schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
8
154
details
stringlengths
31
19.1k
severity
stringlengths
2
92
affected
stringlengths
75
28.5k
references
stringlengths
79
7.48k
database_specific
stringlengths
131
196
1.4.0
GHSA-2w2v-xcr9-mj4m
2023-09-25T19:30:06Z
2022-05-24T16:53:08Z
null
['CVE-2019-12618']
Hashicorp Nomad Access Control Issues
HashiCorp Nomad 0.9.0 through 0.9.1 has Incorrect Access Control via the exec driver.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.0'}, {'fixed': '0.9.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12618'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/nomad/issues/5783'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/nomad'}, {'type': 'WEB', 'url': 'https://www.hashicorp.com/blog/category/nomad'}, {'type': 'WEB', 'url': 'ht...
{'cwe_ids': ['CWE-269'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-14T23:37:50Z', 'nvd_published_at': '2019-08-12T17:15:00Z'}
1.4.0
GHSA-xphq-3x6q-q2qq
2023-07-24T20:24:31Z
2022-05-13T01:53:32Z
null
['CVE-2018-8145']
ChakraCore information disclosure vulnerability
An information disclosure vulnerability exists when Chakra improperly discloses the contents of its memory, which could provide an attacker with information to further compromise the user's computer or data, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects ChakraCore, Internet Explorer 11, Mi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8145'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8145'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210124164314/http://www.securityfocus.com/bid/103986'}, {'type': 'WEB', 'url':...
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-24T20:24:31Z', 'nvd_published_at': '2018-05-09T19:29:00Z'}
1.4.0
GHSA-vpr3-f594-mg5g
2022-06-17T22:33:40Z
2022-05-17T03:28:34Z
null
['CVE-2010-1622']
Improper Control of Generation of Code ('Code Injection') in Spring Framework
SpringSource Spring Framework 2.5.x before 2.5.6.SEC02, 2.5.7 before 2.5.7.SR01, and 3.0.x before 3.0.3 allows remote attackers to execute arbitrary code via an HTTP request containing class.classLoader.URLs[0]=jar: followed by a URL of a crafted .jar file.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.5.6'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring'}, 'range...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-1622'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2011:0175'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2010-1622'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=606706'}, {'type'...
{'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T22:33:40Z', 'nvd_published_at': '2010-06-21T16:30:00Z'}
1.4.0
GHSA-qwgx-59jw-qfg9
2022-07-01T11:55:03Z
2022-05-13T01:14:24Z
null
['CVE-2017-5662']
Improper Restriction of XML External Entity Reference in Apache Batik
In Apache Batik before 1.9, files lying on the filesystem of the server which uses batik can be revealed to arbitrary users who send maliciously formed SVG files. The file types that can be shown depend on the user context in which the exploitable application is running. If the user is root a full compromise of the ser...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.xmlgraphics:batik'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-5662'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2546'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:2547'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0319'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T11:55:03Z', 'nvd_published_at': '2017-04-18T14:59:00Z'}
1.4.0
GHSA-m7m4-4vm8-55wg
2022-05-31T21:54:25Z
2022-05-24T17:06:13Z
null
['CVE-2015-8549']
PyAMF vulnerable to XML external entity (XXE)
PyAMF provides Action Message Format (AMF) support for Python that is compatible with the Adobe Flash Player. It includes integration with Python web frameworks like Django, Pylons, Twisted, SQLAlchemy, web2py and more. XML external entity (XXE) vulnerability in PyAMF before 0.8.0 allows remote attackers to cause a den...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pyamf'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8549'}, {'type': 'WEB', 'url': 'https://github.com/hydralabs/pyamf/pull/58'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-m7m4-4vm8-55wg'}, {'type': 'PACKAGE', 'url': 'https://github.com/hydralabs/pyamf'}, {'type': 'WEB', 'url':...
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-31T21:54:25Z', 'nvd_published_at': '2020-01-15T15:15:00Z'}
1.4.0
GHSA-m7cc-6vhg-39wr
2023-08-01T20:15:51Z
2022-05-13T01:12:49Z
null
['CVE-2015-5331']
Moodle improper access control
Moodle 2.9.x before 2.9.3 does not properly check the contact list before authorizing message transmission, which allows remote authenticated users to bypass intended access restrictions and conduct spam attacks via the messaging API.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9'}, {'fixed': '2.9.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5331'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/cd0c9ac87d75b3d893d61df21e3ecfd12c065c1f'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=323228'}, {'type': 'WEB', 'url': 'http://git.moodle.org/gw?p=mood...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T20:15:51Z', 'nvd_published_at': '2016-02-22T05:59:00Z'}
1.4.0
GHSA-j63v-wcf9-c9hm
2023-09-26T18:54:19Z
2022-05-24T17:00:25Z
null
['CVE-2019-8119']
Magento 2 Community Edition RCE Vulnerability
A remote code execution vulnerability exists in Magento 2.1 prior to 2.1.19, Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3. An authenticated admin user with import product privileges can delete files through bulk product import and inject code into XSLT file. The combination of these manipulations can lead to...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.19'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8119'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051105/https://magento.com/security/patches/magento-2.3.3-and-2.2.10-security-update'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T17:42:51Z', 'nvd_published_at': '2019-11-05T23:15:00Z'}
1.4.0
GHSA-h2wq-prv9-2f56
2022-05-24T22:06:26Z
2022-05-24T22:06:26Z
null
['CVE-2022-29192']
Missing validation crashes `QuantizeAndDequantizeV4Grad`
### Impact The implementation of [`tf.raw_ops.QuantizeAndDequantizeV4Grad`](https://github.com/tensorflow/tensorflow/blob/f3b9bf4c3c0597563b289c0512e98d4ce81f886e/tensorflow/core/kernels/quantize_and_dequantize_op.cc#L148-L226) does not fully validate the input arguments. This results in a `CHECK`-failure which can be ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h2wq-prv9-2f56'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29192'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/098e7762d909bac47ce1dbabe6dfd06294cb9d58'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:06:26Z', 'nvd_published_at': '2022-05-20T21:15:00Z'}
1.4.0
GHSA-g7r3-jwhw-2wfv
2023-08-23T17:58:02Z
2022-05-24T17:33:54Z
null
['CVE-2020-23136']
Microweber Insufficient Session Expiry
Microweber v1.1.18 is affected by no session expiry after log-out.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ecosystem_specific': {'affected_functions': ['']}, 'versions': ['1.1.18']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-23136'}, {'type': 'WEB', 'url': 'https://gist.github.com/virendratiwari03/0b0d161e1141fdd74122abbb02fefe17'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}]
{'cwe_ids': ['CWE-613'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T21:47:43Z', 'nvd_published_at': '2020-11-09T18:15:00Z'}
1.4.0
GHSA-jffq-528j-mp6c
2022-06-24T01:26:08Z
2022-05-24T17:12:53Z
null
['CVE-2020-10991']
Improper Restriction of XML External Entity Reference in Mulesoft APIkit
Mulesoft APIkit through 1.3.0 allows XXE because of validation/RestXmlSchemaValidator.java
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'rg.mule.modules:mule-apikit-module'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10991'}, {'type': 'WEB', 'url': 'https://github.com/mulesoft/apikit/issues/547'}]
{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T01:26:08Z', 'nvd_published_at': '2020-03-27T00:15:00Z'}
1.4.0
GHSA-5cxw-8v65-76vf
2022-12-13T18:59:35Z
2022-05-24T17:46:47Z
null
['CVE-2021-21641']
CSRF vulnerability in Jenkins promoted builds Plugin
promoted builds Plugin 3.9 and earlier does not require POST requests for HTTP endpoints implementing promotion (regular, forced, and re-execute), resulting in cross-site request forgery (CSRF) vulnerabilities. These vulnerabilities allow attackers to promote builds. promoted builds Plugin 3.9.1 requires POST request...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:promoted-builds'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.9'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21641'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/promoted-builds-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-04-07/#SECURITY-2293'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secu...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T18:59:35Z', 'nvd_published_at': '2021-04-07T14:15:00Z'}
1.4.0
GHSA-62xg-239j-vxg7
2022-06-17T22:28:38Z
2022-05-02T04:00:27Z
null
['CVE-2009-5011']
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in pyftpdlib
Race condition in the FTPHandler class in ftpserver.py in pyftpdlib before 0.5.2 allows remote attackers to cause a denial of service (daemon outage) by establishing and then immediately closing a TCP connection, leading to the getpeername function having an ENOTCONN error, a different vulnerability than CVE-2010-3494.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'pyftpdlib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.5.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-5011'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-62xg-239j-vxg7'}, {'type': 'PACKAGE', 'url': 'https://github.com/giampaolo/pyftpdlib'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/pyftpd...
{'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T22:28:38Z', 'nvd_published_at': '2010-10-19T20:00:00Z'}
1.4.0
GHSA-hwrx-wc75-mgh7
2023-01-27T00:18:49Z
2022-05-14T02:42:49Z
null
['CVE-2010-3978']
Spree allows remote attackers to obtain sensitive information
Spree 0.11.x before 0.11.2 and 0.30.x before 0.30.0 exchanges data using JavaScript Object Notation (JSON) without a mechanism for validating requests, which allows remote attackers to obtain sensitive information via vectors involving (1) `admin/products.json`, (2) `admin/users.json`, or (3) `admin/overview/get_report...
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'spree'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.11.0'}, {'fixed': '0.11.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'spree'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-3978'}, {'type': 'WEB', 'url': 'https://github.com/railsdog/spree/commit/19944bd999c310d9b10d16a41f48ebac97dc4fac'}, {'type': 'WEB', 'url': 'https://github.com/railsdog/spree/commit/d881b2bb610ea33e2364ff16feb8e702dfeda135'}, {'type': 'WEB', 'url':...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T00:18:49Z', 'nvd_published_at': '2010-11-17T16:00:00Z'}
1.4.0
GHSA-p5x5-jg3j-2jcj
2023-01-05T21:09:57Z
2022-05-24T17:10:30Z
null
['CVE-2020-2159']
OS command injection in CryptoMove Plugin
CryptoMove Plugin 0.1.33 and earlier allows the configuration of an OS command to execute as part of its build step configuration. This command will be executed on the Jenkins controller as the OS user account running Jenkins, allowing user with Job/Configure permission to execute an arbitrary OS command on the Jenkins...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:cryptomove'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.33'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2159'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/cryptomove-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-03-09/#SECURITY-1635'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/...
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-05T21:09:57Z', 'nvd_published_at': '2020-03-09T16:15:00Z'}
1.4.0
GHSA-g3vq-f35v-vhgm
2022-11-22T18:57:12Z
2022-05-13T01:47:06Z
null
['CVE-2017-7684']
Apache OpenMeetings vulnerable to Uncontrolled Resource Consumption
Apache OpenMeetings 1.0.0 doesn't check contents of files being uploaded. An attacker can cause a denial of service by uploading multiple large files to the server.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.openmeetings:openmeetings-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '3.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7684'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/openmeetings'}, {'type': 'WEB', 'url': 'http://markmail.org/message/v6dpmrdd6cgg66up'}, {'type': 'WEB', 'url': 'http://www.securityfocus.com/bid/99584'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T18:57:12Z', 'nvd_published_at': '2017-07-17T13:18:00Z'}
1.4.0
GHSA-h7h6-fwpv-ggvx
2023-07-13T17:04:27Z
2022-05-24T17:44:37Z
null
['CVE-2021-20279']
Moodle contains Stored XSS via ID number user profile field
The ID number user profile field required additional sanitizing to prevent a stored XSS risk in moodle before 3.10.2, 3.9.5, 3.8.8, 3.5.17.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10'}, {'fixed': '3.10.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.10.1'}}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'EC...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20279'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/a7e0ba1e71205ccb0a73dedee414f1a167ee2ed7'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1939033'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject....
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T17:04:27Z', 'nvd_published_at': '2021-03-15T22:15:00Z'}
1.4.0
GHSA-r7p6-fr3x-r877
2023-01-14T05:29:43Z
2022-05-17T05:31:33Z
null
['CVE-2011-3712']
CakePHP 1.3.7 allows remote attackers to obtain sensitive information via a direct request to a .php file
CakePHP 1.3.7 allows remote attackers to obtain sensitive information via a direct request to a `.php` file, which reveals the installation path in an error message, as demonstrated by `dispatcher.php` and certain other files.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.7'}, {'fixed': '1.3.8'}]}], 'versions': ['1.3.7']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-3712'}, {'type': 'PACKAGE', 'url': 'https://github.com/cakephp/cakephp'}, {'type': 'WEB', 'url': 'http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README'}, {'type': 'WEB', 'url': 'http://code.google.com/p/inspathx/source/browse...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-14T05:29:43Z', 'nvd_published_at': '2011-09-23T23:55:00Z'}
1.4.0
GHSA-95q3-pppp-r683
2022-11-01T22:33:40Z
2022-05-14T01:38:24Z
null
['CVE-2018-1330']
Crash when decoding malformed HTTP requests or malformed JSON payload
When parsing a malformed JSON payload, libprocess in Apache Mesos versions 1.4.0 to 1.5.0 might crash due to an uncaught exception. Parsing chunked HTTP requests with trailers can lead to a libprocess crash too because of the mistakenly planted assertion. A malicious actor can therefore cause a denial of service of Mes...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.mesos:mesos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.6.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1330'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/395cb6bcf367702acd1e580a1f39b56cdd7a5953d0368b4c1adb1dde@<dev.mesos.apache.org>'}]
{'cwe_ids': ['CWE-248'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T22:33:40Z', 'nvd_published_at': '2018-09-13T19:29:00Z'}
1.4.0
GHSA-v6xv-rmqc-wcc8
2023-08-16T22:31:44Z
2022-05-17T03:45:52Z
null
['CVE-2014-9508']
Typo3 Open Redirect In Frontend Rendering
The frontend rendering component in TYPO3 4.5.x before 4.5.39, 4.6.x through 6.2.x before 6.2.9, and 7.x before 7.0.2, allows remote attackers to change URLs to arbitrary domains. An attacker could forge a request which modifies anchor only links on the homepage of a TYPO3 installation such that they point to arbitrar...
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.5.0'}, {'fixed': '4.5.39'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.5.38'}}, {'package': {'ecosystem': 'Packagist', ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-9508'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2016-08/msg00106.html'}, {'type': 'WEB', 'url': 'http://typo3.org/teams/security/security-bulletins/typo3-core/typo3-core-sa-2014-003/'}]
{'cwe_ids': ['CWE-59'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T22:31:44Z', 'nvd_published_at': '2015-01-04T21:59:00Z'}
1.4.0
GHSA-9rvw-7mx7-h53x
2022-12-21T00:20:43Z
2022-05-24T17:27:06Z
null
['CVE-2020-2241']
CSRF vulnerability in Jenkins Database Plugin
A cross-site request forgery (CSRF) vulnerability in Jenkins database Plugin 1.6 and earlier allows attackers to connect to an attacker-specified database server using attacker-specified credentials. Database Plugin 1.7 requires POST requests for the affected form validation method.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:database'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.6'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2241'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/database-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-09-01/#SECURITY-1024'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/09...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T00:20:43Z', 'nvd_published_at': '2020-09-01T14:15:00Z'}
1.4.0
GHSA-7c7v-g484-j4cf
2023-07-21T18:39:24Z
2022-05-13T01:18:42Z
null
['CVE-2018-0993']
ChakraCore RCE Vulnerability
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-0979, CVE-2018-0980, CVE-2018-0990, CVE-2018-0...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-0993'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/4bdd0efb1c309a0307cdfbd2856ca8cd88b154bb'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0993'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T18:39:24Z', 'nvd_published_at': '2018-04-12T01:29:00Z'}
1.4.0
GHSA-5g7f-p7jg-v6mv
2023-01-26T23:56:32Z
2022-05-14T03:47:43Z
null
['CVE-2014-4998']
lean-ruport allows local users to obtain sensitive information by listing the process
`test/tc_database.rb` in the lean-ruport gem 0.3.8 for Ruby places the mysql user password on the mysqldump command line, which allows local users to obtain sensitive information by listing the process.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'lean-ruport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.3.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-4998'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/07/07/18'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/07/17/5'}, {'type': 'WEB', 'url': 'http://www.vapid.dhs.org/advisories/lean-ruport-0...
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-26T23:56:32Z', 'nvd_published_at': '2018-01-10T18:29:00Z'}
1.4.0
GHSA-g7p7-x6w7-w6qg
2022-05-24T22:19:58Z
2022-05-04T00:00:19Z
null
['CVE-2022-27313']
Arbitrary file deletion in gitea
An arbitrary file deletion vulnerability in Gitea v1.16.3 allows attackers to cause a Denial of Service (DoS) via deleting the configuration file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'code.gitea.io/gitea'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27313'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/19072'}, {'type': 'PACKAGE', 'url': 'https://github.com/go-gitea/gitea'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/releases/tag/v1.16.4'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:19:58Z', 'nvd_published_at': '2022-05-03T20:15:00Z'}
1.4.0
GHSA-57q5-x8jf-g7h8
2022-07-01T11:43:57Z
2022-05-13T01:47:01Z
null
['CVE-2017-7561']
Inconsistent Interpretation of HTTP Requests in Red Hat JBoss EAP
Red Hat JBoss EAP version 3.0.7.Final until 3.0.25.Final, 3.5.0.CR1, and 4.0.0.Beta1 is vulnerable to a server-side cache poisoning or CORS requests in the JAX-RS component resulting in a moderate impact.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteas:resteasy-jaxrs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.7.Final'}, {'fixed': '3.0.25.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.24.Final'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jboss....
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7561'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0002'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0003'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0004'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-444'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T11:43:57Z', 'nvd_published_at': '2017-09-13T17:29:00Z'}
1.4.0
GHSA-38pm-74xc-phcw
2022-12-14T16:12:42Z
2022-05-24T19:04:53Z
null
['CVE-2021-21665']
CSRF vulnerability in Jenkins XebiaLabs XL Deploy Plugin allows capturing credentials
A cross-site request forgery (CSRF) vulnerability in Jenkins XebiaLabs XL Deploy Plugin 10.0.1 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing Username/password credentials stored in Jenkins. XebiaLabs XL Deploy Pl...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.xebialabs.deployit.ci:deployit-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.0.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.0.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21665'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/xldeploy-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-06-10/#SECURITY-1982'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/20...
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-14T16:12:42Z', 'nvd_published_at': '2021-06-10T15:15:00Z'}
1.4.0
GHSA-7xp8-7wqx-5hqx
2022-12-19T21:14:28Z
2022-05-24T17:07:41Z
null
['CVE-2020-2105']
Jenkins REST APIs vulnerable to clickjacking
Jenkins 2.218 and earlier, LTS 2.204.1 and earlier does not serve the `X-Frame-Options: deny` HTTP header on REST API responses to protect against clickjacking attacks. An attacker could exploit this by routing the victim through a specially crafted web page that embeds a REST API endpoint in an iframe and tricking the...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.204.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.204.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2105'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2020:0402'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2020:0675'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2020:0681'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-1021'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-19T21:14:28Z', 'nvd_published_at': '2020-01-29T16:15:00Z'}
1.4.0
GHSA-9pvj-pgg9-pvqq
2023-07-20T18:13:07Z
2022-05-13T01:18:33Z
null
['CVE-2018-0859']
ChakraCore RCE Vulnerability
Microsoft Edge and ChakraCore in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0834, CVE-2018-0835, CVE-2018-0...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-0859'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/8a2c3730f9fd775380dc8226dbf3a697c691b73d'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0859'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T18:13:07Z', 'nvd_published_at': '2018-02-15T02:29:00Z'}
1.4.0
GHSA-226h-qrg4-8236
2022-12-29T01:44:53Z
2022-05-24T17:28:26Z
null
['CVE-2020-2269']
Stored XSS vulnerability in chosen-views-tabbar Plugin
Jenkins chosen-views-tabbar Plugin 1.2 and earlier does not escape view names in the dropdown to select views, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with the ability to configure views.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:chosen-views-tabbar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2269'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/chosen-views-tabbar'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1869'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-29T01:44:53Z', 'nvd_published_at': '2020-09-16T14:15:00Z'}
1.4.0
GHSA-wx2w-8pqw-vp4g
2022-11-22T19:03:08Z
2022-05-24T17:11:49Z
null
['CVE-2019-20528']
Ignite Realtime Openfire allows Cross-site Scripting
Ignite Realtime Openfire 4.4.1 allows XSS via the setup/setup-datasource-standard.jsp username parameter. This issue was fixed in version 4.4.2.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.igniterealtime.openfire:xmppserver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-20528'}, {'type': 'WEB', 'url': 'https://www.netsparker.com/web-applications-advisories/ns-19-015-reflected-cross-site-scripting-in-openfire/'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T19:03:08Z', 'nvd_published_at': '2020-03-18T19:15:00Z'}
1.4.0
GHSA-cpv6-pfq6-j2v7
2023-01-27T00:52:53Z
2022-05-13T01:36:51Z
null
['CVE-2017-2662']
katello Improper Privilege Management vulnerability
A flaw was found in Foreman's katello plugin version 3.4.5. After setting a new role to allow restricted access on a repository with a filter (filter set on the Product Name), the filter is not respected when the actions are done via hammer using the repository id.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'katello'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.17.0.rc1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-2662'}, {'type': 'WEB', 'url': 'https://github.com/Katello/katello/pull/8772'}, {'type': 'WEB', 'url': 'https://github.com/Katello/katello/commit/853260e3e9f94179d5881199e7885d1c08e600f6'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_b...
{'cwe_ids': ['CWE-269'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T00:52:53Z', 'nvd_published_at': '2018-08-22T16:29:00Z'}
1.4.0
GHSA-gqqm-564f-vvxq
2023-08-16T09:30:57Z
2022-05-14T01:57:02Z
null
['CVE-2013-2134']
Arbitrary code execution in Apache Struts 2
Apache Struts 2 before 2.3.14.3 allows remote attackers to execute arbitrary OGNL code via a request with a crafted action name that is not properly handled during wildcard matching, a different vulnerability than CVE-2013-2135.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.14.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2134'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/WW/S2-015'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/struts'}, {'type': 'WEB', 'url': 'http://security.gentoo.org/glsa/glsa-201409-04.xml'}, {'type': 'WEB', '...
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T21:07:40Z', 'nvd_published_at': '2013-07-16T18:55:00Z'}
1.4.0
GHSA-6m48-jxwx-76q7
2022-07-08T19:07:27Z
2022-05-14T01:10:35Z
null
['CVE-2013-2067']
Improper Authentication in Apache Tomcat
java/org/apache/catalina/authenticator/FormAuthenticator.java in the form authentication feature in Apache Tomcat 6.0.21 through 6.0.36 and 7.x before 7.0.33 does not properly handle the relationships between authentication requirements and sessions, which allows remote attackers to inject a request into a session by s...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.21'}, {'fixed': '6.0.37'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2067'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271a...
{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T19:07:27Z', 'nvd_published_at': '2013-06-01T14:21:00Z'}
1.4.0
GHSA-mjqc-5c9x-xfcc
2022-06-08T22:35:32Z
2022-05-18T00:00:34Z
2022-06-08T22:35:32Z
[]
Duplicate advisory: Configuration exposure in github.com/coreos/ignition
## Duplicate Advisory This advisory is a duplicate of [GHSA-hj57-j5cw-2mwp](https://github.com/advisories/GHSA-hj57-j5cw-2mwp). This link is preserved to maintain external references. ## Original Description A vulnerability was found in Ignition where ignition configs are accessible from unprivileged containers in VMs...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/coreos/ignition/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.14.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1706'}, {'type': 'WEB', 'url': 'https://github.com/coreos/ignition/issues/1300'}, {'type': 'WEB', 'url': 'https://github.com/coreos/ignition/issues/1315'}, {'type': 'WEB', 'url': 'https://github.com/coreos/ignition/pull/1350'}, {'type': 'WEB', 'url...
{'cwe_ids': ['CWE-200', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T19:37:07Z', 'nvd_published_at': '2022-05-17T18:15:00Z'}
1.4.0
GHSA-vhqr-3gr2-7px9
2023-08-28T23:12:07Z
2022-05-14T02:00:54Z
null
['CVE-2018-14840']
Subrion CMS Cross-site Scripting
`uploads/.htaccess` in Subrion CMS 4.2.1 allows XSS because it does not block .html file uploads (but does block, for example, .htm file uploads).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'intelliants/subrion'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14840'}, {'type': 'WEB', 'url': 'https://github.com/intelliants/subrion/issues/773'}, {'type': 'WEB', 'url': 'https://github.com/intelliants/subrion/commit/b12e287d3814c0f2d0b1892f95fc0190972d2ba5'}, {'type': 'WEB', 'url': 'https://github.com/intel...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-28T23:12:07Z', 'nvd_published_at': '2018-08-02T01:29:00Z'}
1.4.0
GHSA-42q4-9xf9-f67x
2022-08-11T18:25:38Z
2022-05-24T19:20:31Z
null
['CVE-2021-41972']
Apache Superset allowed for database connections password leak for authenticated users
Apache Superset up to and including 1.3.1 allowed for database connections password leak for authenticated users. This information could be accessed in a non-trivial way.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41972'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-42q4-9xf9-f67x'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/superset/'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/apache-s...
{'cwe_ids': ['CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-21T20:09:18Z', 'nvd_published_at': '2021-11-12T19:15:00Z'}
1.4.0
GHSA-98hq-3qvg-pg78
2023-03-09T00:35:52Z
2022-05-13T01:31:05Z
null
['CVE-2017-14506']
Gem in a Box vulnerable to Cross-site Scripting
geminabox (aka Gem in a Box) before 0.13.6 is vulnerable to Cross-site Scripting (XSS), as demonstrated by uploading a gem file that has a crafted gem.homepage value in its .gemspec file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'geminabox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-14506'}, {'type': 'WEB', 'url': 'https://github.com/geminabox/geminabox/commit/99aaae196c4fc6ae0df28e186ca1e493ae658e02'}, {'type': 'PACKAGE', 'url': 'https://github.com/geminabox/geminabox'}, {'type': 'WEB', 'url': 'https://github.com/geminabox/ge...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-03-09T00:35:52Z', 'nvd_published_at': '2017-09-25T08:29:00Z'}
1.4.0
GHSA-wv8g-fx9j-q2jg
2023-08-16T23:11:59Z
2022-05-17T03:57:46Z
null
['CVE-2014-7217']
phpMyAdmin cross-site scripting Vulnerability via ENUM value
Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 4.0.x before 4.0.10.4, 4.1.x before 4.1.14.5, and 4.2.x before 4.2.9.1 allow remote authenticated users to inject arbitrary web script or HTML via a crafted ENUM value that is improperly handled during rendering of the (1) table search or (2) table struc...
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.10.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ecosystem_specific': {'a...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-7217'}, {'type': 'WEB', 'url': 'https://github.com/phpmyadmin/phpmyadmin/commit/304fb2b645b36a39e03b954fdbd567173ebe6448'}, {'type': 'WEB', 'url': 'https://github.com/phpmyadmin/phpmyadmin/commit/c1a3f85fbd1a9569646e7cf1b791325ae82c7961'}, {'type':...
{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T23:11:59Z', 'nvd_published_at': '2014-10-03T01:55:00Z'}
1.4.0
GHSA-5hjh-c26m-xw8w
2022-05-04T20:14:02Z
2022-05-03T00:00:44Z
null
['CVE-2022-25850']
ProxyScotch is vulnerable to a server-side Request Forgery (SSRF)
ProxyScotch is a simple proxy server created for hoppscotch.io. The package github.com/hoppscotch/proxyscotch before 1.0.0 are vulnerable to Server-side Request Forgery (SSRF) when interceptor mode is set to proxy. It occurs when an HTTP request is made by a backend server to an untrusted URL submitted by a user. It le...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hoppscotch/proxyscotch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25850'}, {'type': 'WEB', 'url': 'https://github.com/hoppscotch/proxyscotch/commit/de67380f62f907f201d75854b76024ba4885fab7'}, {'type': 'PACKAGE', 'url': 'https://github.com/hoppscotch/proxyscotch'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK...
{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-04T20:14:02Z', 'nvd_published_at': '2022-05-01T16:15:00Z'}
1.4.0
GHSA-92pg-8g57-hqpx
2022-12-13T18:58:12Z
2022-05-24T17:43:01Z
null
['CVE-2021-21621']
Support bundles can include user session IDs in Jenkins Support Core Plugin
Support Core Plugin 2.72 and earlier provides the serialized user authentication as part of the \"About user (basic authentication details only)\" information (`user.md`). In some configurations, this can include the session ID of the user creating the support bundle. Attackers with access to support bundle content an...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:support-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.72.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.72'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21621'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/support-core-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-02-24/#SECURITY-2150'}]
{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T18:58:12Z', 'nvd_published_at': '2021-02-24T16:15:00Z'}
1.4.0
GHSA-66rm-wg7m-8pgv
2022-12-28T22:44:27Z
2022-05-24T17:28:27Z
null
['CVE-2020-2273']
CSRF vulnerability in ElasTest Plugin
A cross-site request forgery (CSRF) vulnerability in Jenkins ElasTest Plugin 1.2.1 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:elastest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2273'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/elastest-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1903'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/202...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-28T22:44:27Z', 'nvd_published_at': '2020-09-16T14:15:00Z'}
1.4.0
GHSA-w6pw-5gh5-4952
2023-08-29T21:30:16Z
2022-05-17T04:32:00Z
null
['CVE-2012-5495']
Plone python code injection
python_scripts.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via a crafted URL, related to "go_back."
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'E...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-5495'}, {'type': 'WEB', 'url': 'https://github.com/plone/Products.CMFPlone/blob/4.2.3/docs/CHANGES.txt'}, {'type': 'WEB', 'url': 'https://plone.org/products/plone-hotfix/releases/20121106'}, {'type': 'WEB', 'url': 'https://plone.org/products/plone/...
{'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T21:30:16Z', 'nvd_published_at': '2014-09-30T14:55:00Z'}
1.4.0
GHSA-wmr8-25ff-ggpj
2022-06-28T23:28:29Z
2022-05-13T01:01:02Z
null
['CVE-2018-1999004']
Incorrect Authorization in Jenkins
A Improper authorization vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in SlaveComputer.java that allows attackers with Overall/Read permission to initiate agent launches, and abort in-progress agent launches.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.121.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.122'},...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1999004'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-07-18/#SECURITY-892'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}...
{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T23:28:29Z', 'nvd_published_at': '2018-07-23T19:29:00Z'}
1.4.0
GHSA-9f9r-w3xq-f722
2023-09-28T20:41:18Z
2022-05-14T01:38:19Z
null
['CVE-2019-7168']
Croogo vulnerable to XSS in Blog field
A stored-self XSS exists in Croogo through v3.0.5, allowing an attacker to execute HTML or JavaScript code in a vulnerable Blog field to `/admin/nodes/nodes/add/blog`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'croogo/croogo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.5'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7168'}, {'type': 'WEB', 'url': 'https://github.com/croogo/croogo/issues/886'}, {'type': 'WEB', 'url': 'https://github.com/croogo/croogo/commit/cafaaabe2cef3d1d83652370e30563e6ad7c4158'}, {'type': 'PACKAGE', 'url': 'https://github.com/croogo/croogo'...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-19T21:20:43Z', 'nvd_published_at': '2019-01-29T18:29:00Z'}
1.4.0
GHSA-88fh-8979-q2rr
2023-07-25T18:49:01Z
2022-05-14T03:04:23Z
null
['CVE-2018-13339']
Angular Redactor XSS Vulnerability
Imperavi Redactor 3 in Angular Redactor 1.1.6, when HTML content mode is used, allows stored XSS, as demonstrated by an onerror attribute of an IMG element, a related issue to CVE-2018-7035.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'angular-redactor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-13339'}, {'type': 'WEB', 'url': 'https://github.com/TylerGarlick/angular-redactor/issues/77'}, {'type': 'WEB', 'url': 'https://github.com/gleez/cms/issues/796'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T18:49:01Z', 'nvd_published_at': '2018-07-05T22:29:00Z'}
1.4.0
GHSA-cmxj-wx9v-52qr
2022-07-07T22:38:20Z
2022-05-14T03:59:54Z
null
['CVE-2014-3604']
Improper Validation of Certificate with Host Mismatch in Not Yet Commons SSL
Certificates.java in Not Yet Commons SSL before 0.3.15 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'ca.juliusdavies:not-yet-commons-ssl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.15'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3604'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1131803'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/97659'}, {'type': 'WEB', 'url': 'https://github.com/victims/victims-cve-db/blob/mast...
{'cwe_ids': ['CWE-297'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T22:38:20Z', 'nvd_published_at': '2014-10-25T00:55:00Z'}
1.4.0
GHSA-5fq9-x9f4-x2r2
2022-12-07T18:14:25Z
2022-05-13T01:48:38Z
null
['CVE-2018-1000608']
Jenkins z/OS Connector Plugin allows local attacker to retrieve configured password
A exposure of sensitive information vulnerability exists in Jenkins z/OS Connector Plugin 1.2.6.1 and earlier in SCLMSCM.java that allows an attacker with local file system access or control of a Jenkins administrator's web browser (e.g. malicious extension) to retrieve the configured password. IBM z/OS Connector Plugi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:zos-connector'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.2.6.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000608'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/zos-connector-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-06-25/#SECURITY-950'}]
{'cwe_ids': ['CWE-522'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-07T18:14:25Z', 'nvd_published_at': '2018-06-26T17:29:00Z'}
1.4.0
GHSA-79h8-7735-v3f9
2022-12-28T22:49:00Z
2022-05-24T17:28:27Z
null
['CVE-2020-2276']
System command execution vulnerability in Selection tasks Jenkins Plugin
Jenkins Selection tasks Plugin 1.0 and earlier executes a user-specified program on the Jenkins controller, allowing attackers with Job/Configure permission to execute an arbitrary system command on the Jenkins controller as the OS user that the Jenkins process is running as.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jvnet.hudson.plugins:selection-tasks-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2276'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/selection-tasks-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1967'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secur...
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-28T22:49:00Z', 'nvd_published_at': '2020-09-16T14:15:00Z'}
1.4.0
GHSA-5wrx-85mr-7hrg
2023-07-21T17:58:33Z
2022-05-13T01:20:43Z
null
['CVE-2018-8266']
ChakraCore RCE Vulnerability
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8380, CVE-2018-8381, CVE-2018-8384.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8266'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/5596'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/d52c72d247cfe6348ae563c6bb4118aa8c42aabf'}, {'type': 'WEB', 'url': 'https://portal.msrc....
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T17:58:33Z', 'nvd_published_at': '2018-08-15T17:29:00Z'}
1.4.0
GHSA-xvgx-668j-f67p
2023-09-28T19:53:57Z
2022-05-24T17:17:57Z
null
['CVE-2019-20389']
Subrion CMS XSS
An XSS issue was identified on the Subrion CMS 4.2.1 /panel/configuration/general settings page. A remote attacker can inject arbitrary JavaScript code in the `v[language_switch]` parameter (within multipart/form-data), which is reflected back within a user's browser without proper output encoding.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'intelliants/subrion'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-20389'}, {'type': 'PACKAGE', 'url': 'https://github.com/intelliants/subrion'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/157699/Subrion-CMS-4.2.1-Cross-Site-Scripting.html'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T22:46:44Z', 'nvd_published_at': '2020-05-15T18:15:00Z'}
1.4.0
GHSA-6h5x-7c5m-7cr7
2022-05-25T19:28:43Z
2022-05-13T00:01:12Z
null
['CVE-2022-1650']
Exposure of Sensitive Information in eventsource
When fetching an url with a link to an external site (Redirect), the users Cookies & Autorisation headers are leaked to the third party application. According to the same-origin-policy, the header should be "sanitized."
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'eventsource'}, 'ecosystem_specific': {'affected_functions': ['EventSource']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'eventsource'}, 'ecosystem_specific': {'affected_functions': ['EventS...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1650'}, {'type': 'WEB', 'url': 'https://github.com/EventSource/eventsource/pull/273#issuecomment-1127624508'}, {'type': 'WEB', 'url': 'https://github.com/EventSource/eventsource/commit/f9f6416567bff62c1af2f4314be51d9870e94bc2'}, {'type': 'WEB', 'ur...
{'cwe_ids': ['CWE-200', 'CWE-212'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T19:27:47Z', 'nvd_published_at': '2022-05-12T11:15:00Z'}
1.4.0
GHSA-2pp9-r4rv-6p6j
2022-06-28T23:42:00Z
2022-05-14T01:05:26Z
null
['CVE-2018-1999006']
Exposure of Sensitive Information to an Unauthorized Actor in Jenkins
A exposure of sensitive information vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in Plugin.java that allows attackers to determine the date and time when a plugin HPI/JPI file was last extracted, which typically is the date of the most recent installation/upgrade.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.121.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.122'},...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1999006'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-07-18/#SECURITY-925'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T23:42:00Z', 'nvd_published_at': '2018-07-23T19:29:00Z'}
1.4.0
GHSA-gwfg-cqmg-cf8f
2023-03-08T19:59:16Z
2022-05-24T17:30:10Z
null
['CVE-2020-25613']
WEBRick vulnerable to HTTP Request/Response Smuggling
An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check), whic...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'webrick'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25613'}, {'type': 'WEB', 'url': 'https://github.com/ruby/webrick/commit/076ac636bf48b7a492887ce4de7041de23e6c00d'}, {'type': 'WEB', 'url': 'https://github.com/ruby/webrick/commit/8946bb38b4d87549f0d99ed73c62c41933f97cc7'}, {'type': 'WEB', 'url': 'h...
{'cwe_ids': ['CWE-444'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-08T19:59:16Z', 'nvd_published_at': '2020-10-06T13:15:00Z'}
1.4.0
GHSA-jjmg-xmq2-g6ff
2023-09-26T19:25:55Z
2022-05-24T17:00:28Z
null
['CVE-2019-8152']
Magento 2 Community Edition XSS Vulnerability
A stored cross-site scripting (XSS) vulnerability exists in in Magento 1 prior to 1.9.4.3 and 1.14.4.3, Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated user with access to the wysiwyg editor can abuse the `blockDirective()` function and inject malicious javascript in the cache of t...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-8152'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20211209030216/https://magento.com/security/patches/supee-11219'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T18:13:44Z', 'nvd_published_at': '2019-11-06T00:15:00Z'}
1.4.0
GHSA-5vmg-x99g-396q
2023-08-22T14:38:20Z
2022-05-24T17:24:28Z
null
['CVE-2020-13970']
Shopware vulnerable to SSRF
Shopware before 6.2.3 is vulnerable to a Server-Side Request Forgery (SSRF) in its "Mediabrowser upload by URL" feature. This allows an authenticated user to send HTTP, HTTPS, FTP, and SFTP requests on behalf of the Shopware platform server.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.2.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13970'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-07-2020'}, {'type': 'PACKAGE', 'url': 'https://github.com/shopware/platform'}, {'type': 'WEB', 'url': 'https://www.shopware.com/en/changelo...
{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T21:05:17Z', 'nvd_published_at': '2020-07-28T21:15:00Z'}
1.4.0
GHSA-7jf5-p556-75pr
2022-12-06T21:35:55Z
2022-05-24T16:59:37Z
null
['CVE-2019-10470']
Jenkins Kubernetes CI/CD Plugin vulnerable to Credential Enumeration
A missing permission check in Jenkins ElasticBox Jenkins Kubernetes CI/CD Plugin in form-related methods allowed users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins. ## Note: Jenkins has suspended distribution of this plugin.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.elasticbox.jenkins-ci.plugins:kubernetes-ci'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10470'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/kubernetes-ci-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1005%20(2)'}, {'type': 'WEB', 'url': 'https://plugins.jenkins.io/kubernetes-...
{'cwe_ids': ['CWE-276', 'CWE-285'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T21:35:55Z', 'nvd_published_at': '2019-10-23T13:15:00Z'}
1.4.0
GHSA-vqh4-crjf-jjxx
2023-07-28T23:19:01Z
2022-05-14T02:11:54Z
null
['CVE-2016-1866']
Salt Improper Access Control
Salt 2015.8.x before 2015.8.4 does not properly handle clear messages on the minion, which allows man-in-the-middle attackers to execute arbitrary code by inserting packets into the minion-master data stream.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'salt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2015.8'}, {'fixed': '2015.8.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1866'}, {'type': 'WEB', 'url': 'https://docs.saltstack.com/en/latest/topics/releases/2015.8.4.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/saltstack/salt'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2016-03/msg000...
{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T23:19:01Z', 'nvd_published_at': '2016-04-12T14:59:00Z'}
1.4.0
GHSA-hf62-5vxh-jpwj
2023-08-01T23:40:34Z
2022-05-24T17:01:23Z
null
['CVE-2019-18985']
Pimcore 2FA Vulnerable to Brute Forcing
Pimcore before 6.2.2 lacks brute force protection for the 2FA token.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-18985'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/9f2d075243a8392c114d9a8028858b9faf041e2d'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/compare/v6.2.1...v6.2.2'}]
{'cwe_ids': ['CWE-307'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T23:40:34Z', 'nvd_published_at': '2019-11-15T05:15:00Z'}
1.4.0
GHSA-8486-h39x-cx2f
2022-11-08T23:05:43Z
2022-05-13T01:48:39Z
null
['CVE-2018-1000610']
Jenkins Configuration as Code Plugin has Insufficiently Protected Credentials
A exposure of sensitive information vulnerability exists in Jenkins Configuration as Code Plugin 0.7-alpha and earlier in DataBoundConfigurator.java, Attribute.java, BaseConfigurator.java, ExtensionConfigurator.java that allows attackers with access to Jenkins log files to obtain the passwords configured using Configur...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins:configuration-as-code'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8-alpha'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000610'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-06-25/#SECURITY-929'}]
{'cwe_ids': ['CWE-522'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-08T23:05:43Z', 'nvd_published_at': '2018-06-26T17:29:00Z'}
1.4.0
GHSA-3fj4-q72x-x2g9
2023-07-31T19:43:14Z
2022-05-17T02:37:05Z
null
['CVE-2016-7405']
ADOdb Library SQL Injection
The `qstr` method in the PDO driver in the ADOdb Library for PHP before 5.x before 5.20.7 might allow remote attackers to conduct SQL injection attacks via vectors related to incorrect quoting.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'adodb/adodb-php'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0'}, {'fixed': '5.20.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-7405'}, {'type': 'WEB', 'url': 'https://github.com/ADOdb/ADOdb/issues/226'}, {'type': 'WEB', 'url': 'https://github.com/ADOdb/ADOdb/commit/bd9eca9f40220f9918ec3cc7ae9ef422b3e448b8'}, {'type': 'WEB', 'url': 'https://github.com/ADOdb/ADOdb/blob/v5.20...
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T19:43:14Z', 'nvd_published_at': '2016-10-03T18:59:00Z'}
1.4.0
GHSA-6qr6-x7jm-x2q6
2022-07-06T20:13:55Z
2022-05-14T01:10:16Z
null
['CVE-2015-5174']
Improper Limitation of a Pathname to a Restricted Directory in Apache Tomcat
Directory traversal vulnerability in RequestUtil.java in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.65, and 8.x before 8.0.27 allows remote authenticated users to bypass intended SecurityManager restrictions and list a parent directory via a /.. (slash dot dot) in a pathname used by a web application in a getResou...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0.RC1'}, {'fixed': '8.0.27'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.0.26'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ran...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5174'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:1432'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:1433'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:1434'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:13:55Z', 'nvd_published_at': '2016-02-25T01:59:00Z'}
1.4.0
GHSA-r642-gv9p-2wjj
2022-05-24T20:47:34Z
2022-05-24T20:47:34Z
null
['CVE-2022-29165']
Argo CD will blindly trust JWT claims if anonymous access is enabled
### Impact A critical vulnerability has been discovered in Argo CD which would allow unauthenticated users to impersonate as any Argo CD user or role, including the `admin` user, by sending a specifically crafted JSON Web Token (JWT) along with the request. In order for this vulnerability to be exploited, [anonymous a...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed...
[{'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/security/advisories/GHSA-r642-gv9p-2wjj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29165'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/releases/tag/v2.1.15'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/...
{'cwe_ids': ['CWE-200', 'CWE-287', 'CWE-290'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T20:47:34Z', 'nvd_published_at': '2022-05-20T15:15:00Z'}
1.4.0
GHSA-j448-j653-r3vj
2023-08-17T23:32:17Z
2022-05-14T01:10:36Z
null
['CVE-2013-4286']
Apache Tomcat is vulnerable to HTTP request-smuggling
Apache Tomcat before 6.0.39, 7.x before 7.0.47, and 8.x before 8.0.0-RC3, when an HTTP connector or AJP connector is used, does not properly handle certain inconsistent HTTP request headers, which allows remote attackers to trigger incorrect identification of a request's length and conduct request-smuggling attacks via...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.39'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4286'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1069921'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=e...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-17T23:32:17Z', 'nvd_published_at': '2014-02-26T14:55:00Z'}
1.4.0
GHSA-w6q7-ww2x-7gm3
2022-06-17T22:33:12Z
2022-05-02T06:19:37Z
null
['CVE-2010-1157']
Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat
Apache Tomcat 5.5.0 through 5.5.29 and 6.0.0 through 6.0.26 might allow remote attackers to discover the server's hostname or IP address by sending a request for a resource that requires (1) BASIC or (2) DIGEST authentication, and then reading the realm field in the WWW-Authenticate header in the reply.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.5.0'}, {'fixed': '5.5.30'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.5.29'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2010-1157'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T22:33:12Z', 'nvd_published_at': '2010-04-23T14:30:00Z'}
1.4.0
GHSA-2g32-2j8w-2qgf
2022-12-12T21:05:12Z
2022-05-14T03:23:41Z
null
['CVE-2018-1000153']
Jenkins vSphere Plugin Cross-Site Request Forgery vulnerability
A cross-site request forgery vulnerability exists in Jenkins vSphere Plugin 2.16 and older in Clone.java, CloudSelectorParameter.java, ConvertToTemplate.java, ConvertToVm.java, Delete.java, DeleteSnapshot.java, Deploy.java, ExposeGuestInfo.java, FolderVSphereCloudProperty.java, PowerOff.java, PowerOn.java, Reconfigure....
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:vsphere-cloud'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.17'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.16'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000153'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/vsphere-cloud-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2018-03-26/#SECURITY-745'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T21:05:12Z', 'nvd_published_at': '2018-04-05T13:29:00Z'}
1.4.0
GHSA-h86h-8ppg-mxmh
2023-02-08T00:35:49Z
2022-05-24T19:03:29Z
null
['CVE-2021-31525']
golang.org/x/net/http/httpguts vulnerable to Uncontrolled Recursion
net/http in Go before 1.15.12 and 1.16.x before 1.16.4 allows remote attackers to cause a denial of service (panic) via a large header to ReadRequest or ReadResponse. Server, Transport, and Client can each be affected in some configurations.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'golang.org/x/net/http/httpguts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20210428140749-89ef3d95e781'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'golang.org/x/net'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31525'}, {'type': 'WEB', 'url': 'https://github.com/golang/go/issues/45710'}, {'type': 'PACKAGE', 'url': 'https://github.com/golang/go'}, {'type': 'WEB', 'url': 'https://go.dev/cl/313069'}, {'type': 'WEB', 'url': 'https://go.dev/issue/45710'}, {'ty...
{'cwe_ids': ['CWE-674'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T00:35:49Z', 'nvd_published_at': '2021-05-27T13:15:00Z'}
1.4.0
GHSA-33vg-hpx5-pfxg
2023-01-26T23:53:25Z
2022-05-05T00:29:10Z
null
['CVE-2013-4593']
omniauth-facebook Improper Authentication vulnerability
RubyGem omniauth-facebook has an access token security vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'omniauth-facebook'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4593'}, {'type': 'WEB', 'url': 'https://github.com/simi/omniauth-facebook/commit/115c0a768cd6f4b9bfae8900f8e3fc4fbeec3ad8'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/89040'}, {'type': 'PACKAGE', 'url': 'https://g...
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-26T23:53:25Z', 'nvd_published_at': '2019-12-11T14:15:00Z'}
1.4.0
GHSA-6q4g-84f3-mw74
2022-12-15T17:39:41Z
2022-05-24T19:16:59Z
null
['CVE-2021-21682']
Improper handling of equivalent directory names on Windows in Jenkins
Jenkins stores jobs and other entities on disk using their name shown on the UI as file and folder names. On Windows, when specifying a file or folder with a trailing dot character (`example.`), the file or folder will be treated as if that character was not present (`example`). As both are legal names for jobs and ot...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.304'}, {'fixed': '2.315'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.314'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21682'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-10-06/#SECURITY-2424'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2021/10/06/1'}]
{'cwe_ids': ['CWE-42'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T17:39:41Z', 'nvd_published_at': '2021-10-06T23:15:00Z'}
1.4.0
GHSA-cp7v-vmv7-6x2q
2022-07-01T21:34:47Z
2022-05-13T01:38:10Z
null
['CVE-2017-12196']
Incorrect Authorization in Undertow
Undertow before versions 1.4.18.SP1 (not findable in Maven), 2.0.2.Final, and 1.4.24.Final was found vulnerable when using Digest authentication, the server does not ensure that the value of URI in the Authorization header matches the URI in HTTP request line. This allows the attacker to cause a MITM attack and access ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0.Alpha1'}, {'fixed': '2.0.2.FInal'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.1.Final'}}, {'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undert...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12196'}, {'type': 'WEB', 'url': 'https://github.com/undertow-io/undertow/commit/facb33a5cedaf4b7b96d3840a08210370a806870'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:0478'}, {'type': 'WEB', 'url': 'https://access.redhat.com...
{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-01T21:34:47Z', 'nvd_published_at': '2018-04-18T01:29:00Z'}
1.4.0
GHSA-w78q-4w34-jrjx
2023-08-25T21:43:03Z
2022-05-17T00:01:25Z
null
['CVE-2022-0578']
Publify vulnerable to code injection
Code Injection in GitHub repository publify/publify prior to 9.2.8.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'publify_core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.2.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0578'}, {'type': 'WEB', 'url': 'https://github.com/publify/publify/commit/b50df050c593cc532b2c516792989bcfce2d73f7'}, {'type': 'PACKAGE', 'url': 'https://github.com/publify/publify'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory...
{'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T15:48:03Z', 'nvd_published_at': '2022-05-16T15:15:00Z'}
1.4.0
GHSA-39qc-96h7-956f
2023-09-29T17:03:45Z
2022-05-24T16:53:19Z
null
['CVE-2019-9514']
golang.org/x/net/http vulnerable to a reset flood
Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. Servers that accept direct connections from untrusted clients could be remotely made to allocate an unlimited amount of memory, until the program crashes. The attacker opens a number of streams and sends an invalid ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'golang.org/x/net'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20190813141303-74dc4d7220e7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-9514'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2594'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2661'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:2682'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T00:30:39Z', 'nvd_published_at': '2019-08-13T21:15:00Z'}
1.4.0
GHSA-p3rw-88pp-w4jh
2023-07-27T20:17:30Z
2022-05-17T02:34:59Z
null
['CVE-2017-0236']
ChakraCore RCE Vulnerability
A remote code execution vulnerability exists in Microsoft Edge in the way that the Chakra JavaScript engine renders when handling objects in memory, aka "Scripting Engine Memory Corruption Vulnerability." This CVE ID is unique from CVE-2017-0224, CVE-2017-0228, CVE-2017-0229, CVE-2017-0230, CVE-2017-0234, CVE-2017-0235...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-0236'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/2959'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/1ae7e3ce95515758b4cd7215cb4e48539a0f4031'}, {'type': 'WEB', 'url': 'https://portal.msrc....
{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-27T20:17:30Z', 'nvd_published_at': '2017-05-12T14:29:00Z'}
1.4.0
GHSA-jjmv-6fv4-85vf
2023-02-23T20:31:28Z
2022-05-24T16:56:45Z
null
['CVE-2019-10413']
Jenkins Data Theorem Mobile Security: CI/CD Plugin has Insufficiently Protected Credentials
Data Theorem Mobile Security: CI/CD Plugin stored a proxy password unencrypted in job `config.xml` files on the Jenkins controller. This password could be viewed by users with Extended Read permission, or access to the Jenkins controller file system. Data Theorem Mobile Security: CI/CD Plugin now stores the proxy pass...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.datatheorem.mobileappsecurity.jenkins.plugin:datatheorem-mobile-app-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10413'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-09-25/#SECURITY-1557'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/09/25/3'}]
{'cwe_ids': ['CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-23T20:31:28Z', 'nvd_published_at': '2019-09-25T16:15:00Z'}
1.4.0
GHSA-m7pr-m4cx-6m22
2022-12-22T14:03:16Z
2022-05-24T17:12:41Z
null
['CVE-2020-2169']
Reflected XSS vulnerability in Jenkins Queue cleanup Plugin
A form validation HTTP endpoint in Queue cleanup Plugin 1.3 and earlier does not escape a query parameter displayed in an error message. This results in a reflected cross-site scripting vulnerability (XSS). Queue cleanup Plugin 1.4 correctly escapes the query parameter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:queue-cleanup'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2169'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/queue-cleanup-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1724'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/20...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T14:03:16Z', 'nvd_published_at': '2020-03-25T17:15:00Z'}
1.4.0
GHSA-2h9c-34v6-3qmr
2023-07-31T23:55:42Z
2022-05-13T01:09:54Z
null
['CVE-2015-7561']
Kubernetes in OpenShift3 Access Control Misconfiguration
Kubernetes in OpenShift3 allows remote authenticated users to use the private images of other users should they know the name of said image.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0-alpha.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-7561'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/pull/18909'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1291963'}]
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T23:55:42Z', 'nvd_published_at': '2017-08-07T17:29:00Z'}
1.4.0
GHSA-g97c-jfx6-xvxh
2023-08-03T21:48:26Z
2022-05-17T03:25:24Z
null
['CVE-2015-8125']
Symfony Vulnerable to Timing Attack
Symfony 2.3.x before 2.3.35, 2.6.x before 2.6.12, and 2.7.x before 2.7.7 might allow remote attackers to have unspecified impact via a timing attack involving the (1) `Symfony/Component/Security/Http/RememberMe/PersistentTokenBasedRememberMeServices` or (2) `Symfony/Component/Security/Http/Firewall/DigestAuthentication...
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.35'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.12'}]}]...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8125'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/pull/16630'}, {'type': 'WEB', 'url': 'https://symfony.com/blog/cve-2015-8125-potential-remote-timing-attack-vulnerability-in-security-remember-me-service'}, {'type': 'WEB', 'url': '...
{'cwe_ids': ['CWE-208'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T21:48:26Z', 'nvd_published_at': '2015-12-07T20:59:00Z'}
1.4.0
GHSA-5v77-j66x-4c4g
2022-05-24T22:07:44Z
2022-05-24T22:07:44Z
null
['CVE-2022-29196']
Missing validation causes denial of service via `Conv3DBackpropFilterV2`
### Impact The implementation of [`tf.raw_ops.Conv3DBackpropFilterV2`](https://github.com/tensorflow/tensorflow/blob/f3b9bf4c3c0597563b289c0512e98d4ce81f886e/tensorflow/core/kernels/conv_grad_ops_3d.cc) does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5v77-j66x-4c4g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29196'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/174c5096f303d5be7ed2ca2662b08371bff4ab88'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-1284', 'CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:07:44Z', 'nvd_published_at': '2022-05-20T22:16:00Z'}
1.4.0
GHSA-fv25-wrff-wf86
2022-05-24T22:05:59Z
2022-05-24T22:05:59Z
null
['CVE-2022-29191']
Missing validation causes denial of service via `GetSessionTensor`
### Impact The implementation of [`tf.raw_ops.GetSessionTensor`](https://github.com/tensorflow/tensorflow/blob/f3b9bf4c3c0597563b289c0512e98d4ce81f886e/tensorflow/core/kernels/session_ops.cc#L94-L112) does not fully validate the input arguments. This results in a `CHECK`-failure which can be used to trigger a denial of...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.4'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fv25-wrff-wf86'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29191'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/48305e8ffe5246d67570b64096a96f8e315a7281'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-24T22:05:59Z', 'nvd_published_at': '2022-05-20T21:15:00Z'}
1.4.0
GHSA-jpmf-8cj2-595g
2022-07-07T22:33:19Z
2022-05-17T04:20:31Z
null
['CVE-2014-3627']
Improper Link Resolution Before File Access in Apache Hadoop
The YARN NodeManager daemon in Apache Hadoop 0.23.0 through 0.23.11 and 2.x before 2.5.2, when using Kerberos authentication, allows remote cluster users to change the permissions of certain files to world-readable via a symlink attack in a public tar archive, which is not properly handled during localization, related ...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.23.0'}, {'fixed': '1.0.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3627'}, {'type': 'WEB', 'url': 'http://mail-archives.apache.org/mod_mbox/hadoop-general/201411.mbox/%3CCALwhT97dOi04aC3VbekaB+zn2UAS_OZV2EAiP78GmjnMzfp2Ug@mail.gmail.com%3E'}]
{'cwe_ids': ['CWE-59'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T22:33:19Z', 'nvd_published_at': '2014-12-05T16:59:00Z'}
1.4.0
GHSA-w6c2-jrhh-jrxg
2022-12-20T22:39:49Z
2022-05-24T17:27:06Z
null
['CVE-2020-2249']
Credentials stored in plain text by Jenkins tfs Plugin
tfs Plugin 5.157.1 and earlier stores a webhook secret unencrypted in its global configuration file `hudson.plugins.tfs.TeamPluginGlobalConfig.xml` on the Jenkins controller as part of its configuration. This secret can be viewed by attackers with access to the Jenkins controller file system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:tfs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.157.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2249'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/tfs-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-09-01/#SECURITY-1506'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/09/01/3...
{'cwe_ids': ['CWE-256'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T22:39:49Z', 'nvd_published_at': '2020-09-01T14:15:00Z'}
1.4.0
GHSA-m63h-q4x3-6hwj
2023-08-17T22:57:53Z
2022-05-13T01:12:59Z
null
['CVE-2013-2083']
Moodle is vulnerable to Improper Input Validation in MoodleQuickForm class
The MoodleQuickForm class in `lib/formslib.php` in Moodle through 2.1.10, 2.2.x before 2.2.10, 2.3.x before 2.3.7, and 2.4.x before 2.4.4 does not properly handle a certain array-element syntax, which allows remote attackers to bypass intended form-data filtering via a crafted request.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.11'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.1.10'}}, {'package': {'ecosystem': 'Packagist', ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2083'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=228935'}, {'type': 'WEB', 'url': 'http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-38885...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-17T22:57:53Z', 'nvd_published_at': '2013-05-25T03:18:00Z'}
1.4.0
GHSA-23cr-5hr4-rgwv
2022-07-06T20:11:13Z
2022-05-17T03:22:06Z
null
['CVE-2015-6524']
Improper Input Validation in Apache ActiveMQ
The LDAPLoginModule implementation in the Java Authentication and Authorization Service (JAAS) in Apache ActiveMQ 5.x before 5.10.1 allows wildcard operators in usernames, which allows remote attackers to obtain credentials via a brute force attack. NOTE: this identifier was SPLIT from CVE-2014-3612 per ADT2 due to dif...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.activemq:activemq-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.10.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.10.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-6524'}, {'type': 'WEB', 'url': 'http://activemq.apache.org/security-advisories.data/CVE-2014-3612-announcement.txt'}, {'type': 'WEB', 'url': 'http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168094.html'}, {'type': 'WEB', 'url...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:11:13Z', 'nvd_published_at': '2015-08-24T14:59:00Z'}
1.4.0
GHSA-cv78-v957-jx34
2022-07-27T22:17:45Z
2022-05-24T17:12:57Z
null
['CVE-2020-7599']
Exposure of Sensitive Information in Gradle publish plugin
All versions of com.gradle.plugin-publish before 0.11.0 are vulnerable to Insertion of Sensitive Information into Log File. When a plugin author publishes a Gradle plugin while running Gradle with the --info log level flag, the Gradle Logger logs an AWS pre-signed URL. If this build log is publicly visible (as it is in...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.gradle.publish:plugin-publish-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.gradle.plugin-publish:com.gradle.plugin-publish.gradle.plugin'}, 'ranges': [{'type': 'ECOSYST...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7599'}, {'type': 'WEB', 'url': 'https://blog.gradle.org/plugin-portal-update'}, {'type': 'WEB', 'url': 'https://plugins.gradle.org/plugin/com.gradle.plugin-publish'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-COMGRADLEPLUGINPUBLISH-559...
{'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-27T22:17:45Z', 'nvd_published_at': '2020-03-30T19:15:00Z'}
1.4.0
GHSA-j69r-w67w-gf35
2023-07-31T19:07:34Z
2022-05-14T02:24:57Z
null
['CVE-2016-0191']
ChakraCore RCE Vulnerability
The Chakra JavaScript engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-0186 and CVE-2016-0193.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-0191'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/d21529b131d831fc4470139bfc90d80ae7481fa2'}, {'type': 'WEB', 'url': 'https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-052'}, {'type': 'WEB'...
{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T19:07:34Z', 'nvd_published_at': '2016-05-11T01:59:00Z'}
1.4.0
GHSA-wvj5-r78r-hhfq
2023-07-31T18:26:03Z
2022-05-14T03:10:21Z
null
['CVE-2016-2403']
Symfony Authentication Bypass
Symfony before 2.8.6 and 3.x before 3.0.6 allows remote attackers to bypass authentication by logging in with an empty password and valid username, which triggers an unauthenticated bind.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0'}, {'fixed': '3.0.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-2403'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20210123224944/http://www.securityfocus.com/bid/96137'}, {'type': 'WEB', 'url': 'https://www.debian.org/security/2018/dsa-4262'}, {'type': 'WEB', 'url': 'http://symfony.com/blog/cve-2016-2...
{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T18:26:03Z', 'nvd_published_at': '2017-02-07T17:59:00Z'}
1.4.0
GHSA-723p-9rcj-xv8j
2023-01-14T05:27:55Z
2022-05-24T17:08:47Z
null
['CVE-2020-2123']
RCE vulnerability in RadarGun Plugin
RadarGun Plugin 1.7 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types. This results in a remote code execution vulnerability exploitable by users able to configure RadarGun Plugin’s build step. RadarGun Plugin 1.8 configures its YAML parser to only instantiate safe types.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:radargun'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2123'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/radargun-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-02-12/#SECURITY-1733'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/02...
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-14T05:27:55Z', 'nvd_published_at': '2020-02-12T15:15:00Z'}
1.4.0
GHSA-hpxv-vpfv-7jc9
2023-09-25T18:59:06Z
2022-05-24T16:52:23Z
null
['CVE-2019-7854']
Magento 2 Community Edition IDOR Vulnerability
An insecure direct object reference (IDOR) vulnerability in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2 can lead to unauthorized disclosure of company credit history details.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'magento/community-edition'}, 'ecosystem_specific...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-7854'}, {'type': 'PACKAGE', 'url': 'https://github.com/magento/magento2'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20220121051916/https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-23'}]
{'cwe_ids': ['CWE-639'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T21:02:25Z', 'nvd_published_at': '2019-08-02T22:15:00Z'}
1.4.0
GHSA-c27h-mcmw-48hv
2023-02-14T00:56:25Z
2022-05-24T16:57:28Z
null
['CVE-2019-10202']
Deserialization of Untrusted Data in org.codehaus.jackson:jackson-mapper-asl
A series of deserialization vulnerabilities have been discovered in Codehaus 1.9.x implemented in EAP 7. This CVE fixes CVE-2017-17485, CVE-2017-7525, CVE-2017-15095, CVE-2018-5968, CVE-2018-7489, CVE-2018-1000873, CVE-2019-12086 reported for FasterXML jackson-databind by implementing a whitelist approach that will mit...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.codehaus.jackson:jackson-mapper-asl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.9.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10202'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10202'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0fbf2c60967bc9f73d7f5a62ad3b955789f9a14b950f42e99fca9b4e%40%3Cissues.hive.apache.org%3E'}, ...
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T00:56:25Z', 'nvd_published_at': '2019-10-01T15:15:00Z'}
1.4.0
GHSA-3cwf-pwcg-57xr
2023-07-20T18:24:47Z
2022-05-13T01:18:31Z
null
['CVE-2018-0835']
ChakraCore RCE Vulnerability
Microsoft Edge and ChakraCore in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0834, CVE-2018-0836, CVE-2018-0...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-0835'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/d318150296e09a369202434fe6d6f70673422b6a'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0835'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T18:24:47Z', 'nvd_published_at': '2018-02-15T02:29:00Z'}
1.4.0
GHSA-r8vh-cm9f-rc29
2023-07-27T22:32:19Z
2022-05-17T02:51:51Z
null
['CVE-2017-7391']
Magmi XSS Vulnerability
A Cross-Site Scripting (XSS) was discovered in Magmi 0.7.22. The vulnerability exists due to insufficient filtration of user-supplied data (prefix) passed to the `magmi-git-master/magmi/web/ajax_gettime.php` URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable webs...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'dweeves/magmi'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.24'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.7.22'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-7391'}, {'type': 'WEB', 'url': 'https://github.com/dweeves/magmi-git/issues/522'}, {'type': 'WEB', 'url': 'https://github.com/dweeves/magmi-git/pull/525'}, {'type': 'WEB', 'url': 'https://github.com/dweeves/magmi-git/commit/a9566b141b58bf40a9dd904a...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-27T22:32:19Z', 'nvd_published_at': '2017-04-01T02:59:00Z'}
1.4.0
GHSA-r7c8-hghc-2mp8
2023-08-17T21:45:08Z
2022-05-17T02:44:28Z
null
['CVE-2011-2481']
Apache Tomcat Allows Replacing of XML Parser
Apache Tomcat 7.0.x before 7.0.17 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application. ...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.17'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2011-2481'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'https://issues.apache.org/bugzilla/show_bug.cgi?id=51395'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20111209022500/http://www.securityfocus....
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-14T00:50:47Z', 'nvd_published_at': '2011-08-15T21:55:00Z'}
1.4.0
GHSA-gh27-38p5-mrxc
2022-06-29T22:43:46Z
2022-05-13T01:02:18Z
null
['CVE-2018-1288']
Improper Control of Generation of Code in Apache Kafka
In Apache Kafka 0.9.0.0 to 0.9.0.1, 0.10.0.0 to 0.10.2.1, 0.11.0.0 to 0.11.0.2, and 1.0.0, authenticated Kafka users may perform action reserved for the Broker via a manually created fetch request interfering with data replication, resulting in data loss.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.kafka:kafka'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.0.0'}, {'fixed': '0.10.2.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.10.2.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.kafka:kafka'}, 'range...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1288'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2018:3768'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/29f61337323f48c47d4b41d74b9e452bd60e65d0e5103af9a6bb2fef@%3Cusers.kafka.apache.org%3E'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T22:43:46Z', 'nvd_published_at': '2018-07-26T14:29:00Z'}
1.4.0
GHSA-5xrj-ghhp-hx7p
2023-02-08T18:11:54Z
2022-05-17T03:43:30Z
null
['CVE-2016-0757']
OpenStack Image Service (Glance) vulnerable to Improper Access Control
OpenStack Image Service (Glance) before 2015.1.3 (kilo) and 11.0.x before 11.0.2 (liberty), when show_multiple_locations is enabled, allow remote authenticated users to change image status and upload new image data by removing the last location of an image.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'glance'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-0757'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:0309'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:0352'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:0354'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T18:11:54Z', 'nvd_published_at': '2016-04-13T17:59:00Z'}
1.4.0
GHSA-mxv3-qcmf-r6wj
2023-07-24T22:11:43Z
2022-05-14T01:31:22Z
null
['CVE-2018-16629']
Subrion CMS XSS
`panel/uploads/#elf_l1_XA` in Subrion CMS v4.2.1 allows XSS via an SVG file with JavaScript in a SCRIPT element.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'intelliants/subrion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16629'}, {'type': 'WEB', 'url': 'https://github.com/intelliants/subrion/issues/777'}, {'type': 'WEB', 'url': 'https://github.com/intelliants/subrion/commit/fbc29ddb29e9c9732695e25ad2c22e038eed6385'}, {'type': 'WEB', 'url': 'https://github.com/secur...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-24T22:11:43Z', 'nvd_published_at': '2018-12-04T16:29:00Z'}
1.4.0
GHSA-f6mg-hmfp-6grw
2022-12-29T01:43:51Z
2022-05-24T17:28:26Z
null
['CVE-2020-2265']
Stored XSS vulnerability in Coverage/Complexity Scatter Plot Plugin
Jenkins Coverage/Complexity Scatter Plot Plugin 1.1.1 and earlier does not escape the method information in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide report files to the plugin's post-build step.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:covcomplplot'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2265'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/covcomplplot-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-09-16/#SECURITY-1913'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-29T01:43:51Z', 'nvd_published_at': '2020-09-16T14:15:00Z'}
1.4.0
GHSA-v7mh-3jgf-r26c
2023-02-08T17:56:11Z
2022-05-17T01:42:16Z
null
['CVE-2012-4406']
OpenStack Object Storage (swift) Code Injection vulnerability
OpenStack Object Storage (swift) before 1.7.0 uses the loads function in the pickle Python module unsafely when storing and loading metadata in memcached, which allows remote attackers to execute arbitrary code via a crafted pickle object.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'swift'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-4406'}, {'type': 'WEB', 'url': 'https://github.com/openstack/swift/commit/e1ff51c04554d51616d2845f92ab726cb0e5831a'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2012:1379'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errat...
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T17:56:11Z', 'nvd_published_at': '2012-10-22T23:55:00Z'}
1.4.0
GHSA-j5qh-cp3p-2h87
2023-08-16T23:27:55Z
2022-05-17T04:44:51Z
null
['CVE-2014-2741']
Ignite Realtime Openfire vulnerable to XMPPbomb attack
nio/XMLLightweightParser.java in Ignite Realtime Openfire before 3.9.2 does not properly restrict the processing of compressed XML elements, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XMPP stream, aka an "xmppbomb" attack.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.igniterealtime.openfire:parent'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-2741'}, {'type': 'WEB', 'url': 'https://github.com/igniterealtime/Openfire/commit/3aec383e07ee893b77396fe946766bbd3758af77'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20140407092132/http://xmpp.org/resources/security-notices/uncontrolled...
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T23:27:55Z', 'nvd_published_at': '2014-04-11T01:55:00Z'}
1.4.0
GHSA-gfhf-2xr5-2fvw
2023-09-26T20:41:18Z
2022-05-24T17:11:33Z
null
['CVE-2019-19211']
Dolibarr ERP and CRM contain XSS Vulnerability
Dolibarr ERP/CRM before 10.0.3 has an Insufficient Filtering issue that can lead to user/card.php XSS.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19211'}, {'type': 'PACKAGE', 'url': 'https://github.com/Dolibarr/dolibarr'}, {'type': 'WEB', 'url': 'https://herolab.usd.de/en/security-advisories/usd-2019-0053/'}, {'type': 'WEB', 'url': 'https://www.dolibarr.org/forum/dolibarr-changelogs'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-18T23:42:41Z', 'nvd_published_at': '2020-03-16T15:15:00Z'}
1.4.0
GHSA-7pwf-jg34-hxwp
2022-05-20T16:58:38Z
2022-05-20T16:58:38Z
null
['CVE-2022-24878']
Improper path handling in Kustomization files allows for denial of service
The kustomize-controller enables the use of Kustomize’s functionality when applying Kubernetes declarative state onto a cluster. A malicious user can use a specially crafted `kustomization.yaml` to cause Denial of Service at controller level. In multi-tenancy deployments this can lead to multiple tenants not being abl...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/fluxcd/kustomize-controller'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.16.0'}, {'fixed': '0.24.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/fluxcd/flux2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.19.0'}, {'f...
[{'type': 'WEB', 'url': 'https://github.com/fluxcd/flux2/security/advisories/GHSA-7pwf-jg34-hxwp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24878'}, {'type': 'PACKAGE', 'url': 'https://github.com/fluxcd/flux2'}]
{'cwe_ids': ['CWE-674'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-20T16:58:38Z', 'nvd_published_at': '2022-05-06T02:15:00Z'}
1.4.0
GHSA-r5c5-pr8j-pfp7
2023-09-29T15:47:38Z
2022-05-24T16:45:25Z
null
['CVE-2019-11840']
golang.org/x/crypto/salsa20/salsa uses insufficiently random values
An issue was discovered in supplementary Go cryptography libraries, aka golang-googlecode-go-crypto, before 2019-03-20. A flaw was found in the amd64 implementation of golang.org/x/crypto/salsa20 and golang.org/x/crypto/salsa20/salsa. If more than 256 GiB of keystream is generated, or if the counter otherwise grows gre...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'golang.org/x/crypto'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20190320223903-b7391e95e576'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11840'}, {'type': 'WEB', 'url': 'https://github.com/golang/go/issues/30965'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1691529'}, {'type': 'PACKAGE', 'url': 'https://github.com/golang/go'}, {'type': 'WEB', 'url': 'https:/...
{'cwe_ids': ['CWE-330'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T00:33:46Z', 'nvd_published_at': '2019-05-09T16:29:00Z'}
1.4.0
GHSA-rh8q-vjgf-gf74
2022-07-06T20:12:37Z
2022-05-14T01:10:16Z
null
['CVE-2015-5345']
Improper Limitation of a Pathname to a Restricted Directory in Apache Tomcat
The Mapper component in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.30, and 9.x before 9.0.0.M2 processes redirects before considering security constraints and Filters, which allows remote attackers to determine the existence of a directory via a URL that lacks a trailing / (slash) character.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0.M1'}, {'fixed': '9.0.0.M2'}]}], 'versions': ['9.0.0.M1']}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'intr...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5345'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:1087'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:1088'}, {'type': 'WEB', 'url': 'https://bto.bluecoat.com/security-advisory/sa118'}, {'type': 'WEB'...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:12:37Z', 'nvd_published_at': '2016-02-25T01:59:00Z'}