schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
8
154
details
stringlengths
31
19.1k
severity
stringlengths
2
92
affected
stringlengths
75
28.5k
references
stringlengths
79
7.48k
database_specific
stringlengths
131
196
1.4.0
GHSA-9r7g-325h-mxrm
2022-07-07T22:54:01Z
2022-05-17T02:53:20Z
null
['CVE-2014-0229']
Improper Authentication in Apache Hadoop
Apache Hadoop 0.23.x before 0.23.11 and 2.x before 2.4.1, as used in Cloudera CDH 5.0.x before 5.0.2, do not check authorization for the (1) refreshNamenodes, (2) deleteBlockPool, and (3) shutdownDatanode HDFS admin commands, which allows remote authenticated users to cause a denial of service (DataNodes shutdown) or p...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.23.0'}, {'fixed': '0.23.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0229'}, {'type': 'WEB', 'url': 'https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html#concept_i1q_xvk_2r'}]
{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T22:54:01Z', 'nvd_published_at': '2017-03-23T20:59:00Z'}
1.4.0
GHSA-3qh2-mccc-q5m6
2023-07-21T22:48:34Z
2022-05-13T01:34:29Z
null
['CVE-2018-14658']
Keycloak Open Redirect
A flaw was found in JBOSS Keycloak 3.2.1.Final. The Redirect URL for both Login and Logout are not normalized in `org.keycloak.protocol.oidc.utils.RedirectUtils` before the redirect url is verified. This can lead to an Open Redirection attack
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.2.1.Final'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14658'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:3592'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:3593'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:3595'}, {'type': 'WEB'...
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T22:48:34Z', 'nvd_published_at': '2018-11-13T19:29:00Z'}
1.4.0
GHSA-g2r3-4g8q-h5rj
2023-05-24T13:55:09Z
2022-05-24T17:33:08Z
null
['CVE-2020-2309']
Missing authorization in Jenkins Kubernetes Plugin
Jenkins Kubernetes Plugin prior to 1.27.4, 1.26.5, 1.25.4.1, and 1.21.6 does not perform a permission check in an HTTP endpoint. This allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. Those can be used as part of an attack to capture the credentials using anot...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.csanchez.jenkins.plugins:kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.27.0'}, {'fixed': '1.27.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.csanchez.jenkins.plugins:kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'intr...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2309'}, {'type': 'WEB', 'url': 'https://github.com/CVEProject/cvelist/blob/381fe967666a5ce01625a7a050427aa4757e3ca6/2020/2xxx/CVE-2020-2309.json'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/kubernetes-plugin'}, {'type': 'WEB', 'url':...
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T00:51:30Z', 'nvd_published_at': '2020-11-04T15:15:00Z'}
1.4.0
GHSA-p6m5-x83r-hqmr
2023-07-24T21:00:08Z
2022-05-14T01:44:13Z
null
['CVE-2018-19133']
Flarum Core Leaks PII
In Flarum Core 0.1.0-beta.7.1, a serious leak can get everyone's email address.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'flarum/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.0-beta.7.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19133'}, {'type': 'WEB', 'url': 'https://github.com/flarum/core/issues/1628'}, {'type': 'WEB', 'url': 'https://github.com/flarum/framework/commit/e99f7fcdace74211bec5627e6adf20ddf7dad2a7'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-24T21:00:08Z', 'nvd_published_at': '2018-11-09T11:29:00Z'}
1.4.0
GHSA-pmxg-w9c7-ffmq
2023-08-22T21:53:40Z
2022-05-24T17:23:44Z
null
['CVE-2020-13405']
Microweber Discloses Sensitive Information
`userfiles/modules/users/controller/controller.php` in Microweber before 1.1.20 allows an unauthenticated user to disclose the users database via a `/modules/ POST` request.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.20'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13405'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/269320e0e0e06a1785e1a1556da769a34280b7e6'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://rhinosecuritylabs.c...
{'cwe_ids': ['CWE-200', 'CWE-306'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T21:38:09Z', 'nvd_published_at': '2020-07-16T19:15:00Z'}
1.4.0
GHSA-vp5f-8jgw-j53c
2022-12-21T19:38:14Z
2022-05-24T17:33:07Z
null
['CVE-2020-2304']
XXE vulnerability in Jenkins Subversion Plugin
Subversion Plugin 2.13.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. This allows attackers able to control an agent process to have Jenkins parse a crafted changelog file that uses external entities for extraction of secrets from the Jenkins controller or server-side req...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:subversion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.13.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2304'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/subversion-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-11-04/#SECURITY-2145'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2...
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T19:38:14Z', 'nvd_published_at': '2020-11-04T15:15:00Z'}
1.4.0
GHSA-hgjr-xwj3-jfvw
2022-11-22T19:37:58Z
2022-05-14T02:37:13Z
null
['CVE-2016-9606']
JBoss RESTEasy vulnerable to Improper Input Validation
JBoss RESTEasy before version 3.1.2 could be forced into parsing a request with YamlProvider, resulting in unmarshalling of potentially untrusted data which could allow an attacker to execute arbitrary code with RESTEasy application permissions.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:resteasy-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.2.Final'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-9606'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1253'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1254'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:1256'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T19:37:58Z', 'nvd_published_at': '2018-03-09T20:29:00Z'}
1.4.0
GHSA-6px8-22w5-w334
2022-07-08T19:32:43Z
2022-05-14T01:41:32Z
null
['CVE-2019-0564']
Denial of service in ASP.NET Core
A denial of service vulnerability exists when ASP.NET Core improperly handles web requests, aka "ASP.NET Core Denial of Service Vulnerability." This affects ASP.NET Core 2.1. This CVE ID is unique from CVE-2019-0548.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.WebSockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.1'}]}], 'versions': ['2.2.0']}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.WebSockets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0564'}, {'type': 'WEB', 'url': 'https://github.com/aspnet/Announcements/issues/334'}, {'type': 'WEB', 'url': 'https://github.com/github/advisory-database/issues/302'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0040'}, {'typ...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T19:32:43Z', 'nvd_published_at': '2019-01-08T21:29:00Z'}
1.4.0
GHSA-wc52-2xwv-h7xr
2023-07-20T22:37:27Z
2022-05-13T01:18:35Z
null
['CVE-2018-0873']
ChakraCore RCE Vulnerability
ChakraCore and Microsoft Edge in Microsoft Windows 10 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the Chakra scripting engine handles objects in memory, aka "Chakra Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0872, CVE-2018-0874, CV...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-0873'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/024353a0019ddd845ac889deb8b4714df2122836'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0873'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T22:37:27Z', 'nvd_published_at': '2018-03-14T17:29:00Z'}
1.4.0
GHSA-vcfc-9wcp-j623
2022-06-17T21:38:35Z
2022-05-24T22:00:16Z
null
['CVE-2019-1010199']
Cross site scripting attack in ServiceStack Framework
ServiceStack ServiceStack Framework 4.5.14 is affected by: Cross Site Scripting (XSS). The impact is: JavaScrpit is reflected in the server response, hence executed by the browser. The component is: the query used in the GET request is prone. The attack vector is: Since there is no server-side validation and If Browser...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'ServiceStack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.5.14'}, {'fixed': '5.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010199'}, {'type': 'WEB', 'url': 'https://github.com/ServiceStack/ServiceStack/commit/a0e0d7de20f5d1712f1793f925496def4383c610'}, {'type': 'PACKAGE', 'url': 'https://github.com/ServiceStack/ServiceStack'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:38:35Z', 'nvd_published_at': '2019-07-23T18:15:00Z'}
1.4.0
GHSA-phf8-3qgv-rg5q
2022-11-01T23:02:55Z
2022-05-13T01:18:20Z
null
['CVE-2017-1000105']
Missing Authorization in Jenkins Blue Ocean Plugin
The optional Run/Artifacts permission can be enabled by setting a Java system property. Blue Ocean did not check this permission before providing access to archived artifacts, Item/Read permission was sufficient.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.blueocean:blueocean'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000105'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2017-08-07/'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T23:02:55Z', 'nvd_published_at': '2017-10-05T01:29:00Z'}
1.4.0
GHSA-j67j-8hrp-76xm
2023-08-29T18:25:18Z
2022-05-17T04:49:44Z
null
['CVE-2013-4195']
Plone Multiple open redirect vulnerabilities
Multiple open redirect vulnerabilities in (1) marmoset_patch.py, (2) publish.py, and (3) principiaredirect.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1'}, {'fixed': '4.1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1'}}, {'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'e...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4195'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=978471'}, {'type': 'PACKAGE', 'url': 'https://github.com/plone/Plone'}, {'type': 'WEB', 'url': 'http://plone.org/products/plone-hotfix/releases/20130618'}, {'type': 'WEB', ...
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T18:25:18Z', 'nvd_published_at': '2014-03-11T19:37:00Z'}
1.4.0
GHSA-84cm-vjwm-m979
2022-12-02T21:06:22Z
2022-05-18T00:00:39Z
null
['CVE-2022-30947']
Path traversal in Jenkins Git Plugin
SCMs support a number of different URL schemes, including local file system paths (e.g. using `file:` URLs). Historically in Jenkins, only agents checked out from SCM, and if multiple projects share the same agent, there is no expected isolation between builds besides using different workspaces unless overridden. Some...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:git'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.11.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.11.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30947'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/git-plugin/commit/b295606e0b865c298fde27bea14f9b7535a976e6'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/git-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/securi...
{'cwe_ids': ['CWE-22'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-06-02T15:51:22Z', 'nvd_published_at': '2022-05-17T15:15:00Z'}
1.4.0
GHSA-4ph7-5c44-pppv
2023-01-26T23:55:53Z
2022-05-14T03:47:44Z
null
['CVE-2014-4999']
kajam allows local users to obtain sensitive information by listing the process
`vendor/plugins/dataset/lib/dataset/database/mysql.rb` in the kajam gem 1.0.3.rc2 for Ruby places the mysql user password on the (1) mysqldump command line in the capture function and (2) mysql command line in the restore function, which allows local users to obtain sensitive information by listing the process.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'kajam'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.3.rc2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-4999'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/07/07/19'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/07/17/5'}, {'type': 'WEB', 'url': 'http://www.vapid.dhs.org/advisories/kajam-1.0.3.r...
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-26T23:55:53Z', 'nvd_published_at': '2018-01-10T18:29:00Z'}
1.4.0
GHSA-vw2c-5wph-v92r
2022-07-06T19:46:03Z
2022-05-13T01:09:20Z
null
['CVE-2016-6812']
Improper Neutralization of Input During Web Page Generation in Apache CXF
The HTTP transport module in Apache CXF prior to 3.0.12 and 3.1.x prior to 3.1.9 uses FormattedServiceListWriter to provide an HTML page which lists the names and absolute URL addresses of the available service endpoints. The module calculates the base URL using the current HttpServletRequest. The calculated base URL i...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.12'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.11'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf-core'}, 'ranges': [{'t...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6812'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:0868'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/CXF-6216'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:46:03Z', 'nvd_published_at': '2017-08-10T16:29:00Z'}
1.4.0
GHSA-fq9r-8jpm-2222
2023-08-03T20:06:51Z
2022-05-17T00:35:42Z
null
['CVE-2015-7318']
Plone Header Injection
Plone 3.3.0 through 3.3.6 allows remote attackers to inject headers into HTTP responses.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3'}, {'fixed': '4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7318'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1264796'}, {'type': 'WEB', 'url': 'https://plone.org/security/hotfix/20150910/header-injection'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2015/09...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T20:06:51Z', 'nvd_published_at': '2017-09-25T17:29:00Z'}
1.4.0
GHSA-95xq-v4m2-fq3r
2023-07-03T20:33:17Z
2022-05-17T04:43:33Z
null
['CVE-2013-4489']
GitLab Grit Gem for Ruby contains a flaw allowing arbitrary commands to be executed
The Grit gem for Ruby, as used in GitLab 5.2 before 5.4.1 and 6.x before 6.2.3, allows remote authenticated users to execute arbitrary commands, as demonstrated by the search box for the GitLab code search feature. GitLab Grit Gem for Ruby contains a flaw in the app/contexts/search_context.rb script. The issue is trig...
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'gitlab-grit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4489'}, {'type': 'WEB', 'url': 'https://github.com/gitlabhq/grit/commit/40f33a4f4f5604c2a531a1d86901fd81ac4402c4'}, {'type': 'PACKAGE', 'url': 'https://github.com/gitlabhq/grit'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T19:41:13Z', 'nvd_published_at': '2014-05-17T20:55:00Z'}
1.4.0
GHSA-x3gh-95p8-43qv
2023-08-07T20:02:36Z
2022-05-14T00:56:27Z
null
['CVE-2014-8770']
MAGMI plugin for Magento Unsafe File Upload
Unrestricted file upload vulnerability in `magmi/web/magmi.php` in the MAGMI (aka Magento Mass Importer) plugin 0.7.17a and earlier for Magento Community Edition (CE) allows remote authenticated users to execute arbitrary code by uploading a ZIP file that contains a PHP file, then accessing the PHP file via a direct re...
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'dweeves/magmi'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.7.17a'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-8770'}, {'type': 'WEB', 'url': 'https://sourceforge.net/projects/magmi/files/magmi-0.7/plugins/packages/'}, {'type': 'WEB', 'url': 'http://www.exploit-db.com/exploits/35052'}]
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-07T20:02:36Z', 'nvd_published_at': '2014-11-13T21:32:00Z'}
1.4.0
GHSA-8qq4-8jvq-mfw4
2022-07-01T21:20:58Z
2022-05-14T01:10:16Z
null
['CVE-2017-12616']
Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat
When using a VirtualDirContext with Apache Tomcat 7.0.0 to 7.0.80 it was possible to bypass security constraints and/or view the source code of JSPs for resources served by the VirtualDirContext using a specially crafted request.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat-catalina'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.81'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.80'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12616'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0465'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0466'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'h...
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T21:20:58Z', 'nvd_published_at': '2017-09-19T13:29:00Z'}
1.4.0
GHSA-fhm8-cxcv-pwvc
2023-09-28T20:29:24Z
2022-05-13T01:22:55Z
null
['CVE-2019-8336']
HashiCorp Consul Access Restriction Bypass
HashiCorp Consul (and Consul Enterprise) 1.4.x before 1.4.3 allows a client to bypass intended access restrictions and obtain the privileges of one other arbitrary token within secondary datacenters, because a token with literally "<hidden>" as its secret is used in unusual circumstances.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8336'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/issues/5423'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/commit/90040f8bffb311e6cd8599273e95b607175e311f'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashico...
{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T18:40:12Z', 'nvd_published_at': '2019-03-05T23:29:00Z'}
1.4.0
GHSA-4jjj-cm7q-v6hr
2022-12-20T14:34:50Z
2022-05-24T17:07:40Z
null
['CVE-2020-2103']
Jenkins Diagnostic page exposed session cookies
Jenkins shows various technical details about the current user on the `/whoAmI` page. In [a previous fix](https://www.jenkins.io/security/advisory/2019-09-25/#SECURITY-1505), the `Cookie` header value containing the HTTP session ID was redacted. However, user metadata shown on this page could also include the HTTP sess...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.205'}, {'fixed': '2.219'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2103'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2020:0402'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2020:0675'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0681'}, {'type': 'WEB',...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T14:34:50Z', 'nvd_published_at': '2020-01-29T16:15:00Z'}
1.4.0
GHSA-2cmg-vxvh-8h7h
2023-07-20T17:47:18Z
2022-05-24T16:49:19Z
null
['CVE-2018-11317']
Subrion CMS XSS
Subrion CMS before 4.1.4 has XSS.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'intelliants/subrion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11317'}, {'type': 'WEB', 'url': 'https://github.com/intelliants/subrion/blob/610b21d3ff185bd287d55fe016d4266abf04a3bf/includes/classes/ia.admin.sitemap.php#L79-L83'}, {'type': 'WEB', 'url': 'https://github.com/intelliants/subrion/releases/tag/v4.1....
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T17:47:18Z', 'nvd_published_at': '2019-07-03T16:15:00Z'}
1.4.0
GHSA-r64q-w8jr-g9qp
2022-06-28T15:02:18Z
2022-05-13T01:09:23Z
null
['CVE-2019-11236']
Improper Neutralization of CRLF Sequences in urllib3 library for Python
In the urllib3 library through 1.24.2 for Python, CRLF injection is possible if the attacker controls the request parameter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'urllib3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.24.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.24.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11236'}, {'type': 'WEB', 'url': 'https://github.com/urllib3/urllib3/issues/1553'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2272'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:3335'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-93'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T15:02:18Z', 'nvd_published_at': '2019-04-15T15:29:00Z'}
1.4.0
GHSA-5cmc-r23m-hvrr
2023-08-28T23:35:36Z
2022-05-17T01:29:43Z
null
['CVE-2013-7077']
TYPO3 Cross-site scripting (XSS) vulnerability in the Backend User Administration Module
Cross-site scripting (XSS) vulnerability in the Backend User Administration Module in TYPO3 6.0.x before 6.0.12 and 6.1.x before 6.1.7 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0'}, {'fixed': '6.0.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ecosystem_specific': {'affected_functions'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7077'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/89626'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3-CMS/core'}, {'type': 'WEB', 'url': 'http://osvdb.org/100884'}, {'type': 'WEB', 'url': 'http://seclist...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-28T23:35:36Z', 'nvd_published_at': '2013-12-21T00:55:00Z'}
1.4.0
GHSA-w2xf-4gg9-87wr
2023-07-21T22:56:21Z
2022-05-14T00:55:27Z
null
['CVE-2018-19281']
Centreon allows SNMP trap SQL Injection
Centreon 3.4.x (fixed in Centreon 18.10.0 and Centreon web 2.8.27) allows SNMP trap SQL Injection.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '18.0.0'}, {'fixed': '18.10.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ecosystem_specific': {'affected_...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19281'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon-archived/pull/6627'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon-archived/pull/7069'}, {'type': 'WEB', 'url': 'https://documentation.centreon.com/docs/centreon/...
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T22:56:21Z', 'nvd_published_at': '2018-11-14T20:29:00Z'}
1.4.0
GHSA-wvh5-78h5-gmgr
2022-06-02T20:23:19Z
2022-05-19T00:00:15Z
null
['CVE-2022-30596']
Cross-site Scripting in moodle
A flaw was found in moodle where ID numbers displayed when bulk allocating markers to assignments required additional sanitizing to prevent a stored XSS risk.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0'}, {'fixed': '4.0.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': [...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30596'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/6abe964bbac41b5e40a81b40962f7044b0dc201e'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2083583'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodl...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-02T20:23:19Z', 'nvd_published_at': '2022-05-18T17:15:00Z'}
1.4.0
GHSA-wq4h-7r42-5hrr
2022-12-07T14:37:27Z
2022-05-27T16:36:51Z
null
['CVE-2022-30123']
Possible shell escape sequence injection vulnerability in Rack
There is a possible shell escape sequence injection vulnerability in the Lint and CommonLogger components of Rack. This vulnerability has been assigned the CVE identifier CVE-2022-30123. Versions Affected: All. Not affected: None Fixed Versions: 2.0.9.1, 2.1.4.1, 2.2.3.1 ## Impact Carefully crafted reques...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.9.0'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'rack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30123'}, {'type': 'WEB', 'url': 'https://github.com/rack/rack/commit/b426cc224908ec6ed6eb8729325392b048215d88'}, {'type': 'WEB', 'url': 'https://discuss.rubyonrails.org/t/cve-2022-30123-possible-shell-escape-sequence-injection-vulnerability-in-rack...
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-05-27T16:36:51Z', 'nvd_published_at': '2022-12-05T22:15:00Z'}
1.4.0
GHSA-8m35-r25c-qr56
2023-07-25T23:03:24Z
2022-05-13T01:28:41Z
null
['CVE-2017-3199']
GraniteDS Insecure Deserialization
The Java implementation of GraniteDS, version 3.1.1.GA, AMF3 deserializers derives class instances from java.io.Externalizable rather than the AMF3 specification's recommendation of flash.utils.IExternalizable. A remote attacker with the ability to spoof or control an RMI server connection may be able to send serialize...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.graniteds:granite-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.1.GA'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-3199'}, {'type': 'WEB', 'url': 'https://codewhitesec.blogspot.com/2017/04/amf.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/graniteds/granitedsv'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210124021547/http://www.securityfocus...
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T23:03:24Z', 'nvd_published_at': '2018-06-11T17:29:00Z'}
1.4.0
GHSA-wmmc-qjq2-vvm2
2023-08-17T22:58:00Z
2022-05-13T01:12:58Z
null
['CVE-2013-2080']
Moodle is vulnerable to Sensitive Information Disclosure
The core_grade component in Moodle through 2.2.10, 2.3.x before 2.3.7, and 2.4.x before 2.4.4 does not properly consider the existence of hidden grades, which allows remote authenticated users to obtain sensitive information by leveraging the student role and reading the Gradebook Overview report.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.10'}}, {'package': {'ecosystem': 'Packagist', ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2080'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=228931'}, {'type': 'WEB', 'url': 'http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-37475...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-17T22:58:00Z', 'nvd_published_at': '2013-05-25T03:18:00Z'}
1.4.0
GHSA-hq38-v658-g3wp
2023-07-07T19:59:03Z
2022-05-17T02:57:30Z
null
['CVE-2017-5605']
XMPP Clients User Impersonation Vulnerability in Movim Moxl
An incorrect implementation of "XEP-0280: Message Carbons" in multiple XMPP clients allows a remote attacker to impersonate any user, including contacts, in the vulnerable application's display. This allows for various kinds of social engineering attacks. This CVE is for Movim 0.8 - 0.10.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'movim/moxl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8'}, {'last_affected': '0.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-5605'}, {'type': 'WEB', 'url': 'https://github.com/movim/moxl/commit/838b0a42efc3b67cc17d63e25ae1d0ea849cd89b'}, {'type': 'WEB', 'url': 'https://rt-solutions.de/wp-content/uploads/2017/02/CVE-2017-5589_xmpp_carbons.pdf'}, {'type': 'WEB', 'url': 'ht...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T19:59:03Z', 'nvd_published_at': '2017-02-09T20:59:00Z'}
1.4.0
GHSA-wwwh-47wp-m522
2023-08-02T22:06:37Z
2022-05-13T01:54:10Z
null
['CVE-2015-6240']
Ansible Sandbox Escape via Symlink Attack
The chroot, jail, and zone connection plugins in ansible before 1.9.2 allow local users to escape a restricted environment via a symlink attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-6240'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/commit/952166f48eb0f5797b75b160fd156bbe1e8fc647'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/commit/ca2f2c4ebd7b5e097eab0a710f79c1f63badf95b'}, {'type': 'WEB', 'url...
{'cwe_ids': ['CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-02T22:06:37Z', 'nvd_published_at': '2017-06-07T20:29:00Z'}
1.4.0
GHSA-rxfp-8jmr-xc95
2023-07-31T21:10:08Z
2022-05-17T02:56:17Z
null
['CVE-2016-4947']
Cloudera HUE Account Enumeration
Cloudera HUE 3.9.0 and earlier allows remote attackers to enumerate user accounts via a request to `desktop/api/users/autocomplete`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'gethue'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.9.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-4947'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210123183622/http://www.securityfocus.com/bid/93880'}, {'type': 'WEB', 'url': 'http://2016.hack.lu/archive/2016/Wavestone%20-%20Hack.lu%202016%20-%20Hadoop%20safari%20-%20Hunting%20for%2...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T21:10:08Z', 'nvd_published_at': '2017-03-07T16:59:00Z'}
1.4.0
GHSA-34wj-p5jm-2p96
2022-07-06T19:44:36Z
2022-05-13T01:06:10Z
null
['CVE-2016-5851']
Improper Restriction of XML External Entity Reference in python-docx
python-docx before 0.8.6 allows context-dependent attackers to conduct XML External Entity (XXE) attacks via a crafted document.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'python-docx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.8.5'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-5851'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-34wj-p5jm-2p96'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/python-docx/PYSEC-2016-21.yaml'}, {'type': 'PACKAGE', 'url': 'https://github...
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:44:36Z', 'nvd_published_at': '2016-12-21T22:59:00Z'}
1.4.0
GHSA-qgfg-gvff-523v
2023-02-06T19:28:19Z
2022-05-14T02:10:39Z
null
['CVE-2013-4111']
python-glanceclient vulnerable to SSL server spoofing due to unverified X.509 certificate
The Python client library for Glance (python-glanceclient) before 0.10.0 does not properly check the preverify_ok value, which prevents the server hostname from being verified with a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate and allows man-in-the-middle attackers to ...
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'python-glanceclient'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4111'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:1200'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2013-4111'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/ossa/+bug/1192229'}, {'type': 'WEB...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-06T19:28:19Z', 'nvd_published_at': '2013-08-28T21:55:00Z'}
1.4.0
GHSA-fj6f-6933-839j
2022-12-19T21:06:59Z
2022-05-24T17:07:40Z
null
['CVE-2020-2102']
Non-constant time HMAC comparison
Jenkins 2.218 and earlier, LTS 2.204.1 and earlier does not use a constant-time comparison when checking whether two HMACs are equal. This could potentially allow attackers to use statistical methods to obtain a valid HMAC for an attacker-controlled input value. Jenkins 2.219, LTS 2.204.2 now uses a constant-time comp...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.204.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.204.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2102'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2020:0402'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2020:0675'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0681'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-203', 'CWE-208'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-19T21:06:59Z', 'nvd_published_at': '2020-01-29T16:15:00Z'}
1.4.0
GHSA-qwwj-qj3f-9hv7
2022-07-13T17:17:40Z
2022-05-17T05:02:41Z
null
['CVE-2011-1411']
Improper Authentication in OpenSAML
Shibboleth OpenSAML library 2.4.x before 2.4.3 and 2.5.x before 2.5.1, and IdP before 2.3.2, allows remote attackers to forge messages and bypass authentication via an "XML Signature wrapping attack."
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.opensaml:opensaml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.opensaml:opensaml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.1'}]...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-1411'}, {'type': 'WEB', 'url': 'http://shibboleth.internet2.edu/secadv/secadv_20110725.txt'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2011/dsa-2284'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/topics/security/cpuoct20...
{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T17:17:40Z', 'nvd_published_at': '2011-09-02T23:55:00Z'}
1.4.0
GHSA-6fxm-66hq-fc96
2022-07-13T21:10:51Z
2022-05-13T01:07:05Z
null
['CVE-2012-2098']
Uncontrolled Resource Consumption in Apache Commons Compress
Algorithmic complexity vulnerability in the sorting algorithms in bzip2 compressing stream (BZip2CompressorOutputStream) in Apache Commons Compress before 1.4.1 allows remote attackers to cause a denial of service (CPU consumption) via a file with many repeating inputs.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.commons:commons-compress'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-2098'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/75857'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/commons-compress'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d7...
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T21:10:51Z', 'nvd_published_at': '2012-06-29T19:55:00Z'}
1.4.0
GHSA-7r36-jf3c-jhp4
2023-06-09T22:54:40Z
2022-05-13T01:50:31Z
2023-06-09T22:54:40Z
[]
Duplicate Advisory: tgstation-server vulnerable to cached user logins in legacy server
## Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-42r6-p4px-qvv6. This link is maintained to preserve external references. ## Original Description In Tgstation tgstation-server 3.2.4.0 through 3.2.1.0 (fixed in 3.2.5.0), active logins would be cached, allowing subsequent logins t...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'TGServiceInterface'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.1.0'}, {'fixed': '3.2.5.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.2.4.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17107'}, {'type': 'WEB', 'url': 'https://github.com/tgstation/tgstation-server/issues/690'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T22:54:40Z', 'nvd_published_at': '2018-09-24T22:29:00Z'}
1.4.0
GHSA-4rrr-j7ff-r844
2023-08-29T18:28:22Z
2022-05-17T04:54:13Z
null
['CVE-2013-2104']
python-keystoneclient missing expiration check in PKI token validation
python-keystoneclient before 0.2.4, as used in OpenStack Keystone (Folsom), does not properly check expiry for PKI tokens, which allows remote authenticated users to (1) retain use of a token after it has expired, or (2) use a revoked token once it expires.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'python-keystoneclient'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2104'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2013:0944'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2013-2104'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/python-keystoneclient/+bug/1179615...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T18:28:22Z', 'nvd_published_at': '2014-01-21T18:55:00Z'}
1.4.0
GHSA-rwh3-5g7v-3c5m
2022-12-22T13:39:27Z
2022-05-24T17:33:08Z
null
['CVE-2020-2312']
Password written to the build log by Jenkins SQLPlus Script Runner Plugin
SQLPlus Script Runner Plugin 2.0.12 and earlier prints the `sqlplus` command invocation to the build log. This log message does not redact a password provided as part of a command line argument. This password can be viewed by users with Item/Read permission. SQLPlus Script Runner Plugin 2.0.13 no longer prints the pa...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:sqlplus-script-runner'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2312'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/sqlplus-script-runner-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-11-04/#SECURITY-2129'}]
{'cwe_ids': ['CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T13:39:27Z', 'nvd_published_at': '2020-11-04T15:15:00Z'}
1.4.0
GHSA-p6f4-h6w5-9jmc
2023-07-28T23:27:03Z
2022-05-14T02:22:18Z
null
['CVE-2016-7242']
ChakraCore RCE Vulnerability
The Chakra JavaScript scripting engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-7200, CVE-2016-7201, CVE-2016-7202, CVE-2016...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-7242'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/1982'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/c2787ef8fdb7401922e9ec6540e4e5895d11c631'}, {'type': 'WEB', 'url': 'https://docs.microso...
{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T23:27:03Z', 'nvd_published_at': '2016-11-10T06:59:00Z'}
1.4.0
GHSA-pcr8-75v3-w9pf
2023-07-27T19:30:54Z
2022-05-17T00:19:55Z
null
['CVE-2017-11862']
Chakra Core Privilege Escalation
ChakraCore and Microsoft Edge in Windows 10 1709 and Windows Server, version 1709 allows an attacker to gain the same user rights as the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11836, CVE-2017-11...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-11862'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/4226'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/66d733b9adebbe33cc7f48c159c48b7837aa4458'}, {'type': 'WEB', 'url': 'https://portal.msrc...
{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-27T19:30:54Z', 'nvd_published_at': '2017-11-15T03:29:00Z'}
1.4.0
GHSA-f93f-g33r-8pcp
2022-07-07T22:58:08Z
2022-05-13T01:02:39Z
null
['CVE-2014-0225']
Improper Restriction of XML External Entity Reference in Spring Framework
When processing user provided XML documents, the Spring Framework 4.0.0 to 4.0.4, 3.0.0 to 3.2.8, and possibly earlier unsupported versions did not disable by default the resolution of URI references in a DTD declaration. This enabled an XXE attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-webmvc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-webmvc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0....
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0225'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-framework/commit/8e096aeef55287dc829484996c9330cf755891a1'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-framework/commit/c6503ebbf7c9e21ff022c58706dbac...
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T22:58:08Z', 'nvd_published_at': '2017-05-25T17:29:00Z'}
1.4.0
GHSA-xqpp-26pp-2365
2022-12-15T17:32:32Z
2022-05-24T19:03:11Z
null
['CVE-2021-21660']
XSS vulnerability in Jenkins Markdown Formatter Plugin
Markdown Formatter Plugin 0.1.0 and earlier uses a Markdown library to parse Markdown that does not escape crafted link target URLs. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with the ability to edit any description rendered using the configured markup formatter. Markd...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:markdown-formatter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.1.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21660'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/markdown-formatter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-05-25/#SECURITY-2198'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T17:32:32Z', 'nvd_published_at': '2021-05-25T17:15:00Z'}
1.4.0
GHSA-65j5-vpm7-6xp4
2023-07-25T19:37:36Z
2022-05-14T01:58:46Z
null
['CVE-2018-16831']
Smarty Path Traversal Vulnerability
Smarty before 3.1.33-dev-4 allows attackers to bypass the trusted_dir protection mechanism via a `file:./../` substring in an include statement.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'smarty/smarty'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.33-dev-4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16831'}, {'type': 'WEB', 'url': 'https://github.com/smarty-php/smarty/issues/486'}, {'type': 'WEB', 'url': 'https://github.com/smarty-php/smarty/commit/f9ca3c63d1250bb56b2bda609dcc9dd81f0065f8'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T19:37:36Z', 'nvd_published_at': '2018-09-11T13:29:00Z'}
1.4.0
GHSA-3mwj-7vmq-w43p
2022-12-20T22:13:04Z
2022-05-24T17:25:24Z
null
['CVE-2020-2236']
Stored XSS vulnerability in Jenkins Yet Another Build Visualizer Plugin
Yet Another Build Visualizer Plugin 1.11 and earlier does not escape tooltip content. This results in a stored cross-site scripting (XSS) vulnerability exploitable by users with Run/Update permission. Yet Another Build Visualizer Plugin 1.12 escapes tooltip content.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.axis.system.jenkins.plugins.downstream:yet-another-build-visualizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2236'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/yet-another-build-visualizer-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-08-12/#SECURITY-1940'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T22:13:04Z', 'nvd_published_at': '2020-08-12T14:15:00Z'}
1.4.0
GHSA-jwh2-ffg4-48xc
2022-06-22T18:50:29Z
2022-05-24T17:44:37Z
null
['CVE-2021-20218']
Improper Limitation of a Pathname to a Restricted Directory in Fabric8 Kubernetes Client
A flaw was found in the fabric8 kubernetes-client in version 4.2.0 and after. This flaw allows a malicious pod/container to cause applications using the fabric8 kubernetes-client `copy` command to extract files outside the working path. The highest threat from this vulnerability is to integrity and system availability....
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.fabric8:kubernetes-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.7.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.7.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'io.fabric8:kubernetes-client'}, 'r...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20218'}, {'type': 'WEB', 'url': 'https://github.com/fabric8io/kubernetes-client/issues/2715'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1923405'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-22T18:50:29Z', 'nvd_published_at': '2021-03-16T21:15:00Z'}
1.4.0
GHSA-qwfv-5jwj-582h
2023-07-26T21:37:20Z
2022-05-14T01:06:17Z
null
['CVE-2017-1000217']
Opencast RCE Vulnerability
Opencast 2.3.2 and older versions are vulnerable to script injections through media and metadata in the player and media module resulting in arbitrary code execution, fixed in 2.3.3 and 3.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.opencastproject:base'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.3.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000217'}, {'type': 'WEB', 'url': 'https://groups.google.com/a/opencast.org/forum/#!topic/security-notices/sCpt0pIPEFg'}]
{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T21:37:20Z', 'nvd_published_at': '2017-11-17T22:29:00Z'}
1.4.0
GHSA-vv33-27jm-cvxq
2023-07-06T21:14:06Z
2022-05-24T19:06:51Z
null
['CVE-2020-36395']
Stored XSS in LavaLite 5.8.0
A stored cross site scripting (XSS) vulnerability in the /admin/user/team component of LavaLite 5.8.0 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the "New" parameter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'lavalite/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.8.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36395'}, {'type': 'WEB', 'url': 'https://github.com/LavaLite/cms/issues/321'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-06T21:14:06Z', 'nvd_published_at': '2021-07-02T18:15:00Z'}
1.4.0
GHSA-fh35-p8ph-p545
2023-08-02T21:02:12Z
2022-05-14T02:48:26Z
null
['CVE-2015-5062']
Silverstripe CMS Open Redirect
Open redirect vulnerability in SilverStripe CMS & Framework 3.1.13 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the returnURL parameter to dev/build.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.13'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affecte...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5062'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200228091958/http://www.securityfocus.com/bid/75419'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201209000421/http://www.securityfocus.com/archive/1/535716/100/0/threaded'}, ...
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-02T21:02:12Z', 'nvd_published_at': '2015-06-24T14:59:00Z'}
1.4.0
GHSA-ff7r-7rrm-wx6w
2023-07-17T21:52:34Z
2022-05-24T16:52:25Z
null
['CVE-2019-7882']
Magento 2 Community Edition XSS Vulnerability
A stored cross-site scripting vulnerability exists in the WYSIWYG editor of Magento Open Source prior to 1.9.4.2, and Magento Commerce prior to 1.14.4.2, Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. An authenticated user with privileges to the editor can inject malicious SWF file...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixe...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7882'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051916/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-23'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T21:52:34Z', 'nvd_published_at': '2019-08-02T22:15:00Z'}
1.4.0
GHSA-r7p7-qr7p-2rrf
2023-07-26T19:56:19Z
2022-05-14T01:21:36Z
null
['CVE-2017-16652']
Symfony Open Redirect
An issue was discovered in Symfony 2.7.x before 2.7.38, 2.8.x before 2.8.31, 3.2.x before 3.2.14, and 3.3.x before 3.3.13. `DefaultAuthenticationSuccessHandler` or `DefaultAuthenticationFailureHandler` takes the content of the `_target_path` parameter and generates a redirect response, but no check is performed on the ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7'}, {'fixed': '2.7.38'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8'}, {'fixed': '2.8.31'}]}]}, {...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16652'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2019/03/msg00009.html'}, {'type': 'WEB', 'url': 'https://symfony.com/blog/cve-2017-16652-open-redirect-vulnerability-on-security-handlers'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T19:56:19Z', 'nvd_published_at': '2018-06-13T16:29:00Z'}
1.4.0
GHSA-px5r-fqj6-r2f8
2023-07-25T20:11:37Z
2022-05-14T02:01:21Z
null
['CVE-2018-17031']
Gogs XSS Vulnerability
In Gogs 0.11.53, an attacker can use a crafted .eml file to trigger MIME type sniffing, which leads to XSS, as demonstrated by Internet Explorer, because an "X-Content-Type-Options: nosniff" header is not sent.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'gogs.io/gogs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.11.53'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-17031'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/issues/5397'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T20:11:37Z', 'nvd_published_at': '2018-09-14T02:29:00Z'}
1.4.0
GHSA-9x5v-8352-244g
2023-09-11T20:43:36Z
2022-05-24T16:51:50Z
null
['CVE-2019-10357']
Missing Authorization in Jenkins Pipeline: Shared Groovy Libraries Plugin
A missing permission check in Jenkins Pipeline: Shared Groovy Libraries Plugin 2.14 and earlier allowed users with Overall/Read access to obtain limited information about the content of SCM repositories referenced by global libraries.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.workflow:workflow-cps-global-lib'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.15'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.14'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10357'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/workflow-cps-global-lib-plugin/commit/6fce1e241d82641e8648c546bc63c22a5e07e96b'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2594'}, {'type': 'WEB', 'url': 'https...
{'cwe_ids': ['CWE-285', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T22:41:06Z', 'nvd_published_at': '2019-07-31T13:15:00Z'}
1.4.0
GHSA-8mx3-gp3p-vgg7
2023-07-14T21:20:28Z
2022-05-24T22:00:16Z
null
['CVE-2019-1010206']
kevinsawicki/http-request Missing certificate validation
OSS Http Request (kevinsawicki/http-request) is missing SSL/TLS certificate validation. The impact is: certificate spoofing. The component is: use this library when https communication. The attack vector is: certificate spoofing.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.github.kevinsawicki:http-request'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010206'}, {'type': 'WEB', 'url': 'https://github.com/kevinsawicki/http-request/blob/master/lib/src/main/java/com/github/kevinsawicki/http/HttpRequest.java'}]
{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T23:47:08Z', 'nvd_published_at': '2019-07-23T14:15:00Z'}
1.4.0
GHSA-7gfx-wxfh-7rvm
2023-07-19T23:14:57Z
2022-05-13T01:05:24Z
null
['CVE-2018-13982']
Smarty Path Traversal Vulnerability
`Smarty_Security::isTrustedResourceDir()` in Smarty before 3.1.33 is prone to a path traversal vulnerability due to insufficient template code sanitization. This allows attackers controlling the executed template code to bypass the trusted directory security restriction and read arbitrary files.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'smarty/smarty'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.33'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-13982'}, {'type': 'WEB', 'url': 'https://github.com/smarty-php/smarty/commit/2e081a51b1effddb23f87952959139ac62654d50'}, {'type': 'WEB', 'url': 'https://github.com/smarty-php/smarty/commit/8d21f38dc35c4cd6b31c2f23fc9b8e5adbc56dfe'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T23:14:57Z', 'nvd_published_at': '2018-09-18T21:29:00Z'}
1.4.0
GHSA-52rh-5rpj-c3w6
2022-05-05T16:00:50Z
2022-05-05T16:00:50Z
null
[]
Improper handling of multiline messages in node-irc
node-irc is a socket wrapper for the IRC protocol that extends Node.js' EventEmitter. The vulnerability allows an attacker to manipulate a Matrix user into executing IRC commands by having them reply to a maliciously crafted message. Incorrect handling of a CR character allowed for making part of the message be sent to...
[]
[{'package': {'ecosystem': 'npm', 'name': 'matrix-org-irc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.2.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/matrix-org/node-irc/security/advisories/GHSA-52rh-5rpj-c3w6'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/node-irc/commit/2976c856df37660a9d664e94c857c796de2e34f7'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/node-irc/commit/e3eb9c15f8240e9c92365f5ffc394...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-05T16:00:50Z', 'nvd_published_at': None}
1.4.0
GHSA-jwwr-fjgh-cv2x
2022-07-07T22:43:25Z
2022-05-13T01:05:37Z
null
['CVE-2014-3004']
Improper Restriction of XML External Entity Reference in Castor
The default configuration for the Xerces SAX Parser in Castor before 1.3.3 allows context-dependent attackers to conduct XML External Entity (XXE) attacks via a crafted XML document.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.codehaus.castor:castor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3004'}, {'type': 'WEB', 'url': 'https://quickview.cloudapps.cisco.com/quickview/bug/CSCvm56811'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujan2020.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoc...
{'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T22:43:25Z', 'nvd_published_at': '2014-06-11T14:55:00Z'}
1.4.0
GHSA-mr75-899x-qcxq
2022-12-16T22:21:13Z
2022-05-24T17:35:09Z
null
['CVE-2020-2322']
Missing permission checks in Jenkins Chaos Monkey Plugin
Chaos Monkey Plugin 0.3 and earlier does not perform permission checks in several HTTP endpoints. This allows attackers with Overall/Read permission to generate load and to generate memory leaks. Chaos Monkey Plugin 0.4 requires Overall/Administer permission to generate load and to generate memory leaks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:chaos-monkey'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2322'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/chaos-monkey-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-12-03/#SECURITY-2109%20(1)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-se...
{'cwe_ids': ['CWE-401', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-16T22:21:13Z', 'nvd_published_at': '2020-12-03T16:15:00Z'}
1.4.0
GHSA-qwv2-2x8g-g43g
2023-03-09T00:29:28Z
2022-05-13T01:31:05Z
null
['CVE-2017-14683']
Gem in a Box vulnerable to Cross-site Request Forgery
geminabox (aka Gem in a Box) before 0.13.7 has CSRF, as demonstrated by an unintended gem upload.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'geminabox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-14683'}, {'type': 'WEB', 'url': 'https://github.com/geminabox/geminabox/commit/a01c4e8b3403624109499dec75eb6ee30bd01a55'}, {'type': 'PACKAGE', 'url': 'https://github.com/geminabox/geminabox'}, {'type': 'WEB', 'url': 'https://github.com/geminabox/ge...
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-09T00:29:28Z', 'nvd_published_at': '2017-09-25T08:29:00Z'}
1.4.0
GHSA-j279-cx9m-jv3w
2022-12-12T16:57:45Z
2022-05-14T03:18:40Z
null
['CVE-2018-1000174']
Jenkins Google Login Plugin Open Redirect vulnerability
An open redirect vulnerability exists in Jenkins Google Login Plugin 1.3 and older in GoogleOAuth2SecurityRealm.java that allows attackers to redirect users to an arbitrary URL after successful login. Google Login Plugin 1.3.1 only performs redirects to relative URLs.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:google-login'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000174'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/google-login-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-04-16/'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/104211'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T16:57:45Z', 'nvd_published_at': '2018-05-08T15:29:00Z'}
1.4.0
GHSA-r9pv-hg64-jqrp
2022-11-04T22:36:46Z
2022-05-24T16:51:28Z
null
['CVE-2019-0202']
Exposure of Sensitive Information in Apache Storm Logviewer
The Apache Storm Logviewer daemon exposes HTTP-accessible endpoints to read/search log files on hosts running Storm. In Apache Storm versions 0.9.1-incubating to 1.2.2, it is possible to read files off the host's file system that were not intended to be accessible via these endpoints.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.storm:storm-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.1-incubating'}, {'fixed': '1.2.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0202'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/storm'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/220f1a77ff20749326a4c130446c5521db854da0afe81d1974b8109f@%3Cuser.storm.apache.org%3E'}]
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-04T22:36:46Z', 'nvd_published_at': '2019-07-26T00:15:00Z'}
1.4.0
GHSA-p57w-9q28-j6v7
2023-07-25T18:43:01Z
2022-05-14T02:02:33Z
null
['CVE-2018-16650']
phpMyFAQ CSRF
phpMyFAQ before 2.9.11 allows CSRF.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16650'}, {'type': 'WEB', 'url': 'https://www.phpmyfaq.de/security/advisory-2018-09-02'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T18:43:01Z', 'nvd_published_at': '2018-09-07T05:29:00Z'}
1.4.0
GHSA-297x-8xj4-vcxv
2022-06-23T06:55:22Z
2022-05-24T17:11:32Z
null
['CVE-2020-8141']
Improper Control of Generation of Code in doT
The dot package v1.1.2 uses Function() to compile templates. This can be exploited by the attacker if they can control the given template or if they can control the value set on Object.prototype.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'dot'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.1.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8141'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/390929'}]
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T06:55:22Z', 'nvd_published_at': '2020-03-15T18:15:00Z'}
1.4.0
GHSA-4vwv-x3gp-2j4g
2023-08-03T21:24:41Z
2022-05-17T02:19:49Z
null
['CVE-2015-3198']
The Undertow module of WildFly allows source code disclosure
The Undertow module of WildFly versions 8.1.0.Final, 8.2.0.Final, 9.0.0.CR1 allows remote attackers to obtain the source code of a JSP page via a "/" at the end of a URL.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.wildfly:wildfly-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.1.0.Final'}, {'fixed': '9.0.0.CR2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.0.0.CR1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3198'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1224787'}, {'type': 'WEB', 'url': 'https://developer.jboss.org/message/927301#927301'}, {'type': 'WEB', 'url': 'https://issues.jboss.org/browse/WFLY-4595'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T21:24:41Z', 'nvd_published_at': '2017-07-21T14:29:00Z'}
1.4.0
GHSA-j4gx-p3x5-m987
2023-06-09T23:07:08Z
2022-05-14T03:44:51Z
null
['CVE-2014-1835']
Echor Ruby Gem credentials can be stolen via process table monitoring
The perform_request function in /lib/echor/backplane.rb in echor 0.1.6 Ruby Gem allows local users to steal the login credentials by watching the process table.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'echor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-1835'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/echor/CVE-2014-1835.yml'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/01/31/10'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T23:07:08Z', 'nvd_published_at': '2018-02-02T21:29:00Z'}
1.4.0
GHSA-hhpm-74pm-hf35
2023-08-22T14:35:45Z
2022-05-24T17:24:40Z
null
['CVE-2020-8553']
ingress-nginx component for Kubernetes allows file overwrite
The Kubernetes ingress-nginx component prior to version 0.28.0 allows a user with the ability to create namespaces and to read and create ingress objects to overwrite the password file of another ingress which uses nginx.ingress.kubernetes.io/auth-type: basic and which has a hyphenated namespace or secret name.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'k8s.io/ingress-nginx'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.28.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8553'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/ingress-nginx/issues/5126'}, {'type': 'PACKAGE', 'url': 'https://github.com/kubernetes/ingress-nginx'}]
{'cwe_ids': ['CWE-610', 'CWE-73'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T21:00:22Z', 'nvd_published_at': '2020-07-29T15:15:00Z'}
1.4.0
GHSA-hr59-35cr-qf43
2023-08-29T21:36:39Z
2022-05-17T04:32:24Z
null
['CVE-2012-5502']
Plone Cross-site scripting Vulnerability
Cross-site scripting (XSS) vulnerability in safe_html.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote authenticated users with permissions to edit content to inject arbitrary web script or HTML via unspecified vectors.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'E...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-5502'}, {'type': 'WEB', 'url': 'https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt'}, {'type': 'WEB', 'url': 'https://plone.org/products/plone-hotfix/releases/20121106'}, {'type': 'WEB', 'url': 'https://plone.org/products/plone/...
{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T21:36:39Z', 'nvd_published_at': '2014-09-30T14:55:00Z'}
1.4.0
GHSA-4hm9-844j-jmxp
2023-06-09T23:00:36Z
2022-05-24T16:49:06Z
null
['CVE-2019-13117']
Uninitialized read in Nokogiri gem
In numbers.c in libxslt 1.1.33, an xsl:number with certain format strings could lead to a uninitialized read in xsltNumberFormatInsertNumbers. This could allow an attacker to discern whether a byte on the stack contains the characters A, a, I, i, or 0, or any other character.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-13117'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/issues/1943'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14471'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blo...
{'cwe_ids': ['CWE-908'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T23:00:36Z', 'nvd_published_at': '2019-07-01T02:15:00Z'}
1.4.0
GHSA-hjp5-hv33-q58g
2023-09-22T23:41:41Z
2022-05-01T23:39:47Z
null
['CVE-2008-1396']
Plone credentials stored in session cookie
Plone CMS 3.1.x uses invariant data (a client username and a server secret) when calculating an HMAC-SHA1 value for an authentication cookie, which makes it easier for remote attackers to gain permanent access to an account by sniffing the network.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2008-1396'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/41421'}, {'type': 'PACKAGE', 'url': ' https://github.com/plone/Plone'}, {'type': 'WEB', 'url': 'http://securityreason.com/securityalert/3754'}, {'type': 'WEB', 'ur...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-22T23:41:41Z', 'nvd_published_at': '2008-03-20T00:44:00Z'}
1.4.0
GHSA-38f9-4vhq-9cr8
2023-07-07T13:56:21Z
2022-05-24T17:40:23Z
null
['CVE-2021-3291']
Zen Cart vulnerable to authenticated remote code execution
Zen Cart 1.5.7b allows admins to execute arbitrary OS commands by inspecting an HTML radio input element (within the modules edit page) and inserting a command.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'zencart/zencart'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.7c'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.5.7b'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3291'}, {'type': 'WEB', 'url': 'https://github.com/zencart/zencart/commit/7447627f7148b11c614f89dab4a09d3f102b58af'}, {'type': 'WEB', 'url': 'https://github.com/MucahitSaratar/zencart_auth_rce_poc'}, {'type': 'PACKAGE', 'url': 'https://github.com/z...
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T13:56:21Z', 'nvd_published_at': '2021-01-26T18:16:00Z'}
1.4.0
GHSA-q388-j7cw-ff7w
2022-11-03T22:33:13Z
2022-05-17T03:13:10Z
null
['CVE-2013-3827']
Path Traversal in Eclipse Mojarra
Multiple path traversal flaws where found in Mojarra JSF2 implementation for identifying resources by name or from libraries. An unauthenticated remote attacker can use these flaws to gather otherwise undisclosed information from within an application's root.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.glassfish:javax.faces'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.19'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-3827'}, {'type': 'WEB', 'url': 'https://bugs.gentoo.org/show_bug.cgi?id=CVE-2013-3827'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0029.html'}, {'type': 'WEB', 'url': 'http://www.kb.cert.org/vuls/id/526012'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T22:33:13Z', 'nvd_published_at': '2013-10-16T15:55:00Z'}
1.4.0
GHSA-65wv-528r-m892
2022-06-21T20:05:07Z
2022-05-24T17:21:16Z
null
['CVE-2020-13961']
Improper Input Validation in strapi
Strapi before 3.0.2 could allow a remote authenticated attacker to bypass security restrictions because templates are stored in a global variable without any sanitation. By sending a specially crafted request, an attacker could exploit this vulnerability to update the email template for both password reset and account ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'strapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13961'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/pull/6599'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/183045'}, {'type': 'PACKAGE', 'url': 'https://github.com/strapi/strapi'}, {'type': 'WEB', 'u...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-21T20:05:07Z', 'nvd_published_at': '2020-06-19T17:15:00Z'}
1.4.0
GHSA-wxcw-rqxc-hj85
2023-09-22T21:42:53Z
2022-05-01T18:31:03Z
null
['CVE-2007-5201']
FTP backend for Duplicity Discloses Passwords to Process Listing
The FTP backend for Duplicity before 0.4.9 sends the password as a command line argument when calling ncftp, which might allow local users to read the password by listing the process and its arguments.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'duplicity'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-5201'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=293081'}, {'type': 'PACKAGE', 'url': 'https://gitlab.com/duplicity/duplicity'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20080118045107/https://duplicity.nongnu....
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-22T21:42:53Z', 'nvd_published_at': '2007-10-04T17:17:00Z'}
1.4.0
GHSA-399v-jg88-3gx6
2023-07-20T18:15:47Z
2022-05-13T01:18:34Z
null
['CVE-2018-0856']
ChakraCore RCE Vulnerability
Microsoft Edge and ChakraCore in Microsoft Windows 10 1703 and 1709 allows remote code execution, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0834, CVE-2018-0835, CVE-2018-0836, CVE-2018-0837, CVE-2018-0838, CVE-2...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-0856'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/385af842bce4f94ddef98553a81f8ea99c7e2dcf'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0856'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T18:15:47Z', 'nvd_published_at': '2018-02-15T02:29:00Z'}
1.4.0
GHSA-324h-2v7h-q3xx
2022-12-16T23:00:17Z
2022-05-24T17:15:34Z
null
['CVE-2020-2179']
RCE vulnerability in Jenkins Yaml Axis Plugin
Yaml Axis Plugin 0.2.0 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types. This results in a remote code execution (RCE) vulnerability exploitable by users able to configure a multi-configuration (Matrix) job, or control the contents of a previously configured job’s SCM repos...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:yaml-axis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.2.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2179'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/yaml-axis-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-04-16/#SECURITY-1825'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/0...
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-16T23:00:17Z', 'nvd_published_at': '2020-04-16T19:15:00Z'}
1.4.0
GHSA-pgj6-jmj5-wqfx
2022-12-16T20:40:24Z
2022-05-24T19:19:44Z
null
['CVE-2021-21694']
Multiple vulnerabilities allow bypassing path filtering of agent-to-controller access control in Jenkins
The agent-to-controller security subsystem limits which files on the Jenkins controller can be accessed by agent processes. Multiple vulnerabilities in the file path filtering implementation of Jenkins 2.318 and earlier, LTS 2.303.2 and earlier allow agent processes to read and write arbitrary files on the Jenkins con...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.303.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.303.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21694'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-11-04/#SECURITY-2455'}]
{'cwe_ids': ['CWE-862'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T00:50:59Z', 'nvd_published_at': '2021-11-04T17:15:00Z'}
1.4.0
GHSA-x6r5-vxfg-gq3v
2023-08-01T23:17:41Z
2022-05-24T16:50:33Z
null
['CVE-2019-1010275']
Helm Improper Certificate Validation
helm Before 2.7.2 is affected by: CWE-295: Improper Certificate Validation. The impact is: Unauthorized clients could connect to the server because self-signed client certs were aloowed. The component is: helm (many files updated, see https://github.com/helm/helm/pull/3152/files/1096813bf9a425e2aa4ac755b6c991b626dfab50...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'helm.sh/helm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1010275'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/pull/3152'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/pull/3152/files/1096813bf9a425e2aa4ac755b6c991b626dfab50'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/commi...
{'cwe_ids': ['CWE-295'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T23:17:41Z', 'nvd_published_at': '2019-07-17T21:15:00Z'}
1.4.0
GHSA-gxxx-j8m7-hh7m
2023-07-21T20:16:53Z
2022-05-13T01:20:46Z
null
['CVE-2018-8294']
ChakraCore RCE Vulnerability
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8280, CVE-2018-8286, CVE-2018-8290.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8294'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/5444'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/7af07fdfb3cf3ac2b21dd71bf565ab1135e62d4d'}, {'type': 'WEB', 'url': 'https://portal.msrc....
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T20:16:53Z', 'nvd_published_at': '2018-07-11T00:29:00Z'}
1.4.0
GHSA-c5h8-cq4v-cvfm
2022-07-07T23:28:34Z
2022-05-24T22:01:03Z
null
['CVE-2013-5123']
Improper Authentication in pip
The mirroring support (-M, --use-mirrors) in Python Pip before 1.5 uses insecure DNS querying and authenticity checks which allows attackers to perform man-in-the-middle attacks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pip'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-5123'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-5123'}, {'type': 'WEB', 'url': 'https://bugzilla.suse.com/show_bug.cgi?id=CVE-2013-5123'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-c5h8-cq4...
{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T23:28:34Z', 'nvd_published_at': '2019-11-05T22:15:00Z'}
1.4.0
GHSA-jrmf-xhr6-3428
2022-12-06T21:07:51Z
2022-05-24T16:57:28Z
null
['CVE-2019-10435']
Jenkins SourceGear Vault plugin transmits credentials in plain text
Jenkins SourceGear Vault Plugin transmits configured credentials in plain text as part of job configuration forms, potentially resulting in their exposure. As of the publication of the advisory, there are no patches and the plugin is unmaintained.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:vault-scm-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10435'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/vault-scm-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-10-01/#SECURITY-1524'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/...
{'cwe_ids': ['CWE-319'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T21:07:51Z', 'nvd_published_at': '2019-10-01T14:15:00Z'}
1.4.0
GHSA-gvcj-72h4-8xm9
2023-01-06T16:58:54Z
2022-05-24T17:10:28Z
null
['CVE-2020-2151']
Jenkins Quality Gates Plugin transmits credentials in plain text during configuration
Quality Gates Plugin stores credentials in its global configuration file `quality.gates.jenkins.plugin.GlobalConfig.xml` on the Jenkins controller as part of its configuration. While the credentials are stored encrypted on disk, they are transmitted in plain text as part of the configuration form by Quality Gates Plugi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:quality-gates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2151'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/quality-gates-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-03-09/#SECURITY-1519'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/20...
{'cwe_ids': ['CWE-319'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-01-06T16:58:54Z', 'nvd_published_at': '2020-03-09T16:15:00Z'}
1.4.0
GHSA-7q9r-vhg2-789w
2023-01-14T05:27:43Z
2022-05-24T17:08:47Z
null
['CVE-2020-2122']
Stored XSS vulnerability in Jenkins brakeman Plugin
brakeman Plugin 0.12 and earlier did not escape values received from parsed JSON files when rendering them, resulting in a stored cross-site scripting vulnerability. This vulnerability can be exploited by users able to control the Brakeman post-build step input data.\n\nbrakeman Plugin 0.13 escape affected values from...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:brakeman'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2122'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/brakeman-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-02-12/#SECURITY-1644'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/02...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-14T05:27:43Z', 'nvd_published_at': '2020-02-12T15:15:00Z'}
1.4.0
GHSA-6j8f-66vh-39mj
2023-09-22T21:05:29Z
2022-05-01T18:13:14Z
null
['CVE-2007-3385']
Apache Tomcat Mishandles Character Sequence in Cookies
Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 does not properly handle the `\"` character sequence in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'last_affected': '6.0.13'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific':...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-3385'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/35999'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E'}, {'typ...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-22T21:05:29Z', 'nvd_published_at': '2007-08-14T22:17:00Z'}
1.4.0
GHSA-jjhj-8gx7-x836
2023-06-30T19:32:15Z
2022-05-13T01:49:24Z
null
['CVE-2018-12028']
Incorrect Access Control in Phusion Passenger
An Incorrect Access Control vulnerability in SpawningKit in Phusion Passenger 5.3.x before 5.3.2 allows a Passenger-managed malicious application, upon spawning a child process, to report an arbitrary different PID back to Passenger's process manager. If the malicious application then generates an error, it would cause...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'passenger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.3.0'}, {'fixed': '5.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-12028'}, {'type': 'WEB', 'url': 'https://github.com/phusion/passenger/commit/1e7c82deb4901c438f583737d8c9f2aac264737c'}, {'type': 'WEB', 'url': 'https://blog.phusion.nl/passenger-5-3-2'}, {'type': 'PACKAGE', 'url': 'https://github.com/phusion/passe...
{'cwe_ids': ['CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T22:58:30Z', 'nvd_published_at': '2018-06-17T20:29:00Z'}
1.4.0
GHSA-pxv5-5vmp-3jj4
2022-07-08T19:10:34Z
2022-05-17T02:54:07Z
null
['CVE-2013-2192']
Improper Authentication in Apache Hadoop
The RPC protocol implementation in Apache Hadoop 2.x before 2.0.6-alpha, 0.23.x before 0.23.9, and 1.x before 1.2.1, when the Kerberos security features are enabled, allows man-in-the-middle attackers to disable bidirectional authentication and obtain sensitive information by forcing a downgrade to simple authenticatio...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.6-alpha'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.5-alpha'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:h...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2192'}, {'type': 'WEB', 'url': 'https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/errata/RHSA-2014-0037.html'}, {'type': 'WEB', 'url': 'http://rhn.redhat.com/err...
{'cwe_ids': ['CWE-287'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T19:10:34Z', 'nvd_published_at': '2014-01-24T18:55:00Z'}
1.4.0
GHSA-j7j7-g4ww-pxg5
2022-11-04T20:38:23Z
2022-05-13T01:49:40Z
null
['CVE-2018-1287']
Missing certificate validation in Apache JMeter
In Apache JMeter 2.X and 3.X, when using Distributed Test only (RMI based), jmeter server binds RMI Registry to wildcard host. This could allow an attacker to get Access to JMeterEngine and send unauthorized code. This only affect those running in Distributed mode. In distributed mode, JMeter makes an architectural as...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.jmeter:ApacheJMeter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1287'}, {'type': 'WEB', 'url': 'https://github.com/apache/jmeter/issues/4677'}, {'type': 'WEB', 'url': 'https://bz.apache.org/bugzilla/show_bug.cgi?id=62039'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/jmeter'}, {'type': 'WEB', 'url': '...
{'cwe_ids': ['CWE-347'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-04T20:38:23Z', 'nvd_published_at': '2018-02-14T14:29:00Z'}
1.4.0
GHSA-mpg6-rgp4-35rr
2022-06-17T22:23:26Z
2022-05-02T04:00:27Z
null
['CVE-2009-5010']
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in pyftpdlib
Race condition in the FTPHandler class in ftpserver.py in pyftpdlib before 0.5.1 allows remote attackers to cause a denial of service (daemon outage) by establishing and then immediately closing a TCP connection, leading to the accept function having an unexpected return value of None, a different vulnerability than CV...
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'pyftpdlib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.5.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-5010'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/zodb/+bug/135108'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mpg6-rgp4-35rr'}, {'type': 'PACKAGE', 'url': 'https://github.com/giampaolo/pyftpdlib'}, {'type': 'WEB', '...
{'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T22:23:26Z', 'nvd_published_at': '2010-10-19T20:00:00Z'}
1.4.0
GHSA-fg6g-52rg-vr9q
2022-12-22T13:45:06Z
2022-05-24T17:33:08Z
null
['CVE-2020-2316']
Stored XSS vulnerability in Jenkins Static Analysis Utilities Plugin
Jenkins Static Analysis Utilities Plugin 1.96 and earlier does not escape the annotation message in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jvnet.hudson.plugins:analysis-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.96'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2316'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/analysis-core-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-11-04/#SECURITY-1907'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T13:45:06Z', 'nvd_published_at': '2020-11-04T15:15:00Z'}
1.4.0
GHSA-9ccm-g362-2r35
2023-08-17T21:57:55Z
2022-05-14T02:55:17Z
null
['CVE-2011-2088']
XWork in Apache Struts Reveals Sensitive Information
XWork 2.2.1 in Apache Struts 2.2.1, and OpenSymphony XWork in OpenSymphony WebWork, allows remote attackers to obtain potentially sensitive information about internal Java class paths via vectors involving an s:submit element and a nonexistent method, a different vulnerability than CVE-2011-1772.3.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts.xwork:xwork-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-2088'}, {'type': 'WEB', 'url': 'https://github.com/apache/struts/commit/885ab3459e146ff830d1f7257f809f4a3dd4493a'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/WW-3579'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/2011072...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-17T21:57:55Z', 'nvd_published_at': '2011-05-13T17:05:00Z'}
1.4.0
GHSA-wcpc-f63g-x26q
2023-09-18T23:41:06Z
2022-05-01T02:12:26Z
null
['CVE-2005-2875']
Py2Play Unpickles Untrusted Objects
Py2Play allows remote attackers to execute arbitrary Python code via pickled objects, which Py2Play unpickles and executes.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'Py2Play'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2005-2875'}, {'type': 'WEB', 'url': 'https://bugs.gentoo.org/show_bug.cgi?id=103524'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20040824010038/http://home.gna.org/oomadness/fr/slune/index.html'}, {'type': 'WEB', 'url': 'https://web.archive.or...
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T23:41:06Z', 'nvd_published_at': '2005-09-13T23:03:00Z'}
1.4.0
GHSA-3gp9-h8hw-pxpw
2022-11-01T21:40:37Z
2022-05-24T17:43:10Z
null
['CVE-2021-1721']
Denial of service in .NET core
.NET Core and Visual Studio Denial of Service Vulnerability due to a vulnerability which exists when creating HTTPS web request during X509 certificate chain building.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.25'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.NETCore.App.Host.linux-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'f...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-1721'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/175'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/runtime/issues/48067'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/adviso...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T21:40:37Z', 'nvd_published_at': '2021-02-25T23:15:00Z'}
1.4.0
GHSA-9785-w233-x6hv
2022-07-01T13:50:28Z
2022-05-13T01:46:13Z
null
['CVE-2017-5650']
Improper Resource Shutdown or Release in Apache Tomcat
In Apache Tomcat 9.0.0.M1 to 9.0.0.M18 and 8.5.0 to 8.5.12, the handling of an HTTP/2 GOAWAY frame for a connection did not close streams associated with that connection that were currently waiting for a WINDOW_UPDATE before allowing the application to write more data. These waiting streams each consumed a thread. A ma...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0.M1'}, {'fixed': '9.0.0.M19'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.0.0.M18'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'},...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-5650'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff228...
{'cwe_ids': ['CWE-404'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T13:50:28Z', 'nvd_published_at': '2017-04-17T16:59:00Z'}
1.4.0
GHSA-9pxm-8g95-q5xr
2022-11-01T22:11:43Z
2022-05-17T00:28:41Z
null
['CVE-2017-10862']
Insufficient Data Verification in io.really:jwt-scala
jwt-scala 1.2.2 and earlier fails to verify token signatures correctly which may lead to an attacker being able to pass specially crafted JWT data as a correctly signed token.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.really:jwt-scala'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-10862'}, {'type': 'WEB', 'url': 'https://github.com/reallylabs/jwt-scala'}, {'type': 'WEB', 'url': 'https://jvn.jp/en/vu/JVNVU90916766/index.html'}]
{'cwe_ids': ['CWE-345'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T22:11:43Z', 'nvd_published_at': '2017-10-12T14:29:00Z'}
1.4.0
GHSA-vmg8-g8j3-m355
2022-12-21T18:27:41Z
2022-05-24T17:30:18Z
null
['CVE-2020-2292']
Stored XSS vulnerability in Jenkins Release Plugin
Jenkins Release Plugin 2.10.2 and earlier does not escape the release version in badge tooltip, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Release/Release permission.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:release'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2292'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/release-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-10-08/#SECURITY-1928'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T18:27:41Z', 'nvd_published_at': '2020-10-08T13:15:00Z'}
1.4.0
GHSA-f5wx-w2f9-82gh
2022-12-19T21:15:52Z
2022-05-24T17:07:41Z
null
['CVE-2020-2108']
XXE vulnerability in Jenkins WebSphere Deployer Plugin
WebSphere Deployer Plugin 1.6.1 and earlier does not configure the XML parser to prevent XML external entity (XXE) attacks. This could be exploited by a user with Job/Configure permissions to upload a specially crafted war file containing a `WEB-INF/ibm-web-ext.xml` which is parsed by the plugin.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:websphere-deployer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.6.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2108'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/websphere-deployer-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-01-29/#SECURITY-1719'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-securi...
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-19T21:15:52Z', 'nvd_published_at': '2020-01-29T16:15:00Z'}
1.4.0
GHSA-m4vq-v7hw-7fqq
2022-12-06T21:50:03Z
2022-05-24T17:03:48Z
null
['CVE-2019-16571']
Jenkins RapidDeploy Plugin missing permission check
A missing permission check in Jenkins RapidDeploy Plugin 4.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified web server.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:rapiddeploy-jenkins'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16571'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1604'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/12/17/1'}]
{'cwe_ids': ['CWE-285', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T21:50:03Z', 'nvd_published_at': '2019-12-17T15:15:00Z'}
1.4.0
GHSA-vh38-ghx6-vmvg
2022-05-23T19:41:26Z
2022-05-03T00:00:46Z
null
['CVE-2022-21167']
Code Injection in Masuit.Tools.Core
All versions of package Masuit.Tools.Core are vulnerable to Arbitrary Code Execution via the ReceiveVarData<T> function in the SocketClient.cs component. The socket client in the package can pass in the payload via the user-controllable input after it has been established, because this socket client transmission does n...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Masuit.Tools.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4.8.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21167'}, {'type': 'PACKAGE', 'url': 'https://github.com/ldqk/Masuit.Tools/'}, {'type': 'WEB', 'url': 'https://github.com/ldqk/Masuit.Tools/blob/327f42b9f20f25bb66188672199c8265fc968d91/Masuit.Tools.Abstractions/Net/SocketClient.cs%23L197'}, {'type'...
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-23T19:41:26Z', 'nvd_published_at': '2022-05-01T16:15:00Z'}
1.4.0
GHSA-hh2x-7mf9-78fr
2023-01-27T00:53:07Z
2022-05-17T03:20:59Z
null
['CVE-2013-4479']
Sup Code Injection vulnerability
`lib/sup/message_chunks.rb` in Sup before 0.13.2.1 and 0.14.x before 0.14.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the content_type of an email attachment.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'sup'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.2.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sup'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'ty...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4479'}, {'type': 'WEB', 'url': 'https://github.com/sup-heliotrope/sup/commit/ca0302e0c716682d2de22e9136400c704cc93e42'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/sup/CVE-2013-4479.yml'}, {'type': 'PACKAGE...
{'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T00:53:07Z', 'nvd_published_at': '2013-12-07T20:55:00Z'}
1.4.0
GHSA-3w4v-qfqc-3433
2023-09-28T20:17:40Z
2022-05-13T01:21:15Z
null
['CVE-2019-0539']
ChakraCore RCE Vulnerability
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2019-0567, CVE-2019-0568.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-0539'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/788f17b0ce06ea84553b123c174d1ff7052112a0'}, {'type': 'PACKAGE', 'url': 'https://github.com/chakra-core/ChakraCore'}, {'type': 'WEB', 'url': 'https://portal.msrc.micros...
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T20:24:02Z', 'nvd_published_at': '2019-01-08T21:29:00Z'}