schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 8 154 | details stringlengths 31 19.1k | severity stringlengths 2 92 | affected stringlengths 75 28.5k | references stringlengths 79 7.48k | database_specific stringlengths 131 196 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-9678-5f6f-wp3f | 2023-03-02T16:42:30Z | 2022-05-24T16:55:59Z | null | ['CVE-2019-10398'] | Jenkins Beaker Builder Plugin has Insufficiently Protected Credentials | Beaker builder Plugin stored the Beaker password unencrypted on the Jenkins controller. This password could be viewed by users with access to the Jenkins controller file system.
Beaker builder Plugin now stores these credentials encrypted. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:beaker-builder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10398'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1545'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/09/12/2'}] | {'cwe_ids': ['CWE-522'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-03-02T16:42:30Z', 'nvd_published_at': '2019-09-12T14:15:00Z'} |
1.4.0 | GHSA-27j5-2h6r-c9q2 | 2022-11-22T19:04:53Z | 2022-05-24T16:44:03Z | null | ['CVE-2019-11405'] | OpenAPI Tools OpenAPI Generator uses HTTP in various files | OpenAPI Tools OpenAPI Generator before 4.0.0-20190419.052012-560 uses http:// URLs in various build.gradle, build.gradle.mustache, and build.sbt files, which may have caused insecurely resolved dependencies. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.openapitools:openapi-generator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0-20190419.052012-560'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11405'}, {'type': 'WEB', 'url': 'https://github.com/OpenAPITools/openapi-generator/issues/2253'}, {'type': 'WEB', 'url': 'https://github.com/OpenAPITools/openapi-generator/pull/2248'}, {'type': 'WEB', 'url': 'https://github.com/OpenAPITools/openapi... | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T19:04:53Z', 'nvd_published_at': '2019-04-22T11:29:00Z'} |
1.4.0 | GHSA-4rjr-3gj2-5crq | 2022-06-17T21:39:29Z | 2022-05-24T19:09:36Z | null | ['CVE-2021-20332'] | Exposure of Sensitive Information to an Unauthorized Actor in MongoDB Rust Driver | Specific MongoDB Rust Driver versions can include credentials used by the connection pool to authenticate connections in the monitoring event that is emitted when the pool is created. The user's logging infrastructure could then potentially ingest these events and unexpectedly leak the credentials. Note that such monit... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'mongodb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '2.0.0-beta'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.0-alpha1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20332'}, {'type': 'WEB', 'url': 'https://github.com/mongodb/mongo-rust-driver/commit/9e8782b1bb1104e5399c073b553719c262d4463c'}, {'type': 'PACKAGE', 'url': 'https://github.com/mongodb/mongo-rust-driver'}, {'type': 'WEB', 'url': 'https://jira.mongod... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:39:29Z', 'nvd_published_at': '2021-08-02T13:15:00Z'} |
1.4.0 | GHSA-hmhg-95wh-r699 | 2023-08-08T19:55:12Z | 2022-05-24T19:03:11Z | null | ['CVE-2021-23937'] | DNS based denial of service in Apache Wicket | A DNS proxy and possible amplification attack vulnerability in WebClientInfo of Apache Wicket allows an attacker to trigger arbitrary DNS lookups from the server when the X-Forwarded-For header is not properly sanitized. This DNS lookup can be engineered to overload an internal DNS server or to slow down request proces... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.wicket:wicket-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.3.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.wicket:wicket-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'f... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23937'}, {'type': 'WEB', 'url': 'https://github.com/apache/wicket/commit/84f62a5cff462eaa3bfaf171b0638c7e7feea30d'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/wicket'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r127c0... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-31T18:25:53Z', 'nvd_published_at': '2021-05-25T17:15:00Z'} |
1.4.0 | GHSA-wcvc-rhfj-997g | 2023-07-28T20:22:48Z | 2022-05-14T02:22:42Z | null | ['CVE-2016-7203'] | ChakraCore RCE Vulnerability | The Chakra JavaScript scripting engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-7200, CVE-2016-7201, CVE-2016-7202, CVE-2016... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-7203'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/1982'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/c2787ef8fdb7401922e9ec6540e4e5895d11c631'}, {'type': 'WEB', 'url': 'https://docs.microso... | {'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T20:22:48Z', 'nvd_published_at': '2016-11-10T06:59:00Z'} |
1.4.0 | GHSA-wv63-gwr9-5c55 | 2022-12-13T14:52:57Z | 2022-05-24T17:39:12Z | null | ['CVE-2021-21608'] | Stored XSS vulnerability in Jenkins button labels | Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not escape button labels in the Jenkins UI.
This results in a cross-site scripting vulnerability exploitable by attackers with the ability to control button labels. An example of buttons with a user-controlled label are the buttons of the Pipeline `input` step.
... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.275'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.263.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21608'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-01-13/#SECURITY-2035'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T06:51:15Z', 'nvd_published_at': '2021-01-13T16:15:00Z'} |
1.4.0 | GHSA-f5qf-vh69-9q4r | 2022-05-31T17:18:38Z | 2022-05-14T00:55:56Z | null | ['CVE-2017-1000190'] | SimpleXML vulnerable to XML External Entity (XXE) | SimpleXML (latest version 2.7.1) is vulnerable to an XXE vulnerability resulting SSRF, information disclosure, DoS and so on. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.simpleframework:simple-xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000190'}, {'type': 'WEB', 'url': 'https://github.com/ngallagher/simplexml/issues/18'}, {'type': 'PACKAGE', 'url': 'https://github.com/ngallagher/simplexml'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a... | {'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-05-31T17:18:38Z', 'nvd_published_at': '2017-11-17T21:29:00Z'} |
1.4.0 | GHSA-6gjj-c5mj-4cvp | 2022-07-07T22:54:37Z | 2022-05-14T01:10:35Z | null | ['CVE-2014-0033'] | Improper Input Validation in Apache Tomcat | org/apache/catalina/connector/CoyoteAdapter.java in Apache Tomcat 6.0.33 through 6.0.37 does not consider the disableURLRewriting setting when handling a session ID in a URL, which allows remote attackers to conduct session fixation attacks via a crafted URL. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.33'}, {'fixed': '6.0.38'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0033'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1069919'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WE... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T22:54:37Z', 'nvd_published_at': '2014-02-26T14:55:00Z'} |
1.4.0 | GHSA-ff28-f46g-r9g8 | 2022-05-24T20:48:14Z | 2022-05-24T20:48:14Z | null | ['CVE-2022-1464'] | Cross-site Scripting in Gogs | ### Impact
The malicious user is able to upload a crafted SVG file as the issue attachment to archive XSS. All installations [allow uploading SVG (`text/xml`) files as issue attachments (non-default)](https://github.com/gogs/gogs/blob/e51e01683408e10b3dcd2ace65e259ca7f0fd61b/conf/app.ini#L283-L284) are affected.
### ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'gogs.io/gogs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.7'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/gogs/gogs/security/advisories/GHSA-ff28-f46g-r9g8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1464'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/commit/bc77440b301ac8780698be91dff1ac33b7cee850'}, {'type': 'PACKAGE', 'url': 'https://gith... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T20:48:14Z', 'nvd_published_at': '2022-05-05T14:15:00Z'} |
1.4.0 | GHSA-wwg2-2crq-6grr | 2022-06-17T21:38:52Z | 2022-05-24T17:34:03Z | null | ['CVE-2020-28267'] | Prototype pollution in @strikeentco/set | Prototype pollution vulnerability in '@strikeentco/set' version 1.0.0 allows attacker to cause a denial of service and may lead to remote code execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': '@strikeentco/set'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.1'}]}], 'versions': ['1.0.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28267'}, {'type': 'WEB', 'url': 'https://github.com/strikeentco/set/commit/102cc6b2e1d1e0c928ced87e75df759d5541ff60'}, {'type': 'PACKAGE', 'url': 'https://github.com/strikeentco/set/'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vu... | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:38:52Z', 'nvd_published_at': '2020-11-10T16:15:00Z'} |
1.4.0 | GHSA-7r4h-2h23-6jq9 | 2022-07-01T18:28:34Z | 2022-05-13T01:12:25Z | null | ['CVE-2017-2599'] | Incorrect Authorization in Jenkins | Jenkins before versions 2.44 and 2.32.2 is vulnerable to an insufficient permission check. This allows users with permissions to create new items (e.g. jobs) to overwrite existing items they don't have access to (SECURITY-321). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.32.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.32.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-2599'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenkins/commit/4ed5c850b6855ab064a66d02fb338f366853ce89'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2599'}, {'type': 'PACKAGE', 'url': 'https://github.... | {'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T18:28:34Z', 'nvd_published_at': '2018-04-11T16:29:00Z'} |
1.4.0 | GHSA-jf86-9434-f8c2 | 2023-09-26T19:53:54Z | 2022-05-24T17:02:42Z | null | ['CVE-2019-14910'] | Keycloak Authentication Error | A vulnerability was found in keycloak 7.x, when keycloak is configured with LDAP user federation and StartTLS is used instead of SSL/TLS from the LDAP server (ldaps), in this case user authentication succeeds even if invalid password has entered. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-parent'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'last_affected': '7.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14910'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/cve-2019-14910'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14910'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}] | {'cwe_ids': ['CWE-278', 'CWE-295'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T21:50:47Z', 'nvd_published_at': '2019-12-05T15:15:00Z'} |
1.4.0 | GHSA-fwhr-g5r4-xgxf | 2023-07-26T23:10:12Z | 2022-05-17T00:28:41Z | null | ['CVE-2017-12849'] | Silverstripe CMS User Enumeration | Response discrepancy in the login and password reset forms in SilverStripe CMS before 3.5.5 and 3.6.x before 3.6.1 allows remote attackers to enumerate users via timing attacks. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.6'}, {'fixed': '3.6.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12849'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/ss-2017-005'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T23:10:12Z', 'nvd_published_at': '2017-10-12T15:29:00Z'} |
1.4.0 | GHSA-vq7p-f4fv-rr5x | 2022-12-12T21:29:46Z | 2022-05-14T03:23:45Z | null | ['CVE-2018-1000151'] | Jenkins vSphere Plugin disables SSL/TLS certificate validation by default | A man in the middle vulnerability exists in Jenkins vSphere Plugin 2.16 and older in VSphere.java that disables SSL/TLS certificate validation by default. vSphere Plugin 2.17 now has SSL/TLS certificate validation enabled by default. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:vsphere-cloud'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.17'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.16'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000151'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/vsphere-cloud-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-03-26/#SECURITY-504'}] | {'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T21:29:46Z', 'nvd_published_at': '2018-04-05T13:29:00Z'} |
1.4.0 | GHSA-fj9v-g8fw-vxmf | 2022-09-08T14:18:32Z | 2022-05-17T00:00:33Z | null | ['CVE-2021-23265'] | Improper Privilege Management in craftercms | A logged-in and authenticated user with a Reviewer Role may lock a content item. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.craftercms:craftercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.18'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23265'}, {'type': 'WEB', 'url': 'https://docs.craftercms.org/en/3.1/security/advisory.html#cv-2022051601'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftercms/craftercms'}] | {'cwe_ids': ['CWE-269'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-02T14:21:27Z', 'nvd_published_at': '2022-05-16T17:15:00Z'} |
1.4.0 | GHSA-m4wh-848j-9w2r | 2022-10-07T21:52:28Z | 2022-05-24T17:01:59Z | null | ['CVE-2019-14825'] | Katello cleartext password storage issue | A cleartext password storage issue was discovered in Katello, versions 3.x.x.x before katello 3.12.2. Registry credentials used during container image discovery were inadvertently logged without being masked. This flaw could expose the registry credentials to other privileged users. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'katello'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0.0'}, {'fixed': '3.12.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14825'}, {'type': 'WEB', 'url': 'https://github.com/Katello/katello/pull/8244'}, {'type': 'WEB', 'url': 'https://github.com/Katello/katello/pull/8253'}, {'type': 'WEB', 'url': 'https://github.com/Katello/katello/commit/332484232b66b7907a8104a19ea97... | {'cwe_ids': ['CWE-312'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-10-07T21:52:28Z', 'nvd_published_at': '2019-11-25T16:15:00Z'} |
1.4.0 | GHSA-cwpm-f78v-7m5c | 2022-05-24T22:10:51Z | 2022-05-24T22:10:51Z | null | ['CVE-2022-29202'] | Denial of service in `tf.ragged.constant` due to lack of validation | ### Impact
The implementation of [`tf.ragged.constant`](https://github.com/tensorflow/tensorflow/blob/f3b9bf4c3c0597563b289c0512e98d4ce81f886e/tensorflow/python/ops/ragged/ragged_factory_ops.py#L146-L239) does not fully validate the input arguments. This results in a denial of service by consuming all available memory:... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cwpm-f78v-7m5c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29202'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/issues/55199'}, {'type': 'WEB', 'url': 'https://github.com/tensorf... | {'cwe_ids': ['CWE-1284', 'CWE-20', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:10:51Z', 'nvd_published_at': '2022-05-20T23:15:00Z'} |
1.4.0 | GHSA-2ch8-f849-pjg3 | 2023-08-16T23:06:35Z | 2022-05-17T03:49:34Z | null | ['CVE-2014-4301'] | Eugene Pankov Ajenti Cross-site scripting Vulnerabilities | Multiple cross-site scripting (XSS) vulnerabilities in the `respond_error` function in `routing.py` in Eugene Pankov Ajenti before 1.2.21.7 allow remote attackers to inject arbitrary web script or HTML via the `PATH_INFO` to (1) `resources.js` or (2) resources.css in `ajenti:static/`, related to the traceback page. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'ajenti'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.21.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-4301'}, {'type': 'WEB', 'url': 'https://github.com/Eugeny/ajenti/commit/d3fc5eb142ff16d55d158afb050af18d5ff09120'}, {'type': 'PACKAGE', 'url': 'https://github.com/Eugeny/ajenti'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20171119051123/h... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T23:06:35Z', 'nvd_published_at': '2014-06-18T14:55:00Z'} |
1.4.0 | GHSA-3q28-xfw3-2q35 | 2023-07-31T21:56:25Z | 2022-05-17T02:37:29Z | null | ['CVE-2016-5732'] | phpMyAdmin XSS Vulnerability | Multiple cross-site scripting (XSS) vulnerabilities in the partition-range implementation in `templates/table/structure/display_partitions.phtml` in the table-structure page in phpMyAdmin 4.6.x before 4.6.3 allow remote attackers to inject arbitrary web script or HTML via crafted table parameters. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.6'}, {'fixed': '4.6.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-5732'}, {'type': 'WEB', 'url': 'https://github.com/phpmyadmin/phpmyadmin/commit/0815af37f483f329f0c0565d68821fea9c47b5f5'}, {'type': 'WEB', 'url': 'https://github.com/phpmyadmin/phpmyadmin/commit/792cd1262f012b9b13639519d414f2acaeb5e972'}, {'type':... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T21:56:25Z', 'nvd_published_at': '2016-07-03T01:59:00Z'} |
1.4.0 | GHSA-pw8r-x2qm-3h5m | 2023-08-16T09:30:38Z | 2022-05-14T01:57:01Z | null | ['CVE-2013-2135'] | Arbitrary code execution in Apache Struts 2 | Apache Struts 2 before 2.3.14.3 allows remote attackers to execute arbitrary OGNL code via a request with a crafted value that contains both "${}" and "%{}" sequences, which causes the OGNL code to be evaluated twice. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.14.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2135'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/WW/S2-015'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/struts'}, {'type': 'WEB', 'url': 'http://struts.apache.org/development/2.x/docs/s2-015.html'}, {'type': '... | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T20:39:47Z', 'nvd_published_at': '2013-07-16T18:55:00Z'} |
1.4.0 | GHSA-9jcv-v4jp-w3cq | 2022-11-02T00:41:40Z | 2022-05-14T01:04:36Z | null | ['CVE-2018-1000170'] | Cross-site Scripting in Jenkins Core | A cross-site scripting vulnerability exists in Jenkins 2.115 and older, LTS 2.107.1 and older, in confirmationList.jelly and stopButton.jelly that allows attackers with Job/Configure and/or Job/Create permission to create an item name containing JavaScript that would be executed in another user's browser when that othe... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.115'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000170'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-04-11/#SECURITY-759'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-02T00:41:40Z', 'nvd_published_at': '2018-04-16T09:58:00Z'} |
1.4.0 | GHSA-86hp-xrhj-fhpq | 2023-07-14T22:45:09Z | 2022-05-24T22:00:13Z | null | ['CVE-2019-12747'] | Typo3 Vulnerable to Insecure Deserialization | TYPO3 8.x through 8.7.26 and 9.x through 9.5.7 allows Deserialization of Untrusted Data. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0'}, {'fixed': '8.7.27'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.7.26'}}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'E... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12747'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3-CMS/core'}, {'type': 'WEB', 'url': 'https://typo3.org/cms/release-news/typo3-8-release-notes/'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2019-020/'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-14T22:45:09Z', 'nvd_published_at': '2019-07-09T15:15:00Z'} |
1.4.0 | GHSA-hw4g-fhcp-x5mq | 2022-07-08T18:48:45Z | 2022-05-17T05:47:39Z | null | ['CVE-2010-3494'] | Concurrent Execution using Shared Resource with Improper Synchronization in pyftpdlib | Race condition in the FTPHandler class in ftpserver.py in pyftpdlib before 0.5.2 allows remote attackers to cause a denial of service (daemon outage) by establishing and then immediately closing a TCP connection, leading to the accept function having an unexpected value of None for the address, or an ECONNABORTED, EAGA... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'pyftpdlib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-3494'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/zodb/+bug/135108'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hw4g-fhcp-x5mq'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/pyftp... | {'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T18:48:45Z', 'nvd_published_at': '2010-10-19T20:00:00Z'} |
1.4.0 | GHSA-vpm6-h53m-x2xf | 2023-08-29T21:31:20Z | 2022-05-17T04:56:41Z | null | ['CVE-2012-2153'] | Drupal improper access restrictions | Drupal 7.x before 7.14 does not properly restrict access to nodes in a list when using a "contributed node access module," which allows remote authenticated users with the "Access the content overview page" permission to read all published nodes by accessing the admin/content page. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'drupal/drupal'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0'}, {'fixed': '7.14'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-2153'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20150523060428/http://www.mandriva.com/en/support/security/advisories/advisory/MDVSA-2013:074/?name=MDVSA-2013:074'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200229101926/htt... | {'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T21:31:20Z', 'nvd_published_at': '2012-10-01T00:55:00Z'} |
1.4.0 | GHSA-gg36-9346-9qx9 | 2023-08-29T18:15:55Z | 2022-05-17T04:58:08Z | null | ['CVE-2013-3239'] | phpMyAdmin Remote Code Execution | phpMyAdmin 3.5.x before 3.5.8 and 4.x before 4.0.0-rc3, when a SaveDir directory is configured, allows remote authenticated users to execute arbitrary code by using a double extension in the filename of an export file, leading to interpretation of this file as an executable file by the Apache HTTP Server, as demonstrat... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5.0'}, {'fixed': '3.5.8.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-3239'}, {'type': 'WEB', 'url': 'https://github.com/phpmyadmin/phpmyadmin/commit/1f6bc0b707002e26cab216b9e57b4d5de764de48'}, {'type': 'WEB', 'url': 'https://github.com/phpmyadmin/phpmyadmin/commit/d3fafdfba0807068196655e9b6d16c5d1d3ccf8a'}, {'type':... | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T18:15:55Z', 'nvd_published_at': '2013-04-26T03:34:00Z'} |
1.4.0 | GHSA-fvwh-wv43-8qj5 | 2022-12-29T01:34:30Z | 2022-05-24T17:28:25Z | null | ['CVE-2020-2257'] | Stored XSS vulnerability in Validating String Parameter Plugin | Validating String Parameter Plugin 2.4 and earlier does not escape regular expressions in tooltips. Additionally, Validating String Parameter Plugin 2.4 does not escape parameter names and parameter descriptions.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Config... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:validating-string-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.4'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2257'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/validating-string-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1935'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lis... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-29T01:34:30Z', 'nvd_published_at': '2020-09-16T14:15:00Z'} |
1.4.0 | GHSA-gv86-43rv-79m2 | 2023-03-10T02:33:26Z | 2022-05-14T01:01:09Z | null | ['CVE-2018-1000077'] | RubyGems Improper Input Validation vulnerability | RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Improper Input Validation vulnerability in ruby gems specification homepage attribute that can result in a malicious g... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rubygems-update'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jruby:jruby-stdlib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.1.16.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000077'}, {'type': 'WEB', 'url': 'https://github.com/jruby/jruby/commit/0b06b48ab4432237ce5fc1bef47f2c6bcf7843f7'}, {'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems/commit/5971b486d4dbb2bad5d3445b3801c456eb0ce183'}, {'type': 'WEB', 'ur... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-10T02:33:26Z', 'nvd_published_at': '2018-03-13T15:29:00Z'} |
1.4.0 | GHSA-jv5x-p843-g4qr | 2023-07-21T17:56:16Z | 2022-05-13T01:20:42Z | null | ['CVE-2018-8229'] | ChakraCore RCE Vulnerability | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8227. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8229'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/9b270c55bfea2fbefc9482d3414c4b4b395cad10'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8229'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-843'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T17:56:16Z', 'nvd_published_at': '2018-06-14T12:29:00Z'} |
1.4.0 | GHSA-322x-jv5h-cvjh | 2022-12-06T21:53:17Z | 2022-05-13T01:18:44Z | null | ['CVE-2018-1000149'] | Jenkins Ansible Plugin man in the middle vulnerability | A man in the middle vulnerability exists in Jenkins Ansible Plugin 0.8 and older in `AbstractAnsibleInvocation.java`, `AnsibleAdHocCommandBuilder.java`, `AnsibleAdHocCommandInvocationTest.java`, `AnsibleContext.java`, `AnsibleJobDslExtension.java`, `AnsiblePlaybookBuilder.java`, `AnsiblePlaybookStep.java` that disables... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.8'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000149'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-03-26/#SECURITY-630'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T21:53:17Z', 'nvd_published_at': '2018-04-05T13:29:00Z'} |
1.4.0 | GHSA-x869-784m-jmj2 | 2022-11-01T23:35:47Z | 2022-05-13T01:47:05Z | null | ['CVE-2017-7687'] | Denial of service in Apache Mesos | When handling a decoding failure for a malformed URL path of an HTTP request, libprocess in Apache Mesos might crash because the code accidentally calls inappropriate function. A malicious actor can therefore cause a denial of service of Mesos masters rendering the Mesos-controlled cluster inoperable. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.mesos:mesos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.mesos:mesos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.2'}]}]... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7687'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2c9ed2b07c2b2831a11d21db3cf8408a71fcf2c300d73ca01bad89df@%3Cdev.mesos.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/101027'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T23:35:47Z', 'nvd_published_at': '2017-09-29T01:34:00Z'} |
1.4.0 | GHSA-r5f2-4wf4-cv66 | 2023-02-14T00:28:01Z | 2022-05-24T16:55:44Z | null | ['CVE-2019-16173'] | Cross-site Scripting in LimeSurvey | LimeSurvey before v3.17.14 allows reflected XSS for escalating privileges from a low-privileged account to, for example, SuperAdmin. This occurs in application/core/Survey_Common_Action.php, | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'limesurvey/limesurvey'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.17.14'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16173'}, {'type': 'WEB', 'url': 'https://github.com/LimeSurvey/LimeSurvey/commit/f1c1ad2d24eb262363511fcca2e96ce737064006'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Sep/27'}, {'type': 'WEB', 'url': 'https://www.limesurvey.org/lime... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T00:28:01Z', 'nvd_published_at': '2019-09-09T19:15:00Z'} |
1.4.0 | GHSA-v5rq-w2xm-7g5f | 2022-06-27T16:09:55Z | 2022-05-13T01:22:02Z | null | ['CVE-2019-2435'] | Improper Access Control in MySQL Connector Python | Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/Python). Supported versions that are affected are 8.0.13 and prior and 2.1.8 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via TLS to compromise MySQL Connectors. Successful attacks... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'mysql-connector-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.0.19'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.0.13'}}, {'package': {'ecosystem': 'PyPI', 'name': 'mysql-connector-python'}, 'ranges': [{'t... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-2435'}, {'type': 'PACKAGE', 'url': 'https://github.com/mysql/mysql-connector-python'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190118-0002/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/... | {'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-27T16:09:55Z', 'nvd_published_at': '2019-01-16T19:30:00Z'} |
1.4.0 | GHSA-rxg9-xrhp-64gj | 2022-10-25T17:35:53Z | 2022-05-24T17:43:19Z | null | ['CVE-2021-24112'] | .NET Core Remote Code Execution Vulnerability | A remote code execution vulnerability exists when parsing certain types of graphics files. This vulnerability only exists on systems running on MacOS or Linux. This CVE ID is unique from CVE-2021-26701. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'System.Drawing.Common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.7.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Drawing.Common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.3'}]... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-24112'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/176'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24112'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T17:35:53Z', 'nvd_published_at': '2021-02-25T23:15:00Z'} |
1.4.0 | GHSA-rc94-7v55-wmg6 | 2023-07-26T20:38:29Z | 2022-05-14T02:01:19Z | null | ['CVE-2017-15063'] | Subrion CMS CSRF Vulnerability | There are CSRF vulnerabilities in Subrion CMS 4.1.x through 4.1.5, and before 4.2.0, because of a logic error. Although there is functionality to detect CSRF, it is called too late in the ia.core.php code, allowing (for example) an attack against the query parameter to panel/database. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'intelliants/subrion'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1'}, {'fixed': '4.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15063'}, {'type': 'WEB', 'url': 'https://github.com/intelliants/subrion/issues/547'}, {'type': 'WEB', 'url': 'https://github.com/intelliants/subrion/issues/570'}, {'type': 'WEB', 'url': 'https://github.com/intelliants/subrion/commit/5fdf03af1a7d89c... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T20:38:29Z', 'nvd_published_at': '2017-10-06T07:29:00Z'} |
1.4.0 | GHSA-397g-4jpj-44xg | 2023-07-07T18:14:15Z | 2022-05-13T01:28:45Z | null | ['CVE-2016-4879'] | CSRF in baserCMS 3.0.10 and earlier | Cross-site request forgery (CSRF) vulnerability in baserCMS plugin Mail version 3.0.10 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'baserproject/basercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-4879'}, {'type': 'WEB', 'url': 'https://jvn.jp/en/jp/JVN92765814/index.html'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210308130052/http://www.securityfocus.com/bid/93217'}, {'type': 'WEB', 'url': 'http://basercms.net/security/JVN9276... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T18:14:15Z', 'nvd_published_at': '2017-05-12T18:29:00Z'} |
1.4.0 | GHSA-775w-gx3f-4j4f | 2023-09-26T19:28:08Z | 2022-05-24T17:00:29Z | null | ['CVE-2019-8156'] | Magento 2 Community Edition SSRF vulnerability | A server-side request forgery (SSRF) vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated user with admin privileges to modify store configurations can manipulate the connector api endpoint to enable remote code execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8156'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051105/https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}] | {'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T19:59:19Z', 'nvd_published_at': '2019-11-06T01:15:00Z'} |
1.4.0 | GHSA-gx69-6cp4-hxrj | 2023-03-08T20:17:23Z | 2022-05-13T01:18:44Z | null | ['CVE-2018-1000073'] | RubyGems Link Following vulnerability | RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Directory Traversal vulnerability in `install_location` function of `package.rb` that can result in path traversal whe... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rubygems-update'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jruby:jruby-stdlib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.1.16.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000073'}, {'type': 'WEB', 'url': 'https://github.com/jruby/jruby/commit/0b06b48ab4432237ce5fc1bef47f2c6bcf7843f7'}, {'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems/commit/1b931fc03b819b9a0214be3eaca844ef534175e2'}, {'type': 'WEB', 'ur... | {'cwe_ids': ['CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-08T20:17:23Z', 'nvd_published_at': '2018-03-13T15:29:00Z'} |
1.4.0 | GHSA-3x3m-p2wx-g7cw | 2023-07-07T17:22:21Z | 2022-05-14T01:48:04Z | null | ['CVE-2018-19458'] | Unauthenticated File Read in PHP Proxy | In PHP Proxy 3.0.3, any user can read files from the server without authentication due to an `index.php?q=file:///` LFI URI, a different vulnerability than CVE-2018-19246. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'athlon1600/php-proxy-app'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19458'}, {'type': 'WEB', 'url': 'https://pentest.com.tr/exploits/PHP-Proxy-3-0-3-Local-File-Inclusion.html'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/45780/'}] | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T17:22:21Z', 'nvd_published_at': '2018-11-22T20:29:00Z'} |
1.4.0 | GHSA-xr4v-28rm-pvgw | 2022-07-06T19:45:18Z | 2022-05-17T02:37:09Z | null | ['CVE-2016-6652'] | Improper Neutralization of Special Elements used in an SQL Command Pivotal Spring Data JPA | SQL injection vulnerability in Pivotal Spring Data JPA before 1.9.6 (Gosling SR6) and 1.10.x before 1.10.4 (Hopper SR4), when used with a repository that defines a String query using the @Query annotation, allows attackers to execute arbitrary JPQL commands via a sort instance with a function call. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.data:spring-data-jpa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.data:spring-data-jpa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduc... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6652'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-data-jpa/commit/b8e7fe'}, {'type': 'WEB', 'url': 'https://jira.spring.io/browse/DATAJPA-965'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2016-6652'}, {'type': '... | {'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:45:18Z', 'nvd_published_at': '2016-10-05T16:59:00Z'} |
1.4.0 | GHSA-qjq9-wx5j-jrg6 | 2023-07-26T22:09:51Z | 2022-05-14T03:50:13Z | null | ['CVE-2017-17971'] | Dolibarr ERP and CRM contain XSS Vulnerability | The test_sql_and_script_inject function in htdocs/main.inc.php in Dolibarr ERP/CRM 6.0.4 blocks some event attributes but neither onclick nor onscroll, which allows XSS. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.0.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-17971'}, {'type': 'WEB', 'url': 'https://github.com/Dolibarr/dolibarr/issues/8000'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T22:09:51Z', 'nvd_published_at': '2017-12-29T18:29:00Z'} |
1.4.0 | GHSA-qm4x-ch5w-gr62 | 2023-07-07T19:42:46Z | 2022-05-17T04:42:42Z | null | ['CVE-2014-2055'] | XXE in SabreDAV before 1.7.11 | SabreDAV before 1.7.11, as used in ownCloud Server before 5.0.15 and 6.0.x before 6.0.2, allows remote attackers to read arbitrary files, cause a denial of service, or possibly have other impact via an XML External Entity (XXE) attack. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'sabre/dav'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-2055'}, {'type': 'WEB', 'url': 'https://github.com/sabre-io/dav/issues/414'}, {'type': 'WEB', 'url': 'https://github.com/sabre-io/dav/commit/e3f46e0ecf83cf1d2ebf54908cde7b5ec170aa2c'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T19:42:46Z', 'nvd_published_at': '2014-06-04T14:55:00Z'} |
1.4.0 | GHSA-vpcv-78cp-whr3 | 2022-11-01T22:59:03Z | 2022-05-13T01:48:07Z | null | ['CVE-2017-9790'] | Use after free in Apache Mesos | When handling a libprocess message wrapped in an HTTP request, libprocess in Apache Mesos before 1.1.3, 1.2.x before 1.2.2, 1.3.x before 1.3.1, and 1.4.0-dev crashes if the request path is empty, because the parser assumes the request path always starts with '/'. A malicious actor can therefore cause a denial of servic... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.mesos:mesos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.mesos:mesos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.2'}]}]... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-9790'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/cc1e7a69ea78da0511f5b54b6be7aa6e3c78edad5aaff430e7de028b@%3Cdev.mesos.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/101023'}] | {'cwe_ids': ['CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T22:59:03Z', 'nvd_published_at': '2017-09-29T01:34:00Z'} |
1.4.0 | GHSA-gvjg-r9fv-7qx9 | 2023-02-08T18:12:35Z | 2022-05-17T03:44:52Z | null | ['CVE-2015-5286'] | OpenStack Image Service (Glance) allows remote authenticated users to bypass storage quota, cause denial of service | OpenStack Image Service (Glance) before 2014.2.4 (juno) and 2015.1.x before 2015.1.2 (kilo) allows remote authenticated users to bypass the storage quota and cause a denial of service (disk consumption) by deleting images that are being uploaded using a token that expires during the process. NOTE: this vulnerability e... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'glance'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2014.2.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'glance'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2015.1.0'}, {'fixed': '2015.1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5286'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2015:1897'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2015-5286'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/bugs/1498163'}, {'type': 'WEB', 'u... | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T18:12:35Z', 'nvd_published_at': '2015-10-26T17:59:00Z'} |
1.4.0 | GHSA-67fj-6w6m-w5j8 | 2022-05-25T22:34:15Z | 2022-05-25T22:34:15Z | null | ['CVE-2022-29249'] | Reversible One-Way Hash in io.github.javaezlib:JavaEZ | ### Impact
This weakness allows the force decryption of locked text by hackers. The issue is NOT critical for non-secure applications, however may be critical in a situation where the highest levels of security are required. This issue ONLY affects v1.6 and does not affect anything pre-1.6. Upgrading to 1.7 is advised.... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.github.javaezlib:JavaEZ'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6'}, {'fixed': '1.7'}]}], 'versions': ['1.6']}] | [{'type': 'WEB', 'url': 'https://github.com/JavaEZLib/JavaEZ/security/advisories/GHSA-67fj-6w6m-w5j8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29249'}, {'type': 'PACKAGE', 'url': 'https://github.com/JavaEZLib/JavaEZ'}, {'type': 'WEB', 'url': 'https://github.com/JavaEZLib/JavaEZ/releases/... | {'cwe_ids': ['CWE-326', 'CWE-327', 'CWE-328'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T22:34:15Z', 'nvd_published_at': '2022-05-24T16:15:00Z'} |
1.4.0 | GHSA-595j-wpfg-23w4 | 2023-07-25T21:07:32Z | 2022-05-14T03:46:13Z | null | ['CVE-2018-1045'] | Moodle XSS Vulnerability | In Moodle 3.x, there is XSS via a calendar event name. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3'}, {'fixed': '3.3.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.3'}}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSY... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1045'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=364384'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210124134120/http://www.securityfocus.com/bid/102755'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T21:07:32Z', 'nvd_published_at': '2018-01-22T08:29:00Z'} |
1.4.0 | GHSA-x5jm-rj37-5qh7 | 2022-06-01T20:12:13Z | 2022-05-13T01:00:55Z | null | ['CVE-2019-1003005'] | Sandbox Bypass in Script Security Plugin | A sandbox bypass vulnerability exists in Jenkins Script Security Plugin 1.50 and earlier in src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/SecureGroovyScript.java that allows attackers with Overall/Read permission to provide a Groovy script to an HTTP endpoint that can result in arbitrary code execut... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:script-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.51'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1003005'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0739'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/script-security-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-01-28/#SECURI... | {'cwe_ids': ['CWE-693'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-01T20:12:13Z', 'nvd_published_at': '2019-02-06T16:29:00Z'} |
1.4.0 | GHSA-qcf3-9vmh-xw4r | 2022-06-30T15:17:37Z | 2022-05-13T01:30:44Z | null | ['CVE-2018-1002201'] | Improper Limitation of a Pathname to a Restricted Directory in zt-zip | zt-zip before 1.13 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in a Zip archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip-Slip'. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.zeroturnaround:zt-zip'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1002201'}, {'type': 'WEB', 'url': 'https://github.com/zeroturnaround/zt-zip/commit/759b72f33bc8f4d69f84f09fcb7f010ad45d6fff'}, {'type': 'WEB', 'url': 'https://github.com/snyk/zip-slip-vulnerability'}, {'type': 'WEB', 'url': 'https://github.com/zero... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-30T15:17:37Z', 'nvd_published_at': '2018-07-25T17:29:00Z'} |
1.4.0 | GHSA-448h-7hmp-99fg | 2023-07-27T20:10:25Z | 2022-05-17T02:35:05Z | null | ['CVE-2017-0223'] | ChakraCore RCE Vulnerability | A remote code execution vulnerability exists in Microsoft Chakra Core in the way JavaScript engines render when handling objects in memory. aka "Scripting Engine Memory Corruption Vulnerability". This vulnerability is unique from CVE-2017-0252. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0223'}, {'type': 'WEB', 'url': 'https://github.com/Microsoft/ChakraCore/pull/2959'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/2959'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/f74773f4520... | {'cwe_ids': ['CWE-119'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-27T20:10:25Z', 'nvd_published_at': '2017-05-15T17:29:00Z'} |
1.4.0 | GHSA-v5m6-2m78-4vr2 | 2023-07-17T21:46:13Z | 2022-05-24T16:52:24Z | null | ['CVE-2019-7877'] | Magento 2 Community Edition XSS Vulnerability | A stored cross-site scripting vulnerability exists in the admin panel of Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. An authenticated user with privileges to manage orders can inject malicious javascript. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixe... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7877'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051916/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-23'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T21:46:13Z', 'nvd_published_at': '2019-08-02T22:15:00Z'} |
1.4.0 | GHSA-v646-rx6w-r3qq | 2022-07-06T19:44:02Z | 2022-05-13T01:23:38Z | null | ['CVE-2016-5388'] | Improper Access Control in Apache Tomcat | Apache Tomcat 7.x through 7.0.70 and 8.x through 8.5.4, when the CGI Servlet is enabled, follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat-catalina'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.72'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat-catalina'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-5388'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:1624'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:1635'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:1636'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:44:02Z', 'nvd_published_at': '2016-07-19T02:00:00Z'} |
1.4.0 | GHSA-gf8w-6hcm-rh3j | 2022-12-22T13:40:48Z | 2022-05-24T17:33:08Z | null | ['CVE-2020-2313'] | Missing permission checks in Jenkins Azure Key Vault Plugin allow enumerating credentials IDs | Azure Key Vault Plugin 2.0 and earlier does not perform permission checks in several HTTP endpoints.
This allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. Those can be used as part of an attack to capture the credentials using another vulnerability.
An enume... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:azure-keyvault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2313'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/azure-keyvault-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-11-04/#SECURITY-2110'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T13:40:48Z', 'nvd_published_at': '2020-11-04T15:15:00Z'} |
1.4.0 | GHSA-vpfj-5gg5-fvfm | 2023-01-05T20:21:53Z | 2022-05-24T17:10:28Z | null | ['CVE-2020-2138'] | XXE vulnerability in Jenkins Cobertura Plugin | Cobertura Plugin 1.15 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
This allows a user able to control the input files for the 'Publish Cobertura Coverage Report' post-build step to have Jenkins parse a crafted file that uses external entities for extraction of secrets fro... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:cobertura'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.15'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2138'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/cobertura-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-03-09/#SECURITY-1700'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/0... | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-05T20:21:53Z', 'nvd_published_at': '2020-03-09T16:15:00Z'} |
1.4.0 | GHSA-m6w9-8cxc-jff7 | 2023-07-24T21:45:46Z | 2022-05-14T01:17:48Z | null | ['CVE-2018-14486'] | DNN XSS Vulnerability | DNN (formerly DotNetNuke) 9.1.1 allows cross-site scripting (XSS) via XML. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'DotNetNuke.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '9.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14486'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/151304/DNN-9.1-XML-Related-Cross-Site-Scripting.html'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-24T21:45:46Z', 'nvd_published_at': '2019-03-21T16:00:00Z'} |
1.4.0 | GHSA-jwvr-vv7p-gpwq | 2022-05-02T19:39:35Z | 2022-05-02T19:39:35Z | null | ['CVE-2021-36784'] | Privilege escalation for users with create/update permissions in Global Roles in Rancher | ### Impact
This vulnerability affects customers who utilize non-admin users that are able to create or edit [Global Roles](https://rancher.com/docs/rancher/v2.6/en/admin-settings/rbac/). The most common use case for this scenario is the [`restricted-admin`](https://rancher.com/docs/rancher/v2.6/en/admin-settings/rbac/g... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/rancher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/rancher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.... | [{'type': 'WEB', 'url': 'https://github.com/rancher/rancher/security/advisories/GHSA-jwvr-vv7p-gpwq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36784'}, {'type': 'WEB', 'url': 'https://bugzilla.suse.com/show_bug.cgi?id=1193991'}, {'type': 'WEB', 'url': 'https://github.com/rancher/rancher/r... | {'cwe_ids': ['CWE-269', 'CWE-285'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-02T19:39:35Z', 'nvd_published_at': '2022-05-02T12:16:00Z'} |
1.4.0 | GHSA-hh26-6xwr-ggv7 | 2022-05-25T22:36:56Z | 2022-05-13T00:00:28Z | null | ['CVE-2022-22970'] | Denial of service in Spring Framework | In spring framework versions prior to 5.3.20+ , 5.2.22+ and old unsupported versions, applications that handle file uploads are vulnerable to DoS attack if they rely on data binding to set a MultipartFile or javax.servlet.Part to a field in a model object. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.22.RELEASE'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.21.RELEASE'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframewo... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22970'}, {'type': 'PACKAGE', 'url': 'https://github.com/spring-projects/spring-framework'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220616-0006/'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2022-22970... | {'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T22:36:56Z', 'nvd_published_at': '2022-05-12T20:15:00Z'} |
1.4.0 | GHSA-346g-jrx9-jgf4 | 2022-12-06T21:31:41Z | 2022-05-24T16:59:36Z | null | ['CVE-2019-10466'] | Jenkins 360 FireLine Plugin vulnerable to XML External Entity Reference | An XML external entities (XXE) vulnerability in Jenkins 360 FireLine Plugin allows attackers with Overall/Read access to have Jenkins resolve external entities, resulting in the extraction of secrets from the Jenkins agent, server-side request forgery, or denial-of-service attacks.
## Note: Jenkins has suspended distr... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.plugin:fireline'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.7.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10466'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/fireline-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-10-23/#SECURITY-822'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/10... | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T21:31:41Z', 'nvd_published_at': '2019-10-23T13:15:00Z'} |
1.4.0 | GHSA-4r39-f4rh-j6q8 | 2022-11-01T22:48:07Z | 2022-05-24T17:03:46Z | null | ['CVE-2019-16552'] | Missing permission check in Jenkins Gerrit Trigger Plugin | A missing permission check in Jenkins Gerrit Trigger Plugin 2.30.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified HTTP URL or SSH server using attacker-specified credentials, or determine the existence of a file with a given path on the Jenkins master. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.sonyericsson.hudson.plugins.gerrit:gerrit-trigger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.30.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16552'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1527'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/12/17/1'}] | {'cwe_ids': ['CWE-285'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T22:48:07Z', 'nvd_published_at': '2019-12-17T15:15:00Z'} |
1.4.0 | GHSA-4vwq-x64q-j4cj | 2022-07-06T20:10:16Z | 2022-05-14T02:04:49Z | null | ['CVE-2015-6938'] | Improper Neutralization of Input During Web Page Generation in Jupyter Notebook | Cross-site scripting (XSS) vulnerability in the file browser in notebook/notebookapp.py in IPython Notebook before 3.2.2 and Jupyter Notebook 4.0.x before 4.0.5 allows remote attackers to inject arbitrary web script or HTML via a folder name. NOTE: this was originally reported as a cross-site request forgery (CSRF) vu... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'notebook'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.0.4'}}, {'package': {'ecosystem': 'PyPI', 'name': 'ipython'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-6938'}, {'type': 'WEB', 'url': 'https://github.com/ipython/ipython/commit/3ab41641cf6fce3860c73d5cf4645aa12e1e5892'}, {'type': 'WEB', 'url': 'https://github.com/jupyter/notebook/commit/35f32dd2da804d108a3a3585b69ec3295b2677ed'}, {'type': 'WEB', 'ur... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:10:16Z', 'nvd_published_at': '2015-09-21T19:59:00Z'} |
1.4.0 | GHSA-gmff-vcv6-mmfr | 2023-07-25T18:51:53Z | 2022-05-14T02:36:48Z | null | ['CVE-2018-14057'] | Pimcore CSRF Vulnerability | Pimcore before 5.3.0 allows remote attackers to conduct cross-site request forgery (CSRF) attacks by leveraging validation of the `X-pimcore-csrf-token` anti-CSRF token only in the "Settings > Users / Roles" function. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14057'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/45208/'}, {'type': 'WEB', 'url': 'https://www.sec-consult.com/en/blog/advisories/sql-injection-xss-csrf-vulnerabilities-in-pimcore-software/'}, {'type': 'WEB', 'url': 'http://pack... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T18:51:53Z', 'nvd_published_at': '2018-08-17T18:29:00Z'} |
1.4.0 | GHSA-f38p-mq64-h784 | 2022-07-06T19:53:45Z | 2022-05-14T02:46:14Z | null | ['CVE-2016-4974'] | Improper Input Validation in Apache Qpid AMQP 0-x JMS | Apache Qpid AMQP 0-x JMS client before 6.0.4 and JMS (AMQP 1.0) before 0.10.0 does not restrict the use of classes available on the classpath, which might allow remote authenticated users with permission to send messages to deserialize arbitrary objects and execute arbitrary code by leveraging a crafted serialized obje... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.qpid:qpid-jms-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-4974'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/QPIDJMS-188'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/137749/Apache-Qpid-Untrusted-Input-Deserialization.html'}, {'type': 'WEB', 'url': 'http://qpid.apache.... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:53:45Z', 'nvd_published_at': '2016-07-13T15:59:00Z'} |
1.4.0 | GHSA-f6vx-3fq6-hxm8 | 2022-12-20T17:40:04Z | 2022-05-24T17:13:39Z | null | ['CVE-2020-2175'] | Stored XSS vulnerability in Jenkins FitNesse Plugin | FitNesse Plugin 1.31 and earlier does not correctly escape report contents before showing them on the Jenkins UI.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by users able to control the XML input files processed by the plugin.
FitNesse Plugin 1.33 escapes content from XML input file... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:fitnesse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.33'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.31'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2175'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/fitnesse-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-04-07/#SECURITY-1801'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/04... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T17:40:04Z', 'nvd_published_at': '2020-04-07T13:15:00Z'} |
1.4.0 | GHSA-hcxf-rq72-h4rr | 2022-06-28T22:58:52Z | 2022-05-24T16:50:30Z | null | ['CVE-2019-10353'] | Cross-Site Request Forgery in Jenkins | CSRF tokens in Jenkins 2.185 and earlier, LTS 2.176.1 and earlier did not expire, thereby allowing attackers able to obtain them to bypass CSRF protection. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.176.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.176.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10353'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-07-17/#SECURITY-626'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T22:58:52Z', 'nvd_published_at': '2019-07-17T16:15:00Z'} |
1.4.0 | GHSA-hr8g-f6r6-mr22 | 2022-06-01T21:22:06Z | 2022-05-26T00:01:27Z | null | ['CVE-2022-30595'] | Buffer over-flow in Pillow | When reading a TGA file with RLE packets that cross scan lines, Pillow reads the information past the end of the first line without deducting that from the length of the remaining file data. This vulnerability was introduced in Pillow 9.1.0, and can cause a heap buffer overflow.
Opening an image with a zero or negativ... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.1.0'}, {'fixed': '9.1.1'}]}], 'versions': ['9.1.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30595'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/blob/main/src/libImaging/TgaRleDecode.c'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stab... | {'cwe_ids': ['CWE-120'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-01T21:22:06Z', 'nvd_published_at': '2022-05-25T12:15:00Z'} |
1.4.0 | GHSA-qp2q-6h9j-jg2r | 2022-05-23T21:18:25Z | 2022-05-05T00:00:15Z | null | ['CVE-2022-30241'] | Cross-site Scripting in jquery.json-viewer | The jquery.json-viewer library before version 1.5.0 for Node.js does not properly escape characters such as < in a JSON object, as demonstrated by a SCRIPT element. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'jquery.json-viewer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30241'}, {'type': 'WEB', 'url': 'https://github.com/abodelot/jquery.json-viewer/pull/26'}, {'type': 'PACKAGE', 'url': 'https://github.com/abodelot/jquery.json-viewer'}, {'type': 'WEB', 'url': 'https://github.com/abodelot/jquery.json-viewer/releases... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-23T21:18:25Z', 'nvd_published_at': '2022-05-04T18:15:00Z'} |
1.4.0 | GHSA-xmcr-x5x3-gjfx | 2023-07-24T21:07:39Z | 2022-05-14T01:40:50Z | null | ['CVE-2018-1000826'] | Microweber XSS Vulnerability | Microweber version <= 1.0.7 contains a Cross Site Scripting (XSS) vulnerability in Admin login form template that can result in Execution of JavaScript code. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000826'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/issues/489'}, {'type': 'WEB', 'url': 'https://0dd.zone/2018/10/28/microweber-XSS/'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-24T21:07:39Z', 'nvd_published_at': '2018-12-20T15:29:00Z'} |
1.4.0 | GHSA-vjq3-x3f2-fvxq | 2022-05-25T19:25:29Z | 2022-05-14T00:01:07Z | null | ['CVE-2022-1715'] | Account takeover in facturascripts | Account Takeover in GitHub repository neorazorx/facturascripts prior to 2022.08 due to improper type casting. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'facturascripts/facturascripts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2022.08'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1715'}, {'type': 'WEB', 'url': 'https://github.com/neorazorx/facturascripts/commit/714bebf4c35e3eedda138f5ee912a8031bc8b1ab'}, {'type': 'PACKAGE', 'url': 'https://github.com/neorazorx/facturascripts'}, {'type': 'WEB', 'url': 'https://huntr.dev/boun... | {'cwe_ids': ['CWE-1125', 'CWE-522'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T19:25:29Z', 'nvd_published_at': '2022-05-13T17:15:00Z'} |
1.4.0 | GHSA-pvmg-xgmx-9mxh | 2022-05-25T19:29:51Z | 2022-05-07T00:00:49Z | null | ['CVE-2021-25745'] | Improper Input Validation in k8s.io/ingress-nginx | A security issue was discovered in ingress-nginx where a user that can create or update ingress objects can use the spec.rules[].http.paths[].path field of an Ingress object (in the networking.k8s.io or extensions API group) to obtain the credentials of the ingress-nginx controller. In the default configuration, that c... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'k8s.io/ingress-nginx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25745'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/ingress-nginx/issues/8502'}, {'type': 'PACKAGE', 'url': 'https://github.com/kubernetes/ingress-nginx'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/kubernetes-security-announce/... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T19:29:51Z', 'nvd_published_at': '2022-05-06T01:15:00Z'} |
1.4.0 | GHSA-4g82-3jcr-q52w | 2022-05-25T23:09:55Z | 2022-05-25T23:09:55Z | null | [] | Malware in ctx | The `ctx` hosted project on [PyPI](https://pypi.org/project/ctx/) was taken over via user account compromise and replaced with a malicious project which contained runtime code that collected the content of `os.environ.items()` when instantiating `Ctx` objects. The captured environment variables were sent as a base64 en... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'ctx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.4'}]}]}] | [{'type': 'PACKAGE', 'url': 'https://github.com/figlief/ctx'}, {'type': 'WEB', 'url': 'https://isc.sans.edu/forums/diary/ctx+Python+Library+Updated+with+Extra+Features/28678/'}, {'type': 'WEB', 'url': 'https://portswigger.net/daily-swig/malicious-python-library-ctx-removed-from-pypi-repo'}, {'type': 'WEB', 'url': 'http... | {'cwe_ids': ['CWE-912'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T23:09:55Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7gh2-8q93-87hp | 2023-07-19T22:52:00Z | 2022-05-13T01:02:57Z | null | ['CVE-2018-5387'] | Wizkunde SAMLBase SAML Bypass | Wizkunde SAMLBase may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'gogentooss/samlbase'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-5387'}, {'type': 'WEB', 'url': 'https://github.com/GoGentoOSS/SAMLBase/issues/3'}, {'type': 'WEB', 'url': 'https://github.com/GoGentoOSS/SAMLBase/commit/482cdf8c090e0f1179073034ebcb609ac7c3f5b3'}, {'type': 'WEB', 'url': 'https://duo.com/blog/duo-fi... | {'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T19:21:30Z', 'nvd_published_at': '2018-07-24T15:29:00Z'} |
1.4.0 | GHSA-682g-c99v-9r2g | 2023-03-03T22:44:06Z | 2022-05-24T16:52:45Z | null | ['CVE-2019-10371'] | Jenkins Gitlab Authentication Plugin vulnerable to Session Fixation | GitLab Authentication Plugin does not invalidate the previous session and create a new one upon successful login. This allows attackers able to control or obtain another user’s pre-login session ID to impersonate them.
As of publication of this advisory, there is no fix. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10371'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-08-07/#SECURITY-795'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/08/07/1'}] | {'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T22:44:06Z', 'nvd_published_at': '2019-08-07T15:15:00Z'} |
1.4.0 | GHSA-pm9x-4392-2c2p | 2023-03-09T00:38:35Z | 2022-05-13T01:38:26Z | null | ['CVE-2017-0901'] | RubyGems may allow a maliciously crafted gem to overwrite files | RubyGems versions 2.6.12 and earlier fail to validate specification names, allowing a maliciously crafted gem to potentially overwrite any file on the filesystem. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rubygems-update'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0901'}, {'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems/commit/ad5c0a53a86ca5b218c7976765c0365b91d22cb2'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/243156'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-20... | {'cwe_ids': ['CWE-20', 'CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-09T00:38:35Z', 'nvd_published_at': '2017-08-31T20:29:00Z'} |
1.4.0 | GHSA-7fmw-85qm-h22p | 2023-07-26T19:15:53Z | 2022-05-13T01:38:14Z | null | ['CVE-2017-12159'] | Keycloak CSRF Vulnerability | It was found that the cookie used for CSRF prevention in Keycloak was not unique to each session. An attacker could use this flaw to gain access to an authenticated user session, leading to possible information disclosure or further attacks. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12159'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2904'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2905'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2906'}, {'type': 'WEB'... | {'cwe_ids': ['CWE-613'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T19:15:53Z', 'nvd_published_at': '2017-10-26T17:29:00Z'} |
1.4.0 | GHSA-jf5f-h3wr-j666 | 2023-07-07T18:49:00Z | 2022-05-13T01:28:41Z | null | ['CVE-2018-5960'] | SQL Injection in Zenario 7.1-7.6 | Zenario v7.1 - v7.6 has SQL injection via the `Name` input field of organizer.php or admin_boxes.ajax.php in the `Categories - Edit` module. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'tribalsystems/zenario'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.1'}, {'last_affected': '7.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-5960'}, {'type': 'WEB', 'url': 'https://www.vulnerability-lab.com/get_content.php?id=2043'}] | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T18:49:00Z', 'nvd_published_at': '2018-01-22T01:29:00Z'} |
1.4.0 | GHSA-pmqq-7wfv-jfff | 2023-09-26T11:39:10Z | 2022-05-13T01:14:25Z | null | ['CVE-2016-5000'] | Apache POI's XLSX2CSV Example XML External Entity (XXE) Vulnerability | The XLSX2CSV example in Apache POI before 3.14 allows remote attackers to read arbitrary files via a crafted OpenXML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.poi:poi-examples'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.14'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.13'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-5000'}, {'type': 'WEB', 'url': 'https://lists.apache.org/list.html?user@poi.apache.org'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg219... | {'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:53:05Z', 'nvd_published_at': '2016-08-05T14:59:00Z'} |
1.4.0 | GHSA-wfj3-535m-p6fx | 2022-07-01T22:03:59Z | 2022-05-14T01:04:30Z | null | ['CVE-2017-1000391'] | Improper Input Validation in Jenkins | Jenkins versions 2.88 and earlier and 2.73.2 and earlier stores metadata related to 'people', which encompasses actual user accounts, as well as users appearing in SCM, in directories corresponding to the user ID on disk. These directories used the user ID for their name without additional escaping, potentially resulti... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.73.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.73.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000391'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenkins/commit/566a8ddb885f0bef9bc848e60455c0aabbf0c1d3'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2017-11-08/'}, {'type': 'WEB', 'url': 'http://www.securityfocus.... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T22:03:59Z', 'nvd_published_at': '2018-01-26T02:29:00Z'} |
1.4.0 | GHSA-rmmf-5xhh-gg27 | 2023-07-31T21:52:21Z | 2022-05-17T02:36:38Z | null | ['CVE-2016-9853'] | phpMyAdmin path disclosure | An issue was discovered in phpMyAdmin. By calling some scripts that are part of phpMyAdmin in an unexpected way, it is possible to trigger phpMyAdmin to display a PHP error message which contains the full path of the directory where phpMyAdmin is installed. During an execution timeout in the export functionality, the e... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.6'}, {'fixed': '4.6.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4'}, {'fixed': '4.4.... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-9853'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201701-32'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210127193655/http://www.securityfocus.com/bid/94527'}, {'type': 'WEB', 'url': 'https://www.phpmyadmin.net/security/P... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T21:52:21Z', 'nvd_published_at': '2016-12-11T02:59:00Z'} |
1.4.0 | GHSA-23x8-j7hm-5xwf | 2022-07-08T18:52:41Z | 2022-05-14T02:44:30Z | null | ['CVE-2010-2103'] | Improper Neutralization of Input During Web Page Generation in Apache Axis2 | Cross-site scripting (XSS) vulnerability in axis2-admin/axis2-admin/engagingglobally in the administration console in Apache Axis2/Java 1.4.1, 1.5.1, and possibly other versions, as used in SAP Business Objects 12, 3com IMC, and possibly other products, allows remote attackers to inject arbitrary web script or HTML via... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.axis2.wso2:axis2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.1'}, {'fixed': '1.6.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-2103'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/58790'}, {'type': 'WEB', 'url': 'https://kb.juniper.net/KB27373'}, {'type': 'WEB', 'url': 'http://osvdb.org/64844'}, {'type': 'WEB', 'url': 'http://spl0it.org/file... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T18:52:41Z', 'nvd_published_at': '2010-05-27T22:30:00Z'} |
1.4.0 | GHSA-65qg-f77j-cccf | 2023-07-25T21:20:03Z | 2022-05-14T03:10:52Z | null | ['CVE-2018-12290'] | Yii2-StateMachine extension for Yii2 XSS Vulnerability | The Yii2-StateMachine extension v2.x.x for Yii2 has XSS. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'ptheofan/yii2-statemachine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-12290'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20180624194633/http://www.iwantacve.cn/index.php/archives/40/'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T21:20:03Z', 'nvd_published_at': '2018-06-13T14:29:00Z'} |
1.4.0 | GHSA-cphv-7cxw-5hcc | 2022-12-15T17:35:15Z | 2022-05-24T19:03:11Z | null | ['CVE-2021-21657'] | XXE vulnerability in Jenkins Filesystem Trigger Plugin | Filesystem Trigger Plugin 0.40 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
This allows attackers with Job/Configure permission or otherwise able to control the contents of an XML file being polled for changes to have Jenkins parse a crafted XML document that uses externa... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:fstrigger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.41'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.40'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21657'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/fstrigger-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-05-25/#SECURITY-2339'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2... | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T17:35:15Z', 'nvd_published_at': '2021-05-25T17:15:00Z'} |
1.4.0 | GHSA-g323-fr93-4j3c | 2022-06-17T00:05:28Z | 2022-05-04T00:00:22Z | null | ['CVE-2022-1473'] | Resource leakage when decoding certificates and keys | The OPENSSL_LH_flush() function, which empties a hash table, contains a bug that breaks reuse of the memory occuppied by the removed hash table entries. This function is used when decoding certificates or keys. If a long lived process periodically decodes certificates or keys its memory usage will expand without bounds... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '300.0.0'}, {'fixed': '300.0.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1473'}, {'type': 'WEB', 'url': 'https://github.com/github/advisory-database/issues/405'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-953464.pdf'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.gi... | {'cwe_ids': ['CWE-404', 'CWE-459'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:05:28Z', 'nvd_published_at': '2022-05-03T16:15:00Z'} |
1.4.0 | GHSA-8v4h-j42h-wfhc | 2022-07-01T17:28:45Z | 2022-05-13T01:36:43Z | null | ['CVE-2017-3203'] | Deserialization of Untrusted Data in Spring-flex | The Java implementations of AMF3 deserializers in Pivotal/Spring Spring-flex derive class instances from java.io.Externalizable rather than the AMF3 specification's recommendation of flash.utils.IExternalizable. A remote attacker with the ability to spoof or control an RMI server connection may be able to send serializ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.flex:spring-flex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.2.RELEASE'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-3203'}, {'type': 'WEB', 'url': 'https://codewhitesec.blogspot.com/2017/04/amf.html'}, {'type': 'WEB', 'url': 'https://www.kb.cert.org/vuls/id/307983'}, {'type': 'WEB', 'url': 'http://www.securityweek.com/flaws-java-amf-libraries-allow-remote-code-e... | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T17:28:45Z', 'nvd_published_at': '2018-06-11T17:29:00Z'} |
1.4.0 | GHSA-gv2w-88hx-8m9r | 2022-06-24T01:25:23Z | 2022-05-24T17:16:46Z | null | ['CVE-2020-1745'] | Improper Authorization in Undertoe | A file inclusion vulnerability was found in the AJP connector enabled with a default AJP configuration port of 8009 in Undertow version 2.0.29.Final and before and was fixed in 2.0.30.Final. A remote, unauthenticated attacker could exploit this vulnerability to read web application files from a vulnerable server. In in... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.30'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.29'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1745'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1745'}, {'type': 'WEB', 'url': 'https://meterpreter.org/cve-2020-1938-apache-tomcat-ajp-connector-remote-code-execution-vulnerability-alert/'}, {'type': 'WEB', 'ur... | {'cwe_ids': ['CWE-285'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T01:25:23Z', 'nvd_published_at': '2020-04-28T15:15:00Z'} |
1.4.0 | GHSA-9cjh-qmvx-436c | 2023-09-18T23:52:44Z | 2022-05-01T02:20:38Z | null | ['CVE-2005-3745'] | Apache Struts Cross-site scripting Vulnerability | Cross-site scripting (XSS) vulnerability in Apache Struts 1.2.7, and possibly other versions allows remote attackers to inject arbitrary web script or HTML via the query string, which is not properly quoted or filtered when the request handler generates an error message. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2005-3745'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r02c2d634fa74209d941c90f9a4cd36a6f12366ca65f9b90446ff2de3@%3Cissues.struts.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf482c101a88445d73cc2e89db... | {'cwe_ids': ['CWE-80'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T23:52:44Z', 'nvd_published_at': '2005-11-22T11:03:00Z'} |
1.4.0 | GHSA-2263-jwgm-wv97 | 2023-07-25T19:26:16Z | 2022-05-14T02:19:17Z | null | ['CVE-2018-16342'] | Showdoc XSS Vulnerability | ShowDoc v1.8.0 has XSS via a new page. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.8.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16342'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/issues/325'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T19:26:16Z', 'nvd_published_at': '2018-09-02T18:29:00Z'} |
1.4.0 | GHSA-77mv-p94f-qcq4 | 2023-09-25T19:11:50Z | 2022-05-24T16:52:28Z | null | ['CVE-2019-7934'] | Magento 2 Community Edition XSS Vulnerability | A stored cross-site scripting vulnerability exists in the admin panel of Magento Open Source prior to 1.9.4.2, and Magento Commerce prior to 1.14.4.2, Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This could be exploited by an authenticated user with privileges to edit newsletter ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7934'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051916/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-23'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T18:33:45Z', 'nvd_published_at': '2019-08-02T22:15:00Z'} |
1.4.0 | GHSA-228f-g3h7-3fj3 | 2023-05-04T21:16:48Z | 2022-05-17T04:54:56Z | null | ['CVE-2012-2125'] | RubyGems HTTPS to HTTP redirect | RubyGems before 1.8.23 can redirect HTTPS connections to HTTP, which makes it easier for remote attackers to observe or modify a gem during installation via a man-in-the-middle attack. | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rubygems-update'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.23'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-2125'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=814718'}, {'type': 'PACKAGE', 'url': 'https://github.com/rubygems/rubygems'}, {'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems/blob/1.8/History.txt'}, {'type': ... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-04T21:16:48Z', 'nvd_published_at': '2013-10-01T17:55:00Z'} |
1.4.0 | GHSA-7jw3-5q4w-89qg | 2022-07-06T20:02:51Z | 2022-05-13T01:25:20Z | null | ['CVE-2016-1181'] | Improper Input Validation in Apache Struts | ActionServlet.java in Apache Struts 1 1.x through 1.3.10 mishandles multithreaded access to an ActionForm instance, which allows remote attackers to execute arbitrary code or cause a denial of service (unexpected memory access) via a multipart request, a related issue to CVE-2015-0899. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1181'}, {'type': 'WEB', 'url': 'https://github.com/kawasima/struts1-forever/commit/eda3a79907ed8fcb0387a0496d0cb14332f250e8'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1343538'}, {'type': 'WEB', 'url': 'https://security-t... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:02:51Z', 'nvd_published_at': '2016-07-04T22:59:00Z'} |
1.4.0 | GHSA-rv8h-p43r-4x5r | 2023-08-29T18:04:35Z | 2022-05-17T03:46:28Z | null | ['CVE-2013-4347'] | SimpleGeo python-oauth2 vulnerable to the use of Insufficiently Random Values to generate nonces | The (1) make_nonce, (2) generate_nonce, and (3) generate_verifier functions in SimpleGeo python-oauth2 uses weak random numbers to generate nonces, which makes it easier for remote attackers to guess the nonce via a brute force attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'oauth2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9rc1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4347'}, {'type': 'WEB', 'url': 'https://github.com/simplegeo/python-oauth2/issues/9'}, {'type': 'WEB', 'url': 'https://github.com/simplegeo/python-oauth2/pull/146'}, {'type': 'WEB', 'url': 'https://github.com/joestump/python-oauth2/commit/82dd2cdd4... | {'cwe_ids': ['CWE-330'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T18:04:35Z', 'nvd_published_at': '2014-05-20T14:55:00Z'} |
1.4.0 | GHSA-x2fm-93ww-ggvx | 2023-06-09T23:06:12Z | 2022-05-13T01:02:39Z | null | ['CVE-2017-16932'] | Nokogiri gem, via libxml, is affected by DoS vulnerabilities | parser.c in libxml2 before 2.9.5 does not prevent infinite recursion in parameter entities. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16932'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/issues/1714'}, {'type': 'WEB', 'url': 'https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961'}, {'type': 'WEB', 'url': 'https://blog.clamav.net/20... | {'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T23:06:12Z', 'nvd_published_at': '2017-11-23T21:29:00Z'} |
1.4.0 | GHSA-c35g-jr5f-h83p | 2023-08-03T23:06:53Z | 2022-05-13T01:28:46Z | null | ['CVE-2017-5591'] | SleekXMPP and Slixmpp Incorrect Implementation of Message Carbons | An incorrect implementation of "XEP-0280: Message Carbons" in multiple XMPP clients allows a remote attacker to impersonate any user, including contacts, in the vulnerable application's display. This allows for various kinds of social engineering attacks. This CVE is for SleekXMPP up to 1.3.1 and Slixmpp all versions u... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'slixmpp'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.2.3'}}, {'package': {'ecosystem': 'PyPI', 'name': 'SleekXMPP... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-5591'}, {'type': 'WEB', 'url': 'https://github.com/fritzy/SleekXMPP/issues/442'}, {'type': 'WEB', 'url': 'https://github.com/fritzy/SleekXMPP/commit/285495d5ee2427d93d961ceedcd1829383e5196d'}, {'type': 'WEB', 'url': 'https://github.com/poezio/slixm... | {'cwe_ids': ['CWE-940'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T23:06:53Z', 'nvd_published_at': '2017-02-09T20:59:00Z'} |
1.4.0 | GHSA-h47x-2j37-fw5m | 2022-06-29T13:25:50Z | 2022-05-24T17:01:50Z | null | ['CVE-2019-10174'] | Use of Externally-Controlled Input to Select Classes or Code in Infinispan | A vulnerability was found in Infinispan such that the invokeAccessibly method from the public class ReflectionUtil allows any application class to invoke private methods in any class with Infinispan's privileges. The attacker can use reflection to introduce new, malicious behavior into the application. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.infinispan:infinispan-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.2.12.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.2.11.Final'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.infinispan:infinis... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10174'}, {'type': 'WEB', 'url': 'https://github.com/infinispan/infinispan/commit/5dbb05cfaca01a1a66732b82a0f5ba615ccbd214'}, {'type': 'WEB', 'url': 'https://github.com/infinispan/infinispan/commit/7bdc2822ccf79127a488130239c49a5e944e3ca2'}, {'type'... | {'cwe_ids': ['CWE-470'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T13:25:50Z', 'nvd_published_at': '2019-11-25T11:15:00Z'} |
1.4.0 | GHSA-7f84-9cqf-g4j9 | 2023-01-24T16:02:02Z | 2022-05-13T01:05:37Z | null | ['CVE-2018-18260'] | Camaleon CMS vulnerable to Stored Cross-site Scripting | In the 2.4 version of Camaleon CMS, Stored XSS has been discovered. The profile image in the User settings section can be run in the update / upload area via `/admin/media/upload?actions=false`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'camaleon_cms'}, 'versions': ['2.4']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-18260'}, {'type': 'PACKAGE', 'url': 'https://github.com/owen2345/camaleon-cms'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/camaleon_cms/CVE-2018-18260.yml'}, {'type': 'WEB', 'url': 'http://packetstormsecur... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-24T16:02:02Z', 'nvd_published_at': '2018-10-15T19:29:00Z'} |
1.4.0 | GHSA-6mw4-phmc-x477 | 2023-07-26T23:32:56Z | 2022-05-17T00:32:03Z | null | ['CVE-2017-11807'] | ChakraCore RCE Vulnerability | ChakraCore and Microsoft Edge in Microsoft Windows 10 1703 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11792, CVE-2017-11793, CVE-20... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-11807'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/3917'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/1330a773c5dbb28af5b58777c709e83cc412f57c'}, {'type': 'WEB', 'url': 'https://portal.msrc... | {'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T23:32:56Z', 'nvd_published_at': '2017-10-13T13:29:00Z'} |
1.4.0 | GHSA-6m27-3r8q-c7f7 | 2023-09-26T19:23:09Z | 2022-05-24T17:00:28Z | null | ['CVE-2019-8146'] | Magento 2 Community Edition XSS Vulnerability | A stored cross-site scripting (XSS) vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated user can inject arbitrary JavaScript code when adding a new customer attribute for stores. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8146'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051105/https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T18:10:21Z', 'nvd_published_at': '2019-11-06T00:15:00Z'} |
1.4.0 | GHSA-68cp-h96v-gg3x | 2023-07-27T21:05:25Z | 2022-05-17T02:44:22Z | null | ['CVE-2017-0224'] | ChakraCore RCE Vulnerability | A remote code execution vulnerability exists in the way JavaScript engines render when handling objects in memory in Microsoft Edge, aka "Scripting Engine Memory Corruption Vulnerability." This CVE ID is unique from CVE-2017-0228, CVE-2017-0229, CVE-2017-0230, CVE-2017-0234, CVE-2017-0235, CVE-2017-0236, and CVE-2017-0... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0224'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/2959'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/f022afb8246acc98e74a887bb655ac512caf6e72'}, {'type': 'WEB', 'url': 'https://portal.msrc.... | {'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-27T21:05:25Z', 'nvd_published_at': '2017-05-12T14:29:00Z'} |
1.4.0 | GHSA-h24p-qwf4-84q8 | 2022-11-22T18:47:34Z | 2022-05-17T02:41:57Z | null | ['CVE-2017-7669'] | Apache Hadoop's LinuxContainerExecutor runs docker commands as root with insufficient input validation | In Apache Hadoop 2.8.0, 3.0.0-alpha1, and 3.0.0-alpha2, the LinuxContainerExecutor runs docker commands as root with insufficient input validation. When the docker feature is enabled, authenticated users can run commands as root. This issue is fixed in versions 2.8.1 and 3.0.0-alpha3. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0-alpha1... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7669'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/hadoop-user/201706.mbox/%3C4A2FDA56-491B-4C2A-915F-C9D4A4BDB92A%40apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/98795'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T18:47:34Z', 'nvd_published_at': '2017-06-05T01:29:00Z'} |
1.4.0 | GHSA-gfwj-fwqj-fp3v | 2023-07-19T14:39:30Z | 2022-05-24T19:03:28Z | null | ['CVE-2021-22118'] | Improper Privilege Management in Spring Framework | In Spring Framework, versions 5.2.x prior to 5.2.15 and versions 5.3.x prior to 5.3.7, a WebFlux application is vulnerable to a privilege escalation: by (re)creating the temporary storage directory, a locally authenticated malicious user can read or modify files that have been uploaded to the WebFlux application, or ov... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.0'}, {'fixed': '5.2.15'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.14'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-web... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22118'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-framework/issues/26931'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-framework/commit/0d0d75e25322d8161002d861fff3ec04ba8be5ac'}, {'type': 'WEB', 'url... | {'cwe_ids': ['CWE-269', 'CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-22T18:24:11Z', 'nvd_published_at': '2021-05-27T15:15:00Z'} |
1.4.0 | GHSA-fwqr-3pvp-pjwq | 2022-07-01T17:46:29Z | 2022-05-13T01:36:54Z | null | ['CVE-2017-2608'] | Deserialization of Untrusted Data in Jenkins | Jenkins before versions 2.44, 2.32.2 is vulnerable to a remote code execution vulnerability involving the deserialization of various types in javax.imageio in XStream-based APIs (SECURITY-383). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.32.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.34'}, {... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-2608'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenkins/commit/a814154695e23dc37542af7d40cacc129cf70722'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2608'}, {'type': 'PACKAGE', 'url': 'https://github.... | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T17:46:29Z', 'nvd_published_at': '2018-05-15T20:29:00Z'} |
1.4.0 | GHSA-rxvx-44w5-44r7 | 2022-07-06T20:20:19Z | 2022-05-13T01:10:58Z | null | ['CVE-2015-2944'] | Improper Neutralization of Input During Web Page Generation in Apache Sling | Multiple cross-site scripting (XSS) vulnerabilities in Apache Sling API before 2.2.2 and Apache Sling Servlets Post before 2.1.2 allow remote attackers to inject arbitrary web script or HTML via the URI, related to (1) org/apache/sling/api/servlets/HtmlResponse and (2) org/apache/sling/servlets/post/HtmlResponse. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.sling:org.apache.sling.api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.sling:org.apache.s... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-2944'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/SLING-2082'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r04237d561f3e5bced0a26287454450a34275162aa6b1dbae1b707b31@%3Cdev.sling.apache.org%3E'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:20:19Z', 'nvd_published_at': '2015-06-02T14:59:00Z'} |
1.4.0 | GHSA-pwh7-92h3-mqr6 | 2022-07-01T17:11:02Z | 2022-05-13T01:45:42Z | null | ['CVE-2017-3586'] | Exposure of Sensitive Information to an Unauthorized Actor in Oracle MySQL Connectors Java | Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 5.1.41 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Connectors. While the vulnerability i... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'mysql:mysql-connector-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.42'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.1.41'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-3586'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2017/dsa-3857'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T17:11:02Z', 'nvd_published_at': '2017-04-24T19:59:00Z'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.