'WEB', 'url': 'https://github.com/flarum/core/issues/1628'}, {'type': 'WEB', 'url': 'https://github.com/flarum/framework/commit/e99f7fcdace74211bec5627e6adf20ddf7dad2a7'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-24T21:00:08Z', 'nvd_published_at': '2018-11-09T11:29:00Z'} |
1.4.0 | GHSA-pmxg-w9c7-ffmq | 2023-08-22T21:53:40Z | 2022-05-24T17:23:44Z | null | ['CVE-2020-13405'] | Microweber Discloses Sensitive Information | `userfiles/modules/users/controller/controller.php` in Microweber before 1.1.20 allows an unauthenticated user to disclose the users database via a `/modules/ POST` request. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.20'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13405'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/269320e0e0e06a1785e1a1556da769a34280b7e6'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://rhinosecuritylabs.c... | {'cwe_ids': ['CWE-200', 'CWE-306'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T21:38:09Z', 'nvd_published_at': '2020-07-16T19:15:00Z'} |
1.4.0 | GHSA-vp5f-8jgw-j53c | 2022-12-21T19:38:14Z | 2022-05-24T17:33:07Z | null | ['CVE-2020-2304'] | XXE vulnerability in Jenkins Subversion Plugin | Subversion Plugin 2.13.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
This allows attackers able to control an agent process to have Jenkins parse a crafted changelog file that uses external entities for extraction of secrets from the Jenkins controller or server-side req... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:subversion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.13.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2304'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/subversion-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-11-04/#SECURITY-2145'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2... | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T19:38:14Z', 'nvd_published_at': '2020-11-04T15:15:00Z'} |
1.4.0 | GHSA-hgjr-xwj3-jfvw | 2022-11-22T19:37:58Z | 2022-05-14T02:37:13Z | null | ['CVE-2016-9606'] | JBoss RESTEasy vulnerable to Improper Input Validation | JBoss RESTEasy before version 3.1.2 could be forced into parsing a request with YamlProvider, resulting in unmarshalling of potentially untrusted data which could allow an attacker to execute arbitrary code with RESTEasy application permissions. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:resteasy-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.2.Final'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-9606'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1253'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1254'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1256'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T19:37:58Z', 'nvd_published_at': '2018-03-09T20:29:00Z'} |
1.4.0 | GHSA-6px8-22w5-w334 | 2022-07-08T19:32:43Z | 2022-05-14T01:41:32Z | null | ['CVE-2019-0564'] | Denial of service in ASP.NET Core | A denial of service vulnerability exists when ASP.NET Core improperly handles web requests, aka "ASP.NET Core Denial of Service Vulnerability." This affects ASP.NET Core 2.1. This CVE ID is unique from CVE-2019-0548. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.WebSockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.WebSockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0564'}, {'type': 'WEB', 'url': 'https://github.com/aspnet/Announcements/issues/334'}, {'type': 'WEB', 'url': 'https://github.com/github/advisory-database/issues/302'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0040'}, {'typ... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T19:32:43Z', 'nvd_published_at': '2019-01-08T21:29:00Z'} |
1.4.0 | GHSA-wc52-2xwv-h7xr | 2023-07-20T22:37:27Z | 2022-05-13T01:18:35Z | null | ['CVE-2018-0873'] | ChakraCore RCE Vulnerability | ChakraCore and Microsoft Edge in Microsoft Windows 10 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the Chakra scripting engine handles objects in memory, aka "Chakra Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0872, CVE-2018-0874, CV... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-0873'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/024353a0019ddd845ac889deb8b4714df2122836'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0873'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T22:37:27Z', 'nvd_published_at': '2018-03-14T17:29:00Z'} |
1.4.0 | GHSA-vcfc-9wcp-j623 | 2022-06-17T21:38:35Z | 2022-05-24T22:00:16Z | null | ['CVE-2019-1010199'] | Cross site scripting attack in ServiceStack Framework | ServiceStack ServiceStack Framework 4.5.14 is affected by: Cross Site Scripting (XSS). The impact is: JavaScrpit is reflected in the server response, hence executed by the browser. The component is: the query used in the GET request is prone. The attack vector is: Since there is no server-side validation and If Browser... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'ServiceStack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.5.14'}, {'fixed': '5.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010199'}, {'type': 'WEB', 'url': 'https://github.com/ServiceStack/ServiceStack/commit/a0e0d7de20f5d1712f1793f925496def4383c610'}, {'type': 'PACKAGE', 'url': 'https://github.com/ServiceStack/ServiceStack'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:38:35Z', 'nvd_published_at': '2019-07-23T18:15:00Z'} |
1.4.0 | GHSA-phf8-3qgv-rg5q | 2022-11-01T23:02:55Z | 2022-05-13T01:18:20Z | null | ['CVE-2017-1000105'] | Missing Authorization in Jenkins Blue Ocean Plugin | The optional Run/Artifacts permission can be enabled by setting a Java system property. Blue Ocean did not check this permission before providing access to archived artifacts, Item/Read permission was sufficient. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.blueocean:blueocean'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000105'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2017-08-07/'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T23:02:55Z', 'nvd_published_at': '2017-10-05T01:29:00Z'} |
1.4.0 | GHSA-j67j-8hrp-76xm | 2023-08-29T18:25:18Z | 2022-05-17T04:49:44Z | null | ['CVE-2013-4195'] | Plone Multiple open redirect vulnerabilities | Multiple open redirect vulnerabilities in (1) marmoset_patch.py, (2) publish.py, and (3) principiaredirect.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1'}, {'fixed': '4.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1'}}, {'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'e... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4195'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=978471'}, {'type': 'PACKAGE', 'url': 'https://github.com/plone/Plone'}, {'type': 'WEB', 'url': 'http://plone.org/products/plone-hotfix/releases/20130618'}, {'type': 'WEB', ... | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T18:25:18Z', 'nvd_published_at': '2014-03-11T19:37:00Z'} |
1.4.0 | GHSA-84cm-vjwm-m979 | 2022-12-02T21:06:22Z | 2022-05-18T00:00:39Z | null | ['CVE-2022-30947'] | Path traversal in Jenkins Git Plugin | SCMs support a number of different URL schemes, including local file system paths (e.g. using `file:` URLs).
Historically in Jenkins, only agents checked out from SCM, and if multiple projects share the same agent, there is no expected isolation between builds besides using different workspaces unless overridden. Some... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:git'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.11.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.11.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30947'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/git-plugin/commit/b295606e0b865c298fde27bea14f9b7535a976e6'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/git-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/securi... | {'cwe_ids': ['CWE-22'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-06-02T15:51:22Z', 'nvd_published_at': '2022-05-17T15:15:00Z'} |
1.4.0 | GHSA-4ph7-5c44-pppv | 2023-01-26T23:55:53Z | 2022-05-14T03:47:44Z | null | ['CVE-2014-4999'] | kajam allows local users to obtain sensitive information by listing the process | `vendor/plugins/dataset/lib/dataset/database/mysql.rb` in the kajam gem 1.0.3.rc2 for Ruby places the mysql user password on the (1) mysqldump command line in the capture function and (2) mysql command line in the restore function, which allows local users to obtain sensitive information by listing the process. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'kajam'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.3.rc2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-4999'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/07/07/19'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/07/17/5'}, {'type': 'WEB', 'url': 'http://www.vapid.dhs.org/advisories/kajam-1.0.3.r... | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-26T23:55:53Z', 'nvd_published_at': '2018-01-10T18:29:00Z'} |
1.4.0 | GHSA-vw2c-5wph-v92r | 2022-07-06T19:46:03Z | 2022-05-13T01:09:20Z | null | ['CVE-2016-6812'] | Improper Neutralization of Input During Web Page Generation in Apache CXF | The HTTP transport module in Apache CXF prior to 3.0.12 and 3.1.x prior to 3.1.9 uses FormattedServiceListWriter to provide an HTML page which lists the names and absolute URL addresses of the available service endpoints. The module calculates the base URL using the current HttpServletRequest. The calculated base URL i... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.12'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.11'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf-core'}, 'ranges': [{'t... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6812'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:0868'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/CXF-6216'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:46:03Z', 'nvd_published_at': '2017-08-10T16:29:00Z'} |
1.4.0 | GHSA-fq9r-8jpm-2222 | 2023-08-03T20:06:51Z | 2022-05-17T00:35:42Z | null | ['CVE-2015-7318'] | Plone Header Injection | Plone 3.3.0 through 3.3.6 allows remote attackers to inject headers into HTTP responses. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3'}, {'fixed': '4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7318'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1264796'}, {'type': 'WEB', 'url': 'https://plone.org/security/hotfix/20150910/header-injection'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2015/09... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T20:06:51Z', 'nvd_published_at': '2017-09-25T17:29:00Z'} |
1.4.0 | GHSA-95xq-v4m2-fq3r | 2023-07-03T20:33:17Z | 2022-05-17T04:43:33Z | null | ['CVE-2013-4489'] | GitLab Grit Gem for Ruby contains a flaw allowing arbitrary commands to be executed | The Grit gem for Ruby, as used in GitLab 5.2 before 5.4.1 and 6.x before 6.2.3, allows remote authenticated users to execute arbitrary commands, as demonstrated by the search box for the GitLab code search feature.
GitLab Grit Gem for Ruby contains a flaw in the app/contexts/search_context.rb script. The issue is trig... | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'gitlab-grit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4489'}, {'type': 'WEB', 'url': 'https://github.com/gitlabhq/grit/commit/40f33a4f4f5604c2a531a1d86901fd81ac4402c4'}, {'type': 'PACKAGE', 'url': 'https://github.com/gitlabhq/grit'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T19:41:13Z', 'nvd_published_at': '2014-05-17T20:55:00Z'} |
1.4.0 | GHSA-x3gh-95p8-43qv | 2023-08-07T20:02:36Z | 2022-05-14T00:56:27Z | null | ['CVE-2014-8770'] | MAGMI plugin for Magento Unsafe File Upload | Unrestricted file upload vulnerability in `magmi/web/magmi.php` in the MAGMI (aka Magento Mass Importer) plugin 0.7.17a and earlier for Magento Community Edition (CE) allows remote authenticated users to execute arbitrary code by uploading a ZIP file that contains a PHP file, then accessing the PHP file via a direct re... | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'dweeves/magmi'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.7.17a'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-8770'}, {'type': 'WEB', 'url': 'https://sourceforge.net/projects/magmi/files/magmi-0.7/plugins/packages/'}, {'type': 'WEB', 'url': 'http://www.exploit-db.com/exploits/35052'}] | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-07T20:02:36Z', 'nvd_published_at': '2014-11-13T21:32:00Z'} |
1.4.0 | GHSA-8qq4-8jvq-mfw4 | 2022-07-01T21:20:58Z | 2022-05-14T01:10:16Z | null | ['CVE-2017-12616'] | Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat | When using a VirtualDirContext with Apache Tomcat 7.0.0 to 7.0.80 it was possible to bypass security constraints and/or view the source code of JSPs for resources served by the VirtualDirContext using a specially crafted request. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat-catalina'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.81'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.80'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12616'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0465'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0466'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'h... | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T21:20:58Z', 'nvd_published_at': '2017-09-19T13:29:00Z'} |
1.4.0 | GHSA-fhm8-cxcv-pwvc | 2023-09-28T20:29:24Z | 2022-05-13T01:22:55Z | null | ['CVE-2019-8336'] | HashiCorp Consul Access Restriction Bypass | HashiCorp Consul (and Consul Enterprise) 1.4.x before 1.4.3 allows a client to bypass intended access restrictions and obtain the privileges of one other arbitrary token within secondary datacenters, because a token with literally "<hidden>" as its secret is used in unusual circumstances. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8336'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/issues/5423'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/commit/90040f8bffb311e6cd8599273e95b607175e311f'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashico... | {'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T18:40:12Z', 'nvd_published_at': '2019-03-05T23:29:00Z'} |
1.4.0 | GHSA-4jjj-cm7q-v6hr | 2022-12-20T14:34:50Z | 2022-05-24T17:07:40Z | null | ['CVE-2020-2103'] | Jenkins Diagnostic page exposed session cookies | Jenkins shows various technical details about the current user on the `/whoAmI` page. In [a previous fix](https://www.jenkins.io/security/advisory/2019-09-25/#SECURITY-1505), the `Cookie` header value containing the HTTP session ID was redacted. However, user metadata shown on this page could also include the HTTP sess... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.205'}, {'fixed': '2.219'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2103'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2020:0402'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2020:0675'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0681'}, {'type': 'WEB',... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T14:34:50Z', 'nvd_published_at': '2020-01-29T16:15:00Z'} |
1.4.0 | GHSA-2cmg-vxvh-8h7h | 2023-07-20T17:47:18Z | 2022-05-24T16:49:19Z | null | ['CVE-2018-11317'] | Subrion CMS XSS | Subrion CMS before 4.1.4 has XSS. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'intelliants/subrion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11317'}, {'type': 'WEB', 'url': 'https://github.com/intelliants/subrion/blob/610b21d3ff185bd287d55fe016d4266abf04a3bf/includes/classes/ia.admin.sitemap.php#L79-L83'}, {'type': 'WEB', 'url': 'https://github.com/intelliants/subrion/releases/tag/v4.1.... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T17:47:18Z', 'nvd_published_at': '2019-07-03T16:15:00Z'} |
1.4.0 | GHSA-r64q-w8jr-g9qp | 2022-06-28T15:02:18Z | 2022-05-13T01:09:23Z | null | ['CVE-2019-11236'] | Improper Neutralization of CRLF Sequences in urllib3 library for Python | In the urllib3 library through 1.24.2 for Python, CRLF injection is possible if the attacker controls the request parameter. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'urllib3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.24.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.24.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11236'}, {'type': 'WEB', 'url': 'https://github.com/urllib3/urllib3/issues/1553'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2272'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3335'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-93'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T15:02:18Z', 'nvd_published_at': '2019-04-15T15:29:00Z'} |
1.4.0 | GHSA-5cmc-r23m-hvrr | 2023-08-28T23:35:36Z | 2022-05-17T01:29:43Z | null | ['CVE-2013-7077'] | TYPO3 Cross-site scripting (XSS) vulnerability in the Backend User Administration Module | Cross-site scripting (XSS) vulnerability in the Backend User Administration Module in TYPO3 6.0.x before 6.0.12 and 6.1.x before 6.1.7 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0'}, {'fixed': '6.0.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ecosystem_specific': {'affected_functions'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7077'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/89626'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3-CMS/core'}, {'type': 'WEB', 'url': 'http://osvdb.org/100884'}, {'type': 'WEB', 'url': 'http://seclist... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-28T23:35:36Z', 'nvd_published_at': '2013-12-21T00:55:00Z'} |
1.4.0 | GHSA-w2xf-4gg9-87wr | 2023-07-21T22:56:21Z | 2022-05-14T00:55:27Z | null | ['CVE-2018-19281'] | Centreon allows SNMP trap SQL Injection | Centreon 3.4.x (fixed in Centreon 18.10.0 and Centreon web 2.8.27) allows SNMP trap SQL Injection. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '18.0.0'}, {'fixed': '18.10.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ecosystem_specific': {'affected_... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19281'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon-archived/pull/6627'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon-archived/pull/7069'}, {'type': 'WEB', 'url': 'https://documentation.centreon.com/docs/centreon/... | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T22:56:21Z', 'nvd_published_at': '2018-11-14T20:29:00Z'} |
1.4.0 | GHSA-wvh5-78h5-gmgr | 2022-06-02T20:23:19Z | 2022-05-19T00:00:15Z | null | ['CVE-2022-30596'] | Cross-site Scripting in moodle | A flaw was found in moodle where ID numbers displayed when bulk allocating markers to assignments required additional sanitizing to prevent a stored XSS risk. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0'}, {'fixed': '4.0.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': [... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30596'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/6abe964bbac41b5e40a81b40962f7044b0dc201e'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2083583'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodl... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-02T20:23:19Z', 'nvd_published_at': '2022-05-18T17:15:00Z'} |
1.4.0 | GHSA-wq4h-7r42-5hrr | 2022-12-07T14:37:27Z | 2022-05-27T16:36:51Z | null | ['CVE-2022-30123'] | Possible shell escape sequence injection vulnerability in Rack | There is a possible shell escape sequence injection vulnerability in the Lint
and CommonLogger components of Rack. This vulnerability has been assigned the
CVE identifier CVE-2022-30123.
Versions Affected: All.
Not affected: None
Fixed Versions: 2.0.9.1, 2.1.4.1, 2.2.3.1
## Impact
Carefully crafted reques... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.9.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30123'}, {'type': 'WEB', 'url': 'https://github.com/rack/rack/commit/b426cc224908ec6ed6eb8729325392b048215d88'}, {'type': 'WEB', 'url': 'https://discuss.rubyonrails.org/t/cve-2022-30123-possible-shell-escape-sequence-injection-vulnerability-in-rack... | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-05-27T16:36:51Z', 'nvd_published_at': '2022-12-05T22:15:00Z'} |
1.4.0 | GHSA-8m35-r25c-qr56 | 2023-07-25T23:03:24Z | 2022-05-13T01:28:41Z | null | ['CVE-2017-3199'] | GraniteDS Insecure Deserialization | The Java implementation of GraniteDS, version 3.1.1.GA, AMF3 deserializers derives class instances from java.io.Externalizable rather than the AMF3 specification's recommendation of flash.utils.IExternalizable. A remote attacker with the ability to spoof or control an RMI server connection may be able to send serialize... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.graniteds:granite-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.1.GA'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-3199'}, {'type': 'WEB', 'url': 'https://codewhitesec.blogspot.com/2017/04/amf.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/graniteds/granitedsv'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210124021547/http://www.securityfocus... | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T23:03:24Z', 'nvd_published_at': '2018-06-11T17:29:00Z'} |
1.4.0 | GHSA-wmmc-qjq2-vvm2 | 2023-08-17T22:58:00Z | 2022-05-13T01:12:58Z | null | ['CVE-2013-2080'] | Moodle is vulnerable to Sensitive Information Disclosure | The core_grade component in Moodle through 2.2.10, 2.3.x before 2.3.7, and 2.4.x before 2.4.4 does not properly consider the existence of hidden grades, which allows remote authenticated users to obtain sensitive information by leveraging the student role and reading the Gradebook Overview report. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.10'}}, {'package': {'ecosystem': 'Packagist', ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2080'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=228931'}, {'type': 'WEB', 'url': 'http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-37475... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-17T22:58:00Z', 'nvd_published_at': '2013-05-25T03:18:00Z'} |
1.4.0 | GHSA-hq38-v658-g3wp | 2023-07-07T19:59:03Z | 2022-05-17T02:57:30Z | null | ['CVE-2017-5605'] | XMPP Clients User Impersonation Vulnerability in Movim Moxl | An incorrect implementation of "XEP-0280: Message Carbons" in multiple XMPP clients allows a remote attacker to impersonate any user, including contacts, in the vulnerable application's display. This allows for various kinds of social engineering attacks. This CVE is for Movim 0.8 - 0.10. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'movim/moxl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8'}, {'last_affected': '0.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-5605'}, {'type': 'WEB', 'url': 'https://github.com/movim/moxl/commit/838b0a42efc3b67cc17d63e25ae1d0ea849cd89b'}, {'type': 'WEB', 'url': 'https://rt-solutions.de/wp-content/uploads/2017/02/CVE-2017-5589_xmpp_carbons.pdf'}, {'type': 'WEB', 'url': 'ht... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T19:59:03Z', 'nvd_published_at': '2017-02-09T20:59:00Z'} |
1.4.0 | GHSA-wwwh-47wp-m522 | 2023-08-02T22:06:37Z | 2022-05-13T01:54:10Z | null | ['CVE-2015-6240'] | Ansible Sandbox Escape via Symlink Attack | The chroot, jail, and zone connection plugins in ansible before 1.9.2 allow local users to escape a restricted environment via a symlink attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-6240'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/commit/952166f48eb0f5797b75b160fd156bbe1e8fc647'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/commit/ca2f2c4ebd7b5e097eab0a710f79c1f63badf95b'}, {'type': 'WEB', 'url... | {'cwe_ids': ['CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-02T22:06:37Z', 'nvd_published_at': '2017-06-07T20:29:00Z'} |
1.4.0 | GHSA-rxfp-8jmr-xc95 | 2023-07-31T21:10:08Z | 2022-05-17T02:56:17Z | null | ['CVE-2016-4947'] | Cloudera HUE Account Enumeration | Cloudera HUE 3.9.0 and earlier allows remote attackers to enumerate user accounts via a request to `desktop/api/users/autocomplete`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'gethue'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.9.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-4947'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210123183622/http://www.securityfocus.com/bid/93880'}, {'type': 'WEB', 'url': 'http://2016.hack.lu/archive/2016/Wavestone%20-%20Hack.lu%202016%20-%20Hadoop%20safari%20-%20Hunting%20for%2... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T21:10:08Z', 'nvd_published_at': '2017-03-07T16:59:00Z'} |
1.4.0 | GHSA-34wj-p5jm-2p96 | 2022-07-06T19:44:36Z | 2022-05-13T01:06:10Z | null | ['CVE-2016-5851'] | Improper Restriction of XML External Entity Reference in python-docx | python-docx before 0.8.6 allows context-dependent attackers to conduct XML External Entity (XXE) attacks via a crafted document. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'python-docx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.8.5'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-5851'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-34wj-p5jm-2p96'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/python-docx/PYSEC-2016-21.yaml'}, {'type': 'PACKAGE', 'url': 'https://github... | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:44:36Z', 'nvd_published_at': '2016-12-21T22:59:00Z'} |
1.4.0 | GHSA-qgfg-gvff-523v | 2023-02-06T19:28:19Z | 2022-05-14T02:10:39Z | null | ['CVE-2013-4111'] | python-glanceclient vulnerable to SSL server spoofing due to unverified X.509 certificate | The Python client library for Glance (python-glanceclient) before 0.10.0 does not properly check the preverify_ok value, which prevents the server hostname from being verified with a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate and allows man-in-the-middle attackers to ... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'python-glanceclient'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4111'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:1200'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2013-4111'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/ossa/+bug/1192229'}, {'type': 'WEB... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-06T19:28:19Z', 'nvd_published_at': '2013-08-28T21:55:00Z'} |
1.4.0 | GHSA-fj6f-6933-839j | 2022-12-19T21:06:59Z | 2022-05-24T17:07:40Z | null | ['CVE-2020-2102'] | Non-constant time HMAC comparison | Jenkins 2.218 and earlier, LTS 2.204.1 and earlier does not use a constant-time comparison when checking whether two HMACs are equal. This could potentially allow attackers to use statistical methods to obtain a valid HMAC for an attacker-controlled input value.
Jenkins 2.219, LTS 2.204.2 now uses a constant-time comp... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.204.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.204.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2102'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2020:0402'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2020:0675'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0681'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-203', 'CWE-208'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-19T21:06:59Z', 'nvd_published_at': '2020-01-29T16:15:00Z'} |
1.4.0 | GHSA-qwwj-qj3f-9hv7 | 2022-07-13T17:17:40Z | 2022-05-17T05:02:41Z | null | ['CVE-2011-1411'] | Improper Authentication in OpenSAML | Shibboleth OpenSAML library 2.4.x before 2.4.3 and 2.5.x before 2.5.1, and IdP before 2.3.2, allows remote attackers to forge messages and bypass authentication via an "XML Signature wrapping attack." | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.opensaml:opensaml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.opensaml:opensaml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-1411'}, {'type': 'WEB', 'url': 'http://shibboleth.internet2.edu/secadv/secadv_20110725.txt'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2011/dsa-2284'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/topics/security/cpuoct20... | {'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T17:17:40Z', 'nvd_published_at': '2011-09-02T23:55:00Z'} |
1.4.0 | GHSA-6fxm-66hq-fc96 | 2022-07-13T21:10:51Z | 2022-05-13T01:07:05Z | null | ['CVE-2012-2098'] | Uncontrolled Resource Consumption in Apache Commons Compress | Algorithmic complexity vulnerability in the sorting algorithms in bzip2 compressing stream (BZip2CompressorOutputStream) in Apache Commons Compress before 1.4.1 allows remote attackers to cause a denial of service (CPU consumption) via a file with many repeating inputs. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.commons:commons-compress'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-2098'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/75857'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/commons-compress'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d7... | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T21:10:51Z', 'nvd_published_at': '2012-06-29T19:55:00Z'} |
1.4.0 | GHSA-7r36-jf3c-jhp4 | 2023-06-09T22:54:40Z | 2022-05-13T01:50:31Z | 2023-06-09T22:54:40Z | [] | Duplicate Advisory: tgstation-server vulnerable to cached user logins in legacy server | ## Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-42r6-p4px-qvv6. This link is maintained to preserve external references.
## Original Description
In Tgstation tgstation-server 3.2.4.0 through 3.2.1.0 (fixed in 3.2.5.0), active logins would be cached, allowing subsequent logins t... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'TGServiceInterface'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.1.0'}, {'fixed': '3.2.5.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.4.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17107'}, {'type': 'WEB', 'url': 'https://github.com/tgstation/tgstation-server/issues/690'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T22:54:40Z', 'nvd_published_at': '2018-09-24T22:29:00Z'} |
1.4.0 | GHSA-4rrr-j7ff-r844 | 2023-08-29T18:28:22Z | 2022-05-17T04:54:13Z | null | ['CVE-2013-2104'] | python-keystoneclient missing expiration check in PKI token validation | python-keystoneclient before 0.2.4, as used in OpenStack Keystone (Folsom), does not properly check expiry for PKI tokens, which allows remote authenticated users to (1) retain use of a token after it has expired, or (2) use a revoked token once it expires. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'python-keystoneclient'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2104'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0944'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2013-2104'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/python-keystoneclient/+bug/1179615... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T18:28:22Z', 'nvd_published_at': '2014-01-21T18:55:00Z'} |
1.4.0 | GHSA-rwh3-5g7v-3c5m | 2022-12-22T13:39:27Z | 2022-05-24T17:33:08Z | null | ['CVE-2020-2312'] | Password written to the build log by Jenkins SQLPlus Script Runner Plugin | SQLPlus Script Runner Plugin 2.0.12 and earlier prints the `sqlplus` command invocation to the build log.
This log message does not redact a password provided as part of a command line argument. This password can be viewed by users with Item/Read permission.
SQLPlus Script Runner Plugin 2.0.13 no longer prints the pa... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:sqlplus-script-runner'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2312'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/sqlplus-script-runner-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-11-04/#SECURITY-2129'}] | {'cwe_ids': ['CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T13:39:27Z', 'nvd_published_at': '2020-11-04T15:15:00Z'} |
1.4.0 | GHSA-p6f4-h6w5-9jmc | 2023-07-28T23:27:03Z | 2022-05-14T02:22:18Z | null | ['CVE-2016-7242'] | ChakraCore RCE Vulnerability | The Chakra JavaScript scripting engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-7200, CVE-2016-7201, CVE-2016-7202, CVE-2016... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-7242'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/1982'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/c2787ef8fdb7401922e9ec6540e4e5895d11c631'}, {'type': 'WEB', 'url': 'https://docs.microso... | {'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T23:27:03Z', 'nvd_published_at': '2016-11-10T06:59:00Z'} |
1.4.0 | GHSA-pcr8-75v3-w9pf | 2023-07-27T19:30:54Z | 2022-05-17T00:19:55Z | null | ['CVE-2017-11862'] | Chakra Core Privilege Escalation | ChakraCore and Microsoft Edge in Windows 10 1709 and Windows Server, version 1709 allows an attacker to gain the same user rights as the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11836, CVE-2017-11... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-11862'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/4226'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/66d733b9adebbe33cc7f48c159c48b7837aa4458'}, {'type': 'WEB', 'url': 'https://portal.msrc... | {'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-27T19:30:54Z', 'nvd_published_at': '2017-11-15T03:29:00Z'} |
1.4.0 | GHSA-f93f-g33r-8pcp | 2022-07-07T22:58:08Z | 2022-05-13T01:02:39Z | null | ['CVE-2014-0225'] | Improper Restriction of XML External Entity Reference in Spring Framework | When processing user provided XML documents, the Spring Framework 4.0.0 to 4.0.4, 3.0.0 to 3.2.8, and possibly earlier unsupported versions did not disable by default the resolution of URI references in a DTD declaration. This enabled an XXE attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-webmvc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-webmvc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0225'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-framework/commit/8e096aeef55287dc829484996c9330cf755891a1'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-framework/commit/c6503ebbf7c9e21ff022c58706dbac... | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T22:58:08Z', 'nvd_published_at': '2017-05-25T17:29:00Z'} |
1.4.0 | GHSA-xqpp-26pp-2365 | 2022-12-15T17:32:32Z | 2022-05-24T19:03:11Z | null | ['CVE-2021-21660'] | XSS vulnerability in Jenkins Markdown Formatter Plugin | Markdown Formatter Plugin 0.1.0 and earlier uses a Markdown library to parse Markdown that does not escape crafted link target URLs.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with the ability to edit any description rendered using the configured markup formatter.
Markd... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:markdown-formatter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.1.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21660'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/markdown-formatter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-05-25/#SECURITY-2198'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T17:32:32Z', 'nvd_published_at': '2021-05-25T17:15:00Z'} |
1.4.0 | GHSA-65j5-vpm7-6xp4 | 2023-07-25T19:37:36Z | 2022-05-14T01:58:46Z | null | ['CVE-2018-16831'] | Smarty Path Traversal Vulnerability | Smarty before 3.1.33-dev-4 allows attackers to bypass the trusted_dir protection mechanism via a `file:./../` substring in an include statement. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'smarty/smarty'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.33-dev-4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16831'}, {'type': 'WEB', 'url': 'https://github.com/smarty-php/smarty/issues/486'}, {'type': 'WEB', 'url': 'https://github.com/smarty-php/smarty/commit/f9ca3c63d1250bb56b2bda609dcc9dd81f0065f8'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T19:37:36Z', 'nvd_published_at': '2018-09-11T13:29:00Z'} |
1.4.0 | GHSA-3mwj-7vmq-w43p | 2022-12-20T22:13:04Z | 2022-05-24T17:25:24Z | null | ['CVE-2020-2236'] | Stored XSS vulnerability in Jenkins Yet Another Build Visualizer Plugin | Yet Another Build Visualizer Plugin 1.11 and earlier does not escape tooltip content.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by users with Run/Update permission.
Yet Another Build Visualizer Plugin 1.12 escapes tooltip content. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.axis.system.jenkins.plugins.downstream:yet-another-build-visualizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2236'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/yet-another-build-visualizer-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-08-12/#SECURITY-1940'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T22:13:04Z', 'nvd_published_at': '2020-08-12T14:15:00Z'} |
1.4.0 | GHSA-jwh2-ffg4-48xc | 2022-06-22T18:50:29Z | 2022-05-24T17:44:37Z | null | ['CVE-2021-20218'] | Improper Limitation of a Pathname to a Restricted Directory in Fabric8 Kubernetes Client | A flaw was found in the fabric8 kubernetes-client in version 4.2.0 and after. This flaw allows a malicious pod/container to cause applications using the fabric8 kubernetes-client `copy` command to extract files outside the working path. The highest threat from this vulnerability is to integrity and system availability.... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.fabric8:kubernetes-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.7.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.7.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'io.fabric8:kubernetes-client'}, 'r... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20218'}, {'type': 'WEB', 'url': 'https://github.com/fabric8io/kubernetes-client/issues/2715'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1923405'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-22T18:50:29Z', 'nvd_published_at': '2021-03-16T21:15:00Z'} |
1.4.0 | GHSA-qwfv-5jwj-582h | 2023-07-26T21:37:20Z | 2022-05-14T01:06:17Z | null | ['CVE-2017-1000217'] | Opencast RCE Vulnerability | Opencast 2.3.2 and older versions are vulnerable to script injections through media and metadata in the player and media module resulting in arbitrary code execution, fixed in 2.3.3 and 3.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.opencastproject:base'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.3.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000217'}, {'type': 'WEB', 'url': 'https://groups.google.com/a/opencast.org/forum/#!topic/security-notices/sCpt0pIPEFg'}] | {'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T21:37:20Z', 'nvd_published_at': '2017-11-17T22:29:00Z'} |
1.4.0 | GHSA-vv33-27jm-cvxq | 2023-07-06T21:14:06Z | 2022-05-24T19:06:51Z | null | ['CVE-2020-36395'] | Stored XSS in LavaLite 5.8.0 | A stored cross site scripting (XSS) vulnerability in the /admin/user/team component of LavaLite 5.8.0 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the "New" parameter. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'lavalite/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.8.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36395'}, {'type': 'WEB', 'url': 'https://github.com/LavaLite/cms/issues/321'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T21:14:06Z', 'nvd_published_at': '2021-07-02T18:15:00Z'} |
1.4.0 | GHSA-fh35-p8ph-p545 | 2023-08-02T21:02:12Z | 2022-05-14T02:48:26Z | null | ['CVE-2015-5062'] | Silverstripe CMS Open Redirect | Open redirect vulnerability in SilverStripe CMS & Framework 3.1.13 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the returnURL parameter to dev/build. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.13'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affecte... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5062'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228091958/http://www.securityfocus.com/bid/75419'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201209000421/http://www.securityfocus.com/archive/1/535716/100/0/threaded'}, ... | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-02T21:02:12Z', 'nvd_published_at': '2015-06-24T14:59:00Z'} |
1.4.0 | GHSA-ff7r-7rrm-wx6w | 2023-07-17T21:52:34Z | 2022-05-24T16:52:25Z | null | ['CVE-2019-7882'] | Magento 2 Community Edition XSS Vulnerability | A stored cross-site scripting vulnerability exists in the WYSIWYG editor of Magento Open Source prior to 1.9.4.2, and Magento Commerce prior to 1.14.4.2, Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. An authenticated user with privileges to the editor can inject malicious SWF file... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixe... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7882'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051916/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-23'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T21:52:34Z', 'nvd_published_at': '2019-08-02T22:15:00Z'} |
1.4.0 | GHSA-r7p7-qr7p-2rrf | 2023-07-26T19:56:19Z | 2022-05-14T01:21:36Z | null | ['CVE-2017-16652'] | Symfony Open Redirect | An issue was discovered in Symfony 2.7.x before 2.7.38, 2.8.x before 2.8.31, 3.2.x before 3.2.14, and 3.3.x before 3.3.13. `DefaultAuthenticationSuccessHandler` or `DefaultAuthenticationFailureHandler` takes the content of the `_target_path` parameter and generates a redirect response, but no check is performed on the ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7'}, {'fixed': '2.7.38'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8'}, {'fixed': '2.8.31'}]}]}, {... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16652'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/03/msg00009.html'}, {'type': 'WEB', 'url': 'https://symfony.com/blog/cve-2017-16652-open-redirect-vulnerability-on-security-handlers'}] | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T19:56:19Z', 'nvd_published_at': '2018-06-13T16:29:00Z'} |
1.4.0 | GHSA-px5r-fqj6-r2f8 | 2023-07-25T20:11:37Z | 2022-05-14T02:01:21Z | null | ['CVE-2018-17031'] | Gogs XSS Vulnerability | In Gogs 0.11.53, an attacker can use a crafted .eml file to trigger MIME type sniffing, which leads to XSS, as demonstrated by Internet Explorer, because an "X-Content-Type-Options: nosniff" header is not sent. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'gogs.io/gogs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.11.53'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17031'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/issues/5397'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T20:11:37Z', 'nvd_published_at': '2018-09-14T02:29:00Z'} |
1.4.0 | GHSA-9x5v-8352-244g | 2023-09-11T20:43:36Z | 2022-05-24T16:51:50Z | null | ['CVE-2019-10357'] | Missing Authorization in Jenkins Pipeline: Shared Groovy Libraries Plugin | A missing permission check in Jenkins Pipeline: Shared Groovy Libraries Plugin 2.14 and earlier allowed users with Overall/Read access to obtain limited information about the content of SCM repositories referenced by global libraries. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.workflow:workflow-cps-global-lib'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.15'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.14'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10357'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/workflow-cps-global-lib-plugin/commit/6fce1e241d82641e8648c546bc63c22a5e07e96b'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2594'}, {'type': 'WEB', 'url': 'https... | {'cwe_ids': ['CWE-285', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T22:41:06Z', 'nvd_published_at': '2019-07-31T13:15:00Z'} |
1.4.0 | GHSA-8mx3-gp3p-vgg7 | 2023-07-14T21:20:28Z | 2022-05-24T22:00:16Z | null | ['CVE-2019-1010206'] | kevinsawicki/http-request Missing certificate validation | OSS Http Request (kevinsawicki/http-request) is missing SSL/TLS certificate validation. The impact is: certificate spoofing. The component is: use this library when https communication. The attack vector is: certificate spoofing. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.github.kevinsawicki:http-request'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010206'}, {'type': 'WEB', 'url': 'https://github.com/kevinsawicki/http-request/blob/master/lib/src/main/java/com/github/kevinsawicki/http/HttpRequest.java'}] | {'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T23:47:08Z', 'nvd_published_at': '2019-07-23T14:15:00Z'} |
1.4.0 | GHSA-7gfx-wxfh-7rvm | 2023-07-19T23:14:57Z | 2022-05-13T01:05:24Z | null | ['CVE-2018-13982'] | Smarty Path Traversal Vulnerability | `Smarty_Security::isTrustedResourceDir()` in Smarty before 3.1.33 is prone to a path traversal vulnerability due to insufficient template code sanitization. This allows attackers controlling the executed template code to bypass the trusted directory security restriction and read arbitrary files. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'smarty/smarty'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.33'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-13982'}, {'type': 'WEB', 'url': 'https://github.com/smarty-php/smarty/commit/2e081a51b1effddb23f87952959139ac62654d50'}, {'type': 'WEB', 'url': 'https://github.com/smarty-php/smarty/commit/8d21f38dc35c4cd6b31c2f23fc9b8e5adbc56dfe'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T23:14:57Z', 'nvd_published_at': '2018-09-18T21:29:00Z'} |
1.4.0 | GHSA-52rh-5rpj-c3w6 | 2022-05-05T16:00:50Z | 2022-05-05T16:00:50Z | null | [] | Improper handling of multiline messages in node-irc | node-irc is a socket wrapper for the IRC protocol that extends Node.js' EventEmitter. The vulnerability allows an attacker to manipulate a Matrix user into executing IRC commands by having them reply to a maliciously crafted message. Incorrect handling of a CR character allowed for making part of the message be sent to... | [] | [{'package': {'ecosystem': 'npm', 'name': 'matrix-org-irc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.2.0'}}] | [{'type': 'WEB', 'url': 'https://github.com/matrix-org/node-irc/security/advisories/GHSA-52rh-5rpj-c3w6'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/node-irc/commit/2976c856df37660a9d664e94c857c796de2e34f7'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/node-irc/commit/e3eb9c15f8240e9c92365f5ffc394... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-05T16:00:50Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jwwr-fjgh-cv2x | 2022-07-07T22:43:25Z | 2022-05-13T01:05:37Z | null | ['CVE-2014-3004'] | Improper Restriction of XML External Entity Reference in Castor | The default configuration for the Xerces SAX Parser in Castor before 1.3.3 allows context-dependent attackers to conduct XML External Entity (XXE) attacks via a crafted XML document. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.codehaus.castor:castor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3004'}, {'type': 'WEB', 'url': 'https://quickview.cloudapps.cisco.com/quickview/bug/CSCvm56811'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoc... | {'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T22:43:25Z', 'nvd_published_at': '2014-06-11T14:55:00Z'} |
1.4.0 | GHSA-mr75-899x-qcxq | 2022-12-16T22:21:13Z | 2022-05-24T17:35:09Z | null | ['CVE-2020-2322'] | Missing permission checks in Jenkins Chaos Monkey Plugin | Chaos Monkey Plugin 0.3 and earlier does not perform permission checks in several HTTP endpoints.
This allows attackers with Overall/Read permission to generate load and to generate memory leaks.
Chaos Monkey Plugin 0.4 requires Overall/Administer permission to generate load and to generate memory leaks. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:chaos-monkey'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2322'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/chaos-monkey-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-12-03/#SECURITY-2109%20(1)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-se... | {'cwe_ids': ['CWE-401', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-16T22:21:13Z', 'nvd_published_at': '2020-12-03T16:15:00Z'} |
1.4.0 | GHSA-qwv2-2x8g-g43g | 2023-03-09T00:29:28Z | 2022-05-13T01:31:05Z | null | ['CVE-2017-14683'] | Gem in a Box vulnerable to Cross-site Request Forgery | geminabox (aka Gem in a Box) before 0.13.7 has CSRF, as demonstrated by an unintended gem upload. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'geminabox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-14683'}, {'type': 'WEB', 'url': 'https://github.com/geminabox/geminabox/commit/a01c4e8b3403624109499dec75eb6ee30bd01a55'}, {'type': 'PACKAGE', 'url': 'https://github.com/geminabox/geminabox'}, {'type': 'WEB', 'url': 'https://github.com/geminabox/ge... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-09T00:29:28Z', 'nvd_published_at': '2017-09-25T08:29:00Z'} |
1.4.0 | GHSA-j279-cx9m-jv3w | 2022-12-12T16:57:45Z | 2022-05-14T03:18:40Z | null | ['CVE-2018-1000174'] | Jenkins Google Login Plugin Open Redirect vulnerability | An open redirect vulnerability exists in Jenkins Google Login Plugin 1.3 and older in GoogleOAuth2SecurityRealm.java that allows attackers to redirect users to an arbitrary URL after successful login. Google Login Plugin 1.3.1 only performs redirects to relative URLs. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:google-login'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000174'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/google-login-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-04-16/'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/104211'}] | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T16:57:45Z', 'nvd_published_at': '2018-05-08T15:29:00Z'} |
1.4.0 | GHSA-r9pv-hg64-jqrp | 2022-11-04T22:36:46Z | 2022-05-24T16:51:28Z | null | ['CVE-2019-0202'] | Exposure of Sensitive Information in Apache Storm Logviewer | The Apache Storm Logviewer daemon exposes HTTP-accessible endpoints to read/search log files on hosts running Storm. In Apache Storm versions 0.9.1-incubating to 1.2.2, it is possible to read files off the host's file system that were not intended to be accessible via these endpoints. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.storm:storm-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.1-incubating'}, {'fixed': '1.2.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0202'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/storm'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/220f1a77ff20749326a4c130446c5521db854da0afe81d1974b8109f@%3Cuser.storm.apache.org%3E'}] | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-04T22:36:46Z', 'nvd_published_at': '2019-07-26T00:15:00Z'} |
1.4.0 | GHSA-p57w-9q28-j6v7 | 2023-07-25T18:43:01Z | 2022-05-14T02:02:33Z | null | ['CVE-2018-16650'] | phpMyFAQ CSRF | phpMyFAQ before 2.9.11 allows CSRF. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16650'}, {'type': 'WEB', 'url': 'https://www.phpmyfaq.de/security/advisory-2018-09-02'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T18:43:01Z', 'nvd_published_at': '2018-09-07T05:29:00Z'} |
1.4.0 | GHSA-297x-8xj4-vcxv | 2022-06-23T06:55:22Z | 2022-05-24T17:11:32Z | null | ['CVE-2020-8141'] | Improper Control of Generation of Code in doT | The dot package v1.1.2 uses Function() to compile templates. This can be exploited by the attacker if they can control the given template or if they can control the value set on Object.prototype. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'dot'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.1.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8141'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/390929'}] | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T06:55:22Z', 'nvd_published_at': '2020-03-15T18:15:00Z'} |
1.4.0 | GHSA-4vwv-x3gp-2j4g | 2023-08-03T21:24:41Z | 2022-05-17T02:19:49Z | null | ['CVE-2015-3198'] | The Undertow module of WildFly allows source code disclosure | The Undertow module of WildFly versions 8.1.0.Final, 8.2.0.Final, 9.0.0.CR1 allows remote attackers to obtain the source code of a JSP page via a "/" at the end of a URL. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.wildfly:wildfly-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.1.0.Final'}, {'fixed': '9.0.0.CR2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.0.0.CR1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3198'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1224787'}, {'type': 'WEB', 'url': 'https://developer.jboss.org/message/927301#927301'}, {'type': 'WEB', 'url': 'https://issues.jboss.org/browse/WFLY-4595'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T21:24:41Z', 'nvd_published_at': '2017-07-21T14:29:00Z'} |
1.4.0 | GHSA-j4gx-p3x5-m987 | 2023-06-09T23:07:08Z | 2022-05-14T03:44:51Z | null | ['CVE-2014-1835'] | Echor Ruby Gem credentials can be stolen via process table monitoring | The perform_request function in /lib/echor/backplane.rb in echor 0.1.6 Ruby Gem allows local users to steal the login credentials by watching the process table. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'echor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-1835'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/echor/CVE-2014-1835.yml'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/01/31/10'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T23:07:08Z', 'nvd_published_at': '2018-02-02T21:29:00Z'} |
1.4.0 | GHSA-hhpm-74pm-hf35 | 2023-08-22T14:35:45Z | 2022-05-24T17:24:40Z | null | ['CVE-2020-8553'] | ingress-nginx component for Kubernetes allows file overwrite | The Kubernetes ingress-nginx component prior to version 0.28.0 allows a user with the ability to create namespaces and to read and create ingress objects to overwrite the password file of another ingress which uses nginx.ingress.kubernetes.io/auth-type: basic and which has a hyphenated namespace or secret name. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'k8s.io/ingress-nginx'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.28.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8553'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/ingress-nginx/issues/5126'}, {'type': 'PACKAGE', 'url': 'https://github.com/kubernetes/ingress-nginx'}] | {'cwe_ids': ['CWE-610', 'CWE-73'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T21:00:22Z', 'nvd_published_at': '2020-07-29T15:15:00Z'} |
1.4.0 | GHSA-hr59-35cr-qf43 | 2023-08-29T21:36:39Z | 2022-05-17T04:32:24Z | null | ['CVE-2012-5502'] | Plone Cross-site scripting Vulnerability | Cross-site scripting (XSS) vulnerability in safe_html.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote authenticated users with permissions to edit content to inject arbitrary web script or HTML via unspecified vectors. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'E... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-5502'}, {'type': 'WEB', 'url': 'https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt'}, {'type': 'WEB', 'url': 'https://plone.org/products/plone-hotfix/releases/20121106'}, {'type': 'WEB', 'url': 'https://plone.org/products/plone/... | {'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T21:36:39Z', 'nvd_published_at': '2014-09-30T14:55:00Z'} |
1.4.0 | GHSA-4hm9-844j-jmxp | 2023-06-09T23:00:36Z | 2022-05-24T16:49:06Z | null | ['CVE-2019-13117'] | Uninitialized read in Nokogiri gem | In numbers.c in libxslt 1.1.33, an xsl:number with certain format strings could lead to a uninitialized read in xsltNumberFormatInsertNumbers. This could allow an attacker to discern whether a byte on the stack contains the characters A, a, I, i, or 0, or any other character. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-13117'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/issues/1943'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14471'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blo... | {'cwe_ids': ['CWE-908'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T23:00:36Z', 'nvd_published_at': '2019-07-01T02:15:00Z'} |
1.4.0 | GHSA-hjp5-hv33-q58g | 2023-09-22T23:41:41Z | 2022-05-01T23:39:47Z | null | ['CVE-2008-1396'] | Plone credentials stored in session cookie | Plone CMS 3.1.x uses invariant data (a client username and a server secret) when calculating an HMAC-SHA1 value for an authentication cookie, which makes it easier for remote attackers to gain permanent access to an account by sniffing the network. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2008-1396'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/41421'}, {'type': 'PACKAGE', 'url': ' https://github.com/plone/Plone'}, {'type': 'WEB', 'url': 'http://securityreason.com/securityalert/3754'}, {'type': 'WEB', 'ur... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-22T23:41:41Z', 'nvd_published_at': '2008-03-20T00:44:00Z'} |
1.4.0 | GHSA-38f9-4vhq-9cr8 | 2023-07-07T13:56:21Z | 2022-05-24T17:40:23Z | null | ['CVE-2021-3291'] | Zen Cart vulnerable to authenticated remote code execution | Zen Cart 1.5.7b allows admins to execute arbitrary OS commands by inspecting an HTML radio input element (within the modules edit page) and inserting a command. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'zencart/zencart'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.7c'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.5.7b'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3291'}, {'type': 'WEB', 'url': 'https://github.com/zencart/zencart/commit/7447627f7148b11c614f89dab4a09d3f102b58af'}, {'type': 'WEB', 'url': 'https://github.com/MucahitSaratar/zencart_auth_rce_poc'}, {'type': 'PACKAGE', 'url': 'https://github.com/z... | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T13:56:21Z', 'nvd_published_at': '2021-01-26T18:16:00Z'} |
1.4.0 | GHSA-q388-j7cw-ff7w | 2022-11-03T22:33:13Z | 2022-05-17T03:13:10Z | null | ['CVE-2013-3827'] | Path Traversal in Eclipse Mojarra | Multiple path traversal flaws where found in Mojarra JSF2 implementation for identifying resources by name or from libraries. An unauthenticated remote attacker can use these flaws to gather otherwise undisclosed information from within an application's root. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.glassfish:javax.faces'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.19'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-3827'}, {'type': 'WEB', 'url': 'https://bugs.gentoo.org/show_bug.cgi?id=CVE-2013-3827'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0029.html'}, {'type': 'WEB', 'url': 'http://www.kb.cert.org/vuls/id/526012'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T22:33:13Z', 'nvd_published_at': '2013-10-16T15:55:00Z'} |
1.4.0 | GHSA-65wv-528r-m892 | 2022-06-21T20:05:07Z | 2022-05-24T17:21:16Z | null | ['CVE-2020-13961'] | Improper Input Validation in strapi | Strapi before 3.0.2 could allow a remote authenticated attacker to bypass security restrictions because templates are stored in a global variable without any sanitation. By sending a specially crafted request, an attacker could exploit this vulnerability to update the email template for both password reset and account ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'strapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13961'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/pull/6599'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/183045'}, {'type': 'PACKAGE', 'url': 'https://github.com/strapi/strapi'}, {'type': 'WEB', 'u... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-21T20:05:07Z', 'nvd_published_at': '2020-06-19T17:15:00Z'} |
1.4.0 | GHSA-wxcw-rqxc-hj85 | 2023-09-22T21:42:53Z | 2022-05-01T18:31:03Z | null | ['CVE-2007-5201'] | FTP backend for Duplicity Discloses Passwords to Process Listing | The FTP backend for Duplicity before 0.4.9 sends the password as a command line argument when calling ncftp, which might allow local users to read the password by listing the process and its arguments. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'duplicity'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-5201'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=293081'}, {'type': 'PACKAGE', 'url': 'https://gitlab.com/duplicity/duplicity'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20080118045107/https://duplicity.nongnu.... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-22T21:42:53Z', 'nvd_published_at': '2007-10-04T17:17:00Z'} |
1.4.0 | GHSA-399v-jg88-3gx6 | 2023-07-20T18:15:47Z | 2022-05-13T01:18:34Z | null | ['CVE-2018-0856'] | ChakraCore RCE Vulnerability | Microsoft Edge and ChakraCore in Microsoft Windows 10 1703 and 1709 allows remote code execution, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0834, CVE-2018-0835, CVE-2018-0836, CVE-2018-0837, CVE-2018-0838, CVE-2... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-0856'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/385af842bce4f94ddef98553a81f8ea99c7e2dcf'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0856'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T18:15:47Z', 'nvd_published_at': '2018-02-15T02:29:00Z'} |
1.4.0 | GHSA-324h-2v7h-q3xx | 2022-12-16T23:00:17Z | 2022-05-24T17:15:34Z | null | ['CVE-2020-2179'] | RCE vulnerability in Jenkins Yaml Axis Plugin | Yaml Axis Plugin 0.2.0 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types. This results in a remote code execution (RCE) vulnerability exploitable by users able to configure a multi-configuration (Matrix) job, or control the contents of a previously configured job’s SCM repos... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:yaml-axis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.2.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2179'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/yaml-axis-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-04-16/#SECURITY-1825'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/0... | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-16T23:00:17Z', 'nvd_published_at': '2020-04-16T19:15:00Z'} |
1.4.0 | GHSA-pgj6-jmj5-wqfx | 2022-12-16T20:40:24Z | 2022-05-24T19:19:44Z | null | ['CVE-2021-21694'] | Multiple vulnerabilities allow bypassing path filtering of agent-to-controller access control in Jenkins | The agent-to-controller security subsystem limits which files on the Jenkins controller can be accessed by agent processes.
Multiple vulnerabilities in the file path filtering implementation of Jenkins 2.318 and earlier, LTS 2.303.2 and earlier allow agent processes to read and write arbitrary files on the Jenkins con... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.303.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.303.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21694'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-11-04/#SECURITY-2455'}] | {'cwe_ids': ['CWE-862'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T00:50:59Z', 'nvd_published_at': '2021-11-04T17:15:00Z'} |
1.4.0 | GHSA-x6r5-vxfg-gq3v | 2023-08-01T23:17:41Z | 2022-05-24T16:50:33Z | null | ['CVE-2019-1010275'] | Helm Improper Certificate Validation | helm Before 2.7.2 is affected by: CWE-295: Improper Certificate Validation. The impact is: Unauthorized clients could connect to the server because self-signed client certs were aloowed. The component is: helm (many files updated, see https://github.com/helm/helm/pull/3152/files/1096813bf9a425e2aa4ac755b6c991b626dfab50... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'helm.sh/helm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010275'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/pull/3152'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/pull/3152/files/1096813bf9a425e2aa4ac755b6c991b626dfab50'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/commi... | {'cwe_ids': ['CWE-295'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T23:17:41Z', 'nvd_published_at': '2019-07-17T21:15:00Z'} |
1.4.0 | GHSA-gxxx-j8m7-hh7m | 2023-07-21T20:16:53Z | 2022-05-13T01:20:46Z | null | ['CVE-2018-8294'] | ChakraCore RCE Vulnerability | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8280, CVE-2018-8286, CVE-2018-8290. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8294'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/5444'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/7af07fdfb3cf3ac2b21dd71bf565ab1135e62d4d'}, {'type': 'WEB', 'url': 'https://portal.msrc.... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T20:16:53Z', 'nvd_published_at': '2018-07-11T00:29:00Z'} |
1.4.0 | GHSA-c5h8-cq4v-cvfm | 2022-07-07T23:28:34Z | 2022-05-24T22:01:03Z | null | ['CVE-2013-5123'] | Improper Authentication in pip | The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pip'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-5123'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-5123'}, {'type': 'WEB', 'url': 'https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-5123'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c5h8-cq4... | {'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T23:28:34Z', 'nvd_published_at': '2019-11-05T22:15:00Z'} |
1.4.0 | GHSA-jrmf-xhr6-3428 | 2022-12-06T21:07:51Z | 2022-05-24T16:57:28Z | null | ['CVE-2019-10435'] | Jenkins SourceGear Vault plugin transmits credentials in plain text | Jenkins SourceGear Vault Plugin transmits configured credentials in plain text as part of job configuration forms, potentially resulting in their exposure. As of the publication of the advisory, there are no patches and the plugin is unmaintained. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:vault-scm-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10435'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/vault-scm-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-10-01/#SECURITY-1524'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/... | {'cwe_ids': ['CWE-319'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T21:07:51Z', 'nvd_published_at': '2019-10-01T14:15:00Z'} |
1.4.0 | GHSA-gvcj-72h4-8xm9 | 2023-01-06T16:58:54Z | 2022-05-24T17:10:28Z | null | ['CVE-2020-2151'] | Jenkins Quality Gates Plugin transmits credentials in plain text during configuration | Quality Gates Plugin stores credentials in its global configuration file `quality.gates.jenkins.plugin.GlobalConfig.xml` on the Jenkins controller as part of its configuration. While the credentials are stored encrypted on disk, they are transmitted in plain text as part of the configuration form by Quality Gates Plugi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:quality-gates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2151'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/quality-gates-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-03-09/#SECURITY-1519'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/20... | {'cwe_ids': ['CWE-319'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-01-06T16:58:54Z', 'nvd_published_at': '2020-03-09T16:15:00Z'} |
1.4.0 | GHSA-7q9r-vhg2-789w | 2023-01-14T05:27:43Z | 2022-05-24T17:08:47Z | null | ['CVE-2020-2122'] | Stored XSS vulnerability in Jenkins brakeman Plugin | brakeman Plugin 0.12 and earlier did not escape values received from parsed JSON files when rendering them, resulting in a stored cross-site scripting vulnerability.
This vulnerability can be exploited by users able to control the Brakeman post-build step input data.\n\nbrakeman Plugin 0.13 escape affected values from... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:brakeman'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2122'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/brakeman-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-02-12/#SECURITY-1644'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/02... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-14T05:27:43Z', 'nvd_published_at': '2020-02-12T15:15:00Z'} |
1.4.0 | GHSA-6j8f-66vh-39mj | 2023-09-22T21:05:29Z | 2022-05-01T18:13:14Z | null | ['CVE-2007-3385'] | Apache Tomcat Mishandles Character Sequence in Cookies | Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 does not properly handle the `\"` character sequence in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'last_affected': '6.0.13'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific':... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-3385'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/35999'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E'}, {'typ... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-22T21:05:29Z', 'nvd_published_at': '2007-08-14T22:17:00Z'} |
1.4.0 | GHSA-jjhj-8gx7-x836 | 2023-06-30T19:32:15Z | 2022-05-13T01:49:24Z | null | ['CVE-2018-12028'] | Incorrect Access Control in Phusion Passenger | An Incorrect Access Control vulnerability in SpawningKit in Phusion Passenger 5.3.x before 5.3.2 allows a Passenger-managed malicious application, upon spawning a child process, to report an arbitrary different PID back to Passenger's process manager. If the malicious application then generates an error, it would cause... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'passenger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.3.0'}, {'fixed': '5.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-12028'}, {'type': 'WEB', 'url': 'https://github.com/phusion/passenger/commit/1e7c82deb4901c438f583737d8c9f2aac264737c'}, {'type': 'WEB', 'url': 'https://blog.phusion.nl/passenger-5-3-2'}, {'type': 'PACKAGE', 'url': 'https://github.com/phusion/passe... | {'cwe_ids': ['CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T22:58:30Z', 'nvd_published_at': '2018-06-17T20:29:00Z'} |
1.4.0 | GHSA-pxv5-5vmp-3jj4 | 2022-07-08T19:10:34Z | 2022-05-17T02:54:07Z | null | ['CVE-2013-2192'] | Improper Authentication in Apache Hadoop | The RPC protocol implementation in Apache Hadoop 2.x before 2.0.6-alpha, 0.23.x before 0.23.9, and 1.x before 1.2.1, when the Kerberos security features are enabled, allows man-in-the-middle attackers to disable bidirectional authentication and obtain sensitive information by forcing a downgrade to simple authenticatio... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.6-alpha'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.5-alpha'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:h... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2192'}, {'type': 'WEB', 'url': 'https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0037.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/err... | {'cwe_ids': ['CWE-287'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T19:10:34Z', 'nvd_published_at': '2014-01-24T18:55:00Z'} |
1.4.0 | GHSA-j7j7-g4ww-pxg5 | 2022-11-04T20:38:23Z | 2022-05-13T01:49:40Z | null | ['CVE-2018-1287'] | Missing certificate validation in Apache JMeter | In Apache JMeter 2.X and 3.X, when using Distributed Test only (RMI based), jmeter server binds RMI Registry to wildcard host. This could allow an attacker to get Access to JMeterEngine and send unauthorized code. This only affect those running in Distributed mode.
In distributed mode, JMeter makes an architectural as... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.jmeter:ApacheJMeter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1287'}, {'type': 'WEB', 'url': 'https://github.com/apache/jmeter/issues/4677'}, {'type': 'WEB', 'url': 'https://bz.apache.org/bugzilla/show_bug.cgi?id=62039'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/jmeter'}, {'type': 'WEB', 'url': '... | {'cwe_ids': ['CWE-347'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-04T20:38:23Z', 'nvd_published_at': '2018-02-14T14:29:00Z'} |
1.4.0 | GHSA-mpg6-rgp4-35rr | 2022-06-17T22:23:26Z | 2022-05-02T04:00:27Z | null | ['CVE-2009-5010'] | Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in pyftpdlib | Race condition in the FTPHandler class in ftpserver.py in pyftpdlib before 0.5.1 allows remote attackers to cause a denial of service (daemon outage) by establishing and then immediately closing a TCP connection, leading to the accept function having an unexpected return value of None, a different vulnerability than CV... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'pyftpdlib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.5.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-5010'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/zodb/+bug/135108'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mpg6-rgp4-35rr'}, {'type': 'PACKAGE', 'url': 'https://github.com/giampaolo/pyftpdlib'}, {'type': 'WEB', '... | {'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T22:23:26Z', 'nvd_published_at': '2010-10-19T20:00:00Z'} |
1.4.0 | GHSA-fg6g-52rg-vr9q | 2022-12-22T13:45:06Z | 2022-05-24T17:33:08Z | null | ['CVE-2020-2316'] | Stored XSS vulnerability in Jenkins Static Analysis Utilities Plugin | Jenkins Static Analysis Utilities Plugin 1.96 and earlier does not escape the annotation message in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jvnet.hudson.plugins:analysis-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.96'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2316'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/analysis-core-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-11-04/#SECURITY-1907'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T13:45:06Z', 'nvd_published_at': '2020-11-04T15:15:00Z'} |
1.4.0 | GHSA-9ccm-g362-2r35 | 2023-08-17T21:57:55Z | 2022-05-14T02:55:17Z | null | ['CVE-2011-2088'] | XWork in Apache Struts Reveals Sensitive Information | XWork 2.2.1 in Apache Struts 2.2.1, and OpenSymphony XWork in OpenSymphony WebWork, allows remote attackers to obtain potentially sensitive information about internal Java class paths via vectors involving an s:submit element and a nonexistent method, a different vulnerability than CVE-2011-1772.3. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts.xwork:xwork-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-2088'}, {'type': 'WEB', 'url': 'https://github.com/apache/struts/commit/885ab3459e146ff830d1f7257f809f4a3dd4493a'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/WW-3579'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/2011072... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-17T21:57:55Z', 'nvd_published_at': '2011-05-13T17:05:00Z'} |
1.4.0 | GHSA-wcpc-f63g-x26q | 2023-09-18T23:41:06Z | 2022-05-01T02:12:26Z | null | ['CVE-2005-2875'] | Py2Play Unpickles Untrusted Objects | Py2Play allows remote attackers to execute arbitrary Python code via pickled objects, which Py2Play unpickles and executes. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'Py2Play'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2005-2875'}, {'type': 'WEB', 'url': 'https://bugs.gentoo.org/show_bug.cgi?id=103524'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20040824010038/http://home.gna.org/oomadness/fr/slune/index.html'}, {'type': 'WEB', 'url': 'https://web.archive.or... | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T23:41:06Z', 'nvd_published_at': '2005-09-13T23:03:00Z'} |
1.4.0 | GHSA-3gp9-h8hw-pxpw | 2022-11-01T21:40:37Z | 2022-05-24T17:43:10Z | null | ['CVE-2021-1721'] | Denial of service in .NET core | .NET Core and Visual Studio Denial of Service Vulnerability due to a vulnerability which exists when creating HTTPS web request during X509 certificate chain building. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.25'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Host.linux-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'f... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-1721'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/175'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/runtime/issues/48067'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/adviso... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T21:40:37Z', 'nvd_published_at': '2021-02-25T23:15:00Z'} |
1.4.0 | GHSA-9785-w233-x6hv | 2022-07-01T13:50:28Z | 2022-05-13T01:46:13Z | null | ['CVE-2017-5650'] | Improper Resource Shutdown or Release in Apache Tomcat | In Apache Tomcat 9.0.0.M1 to 9.0.0.M18 and 8.5.0 to 8.5.12, the handling of an HTTP/2 GOAWAY frame for a connection did not close streams associated with that connection that were currently waiting for a WINDOW_UPDATE before allowing the application to write more data. These waiting streams each consumed a thread. A ma... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0.M1'}, {'fixed': '9.0.0.M19'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.0.0.M18'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'},... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-5650'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff228... | {'cwe_ids': ['CWE-404'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T13:50:28Z', 'nvd_published_at': '2017-04-17T16:59:00Z'} |
1.4.0 | GHSA-9pxm-8g95-q5xr | 2022-11-01T22:11:43Z | 2022-05-17T00:28:41Z | null | ['CVE-2017-10862'] | Insufficient Data Verification in io.really:jwt-scala | jwt-scala 1.2.2 and earlier fails to verify token signatures correctly which may lead to an attacker being able to pass specially crafted JWT data as a correctly signed token. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.really:jwt-scala'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-10862'}, {'type': 'WEB', 'url': 'https://github.com/reallylabs/jwt-scala'}, {'type': 'WEB', 'url': 'https://jvn.jp/en/vu/JVNVU90916766/index.html'}] | {'cwe_ids': ['CWE-345'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T22:11:43Z', 'nvd_published_at': '2017-10-12T14:29:00Z'} |
1.4.0 | GHSA-vmg8-g8j3-m355 | 2022-12-21T18:27:41Z | 2022-05-24T17:30:18Z | null | ['CVE-2020-2292'] | Stored XSS vulnerability in Jenkins Release Plugin | Jenkins Release Plugin 2.10.2 and earlier does not escape the release version in badge tooltip, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Release/Release permission. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:release'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2292'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/release-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-10-08/#SECURITY-1928'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T18:27:41Z', 'nvd_published_at': '2020-10-08T13:15:00Z'} |
1.4.0 | GHSA-f5wx-w2f9-82gh | 2022-12-19T21:15:52Z | 2022-05-24T17:07:41Z | null | ['CVE-2020-2108'] | XXE vulnerability in Jenkins WebSphere Deployer Plugin | WebSphere Deployer Plugin 1.6.1 and earlier does not configure the XML parser to prevent XML external entity (XXE) attacks. This could be exploited by a user with Job/Configure permissions to upload a specially crafted war file containing a `WEB-INF/ibm-web-ext.xml` which is parsed by the plugin. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:websphere-deployer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.6.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2108'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/websphere-deployer-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-01-29/#SECURITY-1719'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-securi... | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-19T21:15:52Z', 'nvd_published_at': '2020-01-29T16:15:00Z'} |
1.4.0 | GHSA-m4vq-v7hw-7fqq | 2022-12-06T21:50:03Z | 2022-05-24T17:03:48Z | null | ['CVE-2019-16571'] | Jenkins RapidDeploy Plugin missing permission check | A missing permission check in Jenkins RapidDeploy Plugin 4.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified web server. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:rapiddeploy-jenkins'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16571'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1604'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/12/17/1'}] | {'cwe_ids': ['CWE-285', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T21:50:03Z', 'nvd_published_at': '2019-12-17T15:15:00Z'} |
1.4.0 | GHSA-vh38-ghx6-vmvg | 2022-05-23T19:41:26Z | 2022-05-03T00:00:46Z | null | ['CVE-2022-21167'] | Code Injection in Masuit.Tools.Core | All versions of package Masuit.Tools.Core are vulnerable to Arbitrary Code Execution via the ReceiveVarData<T> function in the SocketClient.cs component. The socket client in the package can pass in the payload via the user-controllable input after it has been established, because this socket client transmission does n... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Masuit.Tools.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4.8.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21167'}, {'type': 'PACKAGE', 'url': 'https://github.com/ldqk/Masuit.Tools/'}, {'type': 'WEB', 'url': 'https://github.com/ldqk/Masuit.Tools/blob/327f42b9f20f25bb66188672199c8265fc968d91/Masuit.Tools.Abstractions/Net/SocketClient.cs%23L197'}, {'type'... | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-23T19:41:26Z', 'nvd_published_at': '2022-05-01T16:15:00Z'} |
1.4.0 | GHSA-hh2x-7mf9-78fr | 2023-01-27T00:53:07Z | 2022-05-17T03:20:59Z | null | ['CVE-2013-4479'] | Sup Code Injection vulnerability | `lib/sup/message_chunks.rb` in Sup before 0.13.2.1 and 0.14.x before 0.14.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the content_type of an email attachment. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'sup'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.2.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sup'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'ty... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4479'}, {'type': 'WEB', 'url': 'https://github.com/sup-heliotrope/sup/commit/ca0302e0c716682d2de22e9136400c704cc93e42'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/sup/CVE-2013-4479.yml'}, {'type': 'PACKAGE... | {'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T00:53:07Z', 'nvd_published_at': '2013-12-07T20:55:00Z'} |
1.4.0 | GHSA-3w4v-qfqc-3433 | 2023-09-28T20:17:40Z | 2022-05-13T01:21:15Z | null | ['CVE-2019-0539'] | ChakraCore RCE Vulnerability | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2019-0567, CVE-2019-0568. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0539'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/788f17b0ce06ea84553b123c174d1ff7052112a0'}, {'type': 'PACKAGE', 'url': 'https://github.com/chakra-core/ChakraCore'}, {'type': 'WEB', 'url': 'https://portal.msrc.micros... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T20:24:02Z', 'nvd_published_at': '2019-01-08T21:29:00Z'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.