schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
8
154
details
stringlengths
31
19.1k
severity
stringlengths
2
92
affected
stringlengths
75
28.5k
references
stringlengths
79
7.48k
database_specific
stringlengths
131
196
1.4.0
GHSA-9678-5f6f-wp3f
2023-03-02T16:42:30Z
2022-05-24T16:55:59Z
null
['CVE-2019-10398']
Jenkins Beaker Builder Plugin has Insufficiently Protected Credentials
Beaker builder Plugin stored the Beaker password unencrypted on the Jenkins controller. This password could be viewed by users with access to the Jenkins controller file system. Beaker builder Plugin now stores these credentials encrypted.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:beaker-builder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10398'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-09-12/#SECURITY-1545'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/09/12/2'}]
{'cwe_ids': ['CWE-522'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-03-02T16:42:30Z', 'nvd_published_at': '2019-09-12T14:15:00Z'}
1.4.0
GHSA-27j5-2h6r-c9q2
2022-11-22T19:04:53Z
2022-05-24T16:44:03Z
null
['CVE-2019-11405']
OpenAPI Tools OpenAPI Generator uses HTTP in various files
OpenAPI Tools OpenAPI Generator before 4.0.0-20190419.052012-560 uses http:// URLs in various build.gradle, build.gradle.mustache, and build.sbt files, which may have caused insecurely resolved dependencies.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.openapitools:openapi-generator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.0-20190419.052012-560'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11405'}, {'type': 'WEB', 'url': 'https://github.com/OpenAPITools/openapi-generator/issues/2253'}, {'type': 'WEB', 'url': 'https://github.com/OpenAPITools/openapi-generator/pull/2248'}, {'type': 'WEB', 'url': 'https://github.com/OpenAPITools/openapi...
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T19:04:53Z', 'nvd_published_at': '2019-04-22T11:29:00Z'}
1.4.0
GHSA-4rjr-3gj2-5crq
2022-06-17T21:39:29Z
2022-05-24T19:09:36Z
null
['CVE-2021-20332']
Exposure of Sensitive Information to an Unauthorized Actor in MongoDB Rust Driver
Specific MongoDB Rust Driver versions can include credentials used by the connection pool to authenticate connections in the monitoring event that is emitted when the pool is created. The user's logging infrastructure could then potentially ingest these events and unexpectedly leak the credentials. Note that such monit...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'mongodb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '2.0.0-beta'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.0-alpha1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20332'}, {'type': 'WEB', 'url': 'https://github.com/mongodb/mongo-rust-driver/commit/9e8782b1bb1104e5399c073b553719c262d4463c'}, {'type': 'PACKAGE', 'url': 'https://github.com/mongodb/mongo-rust-driver'}, {'type': 'WEB', 'url': 'https://jira.mongod...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:39:29Z', 'nvd_published_at': '2021-08-02T13:15:00Z'}
1.4.0
GHSA-hmhg-95wh-r699
2023-08-08T19:55:12Z
2022-05-24T19:03:11Z
null
['CVE-2021-23937']
DNS based denial of service in Apache Wicket
A DNS proxy and possible amplification attack vulnerability in WebClientInfo of Apache Wicket allows an attacker to trigger arbitrary DNS lookups from the server when the X-Forwarded-For header is not properly sanitized. This DNS lookup can be engineered to overload an internal DNS server or to slow down request proces...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.wicket:wicket-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.3.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.wicket:wicket-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'f...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23937'}, {'type': 'WEB', 'url': 'https://github.com/apache/wicket/commit/84f62a5cff462eaa3bfaf171b0638c7e7feea30d'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/wicket'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r127c0...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-31T18:25:53Z', 'nvd_published_at': '2021-05-25T17:15:00Z'}
1.4.0
GHSA-wcvc-rhfj-997g
2023-07-28T20:22:48Z
2022-05-14T02:22:42Z
null
['CVE-2016-7203']
ChakraCore RCE Vulnerability
The Chakra JavaScript scripting engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-7200, CVE-2016-7201, CVE-2016-7202, CVE-2016...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-7203'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/1982'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/c2787ef8fdb7401922e9ec6540e4e5895d11c631'}, {'type': 'WEB', 'url': 'https://docs.microso...
{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T20:22:48Z', 'nvd_published_at': '2016-11-10T06:59:00Z'}
1.4.0
GHSA-wv63-gwr9-5c55
2022-12-13T14:52:57Z
2022-05-24T17:39:12Z
null
['CVE-2021-21608']
Stored XSS vulnerability in Jenkins button labels
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not escape button labels in the Jenkins UI. This results in a cross-site scripting vulnerability exploitable by attackers with the ability to control button labels. An example of buttons with a user-controlled label are the buttons of the Pipeline `input` step. ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.275'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.263.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21608'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-01-13/#SECURITY-2035'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T06:51:15Z', 'nvd_published_at': '2021-01-13T16:15:00Z'}
1.4.0
GHSA-f5qf-vh69-9q4r
2022-05-31T17:18:38Z
2022-05-14T00:55:56Z
null
['CVE-2017-1000190']
SimpleXML vulnerable to XML External Entity (XXE)
SimpleXML (latest version 2.7.1) is vulnerable to an XXE vulnerability resulting SSRF, information disclosure, DoS and so on.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.simpleframework:simple-xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000190'}, {'type': 'WEB', 'url': 'https://github.com/ngallagher/simplexml/issues/18'}, {'type': 'PACKAGE', 'url': 'https://github.com/ngallagher/simplexml'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a...
{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-05-31T17:18:38Z', 'nvd_published_at': '2017-11-17T21:29:00Z'}
1.4.0
GHSA-6gjj-c5mj-4cvp
2022-07-07T22:54:37Z
2022-05-14T01:10:35Z
null
['CVE-2014-0033']
Improper Input Validation in Apache Tomcat
org/apache/catalina/connector/CoyoteAdapter.java in Apache Tomcat 6.0.33 through 6.0.37 does not consider the disableURLRewriting setting when handling a session ID in a URL, which allows remote attackers to conduct session fixation attacks via a crafted URL.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.33'}, {'fixed': '6.0.38'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0033'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1069919'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WE...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T22:54:37Z', 'nvd_published_at': '2014-02-26T14:55:00Z'}
1.4.0
GHSA-ff28-f46g-r9g8
2022-05-24T20:48:14Z
2022-05-24T20:48:14Z
null
['CVE-2022-1464']
Cross-site Scripting in Gogs
### Impact The malicious user is able to upload a crafted SVG file as the issue attachment to archive XSS. All installations [allow uploading SVG (`text/xml`) files as issue attachments (non-default)](https://github.com/gogs/gogs/blob/e51e01683408e10b3dcd2ace65e259ca7f0fd61b/conf/app.ini#L283-L284) are affected. ### ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'gogs.io/gogs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.7'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/gogs/gogs/security/advisories/GHSA-ff28-f46g-r9g8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1464'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/commit/bc77440b301ac8780698be91dff1ac33b7cee850'}, {'type': 'PACKAGE', 'url': 'https://gith...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T20:48:14Z', 'nvd_published_at': '2022-05-05T14:15:00Z'}
1.4.0
GHSA-wwg2-2crq-6grr
2022-06-17T21:38:52Z
2022-05-24T17:34:03Z
null
['CVE-2020-28267']
Prototype pollution in @strikeentco/set
Prototype pollution vulnerability in '@strikeentco/set' version 1.0.0 allows attacker to cause a denial of service and may lead to remote code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': '@strikeentco/set'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.1'}]}], 'versions': ['1.0.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28267'}, {'type': 'WEB', 'url': 'https://github.com/strikeentco/set/commit/102cc6b2e1d1e0c928ced87e75df759d5541ff60'}, {'type': 'PACKAGE', 'url': 'https://github.com/strikeentco/set/'}, {'type': 'WEB', 'url': 'https://www.whitesourcesoftware.com/vu...
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:38:52Z', 'nvd_published_at': '2020-11-10T16:15:00Z'}
1.4.0
GHSA-7r4h-2h23-6jq9
2022-07-01T18:28:34Z
2022-05-13T01:12:25Z
null
['CVE-2017-2599']
Incorrect Authorization in Jenkins
Jenkins before versions 2.44 and 2.32.2 is vulnerable to an insufficient permission check. This allows users with permissions to create new items (e.g. jobs) to overwrite existing items they don't have access to (SECURITY-321).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.32.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.32.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-2599'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenkins/commit/4ed5c850b6855ab064a66d02fb338f366853ce89'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2599'}, {'type': 'PACKAGE', 'url': 'https://github....
{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T18:28:34Z', 'nvd_published_at': '2018-04-11T16:29:00Z'}
1.4.0
GHSA-jf86-9434-f8c2
2023-09-26T19:53:54Z
2022-05-24T17:02:42Z
null
['CVE-2019-14910']
Keycloak Authentication Error
A vulnerability was found in keycloak 7.x, when keycloak is configured with LDAP user federation and StartTLS is used instead of SSL/TLS from the LDAP server (ldaps), in this case user authentication succeeds even if invalid password has entered.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-parent'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'last_affected': '7.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14910'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/cve-2019-14910'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14910'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}]
{'cwe_ids': ['CWE-278', 'CWE-295'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T21:50:47Z', 'nvd_published_at': '2019-12-05T15:15:00Z'}
1.4.0
GHSA-fwhr-g5r4-xgxf
2023-07-26T23:10:12Z
2022-05-17T00:28:41Z
null
['CVE-2017-12849']
Silverstripe CMS User Enumeration
Response discrepancy in the login and password reset forms in SilverStripe CMS before 3.5.5 and 3.6.x before 3.6.1 allows remote attackers to enumerate users via timing attacks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.6'}, {'fixed': '3.6.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12849'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/ss-2017-005'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T23:10:12Z', 'nvd_published_at': '2017-10-12T15:29:00Z'}
1.4.0
GHSA-vq7p-f4fv-rr5x
2022-12-12T21:29:46Z
2022-05-14T03:23:45Z
null
['CVE-2018-1000151']
Jenkins vSphere Plugin disables SSL/TLS certificate validation by default
A man in the middle vulnerability exists in Jenkins vSphere Plugin 2.16 and older in VSphere.java that disables SSL/TLS certificate validation by default. vSphere Plugin 2.17 now has SSL/TLS certificate validation enabled by default.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:vsphere-cloud'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.17'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.16'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000151'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/vsphere-cloud-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-03-26/#SECURITY-504'}]
{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T21:29:46Z', 'nvd_published_at': '2018-04-05T13:29:00Z'}
1.4.0
GHSA-fj9v-g8fw-vxmf
2022-09-08T14:18:32Z
2022-05-17T00:00:33Z
null
['CVE-2021-23265']
Improper Privilege Management in craftercms
A logged-in and authenticated user with a Reviewer Role may lock a content item.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.craftercms:craftercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.18'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23265'}, {'type': 'WEB', 'url': 'https://docs.craftercms.org/en/3.1/security/advisory.html#cv-2022051601'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftercms/craftercms'}]
{'cwe_ids': ['CWE-269'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-02T14:21:27Z', 'nvd_published_at': '2022-05-16T17:15:00Z'}
1.4.0
GHSA-m4wh-848j-9w2r
2022-10-07T21:52:28Z
2022-05-24T17:01:59Z
null
['CVE-2019-14825']
Katello cleartext password storage issue
A cleartext password storage issue was discovered in Katello, versions 3.x.x.x before katello 3.12.2. Registry credentials used during container image discovery were inadvertently logged without being masked. This flaw could expose the registry credentials to other privileged users.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'katello'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0.0'}, {'fixed': '3.12.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14825'}, {'type': 'WEB', 'url': 'https://github.com/Katello/katello/pull/8244'}, {'type': 'WEB', 'url': 'https://github.com/Katello/katello/pull/8253'}, {'type': 'WEB', 'url': 'https://github.com/Katello/katello/commit/332484232b66b7907a8104a19ea97...
{'cwe_ids': ['CWE-312'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-10-07T21:52:28Z', 'nvd_published_at': '2019-11-25T16:15:00Z'}
1.4.0
GHSA-cwpm-f78v-7m5c
2022-05-24T22:10:51Z
2022-05-24T22:10:51Z
null
['CVE-2022-29202']
Denial of service in `tf.ragged.constant` due to lack of validation
### Impact The implementation of [`tf.ragged.constant`](https://github.com/tensorflow/tensorflow/blob/f3b9bf4c3c0597563b289c0512e98d4ce81f886e/tensorflow/python/ops/ragged/ragged_factory_ops.py#L146-L239) does not fully validate the input arguments. This results in a denial of service by consuming all available memory:...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cwpm-f78v-7m5c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29202'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/issues/55199'}, {'type': 'WEB', 'url': 'https://github.com/tensorf...
{'cwe_ids': ['CWE-1284', 'CWE-20', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:10:51Z', 'nvd_published_at': '2022-05-20T23:15:00Z'}
1.4.0
GHSA-2ch8-f849-pjg3
2023-08-16T23:06:35Z
2022-05-17T03:49:34Z
null
['CVE-2014-4301']
Eugene Pankov Ajenti Cross-site scripting Vulnerabilities
Multiple cross-site scripting (XSS) vulnerabilities in the `respond_error` function in `routing.py` in Eugene Pankov Ajenti before 1.2.21.7 allow remote attackers to inject arbitrary web script or HTML via the `PATH_INFO` to (1) `resources.js` or (2) resources.css in `ajenti:static/`, related to the traceback page.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'ajenti'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.21.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-4301'}, {'type': 'WEB', 'url': 'https://github.com/Eugeny/ajenti/commit/d3fc5eb142ff16d55d158afb050af18d5ff09120'}, {'type': 'PACKAGE', 'url': 'https://github.com/Eugeny/ajenti'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20171119051123/h...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T23:06:35Z', 'nvd_published_at': '2014-06-18T14:55:00Z'}
1.4.0
GHSA-3q28-xfw3-2q35
2023-07-31T21:56:25Z
2022-05-17T02:37:29Z
null
['CVE-2016-5732']
phpMyAdmin XSS Vulnerability
Multiple cross-site scripting (XSS) vulnerabilities in the partition-range implementation in `templates/table/structure/display_partitions.phtml` in the table-structure page in phpMyAdmin 4.6.x before 4.6.3 allow remote attackers to inject arbitrary web script or HTML via crafted table parameters.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.6'}, {'fixed': '4.6.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-5732'}, {'type': 'WEB', 'url': 'https://github.com/phpmyadmin/phpmyadmin/commit/0815af37f483f329f0c0565d68821fea9c47b5f5'}, {'type': 'WEB', 'url': 'https://github.com/phpmyadmin/phpmyadmin/commit/792cd1262f012b9b13639519d414f2acaeb5e972'}, {'type':...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T21:56:25Z', 'nvd_published_at': '2016-07-03T01:59:00Z'}
1.4.0
GHSA-pw8r-x2qm-3h5m
2023-08-16T09:30:38Z
2022-05-14T01:57:01Z
null
['CVE-2013-2135']
Arbitrary code execution in Apache Struts 2
Apache Struts 2 before 2.3.14.3 allows remote attackers to execute arbitrary OGNL code via a request with a crafted value that contains both "${}" and "%{}" sequences, which causes the OGNL code to be evaluated twice.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.14.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2135'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/WW/S2-015'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/struts'}, {'type': 'WEB', 'url': 'http://struts.apache.org/development/2.x/docs/s2-015.html'}, {'type': '...
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T20:39:47Z', 'nvd_published_at': '2013-07-16T18:55:00Z'}
1.4.0
GHSA-9jcv-v4jp-w3cq
2022-11-02T00:41:40Z
2022-05-14T01:04:36Z
null
['CVE-2018-1000170']
Cross-site Scripting in Jenkins Core
A cross-site scripting vulnerability exists in Jenkins 2.115 and older, LTS 2.107.1 and older, in confirmationList.jelly and stopButton.jelly that allows attackers with Job/Configure and/or Job/Create permission to create an item name containing JavaScript that would be executed in another user's browser when that othe...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.115'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000170'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-04-11/#SECURITY-759'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-02T00:41:40Z', 'nvd_published_at': '2018-04-16T09:58:00Z'}
1.4.0
GHSA-86hp-xrhj-fhpq
2023-07-14T22:45:09Z
2022-05-24T22:00:13Z
null
['CVE-2019-12747']
Typo3 Vulnerable to Insecure Deserialization
TYPO3 8.x through 8.7.26 and 9.x through 9.5.7 allows Deserialization of Untrusted Data.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0'}, {'fixed': '8.7.27'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.7.26'}}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'E...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12747'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3-CMS/core'}, {'type': 'WEB', 'url': 'https://typo3.org/cms/release-news/typo3-8-release-notes/'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-core-sa-2019-020/'}]
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-14T22:45:09Z', 'nvd_published_at': '2019-07-09T15:15:00Z'}
1.4.0
GHSA-hw4g-fhcp-x5mq
2022-07-08T18:48:45Z
2022-05-17T05:47:39Z
null
['CVE-2010-3494']
Concurrent Execution using Shared Resource with Improper Synchronization in pyftpdlib
Race condition in the FTPHandler class in ftpserver.py in pyftpdlib before 0.5.2 allows remote attackers to cause a denial of service (daemon outage) by establishing and then immediately closing a TCP connection, leading to the accept function having an unexpected value of None for the address, or an ECONNABORTED, EAGA...
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'pyftpdlib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-3494'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/zodb/+bug/135108'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-hw4g-fhcp-x5mq'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/pyftp...
{'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T18:48:45Z', 'nvd_published_at': '2010-10-19T20:00:00Z'}
1.4.0
GHSA-vpm6-h53m-x2xf
2023-08-29T21:31:20Z
2022-05-17T04:56:41Z
null
['CVE-2012-2153']
Drupal improper access restrictions
Drupal 7.x before 7.14 does not properly restrict access to nodes in a list when using a "contributed node access module," which allows remote authenticated users with the "Access the content overview page" permission to read all published nodes by accessing the admin/content page.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'drupal/drupal'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0'}, {'fixed': '7.14'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-2153'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20150523060428/http://www.mandriva.com/en/support/security/advisories/advisory/MDVSA-2013:074/?name=MDVSA-2013:074'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200229101926/htt...
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T21:31:20Z', 'nvd_published_at': '2012-10-01T00:55:00Z'}
1.4.0
GHSA-gg36-9346-9qx9
2023-08-29T18:15:55Z
2022-05-17T04:58:08Z
null
['CVE-2013-3239']
phpMyAdmin Remote Code Execution
phpMyAdmin 3.5.x before 3.5.8 and 4.x before 4.0.0-rc3, when a SaveDir directory is configured, allows remote authenticated users to execute arbitrary code by using a double extension in the filename of an export file, leading to interpretation of this file as an executable file by the Apache HTTP Server, as demonstrat...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5.0'}, {'fixed': '3.5.8.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-3239'}, {'type': 'WEB', 'url': 'https://github.com/phpmyadmin/phpmyadmin/commit/1f6bc0b707002e26cab216b9e57b4d5de764de48'}, {'type': 'WEB', 'url': 'https://github.com/phpmyadmin/phpmyadmin/commit/d3fafdfba0807068196655e9b6d16c5d1d3ccf8a'}, {'type':...
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T18:15:55Z', 'nvd_published_at': '2013-04-26T03:34:00Z'}
1.4.0
GHSA-fvwh-wv43-8qj5
2022-12-29T01:34:30Z
2022-05-24T17:28:25Z
null
['CVE-2020-2257']
Stored XSS vulnerability in Validating String Parameter Plugin
Validating String Parameter Plugin 2.4 and earlier does not escape regular expressions in tooltips. Additionally, Validating String Parameter Plugin 2.4 does not escape parameter names and parameter descriptions. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Config...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:validating-string-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.4'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2257'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/validating-string-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1935'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lis...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-29T01:34:30Z', 'nvd_published_at': '2020-09-16T14:15:00Z'}
1.4.0
GHSA-gv86-43rv-79m2
2023-03-10T02:33:26Z
2022-05-14T01:01:09Z
null
['CVE-2018-1000077']
RubyGems Improper Input Validation vulnerability
RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Improper Input Validation vulnerability in ruby gems specification homepage attribute that can result in a malicious g...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rubygems-update'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jruby:jruby-stdlib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.1.16.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000077'}, {'type': 'WEB', 'url': 'https://github.com/jruby/jruby/commit/0b06b48ab4432237ce5fc1bef47f2c6bcf7843f7'}, {'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems/commit/5971b486d4dbb2bad5d3445b3801c456eb0ce183'}, {'type': 'WEB', 'ur...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-10T02:33:26Z', 'nvd_published_at': '2018-03-13T15:29:00Z'}
1.4.0
GHSA-jv5x-p843-g4qr
2023-07-21T17:56:16Z
2022-05-13T01:20:42Z
null
['CVE-2018-8229']
ChakraCore RCE Vulnerability
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8227.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8229'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/9b270c55bfea2fbefc9482d3414c4b4b395cad10'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8229'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-843'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T17:56:16Z', 'nvd_published_at': '2018-06-14T12:29:00Z'}
1.4.0
GHSA-322x-jv5h-cvjh
2022-12-06T21:53:17Z
2022-05-13T01:18:44Z
null
['CVE-2018-1000149']
Jenkins Ansible Plugin man in the middle vulnerability
A man in the middle vulnerability exists in Jenkins Ansible Plugin 0.8 and older in `AbstractAnsibleInvocation.java`, `AnsibleAdHocCommandBuilder.java`, `AnsibleAdHocCommandInvocationTest.java`, `AnsibleContext.java`, `AnsibleJobDslExtension.java`, `AnsiblePlaybookBuilder.java`, `AnsiblePlaybookStep.java` that disables...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.8'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000149'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-03-26/#SECURITY-630'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T21:53:17Z', 'nvd_published_at': '2018-04-05T13:29:00Z'}
1.4.0
GHSA-x869-784m-jmj2
2022-11-01T23:35:47Z
2022-05-13T01:47:05Z
null
['CVE-2017-7687']
Denial of service in Apache Mesos
When handling a decoding failure for a malformed URL path of an HTTP request, libprocess in Apache Mesos might crash because the code accidentally calls inappropriate function. A malicious actor can therefore cause a denial of service of Mesos masters rendering the Mesos-controlled cluster inoperable.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.mesos:mesos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.mesos:mesos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.2'}]}]...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7687'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/2c9ed2b07c2b2831a11d21db3cf8408a71fcf2c300d73ca01bad89df@%3Cdev.mesos.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/101027'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T23:35:47Z', 'nvd_published_at': '2017-09-29T01:34:00Z'}
1.4.0
GHSA-r5f2-4wf4-cv66
2023-02-14T00:28:01Z
2022-05-24T16:55:44Z
null
['CVE-2019-16173']
Cross-site Scripting in LimeSurvey
LimeSurvey before v3.17.14 allows reflected XSS for escalating privileges from a low-privileged account to, for example, SuperAdmin. This occurs in application/core/Survey_Common_Action.php,
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'limesurvey/limesurvey'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.17.14'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16173'}, {'type': 'WEB', 'url': 'https://github.com/LimeSurvey/LimeSurvey/commit/f1c1ad2d24eb262363511fcca2e96ce737064006'}, {'type': 'WEB', 'url': 'https://seclists.org/bugtraq/2019/Sep/27'}, {'type': 'WEB', 'url': 'https://www.limesurvey.org/lime...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T00:28:01Z', 'nvd_published_at': '2019-09-09T19:15:00Z'}
1.4.0
GHSA-v5rq-w2xm-7g5f
2022-06-27T16:09:55Z
2022-05-13T01:22:02Z
null
['CVE-2019-2435']
Improper Access Control in MySQL Connector Python
Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/Python). Supported versions that are affected are 8.0.13 and prior and 2.1.8 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via TLS to compromise MySQL Connectors. Successful attacks...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'mysql-connector-python'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.0.19'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.0.13'}}, {'package': {'ecosystem': 'PyPI', 'name': 'mysql-connector-python'}, 'ranges': [{'t...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-2435'}, {'type': 'PACKAGE', 'url': 'https://github.com/mysql/mysql-connector-python'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20190118-0002/'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/...
{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-27T16:09:55Z', 'nvd_published_at': '2019-01-16T19:30:00Z'}
1.4.0
GHSA-rxg9-xrhp-64gj
2022-10-25T17:35:53Z
2022-05-24T17:43:19Z
null
['CVE-2021-24112']
.NET Core Remote Code Execution Vulnerability
A remote code execution vulnerability exists when parsing certain types of graphics files. This vulnerability only exists on systems running on MacOS or Linux. This CVE ID is unique from CVE-2021-26701.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'System.Drawing.Common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.7.2'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Drawing.Common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.3'}]...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-24112'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/176'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24112'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-10-25T17:35:53Z', 'nvd_published_at': '2021-02-25T23:15:00Z'}
1.4.0
GHSA-rc94-7v55-wmg6
2023-07-26T20:38:29Z
2022-05-14T02:01:19Z
null
['CVE-2017-15063']
Subrion CMS CSRF Vulnerability
There are CSRF vulnerabilities in Subrion CMS 4.1.x through 4.1.5, and before 4.2.0, because of a logic error. Although there is functionality to detect CSRF, it is called too late in the ia.core.php code, allowing (for example) an attack against the query parameter to panel/database.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'intelliants/subrion'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1'}, {'fixed': '4.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15063'}, {'type': 'WEB', 'url': 'https://github.com/intelliants/subrion/issues/547'}, {'type': 'WEB', 'url': 'https://github.com/intelliants/subrion/issues/570'}, {'type': 'WEB', 'url': 'https://github.com/intelliants/subrion/commit/5fdf03af1a7d89c...
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T20:38:29Z', 'nvd_published_at': '2017-10-06T07:29:00Z'}
1.4.0
GHSA-397g-4jpj-44xg
2023-07-07T18:14:15Z
2022-05-13T01:28:45Z
null
['CVE-2016-4879']
CSRF in baserCMS 3.0.10 and earlier
Cross-site request forgery (CSRF) vulnerability in baserCMS plugin Mail version 3.0.10 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'baserproject/basercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-4879'}, {'type': 'WEB', 'url': 'https://jvn.jp/en/jp/JVN92765814/index.html'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210308130052/http://www.securityfocus.com/bid/93217'}, {'type': 'WEB', 'url': 'http://basercms.net/security/JVN9276...
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T18:14:15Z', 'nvd_published_at': '2017-05-12T18:29:00Z'}
1.4.0
GHSA-775w-gx3f-4j4f
2023-09-26T19:28:08Z
2022-05-24T17:00:29Z
null
['CVE-2019-8156']
Magento 2 Community Edition SSRF vulnerability
A server-side request forgery (SSRF) vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated user with admin privileges to modify store configurations can manipulate the connector api endpoint to enable remote code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8156'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051105/https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}]
{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T19:59:19Z', 'nvd_published_at': '2019-11-06T01:15:00Z'}
1.4.0
GHSA-gx69-6cp4-hxrj
2023-03-08T20:17:23Z
2022-05-13T01:18:44Z
null
['CVE-2018-1000073']
RubyGems Link Following vulnerability
RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Directory Traversal vulnerability in `install_location` function of `package.rb` that can result in path traversal whe...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rubygems-update'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jruby:jruby-stdlib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.1.16.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000073'}, {'type': 'WEB', 'url': 'https://github.com/jruby/jruby/commit/0b06b48ab4432237ce5fc1bef47f2c6bcf7843f7'}, {'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems/commit/1b931fc03b819b9a0214be3eaca844ef534175e2'}, {'type': 'WEB', 'ur...
{'cwe_ids': ['CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-08T20:17:23Z', 'nvd_published_at': '2018-03-13T15:29:00Z'}
1.4.0
GHSA-3x3m-p2wx-g7cw
2023-07-07T17:22:21Z
2022-05-14T01:48:04Z
null
['CVE-2018-19458']
Unauthenticated File Read in PHP Proxy
In PHP Proxy 3.0.3, any user can read files from the server without authentication due to an `index.php?q=file:///` LFI URI, a different vulnerability than CVE-2018-19246.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'athlon1600/php-proxy-app'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-19458'}, {'type': 'WEB', 'url': 'https://pentest.com.tr/exploits/PHP-Proxy-3-0-3-Local-File-Inclusion.html'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/45780/'}]
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T17:22:21Z', 'nvd_published_at': '2018-11-22T20:29:00Z'}
1.4.0
GHSA-xr4v-28rm-pvgw
2022-07-06T19:45:18Z
2022-05-17T02:37:09Z
null
['CVE-2016-6652']
Improper Neutralization of Special Elements used in an SQL Command Pivotal Spring Data JPA
SQL injection vulnerability in Pivotal Spring Data JPA before 1.9.6 (Gosling SR6) and 1.10.x before 1.10.4 (Hopper SR4), when used with a repository that defines a String query using the @Query annotation, allows attackers to execute arbitrary JPQL commands via a sort instance with a function call.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.data:spring-data-jpa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.data:spring-data-jpa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduc...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-6652'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-data-jpa/commit/b8e7fe'}, {'type': 'WEB', 'url': 'https://jira.spring.io/browse/DATAJPA-965'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2016-6652'}, {'type': '...
{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:45:18Z', 'nvd_published_at': '2016-10-05T16:59:00Z'}
1.4.0
GHSA-qjq9-wx5j-jrg6
2023-07-26T22:09:51Z
2022-05-14T03:50:13Z
null
['CVE-2017-17971']
Dolibarr ERP and CRM contain XSS Vulnerability
The test_sql_and_script_inject function in htdocs/main.inc.php in Dolibarr ERP/CRM 6.0.4 blocks some event attributes but neither onclick nor onscroll, which allows XSS.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-17971'}, {'type': 'WEB', 'url': 'https://github.com/Dolibarr/dolibarr/issues/8000'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T22:09:51Z', 'nvd_published_at': '2017-12-29T18:29:00Z'}
1.4.0
GHSA-qm4x-ch5w-gr62
2023-07-07T19:42:46Z
2022-05-17T04:42:42Z
null
['CVE-2014-2055']
XXE in SabreDAV before 1.7.11
SabreDAV before 1.7.11, as used in ownCloud Server before 5.0.15 and 6.0.x before 6.0.2, allows remote attackers to read arbitrary files, cause a denial of service, or possibly have other impact via an XML External Entity (XXE) attack.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'sabre/dav'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-2055'}, {'type': 'WEB', 'url': 'https://github.com/sabre-io/dav/issues/414'}, {'type': 'WEB', 'url': 'https://github.com/sabre-io/dav/commit/e3f46e0ecf83cf1d2ebf54908cde7b5ec170aa2c'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T19:42:46Z', 'nvd_published_at': '2014-06-04T14:55:00Z'}
1.4.0
GHSA-vpcv-78cp-whr3
2022-11-01T22:59:03Z
2022-05-13T01:48:07Z
null
['CVE-2017-9790']
Use after free in Apache Mesos
When handling a libprocess message wrapped in an HTTP request, libprocess in Apache Mesos before 1.1.3, 1.2.x before 1.2.2, 1.3.x before 1.3.1, and 1.4.0-dev crashes if the request path is empty, because the parser assumes the request path always starts with '/'. A malicious actor can therefore cause a denial of servic...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.mesos:mesos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.mesos:mesos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2.2'}]}]...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-9790'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/cc1e7a69ea78da0511f5b54b6be7aa6e3c78edad5aaff430e7de028b@%3Cdev.mesos.apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/101023'}]
{'cwe_ids': ['CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T22:59:03Z', 'nvd_published_at': '2017-09-29T01:34:00Z'}
1.4.0
GHSA-gvjg-r9fv-7qx9
2023-02-08T18:12:35Z
2022-05-17T03:44:52Z
null
['CVE-2015-5286']
OpenStack Image Service (Glance) allows remote authenticated users to bypass storage quota, cause denial of service
OpenStack Image Service (Glance) before 2014.2.4 (juno) and 2015.1.x before 2015.1.2 (kilo) allows remote authenticated users to bypass the storage quota and cause a denial of service (disk consumption) by deleting images that are being uploaded using a token that expires during the process. NOTE: this vulnerability e...
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'glance'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2014.2.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'glance'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2015.1.0'}, {'fixed': '2015.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5286'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2015:1897'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2015-5286'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/bugs/1498163'}, {'type': 'WEB', 'u...
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T18:12:35Z', 'nvd_published_at': '2015-10-26T17:59:00Z'}
1.4.0
GHSA-67fj-6w6m-w5j8
2022-05-25T22:34:15Z
2022-05-25T22:34:15Z
null
['CVE-2022-29249']
Reversible One-Way Hash in io.github.javaezlib:JavaEZ
### Impact This weakness allows the force decryption of locked text by hackers. The issue is NOT critical for non-secure applications, however may be critical in a situation where the highest levels of security are required. This issue ONLY affects v1.6 and does not affect anything pre-1.6. Upgrading to 1.7 is advised....
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.github.javaezlib:JavaEZ'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6'}, {'fixed': '1.7'}]}], 'versions': ['1.6']}]
[{'type': 'WEB', 'url': 'https://github.com/JavaEZLib/JavaEZ/security/advisories/GHSA-67fj-6w6m-w5j8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29249'}, {'type': 'PACKAGE', 'url': 'https://github.com/JavaEZLib/JavaEZ'}, {'type': 'WEB', 'url': 'https://github.com/JavaEZLib/JavaEZ/releases/...
{'cwe_ids': ['CWE-326', 'CWE-327', 'CWE-328'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T22:34:15Z', 'nvd_published_at': '2022-05-24T16:15:00Z'}
1.4.0
GHSA-595j-wpfg-23w4
2023-07-25T21:07:32Z
2022-05-14T03:46:13Z
null
['CVE-2018-1045']
Moodle XSS Vulnerability
In Moodle 3.x, there is XSS via a calendar event name.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3'}, {'fixed': '3.3.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.3.3'}}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSY...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1045'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=364384'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210124134120/http://www.securityfocus.com/bid/102755'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T21:07:32Z', 'nvd_published_at': '2018-01-22T08:29:00Z'}
1.4.0
GHSA-x5jm-rj37-5qh7
2022-06-01T20:12:13Z
2022-05-13T01:00:55Z
null
['CVE-2019-1003005']
Sandbox Bypass in Script Security Plugin
A sandbox bypass vulnerability exists in Jenkins Script Security Plugin 1.50 and earlier in src/main/java/org/jenkinsci/plugins/scriptsecurity/sandbox/groovy/SecureGroovyScript.java that allows attackers with Overall/Read permission to provide a Groovy script to an HTTP endpoint that can result in arbitrary code execut...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:script-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.51'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1003005'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:0739'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/script-security-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-01-28/#SECURI...
{'cwe_ids': ['CWE-693'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-01T20:12:13Z', 'nvd_published_at': '2019-02-06T16:29:00Z'}
1.4.0
GHSA-qcf3-9vmh-xw4r
2022-06-30T15:17:37Z
2022-05-13T01:30:44Z
null
['CVE-2018-1002201']
Improper Limitation of a Pathname to a Restricted Directory in zt-zip
zt-zip before 1.13 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in a Zip archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip-Slip'.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.zeroturnaround:zt-zip'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1002201'}, {'type': 'WEB', 'url': 'https://github.com/zeroturnaround/zt-zip/commit/759b72f33bc8f4d69f84f09fcb7f010ad45d6fff'}, {'type': 'WEB', 'url': 'https://github.com/snyk/zip-slip-vulnerability'}, {'type': 'WEB', 'url': 'https://github.com/zero...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-30T15:17:37Z', 'nvd_published_at': '2018-07-25T17:29:00Z'}
1.4.0
GHSA-448h-7hmp-99fg
2023-07-27T20:10:25Z
2022-05-17T02:35:05Z
null
['CVE-2017-0223']
ChakraCore RCE Vulnerability
A remote code execution vulnerability exists in Microsoft Chakra Core in the way JavaScript engines render when handling objects in memory. aka "Scripting Engine Memory Corruption Vulnerability". This vulnerability is unique from CVE-2017-0252.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0223'}, {'type': 'WEB', 'url': 'https://github.com/Microsoft/ChakraCore/pull/2959'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/2959'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/f74773f4520...
{'cwe_ids': ['CWE-119'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-27T20:10:25Z', 'nvd_published_at': '2017-05-15T17:29:00Z'}
1.4.0
GHSA-v5m6-2m78-4vr2
2023-07-17T21:46:13Z
2022-05-24T16:52:24Z
null
['CVE-2019-7877']
Magento 2 Community Edition XSS Vulnerability
A stored cross-site scripting vulnerability exists in the admin panel of Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. An authenticated user with privileges to manage orders can inject malicious javascript.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'fixe...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7877'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051916/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-23'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T21:46:13Z', 'nvd_published_at': '2019-08-02T22:15:00Z'}
1.4.0
GHSA-v646-rx6w-r3qq
2022-07-06T19:44:02Z
2022-05-13T01:23:38Z
null
['CVE-2016-5388']
Improper Access Control in Apache Tomcat
Apache Tomcat 7.x through 7.0.70 and 8.x through 8.5.4, when the CGI Servlet is enabled, follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat-catalina'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.72'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat-catalina'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-5388'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:1624'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:1635'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:1636'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:44:02Z', 'nvd_published_at': '2016-07-19T02:00:00Z'}
1.4.0
GHSA-gf8w-6hcm-rh3j
2022-12-22T13:40:48Z
2022-05-24T17:33:08Z
null
['CVE-2020-2313']
Missing permission checks in Jenkins Azure Key Vault Plugin allow enumerating credentials IDs
Azure Key Vault Plugin 2.0 and earlier does not perform permission checks in several HTTP endpoints. This allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. Those can be used as part of an attack to capture the credentials using another vulnerability. An enume...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:azure-keyvault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2313'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/azure-keyvault-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-11-04/#SECURITY-2110'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T13:40:48Z', 'nvd_published_at': '2020-11-04T15:15:00Z'}
1.4.0
GHSA-vpfj-5gg5-fvfm
2023-01-05T20:21:53Z
2022-05-24T17:10:28Z
null
['CVE-2020-2138']
XXE vulnerability in Jenkins Cobertura Plugin
Cobertura Plugin 1.15 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. This allows a user able to control the input files for the 'Publish Cobertura Coverage Report' post-build step to have Jenkins parse a crafted file that uses external entities for extraction of secrets fro...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:cobertura'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.15'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2138'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/cobertura-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-03-09/#SECURITY-1700'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/0...
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-05T20:21:53Z', 'nvd_published_at': '2020-03-09T16:15:00Z'}
1.4.0
GHSA-m6w9-8cxc-jff7
2023-07-24T21:45:46Z
2022-05-14T01:17:48Z
null
['CVE-2018-14486']
DNN XSS Vulnerability
DNN (formerly DotNetNuke) 9.1.1 allows cross-site scripting (XSS) via XML.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'DotNetNuke.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '9.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14486'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/151304/DNN-9.1-XML-Related-Cross-Site-Scripting.html'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-24T21:45:46Z', 'nvd_published_at': '2019-03-21T16:00:00Z'}
1.4.0
GHSA-jwvr-vv7p-gpwq
2022-05-02T19:39:35Z
2022-05-02T19:39:35Z
null
['CVE-2021-36784']
Privilege escalation for users with create/update permissions in Global Roles in Rancher
### Impact This vulnerability affects customers who utilize non-admin users that are able to create or edit [Global Roles](https://rancher.com/docs/rancher/v2.6/en/admin-settings/rbac/). The most common use case for this scenario is the [`restricted-admin`](https://rancher.com/docs/rancher/v2.6/en/admin-settings/rbac/g...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/rancher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/rancher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5....
[{'type': 'WEB', 'url': 'https://github.com/rancher/rancher/security/advisories/GHSA-jwvr-vv7p-gpwq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36784'}, {'type': 'WEB', 'url': 'https://bugzilla.suse.com/show_bug.cgi?id=1193991'}, {'type': 'WEB', 'url': 'https://github.com/rancher/rancher/r...
{'cwe_ids': ['CWE-269', 'CWE-285'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-02T19:39:35Z', 'nvd_published_at': '2022-05-02T12:16:00Z'}
1.4.0
GHSA-hh26-6xwr-ggv7
2022-05-25T22:36:56Z
2022-05-13T00:00:28Z
null
['CVE-2022-22970']
Denial of service in Spring Framework
In spring framework versions prior to 5.3.20+ , 5.2.22+ and old unsupported versions, applications that handle file uploads are vulnerable to DoS attack if they rely on data binding to set a MultipartFile or javax.servlet.Part to a field in a model object.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.22.RELEASE'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.21.RELEASE'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframewo...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22970'}, {'type': 'PACKAGE', 'url': 'https://github.com/spring-projects/spring-framework'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220616-0006/'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2022-22970...
{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T22:36:56Z', 'nvd_published_at': '2022-05-12T20:15:00Z'}
1.4.0
GHSA-346g-jrx9-jgf4
2022-12-06T21:31:41Z
2022-05-24T16:59:36Z
null
['CVE-2019-10466']
Jenkins 360 FireLine Plugin vulnerable to XML External Entity Reference
An XML external entities (XXE) vulnerability in Jenkins 360 FireLine Plugin allows attackers with Overall/Read access to have Jenkins resolve external entities, resulting in the extraction of secrets from the Jenkins agent, server-side request forgery, or denial-of-service attacks. ## Note: Jenkins has suspended distr...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.plugin:fireline'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.7.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10466'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/fireline-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-10-23/#SECURITY-822'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/10...
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T21:31:41Z', 'nvd_published_at': '2019-10-23T13:15:00Z'}
1.4.0
GHSA-4r39-f4rh-j6q8
2022-11-01T22:48:07Z
2022-05-24T17:03:46Z
null
['CVE-2019-16552']
Missing permission check in Jenkins Gerrit Trigger Plugin
A missing permission check in Jenkins Gerrit Trigger Plugin 2.30.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified HTTP URL or SSH server using attacker-specified credentials, or determine the existence of a file with a given path on the Jenkins master.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.sonyericsson.hudson.plugins.gerrit:gerrit-trigger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.30.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16552'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1527'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/12/17/1'}]
{'cwe_ids': ['CWE-285'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T22:48:07Z', 'nvd_published_at': '2019-12-17T15:15:00Z'}
1.4.0
GHSA-4vwq-x64q-j4cj
2022-07-06T20:10:16Z
2022-05-14T02:04:49Z
null
['CVE-2015-6938']
Improper Neutralization of Input During Web Page Generation in Jupyter Notebook
Cross-site scripting (XSS) vulnerability in the file browser in notebook/notebookapp.py in IPython Notebook before 3.2.2 and Jupyter Notebook 4.0.x before 4.0.5 allows remote attackers to inject arbitrary web script or HTML via a folder name. NOTE: this was originally reported as a cross-site request forgery (CSRF) vu...
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'notebook'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.0.4'}}, {'package': {'ecosystem': 'PyPI', 'name': 'ipython'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-6938'}, {'type': 'WEB', 'url': 'https://github.com/ipython/ipython/commit/3ab41641cf6fce3860c73d5cf4645aa12e1e5892'}, {'type': 'WEB', 'url': 'https://github.com/jupyter/notebook/commit/35f32dd2da804d108a3a3585b69ec3295b2677ed'}, {'type': 'WEB', 'ur...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:10:16Z', 'nvd_published_at': '2015-09-21T19:59:00Z'}
1.4.0
GHSA-gmff-vcv6-mmfr
2023-07-25T18:51:53Z
2022-05-14T02:36:48Z
null
['CVE-2018-14057']
Pimcore CSRF Vulnerability
Pimcore before 5.3.0 allows remote attackers to conduct cross-site request forgery (CSRF) attacks by leveraging validation of the `X-pimcore-csrf-token` anti-CSRF token only in the "Settings > Users / Roles" function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14057'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/45208/'}, {'type': 'WEB', 'url': 'https://www.sec-consult.com/en/blog/advisories/sql-injection-xss-csrf-vulnerabilities-in-pimcore-software/'}, {'type': 'WEB', 'url': 'http://pack...
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T18:51:53Z', 'nvd_published_at': '2018-08-17T18:29:00Z'}
1.4.0
GHSA-f38p-mq64-h784
2022-07-06T19:53:45Z
2022-05-14T02:46:14Z
null
['CVE-2016-4974']
Improper Input Validation in Apache Qpid AMQP 0-x JMS
Apache Qpid AMQP 0-x JMS client before 6.0.4 and JMS (AMQP 1.0) before 0.10.0 does not restrict the use of classes available on the classpath, which might allow remote authenticated users with permission to send messages to deserialize arbitrary objects and execute arbitrary code by leveraging a crafted serialized obje...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.qpid:qpid-jms-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-4974'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/QPIDJMS-188'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/137749/Apache-Qpid-Untrusted-Input-Deserialization.html'}, {'type': 'WEB', 'url': 'http://qpid.apache....
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:53:45Z', 'nvd_published_at': '2016-07-13T15:59:00Z'}
1.4.0
GHSA-f6vx-3fq6-hxm8
2022-12-20T17:40:04Z
2022-05-24T17:13:39Z
null
['CVE-2020-2175']
Stored XSS vulnerability in Jenkins FitNesse Plugin
FitNesse Plugin 1.31 and earlier does not correctly escape report contents before showing them on the Jenkins UI. This results in a stored cross-site scripting (XSS) vulnerability exploitable by users able to control the XML input files processed by the plugin. FitNesse Plugin 1.33 escapes content from XML input file...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:fitnesse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.33'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.31'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2175'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/fitnesse-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-04-07/#SECURITY-1801'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/04...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T17:40:04Z', 'nvd_published_at': '2020-04-07T13:15:00Z'}
1.4.0
GHSA-hcxf-rq72-h4rr
2022-06-28T22:58:52Z
2022-05-24T16:50:30Z
null
['CVE-2019-10353']
Cross-Site Request Forgery in Jenkins
CSRF tokens in Jenkins 2.185 and earlier, LTS 2.176.1 and earlier did not expire, thereby allowing attackers able to obtain them to bypass CSRF protection.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.176.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.176.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10353'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-07-17/#SECURITY-626'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T22:58:52Z', 'nvd_published_at': '2019-07-17T16:15:00Z'}
1.4.0
GHSA-hr8g-f6r6-mr22
2022-06-01T21:22:06Z
2022-05-26T00:01:27Z
null
['CVE-2022-30595']
Buffer over-flow in Pillow
When reading a TGA file with RLE packets that cross scan lines, Pillow reads the information past the end of the first line without deducting that from the length of the remaining file data. This vulnerability was introduced in Pillow 9.1.0, and can cause a heap buffer overflow. Opening an image with a zero or negativ...
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.1.0'}, {'fixed': '9.1.1'}]}], 'versions': ['9.1.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30595'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/blob/main/src/libImaging/TgaRleDecode.c'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stab...
{'cwe_ids': ['CWE-120'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-01T21:22:06Z', 'nvd_published_at': '2022-05-25T12:15:00Z'}
1.4.0
GHSA-qp2q-6h9j-jg2r
2022-05-23T21:18:25Z
2022-05-05T00:00:15Z
null
['CVE-2022-30241']
Cross-site Scripting in jquery.json-viewer
The jquery.json-viewer library before version 1.5.0 for Node.js does not properly escape characters such as < in a JSON object, as demonstrated by a SCRIPT element.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'jquery.json-viewer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30241'}, {'type': 'WEB', 'url': 'https://github.com/abodelot/jquery.json-viewer/pull/26'}, {'type': 'PACKAGE', 'url': 'https://github.com/abodelot/jquery.json-viewer'}, {'type': 'WEB', 'url': 'https://github.com/abodelot/jquery.json-viewer/releases...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-23T21:18:25Z', 'nvd_published_at': '2022-05-04T18:15:00Z'}
1.4.0
GHSA-xmcr-x5x3-gjfx
2023-07-24T21:07:39Z
2022-05-14T01:40:50Z
null
['CVE-2018-1000826']
Microweber XSS Vulnerability
Microweber version <= 1.0.7 contains a Cross Site Scripting (XSS) vulnerability in Admin login form template that can result in Execution of JavaScript code.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000826'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/issues/489'}, {'type': 'WEB', 'url': 'https://0dd.zone/2018/10/28/microweber-XSS/'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-24T21:07:39Z', 'nvd_published_at': '2018-12-20T15:29:00Z'}
1.4.0
GHSA-vjq3-x3f2-fvxq
2022-05-25T19:25:29Z
2022-05-14T00:01:07Z
null
['CVE-2022-1715']
Account takeover in facturascripts
Account Takeover in GitHub repository neorazorx/facturascripts prior to 2022.08 due to improper type casting.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'facturascripts/facturascripts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2022.08'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1715'}, {'type': 'WEB', 'url': 'https://github.com/neorazorx/facturascripts/commit/714bebf4c35e3eedda138f5ee912a8031bc8b1ab'}, {'type': 'PACKAGE', 'url': 'https://github.com/neorazorx/facturascripts'}, {'type': 'WEB', 'url': 'https://huntr.dev/boun...
{'cwe_ids': ['CWE-1125', 'CWE-522'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T19:25:29Z', 'nvd_published_at': '2022-05-13T17:15:00Z'}
1.4.0
GHSA-pvmg-xgmx-9mxh
2022-05-25T19:29:51Z
2022-05-07T00:00:49Z
null
['CVE-2021-25745']
Improper Input Validation in k8s.io/ingress-nginx
A security issue was discovered in ingress-nginx where a user that can create or update ingress objects can use the spec.rules[].http.paths[].path field of an Ingress object (in the networking.k8s.io or extensions API group) to obtain the credentials of the ingress-nginx controller. In the default configuration, that c...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'k8s.io/ingress-nginx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25745'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/ingress-nginx/issues/8502'}, {'type': 'PACKAGE', 'url': 'https://github.com/kubernetes/ingress-nginx'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/kubernetes-security-announce/...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T19:29:51Z', 'nvd_published_at': '2022-05-06T01:15:00Z'}
1.4.0
GHSA-4g82-3jcr-q52w
2022-05-25T23:09:55Z
2022-05-25T23:09:55Z
null
[]
Malware in ctx
The `ctx` hosted project on [PyPI](https://pypi.org/project/ctx/) was taken over via user account compromise and replaced with a malicious project which contained runtime code that collected the content of `os.environ.items()` when instantiating `Ctx` objects. The captured environment variables were sent as a base64 en...
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'ctx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.4'}]}]}]
[{'type': 'PACKAGE', 'url': 'https://github.com/figlief/ctx'}, {'type': 'WEB', 'url': 'https://isc.sans.edu/forums/diary/ctx+Python+Library+Updated+with+Extra+Features/28678/'}, {'type': 'WEB', 'url': 'https://portswigger.net/daily-swig/malicious-python-library-ctx-removed-from-pypi-repo'}, {'type': 'WEB', 'url': 'http...
{'cwe_ids': ['CWE-912'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T23:09:55Z', 'nvd_published_at': None}
1.4.0
GHSA-7gh2-8q93-87hp
2023-07-19T22:52:00Z
2022-05-13T01:02:57Z
null
['CVE-2018-5387']
Wizkunde SAMLBase SAML Bypass
Wizkunde SAMLBase may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'gogentooss/samlbase'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-5387'}, {'type': 'WEB', 'url': 'https://github.com/GoGentoOSS/SAMLBase/issues/3'}, {'type': 'WEB', 'url': 'https://github.com/GoGentoOSS/SAMLBase/commit/482cdf8c090e0f1179073034ebcb609ac7c3f5b3'}, {'type': 'WEB', 'url': 'https://duo.com/blog/duo-fi...
{'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T19:21:30Z', 'nvd_published_at': '2018-07-24T15:29:00Z'}
1.4.0
GHSA-682g-c99v-9r2g
2023-03-03T22:44:06Z
2022-05-24T16:52:45Z
null
['CVE-2019-10371']
Jenkins Gitlab Authentication Plugin vulnerable to Session Fixation
GitLab Authentication Plugin does not invalidate the previous session and create a new one upon successful login. This allows attackers able to control or obtain another user’s pre-login session ID to impersonate them. As of publication of this advisory, there is no fix.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10371'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-08-07/#SECURITY-795'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/08/07/1'}]
{'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-03T22:44:06Z', 'nvd_published_at': '2019-08-07T15:15:00Z'}
1.4.0
GHSA-pm9x-4392-2c2p
2023-03-09T00:38:35Z
2022-05-13T01:38:26Z
null
['CVE-2017-0901']
RubyGems may allow a maliciously crafted gem to overwrite files
RubyGems versions 2.6.12 and earlier fail to validate specification names, allowing a maliciously crafted gem to potentially overwrite any file on the filesystem.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rubygems-update'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0901'}, {'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems/commit/ad5c0a53a86ca5b218c7976765c0365b91d22cb2'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/243156'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-20...
{'cwe_ids': ['CWE-20', 'CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-09T00:38:35Z', 'nvd_published_at': '2017-08-31T20:29:00Z'}
1.4.0
GHSA-7fmw-85qm-h22p
2023-07-26T19:15:53Z
2022-05-13T01:38:14Z
null
['CVE-2017-12159']
Keycloak CSRF Vulnerability
It was found that the cookie used for CSRF prevention in Keycloak was not unique to each session. An attacker could use this flaw to gain access to an authenticated user session, leading to possible information disclosure or further attacks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12159'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2904'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2905'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2906'}, {'type': 'WEB'...
{'cwe_ids': ['CWE-613'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T19:15:53Z', 'nvd_published_at': '2017-10-26T17:29:00Z'}
1.4.0
GHSA-jf5f-h3wr-j666
2023-07-07T18:49:00Z
2022-05-13T01:28:41Z
null
['CVE-2018-5960']
SQL Injection in Zenario 7.1-7.6
Zenario v7.1 - v7.6 has SQL injection via the `Name` input field of organizer.php or admin_boxes.ajax.php in the `Categories - Edit` module.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'tribalsystems/zenario'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.1'}, {'last_affected': '7.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-5960'}, {'type': 'WEB', 'url': 'https://www.vulnerability-lab.com/get_content.php?id=2043'}]
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T18:49:00Z', 'nvd_published_at': '2018-01-22T01:29:00Z'}
1.4.0
GHSA-pmqq-7wfv-jfff
2023-09-26T11:39:10Z
2022-05-13T01:14:25Z
null
['CVE-2016-5000']
Apache POI's XLSX2CSV Example XML External Entity (XXE) Vulnerability
The XLSX2CSV example in Apache POI before 3.14 allows remote attackers to read arbitrary files via a crafted OpenXML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.poi:poi-examples'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.14'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.13'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-5000'}, {'type': 'WEB', 'url': 'https://lists.apache.org/list.html?user@poi.apache.org'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuoct2020.html'}, {'type': 'WEB', 'url': 'http://www-01.ibm.com/support/docview.wss?uid=swg219...
{'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:53:05Z', 'nvd_published_at': '2016-08-05T14:59:00Z'}
1.4.0
GHSA-wfj3-535m-p6fx
2022-07-01T22:03:59Z
2022-05-14T01:04:30Z
null
['CVE-2017-1000391']
Improper Input Validation in Jenkins
Jenkins versions 2.88 and earlier and 2.73.2 and earlier stores metadata related to 'people', which encompasses actual user accounts, as well as users appearing in SCM, in directories corresponding to the user ID on disk. These directories used the user ID for their name without additional escaping, potentially resulti...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.73.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.73.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000391'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenkins/commit/566a8ddb885f0bef9bc848e60455c0aabbf0c1d3'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2017-11-08/'}, {'type': 'WEB', 'url': 'http://www.securityfocus....
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T22:03:59Z', 'nvd_published_at': '2018-01-26T02:29:00Z'}
1.4.0
GHSA-rmmf-5xhh-gg27
2023-07-31T21:52:21Z
2022-05-17T02:36:38Z
null
['CVE-2016-9853']
phpMyAdmin path disclosure
An issue was discovered in phpMyAdmin. By calling some scripts that are part of phpMyAdmin in an unexpected way, it is possible to trigger phpMyAdmin to display a PHP error message which contains the full path of the directory where phpMyAdmin is installed. During an execution timeout in the export functionality, the e...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.6'}, {'fixed': '4.6.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4'}, {'fixed': '4.4....
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-9853'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201701-32'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210127193655/http://www.securityfocus.com/bid/94527'}, {'type': 'WEB', 'url': 'https://www.phpmyadmin.net/security/P...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T21:52:21Z', 'nvd_published_at': '2016-12-11T02:59:00Z'}
1.4.0
GHSA-23x8-j7hm-5xwf
2022-07-08T18:52:41Z
2022-05-14T02:44:30Z
null
['CVE-2010-2103']
Improper Neutralization of Input During Web Page Generation in Apache Axis2
Cross-site scripting (XSS) vulnerability in axis2-admin/axis2-admin/engagingglobally in the administration console in Apache Axis2/Java 1.4.1, 1.5.1, and possibly other versions, as used in SAP Business Objects 12, 3com IMC, and possibly other products, allows remote attackers to inject arbitrary web script or HTML via...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.axis2.wso2:axis2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.1'}, {'fixed': '1.6.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-2103'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/58790'}, {'type': 'WEB', 'url': 'https://kb.juniper.net/KB27373'}, {'type': 'WEB', 'url': 'http://osvdb.org/64844'}, {'type': 'WEB', 'url': 'http://spl0it.org/file...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T18:52:41Z', 'nvd_published_at': '2010-05-27T22:30:00Z'}
1.4.0
GHSA-65qg-f77j-cccf
2023-07-25T21:20:03Z
2022-05-14T03:10:52Z
null
['CVE-2018-12290']
Yii2-StateMachine extension for Yii2 XSS Vulnerability
The Yii2-StateMachine extension v2.x.x for Yii2 has XSS.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'ptheofan/yii2-statemachine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-12290'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20180624194633/http://www.iwantacve.cn/index.php/archives/40/'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T21:20:03Z', 'nvd_published_at': '2018-06-13T14:29:00Z'}
1.4.0
GHSA-cphv-7cxw-5hcc
2022-12-15T17:35:15Z
2022-05-24T19:03:11Z
null
['CVE-2021-21657']
XXE vulnerability in Jenkins Filesystem Trigger Plugin
Filesystem Trigger Plugin 0.40 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. This allows attackers with Job/Configure permission or otherwise able to control the contents of an XML file being polled for changes to have Jenkins parse a crafted XML document that uses externa...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:fstrigger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.41'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.40'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21657'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/fstrigger-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-05-25/#SECURITY-2339'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2...
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T17:35:15Z', 'nvd_published_at': '2021-05-25T17:15:00Z'}
1.4.0
GHSA-g323-fr93-4j3c
2022-06-17T00:05:28Z
2022-05-04T00:00:22Z
null
['CVE-2022-1473']
Resource leakage when decoding certificates and keys
The OPENSSL_LH_flush() function, which empties a hash table, contains a bug that breaks reuse of the memory occuppied by the removed hash table entries. This function is used when decoding certificates or keys. If a long lived process periodically decodes certificates or keys its memory usage will expand without bounds...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '300.0.0'}, {'fixed': '300.0.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1473'}, {'type': 'WEB', 'url': 'https://github.com/github/advisory-database/issues/405'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-953464.pdf'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.gi...
{'cwe_ids': ['CWE-404', 'CWE-459'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:05:28Z', 'nvd_published_at': '2022-05-03T16:15:00Z'}
1.4.0
GHSA-8v4h-j42h-wfhc
2022-07-01T17:28:45Z
2022-05-13T01:36:43Z
null
['CVE-2017-3203']
Deserialization of Untrusted Data in Spring-flex
The Java implementations of AMF3 deserializers in Pivotal/Spring Spring-flex derive class instances from java.io.Externalizable rather than the AMF3 specification's recommendation of flash.utils.IExternalizable. A remote attacker with the ability to spoof or control an RMI server connection may be able to send serializ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.flex:spring-flex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.2.RELEASE'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-3203'}, {'type': 'WEB', 'url': 'https://codewhitesec.blogspot.com/2017/04/amf.html'}, {'type': 'WEB', 'url': 'https://www.kb.cert.org/vuls/id/307983'}, {'type': 'WEB', 'url': 'http://www.securityweek.com/flaws-java-amf-libraries-allow-remote-code-e...
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T17:28:45Z', 'nvd_published_at': '2018-06-11T17:29:00Z'}
1.4.0
GHSA-gv2w-88hx-8m9r
2022-06-24T01:25:23Z
2022-05-24T17:16:46Z
null
['CVE-2020-1745']
Improper Authorization in Undertoe
A file inclusion vulnerability was found in the AJP connector enabled with a default AJP configuration port of 8009 in Undertow version 2.0.29.Final and before and was fixed in 2.0.30.Final. A remote, unauthenticated attacker could exploit this vulnerability to read web application files from a vulnerable server. In in...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.30'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.29'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1745'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1745'}, {'type': 'WEB', 'url': 'https://meterpreter.org/cve-2020-1938-apache-tomcat-ajp-connector-remote-code-execution-vulnerability-alert/'}, {'type': 'WEB', 'ur...
{'cwe_ids': ['CWE-285'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T01:25:23Z', 'nvd_published_at': '2020-04-28T15:15:00Z'}
1.4.0
GHSA-9cjh-qmvx-436c
2023-09-18T23:52:44Z
2022-05-01T02:20:38Z
null
['CVE-2005-3745']
Apache Struts Cross-site scripting Vulnerability
Cross-site scripting (XSS) vulnerability in Apache Struts 1.2.7, and possibly other versions allows remote attackers to inject arbitrary web script or HTML via the query string, which is not properly quoted or filtered when the request handler generates an error message.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2005-3745'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r02c2d634fa74209d941c90f9a4cd36a6f12366ca65f9b90446ff2de3@%3Cissues.struts.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf482c101a88445d73cc2e89db...
{'cwe_ids': ['CWE-80'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-09-18T23:52:44Z', 'nvd_published_at': '2005-11-22T11:03:00Z'}
1.4.0
GHSA-2263-jwgm-wv97
2023-07-25T19:26:16Z
2022-05-14T02:19:17Z
null
['CVE-2018-16342']
Showdoc XSS Vulnerability
ShowDoc v1.8.0 has XSS via a new page.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.8.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16342'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/issues/325'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T19:26:16Z', 'nvd_published_at': '2018-09-02T18:29:00Z'}
1.4.0
GHSA-77mv-p94f-qcq4
2023-09-25T19:11:50Z
2022-05-24T16:52:28Z
null
['CVE-2019-7934']
Magento 2 Community Edition XSS Vulnerability
A stored cross-site scripting vulnerability exists in the admin panel of Magento Open Source prior to 1.9.4.2, and Magento Commerce prior to 1.14.4.2, Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This could be exploited by an authenticated user with privileges to edit newsletter ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7934'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051916/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-23'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T18:33:45Z', 'nvd_published_at': '2019-08-02T22:15:00Z'}
1.4.0
GHSA-228f-g3h7-3fj3
2023-05-04T21:16:48Z
2022-05-17T04:54:56Z
null
['CVE-2012-2125']
RubyGems HTTPS to HTTP redirect
RubyGems before 1.8.23 can redirect HTTPS connections to HTTP, which makes it easier for remote attackers to observe or modify a gem during installation via a man-in-the-middle attack.
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'rubygems-update'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.23'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-2125'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=814718'}, {'type': 'PACKAGE', 'url': 'https://github.com/rubygems/rubygems'}, {'type': 'WEB', 'url': 'https://github.com/rubygems/rubygems/blob/1.8/History.txt'}, {'type': ...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-05-04T21:16:48Z', 'nvd_published_at': '2013-10-01T17:55:00Z'}
1.4.0
GHSA-7jw3-5q4w-89qg
2022-07-06T20:02:51Z
2022-05-13T01:25:20Z
null
['CVE-2016-1181']
Improper Input Validation in Apache Struts
ActionServlet.java in Apache Struts 1 1.x through 1.3.10 mishandles multithreaded access to an ActionForm instance, which allows remote attackers to execute arbitrary code or cause a denial of service (unexpected memory access) via a multipart request, a related issue to CVE-2015-0899.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1181'}, {'type': 'WEB', 'url': 'https://github.com/kawasima/struts1-forever/commit/eda3a79907ed8fcb0387a0496d0cb14332f250e8'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1343538'}, {'type': 'WEB', 'url': 'https://security-t...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:02:51Z', 'nvd_published_at': '2016-07-04T22:59:00Z'}
1.4.0
GHSA-rv8h-p43r-4x5r
2023-08-29T18:04:35Z
2022-05-17T03:46:28Z
null
['CVE-2013-4347']
SimpleGeo python-oauth2 vulnerable to the use of Insufficiently Random Values to generate nonces
The (1) make_nonce, (2) generate_nonce, and (3) generate_verifier functions in SimpleGeo python-oauth2 uses weak random numbers to generate nonces, which makes it easier for remote attackers to guess the nonce via a brute force attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'oauth2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9rc1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4347'}, {'type': 'WEB', 'url': 'https://github.com/simplegeo/python-oauth2/issues/9'}, {'type': 'WEB', 'url': 'https://github.com/simplegeo/python-oauth2/pull/146'}, {'type': 'WEB', 'url': 'https://github.com/joestump/python-oauth2/commit/82dd2cdd4...
{'cwe_ids': ['CWE-330'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T18:04:35Z', 'nvd_published_at': '2014-05-20T14:55:00Z'}
1.4.0
GHSA-x2fm-93ww-ggvx
2023-06-09T23:06:12Z
2022-05-13T01:02:39Z
null
['CVE-2017-16932']
Nokogiri gem, via libxml, is affected by DoS vulnerabilities
parser.c in libxml2 before 2.9.5 does not prevent infinite recursion in parameter entities.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-16932'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/issues/1714'}, {'type': 'WEB', 'url': 'https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961'}, {'type': 'WEB', 'url': 'https://blog.clamav.net/20...
{'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-09T23:06:12Z', 'nvd_published_at': '2017-11-23T21:29:00Z'}
1.4.0
GHSA-c35g-jr5f-h83p
2023-08-03T23:06:53Z
2022-05-13T01:28:46Z
null
['CVE-2017-5591']
SleekXMPP and Slixmpp Incorrect Implementation of Message Carbons
An incorrect implementation of "XEP-0280: Message Carbons" in multiple XMPP clients allows a remote attacker to impersonate any user, including contacts, in the vulnerable application's display. This allows for various kinds of social engineering attacks. This CVE is for SleekXMPP up to 1.3.1 and Slixmpp all versions u...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'slixmpp'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.2.3'}}, {'package': {'ecosystem': 'PyPI', 'name': 'SleekXMPP...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-5591'}, {'type': 'WEB', 'url': 'https://github.com/fritzy/SleekXMPP/issues/442'}, {'type': 'WEB', 'url': 'https://github.com/fritzy/SleekXMPP/commit/285495d5ee2427d93d961ceedcd1829383e5196d'}, {'type': 'WEB', 'url': 'https://github.com/poezio/slixm...
{'cwe_ids': ['CWE-940'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T23:06:53Z', 'nvd_published_at': '2017-02-09T20:59:00Z'}
1.4.0
GHSA-h47x-2j37-fw5m
2022-06-29T13:25:50Z
2022-05-24T17:01:50Z
null
['CVE-2019-10174']
Use of Externally-Controlled Input to Select Classes or Code in Infinispan
A vulnerability was found in Infinispan such that the invokeAccessibly method from the public class ReflectionUtil allows any application class to invoke private methods in any class with Infinispan's privileges. The attacker can use reflection to introduce new, malicious behavior into the application.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.infinispan:infinispan-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.2.12.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.2.11.Final'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.infinispan:infinis...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10174'}, {'type': 'WEB', 'url': 'https://github.com/infinispan/infinispan/commit/5dbb05cfaca01a1a66732b82a0f5ba615ccbd214'}, {'type': 'WEB', 'url': 'https://github.com/infinispan/infinispan/commit/7bdc2822ccf79127a488130239c49a5e944e3ca2'}, {'type'...
{'cwe_ids': ['CWE-470'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T13:25:50Z', 'nvd_published_at': '2019-11-25T11:15:00Z'}
1.4.0
GHSA-7f84-9cqf-g4j9
2023-01-24T16:02:02Z
2022-05-13T01:05:37Z
null
['CVE-2018-18260']
Camaleon CMS vulnerable to Stored Cross-site Scripting
In the 2.4 version of Camaleon CMS, Stored XSS has been discovered. The profile image in the User settings section can be run in the update / upload area via `/admin/media/upload?actions=false`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'camaleon_cms'}, 'versions': ['2.4']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-18260'}, {'type': 'PACKAGE', 'url': 'https://github.com/owen2345/camaleon-cms'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/camaleon_cms/CVE-2018-18260.yml'}, {'type': 'WEB', 'url': 'http://packetstormsecur...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-24T16:02:02Z', 'nvd_published_at': '2018-10-15T19:29:00Z'}
1.4.0
GHSA-6mw4-phmc-x477
2023-07-26T23:32:56Z
2022-05-17T00:32:03Z
null
['CVE-2017-11807']
ChakraCore RCE Vulnerability
ChakraCore and Microsoft Edge in Microsoft Windows 10 1703 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11792, CVE-2017-11793, CVE-20...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-11807'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/3917'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/1330a773c5dbb28af5b58777c709e83cc412f57c'}, {'type': 'WEB', 'url': 'https://portal.msrc...
{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-26T23:32:56Z', 'nvd_published_at': '2017-10-13T13:29:00Z'}
1.4.0
GHSA-6m27-3r8q-c7f7
2023-09-26T19:23:09Z
2022-05-24T17:00:28Z
null
['CVE-2019-8146']
Magento 2 Community Edition XSS Vulnerability
A stored cross-site scripting (XSS) vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated user can inject arbitrary JavaScript code when adding a new customer attribute for stores.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8146'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051105/https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T18:10:21Z', 'nvd_published_at': '2019-11-06T00:15:00Z'}
1.4.0
GHSA-68cp-h96v-gg3x
2023-07-27T21:05:25Z
2022-05-17T02:44:22Z
null
['CVE-2017-0224']
ChakraCore RCE Vulnerability
A remote code execution vulnerability exists in the way JavaScript engines render when handling objects in memory in Microsoft Edge, aka "Scripting Engine Memory Corruption Vulnerability." This CVE ID is unique from CVE-2017-0228, CVE-2017-0229, CVE-2017-0230, CVE-2017-0234, CVE-2017-0235, CVE-2017-0236, and CVE-2017-0...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0224'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/2959'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/f022afb8246acc98e74a887bb655ac512caf6e72'}, {'type': 'WEB', 'url': 'https://portal.msrc....
{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-27T21:05:25Z', 'nvd_published_at': '2017-05-12T14:29:00Z'}
1.4.0
GHSA-h24p-qwf4-84q8
2022-11-22T18:47:34Z
2022-05-17T02:41:57Z
null
['CVE-2017-7669']
Apache Hadoop's LinuxContainerExecutor runs docker commands as root with insufficient input validation
In Apache Hadoop 2.8.0, 3.0.0-alpha1, and 3.0.0-alpha2, the LinuxContainerExecutor runs docker commands as root with insufficient input validation. When the docker feature is enabled, authenticated users can run commands as root. This issue is fixed in versions 2.8.1 and 3.0.0-alpha3.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0-alpha1...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7669'}, {'type': 'WEB', 'url': 'https://mail-archives.apache.org/mod_mbox/hadoop-user/201706.mbox/%3C4A2FDA56-491B-4C2A-915F-C9D4A4BDB92A%40apache.org%3E'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/98795'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T18:47:34Z', 'nvd_published_at': '2017-06-05T01:29:00Z'}
1.4.0
GHSA-gfwj-fwqj-fp3v
2023-07-19T14:39:30Z
2022-05-24T19:03:28Z
null
['CVE-2021-22118']
Improper Privilege Management in Spring Framework
In Spring Framework, versions 5.2.x prior to 5.2.15 and versions 5.3.x prior to 5.3.7, a WebFlux application is vulnerable to a privilege escalation: by (re)creating the temporary storage directory, a locally authenticated malicious user can read or modify files that have been uploaded to the WebFlux application, or ov...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.0'}, {'fixed': '5.2.15'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.14'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-web...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22118'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-framework/issues/26931'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-framework/commit/0d0d75e25322d8161002d861fff3ec04ba8be5ac'}, {'type': 'WEB', 'url...
{'cwe_ids': ['CWE-269', 'CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-22T18:24:11Z', 'nvd_published_at': '2021-05-27T15:15:00Z'}
1.4.0
GHSA-fwqr-3pvp-pjwq
2022-07-01T17:46:29Z
2022-05-13T01:36:54Z
null
['CVE-2017-2608']
Deserialization of Untrusted Data in Jenkins
Jenkins before versions 2.44, 2.32.2 is vulnerable to a remote code execution vulnerability involving the deserialization of various types in javax.imageio in XStream-based APIs (SECURITY-383).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.32.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.34'}, {...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-2608'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenkins/commit/a814154695e23dc37542af7d40cacc129cf70722'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2608'}, {'type': 'PACKAGE', 'url': 'https://github....
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T17:46:29Z', 'nvd_published_at': '2018-05-15T20:29:00Z'}
1.4.0
GHSA-rxvx-44w5-44r7
2022-07-06T20:20:19Z
2022-05-13T01:10:58Z
null
['CVE-2015-2944']
Improper Neutralization of Input During Web Page Generation in Apache Sling
Multiple cross-site scripting (XSS) vulnerabilities in Apache Sling API before 2.2.2 and Apache Sling Servlets Post before 2.1.2 allow remote attackers to inject arbitrary web script or HTML via the URI, related to (1) org/apache/sling/api/servlets/HtmlResponse and (2) org/apache/sling/servlets/post/HtmlResponse.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.sling:org.apache.sling.api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.sling:org.apache.s...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-2944'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/SLING-2082'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r04237d561f3e5bced0a26287454450a34275162aa6b1dbae1b707b31@%3Cdev.sling.apache.org%3E'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:20:19Z', 'nvd_published_at': '2015-06-02T14:59:00Z'}
1.4.0
GHSA-pwh7-92h3-mqr6
2022-07-01T17:11:02Z
2022-05-13T01:45:42Z
null
['CVE-2017-3586']
Exposure of Sensitive Information to an Unauthorized Actor in Oracle MySQL Connectors Java
Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 5.1.41 and earlier. Easily "exploitable" vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Connectors. While the vulnerability i...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'mysql:mysql-connector-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.42'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.1.41'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-3586'}, {'type': 'WEB', 'url': 'http://www.debian.org/security/2017/dsa-3857'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T17:11:02Z', 'nvd_published_at': '2017-04-24T19:59:00Z'}